Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
jqxrkk.ps1

Overview

General Information

Sample name:jqxrkk.ps1
Analysis ID:1586898
MD5:32da6ee3b90b2d2f694b8635dfa58459
SHA1:9272ee959d8290d6f4095fd6525c7927b5c92de0
SHA256:00a6cd51b0d8ca285eea43383a0736a9c4b95ed381fb5607291d08dc9870e30f
Tags:ps1user-threatinte1
Infos:

Detection

MassLogger RAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Sigma detected: RegAsm connects to smtp port
Yara detected MassLogger RAT
Yara detected Telegram RAT
AI detected suspicious sample
Allocates memory in foreign processes
Found suspicious powershell code related to unpacking or dynamic code loading
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
PE file contains section with special chars
PE file has nameless sections
Powershell drops PE file
Suspicious execution chain found
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sigma detected: Change PowerShell Policies to an Insecure Level
Suricata IDS alerts with low severity for network traffic
Uses SMTP (mail sending)
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • powershell.exe (PID: 5088 cmdline: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\jqxrkk.ps1" MD5: 04029E121A0CFA5991749937DD22A1D9)
    • conhost.exe (PID: 1468 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • x.exe (PID: 1428 cmdline: "C:\Users\user\AppData\Local\Temp\x.exe" MD5: 9FB7455B1C6CB563FF7E58F422F3BC6E)
      • RegAsm.exe (PID: 1280 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
  • cleanup
{"EXfil Mode": "SMTP", "From": "mtb.food@phobinh.com.vn", "Password": "danh@PB289", "Server": "mail.phobinh.com.vn", "To": "office@handtool.com.vn", "Port": 587}
SourceRuleDescriptionAuthorStrings
00000005.00000002.3418127650.0000000002A36000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000005.00000002.3418127650.0000000002A36000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
      00000005.00000002.3414537023.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_MassLoggerYara detected MassLogger RATJoe Security
        00000005.00000002.3414537023.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          00000005.00000002.3414537023.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
            Click to see the 14 entries
            SourceRuleDescriptionAuthorStrings
            4.2.x.exe.42e4aa0.0.unpackJoeSecurity_MassLoggerYara detected MassLogger RATJoe Security
              4.2.x.exe.42e4aa0.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                4.2.x.exe.42e4aa0.0.unpackJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
                  4.2.x.exe.42e4aa0.0.unpackWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
                  • 0xd3b7:$a1: get_encryptedPassword
                  • 0xd6df:$a2: get_encryptedUsername
                  • 0xd152:$a3: get_timePasswordChanged
                  • 0xd273:$a4: get_passwordField
                  • 0xd3cd:$a5: set_encryptedPassword
                  • 0xed29:$a7: get_logins
                  • 0xe9da:$a8: GetOutlookPasswords
                  • 0xe7cc:$a9: StartKeylogger
                  • 0xec79:$a10: KeyLoggerEventArgs
                  • 0xe829:$a11: KeyLoggerEventArgsEventHandler
                  4.2.x.exe.42e4aa0.0.unpackMAL_Envrial_Jan18_1Detects Encrial credential stealer malwareFlorian Roth
                  • 0x12365:$a2: \Comodo\Dragon\User Data\Default\Login Data
                  • 0x11863:$a3: \Google\Chrome\User Data\Default\Login Data
                  • 0x11b71:$a4: \Orbitum\User Data\Default\Login Data
                  • 0x12969:$a5: \Kometa\User Data\Default\Login Data
                  Click to see the 30 entries

                  Networking

                  barindex
                  Source: Network ConnectionAuthor: Joe Security: Data: DestinationIp: 123.30.244.30, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe, Initiated: true, ProcessId: 1280, Protocol: tcp, SourceIp: 192.168.2.6, SourceIsIpv6: false, SourcePort: 49762

                  System Summary

                  barindex
                  Source: Process startedAuthor: frack113: Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\jqxrkk.ps1", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\jqxrkk.ps1", CommandLine|base64offset|contains: z, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4004, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\jqxrkk.ps1", ProcessId: 5088, ProcessName: powershell.exe
                  Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\jqxrkk.ps1", CommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\jqxrkk.ps1", CommandLine|base64offset|contains: z, Image: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 4004, ProcessCommandLine: "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\jqxrkk.ps1", ProcessId: 5088, ProcessName: powershell.exe
                  TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                  2025-01-09T18:33:19.476114+010028032742Potentially Bad Traffic192.168.2.649712132.226.8.16980TCP
                  2025-01-09T18:33:26.038692+010028032742Potentially Bad Traffic192.168.2.649712132.226.8.16980TCP

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: C:\Users\user\AppData\Local\Temp\x.exeAvira: detection malicious, Label: TR/Dropper.Gen
                  Source: 5.2.RegAsm.exe.400000.0.unpackMalware Configuration Extractor: MassLogger {"EXfil Mode": "SMTP", "From": "mtb.food@phobinh.com.vn", "Password": "danh@PB289", "Server": "mail.phobinh.com.vn", "To": "office@handtool.com.vn", "Port": 587}
                  Source: jqxrkk.ps1ReversingLabs: Detection: 13%
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                  Source: C:\Users\user\AppData\Local\Temp\x.exeJoe Sandbox ML: detected

                  Location Tracking

                  barindex
                  Source: unknownDNS query: name: reallyfreegeoip.org
                  Source: unknownHTTPS traffic detected: 104.21.16.1:443 -> 192.168.2.6:49723 version: TLS 1.0
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppDataJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.iniJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\userJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior

                  Software Vulnerabilities

                  barindex
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeChild: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp 00F05782h5_2_00F05358
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp 00F051B9h5_2_00F04F08
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp 00F05782h5_2_00F05367
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp 00F05782h5_2_00F056AF
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp 05EB1935h5_2_05EB15F8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp 05EBD088h5_2_05EBCDE0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp 05EBF028h5_2_05EBED80
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp 05EB0FF1h5_2_05EB0D48
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp 05EBC7D8h5_2_05EBC530
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp 05EBE778h5_2_05EBE4D0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp 05EBBF28h5_2_05EBBC80
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp 05EB0741h5_2_05EB0498
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp 05EB3EF8h5_2_05EB3C50
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp 05EBDEC8h5_2_05EBDC20
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp 05EB3AA0h5_2_05EB37F8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp 05EBB220h5_2_05EBAF78
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp 05EB31F0h5_2_05EB2F48
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp 05EBA970h5_2_05EBA6C8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp 05EBD93Ah5_2_05EBD690
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp 05EBF8D8h5_2_05EBF630
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp 05EBA0C0h5_2_05EB9E18
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp 05EBF480h5_2_05EBF1D8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp 05EB1449h5_2_05EB11A0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp 05EBCC30h5_2_05EBC988
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp 05EBEBD0h5_2_05EBE928
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp 05EB0B99h5_2_05EB08F0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp 05EBC380h5_2_05EBC0D8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp 05EB4350h5_2_05EB40A8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp 05EBE320h5_2_05EBE078
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp 05EB02E9h5_2_05EB0040
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp 05EBBAD0h5_2_05EBB828
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp 05EBB678h5_2_05EBB3D0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp 05EB3648h5_2_05EB33A0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp 05EBADC8h5_2_05EBAB20
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp 05EB2D98h5_2_05EB2AF0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp 05EBFD30h5_2_05EBFA88
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp 05EBA518h5_2_05EBA270
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp 05EBD4E0h5_2_05EBD238
                  Source: global trafficTCP traffic: 192.168.2.6:49762 -> 123.30.244.30:587
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: Joe Sandbox ViewIP Address: 132.226.8.169 132.226.8.169
                  Source: Joe Sandbox ViewIP Address: 104.21.16.1 104.21.16.1
                  Source: Joe Sandbox ViewASN Name: VNPT-AS-VNVietnamPostsandTelecommunicationsVNPTVN VNPT-AS-VNVietnamPostsandTelecommunicationsVNPTVN
                  Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
                  Source: unknownDNS query: name: checkip.dyndns.org
                  Source: unknownDNS query: name: reallyfreegeoip.org
                  Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.6:49712 -> 132.226.8.169:80
                  Source: global trafficTCP traffic: 192.168.2.6:49762 -> 123.30.244.30:587
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: unknownHTTPS traffic detected: 104.21.16.1:443 -> 192.168.2.6:49723 version: TLS 1.0
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                  Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
                  Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
                  Source: global trafficDNS traffic detected: DNS query: mail.phobinh.com.vn
                  Source: RegAsm.exe, 00000005.00000002.3418127650.0000000002960000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
                  Source: RegAsm.exe, 00000005.00000002.3418127650.0000000002960000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.comd
                  Source: RegAsm.exe, 00000005.00000002.3418127650.0000000002960000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000005.00000002.3418127650.000000000294E000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000005.00000002.3418127650.0000000002A36000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
                  Source: RegAsm.exe, 00000005.00000002.3418127650.00000000028E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
                  Source: RegAsm.exe, 00000005.00000002.3418127650.0000000002960000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000005.00000002.3418127650.0000000002A36000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/d
                  Source: x.exe, 00000004.00000002.2228950567.0000000004244000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000005.00000002.3414537023.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
                  Source: RegAsm.exe, 00000005.00000002.3418127650.0000000002960000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.orgd
                  Source: RegAsm.exe, 00000005.00000002.3421733892.0000000005CA2000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000005.00000002.3418127650.0000000002A36000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000005.00000002.3415809274.0000000000CCF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
                  Source: RegAsm.exe, 00000005.00000002.3421733892.0000000005CA2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
                  Source: powershell.exe, 00000000.00000002.2251667720.0000023CD090B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.m
                  Source: RegAsm.exe, 00000005.00000002.3421733892.0000000005CA2000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000005.00000002.3418127650.0000000002A36000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000005.00000002.3415809274.0000000000CCF000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000005.00000002.3421733892.0000000005C60000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#
                  Source: RegAsm.exe, 00000005.00000002.3418127650.0000000002A36000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.phobinh.com.vn
                  Source: RegAsm.exe, 00000005.00000002.3418127650.0000000002A36000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.phobinh.com.vnd
                  Source: RegAsm.exe, 00000005.00000002.3418127650.0000000002A36000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail24430.maychuemail.com
                  Source: RegAsm.exe, 00000005.00000002.3418127650.0000000002A36000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail24430.maychuemail.comd
                  Source: powershell.exe, 00000000.00000002.2218404373.0000023CB9FE4000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2240464969.0000023CC8743000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2240464969.0000023CC84D9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
                  Source: RegAsm.exe, 00000005.00000002.3421733892.0000000005CA2000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000005.00000002.3418127650.0000000002A36000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000005.00000002.3415809274.0000000000CCF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0
                  Source: RegAsm.exe, 00000005.00000002.3421733892.0000000005CA2000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000005.00000002.3418127650.0000000002A36000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000005.00000002.3415809274.0000000000CCF000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000005.00000002.3421733892.0000000005C60000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.sectigo.com0-
                  Source: powershell.exe, 00000000.00000002.2218404373.0000023CB9F88000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
                  Source: RegAsm.exe, 00000005.00000002.3418127650.000000000297D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.org
                  Source: RegAsm.exe, 00000005.00000002.3418127650.000000000297D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.orgd
                  Source: powershell.exe, 00000000.00000002.2218404373.0000023CB8461000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000005.00000002.3418127650.00000000028E1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                  Source: powershell.exe, 00000000.00000002.2218404373.0000023CB9A6D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                  Source: powershell.exe, 00000000.00000002.2218404373.0000023CB9F88000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
                  Source: RegAsm.exe, 00000005.00000002.3421733892.0000000005C60000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.microsoft.
                  Source: powershell.exe, 00000000.00000002.2218404373.0000023CB8461000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore68
                  Source: RegAsm.exe, 00000005.00000002.3418127650.0000000002A36000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
                  Source: x.exe, 00000004.00000002.2228950567.0000000004244000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000005.00000002.3414537023.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot-/sendDocument?chat_id=
                  Source: powershell.exe, 00000000.00000002.2240464969.0000023CC84D9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
                  Source: powershell.exe, 00000000.00000002.2240464969.0000023CC84D9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
                  Source: powershell.exe, 00000000.00000002.2240464969.0000023CC84D9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
                  Source: powershell.exe, 00000000.00000002.2218404373.0000023CB9F88000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
                  Source: powershell.exe, 00000000.00000002.2218404373.0000023CB9FE4000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2240464969.0000023CC8743000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2240464969.0000023CC84D9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
                  Source: powershell.exe, 00000000.00000002.2218404373.0000023CB9A6D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://oneget.org
                  Source: powershell.exe, 00000000.00000002.2218404373.0000023CB9A6D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://oneget.orgX
                  Source: RegAsm.exe, 00000005.00000002.3418127650.0000000002960000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
                  Source: x.exe, 00000004.00000002.2228950567.0000000004244000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000005.00000002.3418127650.0000000002960000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000005.00000002.3414537023.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
                  Source: RegAsm.exe, 00000005.00000002.3418127650.0000000002960000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189d
                  Source: RegAsm.exe, 00000005.00000002.3418127650.0000000002960000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189l
                  Source: RegAsm.exe, 00000005.00000002.3421733892.0000000005CA2000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000005.00000002.3418127650.0000000002A36000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000005.00000002.3415809274.0000000000CCF000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000005.00000002.3421733892.0000000005C60000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://sectigo.com/CPS0
                  Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
                  Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723

                  System Summary

                  barindex
                  Source: 4.2.x.exe.42e4aa0.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 4.2.x.exe.42e4aa0.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 4.2.x.exe.42b6e58.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 4.2.x.exe.42b6e58.2.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 4.2.x.exe.42cdc80.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 4.2.x.exe.42cdc80.1.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 5.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 5.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 4.2.x.exe.42e4aa0.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 4.2.x.exe.42e4aa0.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 4.2.x.exe.42cdc80.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 4.2.x.exe.42cdc80.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 4.2.x.exe.42b6e58.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 4.2.x.exe.42b6e58.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                  Source: 00000005.00000002.3414537023.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: 00000004.00000002.2228950567.0000000004244000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: Process Memory Space: powershell.exe PID: 5088, type: MEMORYSTRMatched rule: Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution Author: ditekSHen
                  Source: Process Memory Space: x.exe PID: 1428, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: Process Memory Space: RegAsm.exe PID: 1280, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                  Source: x.exe.0.drStatic PE information: section name: 6Fd:c#
                  Source: x.exe.0.drStatic PE information: section name:
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\x.exeJump to dropped file
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FFD346300020_2_00007FFD34630002
                  Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_00C228D04_2_00C228D0
                  Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_00C208484_2_00C20848
                  Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_00C211E04_2_00C211E0
                  Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_00C228C14_2_00C228C1
                  Source: C:\Users\user\AppData\Local\Temp\x.exeCode function: 4_2_00C207E04_2_00C207E0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_00F0C1685_2_00F0C168
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_00F0CAB05_2_00F0CAB0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_00F07E685_2_00F07E68
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_00F04F085_2_00F04F08
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_00F0B9E05_2_00F0B9E0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_00F0B9D05_2_00F0B9D0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_00F0CAAF5_2_00F0CAAF
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_00F02DD15_2_00F02DD1
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_00F04EF85_2_00F04EF8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_00F07E675_2_00F07E67
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_05EB15F85_2_05EB15F8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_05EB45005_2_05EB4500
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_05EB1C585_2_05EB1C58
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_05EB77705_2_05EB7770
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_05EB69985_2_05EB6998
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_05EB71985_2_05EB7198
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_05EB15EB5_2_05EB15EB
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_05EBCDE05_2_05EBCDE0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_05EBCDD05_2_05EBCDD0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_05EBED805_2_05EBED80
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_05EBED705_2_05EBED70
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_05EB0D485_2_05EB0D48
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_05EBC5205_2_05EBC520
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_05EB0D395_2_05EB0D39
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_05EBC5305_2_05EBC530
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_05EBE4C05_2_05EBE4C0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_05EBE4D05_2_05EBE4D0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_05EB04895_2_05EB0489
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_05EBBC805_2_05EBBC80
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_05EB04985_2_05EB0498
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_05EB9C905_2_05EB9C90
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_05EBBC715_2_05EBBC71
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_05EB3C425_2_05EB3C42
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_05EB3C505_2_05EB3C50
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_05EBDC205_2_05EBDC20
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_05EB1C325_2_05EB1C32
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_05EB1C365_2_05EB1C36
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_05EBDC115_2_05EBDC11
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_05EB37E85_2_05EB37E8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_05EB37F85_2_05EB37F8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_05EBAF685_2_05EBAF68
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_05EBAF785_2_05EBAF78
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_05EB2F485_2_05EB2F48
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_05EB2F385_2_05EB2F38
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_05EBA6C85_2_05EBA6C8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_05EBA6B95_2_05EBA6B9
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_05EBD6815_2_05EBD681
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_05EBD6905_2_05EBD690
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_05EBF6205_2_05EBF620
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_05EBF6305_2_05EBF630
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_05EB9E185_2_05EB9E18
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_05EBF1C85_2_05EBF1C8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_05EBF1D85_2_05EBF1D8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_05EB11A05_2_05EB11A0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_05EBC9885_2_05EBC988
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_05EB118F5_2_05EB118F
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_05EBC97A5_2_05EBC97A
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_05EBE9285_2_05EBE928
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_05EBE91E5_2_05EBE91E
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_05EB08F05_2_05EB08F0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_05EBC0CA5_2_05EBC0CA
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_05EBC0D85_2_05EBC0D8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_05EB08DF5_2_05EB08DF
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_05EB40A85_2_05EB40A8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_05EB40985_2_05EB4098
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_05EBE0685_2_05EBE068
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_05EBE0785_2_05EBE078
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_05EB00405_2_05EB0040
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_05EBB8285_2_05EBB828
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_05EB003B5_2_05EB003B
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_05EBB8185_2_05EBB818
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_05EBB3C15_2_05EBB3C1
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_05EBB3D05_2_05EBB3D0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_05EB33A05_2_05EB33A0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_05EB33915_2_05EB3391
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_05EBAB205_2_05EBAB20
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_05EBAB105_2_05EBAB10
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_05EB2AE05_2_05EB2AE0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_05EB2AF05_2_05EB2AF0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_05EBFA885_2_05EBFA88
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_05EBA2615_2_05EBA261
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_05EBFA785_2_05EBFA78
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_05EBA2705_2_05EBA270
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_05EBD22A5_2_05EBD22A
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_05EBD2385_2_05EBD238
                  Source: 4.2.x.exe.42e4aa0.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 4.2.x.exe.42e4aa0.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 4.2.x.exe.42b6e58.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 4.2.x.exe.42b6e58.2.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 4.2.x.exe.42cdc80.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 4.2.x.exe.42cdc80.1.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 5.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 5.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 4.2.x.exe.42e4aa0.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 4.2.x.exe.42e4aa0.0.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 4.2.x.exe.42cdc80.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 4.2.x.exe.42cdc80.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 4.2.x.exe.42b6e58.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 4.2.x.exe.42b6e58.2.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                  Source: 00000005.00000002.3414537023.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: 00000004.00000002.2228950567.0000000004244000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: Process Memory Space: powershell.exe PID: 5088, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_PWSH_B64Encoded_Concatenated_FileEXEC author = ditekSHen, description = Detects PowerShell scripts containing patterns of base64 encoded files, concatenation and execution
                  Source: Process Memory Space: x.exe PID: 1428, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: Process Memory Space: RegAsm.exe PID: 1280, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                  Source: x.exe.0.drStatic PE information: Section: 6Fd:c# ZLIB complexity 1.0003925398284315
                  Source: classification engineClassification label: mal100.spre.troj.spyw.expl.evad.winPS1@6/7@3/3
                  Source: C:\Users\user\AppData\Local\Temp\x.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\x.exe.logJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMutant created: NULL
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1468:120:WilError_03
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\__PSScriptPolicyTest_bxcbnnbs.ryi.ps1Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile read: C:\Users\desktop.iniJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\SystemCertificates\CAJump to behavior
                  Source: RegAsm.exe, 00000005.00000002.3418127650.00000000029DF000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000005.00000002.3418127650.00000000029F3000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000005.00000002.3418127650.00000000029C0000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000005.00000002.3418127650.00000000029D0000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000005.00000002.3420481730.000000000390D000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000005.00000002.3418127650.00000000029FF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                  Source: jqxrkk.ps1ReversingLabs: Detection: 13%
                  Source: unknownProcess created: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\jqxrkk.ps1"
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\user\AppData\Local\Temp\x.exe "C:\Users\user\AppData\Local\Temp\x.exe"
                  Source: C:\Users\user\AppData\Local\Temp\x.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\user\AppData\Local\Temp\x.exe "C:\Users\user\AppData\Local\Temp\x.exe" Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appresolver.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: bcp47langs.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: slc.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sppc.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: propsys.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: linkinfo.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntshrui.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: srvcli.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cscapi.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: policymanager.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msvcp110_win.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: taskflowdatauser.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cdp.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: umpdc.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: dsreg.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: urlmon.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: iertutil.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: netutils.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: edputil.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: aclayers.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: version.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rasapi32.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rasman.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rtutils.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dhcpcsvc6.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dhcpcsvc.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: fwpuclnt.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: secur32.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: schannel.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mskeyprotect.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ntasn1.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ncrypt.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ncryptsslp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: msasn1.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: gpapi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dpapi.dllJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior

                  Data Obfuscation

                  barindex
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: FromBase64String("TVqQAAMAAAAEAAAA//8AALgAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgAAAAA4fug4AtAnNIbgBTM0hVGhpcyBwcm9ncmFtIGNhbm5vdCBiZSBydW4gaW4gRE9TIG1vZGUuDQ0KJAAAAAAAAABQRQAATAEFAL
                  Source: x.exe.0.drStatic PE information: 0xA177E0B7 [Fri Nov 5 00:41:27 2055 UTC]
                  Source: x.exe.0.drStatic PE information: section name: 6Fd:c#
                  Source: x.exe.0.drStatic PE information: section name:
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeCode function: 0_2_00007FFD345600BD pushad ; iretd 0_2_00007FFD345600C1
                  Source: x.exe.0.drStatic PE information: section name: 6Fd:c# entropy: 7.99799588046591
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\x.exeJump to dropped file
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeMemory allocated: C20000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeMemory allocated: 2A10000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeMemory allocated: 2910000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeMemory allocated: 5050000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeMemory allocated: 6050000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeMemory allocated: 6180000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeMemory allocated: 7180000 memory reserve | memory write watchJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: C50000 memory reserve | memory write watchJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 28E0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 2770000 memory reserve | memory write watchJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 4000Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 3009Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWindow / User API: threadDelayed 8498Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWindow / User API: threadDelayed 1360Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 6900Thread sleep time: -2767011611056431s >= -30000sJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe TID: 5140Thread sleep time: -922337203685477s >= -30000sJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exe TID: 1912Thread sleep time: -922337203685477s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5760Thread sleep count: 32 > 30Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5760Thread sleep time: -29514790517935264s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5760Thread sleep time: -100000s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5760Thread sleep time: -99890s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6496Thread sleep count: 8498 > 30Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6496Thread sleep count: 1360 > 30Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5760Thread sleep time: -99781s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5760Thread sleep time: -99672s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5760Thread sleep time: -99562s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5760Thread sleep time: -99453s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5760Thread sleep time: -99343s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5760Thread sleep time: -99234s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5760Thread sleep time: -99124s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5760Thread sleep time: -99015s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5760Thread sleep time: -98903s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5760Thread sleep time: -98797s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5760Thread sleep time: -98687s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5760Thread sleep time: -98578s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5760Thread sleep time: -98468s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5760Thread sleep time: -98359s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5760Thread sleep time: -98247s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5760Thread sleep time: -98140s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5760Thread sleep time: -98031s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5760Thread sleep time: -97918s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5760Thread sleep time: -97809s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5760Thread sleep time: -97703s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5760Thread sleep time: -97593s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5760Thread sleep time: -97484s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5760Thread sleep time: -97372s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5760Thread sleep time: -97265s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5760Thread sleep time: -97156s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5760Thread sleep time: -97047s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5760Thread sleep time: -96937s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5760Thread sleep time: -96827s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5760Thread sleep time: -96718s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5760Thread sleep time: -96609s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5760Thread sleep time: -96499s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5760Thread sleep time: -96390s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5760Thread sleep time: -96281s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5760Thread sleep time: -96167s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5760Thread sleep time: -96062s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5760Thread sleep time: -95953s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5760Thread sleep time: -95838s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5760Thread sleep time: -95734s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5760Thread sleep time: -95625s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5760Thread sleep time: -95515s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5760Thread sleep time: -95406s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5760Thread sleep time: -95297s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5760Thread sleep time: -95187s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5760Thread sleep time: -95078s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5760Thread sleep time: -94968s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5760Thread sleep time: -94858s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5760Thread sleep time: -94750s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5760Thread sleep time: -94640s >= -30000sJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 100000Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 99890Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 99781Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 99672Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 99562Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 99453Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 99343Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 99234Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 99124Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 99015Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 98903Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 98797Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 98687Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 98578Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 98468Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 98359Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 98247Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 98140Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 98031Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 97918Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 97809Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 97703Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 97593Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 97484Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 97372Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 97265Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 97156Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 97047Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 96937Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 96827Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 96718Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 96609Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 96499Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 96390Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 96281Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 96167Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 96062Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 95953Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 95838Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 95734Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 95625Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 95515Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 95406Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 95297Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 95187Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 95078Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 94968Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 94858Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 94750Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 94640Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppDataJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\desktop.iniJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\userJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\WindowsJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
                  Source: RegAsm.exe, 00000005.00000002.3415809274.0000000000CCF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll$
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 5_2_00F0C168 LdrInitializeThunk,LdrInitializeThunk,5_2_00F0C168
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeMemory allocated: page read and write | page guardJump to behavior

