Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SBkuP3ACSA.exe

Overview

General Information

Sample name:SBkuP3ACSA.exe
renamed because original name is a hash value
Original sample name:d0d28661ec38fa97bd723628c065471e1c58b6d3918fd988b43cdf0aee2815a3.exe
Analysis ID:1587819
MD5:22b0c4defec129bb6a33fc44f1499910
SHA1:4f5d255970be2c547916a72d2db99ed5b02a89b7
SHA256:d0d28661ec38fa97bd723628c065471e1c58b6d3918fd988b43cdf0aee2815a3
Tags:exeSnakeKeyloggeruser-adrian__luca
Infos:

Detection

Snake Keylogger
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected AntiVM3
Yara detected Snake Keylogger
AI detected suspicious sample
Machine Learning detection for sample
Self deletion via cmd or bat file
Tries to detect the country of the analysis system (by using the IP)
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • SBkuP3ACSA.exe (PID: 3424 cmdline: "C:\Users\user\Desktop\SBkuP3ACSA.exe" MD5: 22B0C4DEFEC129BB6A33FC44F1499910)
    • SBkuP3ACSA.exe (PID: 2452 cmdline: "C:\Users\user\Desktop\SBkuP3ACSA.exe" MD5: 22B0C4DEFEC129BB6A33FC44F1499910)
      • cmd.exe (PID: 3224 cmdline: "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\user\Desktop\SBkuP3ACSA.exe" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
        • conhost.exe (PID: 6788 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
        • choice.exe (PID: 768 cmdline: choice /C Y /N /D Y /T 3 MD5: FCE0E41C87DC4ABBE976998AD26C27E4)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
404 Keylogger, Snake KeyloggerSnake Keylogger (aka 404 Keylogger) is a subscription-based keylogger that has many capabilities. The infostealer can steal a victims sensitive information, log keyboard strokes, take screenshots and extract information from the system clipboard. It was initially released on a Russian hacking forum in August 2019. It is notable for its relatively unusual methods of data exfiltration, including via email, FTP, SMTP, Pastebin or the messaging app Telegram.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.404keylogger
{"Exfil Mode": "SMTP", "Username": "frankichong@yulifertilizer.com.my", "Password": "Ayfc931319*", "Host": "mail.yulifertilizer.com.my", "Port": "25", "Version": "5.1"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.3315691533.0000000005090000.00000004.08000000.00040000.00000000.sdmpMALWARE_Win_DLInjector02Detects downloader injectorditekSHen
  • 0x4ae6b:$x1: In$J$ct0r
00000002.00000002.2195327620.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000002.00000002.2195327620.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
      00000002.00000002.2195327620.0000000000402000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
      • 0x14a31:$a1: get_encryptedPassword
      • 0x14d1d:$a2: get_encryptedUsername
      • 0x1483d:$a3: get_timePasswordChanged
      • 0x14938:$a4: get_passwordField
      • 0x14a47:$a5: set_encryptedPassword
      • 0x160c0:$a7: get_logins
      • 0x16023:$a10: KeyLoggerEventArgs
      • 0x15c8e:$a11: KeyLoggerEventArgsEventHandler
      00000002.00000002.2195327620.0000000000402000.00000040.00000400.00020000.00000000.sdmpMALWARE_Win_SnakeKeyloggerDetects Snake KeyloggerditekSHen
      • 0x18294:$x1: $%SMTPDV$
      • 0x182fa:$x2: $#TheHashHere%&
      • 0x1997b:$x3: %FTPDV$
      • 0x19a6f:$x4: $%TelegramDv$
      • 0x15c8e:$x5: KeyLoggerEventArgs
      • 0x16023:$x5: KeyLoggerEventArgs
      • 0x1999f:$m2: Clipboard Logs ID
      • 0x19bbf:$m2: Screenshot Logs ID
      • 0x19ccf:$m2: keystroke Logs ID
      • 0x19fa9:$m3: SnakePW
      • 0x19b97:$m4: \SnakeKeylogger\
      Click to see the 14 entries
      SourceRuleDescriptionAuthorStrings
      0.2.SBkuP3ACSA.exe.3778610.3.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        0.2.SBkuP3ACSA.exe.3778610.3.unpackJoeSecurity_SnakeKeyloggerYara detected Snake KeyloggerJoe Security
          0.2.SBkuP3ACSA.exe.3778610.3.unpackWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
          • 0x12e31:$a1: get_encryptedPassword
          • 0x1311d:$a2: get_encryptedUsername
          • 0x12c3d:$a3: get_timePasswordChanged
          • 0x12d38:$a4: get_passwordField
          • 0x12e47:$a5: set_encryptedPassword
          • 0x144c0:$a7: get_logins
          • 0x14423:$a10: KeyLoggerEventArgs
          • 0x1408e:$a11: KeyLoggerEventArgsEventHandler
          0.2.SBkuP3ACSA.exe.3778610.3.unpackMAL_Envrial_Jan18_1Detects Encrial credential stealer malwareFlorian Roth
          • 0x1a779:$a2: \Comodo\Dragon\User Data\Default\Login Data
          • 0x199ab:$a3: \Google\Chrome\User Data\Default\Login Data
          • 0x19dde:$a4: \Orbitum\User Data\Default\Login Data
          • 0x1ae1d:$a5: \Kometa\User Data\Default\Login Data
          0.2.SBkuP3ACSA.exe.3778610.3.unpackINDICATOR_SUSPICIOUS_EXE_DotNetProcHookDetects executables with potential process hoockingditekSHen
          • 0x13a09:$s1: UnHook
          • 0x13a10:$s2: SetHook
          • 0x13a18:$s3: CallNextHook
          • 0x13a25:$s4: _hook
          Click to see the 40 entries
          No Sigma rule has matched
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2025-01-10T18:20:26.548608+010028033053Unknown Traffic192.168.2.549709104.21.16.1443TCP
          2025-01-10T18:20:27.788391+010028033053Unknown Traffic192.168.2.549711104.21.16.1443TCP
          2025-01-10T18:20:35.140115+010028033053Unknown Traffic192.168.2.549723104.21.16.1443TCP
          TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
          2025-01-10T18:20:24.784668+010028032742Potentially Bad Traffic192.168.2.549704193.122.6.16880TCP
          2025-01-10T18:20:25.972201+010028032742Potentially Bad Traffic192.168.2.549704193.122.6.16880TCP
          2025-01-10T18:20:27.237809+010028032742Potentially Bad Traffic192.168.2.549710193.122.6.16880TCP

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: SBkuP3ACSA.exeAvira: detected
          Source: 00000002.00000002.2195327620.0000000000402000.00000040.00000400.00020000.00000000.sdmpMalware Configuration Extractor: Snake Keylogger {"Exfil Mode": "SMTP", "Username": "frankichong@yulifertilizer.com.my", "Password": "Ayfc931319*", "Host": "mail.yulifertilizer.com.my", "Port": "25", "Version": "5.1"}
          Source: SBkuP3ACSA.exeVirustotal: Detection: 80%Perma Link
          Source: SBkuP3ACSA.exeReversingLabs: Detection: 78%
          Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
          Source: SBkuP3ACSA.exeJoe Sandbox ML: detected

          Location Tracking

          barindex
          Source: unknownDNS query: name: reallyfreegeoip.org
          Source: SBkuP3ACSA.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
          Source: unknownHTTPS traffic detected: 104.21.16.1:443 -> 192.168.2.5:49707 version: TLS 1.0
          Source: SBkuP3ACSA.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Source: Binary string: C:\Users\GT350\source\repos\UpdatedRunpe\UpdatedRunpe\obj\x86\Debug\AQipUvwTwkLZyiCs.pdb source: SBkuP3ACSA.exe, 00000000.00000002.3315863367.00000000050F0000.00000004.08000000.00040000.00000000.sdmp, SBkuP3ACSA.exe, 00000000.00000002.3312873596.0000000002691000.00000004.00000800.00020000.00000000.sdmp

          Networking

          barindex
          Source: Yara matchFile source: 2.2.SBkuP3ACSA.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.SBkuP3ACSA.exe.3799240.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.SBkuP3ACSA.exe.3778610.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.SBkuP3ACSA.exe.36e7f70.4.raw.unpack, type: UNPACKEDPE
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
          Source: Joe Sandbox ViewIP Address: 104.21.16.1 104.21.16.1
          Source: Joe Sandbox ViewIP Address: 193.122.6.168 193.122.6.168
          Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
          Source: unknownDNS query: name: checkip.dyndns.org
          Source: unknownDNS query: name: reallyfreegeoip.org
          Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49710 -> 193.122.6.168:80
          Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49704 -> 193.122.6.168:80
          Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49711 -> 104.21.16.1:443
          Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49709 -> 104.21.16.1:443
          Source: Network trafficSuricata IDS: 2803305 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern H : 192.168.2.5:49723 -> 104.21.16.1:443
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: unknownHTTPS traffic detected: 104.21.16.1:443 -> 192.168.2.5:49707 version: TLS 1.0
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
          Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
          Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
          Source: SBkuP3ACSA.exe, 00000002.00000002.2196563053.0000000002EB1000.00000004.00000800.00020000.00000000.sdmp, SBkuP3ACSA.exe, 00000002.00000002.2196563053.0000000002EFB000.00000004.00000800.00020000.00000000.sdmp, SBkuP3ACSA.exe, 00000002.00000002.2196563053.0000000002E03000.00000004.00000800.00020000.00000000.sdmp, SBkuP3ACSA.exe, 00000002.00000002.2196563053.0000000002EED000.00000004.00000800.00020000.00000000.sdmp, SBkuP3ACSA.exe, 00000002.00000002.2196563053.0000000002E96000.00000004.00000800.00020000.00000000.sdmp, SBkuP3ACSA.exe, 00000002.00000002.2196563053.0000000002EA3000.00000004.00000800.00020000.00000000.sdmp, SBkuP3ACSA.exe, 00000002.00000002.2196563053.0000000002EBF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
          Source: SBkuP3ACSA.exe, 00000002.00000002.2196563053.0000000002EB1000.00000004.00000800.00020000.00000000.sdmp, SBkuP3ACSA.exe, 00000002.00000002.2196563053.0000000002ECD000.00000004.00000800.00020000.00000000.sdmp, SBkuP3ACSA.exe, 00000002.00000002.2196563053.0000000002EFB000.00000004.00000800.00020000.00000000.sdmp, SBkuP3ACSA.exe, 00000002.00000002.2196563053.0000000002E03000.00000004.00000800.00020000.00000000.sdmp, SBkuP3ACSA.exe, 00000002.00000002.2196563053.0000000002DF4000.00000004.00000800.00020000.00000000.sdmp, SBkuP3ACSA.exe, 00000002.00000002.2196563053.0000000002EED000.00000004.00000800.00020000.00000000.sdmp, SBkuP3ACSA.exe, 00000002.00000002.2196563053.0000000002E96000.00000004.00000800.00020000.00000000.sdmp, SBkuP3ACSA.exe, 00000002.00000002.2196563053.0000000002EA3000.00000004.00000800.00020000.00000000.sdmp, SBkuP3ACSA.exe, 00000002.00000002.2196563053.0000000002E46000.00000004.00000800.00020000.00000000.sdmp, SBkuP3ACSA.exe, 00000002.00000002.2196563053.0000000002EBF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
          Source: SBkuP3ACSA.exe, 00000002.00000002.2196563053.0000000002D41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
          Source: SBkuP3ACSA.exe, 00000000.00000002.3314447238.0000000003699000.00000004.00000800.00020000.00000000.sdmp, SBkuP3ACSA.exe, 00000002.00000002.2195327620.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
          Source: SBkuP3ACSA.exe, 00000002.00000002.2196563053.0000000002EB1000.00000004.00000800.00020000.00000000.sdmp, SBkuP3ACSA.exe, 00000002.00000002.2196563053.0000000002EFB000.00000004.00000800.00020000.00000000.sdmp, SBkuP3ACSA.exe, 00000002.00000002.2196563053.0000000002EED000.00000004.00000800.00020000.00000000.sdmp, SBkuP3ACSA.exe, 00000002.00000002.2196563053.0000000002E96000.00000004.00000800.00020000.00000000.sdmp, SBkuP3ACSA.exe, 00000002.00000002.2196563053.0000000002EA3000.00000004.00000800.00020000.00000000.sdmp, SBkuP3ACSA.exe, 00000002.00000002.2196563053.0000000002E1B000.00000004.00000800.00020000.00000000.sdmp, SBkuP3ACSA.exe, 00000002.00000002.2196563053.0000000002EBF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.org
          Source: SBkuP3ACSA.exe, 00000002.00000002.2196563053.0000000002D41000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
          Source: SBkuP3ACSA.exe, 00000002.00000002.2196563053.0000000002EB1000.00000004.00000800.00020000.00000000.sdmp, SBkuP3ACSA.exe, 00000002.00000002.2196563053.0000000002EFB000.00000004.00000800.00020000.00000000.sdmp, SBkuP3ACSA.exe, 00000002.00000002.2196563053.0000000002E03000.00000004.00000800.00020000.00000000.sdmp, SBkuP3ACSA.exe, 00000002.00000002.2196563053.0000000002EED000.00000004.00000800.00020000.00000000.sdmp, SBkuP3ACSA.exe, 00000002.00000002.2196563053.0000000002E96000.00000004.00000800.00020000.00000000.sdmp, SBkuP3ACSA.exe, 00000002.00000002.2196563053.0000000002EA3000.00000004.00000800.00020000.00000000.sdmp, SBkuP3ACSA.exe, 00000002.00000002.2196563053.0000000002E46000.00000004.00000800.00020000.00000000.sdmp, SBkuP3ACSA.exe, 00000002.00000002.2196563053.0000000002EBF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
          Source: SBkuP3ACSA.exe, 00000000.00000002.3314447238.0000000003699000.00000004.00000800.00020000.00000000.sdmp, SBkuP3ACSA.exe, 00000002.00000002.2196563053.0000000002E03000.00000004.00000800.00020000.00000000.sdmp, SBkuP3ACSA.exe, 00000002.00000002.2195327620.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
          Source: SBkuP3ACSA.exe, 00000002.00000002.2196563053.0000000002EBF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189
          Source: SBkuP3ACSA.exe, 00000002.00000002.2196563053.0000000002EB1000.00000004.00000800.00020000.00000000.sdmp, SBkuP3ACSA.exe, 00000002.00000002.2196563053.0000000002EFB000.00000004.00000800.00020000.00000000.sdmp, SBkuP3ACSA.exe, 00000002.00000002.2196563053.0000000002EED000.00000004.00000800.00020000.00000000.sdmp, SBkuP3ACSA.exe, 00000002.00000002.2196563053.0000000002E96000.00000004.00000800.00020000.00000000.sdmp, SBkuP3ACSA.exe, 00000002.00000002.2196563053.0000000002EA3000.00000004.00000800.00020000.00000000.sdmp, SBkuP3ACSA.exe, 00000002.00000002.2196563053.0000000002E46000.00000004.00000800.00020000.00000000.sdmp, SBkuP3ACSA.exe, 00000002.00000002.2196563053.0000000002EBF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189$
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
          Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
          Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49717
          Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
          Source: unknownNetwork traffic detected: HTTP traffic on port 49717 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723