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: C:\Users\user\AppData\Local\Temp\x.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 protect: page execute and read and writeJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 value starts with: 4D5AJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 402000Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 41A000Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 41C000Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 9E2008Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\user\AppData\Local\Temp\x.exe "C:\Users\user\AppData\Local\Temp\x.exe" Jump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_64\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeQueries volume information: C:\Users\user\AppData\Local\Temp\x.exe VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\AppData\Local\Temp\x.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 4.2.x.exe.42e4aa0.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.x.exe.42b6e58.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.x.exe.42cdc80.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.x.exe.42e4aa0.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.x.exe.42cdc80.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.x.exe.42b6e58.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000005.00000002.3414537023.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000002.2228950567.0000000004244000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: x.exe PID: 1428, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 1280, type: MEMORYSTR
                  Source: Yara matchFile source: 4.2.x.exe.42e4aa0.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.x.exe.42b6e58.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.x.exe.42cdc80.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.x.exe.42e4aa0.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.x.exe.42cdc80.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.x.exe.42b6e58.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000005.00000002.3418127650.0000000002A36000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000005.00000002.3414537023.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000002.2228950567.0000000004244000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: x.exe PID: 1428, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 1280, type: MEMORYSTR
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                  Source: Yara matchFile source: 4.2.x.exe.42e4aa0.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.x.exe.42b6e58.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.x.exe.42cdc80.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.x.exe.42e4aa0.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.x.exe.42cdc80.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.x.exe.42b6e58.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000005.00000002.3418127650.0000000002A36000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000005.00000002.3414537023.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000002.2228950567.0000000004244000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: x.exe PID: 1428, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 1280, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: 4.2.x.exe.42e4aa0.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.x.exe.42b6e58.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.x.exe.42cdc80.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.x.exe.42e4aa0.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.x.exe.42cdc80.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.x.exe.42b6e58.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000005.00000002.3414537023.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000002.2228950567.0000000004244000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: x.exe PID: 1428, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 1280, type: MEMORYSTR
                  Source: Yara matchFile source: 4.2.x.exe.42e4aa0.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.x.exe.42b6e58.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.x.exe.42cdc80.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 5.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.x.exe.42e4aa0.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.x.exe.42cdc80.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 4.2.x.exe.42b6e58.2.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000005.00000002.3418127650.0000000002A36000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000005.00000002.3414537023.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000004.00000002.2228950567.0000000004244000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: x.exe PID: 1428, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 1280, type: MEMORYSTR
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
                  Exploitation for Client Execution
                  1
                  DLL Side-Loading
                  1
                  DLL Side-Loading
                  1
                  Disable or Modify Tools
                  1
                  OS Credential Dumping
                  2
                  File and Directory Discovery
                  Remote Services1
                  Archive Collected Data
                  1
                  Ingress Tool Transfer
                  Exfiltration Over Other Network MediumAbuse Accessibility Features
                  CredentialsDomainsDefault Accounts1
                  PowerShell
                  Boot or Logon Initialization Scripts311
                  Process Injection
                  3
                  Obfuscated Files or Information
                  LSASS Memory13
                  System Information Discovery
                  Remote Desktop Protocol1
                  Data from Local System
                  11
                  Encrypted Channel
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)12
                  Software Packing
                  Security Account Manager1
                  Security Software Discovery
                  SMB/Windows Admin Shares1
                  Email Collection
                  1
                  Non-Standard Port
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                  Timestomp
                  NTDS1
                  Process Discovery
                  Distributed Component Object ModelInput Capture2
                  Non-Application Layer Protocol
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                  DLL Side-Loading
                  LSA Secrets31
                  Virtualization/Sandbox Evasion
                  SSHKeylogging23
                  Application Layer Protocol
                  Scheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                  Masquerading
                  Cached Domain Credentials1
                  Application Window Discovery
                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items31
                  Virtualization/Sandbox Evasion
                  DCSync1
                  System Network Configuration Discovery
                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                  Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job311
                  Process Injection
                  Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet
                  behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1586898 Sample: jqxrkk.ps1 Startdate: 09/01/2025 Architecture: WINDOWS Score: 100 29 reallyfreegeoip.org 2->29 31 mail24430.maychuemail.com 2->31 33 3 other IPs or domains 2->33 39 Found malware configuration 2->39 41 Malicious sample detected (through community Yara rule) 2->41 43 Multi AV Scanner detection for submitted file 2->43 47 6 other signatures 2->47 8 powershell.exe 16 2->8         started        signatures3 45 Tries to detect the country of the analysis system (by using the IP) 29->45 process4 file5 21 C:\Users\user\AppData\Local\Temp\x.exe, PE32 8->21 dropped 49 Suspicious execution chain found 8->49 51 Found suspicious powershell code related to unpacking or dynamic code loading 8->51 53 Powershell drops PE file 8->53 12 x.exe 3 8->12         started        15 conhost.exe 8->15         started        signatures6 process7 signatures8 55 Antivirus detection for dropped file 12->55 57 Machine Learning detection for dropped file 12->57 59 Writes to foreign memory regions 12->59 61 2 other signatures 12->61 17 RegAsm.exe 15 2 12->17         started        process9 dnsIp10 23 mail24430.maychuemail.com 123.30.244.30, 49762, 587 VNPT-AS-VNVietnamPostsandTelecommunicationsVNPTVN Viet Nam 17->23 25 checkip.dyndns.com 132.226.8.169, 49712, 80 UTMEMUS United States 17->25 27 reallyfreegeoip.org 104.21.16.1, 443, 49723 CLOUDFLARENETUS United States 17->27 35 Tries to steal Mail credentials (via file / registry access) 17->35 37 Tries to harvest and steal browser information (history, passwords, etc) 17->37 signatures11