          System Summary

          barindex
          Source: 0.2.SBkuP3ACSA.exe.3778610.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
          Source: 0.2.SBkuP3ACSA.exe.3778610.3.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
          Source: 0.2.SBkuP3ACSA.exe.3778610.3.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
          Source: 0.2.SBkuP3ACSA.exe.3778610.3.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
          Source: 0.2.SBkuP3ACSA.exe.28e52ac.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects downloader injector Author: ditekSHen
          Source: 0.2.SBkuP3ACSA.exe.5090000.5.raw.unpack, type: UNPACKEDPEMatched rule: Detects downloader injector Author: ditekSHen
          Source: 0.2.SBkuP3ACSA.exe.36e7f70.4.unpack, type: UNPACKEDPEMatched rule: Detects downloader injector Author: ditekSHen
          Source: 0.2.SBkuP3ACSA.exe.3799240.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
          Source: 0.2.SBkuP3ACSA.exe.3799240.2.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
          Source: 0.2.SBkuP3ACSA.exe.3799240.2.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
          Source: 0.2.SBkuP3ACSA.exe.3799240.2.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
          Source: 0.2.SBkuP3ACSA.exe.28e2a6c.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects downloader injector Author: ditekSHen
          Source: 0.2.SBkuP3ACSA.exe.5090000.5.unpack, type: UNPACKEDPEMatched rule: Detects downloader injector Author: ditekSHen
          Source: 2.2.SBkuP3ACSA.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
          Source: 2.2.SBkuP3ACSA.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
          Source: 2.2.SBkuP3ACSA.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
          Source: 2.2.SBkuP3ACSA.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
          Source: 0.2.SBkuP3ACSA.exe.3799240.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
          Source: 0.2.SBkuP3ACSA.exe.3799240.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
          Source: 0.2.SBkuP3ACSA.exe.3799240.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
          Source: 0.2.SBkuP3ACSA.exe.3799240.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
          Source: 0.2.SBkuP3ACSA.exe.3778610.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
          Source: 0.2.SBkuP3ACSA.exe.3778610.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
          Source: 0.2.SBkuP3ACSA.exe.3778610.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
          Source: 0.2.SBkuP3ACSA.exe.3778610.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
          Source: 0.2.SBkuP3ACSA.exe.36e7f70.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
          Source: 0.2.SBkuP3ACSA.exe.36e7f70.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables with potential process hoocking Author: ditekSHen
          Source: 0.2.SBkuP3ACSA.exe.36e7f70.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Snake Keylogger Author: ditekSHen
          Source: 0.2.SBkuP3ACSA.exe.36e7f70.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects downloader injector Author: ditekSHen
          Source: 00000000.00000002.3315691533.0000000005090000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects downloader injector Author: ditekSHen
          Source: 00000002.00000002.2195327620.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
          Source: 00000002.00000002.2195327620.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
          Source: 00000000.00000002.3314447238.0000000003699000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
          Source: 00000000.00000002.3314447238.0000000003699000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Snake Keylogger Author: ditekSHen
          Source: Process Memory Space: SBkuP3ACSA.exe PID: 3424, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
          Source: Process Memory Space: SBkuP3ACSA.exe PID: 3424, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
          Source: Process Memory Space: SBkuP3ACSA.exe PID: 2452, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
          Source: Process Memory Space: SBkuP3ACSA.exe PID: 2452, type: MEMORYSTRMatched rule: Detects Snake Keylogger Author: ditekSHen
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeCode function: 0_2_00ABD3040_2_00ABD304
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeCode function: 0_2_089996800_2_08999680
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeCode function: 2_2_02A4B3282_2_02A4B328
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeCode function: 2_2_02A4C1902_2_02A4C190
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeCode function: 2_2_02A461082_2_02A46108
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeCode function: 2_2_02A4C7522_2_02A4C752
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeCode function: 2_2_02A4C4702_2_02A4C470
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeCode function: 2_2_02A44AD92_2_02A44AD9
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeCode function: 2_2_02A4CA322_2_02A4CA32
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeCode function: 2_2_02A4BBD22_2_02A4BBD2
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeCode function: 2_2_02A468802_2_02A46880
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeCode function: 2_2_02A498582_2_02A49858
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeCode function: 2_2_02A4BEB02_2_02A4BEB0
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeCode function: 2_2_02A4B4F22_2_02A4B4F2
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeCode function: 2_2_02A435722_2_02A43572
          Source: SBkuP3ACSA.exe, 00000000.00000000.2056937490.0000000000272000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameFisa.exe* vs SBkuP3ACSA.exe
          Source: SBkuP3ACSA.exe, 00000000.00000002.3315691533.0000000005090000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameExample.dll0 vs SBkuP3ACSA.exe
          Source: SBkuP3ACSA.exe, 00000000.00000002.3314447238.0000000003699000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameExample.dll0 vs SBkuP3ACSA.exe
          Source: SBkuP3ACSA.exe, 00000000.00000002.3314447238.0000000003699000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelfwhUWZlmFnGhDYPudAJ.exeX vs SBkuP3ACSA.exe
          Source: SBkuP3ACSA.exe, 00000000.00000002.3311393301.00000000008FE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs SBkuP3ACSA.exe
          Source: SBkuP3ACSA.exe, 00000000.00000002.3315863367.00000000050F0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameAQipUvwTwkLZyiCs.dll: vs SBkuP3ACSA.exe
          Source: SBkuP3ACSA.exe, 00000000.00000002.3312873596.0000000002691000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameAQipUvwTwkLZyiCs.dll: vs SBkuP3ACSA.exe
          Source: SBkuP3ACSA.exe, 00000000.00000002.3312873596.0000000002691000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelfwhUWZlmFnGhDYPudAJ.exeX vs SBkuP3ACSA.exe
          Source: SBkuP3ACSA.exe, 00000002.00000002.2195327620.0000000000402000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenamelfwhUWZlmFnGhDYPudAJ.exeX vs SBkuP3ACSA.exe
          Source: SBkuP3ACSA.exeBinary or memory string: OriginalFilenameFisa.exe* vs SBkuP3ACSA.exe
          Source: SBkuP3ACSA.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
          Source: 0.2.SBkuP3ACSA.exe.3778610.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
          Source: 0.2.SBkuP3ACSA.exe.3778610.3.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 0.2.SBkuP3ACSA.exe.3778610.3.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
          Source: 0.2.SBkuP3ACSA.exe.3778610.3.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
          Source: 0.2.SBkuP3ACSA.exe.28e52ac.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_DLInjector02 author = ditekSHen, description = Detects downloader injector
          Source: 0.2.SBkuP3ACSA.exe.5090000.5.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_DLInjector02 author = ditekSHen, description = Detects downloader injector
          Source: 0.2.SBkuP3ACSA.exe.36e7f70.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_DLInjector02 author = ditekSHen, description = Detects downloader injector
          Source: 0.2.SBkuP3ACSA.exe.3799240.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
          Source: 0.2.SBkuP3ACSA.exe.3799240.2.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 0.2.SBkuP3ACSA.exe.3799240.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
          Source: 0.2.SBkuP3ACSA.exe.3799240.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
          Source: 0.2.SBkuP3ACSA.exe.28e2a6c.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_DLInjector02 author = ditekSHen, description = Detects downloader injector
          Source: 0.2.SBkuP3ACSA.exe.5090000.5.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_DLInjector02 author = ditekSHen, description = Detects downloader injector
          Source: 2.2.SBkuP3ACSA.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
          Source: 2.2.SBkuP3ACSA.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 2.2.SBkuP3ACSA.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
          Source: 2.2.SBkuP3ACSA.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
          Source: 0.2.SBkuP3ACSA.exe.3799240.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
          Source: 0.2.SBkuP3ACSA.exe.3799240.2.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 0.2.SBkuP3ACSA.exe.3799240.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
          Source: 0.2.SBkuP3ACSA.exe.3799240.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
          Source: 0.2.SBkuP3ACSA.exe.3778610.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
          Source: 0.2.SBkuP3ACSA.exe.3778610.3.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 0.2.SBkuP3ACSA.exe.3778610.3.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
          Source: 0.2.SBkuP3ACSA.exe.3778610.3.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
          Source: 0.2.SBkuP3ACSA.exe.36e7f70.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
          Source: 0.2.SBkuP3ACSA.exe.36e7f70.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_DotNetProcHook author = ditekSHen, description = Detects executables with potential process hoocking
          Source: 0.2.SBkuP3ACSA.exe.36e7f70.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
          Source: 0.2.SBkuP3ACSA.exe.36e7f70.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_DLInjector02 author = ditekSHen, description = Detects downloader injector
          Source: 00000000.00000002.3315691533.0000000005090000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_DLInjector02 author = ditekSHen, description = Detects downloader injector
          Source: 00000002.00000002.2195327620.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
          Source: 00000002.00000002.2195327620.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
          Source: 00000000.00000002.3314447238.0000000003699000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
          Source: 00000000.00000002.3314447238.0000000003699000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
          Source: Process Memory Space: SBkuP3ACSA.exe PID: 3424, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
          Source: Process Memory Space: SBkuP3ACSA.exe PID: 3424, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
          Source: Process Memory Space: SBkuP3ACSA.exe PID: 2452, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
          Source: Process Memory Space: SBkuP3ACSA.exe PID: 2452, type: MEMORYSTRMatched rule: MALWARE_Win_SnakeKeylogger author = ditekSHen, description = Detects Snake Keylogger, clamav_sig = MALWARE.Win.Trojan.SnakeKeylogger
          Source: classification engineClassification label: mal100.troj.evad.winEXE@8/1@2/2
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\SBkuP3ACSA.exe.logJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeMutant created: NULL
          Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6788:120:WilError_03
          Source: SBkuP3ACSA.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: SBkuP3ACSA.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: SBkuP3ACSA.exeVirustotal: Detection: 80%
          Source: SBkuP3ACSA.exeReversingLabs: Detection: 78%
          Source: unknownProcess created: C:\Users\user\Desktop\SBkuP3ACSA.exe "C:\Users\user\Desktop\SBkuP3ACSA.exe"
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeProcess created: C:\Users\user\Desktop\SBkuP3ACSA.exe "C:\Users\user\Desktop\SBkuP3ACSA.exe"
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\user\Desktop\SBkuP3ACSA.exe"
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\choice.exe choice /C Y /N /D Y /T 3
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeProcess created: C:\Users\user\Desktop\SBkuP3ACSA.exe "C:\Users\user\Desktop\SBkuP3ACSA.exe"Jump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\user\Desktop\SBkuP3ACSA.exe"Jump to behavior
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\choice.exe choice /C Y /N /D Y /T 3Jump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeSection loaded: mscoree.dllJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeSection loaded: amsi.dllJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeSection loaded: gpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeSection loaded: dwrite.dllJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeSection loaded: textshaping.dllJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeSection loaded: textinputframework.dllJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeSection loaded: coreuicomponents.dllJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeSection loaded: coremessaging.dllJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeSection loaded: ntmarta.dllJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeSection loaded: coremessaging.dllJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeSection loaded: mscoree.dllJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeSection loaded: rasapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeSection loaded: rasman.dllJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeSection loaded: rtutils.dllJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeSection loaded: mswsock.dllJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeSection loaded: winhttp.dllJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeSection loaded: dhcpcsvc6.dllJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeSection loaded: dhcpcsvc.dllJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeSection loaded: dnsapi.dllJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeSection loaded: winnsi.dllJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeSection loaded: rasadhlp.dllJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeSection loaded: fwpuclnt.dllJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeSection loaded: secur32.dllJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeSection loaded: schannel.dllJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeSection loaded: mskeyprotect.dllJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeSection loaded: ntasn1.dllJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeSection loaded: ncrypt.dllJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeSection loaded: ncryptsslp.dllJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeSection loaded: msasn1.dllJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeSection loaded: gpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeSection loaded: propsys.dllJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeSection loaded: edputil.dllJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeSection loaded: urlmon.dllJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeSection loaded: iertutil.dllJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeSection loaded: windows.staterepositoryps.dllJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeSection loaded: appresolver.dllJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeSection loaded: bcp47langs.dllJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeSection loaded: slc.dllJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeSection loaded: sppc.dllJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeSection loaded: onecorecommonproxystub.dllJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
          Source: C:\Windows\SysWOW64\choice.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
          Source: Window RecorderWindow detected: More than 3 window changes detected
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
          Source: SBkuP3ACSA.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
          Source: SBkuP3ACSA.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Source: Binary string: C:\Users\GT350\source\repos\UpdatedRunpe\UpdatedRunpe\obj\x86\Debug\AQipUvwTwkLZyiCs.pdb source: SBkuP3ACSA.exe, 00000000.00000002.3315863367.00000000050F0000.00000004.08000000.00040000.00000000.sdmp, SBkuP3ACSA.exe, 00000000.00000002.3312873596.0000000002691000.00000004.00000800.00020000.00000000.sdmp
          Source: SBkuP3ACSA.exeStatic PE information: 0xF79C3086 [Tue Aug 23 02:46:30 2101 UTC]
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeCode function: 0_2_0899A153 pushad ; iretd 0_2_0899A159
          Source: SBkuP3ACSA.exeStatic PE information: section name: .text entropy: 7.053977654479298

          Hooking and other Techniques for Hiding and Protection

          barindex
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeProcess created: "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\user\Desktop\SBkuP3ACSA.exe"
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeProcess created: "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\user\Desktop\SBkuP3ACSA.exe"Jump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

          Malware Analysis System Evasion

          barindex
          Source: Yara matchFile source: Process Memory Space: SBkuP3ACSA.exe PID: 3424, type: MEMORYSTR
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeMemory allocated: AB0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeMemory allocated: 2690000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeMemory allocated: CF0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeMemory allocated: 2A40000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeMemory allocated: 2D40000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeMemory allocated: 4D40000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeThread delayed: delay time: 600000Jump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeThread delayed: delay time: 599875Jump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeThread delayed: delay time: 599765Jump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeThread delayed: delay time: 599656Jump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeThread delayed: delay time: 599547Jump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeThread delayed: delay time: 599437Jump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeThread delayed: delay time: 599328Jump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeThread delayed: delay time: 599219Jump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeThread delayed: delay time: 599109Jump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeThread delayed: delay time: 599000Jump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeThread delayed: delay time: 598890Jump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeThread delayed: delay time: 598781Jump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeThread delayed: delay time: 598660Jump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeThread delayed: delay time: 598531Jump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeThread delayed: delay time: 598422Jump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeThread delayed: delay time: 598312Jump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeThread delayed: delay time: 598203Jump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeThread delayed: delay time: 598094Jump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeThread delayed: delay time: 597984Jump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeThread delayed: delay time: 597875Jump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeThread delayed: delay time: 597765Jump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeThread delayed: delay time: 597656Jump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeThread delayed: delay time: 597547Jump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeThread delayed: delay time: 597437Jump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeThread delayed: delay time: 597327Jump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeThread delayed: delay time: 597219Jump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeThread delayed: delay time: 597109Jump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeThread delayed: delay time: 596998Jump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeThread delayed: delay time: 596890Jump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeThread delayed: delay time: 596781Jump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeThread delayed: delay time: 596672Jump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeThread delayed: delay time: 596562Jump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeThread delayed: delay time: 596453Jump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeThread delayed: delay time: 596344Jump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeThread delayed: delay time: 596234Jump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeThread delayed: delay time: 596125Jump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeThread delayed: delay time: 596015Jump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeThread delayed: delay time: 595906Jump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeThread delayed: delay time: 595797Jump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeThread delayed: delay time: 595687Jump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeThread delayed: delay time: 595578Jump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeThread delayed: delay time: 595469Jump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeThread delayed: delay time: 595359Jump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeThread delayed: delay time: 595248Jump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeThread delayed: delay time: 595140Jump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeThread delayed: delay time: 595031Jump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeThread delayed: delay time: 594922Jump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeThread delayed: delay time: 594812Jump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeThread delayed: delay time: 594703Jump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeThread delayed: delay time: 594594Jump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeWindow / User API: threadDelayed 8444Jump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeWindow / User API: threadDelayed 1419Jump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exe TID: 6616Thread sleep time: -22136092888451448s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exe TID: 6616Thread sleep time: -600000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exe TID: 6616Thread sleep time: -599875s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exe TID: 4564Thread sleep count: 8444 > 30Jump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exe TID: 6616Thread sleep time: -599765s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exe TID: 4564Thread sleep count: 1419 > 30Jump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exe TID: 6616Thread sleep time: -599656s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exe TID: 6616Thread sleep time: -599547s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exe TID: 6616Thread sleep time: -599437s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exe TID: 6616Thread sleep time: -599328s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exe TID: 6616Thread sleep time: -599219s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exe TID: 6616Thread sleep time: -599109s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exe TID: 6616Thread sleep time: -599000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exe TID: 6616Thread sleep time: -598890s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exe TID: 6616Thread sleep time: -598781s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exe TID: 6616Thread sleep time: -598660s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exe TID: 6616Thread sleep time: -598531s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exe TID: 6616Thread sleep time: -598422s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exe TID: 6616Thread sleep time: -598312s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exe TID: 6616Thread sleep time: -598203s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exe TID: 6616Thread sleep time: -598094s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exe TID: 6616Thread sleep time: -597984s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exe TID: 6616Thread sleep time: -597875s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exe TID: 6616Thread sleep time: -597765s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exe TID: 6616Thread sleep time: -597656s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exe TID: 6616Thread sleep time: -597547s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exe TID: 6616Thread sleep time: -597437s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exe TID: 6616Thread sleep time: -597327s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exe TID: 6616Thread sleep time: -597219s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exe TID: 6616Thread sleep time: -597109s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exe TID: 6616Thread sleep time: -596998s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exe TID: 6616Thread sleep time: -596890s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exe TID: 6616Thread sleep time: -596781s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exe TID: 6616Thread sleep time: -596672s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exe TID: 6616Thread sleep time: -596562s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exe TID: 6616Thread sleep time: -596453s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exe TID: 6616Thread sleep time: -596344s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exe TID: 6616Thread sleep time: -596234s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exe TID: 6616Thread sleep time: -596125s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exe TID: 6616Thread sleep time: -596015s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exe TID: 6616Thread sleep time: -595906s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exe TID: 6616Thread sleep time: -595797s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exe TID: 6616Thread sleep time: -595687s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exe TID: 6616Thread sleep time: -595578s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exe TID: 6616Thread sleep time: -595469s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exe TID: 6616Thread sleep time: -595359s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exe TID: 6616Thread sleep time: -595248s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exe TID: 6616Thread sleep time: -595140s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exe TID: 6616Thread sleep time: -595031s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exe TID: 6616Thread sleep time: -594922s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exe TID: 6616Thread sleep time: -594812s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exe TID: 6616Thread sleep time: -594703s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exe TID: 6616Thread sleep time: -594594s >= -30000sJump to behavior
          Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeThread delayed: delay time: 600000Jump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeThread delayed: delay time: 599875Jump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeThread delayed: delay time: 599765Jump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeThread delayed: delay time: 599656Jump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeThread delayed: delay time: 599547Jump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeThread delayed: delay time: 599437Jump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeThread delayed: delay time: 599328Jump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeThread delayed: delay time: 599219Jump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeThread delayed: delay time: 599109Jump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeThread delayed: delay time: 599000Jump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeThread delayed: delay time: 598890Jump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeThread delayed: delay time: 598781Jump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeThread delayed: delay time: 598660Jump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeThread delayed: delay time: 598531Jump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeThread delayed: delay time: 598422Jump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeThread delayed: delay time: 598312Jump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeThread delayed: delay time: 598203Jump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeThread delayed: delay time: 598094Jump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeThread delayed: delay time: 597984Jump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeThread delayed: delay time: 597875Jump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeThread delayed: delay time: 597765Jump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeThread delayed: delay time: 597656Jump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeThread delayed: delay time: 597547Jump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeThread delayed: delay time: 597437Jump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeThread delayed: delay time: 597327Jump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeThread delayed: delay time: 597219Jump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeThread delayed: delay time: 597109Jump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeThread delayed: delay time: 596998Jump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeThread delayed: delay time: 596890Jump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeThread delayed: delay time: 596781Jump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeThread delayed: delay time: 596672Jump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeThread delayed: delay time: 596562Jump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeThread delayed: delay time: 596453Jump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeThread delayed: delay time: 596344Jump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeThread delayed: delay time: 596234Jump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeThread delayed: delay time: 596125Jump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeThread delayed: delay time: 596015Jump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeThread delayed: delay time: 595906Jump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeThread delayed: delay time: 595797Jump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeThread delayed: delay time: 595687Jump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeThread delayed: delay time: 595578Jump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeThread delayed: delay time: 595469Jump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeThread delayed: delay time: 595359Jump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeThread delayed: delay time: 595248Jump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeThread delayed: delay time: 595140Jump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeThread delayed: delay time: 595031Jump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeThread delayed: delay time: 594922Jump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeThread delayed: delay time: 594812Jump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeThread delayed: delay time: 594703Jump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeThread delayed: delay time: 594594Jump to behavior
          Source: SBkuP3ACSA.exe, 00000002.00000002.2195938373.00000000011A7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeProcess information queried: ProcessInformationJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeProcess token adjusted: DebugJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeMemory allocated: page read and write | page guardJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeProcess created: C:\Users\user\Desktop\SBkuP3ACSA.exe "C:\Users\user\Desktop\SBkuP3ACSA.exe"Jump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\user\Desktop\SBkuP3ACSA.exe"Jump to behavior
          Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\choice.exe choice /C Y /N /D Y /T 3Jump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeQueries volume information: C:\Users\user\Desktop\SBkuP3ACSA.exe VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeQueries volume information: C:\Users\user\Desktop\SBkuP3ACSA.exe VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\SBkuP3ACSA.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: 0.2.SBkuP3ACSA.exe.3778610.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.SBkuP3ACSA.exe.3799240.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.SBkuP3ACSA.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.SBkuP3ACSA.exe.3799240.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.SBkuP3ACSA.exe.3778610.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.SBkuP3ACSA.exe.36e7f70.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000002.00000002.2195327620.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.3314447238.0000000003699000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.2196563053.0000000002D41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: SBkuP3ACSA.exe PID: 3424, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: SBkuP3ACSA.exe PID: 2452, type: MEMORYSTR
          Source: Yara matchFile source: 0.2.SBkuP3ACSA.exe.3778610.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.SBkuP3ACSA.exe.3799240.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.SBkuP3ACSA.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.SBkuP3ACSA.exe.3799240.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.SBkuP3ACSA.exe.3778610.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.SBkuP3ACSA.exe.36e7f70.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000002.00000002.2195327620.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.3314447238.0000000003699000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: SBkuP3ACSA.exe PID: 3424, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: SBkuP3ACSA.exe PID: 2452, type: MEMORYSTR