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  jqxrkk.ps113%ReversingLabs
                  SourceDetectionScannerLabelLink
                  C:\Users\user\AppData\Local\Temp\x.exe100%AviraTR/Dropper.Gen
                  C:\Users\user\AppData\Local\Temp\x.exe100%Joe Sandbox ML
                  No Antivirus matches
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  http://mail24430.maychuemail.comd0%Avira URL Cloudsafe
                  http://mail.phobinh.com.vnd0%Avira URL Cloudsafe
                  http://ocsp.sectigo.com0-0%Avira URL Cloudsafe
                  http://mail24430.maychuemail.com0%Avira URL Cloudsafe
                  http://mail.phobinh.com.vn0%Avira URL Cloudsafe
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  mail24430.maychuemail.com
                  123.30.244.30
                  truetrue
                    unknown
                    reallyfreegeoip.org
                    104.21.16.1
                    truefalse
                      high
                      checkip.dyndns.com
                      132.226.8.169
                      truefalse
                        high
                        checkip.dyndns.org
                        unknown
                        unknownfalse
                          high
                          mail.phobinh.com.vn
                          unknown
                          unknowntrue
                            unknown
                            NameMaliciousAntivirus DetectionReputation
                            https://reallyfreegeoip.org/xml/8.46.123.189false
                              high
                              http://checkip.dyndns.org/false
                                high
                                NameSourceMaliciousAntivirus DetectionReputation
                                http://crt.sectigo.com/SectigoRSADomainValidationSecureServerCA.crt0#RegAsm.exe, 00000005.00000002.3421733892.0000000005CA2000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000005.00000002.3418127650.0000000002A36000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000005.00000002.3415809274.0000000000CCF000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000005.00000002.3421733892.0000000005C60000.00000004.00000020.00020000.00000000.sdmpfalse
                                  high
                                  http://nuget.org/NuGet.exepowershell.exe, 00000000.00000002.2218404373.0000023CB9FE4000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2240464969.0000023CC8743000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2240464969.0000023CC84D9000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://www.apache.org/licenses/LICENSE-2.0powershell.exe, 00000000.00000002.2218404373.0000023CB9A6D000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      https://sectigo.com/CPS0RegAsm.exe, 00000005.00000002.3421733892.0000000005CA2000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000005.00000002.3418127650.0000000002A36000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000005.00000002.3415809274.0000000000CCF000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000005.00000002.3421733892.0000000005C60000.00000004.00000020.00020000.00000000.sdmpfalse
                                        high
                                        http://ocsp.sectigo.com0-RegAsm.exe, 00000005.00000002.3421733892.0000000005CA2000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000005.00000002.3418127650.0000000002A36000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000005.00000002.3415809274.0000000000CCF000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000005.00000002.3421733892.0000000005C60000.00000004.00000020.00020000.00000000.sdmpfalse
                                        • Avira URL Cloud: safe
                                        unknown
                                        http://pesterbdd.com/images/Pester.pngpowershell.exe, 00000000.00000002.2218404373.0000023CB9F88000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          https://api.telegram.org/botRegAsm.exe, 00000005.00000002.3418127650.0000000002A36000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://www.apache.org/licenses/LICENSE-2.0.htmlpowershell.exe, 00000000.00000002.2218404373.0000023CB9F88000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://reallyfreegeoip.orgdRegAsm.exe, 00000005.00000002.3418127650.000000000297D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                https://contoso.com/Licensepowershell.exe, 00000000.00000002.2240464969.0000023CC84D9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  https://contoso.com/Iconpowershell.exe, 00000000.00000002.2240464969.0000023CC84D9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    http://checkip.dyndns.orgRegAsm.exe, 00000005.00000002.3418127650.0000000002960000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000005.00000002.3418127650.000000000294E000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000005.00000002.3418127650.0000000002A36000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      http://www.microsoft.RegAsm.exe, 00000005.00000002.3421733892.0000000005C60000.00000004.00000020.00020000.00000000.sdmpfalse
                                                        high
                                                        http://mail.phobinh.com.vnRegAsm.exe, 00000005.00000002.3418127650.0000000002A36000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        • Avira URL Cloud: safe
                                                        unknown
                                                        https://github.com/Pester/Pesterpowershell.exe, 00000000.00000002.2218404373.0000023CB9F88000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          http://crl.mpowershell.exe, 00000000.00000002.2251667720.0000023CD090B000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            high
                                                            https://reallyfreegeoip.org/xml/8.46.123.189lRegAsm.exe, 00000005.00000002.3418127650.0000000002960000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              http://checkip.dyndns.comdRegAsm.exe, 00000005.00000002.3418127650.0000000002960000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                http://checkip.dyndns.org/qx.exe, 00000004.00000002.2228950567.0000000004244000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000005.00000002.3414537023.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                                                                  high
                                                                  http://mail24430.maychuemail.comRegAsm.exe, 00000005.00000002.3418127650.0000000002A36000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                  • Avira URL Cloud: safe
                                                                  unknown
                                                                  https://contoso.com/powershell.exe, 00000000.00000002.2240464969.0000023CC84D9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                    high
                                                                    https://nuget.org/nuget.exepowershell.exe, 00000000.00000002.2218404373.0000023CB9FE4000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2240464969.0000023CC8743000.00000004.00000800.00020000.00000000.sdmp, powershell.exe, 00000000.00000002.2240464969.0000023CC84D9000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                      high
                                                                      https://reallyfreegeoip.org/xml/8.46.123.189dRegAsm.exe, 00000005.00000002.3418127650.0000000002960000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                        high
                                                                        http://reallyfreegeoip.orgRegAsm.exe, 00000005.00000002.3418127650.000000000297D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                          high
                                                                          https://oneget.orgXpowershell.exe, 00000000.00000002.2218404373.0000023CB9A6D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                            high
                                                                            http://checkip.dyndns.orgdRegAsm.exe, 00000005.00000002.3418127650.0000000002960000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                              high
                                                                              https://reallyfreegeoip.orgRegAsm.exe, 00000005.00000002.3418127650.0000000002960000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                high
                                                                                http://mail24430.maychuemail.comdRegAsm.exe, 00000005.00000002.3418127650.0000000002A36000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                • Avira URL Cloud: safe
                                                                                unknown
                                                                                http://mail.phobinh.com.vndRegAsm.exe, 00000005.00000002.3418127650.0000000002A36000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                • Avira URL Cloud: safe
                                                                                unknown
                                                                                https://aka.ms/pscore68powershell.exe, 00000000.00000002.2218404373.0000023CB8461000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                  high
                                                                                  http://checkip.dyndns.comRegAsm.exe, 00000005.00000002.3418127650.0000000002960000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                    high
                                                                                    http://checkip.dyndns.org/dRegAsm.exe, 00000005.00000002.3418127650.0000000002960000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000005.00000002.3418127650.0000000002A36000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                      high
                                                                                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namepowershell.exe, 00000000.00000002.2218404373.0000023CB8461000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000005.00000002.3418127650.00000000028E1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                        high
                                                                                        https://api.telegram.org/bot-/sendDocument?chat_id=x.exe, 00000004.00000002.2228950567.0000000004244000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000005.00000002.3414537023.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                                                                                          high
                                                                                          https://oneget.orgpowershell.exe, 00000000.00000002.2218404373.0000023CB9A6D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                                            high
                                                                                            https://reallyfreegeoip.org/xml/x.exe, 00000004.00000002.2228950567.0000000004244000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000005.00000002.3418127650.0000000002960000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000005.00000002.3414537023.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                                                                                              high
                                                                                              • No. of IPs < 25%
                                                                                              • 25% < No. of IPs < 50%
                                                                                              • 50% < No. of IPs < 75%
                                                                                              • 75% < No. of IPs
                                                                                              IPDomainCountryFlagASNASN NameMalicious
                                                                                              132.226.8.169
                                                                                              checkip.dyndns.comUnited States
                                                                                              16989UTMEMUSfalse
                                                                                              104.21.16.1
                                                                                              reallyfreegeoip.orgUnited States
                                                                                              13335CLOUDFLARENETUSfalse
                                                                                              123.30.244.30
                                                                                              mail24430.maychuemail.comViet Nam
                                                                                              7643VNPT-AS-VNVietnamPostsandTelecommunicationsVNPTVNtrue
                                                                                              Joe Sandbox version:42.0.0 Malachite
                                                                                              Analysis ID:1586898
                                                                                              Start date and time:2025-01-09 18:32:14 +01:00
                                                                                              Joe Sandbox product:CloudBasic
                                                                                              Overall analysis duration:0h 5m 36s
                                                                                              Hypervisor based Inspection enabled:false
                                                                                              Report type:full
                                                                                              Cookbook file name:default.jbs
                                                                                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                                              Number of analysed new started processes analysed:10
                                                                                              Number of new started drivers analysed:0
                                                                                              Number of existing processes analysed:0
                                                                                              Number of existing drivers analysed:0
                                                                                              Number of injected processes analysed:0
                                                                                              Technologies:
                                                                                              • HCA enabled
                                                                                              • EGA enabled
                                                                                              • AMSI enabled
                                                                                              Analysis Mode:default
                                                                                              Analysis stop reason:Timeout
                                                                                              Sample name:jqxrkk.ps1
                                                                                              Detection:MAL
                                                                                              Classification:mal100.spre.troj.spyw.expl.evad.winPS1@6/7@3/3
                                                                                              EGA Information:
                                                                                              • Successful, ratio: 66.7%
                                                                                              HCA Information:
                                                                                              • Successful, ratio: 99%
                                                                                              • Number of executed functions: 58
                                                                                              • Number of non-executed functions: 33
                                                                                              Cookbook Comments:
                                                                                              • Found application associated with file extension: .ps1
                                                                                              • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, backgroundTaskHost.exe
                                                                                              • Excluded IPs from analysis (whitelisted): 13.107.246.45, 20.109.210.53, 4.245.163.56
                                                                                              • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, tile-service.weather.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                                                              • Execution Graph export aborted for target powershell.exe, PID 5088 because it is empty
                                                                                              • Not all processes where analyzed, report is missing behavior information
                                                                                              • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                                              • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                                              • Report size getting too big, too many NtQueryValueKey calls found.
                                                                                              • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                                                              • VT rate limit hit for: jqxrkk.ps1
                                                                                              TimeTypeDescription
                                                                                              12:33:16API Interceptor5x Sleep call for process: powershell.exe modified
                                                                                              12:33:25API Interceptor86x Sleep call for process: RegAsm.exe modified
                                                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                              132.226.8.169Order_List.scr.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                                                                              • checkip.dyndns.org/
                                                                                              fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                              • checkip.dyndns.org/
                                                                                              CTM REQUEST-ETD JAN 22, 2024_pdf.exeGet hashmaliciousMassLogger RATBrowse
                                                                                              • checkip.dyndns.org/
                                                                                              pbCN4g6sN5.exeGet hashmaliciousDarkTortilla, Snake Keylogger, VIP KeyloggerBrowse
                                                                                              • checkip.dyndns.org/
                                                                                              HVSU7GbA5N.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                              • checkip.dyndns.org/
                                                                                              ENQ-0092025.docGet hashmaliciousDBatLoader, PureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                              • checkip.dyndns.org/
                                                                                              document pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                              • checkip.dyndns.org/
                                                                                              ITT # KRPBV2663 .docGet hashmaliciousDBatLoader, PureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                              • checkip.dyndns.org/
                                                                                              kP8EgMorTr.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                              • checkip.dyndns.org/
                                                                                              PO_B2W984.comGet hashmaliciousDBatLoader, MassLogger RAT, PureLog StealerBrowse
                                                                                              • checkip.dyndns.org/
                                                                                              104.21.16.1JNKHlxGvw4.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                                                              • 188387cm.n9shteam.in/videolinePipeHttplowProcessorgamelocalTemp.php
                                                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                              reallyfreegeoip.orgTepe - 20000000826476479.exeGet hashmaliciousMassLogger RATBrowse
                                                                                              • 104.21.16.1
                                                                                              Order_List.scr.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                                                                              • 104.21.64.1
                                                                                              Nuevo pedido.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                              • 104.21.16.1
                                                                                              CTM REQUEST-ETD JAN 22, 2024_pdf.exeGet hashmaliciousMassLogger RATBrowse
                                                                                              • 104.21.96.1
                                                                                              Copy shipping docs PO EV1786 LY ECO PAK EV1.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                              • 104.21.80.1
                                                                                              Payment 01.08.25.pdf.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                              • 104.21.96.1
                                                                                              December Reconciliation QuanKang.exeGet hashmaliciousUnknownBrowse
                                                                                              • 104.21.48.1
                                                                                              JB#40044 Order.exeGet hashmaliciousMassLogger RATBrowse
                                                                                              • 104.21.112.1
                                                                                              PO.exeGet hashmaliciousMassLogger RATBrowse
                                                                                              • 104.21.112.1
                                                                                              BgroUcYHpy.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                              • 188.114.96.3
                                                                                              checkip.dyndns.comTepe - 20000000826476479.exeGet hashmaliciousMassLogger RATBrowse
                                                                                              • 193.122.130.0
                                                                                              Order_List.scr.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                                                                              • 132.226.8.169
                                                                                              Nuevo pedido.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                              • 193.122.130.0
                                                                                              fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                              • 132.226.8.169
                                                                                              CTM REQUEST-ETD JAN 22, 2024_pdf.exeGet hashmaliciousMassLogger RATBrowse
                                                                                              • 132.226.8.169
                                                                                              Copy shipping docs PO EV1786 LY ECO PAK EV1.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                              • 132.226.247.73
                                                                                              Payment 01.08.25.pdf.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                              • 193.122.6.168
                                                                                              December Reconciliation QuanKang.exeGet hashmaliciousUnknownBrowse
                                                                                              • 193.122.6.168
                                                                                              JB#40044 Order.exeGet hashmaliciousMassLogger RATBrowse
                                                                                              • 132.226.247.73
                                                                                              PO.exeGet hashmaliciousMassLogger RATBrowse
                                                                                              • 193.122.6.168
                                                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                              CLOUDFLARENETUS0V2JsCrGUB.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                                                              • 104.21.38.84
                                                                                              https://boutiquedumonde.instawp.xyz/wp-content/themes/twentytwentyfive/envoidoclosa_toutdomaine/wetransfer/index.htmlGet hashmaliciousUnknownBrowse
                                                                                              • 1.1.1.1
                                                                                              drop1.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                                                                              • 172.67.74.152
                                                                                              Fantazy.x86_64.elfGet hashmaliciousUnknownBrowse
                                                                                              • 1.3.115.13
                                                                                              https://sora-ai-download.com/Get hashmaliciousUnknownBrowse
                                                                                              • 104.22.20.144
                                                                                              ReIayMSG__polarisrx.com_#7107380109.htmGet hashmaliciousHTMLPhisherBrowse
                                                                                              • 104.18.11.207
                                                                                              Appraisal-nation-Review_and_Signature_Request46074.pdfGet hashmaliciousUnknownBrowse
                                                                                              • 104.26.5.30
                                                                                              ReIayMSG__polarisrx.com_#6577807268.htmGet hashmaliciousHTMLPhisherBrowse
                                                                                              • 104.17.25.14
                                                                                              Appraisal-nation-Review_and_Signature_Request46074.pdfGet hashmaliciousUnknownBrowse
                                                                                              • 104.17.25.14
                                                                                              QUOTATION#050125.exeGet hashmaliciousFormBookBrowse
                                                                                              • 104.21.32.1
                                                                                              UTMEMUSOrder_List.scr.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                                                                              • 132.226.8.169
                                                                                              fiyati_teklif 615TBI507_ ACCADO san tic_ Sipari#U015fi jpeg docx .exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                              • 132.226.8.169
                                                                                              CTM REQUEST-ETD JAN 22, 2024_pdf.exeGet hashmaliciousMassLogger RATBrowse
                                                                                              • 132.226.8.169
                                                                                              Copy shipping docs PO EV1786 LY ECO PAK EV1.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                              • 132.226.247.73
                                                                                              JB#40044 Order.exeGet hashmaliciousMassLogger RATBrowse
                                                                                              • 132.226.247.73
                                                                                              pbCN4g6sN5.exeGet hashmaliciousDarkTortilla, Snake Keylogger, VIP KeyloggerBrowse
                                                                                              • 132.226.8.169
                                                                                              HVSU7GbA5N.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                              • 132.226.8.169
                                                                                              oagkiAhXgZ.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                              • 132.226.247.73
                                                                                              fatura098002.exeGet hashmaliciousMassLogger RATBrowse
                                                                                              • 132.226.247.73
                                                                                              Mv XIN HAI TONG 21_VESSEL'S_PARTICULARS.pdf.scr.exeGet hashmaliciousMassLogger RATBrowse
                                                                                              • 132.226.247.73
                                                                                              VNPT-AS-VNVietnamPostsandTelecommunicationsVNPTVNtelnet.ppc.elfGet hashmaliciousUnknownBrowse
                                                                                              • 203.162.81.0
                                                                                              SH8ZyOWNi2.exeGet hashmaliciousCMSBruteBrowse
                                                                                              • 222.255.236.245
                                                                                              https://membership.garenaa.id.vn/css/greeting.jsp/index.htmlGet hashmaliciousUnknownBrowse
                                                                                              • 203.162.56.72
                                                                                              http://ff.members.gerane.vn/Get hashmaliciousUnknownBrowse
                                                                                              • 203.162.56.72
                                                                                              http://memberships.garenna.id.vn/css/hitcount.jspGet hashmaliciousUnknownBrowse
                                                                                              • 203.162.56.72
                                                                                              file.exeGet hashmaliciousSystemBCBrowse
                                                                                              • 222.255.235.113
                                                                                              Ng11aTxsp8.exeGet hashmaliciousAsyncRAT, DcRatBrowse
                                                                                              • 123.30.128.169
                                                                                              52fkd1Rd8E.elfGet hashmaliciousMiraiBrowse
                                                                                              • 203.162.81.4
                                                                                              UQqIEFBoFN.elfGet hashmaliciousMiraiBrowse
                                                                                              • 203.162.81.9
                                                                                              DNTT-v3.1.xlsb.xlsxGet hashmaliciousUnknownBrowse
                                                                                              • 222.255.103.91
                                                                                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                              54328bd36c14bd82ddaa0c04b25ed9adTepe - 20000000826476479.exeGet hashmaliciousMassLogger RATBrowse
                                                                                              • 104.21.16.1
                                                                                              Order_List.scr.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                                                                              • 104.21.16.1
                                                                                              Nuevo pedido.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                              • 104.21.16.1
                                                                                              CTM REQUEST-ETD JAN 22, 2024_pdf.exeGet hashmaliciousMassLogger RATBrowse
                                                                                              • 104.21.16.1
                                                                                              Copy shipping docs PO EV1786 LY ECO PAK EV1.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                              • 104.21.16.1
                                                                                              Payment 01.08.25.pdf.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                              • 104.21.16.1
                                                                                              December Reconciliation QuanKang.exeGet hashmaliciousUnknownBrowse
                                                                                              • 104.21.16.1
                                                                                              JB#40044 Order.exeGet hashmaliciousMassLogger RATBrowse
                                                                                              • 104.21.16.1
                                                                                              PO.exeGet hashmaliciousMassLogger RATBrowse
                                                                                              • 104.21.16.1
                                                                                              BgroUcYHpy.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                              • 104.21.16.1
                                                                                              No context
                                                                                              Process:C:\Users\user\AppData\Local\Temp\x.exe
                                                                                              File Type:CSV text
                                                                                              Category:dropped
                                                                                              Size (bytes):226
                                                                                              Entropy (8bit):5.360398796477698
                                                                                              Encrypted:false
                                                                                              SSDEEP:6:Q3La/xw5DLIP12MUAvvR+uTL2ql2ABgTv:Q3La/KDLI4MWuPTAv
                                                                                              MD5:3A8957C6382192B71471BD14359D0B12
                                                                                              SHA1:71B96C965B65A051E7E7D10F61BEBD8CCBB88587
                                                                                              SHA-256:282FBEFDDCFAA0A9DBDEE6E123791FC4B8CB870AE9D450E6394D2ACDA3D8F56D
                                                                                              SHA-512:76C108641F682F785A97017728ED51565C4F74B61B24E190468E3A2843FCC43615C6C8ABE298750AF238D7A44E97C001E3BE427B49900432F905A7CE114AA9AD
                                                                                              Malicious:false
                                                                                              Reputation:high, very likely benign file
                                                                                              Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..
                                                                                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                              File Type:data
                                                                                              Category:dropped
                                                                                              Size (bytes):64
                                                                                              Entropy (8bit):1.1940658735648508
                                                                                              Encrypted:false
                                                                                              SSDEEP:3:NlllulbtI/llh:NllUGt
                                                                                              MD5:A2FA6893E23DC54E7B37910FF7A39E91
                                                                                              SHA1:28B1D6865C49F8F08051DFB8B855177064035480
                                                                                              SHA-256:1B6E4AD9FBE44E46DB569F77AB07069955CAF781A4644F8BB7FBFE9118262AC4
                                                                                              SHA-512:67DE29491B5837B5324D8AD6BA978992FEE7F08B42F37FF61371DD3D50FD792C03B24C6DFA82CAF3BB30ACE4119BA3CB17E9CA2E47F3F1BAFCAE9F57CE4DA6EA
                                                                                              Malicious:false
                                                                                              Reputation:low
                                                                                              Preview:@...e...................................-............@..........
                                                                                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                              File Type:ASCII text, with no line terminators
                                                                                              Category:dropped
                                                                                              Size (bytes):60
                                                                                              Entropy (8bit):4.038920595031593
                                                                                              Encrypted:false
                                                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                              Malicious:false
                                                                                              Reputation:high, very likely benign file
                                                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                              File Type:ASCII text, with no line terminators
                                                                                              Category:dropped
                                                                                              Size (bytes):60
                                                                                              Entropy (8bit):4.038920595031593
                                                                                              Encrypted:false
                                                                                              SSDEEP:3:Si2NPqzAYMLAKVpKGOyzKtFS:SnqbKAKWGX
                                                                                              MD5:D17FE0A3F47BE24A6453E9EF58C94641
                                                                                              SHA1:6AB83620379FC69F80C0242105DDFFD7D98D5D9D
                                                                                              SHA-256:96AD1146EB96877EAB5942AE0736B82D8B5E2039A80D3D6932665C1A4C87DCF7
                                                                                              SHA-512:5B592E58F26C264604F98F6AA12860758CE606D1C63220736CF0C779E4E18E3CEC8706930A16C38B20161754D1017D1657D35258E58CA22B18F5B232880DEC82
                                                                                              Malicious:false
                                                                                              Preview:# PowerShell test file to determine AppLocker lockdown mode
                                                                                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                              File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                              Category:dropped
                                                                                              Size (bytes):139776
                                                                                              Entropy (8bit):7.644817742072604
                                                                                              Encrypted:false
                                                                                              SSDEEP:3072:7tunZcvnVDr29cusZ67AJRDfmeTTlWhgnTf1qfUqnp07Kz7W:7tunZcvnVnB67UfmSimTfoMqnp07Kz
                                                                                              MD5:9FB7455B1C6CB563FF7E58F422F3BC6E
                                                                                              SHA1:B0EAAE8C4727FF2A6F0F288EA56D49E5B700C54A
                                                                                              SHA-256:6E2D33CE0C4A7216F96AB98BCF2DBE18CDBF13A1C9BB011C52767A86858403B3
                                                                                              SHA-512:702D9C99B0D63090531D77F3C6F251EA6D87179AC0616861EA70AB983B0101361C6DD90392B049AC8E4730B9626122380125C4740516C045CE21DB3743D05B18
                                                                                              Malicious:true
                                                                                              Antivirus:
                                                                                              • Antivirus: Avira, Detection: 100%
                                                                                              • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                              Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....w..........."...0..~...........`....... ....@.. ....................................`.....................................W....@...............................................................................`..................H............6Fd:c#.D.... ......................@....text....{.......|.................. ..`.rsrc........@......................@..@.............`...................... ..`.reloc............... ..............@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................
                                                                                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                              File Type:data
                                                                                              Category:dropped
                                                                                              Size (bytes):6224
                                                                                              Entropy (8bit):3.7313500215832454
                                                                                              Encrypted:false
                                                                                              SSDEEP:48:hBD5lBtRb33CywU2URqeukvhkvklCywGlRTWHtlHJySogZoWFRTWHtluySogZoC1:XRD3COTSkvhkvCCti4HtfHZ4HtKH1
                                                                                              MD5:8E4C420BD4519E81B5A5DB2E786FB573
                                                                                              SHA1:B87395D299B54DE461F58781A609CE681BC15E8A
                                                                                              SHA-256:B5C52BE5EACD8D1CA369A046420F620E5D9057B44DF98CD19CE2BEDC788B2246
                                                                                              SHA-512:1ACEDDD6A57CE10969A8D2BDEBA40772CEC0053344B7A359683C341944E738C5F1BA0D1180556CDF887981F60FA1FAC6C2B6489B25A9B30CD0FACC3C013E270B
                                                                                              Malicious:false
                                                                                              Preview:...................................FL..................F.".. ...J.S...:....b..z.:{.............................:..DG..Yr?.D..U..k0.&...&.......$..S...gvJ..b..T....b......t...CFSF..1.....EW<2..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EW<2)Z$............................^.A.p.p.D.a.t.a...B.V.1.....)Z"...Roaming.@......EW<2)Z"...../.......................O.R.o.a.m.i.n.g.....\.1.....EW.3..MICROS~1..D......EW<2)Z......0.....................Q%0.M.i.c.r.o.s.o.f.t.....V.1.....EW.5..Windows.@......EW<2)Z......2......................N>.W.i.n.d.o.w.s.......1.....EW@2..STARTM~1..n......EW<2)Z......5...............D.......Y.S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.......1.....EWz5..Programs..j......EW<2)Z......6...............@.....M.n.P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.....n.1......O.K..WINDOW~1..V......EW<2EW<2....7.....................d...W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....z.2......O.I .WINDOW~1.LNK..^......EW<2)Z&.....u...........
                                                                                              Process:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                              File Type:data
                                                                                              Category:dropped
                                                                                              Size (bytes):6224
                                                                                              Entropy (8bit):3.7313500215832454
                                                                                              Encrypted:false
                                                                                              SSDEEP:48:hBD5lBtRb33CywU2URqeukvhkvklCywGlRTWHtlHJySogZoWFRTWHtluySogZoC1:XRD3COTSkvhkvCCti4HtfHZ4HtKH1
                                                                                              MD5:8E4C420BD4519E81B5A5DB2E786FB573
                                                                                              SHA1:B87395D299B54DE461F58781A609CE681BC15E8A
                                                                                              SHA-256:B5C52BE5EACD8D1CA369A046420F620E5D9057B44DF98CD19CE2BEDC788B2246
                                                                                              SHA-512:1ACEDDD6A57CE10969A8D2BDEBA40772CEC0053344B7A359683C341944E738C5F1BA0D1180556CDF887981F60FA1FAC6C2B6489B25A9B30CD0FACC3C013E270B
                                                                                              Malicious:false
                                                                                              Preview:...................................FL..................F.".. ...J.S...:....b..z.:{.............................:..DG..Yr?.D..U..k0.&...&.......$..S...gvJ..b..T....b......t...CFSF..1.....EW<2..AppData...t.Y^...H.g.3..(.....gVA.G..k...@......EW<2)Z$............................^.A.p.p.D.a.t.a...B.V.1.....)Z"...Roaming.@......EW<2)Z"...../.......................O.R.o.a.m.i.n.g.....\.1.....EW.3..MICROS~1..D......EW<2)Z......0.....................Q%0.M.i.c.r.o.s.o.f.t.....V.1.....EW.5..Windows.@......EW<2)Z......2......................N>.W.i.n.d.o.w.s.......1.....EW@2..STARTM~1..n......EW<2)Z......5...............D.......Y.S.t.a.r.t. .M.e.n.u...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.6.......1.....EWz5..Programs..j......EW<2)Z......6...............@.....M.n.P.r.o.g.r.a.m.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.7.8.2.....n.1......O.K..WINDOW~1..V......EW<2EW<2....7.....................d...W.i.n.d.o.w.s. .P.o.w.e.r.S.h.e.l.l.....z.2......O.I .WINDOW~1.LNK..^......EW<2)Z&.....u...........
                                                                                              File type:ASCII text, with very long lines (65494), with CRLF line terminators
                                                                                              Entropy (8bit):5.916802219473977
                                                                                              TrID:
                                                                                                File name:jqxrkk.ps1
                                                                                                File size:186'488 bytes
                                                                                                MD5:32da6ee3b90b2d2f694b8635dfa58459
                                                                                                SHA1:9272ee959d8290d6f4095fd6525c7927b5c92de0
                                                                                                SHA256:00a6cd51b0d8ca285eea43383a0736a9c4b95ed381fb5607291d08dc9870e30f
                                                                                                SHA512:be827eeb5cb31c5126696577a54d52e26391ec843d36cbab5c369c908eca52115192db73825c0fceefeabe5fe98b823545451cb7b6859998af4325da0cd1c173
                                                                                                SSDEEP:3072:NlbgeXDOEpoKxKjtT0eIfGUQteCmpqLtSX9bun6CPh+G6K45I:/bg6BKdtTfIfGZ4rpGsNbuL+xa
                                                                                                TLSH:A1046B318808B52FCEEF2F8BA4502FC37C79253BDE551019A44F59B96E28639593BF24
                                                                                                File Content Preview:$p=[IO.Path]::Combine($env:TEMP,"x.exe")..[IO.File]::WriteAllBytes($p,[Convert]::FromBase64String("TVqQAAMAAAAEAAAA//8AALgAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAgAAAAA4fug4AtAnNIbgBTM0hVGhpcyBwcm9ncmFtIGNhbm5vdCBiZSBydW4gaW4gRE9TIG1vZGUu
                                                                                                Icon Hash:3270d6baae77db44
                                                                                                TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                                2025-01-09T18:33:19.476114+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.649712132.226.8.16980TCP
                                                                                                2025-01-09T18:33:26.038692+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.649712132.226.8.16980TCP
                                                                                                TimestampSource PortDest PortSource IPDest IP
                                                                                                Jan 9, 2025 18:33:18.324382067 CET4971280192.168.2.6132.226.8.169
                                                                                                Jan 9, 2025 18:33:18.329176903 CET8049712132.226.8.169192.168.2.6
                                                                                                Jan 9, 2025 18:33:18.329369068 CET4971280192.168.2.6132.226.8.169
                                                                                                Jan 9, 2025 18:33:18.329560041 CET4971280192.168.2.6132.226.8.169
                                                                                                Jan 9, 2025 18:33:18.334306002 CET8049712132.226.8.169192.168.2.6
                                                                                                Jan 9, 2025 18:33:19.158149004 CET8049712132.226.8.169192.168.2.6
                                                                                                Jan 9, 2025 18:33:19.162092924 CET4971280192.168.2.6132.226.8.169
                                                                                                Jan 9, 2025 18:33:19.167382956 CET8049712132.226.8.169192.168.2.6
                                                                                                Jan 9, 2025 18:33:19.424876928 CET8049712132.226.8.169192.168.2.6
                                                                                                Jan 9, 2025 18:33:19.450393915 CET49723443192.168.2.6104.21.16.1
                                                                                                Jan 9, 2025 18:33:19.450414896 CET44349723104.21.16.1192.168.2.6
                                                                                                Jan 9, 2025 18:33:19.450658083 CET49723443192.168.2.6104.21.16.1
                                                                                                Jan 9, 2025 18:33:19.459094048 CET49723443192.168.2.6104.21.16.1
                                                                                                Jan 9, 2025 18:33:19.459105015 CET44349723104.21.16.1192.168.2.6
                                                                                                Jan 9, 2025 18:33:19.476114035 CET4971280192.168.2.6132.226.8.169
                                                                                                Jan 9, 2025 18:33:19.951972961 CET44349723104.21.16.1192.168.2.6
                                                                                                Jan 9, 2025 18:33:19.952064037 CET49723443192.168.2.6104.21.16.1
                                                                                                Jan 9, 2025 18:33:19.961374044 CET49723443192.168.2.6104.21.16.1
                                                                                                Jan 9, 2025 18:33:19.961395979 CET44349723104.21.16.1192.168.2.6
                                                                                                Jan 9, 2025 18:33:19.961889029 CET44349723104.21.16.1192.168.2.6
                                                                                                Jan 9, 2025 18:33:20.007194042 CET49723443192.168.2.6104.21.16.1
                                                                                                Jan 9, 2025 18:33:20.064730883 CET49723443192.168.2.6104.21.16.1
                                                                                                Jan 9, 2025 18:33:20.111335039 CET44349723104.21.16.1192.168.2.6
                                                                                                Jan 9, 2025 18:33:20.218558073 CET44349723104.21.16.1192.168.2.6
                                                                                                Jan 9, 2025 18:33:20.218640089 CET44349723104.21.16.1192.168.2.6
                                                                                                Jan 9, 2025 18:33:20.218689919 CET49723443192.168.2.6104.21.16.1
                                                                                                Jan 9, 2025 18:33:20.229182959 CET49723443192.168.2.6104.21.16.1
                                                                                                Jan 9, 2025 18:33:25.397774935 CET4971280192.168.2.6132.226.8.169
                                                                                                Jan 9, 2025 18:33:25.403388977 CET8049712132.226.8.169192.168.2.6
                                                                                                Jan 9, 2025 18:33:25.988481998 CET8049712132.226.8.169192.168.2.6
                                                                                                Jan 9, 2025 18:33:26.038691998 CET4971280192.168.2.6132.226.8.169
                                                                                                Jan 9, 2025 18:33:26.818523884 CET49762587192.168.2.6123.30.244.30
                                                                                                Jan 9, 2025 18:33:26.823400974 CET58749762123.30.244.30192.168.2.6
                                                                                                Jan 9, 2025 18:33:26.823466063 CET49762587192.168.2.6123.30.244.30
                                                                                                Jan 9, 2025 18:33:28.794415951 CET58749762123.30.244.30192.168.2.6
                                                                                                Jan 9, 2025 18:33:28.794665098 CET49762587192.168.2.6123.30.244.30
                                                                                                Jan 9, 2025 18:33:28.799467087 CET58749762123.30.244.30192.168.2.6
                                                                                                Jan 9, 2025 18:33:29.439461946 CET58749762123.30.244.30192.168.2.6
                                                                                                Jan 9, 2025 18:33:29.441792011 CET49762587192.168.2.6123.30.244.30
                                                                                                Jan 9, 2025 18:33:29.446665049 CET58749762123.30.244.30192.168.2.6
                                                                                                Jan 9, 2025 18:33:29.787869930 CET58749762123.30.244.30192.168.2.6
                                                                                                Jan 9, 2025 18:33:29.788453102 CET49762587192.168.2.6123.30.244.30
                                                                                                Jan 9, 2025 18:33:29.793245077 CET58749762123.30.244.30192.168.2.6
                                                                                                Jan 9, 2025 18:33:30.144085884 CET58749762123.30.244.30192.168.2.6
                                                                                                Jan 9, 2025 18:33:30.144098997 CET58749762123.30.244.30192.168.2.6
                                                                                                Jan 9, 2025 18:33:30.144156933 CET49762587192.168.2.6123.30.244.30
                                                                                                Jan 9, 2025 18:33:30.144346952 CET58749762123.30.244.30192.168.2.6
                                                                                                Jan 9, 2025 18:33:30.144367933 CET58749762123.30.244.30192.168.2.6
                                                                                                Jan 9, 2025 18:33:30.144515991 CET58749762123.30.244.30192.168.2.6
                                                                                                Jan 9, 2025 18:33:30.144526005 CET58749762123.30.244.30192.168.2.6
                                                                                                Jan 9, 2025 18:33:30.144541979 CET49762587192.168.2.6123.30.244.30
                                                                                                Jan 9, 2025 18:33:30.144578934 CET49762587192.168.2.6123.30.244.30
                                                                                                Jan 9, 2025 18:33:30.232614040 CET58749762123.30.244.30192.168.2.6
                                                                                                Jan 9, 2025 18:33:30.249856949 CET49762587192.168.2.6123.30.244.30
                                                                                                Jan 9, 2025 18:33:30.254678965 CET58749762123.30.244.30192.168.2.6
                                                                                                Jan 9, 2025 18:33:30.623406887 CET58749762123.30.244.30192.168.2.6
                                                                                                Jan 9, 2025 18:33:30.628904104 CET49762587192.168.2.6123.30.244.30
                                                                                                Jan 9, 2025 18:33:30.633749962 CET58749762123.30.244.30192.168.2.6
                                                                                                Jan 9, 2025 18:33:31.032464981 CET58749762123.30.244.30192.168.2.6
                                                                                                Jan 9, 2025 18:33:31.033575058 CET49762587192.168.2.6123.30.244.30
                                                                                                Jan 9, 2025 18:33:31.038454056 CET58749762123.30.244.30192.168.2.6
                                                                                                Jan 9, 2025 18:33:31.398328066 CET58749762123.30.244.30192.168.2.6
                                                                                                Jan 9, 2025 18:33:31.399862051 CET49762587192.168.2.6123.30.244.30
                                                                                                Jan 9, 2025 18:33:31.404722929 CET58749762123.30.244.30192.168.2.6
                                                                                                Jan 9, 2025 18:33:32.118565083 CET58749762123.30.244.30192.168.2.6
                                                                                                Jan 9, 2025 18:33:32.118905067 CET49762587192.168.2.6123.30.244.30
                                                                                                Jan 9, 2025 18:33:32.125387907 CET58749762123.30.244.30192.168.2.6
                                                                                                Jan 9, 2025 18:33:32.548465967 CET58749762123.30.244.30192.168.2.6
                                                                                                Jan 9, 2025 18:33:32.548751116 CET49762587192.168.2.6123.30.244.30
                                                                                                Jan 9, 2025 18:33:32.553561926 CET58749762123.30.244.30192.168.2.6
                                                                                                Jan 9, 2025 18:33:32.918554068 CET58749762123.30.244.30192.168.2.6
                                                                                                Jan 9, 2025 18:33:32.918768883 CET49762587192.168.2.6123.30.244.30
                                                                                                Jan 9, 2025 18:33:32.923616886 CET58749762123.30.244.30192.168.2.6
                                                                                                Jan 9, 2025 18:33:33.350972891 CET58749762123.30.244.30192.168.2.6
                                                                                                Jan 9, 2025 18:33:33.351803064 CET49762587192.168.2.6123.30.244.30
                                                                                                Jan 9, 2025 18:33:33.351880074 CET49762587192.168.2.6123.30.244.30
                                                                                                Jan 9, 2025 18:33:33.351900101 CET49762587192.168.2.6123.30.244.30
                                                                                                Jan 9, 2025 18:33:33.351959944 CET49762587192.168.2.6123.30.244.30
                                                                                                Jan 9, 2025 18:33:33.356611967 CET58749762123.30.244.30192.168.2.6
                                                                                                Jan 9, 2025 18:33:33.356774092 CET58749762123.30.244.30192.168.2.6
                                                                                                Jan 9, 2025 18:33:33.356894970 CET58749762123.30.244.30192.168.2.6
                                                                                                Jan 9, 2025 18:33:33.356904984 CET58749762123.30.244.30192.168.2.6
                                                                                                Jan 9, 2025 18:33:35.325634003 CET58749762123.30.244.30192.168.2.6
                                                                                                Jan 9, 2025 18:33:35.366621017 CET49762587192.168.2.6123.30.244.30
                                                                                                Jan 9, 2025 18:34:16.085796118 CET4971280192.168.2.6132.226.8.169
                                                                                                Jan 9, 2025 18:34:16.108520985 CET8049712132.226.8.169192.168.2.6
                                                                                                Jan 9, 2025 18:34:16.108592987 CET4971280192.168.2.6132.226.8.169
                                                                                                Jan 9, 2025 18:35:06.101583004 CET49762587192.168.2.6123.30.244.30
                                                                                                Jan 9, 2025 18:35:06.106657982 CET58749762123.30.244.30192.168.2.6
                                                                                                Jan 9, 2025 18:35:06.447840929 CET58749762123.30.244.30192.168.2.6
                                                                                                Jan 9, 2025 18:35:06.447869062 CET58749762123.30.244.30192.168.2.6
                                                                                                Jan 9, 2025 18:35:06.447947025 CET58749762123.30.244.30192.168.2.6
                                                                                                Jan 9, 2025 18:35:06.448003054 CET49762587192.168.2.6123.30.244.30
                                                                                                Jan 9, 2025 18:35:06.448502064 CET49762587192.168.2.6123.30.244.30
                                                                                                TimestampSource PortDest PortSource IPDest IP
                                                                                                Jan 9, 2025 18:33:18.309952974 CET5149753192.168.2.61.1.1.1
                                                                                                Jan 9, 2025 18:33:18.316601992 CET53514971.1.1.1192.168.2.6
                                                                                                Jan 9, 2025 18:33:19.441416979 CET6233853192.168.2.61.1.1.1
                                                                                                Jan 9, 2025 18:33:19.449714899 CET53623381.1.1.1192.168.2.6
                                                                                                Jan 9, 2025 18:33:25.998871088 CET5779353192.168.2.61.1.1.1
                                                                                                Jan 9, 2025 18:33:26.815812111 CET53577931.1.1.1192.168.2.6
                                                                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                                Jan 9, 2025 18:33:18.309952974 CET192.168.2.61.1.1.10x4e1bStandard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                                                                                Jan 9, 2025 18:33:19.441416979 CET192.168.2.61.1.1.10x33f8Standard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                                                                                                Jan 9, 2025 18:33:25.998871088 CET192.168.2.61.1.1.10x368cStandard query (0)mail.phobinh.com.vnA (IP address)IN (0x0001)false
                                                                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                                Jan 9, 2025 18:33:18.316601992 CET1.1.1.1192.168.2.60x4e1bNo error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                                                                                Jan 9, 2025 18:33:18.316601992 CET1.1.1.1192.168.2.60x4e1bNo error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                                                                                Jan 9, 2025 18:33:18.316601992 CET1.1.1.1192.168.2.60x4e1bNo error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                                                                                Jan 9, 2025 18:33:18.316601992 CET1.1.1.1192.168.2.60x4e1bNo error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                                                                                Jan 9, 2025 18:33:18.316601992 CET1.1.1.1192.168.2.60x4e1bNo error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                                                                                Jan 9, 2025 18:33:18.316601992 CET1.1.1.1192.168.2.60x4e1bNo error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                                                                                Jan 9, 2025 18:33:19.449714899 CET1.1.1.1192.168.2.60x33f8No error (0)reallyfreegeoip.org104.21.16.1A (IP address)IN (0x0001)false
                                                                                                Jan 9, 2025 18:33:19.449714899 CET1.1.1.1192.168.2.60x33f8No error (0)reallyfreegeoip.org104.21.112.1A (IP address)IN (0x0001)false
                                                                                                Jan 9, 2025 18:33:19.449714899 CET1.1.1.1192.168.2.60x33f8No error (0)reallyfreegeoip.org104.21.64.1A (IP address)IN (0x0001)false
                                                                                                Jan 9, 2025 18:33:19.449714899 CET1.1.1.1192.168.2.60x33f8No error (0)reallyfreegeoip.org104.21.32.1A (IP address)IN (0x0001)false
                                                                                                Jan 9, 2025 18:33:19.449714899 CET1.1.1.1192.168.2.60x33f8No error (0)reallyfreegeoip.org104.21.80.1A (IP address)IN (0x0001)false
                                                                                                Jan 9, 2025 18:33:19.449714899 CET1.1.1.1192.168.2.60x33f8No error (0)reallyfreegeoip.org104.21.48.1A (IP address)IN (0x0001)false
                                                                                                Jan 9, 2025 18:33:19.449714899 CET1.1.1.1192.168.2.60x33f8No error (0)reallyfreegeoip.org104.21.96.1A (IP address)IN (0x0001)false
                                                                                                Jan 9, 2025 18:33:26.815812111 CET1.1.1.1192.168.2.60x368cNo error (0)mail.phobinh.com.vnmail24430.maychuemail.comCNAME (Canonical name)IN (0x0001)false
                                                                                                Jan 9, 2025 18:33:26.815812111 CET1.1.1.1192.168.2.60x368cNo error (0)mail24430.maychuemail.com123.30.244.30A (IP address)IN (0x0001)false
                                                                                                • reallyfreegeoip.org
                                                                                                • checkip.dyndns.org
                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                0192.168.2.649712132.226.8.169801280C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                TimestampBytes transferredDirectionData
                                                                                                Jan 9, 2025 18:33:18.329560041 CET151OUTGET / HTTP/1.1
                                                                                                User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                Host: checkip.dyndns.org
                                                                                                Connection: Keep-Alive
                                                                                                Jan 9, 2025 18:33:19.158149004 CET273INHTTP/1.1 200 OK
                                                                                                Date: Thu, 09 Jan 2025 17:33:19 GMT
                                                                                                Content-Type: text/html
                                                                                                Content-Length: 104
                                                                                                Connection: keep-alive
                                                                                                Cache-Control: no-cache
                                                                                                Pragma: no-cache
                                                                                                Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                                                                                Jan 9, 2025 18:33:19.162092924 CET127OUTGET / HTTP/1.1
                                                                                                User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                Host: checkip.dyndns.org
                                                                                                Jan 9, 2025 18:33:19.424876928 CET273INHTTP/1.1 200 OK
                                                                                                Date: Thu, 09 Jan 2025 17:33:19 GMT
                                                                                                Content-Type: text/html
                                                                                                Content-Length: 104
                                                                                                Connection: keep-alive
                                                                                                Cache-Control: no-cache
                                                                                                Pragma: no-cache
                                                                                                Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                                                                                Jan 9, 2025 18:33:25.397774935 CET127OUTGET / HTTP/1.1
                                                                                                User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                                Host: checkip.dyndns.org
                                                                                                Jan 9, 2025 18:33:25.988481998 CET273INHTTP/1.1 200 OK
                                                                                                Date: Thu, 09 Jan 2025 17:33:25 GMT
                                                                                                Content-Type: text/html
                                                                                                Content-Length: 104
                                                                                                Connection: keep-alive
                                                                                                Cache-Control: no-cache
                                                                                                Pragma: no-cache
                                                                                                Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                                Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                                0192.168.2.649723104.21.16.14431280C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                TimestampBytes transferredDirectionData
                                                                                                2025-01-09 17:33:20 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                                                Host: reallyfreegeoip.org
                                                                                                Connection: Keep-Alive
                                                                                                2025-01-09 17:33:20 UTC855INHTTP/1.1 200 OK
                                                                                                Date: Thu, 09 Jan 2025 17:33:20 GMT
                                                                                                Content-Type: text/xml
                                                                                                Content-Length: 362
                                                                                                Connection: close
                                                                                                Age: 1758789
                                                                                                Cache-Control: max-age=31536000
                                                                                                cf-cache-status: HIT
                                                                                                last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=tiWHDx6Gg1XV%2BZo6vlqIzK5BybNoq0c1sbh4XqqOjHikIlH%2BTk8FLfScQWCPaLZIghdo9nltCUdVwuDPlSu6Uh%2FlZ66ECar8RyaWxIy6vAtlktH7Hr4yECNzlSv7oyw9g88J21jC"}],"group":"cf-nel","max_age":604800}
                                                                                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                                Server: cloudflare
                                                                                                CF-RAY: 8ff62bf8fbd90fa8-EWR
                                                                                                alt-svc: h3=":443"; ma=86400
                                                                                                server-timing: cfL4;desc="?proto=TCP&rtt=1525&min_rtt=1476&rtt_var=588&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2849&recv_bytes=699&delivery_rate=1978319&cwnd=252&unsent_bytes=0&cid=5d62abb122ff372d&ts=288&x=0"
                                                                                                2025-01-09 17:33:20 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                                Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                                TimestampSource PortDest PortSource IPDest IPCommands
                                                                                                Jan 9, 2025 18:33:28.794415951 CET58749762123.30.244.30192.168.2.6220-500254.static.maychudns.com ESMTP MSA Fri, 10 Jan 2025 00:33:28 +0700
                                                                                                220 ESMTP This server does not relay
                                                                                                Jan 9, 2025 18:33:28.794665098 CET49762587192.168.2.6123.30.244.30EHLO 358075
                                                                                                Jan 9, 2025 18:33:29.439461946 CET58749762123.30.244.30192.168.2.6250-500254.static.maychudns.com Hello 358075 [8.46.123.189], pleased to meet you
                                                                                                250-AUTH LOGIN CRAM-MD5 PLAIN
                                                                                                250-8BITMIME
                                                                                                250-ENHANCEDSTATUSCODES
                                                                                                250-STARTTLS
                                                                                                250 SIZE 35840000
                                                                                                Jan 9, 2025 18:33:29.441792011 CET49762587192.168.2.6123.30.244.30STARTTLS
                                                                                                Jan 9, 2025 18:33:29.787869930 CET58749762123.30.244.30192.168.2.6220 2.7.0 Ready to start TLS

                                                                                                Click to jump to process

                                                                                                Click to jump to process

                                                                                                Click to dive into process behavior distribution

                                                                                                Click to jump to process

                                                                                                Target ID:0
                                                                                                Start time:12:33:10
                                                                                                Start date:09/01/2025
                                                                                                Path:C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                                                                                Wow64 process (32bit):false
                                                                                                Commandline:"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -noLogo -ExecutionPolicy unrestricted -file "C:\Users\user\Desktop\jqxrkk.ps1"
                                                                                                Imagebase:0x7ff6e3d50000
                                                                                                File size:452'608 bytes
                                                                                                MD5 hash:04029E121A0CFA5991749937DD22A1D9
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language
                                                                                                Reputation:high
                                                                                                Has exited:true

                                                                                                Target ID:1
                                                                                                Start time:12:33:10
                                                                                                Start date:09/01/2025
                                                                                                Path:C:\Windows\System32\conhost.exe
                                                                                                Wow64 process (32bit):false
                                                                                                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                                                Imagebase:0x7ff66e660000
                                                                                                File size:862'208 bytes
                                                                                                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language
                                                                                                Reputation:high
                                                                                                Has exited:true

                                                                                                Target ID:4
                                                                                                Start time:12:33:16
                                                                                                Start date:09/01/2025
                                                                                                Path:C:\Users\user\AppData\Local\Temp\x.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:"C:\Users\user\AppData\Local\Temp\x.exe"
                                                                                                Imagebase:0x5e0000
                                                                                                File size:139'776 bytes
                                                                                                MD5 hash:9FB7455B1C6CB563FF7E58F422F3BC6E
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language
                                                                                                Yara matches:
                                                                                                • Rule: JoeSecurity_MassLogger, Description: Yara detected MassLogger RAT, Source: 00000004.00000002.2228950567.0000000004244000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000004.00000002.2228950567.0000000004244000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000004.00000002.2228950567.0000000004244000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000004.00000002.2228950567.0000000004244000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                                                Antivirus matches:
                                                                                                • Detection: 100%, Avira
                                                                                                • Detection: 100%, Joe Sandbox ML
                                                                                                Reputation:low
                                                                                                Has exited:true

                                                                                                Target ID:5
                                                                                                Start time:12:33:17
                                                                                                Start date:09/01/2025
                                                                                                Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                                Wow64 process (32bit):true
                                                                                                Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                                                                Imagebase:0x600000
                                                                                                File size:65'440 bytes
                                                                                                MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                                                                                                Has elevated privileges:true
                                                                                                Has administrator privileges:true
                                                                                                Programmed in:C, C++ or other language
                                                                                                Yara matches:
                                                                                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000005.00000002.3418127650.0000000002A36000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000005.00000002.3418127650.0000000002A36000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                                • Rule: JoeSecurity_MassLogger, Description: Yara detected MassLogger RAT, Source: 00000005.00000002.3414537023.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000005.00000002.3414537023.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000005.00000002.3414537023.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                                • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000005.00000002.3414537023.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                                                Reputation:high
                                                                                                Has exited:false

                                                                                                Reset < >
                                                                                                  Strings
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.2253111435.00007FFD34630000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34630000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_7ffd34630000_powershell.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID: 8+V4
                                                                                                  • API String ID: 0-3986073652
                                                                                                  • Opcode ID: a257e18a44475da7d4f46f5f95a614b06d9aa5e08a39dd035b6a3702828387cf
                                                                                                  • Instruction ID: 83c7c342e96cda67af76d78e6690655d49598126ce87c2800a1f734fe6b61552
                                                                                                  • Opcode Fuzzy Hash: a257e18a44475da7d4f46f5f95a614b06d9aa5e08a39dd035b6a3702828387cf
                                                                                                  • Instruction Fuzzy Hash: 4D821522B0DBDA0FE7969B2858B52B57BE1EF57210B0901FBD189C71E7D91CAC0AC351
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.2253111435.00007FFD34630000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34630000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_7ffd34630000_powershell.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 2ef3998d6546bb2cc503f6365834201f6aa8991bff7be8b89cf449e9f5e7abe3
                                                                                                  • Instruction ID: 38c299a3b4bae4532eb39c9015fa6a28a3cc077845d2efa319d8680c53fdf1ae
                                                                                                  • Opcode Fuzzy Hash: 2ef3998d6546bb2cc503f6365834201f6aa8991bff7be8b89cf449e9f5e7abe3
                                                                                                  • Instruction Fuzzy Hash: B911EB22F1DD664BFFA89A0C64F61F912C1EF95310B540179E58DC25AADE2D6C0562C1
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000000.00000002.2252711623.00007FFD34560000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD34560000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_0_2_7ffd34560000_powershell.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 5e0cd8e44b86cda1606cdcda3d5cd9c82b965f1b77ca43a9ede1ee8a995a9426
                                                                                                  • Instruction ID: fecc489bd3550d2a7b546a14688eb9ef515e6737c63900dbdb0ecb939a2c68aa
                                                                                                  • Opcode Fuzzy Hash: 5e0cd8e44b86cda1606cdcda3d5cd9c82b965f1b77ca43a9ede1ee8a995a9426
                                                                                                  • Instruction Fuzzy Hash: 5001A77020CB0C4FD744EF0CE051AA6B7E0FB95324F10052DE58AC3661D736E882CB41

                                                                                                  Execution Graph

                                                                                                  Execution Coverage:28.1%
                                                                                                  Dynamic/Decrypted Code Coverage:100%
                                                                                                  Signature Coverage:0%
                                                                                                  Total number of Nodes:133
                                                                                                  Total number of Limit Nodes:1
                                                                                                  execution_graph 3312 c270d0 3313 c27128 WriteProcessMemory 3312->3313 3315 c271bf 3313->3315 3316 c27470 3317 c274bd ResumeThread 3316->3317 3318 c27507 3317->3318 3327 c26990 3329 c269e5 Wow64SetThreadContext 3327->3329 3330 c26a5b 3329->3330 3335 c26b20 3336 c26b26 3335->3336 3337 c26b9c ReadProcessMemory 3335->3337 3336->3337 3338 c26bee 3337->3338 3319 c21bd1 3320 c21c25 VirtualProtect 3319->3320 3321 c21c91 3320->3321 3331 c26374 3332 c26411 CreateProcessA 3331->3332 3334 c266b8 3332->3334 3334->3334 3176 c21bd8 3177 c21c25 VirtualProtect 3176->3177 3178 c21c91 3177->3178 3179 c255f8 3180 c2561c 3179->3180 3181 c256f1 3180->3181 3184 c25e78 3180->3184 3204 c26139 3180->3204 3185 c25eb5 3184->3185 3191 c26134 3185->3191 3224 c26278 3185->3224 3228 c26269 3185->3228 3186 c25f14 3232 c26860 3186->3232 3236 c26851 3186->3236 3187 c25fa6 3240 c26aa9 3187->3240 3244 c26ab8 3187->3244 3188 c25ff0 3248 c26c58 3188->3248 3252 c26c50 3188->3252 3189 c260f5 3256 c26e50 3189->3256 3262 c26e40 3189->3262 3190 c2610d 3268 c27221 3190->3268 3276 c27230 3190->3276 3191->3181 3205 c25f02 3204->3205 3211 c26134 3205->3211 3222 c26278 CreateProcessA 3205->3222 3223 c26269 CreateProcessA 3205->3223 3206 c25f14 3216 c26860 Wow64SetThreadContext 3206->3216 3217 c26851 Wow64SetThreadContext 3206->3217 3207 c25fa6 3214 c26ab8 ReadProcessMemory 3207->3214 3215 c26aa9 ReadProcessMemory 3207->3215 3208 c260f5 3212 c26e40 WriteProcessMemory 3208->3212 3213 c26e50 WriteProcessMemory 3208->3213 3209 c2610d 3220 c27230 3 API calls 3209->3220 3221 c27221 3 API calls 3209->3221 3210 c25ff0 3218 c26c50 VirtualAllocEx 3210->3218 3219 c26c58 VirtualAllocEx 3210->3219 3211->3181 3212->3209 3213->3209 3214->3210 3215->3210 3216->3207 3217->3207 3218->3208 3219->3208 3220->3211 3221->3211 3222->3206 3223->3206 3225 c2629c 3224->3225 3284 c257cc 3225->3284 3229 c2629c 3228->3229 3230 c257cc CreateProcessA 3229->3230 3231 c26316 3230->3231 3231->3186 3233 c2687c 3232->3233 3235 c268f8 3233->3235 3288 c257e4 3233->3288 3235->3187 3237 c2687c 3236->3237 3238 c257e4 Wow64SetThreadContext 3237->3238 3239 c268f8 3237->3239 3238->3239 3239->3187 3242 c26ab2 3240->3242 3292 c2580c 3242->3292 3245 c26ad5 3244->3245 3246 c2580c ReadProcessMemory 3245->3246 3247 c26afb 3246->3247 3247->3188 3249 c26c7b 3248->3249 3296 c25824 3249->3296 3253 c26c7b 3252->3253 3254 c25824 VirtualAllocEx 3253->3254 3255 c26cc3 3254->3255 3255->3189 3261 c26e7a 3256->3261 3257 c27024 3258 c2583c WriteProcessMemory 3257->3258 3259 c2705c 3258->3259 3259->3190 3261->3257 3300 c2583c 3261->3300 3267 c26e7a 3262->3267 3263 c27024 3264 c2583c WriteProcessMemory 3263->3264 3265 c2705c 3264->3265 3265->3190 3266 c2583c WriteProcessMemory 3266->3267 3267->3263 3267->3266 3269 c27257 3268->3269 3270 c2583c WriteProcessMemory 3269->3270 3271 c272c3 3270->3271 3274 c27378 3271->3274 3304 c25854 3271->3304 3308 c2586c 3274->3308 3275 c27409 3275->3191 3277 c27257 3276->3277 3278 c2583c WriteProcessMemory 3277->3278 3279 c272c3 3278->3279 3280 c25854 Wow64SetThreadContext 3279->3280 3283 c27378 3279->3283 3280->3283 3281 c2586c ResumeThread 3282 c27409 3281->3282 3282->3191 3283->3281 3285 c26380 CreateProcessA 3284->3285 3287 c266b8 3285->3287 3289 c26998 Wow64SetThreadContext 3288->3289 3291 c26a5b 3289->3291 3291->3235 3293 c26b28 ReadProcessMemory 3292->3293 3295 c26afb 3293->3295 3295->3188 3297 c26d30 VirtualAllocEx 3296->3297 3299 c26cc3 3297->3299 3299->3189 3301 c270d8 WriteProcessMemory 3300->3301 3303 c271bf 3301->3303 3303->3261 3305 c26998 Wow64SetThreadContext 3304->3305 3307 c26a5b 3305->3307 3307->3274 3309 c27478 ResumeThread 3308->3309 3311 c27507 3309->3311 3311->3275 3322 c255e8 3324 c255f8 3322->3324 3323 c256f1 3324->3323 3325 c25e78 7 API calls 3324->3325 3326 c26139 7 API calls 3324->3326 3325->3323 3326->3323 3339 c26d28 3340 c26d2f VirtualAllocEx 3339->3340 3343 c26cec 3339->3343 3342 c26dee 3340->3342

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 321 c257cc-c26423 324 c26485-c264b0 321->324 325 c26425-c26455 321->325 328 c26512-c2656b 324->328 329 c264b2-c264e2 324->329 325->324 332 c26457-c2645c 325->332 336 c265ca-c266b6 CreateProcessA 328->336 337 c2656d-c2659a 328->337 329->328 342 c264e4-c264e9 329->342 334 c2645e-c26468 332->334 335 c2647f-c26482 332->335 339 c2646a 334->339 340 c2646c-c2647b 334->340 335->324 360 c266b8-c266be 336->360 361 c266bf-c26799 336->361 337->336 351 c2659c-c265a1 337->351 339->340 340->340 343 c2647d 340->343 345 c264eb-c264f5 342->345 346 c2650c-c2650f 342->346 343->335 348 c264f7 345->348 349 c264f9-c26508 345->349 346->328 348->349 349->349 352 c2650a 349->352 354 c265a3-c265ad 351->354 355 c265c4-c265c7 351->355 352->346 356 c265b1-c265c0 354->356 357 c265af 354->357 355->336 356->356 359 c265c2 356->359 357->356 359->355 360->361 372 c2679b-c2679f 361->372 373 c267a9-c267ad 361->373 372->373 374 c267a1 372->374 375 c267af-c267b3 373->375 376 c267bd-c267c1 373->376 374->373 375->376 379 c267b5 375->379 377 c267c3-c267c7 376->377 378 c267d1-c267d5 376->378 377->378 380 c267c9 377->380 381 c267d7-c26800 378->381 382 c2680b-c26816 378->382 379->376 380->378 381->382 386 c26817 382->386 386->386
                                                                                                  APIs
                                                                                                  • CreateProcessA.KERNELBASE(?,?,03A1358C,03A13590,00C26316,?,?,?,?,?), ref: 00C266A3
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000004.00000002.2227565057.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_4_2_c20000_x.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CreateProcess
                                                                                                  • String ID:
                                                                                                  • API String ID: 963392458-0
                                                                                                  • Opcode ID: cd0f44a29e79f249d62b65d01268a678823fdc402bbca1c962b7b94545c64aab
                                                                                                  • Instruction ID: f49736b3bf1298d78aa526dc2ad6d7aa9943b0f5b69c9231c4ad71698791be3b
                                                                                                  • Opcode Fuzzy Hash: cd0f44a29e79f249d62b65d01268a678823fdc402bbca1c962b7b94545c64aab
                                                                                                  • Instruction Fuzzy Hash: 37D12770D00229CFDB20CFA8D881BEDBBF1BB49304F1091A9E559A7650DB749E85CF95

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 387 c26374-c26423 389 c26485-c264b0 387->389 390 c26425-c26455 387->390 393 c26512-c2656b 389->393 394 c264b2-c264e2 389->394 390->389 397 c26457-c2645c 390->397 401 c265ca-c266b6 CreateProcessA 393->401 402 c2656d-c2659a 393->402 394->393 407 c264e4-c264e9 394->407 399 c2645e-c26468 397->399 400 c2647f-c26482 397->400 404 c2646a 399->404 405 c2646c-c2647b 399->405 400->389 425 c266b8-c266be 401->425 426 c266bf-c26799 401->426 402->401 416 c2659c-c265a1 402->416 404->405 405->405 408 c2647d 405->408 410 c264eb-c264f5 407->410 411 c2650c-c2650f 407->411 408->400 413 c264f7 410->413 414 c264f9-c26508 410->414 411->393 413->414 414->414 417 c2650a 414->417 419 c265a3-c265ad 416->419 420 c265c4-c265c7 416->420 417->411 421 c265b1-c265c0 419->421 422 c265af 419->422 420->401 421->421 424 c265c2 421->424 422->421 424->420 425->426 437 c2679b-c2679f 426->437 438 c267a9-c267ad 426->438 437->438 439 c267a1 437->439 440 c267af-c267b3 438->440 441 c267bd-c267c1 438->441 439->438 440->441 444 c267b5 440->444 442 c267c3-c267c7 441->442 443 c267d1-c267d5 441->443 442->443 445 c267c9 442->445 446 c267d7-c26800 443->446 447 c2680b-c26816 443->447 444->441 445->443 446->447 451 c26817 447->451 451->451
                                                                                                  APIs
                                                                                                  • CreateProcessA.KERNELBASE(?,?,03A1358C,03A13590,00C26316,?,?,?,?,?), ref: 00C266A3
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000004.00000002.2227565057.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_4_2_c20000_x.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: CreateProcess
                                                                                                  • String ID:
                                                                                                  • API String ID: 963392458-0
                                                                                                  • Opcode ID: 0f38f36289d46d15085f9772eb302d85410e35de52d1d7bce16737f8f8103683
                                                                                                  • Instruction ID: cba3ac5d68e9fd9927b599100d47338e648cb3faaf174aa93090f817bef74519
                                                                                                  • Opcode Fuzzy Hash: 0f38f36289d46d15085f9772eb302d85410e35de52d1d7bce16737f8f8103683
                                                                                                  • Instruction Fuzzy Hash: 17D12770D00229CFDB20CFA8D881BEDBBF1BB49304F1091AAD559A7690DB749E85CF95

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 452 c2583c-c27147 455 c27149-c2715b 452->455 456 c2715e-c271bd WriteProcessMemory 452->456 455->456 457 c271c6-c27210 456->457 458 c271bf-c271c5 456->458 458->457
                                                                                                  APIs
                                                                                                  • WriteProcessMemory.KERNELBASE(?,?,?,?,00000000), ref: 00C271AD
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000004.00000002.2227565057.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_4_2_c20000_x.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: MemoryProcessWrite
                                                                                                  • String ID:
                                                                                                  • API String ID: 3559483778-0
                                                                                                  • Opcode ID: 1d1f12a75138ed2fae918c000df37c6c0ef26d281d801c1d3a4edf93b422fd35
                                                                                                  • Instruction ID: 482f2536a989e6161a6e4922cecc4db50fc40ab43867d917db484d4bbd1c40d4
                                                                                                  • Opcode Fuzzy Hash: 1d1f12a75138ed2fae918c000df37c6c0ef26d281d801c1d3a4edf93b422fd35
                                                                                                  • Instruction Fuzzy Hash: BF4177B5D042589FCF10CFA9D984AAEFBF1BF49310F24902AE818BB210D375A955CB64

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 462 c270d0-c27147 464 c27149-c2715b 462->464 465 c2715e-c271bd WriteProcessMemory 462->465 464->465 466 c271c6-c27210 465->466 467 c271bf-c271c5 465->467 467->466
                                                                                                  APIs
                                                                                                  • WriteProcessMemory.KERNELBASE(?,?,?,?,00000000), ref: 00C271AD
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000004.00000002.2227565057.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_4_2_c20000_x.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: MemoryProcessWrite
                                                                                                  • String ID:
                                                                                                  • API String ID: 3559483778-0
                                                                                                  • Opcode ID: 0ba1ede285417bb9fbc64f2057f24af81ec31d011cd2f90de2ffa3de2aa1a83d
                                                                                                  • Instruction ID: c74ba1dc5a6fb482ce339826d2de107164928685b611e6b6d5358897543a7c9b
                                                                                                  • Opcode Fuzzy Hash: 0ba1ede285417bb9fbc64f2057f24af81ec31d011cd2f90de2ffa3de2aa1a83d
                                                                                                  • Instruction Fuzzy Hash: 334188B5D04258DFCB10CFA9D984AEEBBB1BF49310F24902AE818B7210D375A955CF54

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 471 c26d28-c26d2d 472 c26d2f-c26d70 471->472 473 c26cec-c26d1d 471->473 475 c26d78-c26dec VirtualAllocEx 472->475 476 c26df5-c26e37 475->476 477 c26dee-c26df4 475->477 477->476
                                                                                                  APIs
                                                                                                  • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 00C26DDC
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000004.00000002.2227565057.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_4_2_c20000_x.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: AllocVirtual
                                                                                                  • String ID:
                                                                                                  • API String ID: 4275171209-0
                                                                                                  • Opcode ID: fba93ed1416efd365490f8d20d425d1c21780a8cfe592f6d2997c6fe45c4b8c0
                                                                                                  • Instruction ID: 0183f6205d98606151c0bc66ec3914422c1cac72d5f1641e77991a41507cb44b
                                                                                                  • Opcode Fuzzy Hash: fba93ed1416efd365490f8d20d425d1c21780a8cfe592f6d2997c6fe45c4b8c0
                                                                                                  • Instruction Fuzzy Hash: 1D419AB9D05258DFCF10CFA9E984A9EFBB0FB09310F24911AE818B7250D771A941CF64

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 483 c2580c-c26bec ReadProcessMemory 487 c26bf5-c26c3f 483->487 488 c26bee-c26bf4 483->488 488->487
                                                                                                  APIs
                                                                                                  • ReadProcessMemory.KERNELBASE(00000004,?,00C26AFB,?,?), ref: 00C26BDC
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000004.00000002.2227565057.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_4_2_c20000_x.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: MemoryProcessRead
                                                                                                  • String ID:
                                                                                                  • API String ID: 1726664587-0
                                                                                                  • Opcode ID: fece74d43d9eec592ee7651ad7adf7e09cc76864e552cb1711b0d334fdb4ef44
                                                                                                  • Instruction ID: edb49640a759719474030e8f89a8612a22df69b4070482a45ad2578a01a741ed
                                                                                                  • Opcode Fuzzy Hash: fece74d43d9eec592ee7651ad7adf7e09cc76864e552cb1711b0d334fdb4ef44
                                                                                                  • Instruction Fuzzy Hash: C64177B9D042589FCF10CFA9D984A9EFBF1FB09310F20906AE918B7210D375A945CB64

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 492 c26b20-c26b24 493 c26b26-c26b99 492->493 494 c26b9c-c26bec ReadProcessMemory 492->494 493->494 495 c26bf5-c26c3f 494->495 496 c26bee-c26bf4 494->496 496->495
                                                                                                  APIs
                                                                                                  • ReadProcessMemory.KERNELBASE(00000004,?,00C26AFB,?,?), ref: 00C26BDC
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000004.00000002.2227565057.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_4_2_c20000_x.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: MemoryProcessRead
                                                                                                  • String ID:
                                                                                                  • API String ID: 1726664587-0
                                                                                                  • Opcode ID: 157f92e8213d809969ed1a6710184821a3e59bce1f079e374219a3c989896115
                                                                                                  • Instruction ID: 4aace381132a38f44d17fb4dd11ba598ff9fea2db15455e953037ca7d00c9f0b
                                                                                                  • Opcode Fuzzy Hash: 157f92e8213d809969ed1a6710184821a3e59bce1f079e374219a3c989896115
                                                                                                  • Instruction Fuzzy Hash: D74189B9D01258DFCF10CFA9D984ADEFBB1BB09310F24902AE918B7210D375AA45CF64