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: 0.2.SBkuP3ACSA.exe.3778610.3.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.SBkuP3ACSA.exe.3799240.2.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 2.2.SBkuP3ACSA.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.SBkuP3ACSA.exe.3799240.2.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.SBkuP3ACSA.exe.3778610.3.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 0.2.SBkuP3ACSA.exe.36e7f70.4.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000002.00000002.2195327620.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000000.00000002.3314447238.0000000003699000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000002.00000002.2196563053.0000000002D41000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: SBkuP3ACSA.exe PID: 3424, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: SBkuP3ACSA.exe PID: 2452, type: MEMORYSTR
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
          DLL Side-Loading
          11
          Process Injection
          1
          Masquerading
          OS Credential Dumping1
          Security Software Discovery
          Remote Services1
          Archive Collected Data
          11
          Encrypted Channel
          Exfiltration Over Other Network MediumAbuse Accessibility Features
          CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
          DLL Side-Loading
          1
          Disable or Modify Tools
          LSASS Memory1
          Process Discovery
          Remote Desktop ProtocolData from Removable Media1
          Ingress Tool Transfer
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)31
          Virtualization/Sandbox Evasion
          Security Account Manager31
          Virtualization/Sandbox Evasion
          SMB/Windows Admin SharesData from Network Shared Drive2
          Non-Application Layer Protocol
          Automated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
          Process Injection
          NTDS1
          Application Window Discovery
          Distributed Component Object ModelInput Capture13
          Application Layer Protocol
          Traffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
          Obfuscated Files or Information
          LSA Secrets1
          System Network Configuration Discovery
          SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
          Software Packing
          Cached Domain Credentials1
          File and Directory Discovery
          VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
          DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
          Timestomp
          DCSync12
          System Information Discovery
          Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
          Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
          DLL Side-Loading
          Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
          Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
          File Deletion
          /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          SBkuP3ACSA.exe81%VirustotalBrowse
          SBkuP3ACSA.exe79%ReversingLabsByteCode-MSIL.Spyware.Snakekeylogger
          SBkuP3ACSA.exe100%AviraHEUR/AGEN.1309847
          SBkuP3ACSA.exe100%Joe Sandbox ML
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          NameIPActiveMaliciousAntivirus DetectionReputation
          reallyfreegeoip.org
          104.21.16.1
          truefalse
            high
            checkip.dyndns.com
            193.122.6.168
            truefalse
              high
              checkip.dyndns.org
              unknown
              unknownfalse
                high
                NameMaliciousAntivirus DetectionReputation
                http://checkip.dyndns.org/false
                  high
                  https://reallyfreegeoip.org/xml/8.46.123.189false
                    high
                    NameSourceMaliciousAntivirus DetectionReputation
                    https://reallyfreegeoip.orgSBkuP3ACSA.exe, 00000002.00000002.2196563053.0000000002EB1000.00000004.00000800.00020000.00000000.sdmp, SBkuP3ACSA.exe, 00000002.00000002.2196563053.0000000002EFB000.00000004.00000800.00020000.00000000.sdmp, SBkuP3ACSA.exe, 00000002.00000002.2196563053.0000000002E03000.00000004.00000800.00020000.00000000.sdmp, SBkuP3ACSA.exe, 00000002.00000002.2196563053.0000000002EED000.00000004.00000800.00020000.00000000.sdmp, SBkuP3ACSA.exe, 00000002.00000002.2196563053.0000000002E96000.00000004.00000800.00020000.00000000.sdmp, SBkuP3ACSA.exe, 00000002.00000002.2196563053.0000000002EA3000.00000004.00000800.00020000.00000000.sdmp, SBkuP3ACSA.exe, 00000002.00000002.2196563053.0000000002E46000.00000004.00000800.00020000.00000000.sdmp, SBkuP3ACSA.exe, 00000002.00000002.2196563053.0000000002EBF000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://checkip.dyndns.orgSBkuP3ACSA.exe, 00000002.00000002.2196563053.0000000002EB1000.00000004.00000800.00020000.00000000.sdmp, SBkuP3ACSA.exe, 00000002.00000002.2196563053.0000000002ECD000.00000004.00000800.00020000.00000000.sdmp, SBkuP3ACSA.exe, 00000002.00000002.2196563053.0000000002EFB000.00000004.00000800.00020000.00000000.sdmp, SBkuP3ACSA.exe, 00000002.00000002.2196563053.0000000002E03000.00000004.00000800.00020000.00000000.sdmp, SBkuP3ACSA.exe, 00000002.00000002.2196563053.0000000002DF4000.00000004.00000800.00020000.00000000.sdmp, SBkuP3ACSA.exe, 00000002.00000002.2196563053.0000000002EED000.00000004.00000800.00020000.00000000.sdmp, SBkuP3ACSA.exe, 00000002.00000002.2196563053.0000000002E96000.00000004.00000800.00020000.00000000.sdmp, SBkuP3ACSA.exe, 00000002.00000002.2196563053.0000000002EA3000.00000004.00000800.00020000.00000000.sdmp, SBkuP3ACSA.exe, 00000002.00000002.2196563053.0000000002E46000.00000004.00000800.00020000.00000000.sdmp, SBkuP3ACSA.exe, 00000002.00000002.2196563053.0000000002EBF000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        http://checkip.dyndns.comSBkuP3ACSA.exe, 00000002.00000002.2196563053.0000000002EB1000.00000004.00000800.00020000.00000000.sdmp, SBkuP3ACSA.exe, 00000002.00000002.2196563053.0000000002EFB000.00000004.00000800.00020000.00000000.sdmp, SBkuP3ACSA.exe, 00000002.00000002.2196563053.0000000002E03000.00000004.00000800.00020000.00000000.sdmp, SBkuP3ACSA.exe, 00000002.00000002.2196563053.0000000002EED000.00000004.00000800.00020000.00000000.sdmp, SBkuP3ACSA.exe, 00000002.00000002.2196563053.0000000002E96000.00000004.00000800.00020000.00000000.sdmp, SBkuP3ACSA.exe, 00000002.00000002.2196563053.0000000002EA3000.00000004.00000800.00020000.00000000.sdmp, SBkuP3ACSA.exe, 00000002.00000002.2196563053.0000000002EBF000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameSBkuP3ACSA.exe, 00000002.00000002.2196563053.0000000002D41000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://checkip.dyndns.org/qSBkuP3ACSA.exe, 00000000.00000002.3314447238.0000000003699000.00000004.00000800.00020000.00000000.sdmp, SBkuP3ACSA.exe, 00000002.00000002.2195327620.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                              high
                              https://reallyfreegeoip.org/xml/8.46.123.189$SBkuP3ACSA.exe, 00000002.00000002.2196563053.0000000002EB1000.00000004.00000800.00020000.00000000.sdmp, SBkuP3ACSA.exe, 00000002.00000002.2196563053.0000000002EFB000.00000004.00000800.00020000.00000000.sdmp, SBkuP3ACSA.exe, 00000002.00000002.2196563053.0000000002EED000.00000004.00000800.00020000.00000000.sdmp, SBkuP3ACSA.exe, 00000002.00000002.2196563053.0000000002E96000.00000004.00000800.00020000.00000000.sdmp, SBkuP3ACSA.exe, 00000002.00000002.2196563053.0000000002EA3000.00000004.00000800.00020000.00000000.sdmp, SBkuP3ACSA.exe, 00000002.00000002.2196563053.0000000002E46000.00000004.00000800.00020000.00000000.sdmp, SBkuP3ACSA.exe, 00000002.00000002.2196563053.0000000002EBF000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://reallyfreegeoip.orgSBkuP3ACSA.exe, 00000002.00000002.2196563053.0000000002EB1000.00000004.00000800.00020000.00000000.sdmp, SBkuP3ACSA.exe, 00000002.00000002.2196563053.0000000002EFB000.00000004.00000800.00020000.00000000.sdmp, SBkuP3ACSA.exe, 00000002.00000002.2196563053.0000000002EED000.00000004.00000800.00020000.00000000.sdmp, SBkuP3ACSA.exe, 00000002.00000002.2196563053.0000000002E96000.00000004.00000800.00020000.00000000.sdmp, SBkuP3ACSA.exe, 00000002.00000002.2196563053.0000000002EA3000.00000004.00000800.00020000.00000000.sdmp, SBkuP3ACSA.exe, 00000002.00000002.2196563053.0000000002E1B000.00000004.00000800.00020000.00000000.sdmp, SBkuP3ACSA.exe, 00000002.00000002.2196563053.0000000002EBF000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://reallyfreegeoip.org/xml/SBkuP3ACSA.exe, 00000000.00000002.3314447238.0000000003699000.00000004.00000800.00020000.00000000.sdmp, SBkuP3ACSA.exe, 00000002.00000002.2196563053.0000000002E03000.00000004.00000800.00020000.00000000.sdmp, SBkuP3ACSA.exe, 00000002.00000002.2195327620.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                                    high
                                    • No. of IPs < 25%
                                    • 25% < No. of IPs < 50%
                                    • 50% < No. of IPs < 75%
                                    • 75% < No. of IPs
                                    IPDomainCountryFlagASNASN NameMalicious
                                    104.21.16.1
                                    reallyfreegeoip.orgUnited States
                                    13335CLOUDFLARENETUSfalse
                                    193.122.6.168
                                    checkip.dyndns.comUnited States
                                    31898ORACLE-BMC-31898USfalse
                                    Joe Sandbox version:42.0.0 Malachite
                                    Analysis ID:1587819
                                    Start date and time:2025-01-10 18:19:28 +01:00
                                    Joe Sandbox product:CloudBasic
                                    Overall analysis duration:0h 5m 3s
                                    Hypervisor based Inspection enabled:false
                                    Report type:full
                                    Cookbook file name:default.jbs
                                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                    Number of analysed new started processes analysed:9
                                    Number of new started drivers analysed:0
                                    Number of existing processes analysed:0
                                    Number of existing drivers analysed:0
                                    Number of injected processes analysed:0
                                    Technologies:
                                    • HCA enabled
                                    • EGA enabled
                                    • AMSI enabled
                                    Analysis Mode:default
                                    Analysis stop reason:Timeout
                                    Sample name:SBkuP3ACSA.exe
                                    renamed because original name is a hash value
                                    Original Sample Name:d0d28661ec38fa97bd723628c065471e1c58b6d3918fd988b43cdf0aee2815a3.exe
                                    Detection:MAL
                                    Classification:mal100.troj.evad.winEXE@8/1@2/2
                                    EGA Information:
                                    • Successful, ratio: 50%
                                    HCA Information:
                                    • Successful, ratio: 100%
                                    • Number of executed functions: 81
                                    • Number of non-executed functions: 3
                                    Cookbook Comments:
                                    • Found application associated with file extension: .exe
                                    • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                                    • Excluded IPs from analysis (whitelisted): 2.23.242.162, 13.107.246.45, 172.202.163.200, 20.12.23.50
                                    • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                    • Execution Graph export aborted for target SBkuP3ACSA.exe, PID 2452 because it is empty
                                    • Not all processes where analyzed, report is missing behavior information
                                    • Report size getting too big, too many NtOpenKeyEx calls found.
                                    • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                    • Report size getting too big, too many NtReadVirtualMemory calls found.
                                    TimeTypeDescription
                                    12:20:24API Interceptor85x Sleep call for process: SBkuP3ACSA.exe modified
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    104.21.16.1JNKHlxGvw4.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                    • 188387cm.n9shteam.in/videolinePipeHttplowProcessorgamelocalTemp.php
                                    193.122.6.168ql8KpEHT7y.exeGet hashmaliciousSnake KeyloggerBrowse
                                    • checkip.dyndns.org/
                                    8kDIr4ZdNj.exeGet hashmaliciousSnake KeyloggerBrowse
                                    • checkip.dyndns.org/
                                    4iDzhJBJVv.exeGet hashmaliciousSnake KeyloggerBrowse
                                    • checkip.dyndns.org/
                                    ln5S7fIBkY.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                    • checkip.dyndns.org/
                                    IMG_10503677.exeGet hashmaliciousMassLogger RATBrowse
                                    • checkip.dyndns.org/
                                    Payment 01.08.25.pdf.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                    • checkip.dyndns.org/
                                    December Reconciliation QuanKang.exeGet hashmaliciousUnknownBrowse
                                    • checkip.dyndns.org/
                                    PO.exeGet hashmaliciousMassLogger RATBrowse
                                    • checkip.dyndns.org/
                                    New order 2025.msgGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                                    • checkip.dyndns.org/
                                    file.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                    • checkip.dyndns.org/
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    checkip.dyndns.comv3tK92KcJV.exeGet hashmaliciousSnake KeyloggerBrowse
                                    • 132.226.247.73
                                    r5yYt97sfB.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                    • 132.226.8.169
                                    RmIYOfX0yO.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                    • 158.101.44.242
                                    zAK7HHniGW.exeGet hashmaliciousSnake KeyloggerBrowse
                                    • 193.122.130.0
                                    MtxN2qEWpW.exeGet hashmaliciousSnake KeyloggerBrowse
                                    • 132.226.247.73
                                    8nkdC8daWi.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                    • 132.226.247.73
                                    b5JCISnBV1.exeGet hashmaliciousSnake KeyloggerBrowse
                                    • 132.226.8.169
                                    ql8KpEHT7y.exeGet hashmaliciousSnake KeyloggerBrowse
                                    • 193.122.6.168
                                    8kDIr4ZdNj.exeGet hashmaliciousSnake KeyloggerBrowse
                                    • 193.122.6.168
                                    2V7usxd7Vc.exeGet hashmaliciousMassLogger RATBrowse
                                    • 158.101.44.242
                                    reallyfreegeoip.orgv3tK92KcJV.exeGet hashmaliciousSnake KeyloggerBrowse
                                    • 104.21.16.1
                                    r5yYt97sfB.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                    • 104.21.80.1
                                    RmIYOfX0yO.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                    • 104.21.80.1
                                    zAK7HHniGW.exeGet hashmaliciousSnake KeyloggerBrowse
                                    • 104.21.112.1
                                    MtxN2qEWpW.exeGet hashmaliciousSnake KeyloggerBrowse
                                    • 104.21.112.1
                                    8nkdC8daWi.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                    • 104.21.96.1
                                    b5JCISnBV1.exeGet hashmaliciousSnake KeyloggerBrowse
                                    • 104.21.16.1
                                    ql8KpEHT7y.exeGet hashmaliciousSnake KeyloggerBrowse
                                    • 104.21.96.1
                                    8kDIr4ZdNj.exeGet hashmaliciousSnake KeyloggerBrowse
                                    • 104.21.16.1
                                    2V7usxd7Vc.exeGet hashmaliciousMassLogger RATBrowse
                                    • 104.21.16.1
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    ORACLE-BMC-31898USRmIYOfX0yO.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                    • 158.101.44.242
                                    zAK7HHniGW.exeGet hashmaliciousSnake KeyloggerBrowse
                                    • 193.122.130.0
                                    ql8KpEHT7y.exeGet hashmaliciousSnake KeyloggerBrowse
                                    • 193.122.6.168
                                    8kDIr4ZdNj.exeGet hashmaliciousSnake KeyloggerBrowse
                                    • 193.122.6.168
                                    2V7usxd7Vc.exeGet hashmaliciousMassLogger RATBrowse
                                    • 158.101.44.242
                                    tx4pkcHL9o.exeGet hashmaliciousMassLogger RATBrowse
                                    • 158.101.44.242
                                    4iDzhJBJVv.exeGet hashmaliciousSnake KeyloggerBrowse
                                    • 193.122.6.168
                                    ln5S7fIBkY.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                    • 193.122.6.168
                                    B3aqD8srjF.exeGet hashmaliciousSnake KeyloggerBrowse
                                    • 193.122.130.0
                                    VIAmJUhQ54.exeGet hashmaliciousMassLogger RATBrowse
                                    • 193.122.130.0
                                    CLOUDFLARENETUSKcSzB2IpP5.exeGet hashmaliciousFormBookBrowse
                                    • 188.114.96.3
                                    secured File__esperion.com.htmlGet hashmaliciousPhisherBrowse
                                    • 104.17.25.14
                                    secured File__esperion.com.htmlGet hashmaliciousPhisherBrowse
                                    • 104.17.25.14
                                    https://www.depoqq.win/genoGet hashmaliciousUnknownBrowse
                                    • 104.18.27.193
                                    v3tK92KcJV.exeGet hashmaliciousSnake KeyloggerBrowse
                                    • 104.21.16.1
                                    phish_alert_sp2_2.0.0.0 (1).emlGet hashmaliciousUnknownBrowse
                                    • 104.18.32.25
                                    4sfN3Gx1vO.exeGet hashmaliciousFormBookBrowse
                                    • 104.21.64.1
                                    smQoKNkwB7.exeGet hashmaliciousFormBookBrowse
                                    • 104.21.18.171
                                    https://www.shinsengumiusa.com/mrloskieGet hashmaliciousUnknownBrowse
                                    • 104.16.79.73
                                    qlG7x91YXH.exeGet hashmaliciousFormBookBrowse
                                    • 104.21.80.1
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    54328bd36c14bd82ddaa0c04b25ed9adv3tK92KcJV.exeGet hashmaliciousSnake KeyloggerBrowse
                                    • 104.21.16.1
                                    r5yYt97sfB.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                    • 104.21.16.1
                                    RmIYOfX0yO.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                    • 104.21.16.1
                                    zAK7HHniGW.exeGet hashmaliciousSnake KeyloggerBrowse
                                    • 104.21.16.1
                                    MtxN2qEWpW.exeGet hashmaliciousSnake KeyloggerBrowse
                                    • 104.21.16.1
                                    8nkdC8daWi.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                    • 104.21.16.1
                                    b5JCISnBV1.exeGet hashmaliciousSnake KeyloggerBrowse
                                    • 104.21.16.1
                                    ql8KpEHT7y.exeGet hashmaliciousSnake KeyloggerBrowse
                                    • 104.21.16.1
                                    8kDIr4ZdNj.exeGet hashmaliciousSnake KeyloggerBrowse
                                    • 104.21.16.1
                                    2V7usxd7Vc.exeGet hashmaliciousMassLogger RATBrowse
                                    • 104.21.16.1
                                    No context
                                    Process:C:\Users\user\Desktop\SBkuP3ACSA.exe
                                    File Type:ASCII text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):1039
                                    Entropy (8bit):5.353332853270839
                                    Encrypted:false
                                    SSDEEP:24:ML9E4KiE4Ko84qXKDE4KhKiKhPKIE4oKNzKoZAE4KzeR:MxHKiHKoviYHKh3oPtHo6hAHKzeR
                                    MD5:A4AF0F36EC4E0C69DC0F860C891E8BBE
                                    SHA1:28DD81A1EDDF71CBCBF86DA986E047279EF097CD
                                    SHA-256:B038D4342E4DD96217BD90CFE32581FCCB381C5C2E6FF257CD32854F840D1FDE
                                    SHA-512:A675D3E9DB5BDD325A22E82C6BCDBD5409D7A34453DAAEB0E37206BE982C388547E1BDF22DC70393C69D0CE55635E2364502572C3AD2E6753A56A5C3893F6D69
                                    Malicious:true
                                    Reputation:moderate, very likely benign file
                                    Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..2,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e
                                    File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                    Entropy (8bit):7.046887280758424
                                    TrID:
                                    • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                    • Win32 Executable (generic) a (10002005/4) 49.78%
                                    • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                    • Generic Win/DOS Executable (2004/3) 0.01%
                                    • DOS Executable Generic (2002/1) 0.01%
                                    File name:SBkuP3ACSA.exe
                                    File size:826'368 bytes