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 501 c25824-c26dec VirtualAllocEx 504 c26df5-c26e37 501->504 505 c26dee-c26df4 501->505 505->504
                                                                                                  APIs
                                                                                                  • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 00C26DDC
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000004.00000002.2227565057.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_4_2_c20000_x.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: AllocVirtual
                                                                                                  • String ID:
                                                                                                  • API String ID: 4275171209-0
                                                                                                  • Opcode ID: 1482f4263554606676072e45dd54ee20dbca0ac8d52cd0509b563db3c8d51888
                                                                                                  • Instruction ID: e8393f477ef434c4b408170a6fcfe763507c0e674dd8f9090b3742a12b8ba280
                                                                                                  • Opcode Fuzzy Hash: 1482f4263554606676072e45dd54ee20dbca0ac8d52cd0509b563db3c8d51888
                                                                                                  • Instruction Fuzzy Hash: F94167B9D052589FCF10CFA9D984A9EFBB1BB09310F20902AE918B7210D775A911CB64

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 519 c25854-c269fc 522 c26a13-c26a59 Wow64SetThreadContext 519->522 523 c269fe-c26a10 519->523 524 c26a62-c26aa6 522->524 525 c26a5b-c26a61 522->525 523->522 525->524
                                                                                                  APIs
                                                                                                  • Wow64SetThreadContext.KERNEL32(?,?), ref: 00C26A49
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000004.00000002.2227565057.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_4_2_c20000_x.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ContextThreadWow64
                                                                                                  • String ID:
                                                                                                  • API String ID: 983334009-0
                                                                                                  • Opcode ID: 4babb002cdc05eb330c5e4a79401d399e1570923431de1aa15b00bc361c9d036
                                                                                                  • Instruction ID: c5aad1d047d6596d6753b0680132dec90eb5d8e7d7a90aa8fd78970a399df36a
                                                                                                  • Opcode Fuzzy Hash: 4babb002cdc05eb330c5e4a79401d399e1570923431de1aa15b00bc361c9d036
                                                                                                  • Instruction Fuzzy Hash: D44199B5D01258DFCB10CFAAD984A9EFBF0BB49310F24906AE419B7210D778AA45CF64

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 509 c257e4-c269fc 512 c26a13-c26a59 Wow64SetThreadContext 509->512 513 c269fe-c26a10 509->513 514 c26a62-c26aa6 512->514 515 c26a5b-c26a61 512->515 513->512 515->514
                                                                                                  APIs
                                                                                                  • Wow64SetThreadContext.KERNEL32(?,?), ref: 00C26A49
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000004.00000002.2227565057.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_4_2_c20000_x.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ContextThreadWow64
                                                                                                  • String ID:
                                                                                                  • API String ID: 983334009-0
                                                                                                  • Opcode ID: 8b39b53ad37154ea9a071de9622698a1e23f4ed7617b7414ef188effeb125705
                                                                                                  • Instruction ID: ea533d2c71e311358324d78551456f0e030582f15f52b4f8391d46593d825685
                                                                                                  • Opcode Fuzzy Hash: 8b39b53ad37154ea9a071de9622698a1e23f4ed7617b7414ef188effeb125705
                                                                                                  • Instruction Fuzzy Hash: D9419AB5D01258DFCF10CFAAD984AAEFBF0BB49310F20906AE419B7250D774A945CF64

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 529 c21bd1-c21c8f VirtualProtect 531 c21c91-c21c97 529->531 532 c21c98-c21cd4 529->532 531->532
                                                                                                  APIs
                                                                                                  • VirtualProtect.KERNELBASE(?,?,?,?), ref: 00C21C7F
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000004.00000002.2227565057.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_4_2_c20000_x.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ProtectVirtual
                                                                                                  • String ID:
                                                                                                  • API String ID: 544645111-0
                                                                                                  • Opcode ID: ce8b3f5fad86fa533e1ae34d64a0ecffaf971a88eafaebad71faa57e364172b6
                                                                                                  • Instruction ID: 9a16c208b2b5c616367a66ccd64f33fa35870b790b15fc889198ac717b968515
                                                                                                  • Opcode Fuzzy Hash: ce8b3f5fad86fa533e1ae34d64a0ecffaf971a88eafaebad71faa57e364172b6
                                                                                                  • Instruction Fuzzy Hash: 2A3189B9D042589FCB10CFA9E584ADEFBB1BB19310F24906AE814B7210D774AA45CF64

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 535 c21bd8-c21c8f VirtualProtect 537 c21c91-c21c97 535->537 538 c21c98-c21cd4 535->538 537->538
                                                                                                  APIs
                                                                                                  • VirtualProtect.KERNELBASE(?,?,?,?), ref: 00C21C7F
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000004.00000002.2227565057.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_4_2_c20000_x.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ProtectVirtual
                                                                                                  • String ID:
                                                                                                  • API String ID: 544645111-0
                                                                                                  • Opcode ID: deb41db035b5a216441f01454794157a5340dec8b1f3fed560213306a231dd3e
                                                                                                  • Instruction ID: 62deb892985abc63044cc724d73d7ede311889567440eb584f5627dac399819a
                                                                                                  • Opcode Fuzzy Hash: deb41db035b5a216441f01454794157a5340dec8b1f3fed560213306a231dd3e
                                                                                                  • Instruction Fuzzy Hash: 913178B9D042589FCB10CFA9E584ADEFBF1BB59310F24902AE814B7210D775A945CF64

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 541 c26990-c269fc 543 c26a13-c26a59 Wow64SetThreadContext 541->543 544 c269fe-c26a10 541->544 545 c26a62-c26aa6 543->545 546 c26a5b-c26a61 543->546 544->543 546->545
                                                                                                  APIs
                                                                                                  • Wow64SetThreadContext.KERNEL32(?,?), ref: 00C26A49
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000004.00000002.2227565057.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_4_2_c20000_x.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ContextThreadWow64
                                                                                                  • String ID:
                                                                                                  • API String ID: 983334009-0
                                                                                                  • Opcode ID: 9ccc529d33fc2416bc496a716974f26691ef8afdd48cbf17cc6e108965b8fa91
                                                                                                  • Instruction ID: 9f053eafb74f5ed21c7b4b19e9f82e46f045bc5806c20274baaa87bc8114ee6d
                                                                                                  • Opcode Fuzzy Hash: 9ccc529d33fc2416bc496a716974f26691ef8afdd48cbf17cc6e108965b8fa91
                                                                                                  • Instruction Fuzzy Hash: 454196B5D01259DFCF10CFAAD984A9EFBF0BB49314F24802AE418B7250D378AA45CF64

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 550 c2586c-c27505 ResumeThread 553 c27507-c2750d 550->553 554 c2750e-c27548 550->554 553->554
                                                                                                  APIs
                                                                                                  • ResumeThread.KERNELBASE(00000000), ref: 00C274F5
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000004.00000002.2227565057.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_4_2_c20000_x.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ResumeThread
                                                                                                  • String ID:
                                                                                                  • API String ID: 947044025-0
                                                                                                  • Opcode ID: f6c454cbb0859c800dbfb8f1c4513d031084016f45bde59584728be8597a1f51
                                                                                                  • Instruction ID: 18d42cc51886658b2a4c1140817c57aa53463438147f26930ce68d02a04c62fa
                                                                                                  • Opcode Fuzzy Hash: f6c454cbb0859c800dbfb8f1c4513d031084016f45bde59584728be8597a1f51
                                                                                                  • Instruction Fuzzy Hash: 183199B5D052589FCB10DFA9E984A9EFBF4AB49310F20916AE914B7310D774A901CFA4

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 558 c27470-c27505 ResumeThread 560 c27507-c2750d 558->560 561 c2750e-c27548 558->561 560->561
                                                                                                  APIs
                                                                                                  • ResumeThread.KERNELBASE(00000000), ref: 00C274F5
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000004.00000002.2227565057.0000000000C20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00C20000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_4_2_c20000_x.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: ResumeThread
                                                                                                  • String ID:
                                                                                                  • API String ID: 947044025-0
                                                                                                  • Opcode ID: 07a3a5fef55b0a8ea96a92e0d86856f3f9b474cc2917364576dd1f0b80b21bf0
                                                                                                  • Instruction ID: e8d70327cf9107ed3ba58b26a5123f219164a60358e0b84a506b83704c5f1cfe
                                                                                                  • Opcode Fuzzy Hash: 07a3a5fef55b0a8ea96a92e0d86856f3f9b474cc2917364576dd1f0b80b21bf0
                                                                                                  • Instruction Fuzzy Hash: 193198B5D05259DFCB10CFA9E984A9EFBF0BB49310F24906AE818B7710D774A901CF64

                                                                                                  Execution Graph

                                                                                                  Execution Coverage:16.8%
                                                                                                  Dynamic/Decrypted Code Coverage:100%
                                                                                                  Signature Coverage:5.2%
                                                                                                  Total number of Nodes:192
                                                                                                  Total number of Limit Nodes:4
                                                                                                  execution_graph 19507 f0cab0 19508 f0cadd 19507->19508 19510 f0e9bf 19508->19510 19512 f0cde6 19508->19512 19513 f0c168 19508->19513 19511 f0c168 LdrInitializeThunk 19511->19512 19512->19510 19512->19511 19514 f0c17f 19513->19514 19515 f0c17a 19513->19515 19514->19512 19514->19515 19516 f0c8a9 LdrInitializeThunk 19514->19516 19515->19512 19516->19515 19517 f046d8 19518 f046e4 19517->19518 19521 f048c9 19518->19521 19519 f04713 19522 f048e4 19521->19522 19553 f04eb1 19522->19553 19559 f04e71 19522->19559 19565 f04e75 19522->19565 19571 f04e8d 19522->19571 19577 f04e89 19522->19577 19583 f04f08 19522->19583 19589 f04e85 19522->19589 19595 f04ec5 19522->19595 19601 f04e81 19522->19601 19607 f04ec1 19522->19607 19613 f04e9d 19522->19613 19619 f04e99 19522->19619 19625 f04ebd 19522->19625 19631 f04e91 19522->19631 19637 f04e6d 19522->19637 19643 f04ead 19522->19643 19649 f04e69 19522->19649 19655 f04ea9 19522->19655 19661 f04ea5 19522->19661 19667 f04ea1 19522->19667 19673 f04e95 19522->19673 19679 f04e7d 19522->19679 19685 f04e79 19522->19685 19691 f04eb9 19522->19691 19697 f04ef8 19522->19697 19703 f04eb5 19522->19703 19523 f048f0 19709 5eb15f8 19523->19709 19715 5eb15eb 19523->19715 19524 f0491a 19524->19519 19554 f04ec4 19553->19554 19555 f04ff6 19554->19555 19556 f0c168 LdrInitializeThunk 19554->19556 19721 f0c76c 19554->19721 19727 f0c158 19554->19727 19555->19523 19556->19555 19560 f04ec4 19559->19560 19561 f04ff6 19560->19561 19562 f0c168 LdrInitializeThunk 19560->19562 19563 f0c158 2 API calls 19560->19563 19564 f0c76c 2 API calls 19560->19564 19561->19523 19562->19561 19563->19561 19564->19561 19566 f04ec4 19565->19566 19567 f04ff6 19566->19567 19568 f0c168 LdrInitializeThunk 19566->19568 19569 f0c158 2 API calls 19566->19569 19570 f0c76c 2 API calls 19566->19570 19567->19523 19568->19567 19569->19567 19570->19567 19573 f04ec4 19571->19573 19572 f04ff6 19572->19523 19573->19572 19574 f0c168 LdrInitializeThunk 19573->19574 19575 f0c158 2 API calls 19573->19575 19576 f0c76c 2 API calls 19573->19576 19574->19572 19575->19572 19576->19572 19578 f04ec4 19577->19578 19579 f04ff6 19578->19579 19580 f0c168 LdrInitializeThunk 19578->19580 19581 f0c158 2 API calls 19578->19581 19582 f0c76c 2 API calls 19578->19582 19579->19523 19580->19579 19581->19579 19582->19579 19584 f04f0a 19583->19584 19585 f04ff6 19584->19585 19586 f0c168 LdrInitializeThunk 19584->19586 19587 f0c158 2 API calls 19584->19587 19588 f0c76c 2 API calls 19584->19588 19585->19523 19586->19585 19587->19585 19588->19585 19594 f04ec4 19589->19594 19590 f04ff6 19590->19523 19591 f0c168 LdrInitializeThunk 19591->19590 19592 f0c158 2 API calls 19592->19590 19593 f0c76c 2 API calls 19593->19590 19594->19590 19594->19591 19594->19592 19594->19593 19596 f04ec4 19595->19596 19597 f04ff6 19596->19597 19598 f0c168 LdrInitializeThunk 19596->19598 19599 f0c158 2 API calls 19596->19599 19600 f0c76c 2 API calls 19596->19600 19597->19523 19598->19597 19599->19597 19600->19597 19602 f04ec4 19601->19602 19603 f04ff6 19602->19603 19604 f0c168 LdrInitializeThunk 19602->19604 19605 f0c158 2 API calls 19602->19605 19606 f0c76c 2 API calls 19602->19606 19603->19523 19604->19603 19605->19603 19606->19603 19609 f04ec4 19607->19609 19608 f04ff6 19608->19523 19609->19608 19610 f0c168 LdrInitializeThunk 19609->19610 19611 f0c158 2 API calls 19609->19611 19612 f0c76c 2 API calls 19609->19612 19610->19608 19611->19608 19612->19608 19615 f04ec4 19613->19615 19614 f04ff6 19614->19523 19615->19614 19616 f0c168 LdrInitializeThunk 19615->19616 19617 f0c158 2 API calls 19615->19617 19618 f0c76c 2 API calls 19615->19618 19616->19614 19617->19614 19618->19614 19620 f04ec4 19619->19620 19621 f04ff6 19620->19621 19622 f0c168 LdrInitializeThunk 19620->19622 19623 f0c158 2 API calls 19620->19623 19624 f0c76c 2 API calls 19620->19624 19621->19523 19622->19621 19623->19621 19624->19621 19630 f04ec4 19625->19630 19626 f04ff6 19626->19523 19627 f0c168 LdrInitializeThunk 19627->19626 19628 f0c158 2 API calls 19628->19626 19629 f0c76c 2 API calls 19629->19626 19630->19626 19630->19627 19630->19628 19630->19629 19636 f04ec4 19631->19636 19632 f04ff6 19632->19523 19633 f0c168 LdrInitializeThunk 19633->19632 19634 f0c158 2 API calls 19634->19632 19635 f0c76c 2 API calls 19635->19632 19636->19632 19636->19633 19636->19634 19636->19635 19638 f04ec4 19637->19638 19639 f04ff6 19638->19639 19640 f0c168 LdrInitializeThunk 19638->19640 19641 f0c158 2 API calls 19638->19641 19642 f0c76c 2 API calls 19638->19642 19639->19523 19640->19639 19641->19639 19642->19639 19644 f04ec4 19643->19644 19645 f04ff6 19644->19645 19646 f0c168 LdrInitializeThunk 19644->19646 19647 f0c158 2 API calls 19644->19647 19648 f0c76c 2 API calls 19644->19648 19645->19523 19646->19645 19647->19645 19648->19645 19650 f04ec4 19649->19650 19651 f04ff6 19650->19651 19652 f0c168 LdrInitializeThunk 19650->19652 19653 f0c158 2 API calls 19650->19653 19654 f0c76c 2 API calls 19650->19654 19651->19523 19652->19651 19653->19651 19654->19651 19656 f04ec4 19655->19656 19657 f04ff6 19656->19657 19658 f0c168 LdrInitializeThunk 19656->19658 19659 f0c158 2 API calls 19656->19659 19660 f0c76c 2 API calls 19656->19660 19657->19523 19658->19657 19659->19657 19660->19657 19662 f04ec4 19661->19662 19663 f04ff6 19662->19663 19664 f0c168 LdrInitializeThunk 19662->19664 19665 f0c158 2 API calls 19662->19665 19666 f0c76c 2 API calls 19662->19666 19663->19523 19664->19663 19665->19663 19666->19663 19668 f04ec4 19667->19668 19669 f04ff6 19668->19669 19670 f0c168 LdrInitializeThunk 19668->19670 19671 f0c158 2 API calls 19668->19671 19672 f0c76c 2 API calls 19668->19672 19669->19523 19670->19669 19671->19669 19672->19669 19674 f04ec4 19673->19674 19675 f04ff6 19674->19675 19676 f0c168 LdrInitializeThunk 19674->19676 19677 f0c158 2 API calls 19674->19677 19678 f0c76c 2 API calls 19674->19678 19675->19523 19676->19675 19677->19675 19678->19675 19680 f04ec4 19679->19680 19681 f04ff6 19680->19681 19682 f0c168 LdrInitializeThunk 19680->19682 19683 f0c158 2 API calls 19680->19683 19684 f0c76c 2 API calls 19680->19684 19681->19523 19682->19681 19683->19681 19684->19681 19686 f04ec4 19685->19686 19687 f04ff6 19686->19687 19688 f0c168 LdrInitializeThunk 19686->19688 19689 f0c158 2 API calls 19686->19689 19690 f0c76c 2 API calls 19686->19690 19687->19523 19688->19687 19689->19687 19690->19687 19692 f04ec4 19691->19692 19693 f04ff6 19692->19693 19694 f0c168 LdrInitializeThunk 19692->19694 19695 f0c158 2 API calls 19692->19695 19696 f0c76c 2 API calls 19692->19696 19693->19523 19694->19693 19695->19693 19696->19693 19698 f04ec4 19697->19698 19698->19697 19699 f04ff6 19698->19699 19700 f0c168 LdrInitializeThunk 19698->19700 19701 f0c158 2 API calls 19698->19701 19702 f0c76c 2 API calls 19698->19702 19699->19523 19700->19699 19701->19699 19702->19699 19704 f04ec4 19703->19704 19705 f04ff6 19704->19705 19706 f0c168 LdrInitializeThunk 19704->19706 19707 f0c158 2 API calls 19704->19707 19708 f0c76c 2 API calls 19704->19708 19705->19523 19706->19705 19707->19705 19708->19705 19710 5eb161a 19709->19710 19711 5eb172c 19710->19711 19712 f0c168 LdrInitializeThunk 19710->19712 19713 f0c158 2 API calls 19710->19713 19714 f0c76c 2 API calls 19710->19714 19711->19524 19712->19711 19713->19711 19714->19711 19716 5eb161a 19715->19716 19717 5eb172c 19716->19717 19718 f0c168 LdrInitializeThunk 19716->19718 19719 f0c158 2 API calls 19716->19719 19720 f0c76c 2 API calls 19716->19720 19717->19524 19718->19717 19719->19717 19720->19717 19722 f0c623 19721->19722 19723 f0c764 LdrInitializeThunk 19722->19723 19726 f0c168 LdrInitializeThunk 19722->19726 19725 f0c8c1 19723->19725 19725->19555 19726->19722 19729 f0c164 19727->19729 19728 f0c17a 19728->19555 19729->19555 19729->19728 19730 f0c764 LdrInitializeThunk 19729->19730 19732 f0c168 LdrInitializeThunk 19729->19732 19730->19728 19732->19729

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 978 f0c168-f0c178 979 f0c17a 978->979 980 f0c17f-f0c18b 978->980 981 f0c2ab-f0c2b5 979->981 983 f0c192-f0c1a7 980->983 984 f0c18d 980->984 987 f0c2bb-f0c2fb call f05d08 983->987 988 f0c1ad-f0c1b8 983->988 984->981 1004 f0c302-f0c378 call f05d08 call f05c00 987->1004 991 f0c2b6 988->991 992 f0c1be-f0c1c5 988->992 991->987 994 f0c1f2-f0c1fd 992->994 995 f0c1c7-f0c1de 992->995 999 f0c20a-f0c214 994->999 1000 f0c1ff-f0c207 994->1000 995->1004 1005 f0c1e4-f0c1e7 995->1005 1010 f0c21a-f0c224 999->1010 1011 f0c29e-f0c2a3 999->1011 1000->999 1039 f0c37a 1004->1039 1040 f0c3df-f0c454 call f05ca8 1004->1040 1005->991 1009 f0c1ed-f0c1f0 1005->1009 1009->994 1009->995 1010->991 1015 f0c22a-f0c246 1010->1015 1011->981 1021 f0c248 1015->1021 1022 f0c24a-f0c24d 1015->1022 1021->981 1024 f0c254-f0c257 1022->1024 1025 f0c24f-f0c252 1022->1025 1027 f0c25a-f0c268 1024->1027 1025->1027 1027->991 1032 f0c26a-f0c271 1027->1032 1032->981 1033 f0c273-f0c279 1032->1033 1033->991 1035 f0c27b-f0c280 1033->1035 1035->991 1036 f0c282-f0c295 1035->1036 1036->991 1041 f0c297-f0c29a 1036->1041 1043 f0c380-f0c383 1039->1043 1044 f0c37c-f0c37e 1039->1044 1048 f0c4f3-f0c4f9 1040->1048 1041->1033 1045 f0c29c 1041->1045 1047 f0c384-f0c386 1043->1047 1044->1043 1044->1047 1045->981 1049 f0c388-f0c389 1047->1049 1050 f0c38a-f0c3b7 1047->1050 1053 f0c459-f0c46c 1048->1053 1054 f0c4ff-f0c517 1048->1054 1049->1050 1051 f0c3b9 1050->1051 1052 f0c3be-f0c3dc 1050->1052 1051->1052 1052->1040 1055 f0c473-f0c4c4 1053->1055 1056 f0c46e 1053->1056 1057 f0c519-f0c526 1054->1057 1058 f0c52b-f0c53e 1054->1058 1075 f0c4c6-f0c4d4 1055->1075 1076 f0c4d7-f0c4e9 1055->1076 1056->1055 1059 f0c8c1-f0c9bf 1057->1059 1060 f0c540 1058->1060 1061 f0c545-f0c561 1058->1061 1066 f0c9c1-f0c9c6 call f05ca8 1059->1066 1067 f0c9c7-f0c9d1 1059->1067 1060->1061 1063 f0c563 1061->1063 1064 f0c568-f0c58c 1061->1064 1063->1064 1071 f0c593-f0c5c5 1064->1071 1072 f0c58e 1064->1072 1066->1067 1081 f0c5c7 1071->1081 1082 f0c5cc-f0c60e 1071->1082 1072->1071 1075->1054 1078 f0c4f0 1076->1078 1079 f0c4eb 1076->1079 1078->1048 1079->1078 1081->1082 1084 f0c610 1082->1084 1085 f0c615-f0c61e 1082->1085 1084->1085 1086 f0c846-f0c84c 1085->1086 1087 f0c852-f0c865 1086->1087 1088 f0c623-f0c648 1086->1088 1091 f0c867 1087->1091 1092 f0c86c-f0c887 1087->1092 1089 f0c64a 1088->1089 1090 f0c64f-f0c686 1088->1090 1089->1090 1100 f0c688 1090->1100 1101 f0c68d-f0c6bf 1090->1101 1091->1092 1093 f0c889 1092->1093 1094 f0c88e-f0c8a2 1092->1094 1093->1094 1098 f0c8a4 1094->1098 1099 f0c8a9-f0c8bf LdrInitializeThunk 1094->1099 1098->1099 1099->1059 1100->1101 1103 f0c6c1-f0c6e6 1101->1103 1104 f0c723-f0c736 1101->1104 1107 f0c6e8 1103->1107 1108 f0c6ed-f0c71b 1103->1108 1105 f0c738 1104->1105 1106 f0c73d-f0c762 1104->1106 1105->1106 1111 f0c771-f0c7a9 1106->1111 1112 f0c764-f0c765 1106->1112 1107->1108 1108->1104 1113 f0c7b0-f0c811 call f0c168 1111->1113 1114 f0c7ab 1111->1114 1112->1087 1120 f0c813 1113->1120 1121 f0c818-f0c83c 1113->1121 1114->1113 1120->1121 1124 f0c843 1121->1124 1125 f0c83e 1121->1125 1124->1086 1125->1124
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.3416786849.0000000000F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F00000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_f00000_RegAsm.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 5376da02d70e54bed306fd03081ad2076da7140591eb01c696919993afc9eb4d
                                                                                                  • Instruction ID: bf466193418c8b463c96cf21a07123ed30954bcfc9d1006868525d71def5cb59
                                                                                                  • Opcode Fuzzy Hash: 5376da02d70e54bed306fd03081ad2076da7140591eb01c696919993afc9eb4d
                                                                                                  • Instruction Fuzzy Hash: 95221B74E00219CFDB14DFA8C884B9DBBB2BF84300F5486A9D409A7395DB759D86DF90
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.3422355900.0000000005EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EB0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_5eb0000_RegAsm.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 4e0ab7638a9191fec4dfb9266d86e552ebc31c46906b7996c70ffd36abb389bc
                                                                                                  • Instruction ID: fe3182ac83d0c35665551f77c3e7c71b1d4874967de3c042ae14923340a8f596
                                                                                                  • Opcode Fuzzy Hash: 4e0ab7638a9191fec4dfb9266d86e552ebc31c46906b7996c70ffd36abb389bc
                                                                                                  • Instruction Fuzzy Hash: 66826930A04605DFEB14CF68C884AEEBBF6FF88315F149559E486AB761D7B0E941CB90

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 2321 5eb4500-5eb4520 2322 5eb4522 2321->2322 2323 5eb4527-5eb45a0 2321->2323 2322->2323 2327 5eb45ee-5eb4641 2323->2327 2328 5eb45a2-5eb45e9 2323->2328 2335 5eb4689-5eb4743 call 5eb5858 2327->2335 2336 5eb4643-5eb4688 2327->2336 2328->2335 2346 5eb4749-5eb476f 2335->2346 2336->2335 2348 5eb5330-5eb5365 2346->2348 2349 5eb4775-5eb4878 2346->2349 2359 5eb5323-5eb5329 2349->2359 2360 5eb532f 2359->2360 2361 5eb487d-5eb495b 2359->2361 2360->2348 2369 5eb495d 2361->2369 2370 5eb4962-5eb49cb 2361->2370 2369->2370 2374 5eb49cd 2370->2374 2375 5eb49d2-5eb49e3 2370->2375 2374->2375 2376 5eb49e9-5eb49f3 2375->2376 2377 5eb4a70-5eb4b77 2375->2377 2378 5eb49fa-5eb4a6f 2376->2378 2379 5eb49f5 2376->2379 2395 5eb4b79 2377->2395 2396 5eb4b7e-5eb4be7 2377->2396 2378->2377 2379->2378 2395->2396 2400 5eb4be9 2396->2400 2401 5eb4bee-5eb4bff 2396->2401 2400->2401 2402 5eb4c8c-5eb4e40 2401->2402 2403 5eb4c05-5eb4c0f 2401->2403 2424 5eb4e42 2402->2424 2425 5eb4e47-5eb4ec5 2402->2425 2404 5eb4c11 2403->2404 2405 5eb4c16-5eb4c8b 2403->2405 2404->2405 2405->2402 2424->2425 2429 5eb4ecc-5eb4edd 2425->2429 2430 5eb4ec7 2425->2430 2431 5eb4f6a-5eb5003 2429->2431 2432 5eb4ee3-5eb4eed 2429->2432 2430->2429 2443 5eb500a-5eb5082 2431->2443 2444 5eb5005 2431->2444 2433 5eb4eef 2432->2433 2434 5eb4ef4-5eb4f69 2432->2434 2433->2434 2434->2431 2450 5eb5089-5eb509a 2443->2450 2451 5eb5084 2443->2451 2444->2443 2452 5eb5188-5eb521c call 5eb2a50 * 2 2450->2452 2453 5eb50a0-5eb5134 2450->2453 2451->2450 2464 5eb530e-5eb5319 2452->2464 2465 5eb5222-5eb530d 2452->2465 2469 5eb513b-5eb5187 2453->2469 2470 5eb5136 2453->2470 2467 5eb531b 2464->2467 2468 5eb5320 2464->2468 2465->2464 2467->2468 2468->2359 2469->2452 2470->2469
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.3422355900.0000000005EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EB0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_5eb0000_RegAsm.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: d5d45278cd8a120840470af0bcbcdb71dc4c8aec44c2b498fcedc69bf574e93d
                                                                                                  • Instruction ID: 3307d9f01a79c46bf800f8572250133da223c1077feddf7c4b9c404d553261be
                                                                                                  • Opcode Fuzzy Hash: d5d45278cd8a120840470af0bcbcdb71dc4c8aec44c2b498fcedc69bf574e93d
                                                                                                  • Instruction Fuzzy Hash: 5A827D74E012289FEB65DF69D894BDDBBF2BB89300F1081EA950DA7265DB705E81CF40

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 2486 5eb6998-5eb69a4 2487 5eb69c6-5eb69c8 2486->2487 2488 5eb69a6-5eb69b2 2486->2488 2489 5eb69fa 2487->2489 2490 5eb69ca-5eb69d1 2487->2490 2494 5eb69c2-5eb69c4 2488->2494 2495 5eb69b4-5eb69c0 2488->2495 2492 5eb69ff-5eb6a03 2489->2492 2490->2489 2491 5eb69d3-5eb69eb 2490->2491 2499 5eb69ed-5eb69ef 2491->2499 2500 5eb69f1-5eb69f4 2491->2500 2494->2492 2495->2487 2495->2494 2499->2492 2501 5eb69f6-5eb69f8 2500->2501 2502 5eb6a04-5eb6a56 2500->2502 2501->2489 2501->2491 2504 5eb702d-5eb7046 2502->2504 2505 5eb6a5c-5eb6a6a 2502->2505 2508 5eb6a98-5eb6aa9 2505->2508 2509 5eb6a6c-5eb6a7d 2505->2509 2510 5eb6aab-5eb6aaf 2508->2510 2511 5eb6b1a-5eb6b3d call 5eb704d 2508->2511 2509->2508 2515 5eb6a7f-5eb6a8b 2509->2515 2513 5eb6aca-5eb6ad3 2510->2513 2514 5eb6ab1-5eb6abd 2510->2514 2523 5eb6b3f-5eb6b41 2511->2523 2524 5eb6b46-5eb6b4d 2511->2524 2519 5eb6ad9-5eb6adc 2513->2519 2520 5eb6de8 2513->2520 2517 5eb6ac3-5eb6ac5 2514->2517 2518 5eb6e57-5eb6ea2 2514->2518 2521 5eb6ded-5eb6e50 2515->2521 2522 5eb6a91-5eb6a93 2515->2522 2525 5eb6dde-5eb6de5 2517->2525 2574 5eb6ea9-5eb6f28 2518->2574 2519->2520 2526 5eb6ae2-5eb6b01 2519->2526 2520->2521 2521->2518 2522->2525 2523->2525 2527 5eb6b53-5eb6b62 call 5eb7770 2524->2527 2528 5eb6c41-5eb6c52 2524->2528 2526->2520 2540 5eb6b07-5eb6b0d 2526->2540 2532 5eb6b68-5eb6b6a 2527->2532 2535 5eb6c7c-5eb6c82 2528->2535 2536 5eb6c54-5eb6c61 2528->2536 2532->2528 2537 5eb6b70-5eb6b7c 2532->2537 2542 5eb6c9d-5eb6ca3 2535->2542 2543 5eb6c84-5eb6c90 2535->2543 2536->2542 2553 5eb6c63-5eb6c6f 2536->2553 2544 5eb6c3a-5eb6c3c 2537->2544 2545 5eb6b82-5eb6bf4 2537->2545 2540->2504 2546 5eb6b13-5eb6b17 2540->2546 2550 5eb6ddb 2542->2550 2551 5eb6ca9-5eb6cc6 2542->2551 2548 5eb6f3f-5eb6fa2 2543->2548 2549 5eb6c96-5eb6c98 2543->2549 2544->2525 2576 5eb6c22-5eb6c37 2545->2576 2577 5eb6bf6-5eb6c20 2545->2577 2546->2511 2599 5eb6fa9-5eb7028 2548->2599 2549->2525 2550->2525 2551->2520 2569 5eb6ccc-5eb6ccf 2551->2569 2558 5eb6f2d-5eb6f38 2553->2558 2559 5eb6c75-5eb6c77 2553->2559 2558->2548 2559->2525 2569->2504 2572 5eb6cd5-5eb6cfb 2569->2572 2572->2550 2580 5eb6d01-5eb6d0d 2572->2580 2576->2544 2577->2576 2583 5eb6d13-5eb6d91 2580->2583 2584 5eb6dd7-5eb6dd9 2580->2584 2602 5eb6dbf-5eb6dd4 2583->2602 2603 5eb6d93-5eb6dbd 2583->2603 2584->2525 2602->2584 2603->2602
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.3422355900.0000000005EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EB0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_5eb0000_RegAsm.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: a790abb75f7f1063fc1eed371d13f8e7f9384101a38a63e3e332e8d697064c8d
                                                                                                  • Instruction ID: 0d725e7bf58a24258678016be094feeccc400606f2355092b53ce671ec060325
                                                                                                  • Opcode Fuzzy Hash: a790abb75f7f1063fc1eed371d13f8e7f9384101a38a63e3e332e8d697064c8d
                                                                                                  • Instruction Fuzzy Hash: F6128D70A002198FEB14DF69C854AAEBBF6BF88704F148569E446EB395DF70DD41CB90

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 2741 5eb7198-5eb71bb 2742 5eb71bd-5eb71c3 2741->2742 2743 5eb71c6-5eb71e6 2741->2743 2742->2743 2746 5eb71e8 2743->2746 2747 5eb71ed-5eb71f4 2743->2747 2748 5eb757c-5eb7585 2746->2748 2749 5eb71f6-5eb7201 2747->2749 2750 5eb758d-5eb759d 2749->2750 2751 5eb7207-5eb721a 2749->2751 2756 5eb758a-5eb758c 2750->2756 2757 5eb759f 2750->2757 2754 5eb721c-5eb722a 2751->2754 2755 5eb7230-5eb724b 2751->2755 2754->2755 2760 5eb7504-5eb750b 2754->2760 2761 5eb726f-5eb7272 2755->2761 2762 5eb724d-5eb7253 2755->2762 2756->2750 2760->2748 2765 5eb750d-5eb750f 2760->2765 2766 5eb7278-5eb727b 2761->2766 2767 5eb73cc-5eb73d2 2761->2767 2763 5eb725c-5eb725f 2762->2763 2764 5eb7255 2762->2764 2769 5eb7292-5eb7298 2763->2769 2770 5eb7261-5eb7264 2763->2770 2764->2763 2764->2767 2768 5eb74be-5eb74c1 2764->2768 2764->2769 2771 5eb751e-5eb7524 2765->2771 2772 5eb7511-5eb7516 2765->2772 2766->2767 2774 5eb7281-5eb7287 2766->2774 2767->2768 2773 5eb73d8-5eb73dd 2767->2773 2776 5eb7588 2768->2776 2777 5eb74c7-5eb74cd 2768->2777 2778 5eb729a-5eb729c 2769->2778 2779 5eb729e-5eb72a0 2769->2779 2780 5eb726a 2770->2780 2781 5eb72fe-5eb7304 2770->2781 2771->2750 2782 5eb7526-5eb752b 2771->2782 2772->2771 2773->2768 2774->2767 2775 5eb728d 2774->2775 2775->2768 2776->2756 2784 5eb74cf-5eb74d7 2777->2784 2785 5eb74f2-5eb74f6 2777->2785 2786 5eb72aa-5eb72b3 2778->2786 2779->2786 2780->2768 2781->2768 2783 5eb730a-5eb7310 2781->2783 2787 5eb752d-5eb7532 2782->2787 2788 5eb7570-5eb7573 2782->2788 2790 5eb7312-5eb7314 2783->2790 2791 5eb7316-5eb7318 2783->2791 2784->2750 2792 5eb74dd-5eb74ec 2784->2792 2785->2760 2795 5eb74f8-5eb74fe 2785->2795 2793 5eb72c6-5eb72ee 2786->2793 2794 5eb72b5-5eb72c0 2786->2794 2787->2776 2789 5eb7534 2787->2789 2788->2776 2796 5eb7575-5eb757a 2788->2796 2797 5eb753b-5eb7540 2789->2797 2798 5eb7322-5eb7339 2790->2798 2791->2798 2792->2755 2792->2785 2816 5eb73e2-5eb7418 2793->2816 2817 5eb72f4-5eb72f9 2793->2817 2794->2768 2794->2793 2795->2749 2795->2760 2796->2748 2796->2765 2799 5eb7562-5eb7564 2797->2799 2800 5eb7542-5eb7544 2797->2800 2809 5eb733b-5eb7354 2798->2809 2810 5eb7364-5eb738b 2798->2810 2799->2776 2807 5eb7566-5eb7569 2799->2807 2804 5eb7553-5eb7559 2800->2804 2805 5eb7546-5eb754b 2800->2805 2804->2750 2808 5eb755b-5eb7560 2804->2808 2805->2804 2807->2788 2808->2799 2812 5eb7536-5eb7539 2808->2812 2809->2816 2822 5eb735a-5eb735f 2809->2822 2810->2776 2821 5eb7391-5eb7394 2810->2821 2812->2776 2812->2797 2823 5eb741a-5eb741e 2816->2823 2824 5eb7425-5eb742d 2816->2824 2817->2816 2821->2776 2825 5eb739a-5eb73c3 2821->2825 2822->2816 2826 5eb743d-5eb7441 2823->2826 2827 5eb7420-5eb7423 2823->2827 2824->2776 2828 5eb7433-5eb7438 2824->2828 2825->2816 2840 5eb73c5-5eb73ca 2825->2840 2829 5eb7443-5eb7449 2826->2829 2830 5eb7460-5eb7464 2826->2830 2827->2824 2827->2826 2828->2768 2829->2830 2832 5eb744b-5eb7453 2829->2832 2833 5eb746e-5eb748a 2830->2833 2834 5eb7466-5eb746c 2830->2834 2832->2776 2835 5eb7459-5eb745e 2832->2835 2837 5eb7493-5eb7497 2833->2837 2834->2833 2834->2837 2835->2768 2837->2768 2838 5eb7499-5eb74b5 2837->2838 2838->2768 2840->2816
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.3422355900.0000000005EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EB0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_5eb0000_RegAsm.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 88a307bc7b5c75e83ad5941b34fc45cccc4412b76d1d84bf5dfdfffa79f7fa7b
                                                                                                  • Instruction ID: 927bc33cd8cdd6450af9b930e1049efcd0d0da688075e5abb5d4fd00eda72dbd
                                                                                                  • Opcode Fuzzy Hash: 88a307bc7b5c75e83ad5941b34fc45cccc4412b76d1d84bf5dfdfffa79f7fa7b
                                                                                                  • Instruction Fuzzy Hash: 97D14C70A04119DFEB14CFA8D984AEEBBB2FF88306F159165E885A7660D770ED41CB90

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 2841 5eb15f8-5eb1618 2842 5eb161a 2841->2842 2843 5eb161f-5eb16e1 2841->2843 2842->2843 2848 5eb1aac-5eb1baa 2843->2848 2849 5eb16e7-5eb1704 2843->2849 2851 5eb1bac-5eb1bb1 2848->2851 2852 5eb1bb2-5eb1bb8 2848->2852 2907 5eb1707 call f05367 2849->2907 2908 5eb1707 call f05358 2849->2908 2909 5eb1707 call f056af 2849->2909 2851->2852 2855 5eb170c-5eb1725 2900 5eb1727 call f0c168 2855->2900 2901 5eb1727 call f0c158 2855->2901 2902 5eb1727 call f0c76c 2855->2902 2856 5eb172c-5eb174e 2858 5eb1750 2856->2858 2859 5eb1755-5eb175e 2856->2859 2858->2859 2860 5eb1a9f-5eb1aa5 2859->2860 2861 5eb1aab 2860->2861 2862 5eb1763-5eb17fb 2860->2862 2861->2848 2867 5eb18d3-5eb1934 2862->2867 2868 5eb1801-5eb183d 2862->2868 2879 5eb1935-5eb1944 2867->2879 2903 5eb1843 call 5eb1eb9 2868->2903 2904 5eb1843 call 5eb1c58 2868->2904 2905 5eb1843 call 5eb1c32 2868->2905 2906 5eb1843 call 5eb1c36 2868->2906 2875 5eb1849-5eb1884 2877 5eb18ce-5eb18d1 2875->2877 2878 5eb1886-5eb18a3 2875->2878 2877->2879 2882 5eb18a9-5eb18cd 2878->2882 2881 5eb194d-5eb198c 2879->2881 2884 5eb1a83-5eb1a95 2881->2884 2885 5eb1992-5eb1a82 2881->2885 2882->2877 2886 5eb1a9c 2884->2886 2887 5eb1a97 2884->2887 2885->2884 2886->2860 2887->2886 2900->2856 2901->2856 2902->2856 2903->2875 2904->2875 2905->2875 2906->2875 2907->2855 2908->2855 2909->2855
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.3422355900.0000000005EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EB0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_5eb0000_RegAsm.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: f49f6fe509811fbba77f2947333a78993f3a04e6c200fb21b86095696e10a16d
                                                                                                  • Instruction ID: 8d02b889982abaa92ae69499919e4250112f785189829da5da10a6f68c1ac1eb
                                                                                                  • Opcode Fuzzy Hash: f49f6fe509811fbba77f2947333a78993f3a04e6c200fb21b86095696e10a16d
                                                                                                  • Instruction Fuzzy Hash: 18E1C074E01218CFEB24DFA5C994BDDBBB2BF89304F2081A9D409AB395DB755A85CF10

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 2910 f04f08-f04f28 2912 f04f2a 2910->2912 2913 f04f2f-f04fc0 2910->2913 2912->2913 2917 f05314-f05348 2913->2917 2918 f04fc6-f04fd6 2913->2918 2967 f04fd9 call f05367 2918->2967 2968 f04fd9 call f05358 2918->2968 2969 f04fd9 call f056af 2918->2969 2921 f04fdf-f04fee 2970 f04ff0 call f0c168 2921->2970 2971 f04ff0 call f0c158 2921->2971 2972 f04ff0 call f0c76c 2921->2972 2922 f04ff6-f05012 2924 f05014 2922->2924 2925 f05019-f05022 2922->2925 2924->2925 2926 f05307-f0530d 2925->2926 2927 f05313 2926->2927 2928 f05027-f050a1 2926->2928 2927->2917 2933 f050a7-f05115 call f03760 2928->2933 2934 f0515d-f051b8 2928->2934 2944 f05117-f05157 2933->2944 2945 f05158-f0515b 2933->2945 2946 f051b9-f05209 2934->2946 2944->2945 2945->2946 2951 f052f2-f052fd 2946->2951 2952 f0520f-f052f1 2946->2952 2954 f05304 2951->2954 2955 f052ff 2951->2955 2952->2951 2954->2926 2955->2954 2967->2921 2968->2921 2969->2921 2970->2922 2971->2922 2972->2922
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.3416786849.0000000000F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F00000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_f00000_RegAsm.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: e2ab274e9fd00a82fa27803fd6ca8cd864d6be75e1eff4128ab22e12e7066320
                                                                                                  • Instruction ID: bcebcd58b7aae4588b9fd5312a8474e409841ba85de356d90fadcce91a620568
                                                                                                  • Opcode Fuzzy Hash: e2ab274e9fd00a82fa27803fd6ca8cd864d6be75e1eff4128ab22e12e7066320
                                                                                                  • Instruction Fuzzy Hash: 34C1B278E01218CFDB14DFA5D944B9DBBB2BF88300F1085AAD809AB365DB759E85DF10

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 2973 f05358-f0535e 2974 f05360-f05362 2973->2974 2975 f05364-f05365 2973->2975 2974->2975 2976 f05368-f05393 2974->2976 2977 f05395 2976->2977 2978 f0539a-f0542d 2976->2978 2977->2978 2988 f05433-f05445 2978->2988 2989 f05687-f05786 2978->2989 3037 f0544a call f05e30 2988->3037 3038 f0544a call f05e21 2988->3038 2993 f05788-f0578e 2989->2993 2994 f0578f-f05796 2989->2994 2992 f05450-f0546e 2998 f05470-f05474 2992->2998 2999 f0547d-f05481 2992->2999 2993->2994 3002 f05476 2998->3002 3003 f0547b 2998->3003 3000 f05483 2999->3000 3001 f05488 2999->3001 3000->3001 3039 f05488 call f075d0 3001->3039 3040 f05488 call f075c0 3001->3040 3041 f05488 call f07560 3001->3041 3042 f05488 call f07551 3001->3042 3002->3003 3003->3001 3004 f0548e-f054af 3043 f054b4 call f075d0 3004->3043 3044 f054b4 call f075c0 3004->3044 3045 f054b4 call f07560 3004->3045 3046 f054b4 call f07551 3004->3046 3006 f054ba-f054e1 3009 f054e3 3006->3009 3010 f054e8-f054ef 3006->3010 3009->3010 3033 f054f5 call f07a40 3010->3033 3034 f054f5 call f078a9 3010->3034 3011 f054fb-f0556d 3017 f05574-f05578 3011->3017 3018 f0556f 3011->3018 3019 f0557a 3017->3019 3020 f0557f-f05584 3017->3020 3018->3017 3019->3020 3021 f05586 3020->3021 3022 f0558b-f05655 3020->3022 3021->3022 3029 f05657-f0566a 3022->3029 3030 f0566d-f0567c 3022->3030 3029->3030 3035 f0567f call f07e67 3030->3035 3036 f0567f call f07e68 3030->3036 3031 f05685-f05686 3031->2989 3033->3011 3034->3011 3035->3031 3036->3031 3037->2992 3038->2992 3039->3004 3040->3004 3041->3004 3042->3004 3043->3006 3044->3006 3045->3006 3046->3006
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.3416786849.0000000000F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F00000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_f00000_RegAsm.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 7b7fa58dff0adc2202c9b3773476f8be7b87bb4b9b90fd51eebae11e7cfd091b
                                                                                                  • Instruction ID: 3d40c7ccd9187b704bbefaa1bd59cf13b6eeb38d8cbe8244e5208a1af6e175de
                                                                                                  • Opcode Fuzzy Hash: 7b7fa58dff0adc2202c9b3773476f8be7b87bb4b9b90fd51eebae11e7cfd091b
                                                                                                  • Instruction Fuzzy Hash: 9BA12874D00608CFDB14DFA8C948BEDBBB1FF88314F24826AD409AB291DBB49985DF50

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 3202 f05367-f05393 3203 f05395 3202->3203 3204 f0539a-f0542d 3202->3204 3203->3204 3214 f05433-f05445 3204->3214 3215 f05687-f05786 3204->3215 3267 f0544a call f05e30 3214->3267 3268 f0544a call f05e21 3214->3268 3219 f05788-f0578e 3215->3219 3220 f0578f-f05796 3215->3220 3218 f05450-f0546e 3224 f05470-f05474 3218->3224 3225 f0547d-f05481 3218->3225 3219->3220 3228 f05476 3224->3228 3229 f0547b 3224->3229 3226 f05483 3225->3226 3227 f05488 3225->3227 3226->3227 3269 f05488 call f075d0 3227->3269 3270 f05488 call f075c0 3227->3270 3271 f05488 call f07560 3227->3271 3272 f05488 call f07551 3227->3272 3228->3229 3229->3227 3230 f0548e-f054af 3259 f054b4 call f075d0 3230->3259 3260 f054b4 call f075c0 3230->3260 3261 f054b4 call f07560 3230->3261 3262 f054b4 call f07551 3230->3262 3232 f054ba-f054e1 3235 f054e3 3232->3235 3236 f054e8-f054ef 3232->3236 3235->3236 3263 f054f5 call f07a40 3236->3263 3264 f054f5 call f078a9 3236->3264 3237 f054fb-f0556d 3243 f05574-f05578 3237->3243 3244 f0556f 3237->3244 3245 f0557a 3243->3245 3246 f0557f-f05584 3243->3246 3244->3243 3245->3246 3247 f05586 3246->3247 3248 f0558b-f05655 3246->3248 3247->3248 3255 f05657-f0566a 3248->3255 3256 f0566d-f0567c 3248->3256 3255->3256 3265 f0567f call f07e67 3256->3265 3266 f0567f call f07e68 3256->3266 3257 f05685-f05686 3257->3215 3259->3232 3260->3232 3261->3232 3262->3232 3263->3237 3264->3237 3265->3257 3266->3257 3267->3218 3268->3218 3269->3230 3270->3230 3271->3230 3272->3230
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.3416786849.0000000000F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F00000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_f00000_RegAsm.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 022dc3e5e4eb5f60d7a7db1c62a4d939c06646d0feff3d7d49cfb4053eca2adb
                                                                                                  • Instruction ID: 6154fdc453f9304bbe7ccd54d081867928de90e16044eb4d2ee09e5df8e07fb7
                                                                                                  • Opcode Fuzzy Hash: 022dc3e5e4eb5f60d7a7db1c62a4d939c06646d0feff3d7d49cfb4053eca2adb
                                                                                                  • Instruction Fuzzy Hash: B7A10774D00608CFEB14DFA9C954BEDBBB1FF88314F24826AD409AB291DBB59985CF50
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.3416786849.0000000000F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F00000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_f00000_RegAsm.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 5895abdec40a717fbcd2340a2a62517b7e3694feb0962a2f984f7c8c240b248e
                                                                                                  • Instruction ID: fb7633d1a25122d0f9efc16cc9fe3967b50bf41d20ad5bfa8b2900b3f0e21c2f
                                                                                                  • Opcode Fuzzy Hash: 5895abdec40a717fbcd2340a2a62517b7e3694feb0962a2f984f7c8c240b248e
                                                                                                  • Instruction Fuzzy Hash: F891F374D00618CFEB10DFA8C948BEDBBB1FF48314F24825AE409AB291DBB59985DF14
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.3422355900.0000000005EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EB0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_5eb0000_RegAsm.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: d498e6f5e55557c7b92a28fa84d79ac773a1ff00eeb9cc429450c8f56a590bd4
                                                                                                  • Instruction ID: 1da67d8a7ec35ce84346416303994623253494a2482d145e3ebbf4649a6aaa7e
                                                                                                  • Opcode Fuzzy Hash: d498e6f5e55557c7b92a28fa84d79ac773a1ff00eeb9cc429450c8f56a590bd4
                                                                                                  • Instruction Fuzzy Hash: E581D170E01218CFEB58DFAAD8547EEBBF2BF89305F20906AD419AB254DB745941CF40
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.3422355900.0000000005EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EB0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_5eb0000_RegAsm.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 99d2da223bc1c789ebd816087ee1dc00ee8947f7f8c28b88d958d0f0dd522ad8
                                                                                                  • Instruction ID: 08b456d50fcff1c9b18603f1c9d1c054850120f36f56938969f80e17f03022db
                                                                                                  • Opcode Fuzzy Hash: 99d2da223bc1c789ebd816087ee1dc00ee8947f7f8c28b88d958d0f0dd522ad8
                                                                                                  • Instruction Fuzzy Hash: D341E3B0D002088BEB18DFAAC8547DEFBB2BF88304F14D169C418BB294EB755946CF64