                                    MD5:22b0c4defec129bb6a33fc44f1499910
                                    SHA1:4f5d255970be2c547916a72d2db99ed5b02a89b7
                                    SHA256:d0d28661ec38fa97bd723628c065471e1c58b6d3918fd988b43cdf0aee2815a3
                                    SHA512:63ba4513e693638e2365d357e6757a7268134c2c0385644a6118cf79fb046e44517eee1f22853fc7d4c5875bac00d56c0ac6c8a01dca76c0cded2b7dc991da53
                                    SSDEEP:24576:5MaSSKy2/SPNc0PrH5yj15ALOF+gGQ5p/i:5RQ5s/gt
                                    TLSH:1F054B043AA054F8C53289F7B8E7823C6A74B96161E2D46625CF2E9C7CC9F5046D72AF
                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....0................0.................. ........@.. ....................................@................................
                                    Icon Hash:00928e8e8686b000
                                    Entrypoint:0x4cb0ae
                                    Entrypoint Section:.text
                                    Digitally signed:false
                                    Imagebase:0x400000
                                    Subsystem:windows gui
                                    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                    Time Stamp:0xF79C3086 [Tue Aug 23 02:46:30 2101 UTC]
                                    TLS Callbacks:
                                    CLR (.Net) Version:
                                    OS Version Major:4
                                    OS Version Minor:0
                                    File Version Major:4
                                    File Version Minor:0
                                    Subsystem Version Major:4
                                    Subsystem Version Minor:0
                                    Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                    Instruction
                                    jmp dword ptr [00402000h]
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    NameVirtual AddressVirtual Size Is in Section
                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IMPORT0xcb0540x57.text
                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0xcc0000x586.rsrc
                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0xce0000xc.reloc
                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                    .text0x20000xc90b40xc9200966312f16f834318c6d9a4f5b43c0749False0.434636468691734data7.053977654479298IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                    .rsrc0xcc0000x5860x600023f933e236ce25e662698bcb26c192dFalse0.4134114583333333data4.009208314844858IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    .reloc0xce0000xc0x200727b93468c891e185699debc43ee745fFalse0.044921875data0.09409792566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                    RT_VERSION0xcc0a00x2fcdata0.43455497382198954
                                    RT_MANIFEST0xcc39c0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                    DLLImport
                                    mscoree.dll_CorExeMain
                                    TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                    2025-01-10T18:20:24.784668+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549704193.122.6.16880TCP
                                    2025-01-10T18:20:25.972201+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549704193.122.6.16880TCP
                                    2025-01-10T18:20:26.548608+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.549709104.21.16.1443TCP
                                    2025-01-10T18:20:27.237809+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549710193.122.6.16880TCP
                                    2025-01-10T18:20:27.788391+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.549711104.21.16.1443TCP
                                    2025-01-10T18:20:35.140115+01002803305ETPRO MALWARE Common Downloader Header Pattern H3192.168.2.549723104.21.16.1443TCP
                                    TimestampSource PortDest PortSource IPDest IP
                                    Jan 10, 2025 18:20:22.866588116 CET4970480192.168.2.5193.122.6.168
                                    Jan 10, 2025 18:20:22.871409893 CET8049704193.122.6.168192.168.2.5
                                    Jan 10, 2025 18:20:22.871494055 CET4970480192.168.2.5193.122.6.168
                                    Jan 10, 2025 18:20:22.871685028 CET4970480192.168.2.5193.122.6.168
                                    Jan 10, 2025 18:20:22.876509905 CET8049704193.122.6.168192.168.2.5
                                    Jan 10, 2025 18:20:24.502413034 CET8049704193.122.6.168192.168.2.5
                                    Jan 10, 2025 18:20:24.548784018 CET4970480192.168.2.5193.122.6.168
                                    Jan 10, 2025 18:20:24.553816080 CET8049704193.122.6.168192.168.2.5
                                    Jan 10, 2025 18:20:24.735618114 CET8049704193.122.6.168192.168.2.5
                                    Jan 10, 2025 18:20:24.784667969 CET4970480192.168.2.5193.122.6.168
                                    Jan 10, 2025 18:20:25.093676090 CET49707443192.168.2.5104.21.16.1
                                    Jan 10, 2025 18:20:25.093729973 CET44349707104.21.16.1192.168.2.5
                                    Jan 10, 2025 18:20:25.093818903 CET49707443192.168.2.5104.21.16.1
                                    Jan 10, 2025 18:20:25.098742008 CET49707443192.168.2.5104.21.16.1
                                    Jan 10, 2025 18:20:25.098761082 CET44349707104.21.16.1192.168.2.5
                                    Jan 10, 2025 18:20:25.561701059 CET44349707104.21.16.1192.168.2.5
                                    Jan 10, 2025 18:20:25.561790943 CET49707443192.168.2.5104.21.16.1
                                    Jan 10, 2025 18:20:25.567490101 CET49707443192.168.2.5104.21.16.1
                                    Jan 10, 2025 18:20:25.567511082 CET44349707104.21.16.1192.168.2.5
                                    Jan 10, 2025 18:20:25.567878962 CET44349707104.21.16.1192.168.2.5
                                    Jan 10, 2025 18:20:25.608685017 CET49707443192.168.2.5104.21.16.1
                                    Jan 10, 2025 18:20:25.615502119 CET49707443192.168.2.5104.21.16.1
                                    Jan 10, 2025 18:20:25.663331985 CET44349707104.21.16.1192.168.2.5
                                    Jan 10, 2025 18:20:25.725188971 CET44349707104.21.16.1192.168.2.5
                                    Jan 10, 2025 18:20:25.725255966 CET44349707104.21.16.1192.168.2.5
                                    Jan 10, 2025 18:20:25.725321054 CET49707443192.168.2.5104.21.16.1
                                    Jan 10, 2025 18:20:25.731703043 CET49707443192.168.2.5104.21.16.1
                                    Jan 10, 2025 18:20:25.734814882 CET4970480192.168.2.5193.122.6.168
                                    Jan 10, 2025 18:20:25.739741087 CET8049704193.122.6.168192.168.2.5
                                    Jan 10, 2025 18:20:25.920993090 CET8049704193.122.6.168192.168.2.5
                                    Jan 10, 2025 18:20:25.924057961 CET49709443192.168.2.5104.21.16.1
                                    Jan 10, 2025 18:20:25.924102068 CET44349709104.21.16.1192.168.2.5
                                    Jan 10, 2025 18:20:25.924196959 CET49709443192.168.2.5104.21.16.1
                                    Jan 10, 2025 18:20:25.924458027 CET49709443192.168.2.5104.21.16.1
                                    Jan 10, 2025 18:20:25.924470901 CET44349709104.21.16.1192.168.2.5
                                    Jan 10, 2025 18:20:25.972201109 CET4970480192.168.2.5193.122.6.168
                                    Jan 10, 2025 18:20:26.396398067 CET44349709104.21.16.1192.168.2.5
                                    Jan 10, 2025 18:20:26.398926020 CET49709443192.168.2.5104.21.16.1
                                    Jan 10, 2025 18:20:26.398953915 CET44349709104.21.16.1192.168.2.5
                                    Jan 10, 2025 18:20:26.548638105 CET44349709104.21.16.1192.168.2.5
                                    Jan 10, 2025 18:20:26.548716068 CET44349709104.21.16.1192.168.2.5
                                    Jan 10, 2025 18:20:26.548862934 CET49709443192.168.2.5104.21.16.1
                                    Jan 10, 2025 18:20:26.549355030 CET49709443192.168.2.5104.21.16.1
                                    Jan 10, 2025 18:20:26.552539110 CET4970480192.168.2.5193.122.6.168
                                    Jan 10, 2025 18:20:26.553827047 CET4971080192.168.2.5193.122.6.168
                                    Jan 10, 2025 18:20:26.557470083 CET8049704193.122.6.168192.168.2.5
                                    Jan 10, 2025 18:20:26.557531118 CET4970480192.168.2.5193.122.6.168
                                    Jan 10, 2025 18:20:26.558670998 CET8049710193.122.6.168192.168.2.5
                                    Jan 10, 2025 18:20:26.558753967 CET4971080192.168.2.5193.122.6.168
                                    Jan 10, 2025 18:20:26.558834076 CET4971080192.168.2.5193.122.6.168
                                    Jan 10, 2025 18:20:26.563627958 CET8049710193.122.6.168192.168.2.5
                                    Jan 10, 2025 18:20:27.184441090 CET8049710193.122.6.168192.168.2.5
                                    Jan 10, 2025 18:20:27.185600042 CET49711443192.168.2.5104.21.16.1
                                    Jan 10, 2025 18:20:27.185651064 CET44349711104.21.16.1192.168.2.5
                                    Jan 10, 2025 18:20:27.185722113 CET49711443192.168.2.5104.21.16.1
                                    Jan 10, 2025 18:20:27.185956001 CET49711443192.168.2.5104.21.16.1
                                    Jan 10, 2025 18:20:27.185966969 CET44349711104.21.16.1192.168.2.5
                                    Jan 10, 2025 18:20:27.237808943 CET4971080192.168.2.5193.122.6.168
                                    Jan 10, 2025 18:20:27.639779091 CET44349711104.21.16.1192.168.2.5
                                    Jan 10, 2025 18:20:27.641391993 CET49711443192.168.2.5104.21.16.1
                                    Jan 10, 2025 18:20:27.641417980 CET44349711104.21.16.1192.168.2.5
                                    Jan 10, 2025 18:20:27.788398027 CET44349711104.21.16.1192.168.2.5
                                    Jan 10, 2025 18:20:27.788467884 CET44349711104.21.16.1192.168.2.5
                                    Jan 10, 2025 18:20:27.788574934 CET49711443192.168.2.5104.21.16.1
                                    Jan 10, 2025 18:20:27.789005041 CET49711443192.168.2.5104.21.16.1
                                    Jan 10, 2025 18:20:27.793097973 CET4971380192.168.2.5193.122.6.168
                                    Jan 10, 2025 18:20:27.797944069 CET8049713193.122.6.168192.168.2.5
                                    Jan 10, 2025 18:20:27.798044920 CET4971380192.168.2.5193.122.6.168
                                    Jan 10, 2025 18:20:27.798104048 CET4971380192.168.2.5193.122.6.168
                                    Jan 10, 2025 18:20:27.802891016 CET8049713193.122.6.168192.168.2.5
                                    Jan 10, 2025 18:20:28.474071980 CET8049713193.122.6.168192.168.2.5
                                    Jan 10, 2025 18:20:28.475452900 CET49715443192.168.2.5104.21.16.1
                                    Jan 10, 2025 18:20:28.475564957 CET44349715104.21.16.1192.168.2.5
                                    Jan 10, 2025 18:20:28.475639105 CET49715443192.168.2.5104.21.16.1
                                    Jan 10, 2025 18:20:28.475965977 CET49715443192.168.2.5104.21.16.1
                                    Jan 10, 2025 18:20:28.475989103 CET44349715104.21.16.1192.168.2.5
                                    Jan 10, 2025 18:20:28.519026041 CET4971380192.168.2.5193.122.6.168
                                    Jan 10, 2025 18:20:28.943777084 CET44349715104.21.16.1192.168.2.5
                                    Jan 10, 2025 18:20:28.947118998 CET49715443192.168.2.5104.21.16.1
                                    Jan 10, 2025 18:20:28.947141886 CET44349715104.21.16.1192.168.2.5
                                    Jan 10, 2025 18:20:29.081887960 CET44349715104.21.16.1192.168.2.5
                                    Jan 10, 2025 18:20:29.081979036 CET44349715104.21.16.1192.168.2.5
                                    Jan 10, 2025 18:20:29.082027912 CET49715443192.168.2.5104.21.16.1
                                    Jan 10, 2025 18:20:29.082490921 CET49715443192.168.2.5104.21.16.1
                                    Jan 10, 2025 18:20:29.087246895 CET4971380192.168.2.5193.122.6.168
                                    Jan 10, 2025 18:20:29.088009119 CET4971680192.168.2.5193.122.6.168
                                    Jan 10, 2025 18:20:29.092927933 CET8049716193.122.6.168192.168.2.5
                                    Jan 10, 2025 18:20:29.093000889 CET4971680192.168.2.5193.122.6.168
                                    Jan 10, 2025 18:20:29.093094110 CET4971680192.168.2.5193.122.6.168
                                    Jan 10, 2025 18:20:29.096784115 CET8049713193.122.6.168192.168.2.5
                                    Jan 10, 2025 18:20:29.096841097 CET4971380192.168.2.5193.122.6.168
                                    Jan 10, 2025 18:20:29.097966909 CET8049716193.122.6.168192.168.2.5
                                    Jan 10, 2025 18:20:29.724905014 CET8049716193.122.6.168192.168.2.5
                                    Jan 10, 2025 18:20:29.726191998 CET49717443192.168.2.5104.21.16.1
                                    Jan 10, 2025 18:20:29.726233959 CET44349717104.21.16.1192.168.2.5
                                    Jan 10, 2025 18:20:29.726525068 CET49717443192.168.2.5104.21.16.1
                                    Jan 10, 2025 18:20:29.726572990 CET49717443192.168.2.5104.21.16.1
                                    Jan 10, 2025 18:20:29.726577997 CET44349717104.21.16.1192.168.2.5
                                    Jan 10, 2025 18:20:29.769099951 CET4971680192.168.2.5193.122.6.168
                                    Jan 10, 2025 18:20:30.192703009 CET44349717104.21.16.1192.168.2.5
                                    Jan 10, 2025 18:20:30.194413900 CET49717443192.168.2.5104.21.16.1
                                    Jan 10, 2025 18:20:30.194442987 CET44349717104.21.16.1192.168.2.5
                                    Jan 10, 2025 18:20:30.338519096 CET44349717104.21.16.1192.168.2.5
                                    Jan 10, 2025 18:20:30.338599920 CET44349717104.21.16.1192.168.2.5
                                    Jan 10, 2025 18:20:30.338664055 CET49717443192.168.2.5104.21.16.1
                                    Jan 10, 2025 18:20:30.339030027 CET49717443192.168.2.5104.21.16.1
                                    Jan 10, 2025 18:20:30.346610069 CET4971680192.168.2.5193.122.6.168
                                    Jan 10, 2025 18:20:30.347559929 CET4971880192.168.2.5193.122.6.168
                                    Jan 10, 2025 18:20:30.351715088 CET8049716193.122.6.168192.168.2.5
                                    Jan 10, 2025 18:20:30.351792097 CET4971680192.168.2.5193.122.6.168
                                    Jan 10, 2025 18:20:30.352468967 CET8049718193.122.6.168192.168.2.5
                                    Jan 10, 2025 18:20:30.352528095 CET4971880192.168.2.5193.122.6.168
                                    Jan 10, 2025 18:20:30.352637053 CET4971880192.168.2.5193.122.6.168
                                    Jan 10, 2025 18:20:30.357873917 CET8049718193.122.6.168192.168.2.5
                                    Jan 10, 2025 18:20:30.976669073 CET8049718193.122.6.168192.168.2.5
                                    Jan 10, 2025 18:20:30.978001118 CET49719443192.168.2.5104.21.16.1
                                    Jan 10, 2025 18:20:30.978050947 CET44349719104.21.16.1192.168.2.5
                                    Jan 10, 2025 18:20:30.978152990 CET49719443192.168.2.5104.21.16.1
                                    Jan 10, 2025 18:20:30.978390932 CET49719443192.168.2.5104.21.16.1
                                    Jan 10, 2025 18:20:30.978404999 CET44349719104.21.16.1192.168.2.5
                                    Jan 10, 2025 18:20:31.019064903 CET4971880192.168.2.5193.122.6.168
                                    Jan 10, 2025 18:20:31.453037024 CET44349719104.21.16.1192.168.2.5
                                    Jan 10, 2025 18:20:31.454704046 CET49719443192.168.2.5104.21.16.1
                                    Jan 10, 2025 18:20:31.454737902 CET44349719104.21.16.1192.168.2.5
                                    Jan 10, 2025 18:20:31.607898951 CET44349719104.21.16.1192.168.2.5
                                    Jan 10, 2025 18:20:31.607980967 CET44349719104.21.16.1192.168.2.5
                                    Jan 10, 2025 18:20:31.608036995 CET49719443192.168.2.5104.21.16.1
                                    Jan 10, 2025 18:20:31.608516932 CET49719443192.168.2.5104.21.16.1
                                    Jan 10, 2025 18:20:31.612538099 CET4971880192.168.2.5193.122.6.168
                                    Jan 10, 2025 18:20:31.613162041 CET4972080192.168.2.5193.122.6.168
                                    Jan 10, 2025 18:20:31.617750883 CET8049718193.122.6.168192.168.2.5
                                    Jan 10, 2025 18:20:31.617850065 CET4971880192.168.2.5193.122.6.168
                                    Jan 10, 2025 18:20:31.617975950 CET8049720193.122.6.168192.168.2.5
                                    Jan 10, 2025 18:20:31.618046045 CET4972080192.168.2.5193.122.6.168
                                    Jan 10, 2025 18:20:31.618127108 CET4972080192.168.2.5193.122.6.168
                                    Jan 10, 2025 18:20:31.622920990 CET8049720193.122.6.168192.168.2.5
                                    Jan 10, 2025 18:20:33.254854918 CET8049720193.122.6.168192.168.2.5
                                    Jan 10, 2025 18:20:33.256875992 CET49721443192.168.2.5104.21.16.1
                                    Jan 10, 2025 18:20:33.256931067 CET44349721104.21.16.1192.168.2.5
                                    Jan 10, 2025 18:20:33.257117987 CET49721443192.168.2.5104.21.16.1
                                    Jan 10, 2025 18:20:33.257304907 CET49721443192.168.2.5104.21.16.1
                                    Jan 10, 2025 18:20:33.257318020 CET44349721104.21.16.1192.168.2.5
                                    Jan 10, 2025 18:20:33.300486088 CET4972080192.168.2.5193.122.6.168
                                    Jan 10, 2025 18:20:33.716527939 CET44349721104.21.16.1192.168.2.5
                                    Jan 10, 2025 18:20:33.718899012 CET49721443192.168.2.5104.21.16.1
                                    Jan 10, 2025 18:20:33.718938112 CET44349721104.21.16.1192.168.2.5
                                    Jan 10, 2025 18:20:33.867296934 CET44349721104.21.16.1192.168.2.5
                                    Jan 10, 2025 18:20:33.867396116 CET44349721104.21.16.1192.168.2.5
                                    Jan 10, 2025 18:20:33.867520094 CET49721443192.168.2.5104.21.16.1
                                    Jan 10, 2025 18:20:33.868026972 CET49721443192.168.2.5104.21.16.1
                                    Jan 10, 2025 18:20:33.871507883 CET4972080192.168.2.5193.122.6.168
                                    Jan 10, 2025 18:20:33.872612953 CET4972280192.168.2.5193.122.6.168
                                    Jan 10, 2025 18:20:33.876540899 CET8049720193.122.6.168192.168.2.5
                                    Jan 10, 2025 18:20:33.877136946 CET4972080192.168.2.5193.122.6.168
                                    Jan 10, 2025 18:20:33.877473116 CET8049722193.122.6.168192.168.2.5
                                    Jan 10, 2025 18:20:33.877573013 CET4972280192.168.2.5193.122.6.168
                                    Jan 10, 2025 18:20:33.877705097 CET4972280192.168.2.5193.122.6.168
                                    Jan 10, 2025 18:20:33.882513046 CET8049722193.122.6.168192.168.2.5
                                    Jan 10, 2025 18:20:34.523174047 CET8049722193.122.6.168192.168.2.5
                                    Jan 10, 2025 18:20:34.525104046 CET49723443192.168.2.5104.21.16.1
                                    Jan 10, 2025 18:20:34.525168896 CET44349723104.21.16.1192.168.2.5
                                    Jan 10, 2025 18:20:34.525259018 CET49723443192.168.2.5104.21.16.1
                                    Jan 10, 2025 18:20:34.525540113 CET49723443192.168.2.5104.21.16.1
                                    Jan 10, 2025 18:20:34.525551081 CET44349723104.21.16.1192.168.2.5
                                    Jan 10, 2025 18:20:34.566138983 CET4972280192.168.2.5193.122.6.168
                                    Jan 10, 2025 18:20:34.979090929 CET44349723104.21.16.1192.168.2.5
                                    Jan 10, 2025 18:20:34.981007099 CET49723443192.168.2.5104.21.16.1
                                    Jan 10, 2025 18:20:34.981039047 CET44349723104.21.16.1192.168.2.5
                                    Jan 10, 2025 18:20:35.140155077 CET44349723104.21.16.1192.168.2.5
                                    Jan 10, 2025 18:20:35.140228987 CET44349723104.21.16.1192.168.2.5
                                    Jan 10, 2025 18:20:35.140472889 CET49723443192.168.2.5104.21.16.1
                                    Jan 10, 2025 18:20:35.140964031 CET49723443192.168.2.5104.21.16.1
                                    Jan 10, 2025 18:20:35.316641092 CET4972280192.168.2.5193.122.6.168
                                    Jan 10, 2025 18:20:35.316725969 CET4971080192.168.2.5193.122.6.168
                                    TimestampSource PortDest PortSource IPDest IP
                                    Jan 10, 2025 18:20:22.853372097 CET5425953192.168.2.51.1.1.1
                                    Jan 10, 2025 18:20:22.860383034 CET53542591.1.1.1192.168.2.5
                                    Jan 10, 2025 18:20:25.082899094 CET6262053192.168.2.51.1.1.1
                                    Jan 10, 2025 18:20:25.090550900 CET53626201.1.1.1192.168.2.5
                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                    Jan 10, 2025 18:20:22.853372097 CET192.168.2.51.1.1.10xa4a8Standard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                    Jan 10, 2025 18:20:25.082899094 CET192.168.2.51.1.1.10xf2b4Standard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                    Jan 10, 2025 18:20:22.860383034 CET1.1.1.1192.168.2.50xa4a8No error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                    Jan 10, 2025 18:20:22.860383034 CET1.1.1.1192.168.2.50xa4a8No error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                    Jan 10, 2025 18:20:22.860383034 CET1.1.1.1192.168.2.50xa4a8No error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                    Jan 10, 2025 18:20:22.860383034 CET1.1.1.1192.168.2.50xa4a8No error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                    Jan 10, 2025 18:20:22.860383034 CET1.1.1.1192.168.2.50xa4a8No error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                    Jan 10, 2025 18:20:22.860383034 CET1.1.1.1192.168.2.50xa4a8No error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                    Jan 10, 2025 18:20:25.090550900 CET1.1.1.1192.168.2.50xf2b4No error (0)reallyfreegeoip.org104.21.16.1A (IP address)IN (0x0001)false