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 1126 f0c76c 1127 f0c82b-f0c83c 1126->1127 1128 f0c843-f0c84c 1127->1128 1129 f0c83e 1127->1129 1131 f0c852-f0c865 1128->1131 1132 f0c623-f0c648 1128->1132 1129->1128 1135 f0c867 1131->1135 1136 f0c86c-f0c887 1131->1136 1133 f0c64a 1132->1133 1134 f0c64f-f0c686 1132->1134 1133->1134 1144 f0c688 1134->1144 1145 f0c68d-f0c6bf 1134->1145 1135->1136 1137 f0c889 1136->1137 1138 f0c88e-f0c8a2 1136->1138 1137->1138 1142 f0c8a4 1138->1142 1143 f0c8a9-f0c8bf LdrInitializeThunk 1138->1143 1142->1143 1146 f0c8c1-f0c9bf 1143->1146 1144->1145 1152 f0c6c1-f0c6e6 1145->1152 1153 f0c723-f0c736 1145->1153 1149 f0c9c1-f0c9c6 call f05ca8 1146->1149 1150 f0c9c7-f0c9d1 1146->1150 1149->1150 1157 f0c6e8 1152->1157 1158 f0c6ed-f0c71b 1152->1158 1155 f0c738 1153->1155 1156 f0c73d-f0c762 1153->1156 1155->1156 1161 f0c771-f0c7a9 1156->1161 1162 f0c764-f0c765 1156->1162 1157->1158 1158->1153 1163 f0c7b0-f0c811 call f0c168 1161->1163 1164 f0c7ab 1161->1164 1162->1131 1170 f0c813 1163->1170 1171 f0c818-f0c82a 1163->1171 1164->1163 1170->1171 1171->1127
                                                                                                  APIs
                                                                                                  • LdrInitializeThunk.NTDLL(00000000), ref: 00F0C8AE
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.3416786849.0000000000F00000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F00000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_f00000_RegAsm.jbxd
                                                                                                  Similarity
                                                                                                  • API ID: InitializeThunk
                                                                                                  • String ID:
                                                                                                  • API String ID: 2994545307-0
                                                                                                  • Opcode ID: c6a7da7258f766ba369285ca7f0b1588297b3df436713a53ae06ec0c6cba41c0
                                                                                                  • Instruction ID: c743d300430444391ceb5c172151a23c1f2e993f253bb6329b67d7fa6f527ab3
                                                                                                  • Opcode Fuzzy Hash: c6a7da7258f766ba369285ca7f0b1588297b3df436713a53ae06ec0c6cba41c0
                                                                                                  • Instruction Fuzzy Hash: 7A118175E002198FEB04DFE8D484BADBBF5FB88304F64C225E844A7291D771D842EB94

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 2110 5eb8848-5eb8d36 2185 5eb9288-5eb92a8 2110->2185 2186 5eb8d3c-5eb8d4c 2110->2186 2190 5eb92aa-5eb92bd 2185->2190 2191 5eb92f9-5eb9301 2185->2191 2186->2185 2187 5eb8d52-5eb8d62 2186->2187 2187->2185 2189 5eb8d68-5eb8d78 2187->2189 2189->2185 2192 5eb8d7e-5eb8d8e 2189->2192 2193 5eb92c9-5eb92e7 2190->2193 2194 5eb92bf-5eb92c4 2190->2194 2199 5eb9303-5eb930e 2191->2199 2200 5eb9326-5eb9329 2191->2200 2192->2185 2195 5eb8d94-5eb8da4 2192->2195 2219 5eb92e9-5eb92f3 2193->2219 2220 5eb935e-5eb936a 2193->2220 2197 5eb93ae-5eb93b3 2194->2197 2195->2185 2198 5eb8daa-5eb8dba 2195->2198 2198->2185 2202 5eb8dc0-5eb8dd0 2198->2202 2199->2200 2214 5eb9310-5eb931a 2199->2214 2204 5eb932b-5eb9337 2200->2204 2205 5eb9340-5eb934c 2200->2205 2202->2185 2203 5eb8dd6-5eb8de6 2202->2203 2203->2185 2206 5eb8dec-5eb8dfc 2203->2206 2204->2205 2215 5eb9339-5eb933e 2204->2215 2207 5eb934e-5eb9355 2205->2207 2208 5eb93b4-5eb9410 2205->2208 2206->2185 2212 5eb8e02-5eb8e12 2206->2212 2207->2208 2213 5eb9357-5eb935c 2207->2213 2232 5eb9423-5eb942e 2208->2232 2233 5eb9412-5eb941d 2208->2233 2212->2185 2216 5eb8e18-5eb9287 2212->2216 2213->2197 2214->2200 2224 5eb931c-5eb9321 2214->2224 2215->2197 2219->2220 2227 5eb92f5-5eb92f7 2219->2227 2229 5eb936c-5eb9378 2220->2229 2230 5eb9381-5eb938d 2220->2230 2224->2197 2227->2191 2229->2230 2241 5eb937a-5eb937f 2229->2241 2237 5eb938f-5eb939b 2230->2237 2238 5eb93a4-5eb93a6 2230->2238 2243 5eb94ff-5eb952b 2232->2243 2244 5eb9434-5eb9491 2232->2244 2233->2232 2242 5eb94a6-5eb94f8 2233->2242 2237->2238 2247 5eb939d-5eb93a2 2237->2247 2238->2197 2241->2197 2242->2243 2256 5eb949a-5eb94a3 2244->2256 2247->2197
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.3422355900.0000000005EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EB0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_5eb0000_RegAsm.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 162d8afeb30a3eacd87068a86dd3bfe237d41ef88dade35e0aff253782c682eb
                                                                                                  • Instruction ID: 56544ef91b575fd780f41bfa083e615d94e83abc11d944edf8af6361bae10340
                                                                                                  • Opcode Fuzzy Hash: 162d8afeb30a3eacd87068a86dd3bfe237d41ef88dade35e0aff253782c682eb
                                                                                                  • Instruction Fuzzy Hash: 1F621535A00219CFEB149BE4C8A0BEEBFB2FF84700F1091A9D2466B395DE759E458F51

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 3047 5eb65f1-5eb660d 3048 5eb660f-5eb6613 3047->3048 3049 5eb6615-5eb6617 3047->3049 3048->3049 3050 5eb661c-5eb6627 3048->3050 3051 5eb6828-5eb682f 3049->3051 3052 5eb662d-5eb6634 3050->3052 3053 5eb6830 3050->3053 3054 5eb663a-5eb6649 3052->3054 3055 5eb67c9-5eb67cf 3052->3055 3057 5eb6835-5eb686d 3053->3057 3056 5eb664f-5eb665e 3054->3056 3054->3057 3058 5eb67d1-5eb67d3 3055->3058 3059 5eb67d5-5eb67d9 3055->3059 3065 5eb6673-5eb6676 3056->3065 3066 5eb6660-5eb6663 3056->3066 3080 5eb686f-5eb6874 3057->3080 3081 5eb6876-5eb687a 3057->3081 3058->3051 3060 5eb67db-5eb67e1 3059->3060 3061 5eb6826 3059->3061 3060->3053 3063 5eb67e3-5eb67e6 3060->3063 3061->3051 3063->3053 3067 5eb67e8-5eb67fd 3063->3067 3069 5eb6682-5eb6688 3065->3069 3071 5eb6678-5eb667b 3065->3071 3066->3069 3070 5eb6665-5eb6668 3066->3070 3089 5eb67ff-5eb6805 3067->3089 3090 5eb6821-5eb6824 3067->3090 3072 5eb668a-5eb6690 3069->3072 3073 5eb66a0-5eb66bd 3069->3073 3074 5eb6769-5eb676f 3070->3074 3075 5eb666e 3070->3075 3076 5eb66ce-5eb66d4 3071->3076 3077 5eb667d 3071->3077 3082 5eb6692 3072->3082 3083 5eb6694-5eb669e 3072->3083 3121 5eb66c6-5eb66c9 3073->3121 3084 5eb6771-5eb6777 3074->3084 3085 5eb6787-5eb6791 3074->3085 3086 5eb6794-5eb67a1 3075->3086 3087 5eb66ec-5eb66fe 3076->3087 3088 5eb66d6-5eb66dc 3076->3088 3077->3086 3093 5eb6880-5eb6882 3080->3093 3081->3093 3082->3073 3083->3073 3095 5eb677b-5eb6785 3084->3095 3096 5eb6779 3084->3096 3085->3086 3107 5eb67a3-5eb67a7 3086->3107 3108 5eb67b5-5eb67b7 3086->3108 3110 5eb670e-5eb6731 3087->3110 3111 5eb6700-5eb670c 3087->3111 3097 5eb66de 3088->3097 3098 5eb66e0-5eb66ea 3088->3098 3091 5eb6817-5eb681a 3089->3091 3092 5eb6807-5eb6815 3089->3092 3090->3051 3091->3053 3099 5eb681c-5eb681f 3091->3099 3092->3053 3092->3091 3103 5eb6897-5eb689e 3093->3103 3104 5eb6884-5eb6896 3093->3104 3095->3085 3096->3085 3097->3087 3098->3087 3099->3089 3099->3090 3107->3108 3114 5eb67a9-5eb67ad 3107->3114 3116 5eb67bb-5eb67be 3108->3116 3110->3053 3125 5eb6737-5eb673a 3110->3125 3122 5eb6759-5eb6767 3111->3122 3114->3053 3117 5eb67b3 3114->3117 3116->3053 3118 5eb67c0-5eb67c3 3116->3118 3117->3116 3118->3054 3118->3055 3121->3086 3122->3086 3125->3053 3126 5eb6740-5eb6752 3125->3126 3126->3122
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.3422355900.0000000005EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EB0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_5eb0000_RegAsm.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: d516c5147992911f363c1eed4426129da0f0e81f323c980413d3d742dd7ef34f
                                                                                                  • Instruction ID: e749893831481c96e8869016431c61f0efc486a479d6dc3ca1772ad675baf10b
                                                                                                  • Opcode Fuzzy Hash: d516c5147992911f363c1eed4426129da0f0e81f323c980413d3d742dd7ef34f
                                                                                                  • Instruction Fuzzy Hash: E581C335E04115CFEB14CF68C984AEBB7B2FF88205B14A1A9D446E7365EBB1E801CB90

                                                                                                  Control-flow Graph

                                                                                                  • Executed
                                                                                                  • Not Executed
                                                                                                  control_flow_graph 3128 5eb62a8-5eb62b6 3129 5eb62b8-5eb62be 3128->3129 3130 5eb62c5-5eb62d6 call 5eb2a50 3128->3130 3129->3130 3133 5eb636a-5eb636e call 5eb62a8 3130->3133 3134 5eb62dc-5eb62e0 3130->3134 3137 5eb6374-5eb637a 3133->3137 3135 5eb62e2-5eb62ee 3134->3135 3136 5eb62f0-5eb62fd 3134->3136 3142 5eb62ff-5eb6309 3135->3142 3136->3142 3140 5eb637c-5eb6382 3137->3140 3141 5eb6386-5eb638d 3137->3141 3143 5eb63e8-5eb6447 3140->3143 3144 5eb6384 3140->3144 3147 5eb630b-5eb631a 3142->3147 3148 5eb6336-5eb633a 3142->3148 3156 5eb644e-5eb647e 3143->3156 3144->3141 3159 5eb632a-5eb6334 3147->3159 3160 5eb631c-5eb6323 3147->3160 3149 5eb633c-5eb6342 3148->3149 3150 5eb6346-5eb634a 3148->3150 3152 5eb6390-5eb63e1 3149->3152 3153 5eb6344 3149->3153 3150->3141 3154 5eb634c-5eb6350 3150->3154 3152->3143 3153->3141 3154->3156 3157 5eb6356-5eb6368 3154->3157 3171 5eb64a3-5eb64b0 3156->3171 3172 5eb6480-5eb648d 3156->3172 3157->3141 3159->3148 3160->3159 3177 5eb64b2-5eb64bc 3171->3177 3178 5eb649f-5eb64a1 3172->3178 3179 5eb648f-5eb649d 3172->3179 3185 5eb64be-5eb64cc 3177->3185 3186 5eb64e4-5eb64e6 call 5eb65f1 3177->3186 3178->3177 3179->3177 3191 5eb64d9-5eb64e2 3185->3191 3192 5eb64ce-5eb64d2 3185->3192 3189 5eb64ec-5eb64f0 3186->3189 3193 5eb6509-5eb650d 3189->3193 3194 5eb64f2-5eb6507 3189->3194 3191->3186 3192->3191 3195 5eb652b-5eb6531 3193->3195 3196 5eb650f-5eb6524 3193->3196 3194->3195 3196->3195
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.3422355900.0000000005EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EB0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_5eb0000_RegAsm.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 05f5255e51a6ac9ca974580a78bf17731c751f57b7b25e0cfa51475f6fc32de8
                                                                                                  • Instruction ID: fbb6632cc3b5eae82d7eb81b33098976a653438cc7a1e4a234beb9fe4a6a8c48
                                                                                                  • Opcode Fuzzy Hash: 05f5255e51a6ac9ca974580a78bf17731c751f57b7b25e0cfa51475f6fc32de8
                                                                                                  • Instruction Fuzzy Hash: 4571FE303042118FEB19AB79C454ABF7AE3BBC8645B148579E586CB395EFB4DC42CB80
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.3422355900.0000000005EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EB0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_5eb0000_RegAsm.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 6d07e20a7cc5f55815f28363528be4584abdc84c594ed02848c348127b297802
                                                                                                  • Instruction ID: 6812402e7b028d78c50f96e3f5d622f0dbcdd6b0a6b8ebd8eb1111cbacc16d18
                                                                                                  • Opcode Fuzzy Hash: 6d07e20a7cc5f55815f28363528be4584abdc84c594ed02848c348127b297802
                                                                                                  • Instruction Fuzzy Hash: 6C51AF317081128FEB14DF39C894AAB77EEBF4825670555BAE486CB365EBB1DC01CB50
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.3422355900.0000000005EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EB0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_5eb0000_RegAsm.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: a5b57357a09d200769c44c00eed71333ee9012e39963042bd1bfd5291494695e
                                                                                                  • Instruction ID: 4665083611d68538cb4a79918fb629a11e4de46a77a1597ec5e4d169333de46e
                                                                                                  • Opcode Fuzzy Hash: a5b57357a09d200769c44c00eed71333ee9012e39963042bd1bfd5291494695e
                                                                                                  • Instruction Fuzzy Hash: 4481B274E412289FDB65DF29D851BEDBBF2BB89300F1080EAD949A7254EB705E81CF40
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.3422355900.0000000005EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EB0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_5eb0000_RegAsm.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: c366503f519d5a0852eb06036802343f20a906eff0787b637352c39f06a4f996
                                                                                                  • Instruction ID: 6a38bebb5ad7b7e205aee8c05d7ad2584dca6dbf20aa101d6870b34ce958cefd
                                                                                                  • Opcode Fuzzy Hash: c366503f519d5a0852eb06036802343f20a906eff0787b637352c39f06a4f996
                                                                                                  • Instruction Fuzzy Hash: A951AF70A002089FEB14DFA4C844BEFBBF6FB88345F04842AE8569B651D7B4DD45CBA0
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.3422355900.0000000005EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EB0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_5eb0000_RegAsm.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 900d9cc3f6d1b585184fdf8c089dff53190ef0de712f1cc634923f6eb917aae1
                                                                                                  • Instruction ID: 99b8d034aca5972f4522c3492496b98b327253fe2c162574ea85360141a3e242
                                                                                                  • Opcode Fuzzy Hash: 900d9cc3f6d1b585184fdf8c089dff53190ef0de712f1cc634923f6eb917aae1
                                                                                                  • Instruction Fuzzy Hash: FD414035E002199BEB15DFA5C850AEEBBF2BFC4700F548129E402BB284DF70AD46CB91
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.3422355900.0000000005EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EB0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_5eb0000_RegAsm.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: cc57948cc64cc3d4ec5c05fba16e356ae28000c5fe9a9edbabe535769cdf4912
                                                                                                  • Instruction ID: b3f0aaeacd3dff184457efbb9f0ec9e13fd738482d8ae1ade79a324d975c0e81
                                                                                                  • Opcode Fuzzy Hash: cc57948cc64cc3d4ec5c05fba16e356ae28000c5fe9a9edbabe535769cdf4912
                                                                                                  • Instruction Fuzzy Hash: 5541D1356082549FEF169F24D844BEB7FF2FF88205F098959E886DB281DB78D801CB91
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.3422355900.0000000005EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EB0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_5eb0000_RegAsm.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: a30c6a3ca198e3372f7f12b21bb43afb5e1db1876f9085aa2900dd3015b10fe1
                                                                                                  • Instruction ID: 987a0a8795b506e822024289ccbdf73bf63c9c4e1c4490680b7b364ba892502c
                                                                                                  • Opcode Fuzzy Hash: a30c6a3ca198e3372f7f12b21bb43afb5e1db1876f9085aa2900dd3015b10fe1
                                                                                                  • Instruction Fuzzy Hash: 2641D2343007018FE728AB3AD858B6B7BE6AFC4605F04556DE686CB7A0EFA4EC01C740
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.3422355900.0000000005EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EB0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_5eb0000_RegAsm.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: abb31b9a32e34536f87ac3f9e0179650f3a108e96783b6b5749679e3404ce3ff
                                                                                                  • Instruction ID: 877bdd974c74f7a09b4c67ff8959e9ab2f7a05122d927082fd36340a6f51bf59
                                                                                                  • Opcode Fuzzy Hash: abb31b9a32e34536f87ac3f9e0179650f3a108e96783b6b5749679e3404ce3ff
                                                                                                  • Instruction Fuzzy Hash: 3A4176746081158FEB14DF28C898AAE3BBAFF48316F100169F946CB3A0CBB4DC41CB91
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.3422355900.0000000005EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EB0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_5eb0000_RegAsm.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: be4b4838efccc98224ee9f86a2175714ff97edd8d7f06651c36b3dca9c8b15b6
                                                                                                  • Instruction ID: 5c92e51033314005e56d24479cd4b357fb67ff7cd3dc4377436ac4352e9016c9
                                                                                                  • Opcode Fuzzy Hash: be4b4838efccc98224ee9f86a2175714ff97edd8d7f06651c36b3dca9c8b15b6
                                                                                                  • Instruction Fuzzy Hash: 5641BF31604109AFEF059F64D845AFF3BA2FB88315F0044A6F9958B350EBB5DA61DB90
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.3422355900.0000000005EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EB0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_5eb0000_RegAsm.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 17b69f2d728125809d6aa166af1725137f97ab148de3dd62551a68dc0dd3ad12
                                                                                                  • Instruction ID: 0c83e431a6a2cce336d96f451c154a97a2fbdf96a575de1ffab729a30a0427cf
                                                                                                  • Opcode Fuzzy Hash: 17b69f2d728125809d6aa166af1725137f97ab148de3dd62551a68dc0dd3ad12
                                                                                                  • Instruction Fuzzy Hash: 71212735B081114BFB245A29C854BBF268FBFC861EF549075D542DB398EFB5CC429380
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.3422355900.0000000005EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EB0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_5eb0000_RegAsm.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: cbb61bc6b2a99eeadf25185a2e9cd046d2e7a10acf079d7f8e7006364b98568d
                                                                                                  • Instruction ID: 0e4cf635f62c00ddb95db907a2791d1cbe3c8ca422e3d698b367562f0a830878
                                                                                                  • Opcode Fuzzy Hash: cbb61bc6b2a99eeadf25185a2e9cd046d2e7a10acf079d7f8e7006364b98568d
                                                                                                  • Instruction Fuzzy Hash: C721B73130C1558BF714EE669840AFB7BEEBB85206B045426F982DB358EBF1DC00C760
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.3422355900.0000000005EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EB0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_5eb0000_RegAsm.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: e9a062f80b2186449b59c72e1054225717b6497f5ca3c3d173b70e65d0108e08
                                                                                                  • Instruction ID: fee5311e3ca408d61a92af3afb5c2200d27ce64a63587a82025073ce26a53364
                                                                                                  • Opcode Fuzzy Hash: e9a062f80b2186449b59c72e1054225717b6497f5ca3c3d173b70e65d0108e08
                                                                                                  • Instruction Fuzzy Hash: F921D4313053058BDB18A6BD9C46AAB3FEAABC4254F145579A641CF39AEEB4DC018391
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.3415427818.0000000000BCD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BCD000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_bcd000_RegAsm.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 1a671fc6104dc0b9e096873199cd18d674df7f8f2bff10ae7be65f09bc6768f9
                                                                                                  • Instruction ID: e858c3035b4172e2d0196662968852d1f7a24f8b01ea977d5e0895c10fbfd969
                                                                                                  • Opcode Fuzzy Hash: 1a671fc6104dc0b9e096873199cd18d674df7f8f2bff10ae7be65f09bc6768f9
                                                                                                  • Instruction Fuzzy Hash: 53210479604244EFDB14DF18D9D0F26BBA1FB84314F24C6BDD9094B252C77AD847CA62
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.3415427818.0000000000BCD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BCD000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_bcd000_RegAsm.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 94a8e321441c563e506edc26ea59a707848173fffea20b07aaf229b8977aaabf
                                                                                                  • Instruction ID: 5dfae564344445fca44bb4624d8d0b4768f4c7f254a73f213e13822d5b2b0422
                                                                                                  • Opcode Fuzzy Hash: 94a8e321441c563e506edc26ea59a707848173fffea20b07aaf229b8977aaabf
                                                                                                  • Instruction Fuzzy Hash: 6221627550D3C08FC713CB24D990B15BF71AB46214F29C5EBC8898B6A3C23A980ACB62
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.3422355900.0000000005EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EB0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_5eb0000_RegAsm.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 253fb40c9c7c10e1924563b86f7483fe5d7bc3a535b62ca97926016da161044e
                                                                                                  • Instruction ID: d0f909e1f1d6de5e70c6729fb5a24358c018ef459edc0ccbb40d262e15d5a650
                                                                                                  • Opcode Fuzzy Hash: 253fb40c9c7c10e1924563b86f7483fe5d7bc3a535b62ca97926016da161044e
                                                                                                  • Instruction Fuzzy Hash: 0E1153B6800249DFDB10CF99C845BEEBFF4EF48320F149419EA58A7210D379A950DFA5
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.3422355900.0000000005EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EB0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_5eb0000_RegAsm.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 6338a414fac28ce018ef072689abca453d8c5cab52bf86b409ab77ba08b55956
                                                                                                  • Instruction ID: c9017c81f3b5f5605938e734010227a8ea372bf90858163ebe64882732e3d898
                                                                                                  • Opcode Fuzzy Hash: 6338a414fac28ce018ef072689abca453d8c5cab52bf86b409ab77ba08b55956
                                                                                                  • Instruction Fuzzy Hash: EA11C631200B118FF735972EC844BABBBE6AFC0355F04961DD196876A1EFE4E8058781
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.3422355900.0000000005EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EB0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_5eb0000_RegAsm.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 3713addd8ffdd058c57aaa17f93b3cfd7b9d3bf08bbece85aaceba13e537358d
                                                                                                  • Instruction ID: 4f63e8539a81858c4701220bde93c16b0e7404e25b3dc6791920d4655deea509
                                                                                                  • Opcode Fuzzy Hash: 3713addd8ffdd058c57aaa17f93b3cfd7b9d3bf08bbece85aaceba13e537358d
                                                                                                  • Instruction Fuzzy Hash: 8D01F9267083545FDF0B2F7454252AE3FA3EFC5610B4400AAE642DB3D2CF244D168796
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.3422355900.0000000005EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EB0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_5eb0000_RegAsm.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: c80f76b60e32be41f7b62da3e3a7ee4fb2149b452c7afd67c0620c120a019771
                                                                                                  • Instruction ID: 8fb3570da73d4c00d38cd72dde87b761f19e727b0452ea534a2590e5b8975088
                                                                                                  • Opcode Fuzzy Hash: c80f76b60e32be41f7b62da3e3a7ee4fb2149b452c7afd67c0620c120a019771
                                                                                                  • Instruction Fuzzy Hash: 6811FE39E401588FEB04DBF8D850BEEBBF6AF48311F00A161E848E7359E7719942CB51
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.3422355900.0000000005EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EB0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_5eb0000_RegAsm.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 20402bb06f4ea9f7adede93288b9cc06ad9c567159f44876abbf48551d54fad6
                                                                                                  • Instruction ID: 5d60e468bd4b70a3f176a8ab7657a375d48582405fd9b27a5d692afa7858bd8d
                                                                                                  • Opcode Fuzzy Hash: 20402bb06f4ea9f7adede93288b9cc06ad9c567159f44876abbf48551d54fad6
                                                                                                  • Instruction Fuzzy Hash: 421164B680024ADFDB10CF99C945BEEBFF4EF48320F14881AE658A7210D379A554DFA4
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.3422355900.0000000005EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EB0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_5eb0000_RegAsm.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 27c6f1d9f59cc35adaa877cc6e41a7f0c89481793c36cac0069756add4b7324d
                                                                                                  • Instruction ID: 59ef5f7c6935142a6dc947dc7e7cc64b589b4c76659d8a4f5be707b00ebd604f
                                                                                                  • Opcode Fuzzy Hash: 27c6f1d9f59cc35adaa877cc6e41a7f0c89481793c36cac0069756add4b7324d
                                                                                                  • Instruction Fuzzy Hash: 910126327041186BAF09DE699800BEF7BEBEBC8790F48802AF945D7280DFB19C019790
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.3422355900.0000000005EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EB0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_5eb0000_RegAsm.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: e8fe8132077659e969b8506e7c4c29fbd9970c8aea7945deea0a0d642c0c6c4b
                                                                                                  • Instruction ID: b500b1e81fddaebe0f544e6303c55b42168df8ddd4033378a873e37523e0508b
                                                                                                  • Opcode Fuzzy Hash: e8fe8132077659e969b8506e7c4c29fbd9970c8aea7945deea0a0d642c0c6c4b
                                                                                                  • Instruction Fuzzy Hash: 1A01D673A081086BEB15DE65DC01BDF7FAAEBC4750F088029F985C6240DA75D911C790
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.3422355900.0000000005EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EB0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_5eb0000_RegAsm.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 5add11603d068b01f2c2e66f7f48b08d18cb269c448b26f04ad3b34b19d83a55
                                                                                                  • Instruction ID: 3329a3c7cc93092b2cd706814d600fd8fc28a5e7e7b10e00c833a151c3dbac3e
                                                                                                  • Opcode Fuzzy Hash: 5add11603d068b01f2c2e66f7f48b08d18cb269c448b26f04ad3b34b19d83a55
                                                                                                  • Instruction Fuzzy Hash: 3EF0BE323042196B8F09AEA898459EF3AABEFC8360F40402AFA09D7250DA719D1097A5
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.3422355900.0000000005EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EB0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_5eb0000_RegAsm.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 3e96ff4b106419a5a9ec7864484c2383b0148afc0b050b21f54b504b97935446
                                                                                                  • Instruction ID: 7c0449ea81b045c5fc00cd366a598ac3f8e07ea800c20a198340557341fb0e02
                                                                                                  • Opcode Fuzzy Hash: 3e96ff4b106419a5a9ec7864484c2383b0148afc0b050b21f54b504b97935446
                                                                                                  • Instruction Fuzzy Hash: C9F0BE37700219ABDF0A9EA89C45AEE3BA7EFC8310F00402AFA09D7250DA719D1597A4
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.3422355900.0000000005EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EB0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_5eb0000_RegAsm.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 86e0fb57c671319db9b690e84c0ef2f46728a81c1a65c1c537e756eca57c0909
                                                                                                  • Instruction ID: f8e12a1087457859e17f9d24a41aceab6b5bd27d9ae0cd2cc12b032779eedff6
                                                                                                  • Opcode Fuzzy Hash: 86e0fb57c671319db9b690e84c0ef2f46728a81c1a65c1c537e756eca57c0909
                                                                                                  • Instruction Fuzzy Hash: AAD0673AB101089FCB049F99E8509DDF7B6FB98661B048126F915A3261C731A925DB50
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.3422355900.0000000005EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EB0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_5eb0000_RegAsm.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: d2836ccdcd53ddbf726519da61c4cc5f8b35bcac7f30c60600b6e113ed313feb
                                                                                                  • Instruction ID: 176150210ce27380f3f127e7278e53b1e41c41a4fdb887f3fa1d78923470abb4
                                                                                                  • Opcode Fuzzy Hash: d2836ccdcd53ddbf726519da61c4cc5f8b35bcac7f30c60600b6e113ed313feb
                                                                                                  • Instruction Fuzzy Hash: 2CC012301007098BD509F775E84556A3B9EA6C0704B409558A1051954DFFF829455690
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.3422355900.0000000005EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EB0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_5eb0000_RegAsm.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 8c1b1cdc4655add5c496da125417960f7fc34e171e55ac543c7fe63b410bf914
                                                                                                  • Instruction ID: 5c2254371faa12db859b1a315ec3848d20f0c26a932e73b74eb58ede5b9d723a
                                                                                                  • Opcode Fuzzy Hash: 8c1b1cdc4655add5c496da125417960f7fc34e171e55ac543c7fe63b410bf914
                                                                                                  • Instruction Fuzzy Hash: F1C1B274E01218CFEB14DFA5C984B9DBBB2BF89300F2091A9D409AB365DB759E85CF50
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.3422355900.0000000005EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EB0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_5eb0000_RegAsm.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 92da63ad82591f8319804288d1f4857c79ca91fd79220e960366d800b1a96ec4
                                                                                                  • Instruction ID: 36df8802879602e2f031d1f34c402b338cc6a7d7613278897346042dabfdc203
                                                                                                  • Opcode Fuzzy Hash: 92da63ad82591f8319804288d1f4857c79ca91fd79220e960366d800b1a96ec4
                                                                                                  • Instruction Fuzzy Hash: A5C1B374E01218CFEB14DFA5C984B9DBBB2BF89300F2091A9D409AB365DB759E85CF10
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.3422355900.0000000005EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EB0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_5eb0000_RegAsm.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: d0ac1e4edbeeccb477f66993a2aaf33795b0c1ddb1d6dd243382a77dc19d18c0
                                                                                                  • Instruction ID: 08d1ebd8734417189c8ea2fd0eab615e3eeef66661b7a99f2113762df2e99e52
                                                                                                  • Opcode Fuzzy Hash: d0ac1e4edbeeccb477f66993a2aaf33795b0c1ddb1d6dd243382a77dc19d18c0
                                                                                                  • Instruction Fuzzy Hash: 9FC1C174E01218CFEB14DFA5C994B9DBBB2BF89300F1091A9D409AB3A5DB759E85CF10
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.3422355900.0000000005EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EB0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_5eb0000_RegAsm.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: b62b4c036a26f1b1cf63804b61f6a499838148bdf3b5d0e75094358f4d36ffb3
                                                                                                  • Instruction ID: c854af9ad808f225829e7bfdcca9408d18ad92e8032419039680582ba5cc59b8
                                                                                                  • Opcode Fuzzy Hash: b62b4c036a26f1b1cf63804b61f6a499838148bdf3b5d0e75094358f4d36ffb3
                                                                                                  • Instruction Fuzzy Hash: 87C1A174E01218CFEB14DFA5C984B9DBBB2BF89300F2091A9D409AB365DB759E85CF50
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.3422355900.0000000005EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EB0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_5eb0000_RegAsm.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 3283485a20e22fb41e3eb6a4bce12270315f33d8a3aea277f065f42106d2520f
                                                                                                  • Instruction ID: 65eece100b4f1f312a247cf0e827a9ac4912c3b480edc4a8b067d91b85fbc5de
                                                                                                  • Opcode Fuzzy Hash: 3283485a20e22fb41e3eb6a4bce12270315f33d8a3aea277f065f42106d2520f
                                                                                                  • Instruction Fuzzy Hash: 49C1A074E01218CFEB14DFA5C984B9DBBB2BF89300F2091A9D409AB365DB759E85CF50
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.3422355900.0000000005EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EB0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_5eb0000_RegAsm.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: a6f6ed2f9dd83a51390f0537bbe42430ea3c513b8d903e23c1af3e6cdaf6cd69
                                                                                                  • Instruction ID: 8b2ca55db1dcfdee3898330e2cccf6950e0c7d7066340ef7be6f2ffdc7dcf562
                                                                                                  • Opcode Fuzzy Hash: a6f6ed2f9dd83a51390f0537bbe42430ea3c513b8d903e23c1af3e6cdaf6cd69
                                                                                                  • Instruction Fuzzy Hash: 76C1B174E01218CFEB14DFA5C994B9DBBB2BF89300F1091A9D409AB3A5DB759E85CF10
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.3422355900.0000000005EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EB0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_5eb0000_RegAsm.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: c18494d7508f38650f954ea39222787f776ec2181e0faa6d2804ea6705544c96
                                                                                                  • Instruction ID: 6cb16bdceb3e01cedf14e0af7baec6122ad96e15592c2a2184d520f935bd58c2
                                                                                                  • Opcode Fuzzy Hash: c18494d7508f38650f954ea39222787f776ec2181e0faa6d2804ea6705544c96
                                                                                                  • Instruction Fuzzy Hash: E2C19F74E01218CFEB14DFA5C994BDDBBB2BF89300F2091A9D409AB365DB759A85CF10
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.3422355900.0000000005EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EB0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_5eb0000_RegAsm.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 5160bd2fa1f1c4fb8e28fe921abcfd7e181d6f5376e6b1187d9a8ac3f88cb291
                                                                                                  • Instruction ID: 74dc9f0d682f5074a988842cf8099727b17cf4fac11ac00e339cc2f52067b7db
                                                                                                  • Opcode Fuzzy Hash: 5160bd2fa1f1c4fb8e28fe921abcfd7e181d6f5376e6b1187d9a8ac3f88cb291
                                                                                                  • Instruction Fuzzy Hash: 22C1B274E01218CFEB14DFA5C944B9DBBB2BF89300F2091A9D409AB365DB755E85CF50
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.3422355900.0000000005EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EB0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_5eb0000_RegAsm.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 328d6106bc21ac9792501a0000ac5d2d5dcba14e4b75afad2160fa111b120453
                                                                                                  • Instruction ID: acc392d23a7e542c5a34b0b876d3d069f936fcf23849d36fc2755e78094cadb1
                                                                                                  • Opcode Fuzzy Hash: 328d6106bc21ac9792501a0000ac5d2d5dcba14e4b75afad2160fa111b120453
                                                                                                  • Instruction Fuzzy Hash: 8CC1B374E01218CFEB14DFA5C984B9DBBB2BF89304F2091A9D409AB365DB759E85CF10
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.3422355900.0000000005EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EB0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_5eb0000_RegAsm.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 414f282f2d6ea5153ec7305304d490b84ae52a7ba6e699a199d7e1c19649a11f
                                                                                                  • Instruction ID: 4ddbf974a6a366c65e56fbe5b6e9fa52b98c0c2a9c82eca3cdbc9b016708c969
                                                                                                  • Opcode Fuzzy Hash: 414f282f2d6ea5153ec7305304d490b84ae52a7ba6e699a199d7e1c19649a11f
                                                                                                  • Instruction Fuzzy Hash: C1C1B374E01218CFEB14DFA5C944B9DBBB2BF89300F6091A9D409AB365DB755E85CF10
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.3422355900.0000000005EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EB0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_5eb0000_RegAsm.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 55c5e901ea7bdba399129b44dded4e566137ac76d22b3e6fcda4dbd070066a12
                                                                                                  • Instruction ID: ca21a7ac2e2fd9afc695bcd950761c69002dca5bd996980047c121d949f603d2
                                                                                                  • Opcode Fuzzy Hash: 55c5e901ea7bdba399129b44dded4e566137ac76d22b3e6fcda4dbd070066a12
                                                                                                  • Instruction Fuzzy Hash: CFC1AF74E01218CFEB14DFA5C984BDDBBB2BF89300F1091A9D409AB3A5DB759A85CF50
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.3422355900.0000000005EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EB0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_5eb0000_RegAsm.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 22df5931daf8366556f05ee62736aeb924147d9f920108a93cd04759a6c55942
                                                                                                  • Instruction ID: 1e6e8a05e49c29ef1ff79670ebd7a40a51b2b3860d018b32cada88d1e69eb55d
                                                                                                  • Opcode Fuzzy Hash: 22df5931daf8366556f05ee62736aeb924147d9f920108a93cd04759a6c55942
                                                                                                  • Instruction Fuzzy Hash: C5C1B174E01218CFEB14DFA5C984B9DBBB2BF89300F1091A9D409AB3A5DB759E85DF10
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.3422355900.0000000005EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EB0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_5eb0000_RegAsm.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 94ab18f0fa094fdbbd9f97942d00abc1ba4c254e1db66ed7eb510872c77ed1af
                                                                                                  • Instruction ID: 8329a69be348823c835610fe77196eb7f3b5fe668e1f039b270a47563e34c5d9
                                                                                                  • Opcode Fuzzy Hash: 94ab18f0fa094fdbbd9f97942d00abc1ba4c254e1db66ed7eb510872c77ed1af
                                                                                                  • Instruction Fuzzy Hash: D1C1B274E01218CFEB14DFA5C944B9DBBB2BF89300F2091A9D409AB365DB759E85CF50
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.3422355900.0000000005EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EB0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_5eb0000_RegAsm.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 3735d6e49f46c4babf2a0ef3133eedb80028203237935a5f8679c3b83fa9447a
                                                                                                  • Instruction ID: aee275db1544afa8fa801f3a4b39ef881763b50d07dd8cf257d08c35aab5b055
                                                                                                  • Opcode Fuzzy Hash: 3735d6e49f46c4babf2a0ef3133eedb80028203237935a5f8679c3b83fa9447a
                                                                                                  • Instruction Fuzzy Hash: CAC1C274E01218CFEB14DFA5C984B9EBBB2BF89300F1091A9D409AB365DB759E85CF50
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.3422355900.0000000005EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EB0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_5eb0000_RegAsm.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 9aceb548e32f40e411f6314d50f7a8a219c31b28912b34650614151b0be5352c
                                                                                                  • Instruction ID: 6863263b80651c73e231e5baab48218c4e9e437162bf0cb3faebbfd968dff0e5
                                                                                                  • Opcode Fuzzy Hash: 9aceb548e32f40e411f6314d50f7a8a219c31b28912b34650614151b0be5352c
                                                                                                  • Instruction Fuzzy Hash: F1C19F74E01218CFEB14DFA5C984BDDBBB2BF89300F2091A9D409AB365DB759A85CF50
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.3422355900.0000000005EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EB0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_5eb0000_RegAsm.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 460142d2f88bcad1810ef4be31c5af32feb55dc2a3bb51c28c0e22adaefd65d2
                                                                                                  • Instruction ID: 1bc2430256718e0736063f9ae922934df93040a8428654db8d9a16b158e28273
                                                                                                  • Opcode Fuzzy Hash: 460142d2f88bcad1810ef4be31c5af32feb55dc2a3bb51c28c0e22adaefd65d2
                                                                                                  • Instruction Fuzzy Hash: B3C1B274E01218CFEB14DFA5C944B9EBBB2BF89300F1091A9D409AB365DB759E85DF10
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.3422355900.0000000005EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EB0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_5eb0000_RegAsm.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 32b7e38c623b1d7926665f6c35f2a383fc02ed107d71037bf446e11e6008c40e
                                                                                                  • Instruction ID: 2fc95a9fad12fe3ca8065ceb25a7ea4f2a85603f092553492c982cb26bed2cbf
                                                                                                  • Opcode Fuzzy Hash: 32b7e38c623b1d7926665f6c35f2a383fc02ed107d71037bf446e11e6008c40e
                                                                                                  • Instruction Fuzzy Hash: B6C1B374E01218CFEB14DFA5C994B9DBBB2BF89300F1091A9D409AB3A5DB759E85CF10
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.3422355900.0000000005EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EB0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_5eb0000_RegAsm.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: a9558f5dac9342dba66c22d0978e37d3c420b75639ed3f5b2fcb2e8eba1e4bfb
                                                                                                  • Instruction ID: 65c1596ed619b57ab721deb151f7fa2549824b715e11444eb3d680889338a93d
                                                                                                  • Opcode Fuzzy Hash: a9558f5dac9342dba66c22d0978e37d3c420b75639ed3f5b2fcb2e8eba1e4bfb
                                                                                                  • Instruction Fuzzy Hash: C7C1A174E01218CFEB14DFA5C994B9EBBB2BF89300F1091A9D409AB365DB759E85CF10
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.3422355900.0000000005EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EB0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_5eb0000_RegAsm.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 43bd6c91899d68c2b37907fdd6886b70e3dba285738746f007e17de9e0e9f640
                                                                                                  • Instruction ID: 0d670275068951efc0ce5103d81608c11a89ef8e74ba842d52eed163cf980f24
                                                                                                  • Opcode Fuzzy Hash: 43bd6c91899d68c2b37907fdd6886b70e3dba285738746f007e17de9e0e9f640
                                                                                                  • Instruction Fuzzy Hash: D0C1B074E01218CFEB14DFA5C984B9DBBB2BF89300F1091A9D409AB3A5DB759E85CF10
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.3422355900.0000000005EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EB0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_5eb0000_RegAsm.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 66ff3859a6021f6e5f2e1b3c13571c15adbc6d055fbc49a77341fac177178ccd
                                                                                                  • Instruction ID: 6a6b8476b99e38fdf6a50036abe43df242c116a92c82538ac5bcbbf52941fdaa
                                                                                                  • Opcode Fuzzy Hash: 66ff3859a6021f6e5f2e1b3c13571c15adbc6d055fbc49a77341fac177178ccd
                                                                                                  • Instruction Fuzzy Hash: 3EC1C174E00218CFEB14DFA5C985B9DBBB2BF88300F2095A9D409AB365DB759E85CF10
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.3422355900.0000000005EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EB0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_5eb0000_RegAsm.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: beb137ee06ef4cd489ee4f7c0c812784b666be4729867103757416f56f79e1a7
                                                                                                  • Instruction ID: dad4e7aa4f37eb2d1d2010c74e43ab1c3c3c3f959eb09c935da5c1c09d6f1d15
                                                                                                  • Opcode Fuzzy Hash: beb137ee06ef4cd489ee4f7c0c812784b666be4729867103757416f56f79e1a7
                                                                                                  • Instruction Fuzzy Hash: 4CC1B174E01218CFEB14DFA5C984B9DBBB2BF89300F2091A9D409AB365DB759E85CF50
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.3422355900.0000000005EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EB0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_5eb0000_RegAsm.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 4454f3802bf5e290fc77b6d2446b5aa6264418c5ef6a8b43138787eb0531b44b
                                                                                                  • Instruction ID: bfb1d1a769cf9b1483a5598435f869ff14a10762bbecad27c0571bee82944980
                                                                                                  • Opcode Fuzzy Hash: 4454f3802bf5e290fc77b6d2446b5aa6264418c5ef6a8b43138787eb0531b44b
                                                                                                  • Instruction Fuzzy Hash: 58C1C474E01218CFEB14DFA5C944B9DBBB2BF89300F1091A9D409AB355DB759E85CF10
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.3422355900.0000000005EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EB0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_5eb0000_RegAsm.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: ac1d595a0b755aceb695a24db61ce1bc1d024fad95c66be11a6159d6fbbccf7e
                                                                                                  • Instruction ID: 365cf8c1733cdaa2ab4468487c658fed3f0995a6e15603a2e19e50dfbdb4aa39
                                                                                                  • Opcode Fuzzy Hash: ac1d595a0b755aceb695a24db61ce1bc1d024fad95c66be11a6159d6fbbccf7e
                                                                                                  • Instruction Fuzzy Hash: 9EC1B174E01218CFEB14DFA5C984B9DBBB2BF89300F2091A9D409AB365DB759E85CF10
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.3422355900.0000000005EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EB0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_5eb0000_RegAsm.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 3cd5eedb58899ebb93c747213adba6ef63282fb834ca711035bc8edfa65095df
                                                                                                  • Instruction ID: 10bab1ee4d62129e21bae9a908cfc0276303004f9ae332f86d5c52e4d4383887
                                                                                                  • Opcode Fuzzy Hash: 3cd5eedb58899ebb93c747213adba6ef63282fb834ca711035bc8edfa65095df
                                                                                                  • Instruction Fuzzy Hash: 9EC1C274E01218CFEB14DFA5C984B9EBBB2BF89300F1095A9D409AB365DB759E85CF10
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.3422355900.0000000005EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EB0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_5eb0000_RegAsm.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 4cdffc8b4d52f1f045450dac0805b8b7682cbee2f2be5b834aeb7c70599c0cbc
                                                                                                  • Instruction ID: bec730a34a90049c588e9ab8e239d7e54b6e45af5693000324eba4a19651feec
                                                                                                  • Opcode Fuzzy Hash: 4cdffc8b4d52f1f045450dac0805b8b7682cbee2f2be5b834aeb7c70599c0cbc
                                                                                                  • Instruction Fuzzy Hash: 84C1A074E01218CFEB14DFA5C984B9DBBB2BF89300F1091A9D409AB365DB759E85CF50
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.3422355900.0000000005EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EB0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_5eb0000_RegAsm.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 385c530a3088b8845b3097dc3481fbde7c10628b1861c74680d58dc93c6ca06f
                                                                                                  • Instruction ID: bc2e6119fad245524e00226dbc8703b331c4f1ea4bbf32e965c62482bf4abd7d
                                                                                                  • Opcode Fuzzy Hash: 385c530a3088b8845b3097dc3481fbde7c10628b1861c74680d58dc93c6ca06f
                                                                                                  • Instruction Fuzzy Hash: D0C1B174E01218CFEB14DFA5C984B9DBBB2BF89300F2091A9D409AB365DB759E85DF10
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.3422355900.0000000005EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EB0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_5eb0000_RegAsm.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 199d34f04a00c1d5779c35f9f12f5db0be3f56c7c7f4b528071f48e7899704df
                                                                                                  • Instruction ID: 6d141848b4ea5d6e6fd28c7605ab486397528e93ad495d2356abbb7d4148e58f
                                                                                                  • Opcode Fuzzy Hash: 199d34f04a00c1d5779c35f9f12f5db0be3f56c7c7f4b528071f48e7899704df
                                                                                                  • Instruction Fuzzy Hash: A1C1A174E01218CFEB14DFA5C984B9DBBB2BF89300F1091A9D409AB365DB759E85DF10
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.3422355900.0000000005EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EB0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_5eb0000_RegAsm.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 17f194c67ca3f83b70c6a9a48f11a877be913b8494ccc4fa5d505abd7ac0b72b
                                                                                                  • Instruction ID: c0c22af1d99204a45eb1e7c9c0c811190df2d624481fb7f05c95d4c3621304fb
                                                                                                  • Opcode Fuzzy Hash: 17f194c67ca3f83b70c6a9a48f11a877be913b8494ccc4fa5d505abd7ac0b72b
                                                                                                  • Instruction Fuzzy Hash: 80C1B174E01218CFEB14DFA5C984B9DBBB2BF89300F2091A9D409AB365DB759E85CF50
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.3422355900.0000000005EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EB0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_5eb0000_RegAsm.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 62d9e285ba4426c4bb743c76eb9a654f77b78988fc21f273beb38562be979ee6
                                                                                                  • Instruction ID: 846ab62edf08bdbf3f1eeb1071dbe0fa261d0048c1783c2407122e1e97dd4218
                                                                                                  • Opcode Fuzzy Hash: 62d9e285ba4426c4bb743c76eb9a654f77b78988fc21f273beb38562be979ee6
                                                                                                  • Instruction Fuzzy Hash: 71C1A174E01218CFEB14EFA5C984B9DBBB2BF89300F1091A9D409AB365DB759E85CF50
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.3422355900.0000000005EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EB0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_5eb0000_RegAsm.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: b4f51f2c77a5184bf9375e05aa6ea32a106e980cfd8329ebbf0a89ffbfbca6e3
                                                                                                  • Instruction ID: 654b6bca3c418987588f0b5b88e190e311796581842315cac08bca8b9d251a5b
                                                                                                  • Opcode Fuzzy Hash: b4f51f2c77a5184bf9375e05aa6ea32a106e980cfd8329ebbf0a89ffbfbca6e3
                                                                                                  • Instruction Fuzzy Hash: C6C1A074E01218CFEB14DFA5C984B9DBBB2BF89300F2091A9D409AB365DB759E85CF10
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.3422355900.0000000005EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EB0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_5eb0000_RegAsm.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: e47a31191b896636a3f6778e256a55f4177a4bb3163c1fa8132e609fe033da0a
                                                                                                  • Instruction ID: d9f113f5f0faeda49267dba4cf8681a588e16da9f3a5cd3464f198eebac1676c
                                                                                                  • Opcode Fuzzy Hash: e47a31191b896636a3f6778e256a55f4177a4bb3163c1fa8132e609fe033da0a
                                                                                                  • Instruction Fuzzy Hash: A1C1A074E01218CFEB14DFA5C984B9DBBB2BF89300F1091A9D409AB3A5DB759E85CF10
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.3422355900.0000000005EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EB0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_5eb0000_RegAsm.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: 2637927e264cb091366a7a954fbc6ceaa57625aae45c9f45107b59ef460b823b
                                                                                                  • Instruction ID: 19e0b3ca9c08e08907af74c726627f924b846b1d691b7a4f04714590b643cd3a
                                                                                                  • Opcode Fuzzy Hash: 2637927e264cb091366a7a954fbc6ceaa57625aae45c9f45107b59ef460b823b
                                                                                                  • Instruction Fuzzy Hash: EFC1A174E01218CFEB14DFA5C984B9DBBB2BF89300F1091A9D409AB365DB759E85CF50
                                                                                                  Memory Dump Source
                                                                                                  • Source File: 00000005.00000002.3422355900.0000000005EB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EB0000, based on PE: false
                                                                                                  Joe Sandbox IDA Plugin
                                                                                                  • Snapshot File: hcaresult_5_2_5eb0000_RegAsm.jbxd
                                                                                                  Similarity
                                                                                                  • API ID:
                                                                                                  • String ID:
                                                                                                  • API String ID:
                                                                                                  • Opcode ID: ebc51efc0802af7bca8bf6ef8a911082f10f5a194227ca92e32d6cb128ebd561
                                                                                                  • Instruction ID: 2e0522ce2b6a4227c7a682ad06d33e50f75e956eca8402a7f85f7387882f4992
                                                                                                  • Opcode Fuzzy Hash: ebc51efc0802af7bca8bf6ef8a911082f10f5a194227ca92e32d6cb128ebd561
                                                                                                  • Instruction Fuzzy Hash: 89C1B174E01218CFEB14DFA5C994B9EBBB2BF89300F1091A9D409AB365DB759E85CF10