                                    Jan 10, 2025 18:20:25.090550900 CET1.1.1.1192.168.2.50xf2b4No error (0)reallyfreegeoip.org104.21.64.1A (IP address)IN (0x0001)false
                                    Jan 10, 2025 18:20:25.090550900 CET1.1.1.1192.168.2.50xf2b4No error (0)reallyfreegeoip.org104.21.96.1A (IP address)IN (0x0001)false
                                    Jan 10, 2025 18:20:25.090550900 CET1.1.1.1192.168.2.50xf2b4No error (0)reallyfreegeoip.org104.21.80.1A (IP address)IN (0x0001)false
                                    Jan 10, 2025 18:20:25.090550900 CET1.1.1.1192.168.2.50xf2b4No error (0)reallyfreegeoip.org104.21.32.1A (IP address)IN (0x0001)false
                                    Jan 10, 2025 18:20:25.090550900 CET1.1.1.1192.168.2.50xf2b4No error (0)reallyfreegeoip.org104.21.48.1A (IP address)IN (0x0001)false
                                    Jan 10, 2025 18:20:25.090550900 CET1.1.1.1192.168.2.50xf2b4No error (0)reallyfreegeoip.org104.21.112.1A (IP address)IN (0x0001)false
                                    • reallyfreegeoip.org
                                    • checkip.dyndns.org
                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    0192.168.2.549704193.122.6.168802452C:\Users\user\Desktop\SBkuP3ACSA.exe
                                    TimestampBytes transferredDirectionData
                                    Jan 10, 2025 18:20:22.871685028 CET151OUTGET / HTTP/1.1
                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                    Host: checkip.dyndns.org
                                    Connection: Keep-Alive
                                    Jan 10, 2025 18:20:24.502413034 CET273INHTTP/1.1 200 OK
                                    Date: Fri, 10 Jan 2025 17:20:24 GMT
                                    Content-Type: text/html
                                    Content-Length: 104
                                    Connection: keep-alive
                                    Cache-Control: no-cache
                                    Pragma: no-cache
                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                    Jan 10, 2025 18:20:24.548784018 CET127OUTGET / HTTP/1.1
                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                    Host: checkip.dyndns.org
                                    Jan 10, 2025 18:20:24.735618114 CET273INHTTP/1.1 200 OK
                                    Date: Fri, 10 Jan 2025 17:20:24 GMT
                                    Content-Type: text/html
                                    Content-Length: 104
                                    Connection: keep-alive
                                    Cache-Control: no-cache
                                    Pragma: no-cache
                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                    Jan 10, 2025 18:20:25.734814882 CET127OUTGET / HTTP/1.1
                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                    Host: checkip.dyndns.org
                                    Jan 10, 2025 18:20:25.920993090 CET273INHTTP/1.1 200 OK
                                    Date: Fri, 10 Jan 2025 17:20:25 GMT
                                    Content-Type: text/html
                                    Content-Length: 104
                                    Connection: keep-alive
                                    Cache-Control: no-cache
                                    Pragma: no-cache
                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    1192.168.2.549710193.122.6.168802452C:\Users\user\Desktop\SBkuP3ACSA.exe
                                    TimestampBytes transferredDirectionData
                                    Jan 10, 2025 18:20:26.558834076 CET127OUTGET / HTTP/1.1
                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                    Host: checkip.dyndns.org
                                    Jan 10, 2025 18:20:27.184441090 CET273INHTTP/1.1 200 OK
                                    Date: Fri, 10 Jan 2025 17:20:27 GMT
                                    Content-Type: text/html
                                    Content-Length: 104
                                    Connection: keep-alive
                                    Cache-Control: no-cache
                                    Pragma: no-cache
                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    2192.168.2.549713193.122.6.168802452C:\Users\user\Desktop\SBkuP3ACSA.exe
                                    TimestampBytes transferredDirectionData
                                    Jan 10, 2025 18:20:27.798104048 CET151OUTGET / HTTP/1.1
                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                    Host: checkip.dyndns.org
                                    Connection: Keep-Alive
                                    Jan 10, 2025 18:20:28.474071980 CET273INHTTP/1.1 200 OK
                                    Date: Fri, 10 Jan 2025 17:20:28 GMT
                                    Content-Type: text/html
                                    Content-Length: 104
                                    Connection: keep-alive
                                    Cache-Control: no-cache
                                    Pragma: no-cache
                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    3192.168.2.549716193.122.6.168802452C:\Users\user\Desktop\SBkuP3ACSA.exe
                                    TimestampBytes transferredDirectionData
                                    Jan 10, 2025 18:20:29.093094110 CET151OUTGET / HTTP/1.1
                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                    Host: checkip.dyndns.org
                                    Connection: Keep-Alive
                                    Jan 10, 2025 18:20:29.724905014 CET273INHTTP/1.1 200 OK
                                    Date: Fri, 10 Jan 2025 17:20:29 GMT
                                    Content-Type: text/html
                                    Content-Length: 104
                                    Connection: keep-alive
                                    Cache-Control: no-cache
                                    Pragma: no-cache
                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    4192.168.2.549718193.122.6.168802452C:\Users\user\Desktop\SBkuP3ACSA.exe
                                    TimestampBytes transferredDirectionData
                                    Jan 10, 2025 18:20:30.352637053 CET151OUTGET / HTTP/1.1
                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                    Host: checkip.dyndns.org
                                    Connection: Keep-Alive
                                    Jan 10, 2025 18:20:30.976669073 CET273INHTTP/1.1 200 OK
                                    Date: Fri, 10 Jan 2025 17:20:30 GMT
                                    Content-Type: text/html
                                    Content-Length: 104
                                    Connection: keep-alive
                                    Cache-Control: no-cache
                                    Pragma: no-cache
                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    5192.168.2.549720193.122.6.168802452C:\Users\user\Desktop\SBkuP3ACSA.exe
                                    TimestampBytes transferredDirectionData
                                    Jan 10, 2025 18:20:31.618127108 CET151OUTGET / HTTP/1.1
                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                    Host: checkip.dyndns.org
                                    Connection: Keep-Alive
                                    Jan 10, 2025 18:20:33.254854918 CET273INHTTP/1.1 200 OK
                                    Date: Fri, 10 Jan 2025 17:20:33 GMT
                                    Content-Type: text/html
                                    Content-Length: 104
                                    Connection: keep-alive
                                    Cache-Control: no-cache
                                    Pragma: no-cache
                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    6192.168.2.549722193.122.6.168802452C:\Users\user\Desktop\SBkuP3ACSA.exe
                                    TimestampBytes transferredDirectionData
                                    Jan 10, 2025 18:20:33.877705097 CET151OUTGET / HTTP/1.1
                                    User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                    Host: checkip.dyndns.org
                                    Connection: Keep-Alive
                                    Jan 10, 2025 18:20:34.523174047 CET273INHTTP/1.1 200 OK
                                    Date: Fri, 10 Jan 2025 17:20:34 GMT
                                    Content-Type: text/html
                                    Content-Length: 104
                                    Connection: keep-alive
                                    Cache-Control: no-cache
                                    Pragma: no-cache
                                    Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                    Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    0192.168.2.549707104.21.16.14432452C:\Users\user\Desktop\SBkuP3ACSA.exe
                                    TimestampBytes transferredDirectionData
                                    2025-01-10 17:20:25 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                    Host: reallyfreegeoip.org
                                    Connection: Keep-Alive
                                    2025-01-10 17:20:25 UTC859INHTTP/1.1 200 OK
                                    Date: Fri, 10 Jan 2025 17:20:25 GMT
                                    Content-Type: text/xml
                                    Content-Length: 362
                                    Connection: close
                                    Age: 1844414
                                    Cache-Control: max-age=31536000
                                    cf-cache-status: HIT
                                    last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=eWVVJRVCcnFgqAWLVEsmpwdDzGgcB0539LGpp7%2FcD29p%2Bx8rO5tGm7WUi152fzKcWp2HgF6cyf5tIX70%2FSF5QXI%2BDJp9yhgohAOMPVsZDc9e2yNBKnJYWL60jcLII0B%2FF7vnqwXA"}],"group":"cf-nel","max_age":604800}
                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                    Server: cloudflare
                                    CF-RAY: 8ffe567069788ce3-EWR
                                    alt-svc: h3=":443"; ma=86400
                                    server-timing: cfL4;desc="?proto=TCP&rtt=1898&min_rtt=1843&rtt_var=730&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2849&recv_bytes=699&delivery_rate=1584373&cwnd=252&unsent_bytes=0&cid=7bf8d5cee71e073d&ts=176&x=0"
                                    2025-01-10 17:20:25 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                    Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    1192.168.2.549709104.21.16.14432452C:\Users\user\Desktop\SBkuP3ACSA.exe
                                    TimestampBytes transferredDirectionData
                                    2025-01-10 17:20:26 UTC61OUTGET /xml/8.46.123.189 HTTP/1.1
                                    Host: reallyfreegeoip.org
                                    2025-01-10 17:20:26 UTC865INHTTP/1.1 200 OK
                                    Date: Fri, 10 Jan 2025 17:20:26 GMT
                                    Content-Type: text/xml
                                    Content-Length: 362
                                    Connection: close
                                    Age: 1844415
                                    Cache-Control: max-age=31536000
                                    cf-cache-status: HIT
                                    last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=5JUs643uKLtBLQZ0%2FYqWvJjXOaDEvPxnm%2F3y3AtE9m%2BFCA8CdwLSHOLGN85Zm8ApKpAmCf2qcKeSqx%2Bs%2FPuoVrLMYLHDvTT5%2FQfrKOvEflvaDMK%2F9tOVu6fbU%2FFIjops3J96Tiz9"}],"group":"cf-nel","max_age":604800}
                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                    Server: cloudflare
                                    CF-RAY: 8ffe56758b457293-EWR
                                    alt-svc: h3=":443"; ma=86400
                                    server-timing: cfL4;desc="?proto=TCP&rtt=2064&min_rtt=2059&rtt_var=783&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2847&recv_bytes=699&delivery_rate=1387832&cwnd=158&unsent_bytes=0&cid=ef9fd5da07fc5950&ts=157&x=0"
                                    2025-01-10 17:20:26 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                    Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    2192.168.2.549711104.21.16.14432452C:\Users\user\Desktop\SBkuP3ACSA.exe
                                    TimestampBytes transferredDirectionData
                                    2025-01-10 17:20:27 UTC61OUTGET /xml/8.46.123.189 HTTP/1.1
                                    Host: reallyfreegeoip.org
                                    2025-01-10 17:20:27 UTC857INHTTP/1.1 200 OK
                                    Date: Fri, 10 Jan 2025 17:20:27 GMT
                                    Content-Type: text/xml
                                    Content-Length: 362
                                    Connection: close
                                    Age: 1844416
                                    Cache-Control: max-age=31536000
                                    cf-cache-status: HIT
                                    last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=t08zeo6rNqt6HbJs7M%2BDvfOAOBOI2F5qipgFxnsLrQT1qkFNrJKkct123%2BK7jWR8LJA2Bgl%2FgzfFWKTDwmE%2FWwT2kvU7eLRYUKXpO0fruLKqzjxyxN2s1G8e8kC4RloxyWYNtZ6d"}],"group":"cf-nel","max_age":604800}
                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                    Server: cloudflare
                                    CF-RAY: 8ffe567d5dea8ce3-EWR
                                    alt-svc: h3=":443"; ma=86400
                                    server-timing: cfL4;desc="?proto=TCP&rtt=1941&min_rtt=1927&rtt_var=751&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2848&recv_bytes=699&delivery_rate=1429270&cwnd=252&unsent_bytes=0&cid=4b5c0c991fad9447&ts=152&x=0"
                                    2025-01-10 17:20:27 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                    Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    3192.168.2.549715104.21.16.14432452C:\Users\user\Desktop\SBkuP3ACSA.exe
                                    TimestampBytes transferredDirectionData
                                    2025-01-10 17:20:28 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                    Host: reallyfreegeoip.org
                                    Connection: Keep-Alive
                                    2025-01-10 17:20:29 UTC861INHTTP/1.1 200 OK
                                    Date: Fri, 10 Jan 2025 17:20:29 GMT
                                    Content-Type: text/xml
                                    Content-Length: 362
                                    Connection: close
                                    Age: 1844418
                                    Cache-Control: max-age=31536000
                                    cf-cache-status: HIT
                                    last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=F5LKy0DX3%2FG9mvVeaDtFN9nAgMSsKv%2FLABh9%2FBlcYHKv6Lczk%2BEOzlCTjc%2B8%2FLyqx7vkezmnVgKqx6o6UMqcjx6xdYtvya6lOqIwNtJ9dpVlyK2y0v4PHFpNvorFz6RwdFqsq93c"}],"group":"cf-nel","max_age":604800}
                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                    Server: cloudflare
                                    CF-RAY: 8ffe56856f587293-EWR
                                    alt-svc: h3=":443"; ma=86400
                                    server-timing: cfL4;desc="?proto=TCP&rtt=1995&min_rtt=1988&rtt_var=759&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2847&recv_bytes=699&delivery_rate=1427872&cwnd=158&unsent_bytes=0&cid=b4a3a789924a36d5&ts=142&x=0"
                                    2025-01-10 17:20:29 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                    Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    4192.168.2.549717104.21.16.14432452C:\Users\user\Desktop\SBkuP3ACSA.exe
                                    TimestampBytes transferredDirectionData
                                    2025-01-10 17:20:30 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                    Host: reallyfreegeoip.org
                                    Connection: Keep-Alive
                                    2025-01-10 17:20:30 UTC867INHTTP/1.1 200 OK
                                    Date: Fri, 10 Jan 2025 17:20:30 GMT
                                    Content-Type: text/xml
                                    Content-Length: 362
                                    Connection: close
                                    Age: 1844419
                                    Cache-Control: max-age=31536000
                                    cf-cache-status: HIT
                                    last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=HEpMHWED%2BOZhd36RSLuHsnlU7O%2Ft7Q1YrOWsoAWXPYd6ZVAgwr6D1%2Ft%2F0gAchwl1Wng8WooEMtNOsh%2B1emwSl%2BKkw%2BteD8IW%2F28yZgAPhw8129MlH4SMoBbrZeof%2F6VMOLgozXUu"}],"group":"cf-nel","max_age":604800}
                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                    Server: cloudflare
                                    CF-RAY: 8ffe568d3e258ce3-EWR
                                    alt-svc: h3=":443"; ma=86400
                                    server-timing: cfL4;desc="?proto=TCP&rtt=1830&min_rtt=1805&rtt_var=727&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2848&recv_bytes=699&delivery_rate=1455633&cwnd=252&unsent_bytes=0&cid=9cf75cb12fed4e23&ts=145&x=0"
                                    2025-01-10 17:20:30 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                    Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    5192.168.2.549719104.21.16.14432452C:\Users\user\Desktop\SBkuP3ACSA.exe
                                    TimestampBytes transferredDirectionData
                                    2025-01-10 17:20:31 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                    Host: reallyfreegeoip.org
                                    Connection: Keep-Alive
                                    2025-01-10 17:20:31 UTC853INHTTP/1.1 200 OK
                                    Date: Fri, 10 Jan 2025 17:20:31 GMT
                                    Content-Type: text/xml
                                    Content-Length: 362
                                    Connection: close
                                    Age: 1844420
                                    Cache-Control: max-age=31536000
                                    cf-cache-status: HIT
                                    last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=FsQZKqMn8mHERC%2FvbzipnmSvN9JKe4Nrvth5mhyPqZ9JX0ELE6x4HsPchSwj0DRzjIoXcoRSWdUyRkt69GXaurgJ61gYmNVvTnIj0W7toEth%2FM7p8Cim2X7KEtAEqH4wFNcU960v"}],"group":"cf-nel","max_age":604800}
                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                    Server: cloudflare
                                    CF-RAY: 8ffe56952e6a4388-EWR
                                    alt-svc: h3=":443"; ma=86400
                                    server-timing: cfL4;desc="?proto=TCP&rtt=1583&min_rtt=1575&rtt_var=607&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2847&recv_bytes=699&delivery_rate=1780487&cwnd=221&unsent_bytes=0&cid=bed04519a442aa6a&ts=160&x=0"
                                    2025-01-10 17:20:31 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                    Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    6192.168.2.549721104.21.16.14432452C:\Users\user\Desktop\SBkuP3ACSA.exe
                                    TimestampBytes transferredDirectionData
                                    2025-01-10 17:20:33 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                    Host: reallyfreegeoip.org
                                    Connection: Keep-Alive
                                    2025-01-10 17:20:33 UTC857INHTTP/1.1 200 OK
                                    Date: Fri, 10 Jan 2025 17:20:33 GMT
                                    Content-Type: text/xml
                                    Content-Length: 362
                                    Connection: close
                                    Age: 1844422
                                    Cache-Control: max-age=31536000
                                    cf-cache-status: HIT
                                    last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=S9rXWMuv5%2F7GsK2L%2Ffz8sUQkZ75U758Eama1MntsT2jXF76lFN8e9vY21oUt%2F8CjjGXTUpKBfv4zYI9w8N0rLjUwQrWORdXqmEPnYFm9bBs%2BEF6vyDnFssOcmHVoK90rFOzLwYeb"}],"group":"cf-nel","max_age":604800}
                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                    Server: cloudflare
                                    CF-RAY: 8ffe56a33be20fa8-EWR
                                    alt-svc: h3=":443"; ma=86400
                                    server-timing: cfL4;desc="?proto=TCP&rtt=1470&min_rtt=1466&rtt_var=559&sent=4&recv=6&lost=0&retrans=0&sent_bytes=2849&recv_bytes=699&delivery_rate=1941489&cwnd=252&unsent_bytes=0&cid=a7e2d3c629b3539f&ts=157&x=0"
                                    2025-01-10 17:20:33 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                    Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    7192.168.2.549723104.21.16.14432452C:\Users\user\Desktop\SBkuP3ACSA.exe
                                    TimestampBytes transferredDirectionData
                                    2025-01-10 17:20:34 UTC61OUTGET /xml/8.46.123.189 HTTP/1.1
                                    Host: reallyfreegeoip.org
                                    2025-01-10 17:20:35 UTC857INHTTP/1.1 200 OK
                                    Date: Fri, 10 Jan 2025 17:20:35 GMT
                                    Content-Type: text/xml
                                    Content-Length: 362
                                    Connection: close
                                    Age: 1844424
                                    Cache-Control: max-age=31536000
                                    cf-cache-status: HIT
                                    last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=DPRHPP43E2IIJhnApIfaghYMxQYm8gdyY2ffYDsKX8w0iP6hIJaojAMv2swVUQyftAEriqf%2B%2BIAtpACIzRmmQi9lIDzzTgx7k%2FES9%2F3Mv8JPT1IRDBoa9EPCUJdyaLIeckXznvRp"}],"group":"cf-nel","max_age":604800}
                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                    Server: cloudflare
                                    CF-RAY: 8ffe56ab3e694388-EWR
                                    alt-svc: h3=":443"; ma=86400
                                    server-timing: cfL4;desc="?proto=TCP&rtt=1584&min_rtt=1576&rtt_var=607&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2849&recv_bytes=699&delivery_rate=1780487&cwnd=221&unsent_bytes=0&cid=fd3e376857ba3fef&ts=164&x=0"
                                    2025-01-10 17:20:35 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                    Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                    Click to jump to process

                                    Click to jump to process

                                    Click to dive into process behavior distribution

                                    Click to jump to process

                                    Target ID:0
                                    Start time:12:20:20
                                    Start date:10/01/2025
                                    Path:C:\Users\user\Desktop\SBkuP3ACSA.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Users\user\Desktop\SBkuP3ACSA.exe"
                                    Imagebase:0x270000
                                    File size:826'368 bytes
                                    MD5 hash:22B0C4DEFEC129BB6A33FC44F1499910
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: MALWARE_Win_DLInjector02, Description: Detects downloader injector, Source: 00000000.00000002.3315691533.0000000005090000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.3314447238.0000000003699000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000000.00000002.3314447238.0000000003699000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000000.00000002.3314447238.0000000003699000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                    • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000000.00000002.3314447238.0000000003699000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                    Reputation:low
                                    Has exited:false

                                    Target ID:2
                                    Start time:12:20:21
                                    Start date:10/01/2025
                                    Path:C:\Users\user\Desktop\SBkuP3ACSA.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Users\user\Desktop\SBkuP3ACSA.exe"
                                    Imagebase:0x9c0000
                                    File size:826'368 bytes
                                    MD5 hash:22B0C4DEFEC129BB6A33FC44F1499910
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.2195327620.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000002.00000002.2195327620.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                    • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000002.00000002.2195327620.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                    • Rule: MALWARE_Win_SnakeKeylogger, Description: Detects Snake Keylogger, Source: 00000002.00000002.2195327620.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                                    • Rule: JoeSecurity_SnakeKeylogger, Description: Yara detected Snake Keylogger, Source: 00000002.00000002.2196563053.0000000002D41000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    Reputation:low
                                    Has exited:true

                                    Target ID:4
                                    Start time:12:20:34
                                    Start date:10/01/2025
                                    Path:C:\Windows\SysWOW64\cmd.exe
                                    Wow64 process (32bit):true
                                    Commandline:"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\user\Desktop\SBkuP3ACSA.exe"
                                    Imagebase:0x790000
                                    File size:236'544 bytes
                                    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:5
                                    Start time:12:20:34
                                    Start date:10/01/2025
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff6d64d0000
                                    File size:862'208 bytes
                                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high
                                    Has exited:true

                                    Target ID:6
                                    Start time:12:20:34
                                    Start date:10/01/2025
                                    Path:C:\Windows\SysWOW64\choice.exe
                                    Wow64 process (32bit):true
                                    Commandline:choice /C Y /N /D Y /T 3
                                    Imagebase:0x7f0000
                                    File size:28'160 bytes
                                    MD5 hash:FCE0E41C87DC4ABBE976998AD26C27E4
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:moderate
                                    Has exited:true

                                    Reset < >

                                      Execution Graph

                                      Execution Coverage:8.2%
                                      Dynamic/Decrypted Code Coverage:100%
                                      Signature Coverage:4%
                                      Total number of Nodes:124
                                      Total number of Limit Nodes:10
                                      execution_graph 23746 ab4668 23747 ab467a 23746->23747 23748 ab4686 23747->23748 23752 ab4779 23747->23752 23757 ab3e10 23748->23757 23750 ab46a5 23753 ab479d 23752->23753 23761 ab4888 23753->23761 23765 ab4878 23753->23765 23758 ab3e1b 23757->23758 23773 ab5c64 23758->23773 23760 ab6fcf 23760->23750 23762 ab48af 23761->23762 23764 ab498c 23762->23764 23769 ab4248 23762->23769 23767 ab4888 23765->23767 23766 ab498c 23766->23766 23767->23766 23768 ab4248 CreateActCtxA 23767->23768 23768->23766 23770 ab5918 CreateActCtxA 23769->23770 23772 ab59db 23770->23772 23774 ab5c6f 23773->23774 23777 ab5c84 23774->23777 23776 ab7085 23776->23760 23778 ab5c8f 23777->23778 23781 ab5cb4 23778->23781 23780 ab7162 23780->23776 23782 ab5cbf 23781->23782 23785 ab5ce4 23782->23785 23784 ab7265 23784->23780 23787 ab5cef 23785->23787 23786 ab85a9 23786->23784 23788 ab856b 23787->23788 23791 abac18 23787->23791 23788->23786 23795 abcd0f 23788->23795 23799 abac40 23791->23799 23803 abac50 23791->23803 23792 abac2e 23792->23788 23796 abcd31 23795->23796 23797 abcd55 23796->23797 23811 abcec0 23796->23811 23797->23786 23800 abac50 23799->23800 23806 abad48 23800->23806 23801 abac5f 23801->23792 23805 abad48 GetModuleHandleW 23803->23805 23804 abac5f 23804->23792 23805->23804 23807 abad7c 23806->23807 23808 abad59 23806->23808 23807->23801 23808->23807 23809 abaf80 GetModuleHandleW 23808->23809 23810 abafad 23809->23810 23810->23801 23813 abcecd 23811->23813 23812 abcf07 23812->23797 23813->23812 23815 abb720 23813->23815 23816 abb72b 23815->23816 23818 abdc18 23816->23818 23819 abd024 23816->23819 23818->23818 23820 abd02f 23819->23820 23821 ab5ce4 3 API calls 23820->23821 23822 abdc87 23821->23822 23823 abdc96 23822->23823 23826 abdd00 23822->23826 23830 abdcf4 23822->23830 23823->23818 23827 abdd2e 23826->23827 23828 abddfa KiUserCallbackDispatcher 23827->23828 23829 abddff 23827->23829 23828->23829 23831 abdd2e 23830->23831 23832 abddfa KiUserCallbackDispatcher 23831->23832 23833 abddff 23831->23833 23832->23833 23883 abd3d8 23884 abd41e GetCurrentProcess 23883->23884 23886 abd469 23884->23886 23887 abd470 GetCurrentThread 23884->23887 23886->23887 23888 abd4ad GetCurrentProcess 23887->23888 23889 abd4a6 23887->23889 23890 abd4e3 23888->23890 23889->23888 23891 abd50b GetCurrentThreadId 23890->23891 23892 abd53c 23891->23892 23834 8991a70 23835 8991a8a 23834->23835 23838 8991a9d 23834->23838 23840 8990760 23835->23840 23837 8991ae3 23838->23837 23839 8990760 OleInitialize 23838->23839 23839->23837 23841 899076b 23840->23841 23842 8991b0e 23841->23842 23845 8991b38 23841->23845 23850 8991b48 23841->23850 23842->23838 23847 8991b70 23845->23847 23849 8991b9c 23845->23849 23846 8991b79 23846->23842 23847->23846 23855 89907fc 23847->23855 23849->23842 23851 8991b70 23850->23851 23854 8991b9c 23850->23854 23852 8991b79 23851->23852 23853 89907fc OleInitialize 23851->23853 23852->23842 23853->23854 23854->23842 23856 8990807 23855->23856 23857 8991e93 23856->23857 23859 8990818 23856->23859 23857->23849 23860 8991ec8 OleInitialize 23859->23860 23861 8991f2c 23860->23861 23861->23857 23893 8999680 23896 89996e5 23893->23896 23894 8997a30 PeekMessageW 23894->23896 23895 8999b48 WaitMessage 23895->23896 23896->23894 23896->23895 23898 8999732 23896->23898 23899 89992ac 23896->23899 23900 899a3e8 DispatchMessageW 23899->23900 23901 899a454 23900->23901 23901->23896 23862 abfee0 23863 abff07 23862->23863 23867 89902ab 23863->23867 23872 8990287 23863->23872 23864 abff2b 23868 89902be 23867->23868 23877 8990588 PostMessageW 23868->23877 23879 8990563 PostMessageW 23868->23879 23869 89902e1 23869->23864 23873 89902ac 23872->23873 23874 899028d 23872->23874 23875 8990588 PostMessageW 23873->23875 23876 8990563 PostMessageW 23873->23876 23874->23864 23875->23874 23876->23874 23878 89905f4 23877->23878 23878->23869 23880 89905f4 23879->23880 23880->23869 23881 abd620 DuplicateHandle 23882 abd6b6 23881->23882

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 625 8999680-89996e3 626 8999712-8999730 625->626 627 89996e5-899970f 625->627 632 8999739-8999770 626->632 633 8999732-8999734 626->633 627->626 637 8999ba1 632->637 638 8999776-899978a 632->638 635 8999bf2-8999c07 633->635 641 8999ba6-8999bbc 637->641 639 89997b9-89997d8 638->639 640 899978c-89997b6 638->640 647 89997da-89997e0 639->647 648 89997f0-89997f2 639->648 640->639 641->635 652 89997e2 647->652 653 89997e4-89997e6 647->653 649 8999811-899981a 648->649 650 89997f4-899980c 648->650 654 8999822-8999829 649->654 650->641 652->648 653->648 655 899982b-8999831 654->655 656 8999833-899983a 654->656 657 8999847-8999864 call 8997a30 655->657 658 899983c-8999842 656->658 659 8999844 656->659 662 89999b9-89999bd 657->662 663 899986a-8999871 657->663 658->657 659->657 664 8999b8c-8999b9f 662->664 665 89999c3-89999c7 662->665 663->637 666 8999877-89998b4 663->666 664->641 667 89999c9-89999dc 665->667 668 89999e1-89999ea 665->668 672 89998ba-89998bf 666->672 673 8999b82-8999b86 666->673 667->641 670 8999a19-8999a20 668->670 671 89999ec-8999a16 668->671 674 8999abf-8999ad4 670->674 675 8999a26-8999a2d 670->675 671->670 678 89998f1-8999906 call 8999284 672->678 679 89998c1-89998cf call 899926c 672->679 673->654 673->664 674->673 689 8999ada-8999adc 674->689 676 8999a5c-8999a7e 675->676 677 8999a2f-8999a59 675->677 676->674 715 8999a80-8999a8a 676->715 677->676 687 899990b-899990f 678->687 679->678 690 89998d1-89998ef call 8999278 679->690 691 8999911-8999923 call 8999290 687->691 692 8999980-899998d 687->692 693 8999b29-8999b46 call 8997a30 689->693 694 8999ade-8999b17 689->694 690->687 717 8999963-899997b 691->717 718 8999925-8999955 691->718 692->673 709 8999993-899999d call 89992a0 692->709 693->673 708 8999b48-8999b74 WaitMessage 693->708 705 8999b19-8999b1f 694->705 706 8999b20-8999b27 694->706 705->706 706->673 712 8999b7b 708->712 713 8999b76 708->713 722 89999ac-89999b4 call 89992b8 709->722 723 899999f-89999a2 call 89992ac 709->723 712->673 713->712 724 8999a8c-8999a92 715->724 725 8999aa2-8999abd 715->725 717->641 732 899995c 718->732 733 8999957 718->733 722->673 734 89999a7 723->734 729 8999a94 724->729 730 8999a96-8999a98 724->730 725->674 725->715 729->725 730->725 732->717 733->732 734->673
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3316386618.0000000008990000.00000040.00000800.00020000.00000000.sdmp, Offset: 08990000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_8990000_SBkuP3ACSA.jbxd
                                      Similarity
                                      • API ID: DispatchMessage
                                      • String ID:
                                      • API String ID: 2061451462-0
                                      • Opcode ID: affae77b23c0b256b0a99eafe5d15fcd034857d32128047b32249f134406f5bd
                                      • Instruction ID: ea3312c78cc9b5509cb04f970b38b5e13c62d4881a79400b45f4fd36d6906515
                                      • Opcode Fuzzy Hash: affae77b23c0b256b0a99eafe5d15fcd034857d32128047b32249f134406f5bd
                                      • Instruction Fuzzy Hash: 79F16930A00209CFDF14EFA9C944BADBBF5FF88319F15815DE449AB2A5DB74A945CB80

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 557 abd3c9-abd467 GetCurrentProcess 562 abd469-abd46f 557->562 563 abd470-abd4a4 GetCurrentThread 557->563 562->563 564 abd4ad-abd4e1 GetCurrentProcess 563->564 565 abd4a6-abd4ac 563->565 567 abd4ea-abd505 call abd5a8 564->567 568 abd4e3-abd4e9 564->568 565->564 570 abd50b-abd53a GetCurrentThreadId 567->570 568->567 572 abd53c-abd542 570->572 573 abd543-abd5a5 570->573 572->573
                                      APIs
                                      • GetCurrentProcess.KERNEL32 ref: 00ABD456
                                      • GetCurrentThread.KERNEL32 ref: 00ABD493
                                      • GetCurrentProcess.KERNEL32 ref: 00ABD4D0
                                      • GetCurrentThreadId.KERNEL32 ref: 00ABD529
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3312286952.0000000000AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AB0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_ab0000_SBkuP3ACSA.jbxd
                                      Similarity
                                      • API ID: Current$ProcessThread
                                      • String ID:
                                      • API String ID: 2063062207-0
                                      • Opcode ID: 0b6d5fe00451d92944b5f80297b829e808baa2ff80615403290da0397492affc
                                      • Instruction ID: 0929849910c9b7fd2ec5c7531ba6c53398cfedf51b69eb87f80f837827e93621
                                      • Opcode Fuzzy Hash: 0b6d5fe00451d92944b5f80297b829e808baa2ff80615403290da0397492affc
                                      • Instruction Fuzzy Hash: F45177B0900309DFDB14CFAAD948BDEBBF5EF48314F24845AE009A73A1DB74A944CB65

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 580 abd3d8-abd467 GetCurrentProcess 584 abd469-abd46f 580->584 585 abd470-abd4a4 GetCurrentThread 580->585 584->585 586 abd4ad-abd4e1 GetCurrentProcess 585->586 587 abd4a6-abd4ac 585->587 589 abd4ea-abd505 call abd5a8 586->589 590 abd4e3-abd4e9 586->590 587->586 592 abd50b-abd53a GetCurrentThreadId 589->592 590->589 594 abd53c-abd542 592->594 595 abd543-abd5a5 592->595 594->595
                                      APIs
                                      • GetCurrentProcess.KERNEL32 ref: 00ABD456
                                      • GetCurrentThread.KERNEL32 ref: 00ABD493
                                      • GetCurrentProcess.KERNEL32 ref: 00ABD4D0
                                      • GetCurrentThreadId.KERNEL32 ref: 00ABD529
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3312286952.0000000000AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AB0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_ab0000_SBkuP3ACSA.jbxd
                                      Similarity
                                      • API ID: Current$ProcessThread
                                      • String ID:
                                      • API String ID: 2063062207-0
                                      • Opcode ID: 4a5db3492826aeb396f1fb953f50c8ef6749078147e591612654291423ecfd8f
                                      • Instruction ID: e1692dad89d8b08d0121c507b16e1ea2ab2e4ab0ff7549581ffb99b6cdfa8dd3
                                      • Opcode Fuzzy Hash: 4a5db3492826aeb396f1fb953f50c8ef6749078147e591612654291423ecfd8f
                                      • Instruction Fuzzy Hash: 4B5177B0900309CFDB14DFAAD948BDEBBF5EF48314F24845AE009A73A1DB746944CB65

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 737 abad48-abad57 738 abad59-abad66 call aba0a0 737->738 739 abad83-abad87 737->739 744 abad68 738->744 745 abad7c 738->745 740 abad9b-abaddc 739->740 741 abad89-abad93 739->741 748 abade9-abadf7 740->748 749 abadde-abade6 740->749 741->740 795 abad6e call abafe0 744->795 796 abad6e call abafd0 744->796 745->739 751 abae1b-abae1d 748->751 752 abadf9-abadfe 748->752 749->748 750 abad74-abad76 750->745 753 abaeb8-abaf34 750->753 754 abae20-abae27 751->754 755 abae09 752->755 756 abae00-abae07 call aba0ac 752->756 787 abaf60-abaf78 753->787 788 abaf36-abaf5e 753->788 759 abae29-abae31 754->759 760 abae34-abae3b 754->760 758 abae0b-abae19 755->758 756->758 758->754 759->760 762 abae48-abae4a call aba0bc 760->762 763 abae3d-abae45 760->763 766 abae4f-abae51 762->766 763->762 768 abae5e-abae63 766->768 769 abae53-abae5b 766->769 770 abae81-abae8e 768->770 771 abae65-abae6c 768->771 769->768 778 abaeb1-abaeb7 770->778 779 abae90-abaeae 770->779 771->770 773 abae6e-abae7e call aba0cc call aba0dc 771->773 773->770 779->778 790 abaf7a-abaf7d 787->790 791 abaf80-abafab GetModuleHandleW 787->791 788->787 790->791 792 abafad-abafb3 791->792 793 abafb4-abafc8 791->793 792->793 795->750 796->750
                                      APIs
                                      • GetModuleHandleW.KERNELBASE(00000000), ref: 00ABAF9E
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3312286952.0000000000AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AB0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_ab0000_SBkuP3ACSA.jbxd
                                      Similarity
                                      • API ID: HandleModule
                                      • String ID:
                                      • API String ID: 4139908857-0
                                      • Opcode ID: f0319c37f57a27c6afcaae28ad42cebc047e41f55ef4d9a2ee77f2bbd776368e
                                      • Instruction ID: 671a086aa3aacfcc0e8ea9189e14293db9f5cbb1db6ebe79eb9920c8cf8a4a97
                                      • Opcode Fuzzy Hash: f0319c37f57a27c6afcaae28ad42cebc047e41f55ef4d9a2ee77f2bbd776368e
                                      • Instruction Fuzzy Hash: 388177B0A00B048FDB24DF29D54179ABBF9FF98304F00892ED48ADBA52D735E945CB91

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 797 ab590d-ab59d9 CreateActCtxA 799 ab59db-ab59e1 797->799 800 ab59e2-ab5a3c 797->800 799->800 807 ab5a4b-ab5a4f 800->807 808 ab5a3e-ab5a41 800->808 809 ab5a51-ab5a5d 807->809 810 ab5a60 807->810 808->807 809->810 811 ab5a61 810->811 811->811
                                      APIs
                                      • CreateActCtxA.KERNEL32(?), ref: 00AB59C9
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3312286952.0000000000AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AB0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_ab0000_SBkuP3ACSA.jbxd
                                      Similarity
                                      • API ID: Create
                                      • String ID:
                                      • API String ID: 2289755597-0
                                      • Opcode ID: 2dfb8c315ead290d0d672dc1b5601cc658015b500b514c2c164c807addd2accf
                                      • Instruction ID: ca4e7aa54f2fef86bb80e9941392bd2471376ba6db99b75a75a7f7b6a9a00150
                                      • Opcode Fuzzy Hash: 2dfb8c315ead290d0d672dc1b5601cc658015b500b514c2c164c807addd2accf
                                      • Instruction Fuzzy Hash: CE41CDB1C00619CADB24CFA9C888BDDBBB5FF49304F20856AD408AB255DB75694ACF50

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 813 ab4248-ab59d9 CreateActCtxA 816 ab59db-ab59e1 813->816 817 ab59e2-ab5a3c 813->817 816->817 824 ab5a4b-ab5a4f 817->824 825 ab5a3e-ab5a41 817->825 826 ab5a51-ab5a5d 824->826 827 ab5a60 824->827 825->824 826->827 828 ab5a61 827->828 828->828
                                      APIs
                                      • CreateActCtxA.KERNEL32(?), ref: 00AB59C9
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3312286952.0000000000AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AB0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_ab0000_SBkuP3ACSA.jbxd
                                      Similarity
                                      • API ID: Create
                                      • String ID:
                                      • API String ID: 2289755597-0
                                      • Opcode ID: 3a0f387e1679050e97b7ae69cd7c498f4b36f147ddb9dc7d762a7e33e7e40da4
                                      • Instruction ID: c138d416afe6fc31e238d6d5a143dbfe9cbec7e26dc96325e95f0553a1bf2216
                                      • Opcode Fuzzy Hash: 3a0f387e1679050e97b7ae69cd7c498f4b36f147ddb9dc7d762a7e33e7e40da4
                                      • Instruction Fuzzy Hash: C841BEB0C00719CBDB24CFA9C884BDDBBB5FF49304F20816AD408AB255DB756949CFA0

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 830 abd619-abd61e 831 abd620-abd6b4 DuplicateHandle 830->831 832 abd6bd-abd6da 831->832 833 abd6b6-abd6bc 831->833 833->832
                                      APIs
                                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00ABD6A7
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3312286952.0000000000AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AB0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_ab0000_SBkuP3ACSA.jbxd
                                      Similarity
                                      • API ID: DuplicateHandle
                                      • String ID:
                                      • API String ID: 3793708945-0
                                      • Opcode ID: 88df7368b45aef2b4174b76030d0bbd1021443d3cd0daed0b0b9ed336223a708
                                      • Instruction ID: a984f616d27b1bdf59155f3245e37a50565ad1950adf6eb6eed9ef7504f56832
                                      • Opcode Fuzzy Hash: 88df7368b45aef2b4174b76030d0bbd1021443d3cd0daed0b0b9ed336223a708
                                      • Instruction Fuzzy Hash: F02103B5900209AFDB10CF9AD884ADEBBF8EB48320F14841AE958A7310D375A940CF64

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 836 abd620-abd6b4 DuplicateHandle 837 abd6bd-abd6da 836->837 838 abd6b6-abd6bc 836->838 838->837
                                      APIs
                                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00ABD6A7
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3312286952.0000000000AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AB0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_ab0000_SBkuP3ACSA.jbxd
                                      Similarity
                                      • API ID: DuplicateHandle
                                      • String ID:
                                      • API String ID: 3793708945-0
                                      • Opcode ID: 4740ec73623f21fec437fdf1209967092fe007cb79d4852c12eaced9caf9c2e8
                                      • Instruction ID: d744bb5505dd5874da7dd894a812ece31cc5a2490ac13d6ce9fdfe241730af52
                                      • Opcode Fuzzy Hash: 4740ec73623f21fec437fdf1209967092fe007cb79d4852c12eaced9caf9c2e8
                                      • Instruction Fuzzy Hash: C721E4B59002489FDB10CF9AD984ADEBFF8FB48310F14841AE918A7350D374A940DF65

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 841 8990563-89905f2 PostMessageW 842 89905fb-899061c 841->842 843 89905f4-89905fa 841->843 843->842
                                      APIs
                                      • PostMessageW.USER32(?,?,?,?), ref: 089905E5
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3316386618.0000000008990000.00000040.00000800.00020000.00000000.sdmp, Offset: 08990000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_8990000_SBkuP3ACSA.jbxd
                                      Similarity
                                      • API ID: MessagePost
                                      • String ID:
                                      • API String ID: 410705778-0
                                      • Opcode ID: 705720880e62d10239542e3f8220547469d260842000791b18e097002e88cab0
                                      • Instruction ID: 4c0cba630488f224433d1cd3682810b0d2bea899df1e5b12fc52d2dad53d48b3
                                      • Opcode Fuzzy Hash: 705720880e62d10239542e3f8220547469d260842000791b18e097002e88cab0
                                      • Instruction Fuzzy Hash: E1216DB58083898FDB11CFA9C945BDEBFF4EB09310F14449AD594E7292C378A544CBA5

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 845 8997a30-8999cbd PeekMessageW 847 8999cbf-8999cc5 845->847 848 8999cc6-8999ce7 845->848 847->848
                                      APIs
                                      • PeekMessageW.USER32(?,?,00000000,00000000,00000000,?,?,?,?,08999862,00000000,00000000,03694364,026B04D8), ref: 08999CB0
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3316386618.0000000008990000.00000040.00000800.00020000.00000000.sdmp, Offset: 08990000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_8990000_SBkuP3ACSA.jbxd
                                      Similarity
                                      • API ID: MessagePeek
                                      • String ID:
                                      • API String ID: 2222842502-0
                                      • Opcode ID: 2e4fd6bab95fddcd0dbb03455b7d8813422fdac16abff8a09a3554d310773c64
                                      • Instruction ID: 6f87b78c39d76afd0e3a09daf73f4d0a98a801d6564c77bc09b08cf1c7084fc3
                                      • Opcode Fuzzy Hash: 2e4fd6bab95fddcd0dbb03455b7d8813422fdac16abff8a09a3554d310773c64
                                      • Instruction Fuzzy Hash: 0A11E4B58043499FDB10DF9AD944BDEBBF8EB48320F14842AE958A3351D378A944CFA5

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 850 8999c43 851 8999c48-8999cbd PeekMessageW 850->851 852 8999cbf-8999cc5 851->852 853 8999cc6-8999ce7 851->853 852->853
                                      APIs
                                      • PeekMessageW.USER32(?,?,00000000,00000000,00000000,?,?,?,?,08999862,00000000,00000000,03694364,026B04D8), ref: 08999CB0
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3316386618.0000000008990000.00000040.00000800.00020000.00000000.sdmp, Offset: 08990000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_8990000_SBkuP3ACSA.jbxd
                                      Similarity
                                      • API ID: MessagePeek
                                      • String ID:
                                      • API String ID: 2222842502-0
                                      • Opcode ID: 51606eca16b5c3b3827518bd4ce4fc4cd3407d9e080dcba68426c85425199d7b
                                      • Instruction ID: 7de8369ae3dd3ed373a5739b610aad801d8fa0f707fca54eccd950ee121c91ef
                                      • Opcode Fuzzy Hash: 51606eca16b5c3b3827518bd4ce4fc4cd3407d9e080dcba68426c85425199d7b
                                      • Instruction Fuzzy Hash: 4A11E4B68003499FDB10DF9AD945BDEBFF8EB48320F14842AE558A3251D378A544CFA5

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 855 8990588-89905f2 PostMessageW 856 89905fb-899061c 855->856 857 89905f4-89905fa 855->857 857->856
                                      APIs
                                      • PostMessageW.USER32(?,?,?,?), ref: 089905E5
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3316386618.0000000008990000.00000040.00000800.00020000.00000000.sdmp, Offset: 08990000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_8990000_SBkuP3ACSA.jbxd
                                      Similarity
                                      • API ID: MessagePost
                                      • String ID:
                                      • API String ID: 410705778-0
                                      • Opcode ID: 070e2c8be7a7b8b7ed1c822d1ac56466a5ec7afdeb54b69f7fff021c6872f128
                                      • Instruction ID: 92f2cdeb3f3cab9af49cfcec8d4395631e26e20e75bcb027f99e5148ccd30ae7
                                      • Opcode Fuzzy Hash: 070e2c8be7a7b8b7ed1c822d1ac56466a5ec7afdeb54b69f7fff021c6872f128
                                      • Instruction Fuzzy Hash: D911F5B5800349DFDB10CF9AC945BDEBFF8EB48320F148459E554A3251D378A944CFA5
                                      APIs
                                      • GetModuleHandleW.KERNELBASE(00000000), ref: 00ABAF9E
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3312286952.0000000000AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AB0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_ab0000_SBkuP3ACSA.jbxd
                                      Similarity
                                      • API ID: HandleModule
                                      • String ID:
                                      • API String ID: 4139908857-0
                                      • Opcode ID: 55a83d8a760a6206bdc4826a1a955a5a3e7e8ecf1d72c6cf04e028cf1bf752fe
                                      • Instruction ID: 8763fcd1ac907bc10ee9d470219d9de5cc3fc4e04dd5450276785867a037bf94
                                      • Opcode Fuzzy Hash: 55a83d8a760a6206bdc4826a1a955a5a3e7e8ecf1d72c6cf04e028cf1bf752fe
                                      • Instruction Fuzzy Hash: F911E3B6C003499FCB20CF9AD944ADEFBF8EB88314F14845AD419A7215C375A545CFA1
                                      APIs
                                      • OleInitialize.OLE32(00000000), ref: 08991F1D
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3316386618.0000000008990000.00000040.00000800.00020000.00000000.sdmp, Offset: 08990000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_8990000_SBkuP3ACSA.jbxd
                                      Similarity
                                      • API ID: Initialize
                                      • String ID:
                                      • API String ID: 2538663250-0
                                      • Opcode ID: d45e7361cec44307bff020a71536a9bffe6e136f709a257a977285b33ef4eb44
                                      • Instruction ID: 47393028496bc8763fbd1a1edb3fec85adb8c8a65d33065027ac9dbcfc2cb5eb
                                      • Opcode Fuzzy Hash: d45e7361cec44307bff020a71536a9bffe6e136f709a257a977285b33ef4eb44
                                      • Instruction Fuzzy Hash: 931103B5904349DFCB20DF9ED948B9EBBF8EB48320F10845AD559A7340C379A944CFA5
                                      APIs
                                      • DispatchMessageW.USER32(?,?,?,?,?,?,00000000,-00000018,?,089999A7), ref: 0899A445
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3316386618.0000000008990000.00000040.00000800.00020000.00000000.sdmp, Offset: 08990000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_8990000_SBkuP3ACSA.jbxd
                                      Similarity
                                      • API ID: DispatchMessage
                                      • String ID:
                                      • API String ID: 2061451462-0
                                      • Opcode ID: 67704865ad8f6e49ca508e96087ea1aec0cb8d59ca937428bbb925fc3c7651b9
                                      • Instruction ID: 6df4716c15da14840be1e56618e1f3a68eb2cec83b6feaf7cbf4257b1619707e
                                      • Opcode Fuzzy Hash: 67704865ad8f6e49ca508e96087ea1aec0cb8d59ca937428bbb925fc3c7651b9
                                      • Instruction Fuzzy Hash: 8911EDB5C047599FCB20DF9AD848B9EFBF8EB48324F10846AE558A3350D378A544CFA5
                                      APIs
                                      • OleInitialize.OLE32(00000000), ref: 08991F1D
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3316386618.0000000008990000.00000040.00000800.00020000.00000000.sdmp, Offset: 08990000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_8990000_SBkuP3ACSA.jbxd
                                      Similarity
                                      • API ID: Initialize
                                      • String ID:
                                      • API String ID: 2538663250-0
                                      • Opcode ID: 0845ae5a37be1413855d21da9220ce0ba432a94e2ade34da9ef9b3be21201e1c
                                      • Instruction ID: 441678ea8e54639078ee046a2ae13c87133b1105b821c92ab7de35e7c1d59eb2
                                      • Opcode Fuzzy Hash: 0845ae5a37be1413855d21da9220ce0ba432a94e2ade34da9ef9b3be21201e1c
                                      • Instruction Fuzzy Hash: 851103B5800349CFDB20DF9AD885BDEBBF8FB48324F24845AD559A3240D378A944CFA5
                                      APIs
                                      • DispatchMessageW.USER32(?,?,?,?,?,?,00000000,-00000018,?,089999A7), ref: 0899A445
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3316386618.0000000008990000.00000040.00000800.00020000.00000000.sdmp, Offset: 08990000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_8990000_SBkuP3ACSA.jbxd
                                      Similarity
                                      • API ID: DispatchMessage
                                      • String ID:
                                      • API String ID: 2061451462-0
                                      • Opcode ID: fa87ae29823008fa3b3a7aa7480ec4f1b6dff93ea36e77481a17fb51cd56e547
                                      • Instruction ID: 15920a629d3234d8ad0da03f1993c8515cf7f31e24f530763c1d7f0dcbde38fc
                                      • Opcode Fuzzy Hash: fa87ae29823008fa3b3a7aa7480ec4f1b6dff93ea36e77481a17fb51cd56e547
                                      • Instruction Fuzzy Hash: 6E11FEB5C003498FCB20DF9AD848B8EFBF8EB48324F10841AD558A3250D378A545CFA5
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3311994479.0000000000A1D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A1D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_a1d000_SBkuP3ACSA.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 1198d740d1113a96fd5a2381c3c3f39509fb70a450d5b7489ceba4b0bca36d78
                                      • Instruction ID: b7cf8312b6cc24979b13ae9783523c5056295abce63ce2cfc94309b80b6f07d7
                                      • Opcode Fuzzy Hash: 1198d740d1113a96fd5a2381c3c3f39509fb70a450d5b7489ceba4b0bca36d78
                                      • Instruction Fuzzy Hash: AA2125B5504204DFDB05DF14D9C0B66BF75FB98324F24C569E90A0F25AC33AE896CBA2
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3312058350.0000000000A2D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A2D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_a2d000_SBkuP3ACSA.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: e82d93f50c432ca4a67e97376d4693e9e2cfc44055118b9ef4490c062e5b118e
                                      • Instruction ID: 9123721f510c8ca0b8b4ffe285bfe1347a4dbb3e2fec256de83d5a995231fd16
                                      • Opcode Fuzzy Hash: e82d93f50c432ca4a67e97376d4693e9e2cfc44055118b9ef4490c062e5b118e
                                      • Instruction Fuzzy Hash: 1F21F275608240DFCB15DF18E984B26BB65FB88324F24C97DD90A4B2A7C33AD807CA61
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3312058350.0000000000A2D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A2D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_a2d000_SBkuP3ACSA.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: e1033c0a21b9d63a9a4d050ed06dffd7214380d47d734e1a2b7207c07627f21e
                                      • Instruction ID: beee6d1beb44ff6d8517e80b835862c6356b0dd020cf2a62531dab2deec07d5b
                                      • Opcode Fuzzy Hash: e1033c0a21b9d63a9a4d050ed06dffd7214380d47d734e1a2b7207c07627f21e
                                      • Instruction Fuzzy Hash: 7C2105B5504244DFDB01DF18E9C4B2ABB65FB98324F24C979D8495F247C33AE806CAA2
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3311994479.0000000000A1D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A1D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_a1d000_SBkuP3ACSA.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 2a42a10f79047cfc5a8dfbea04f5877e4b045e58f4eb555799dbe40d0299e0d1
                                      • Instruction ID: 6d3b366d604796532f4dcbaa87ad919948ba9647037e89194506cb0e86ac9a3e
                                      • Opcode Fuzzy Hash: 2a42a10f79047cfc5a8dfbea04f5877e4b045e58f4eb555799dbe40d0299e0d1
                                      • Instruction Fuzzy Hash: 7E112676404240CFCB16CF00D5C4B56BF72FB94324F24C6A9D8090B256C33AE89ACBA1
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3312058350.0000000000A2D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A2D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_a2d000_SBkuP3ACSA.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: c74efafe6a787794d2e52374dfad20fc7a218ab120a23d42f416259975cce95d
                                      • Instruction ID: 1811397ff6373132b2a261fea08aa1b829b6e0624101fb0bbea0ebd331ecc093
                                      • Opcode Fuzzy Hash: c74efafe6a787794d2e52374dfad20fc7a218ab120a23d42f416259975cce95d
                                      • Instruction Fuzzy Hash: 2A119075508280DFDB15CF14E5C4B15FB62FB44314F24C6ADD84A4B666C33AD84ACB61
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3312058350.0000000000A2D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A2D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_a2d000_SBkuP3ACSA.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f0ca1e03a89bf6502059eb4096cb2751f98ce07bc6b40026132c113bb1690e3e
                                      • Instruction ID: caf2c8b6923a558ffc316f1a4acf2f7a56e3267b252437ac003392dcf8d5b64e
                                      • Opcode Fuzzy Hash: f0ca1e03a89bf6502059eb4096cb2751f98ce07bc6b40026132c113bb1690e3e
                                      • Instruction Fuzzy Hash: C911B27A504280CFDB12CF14E5C4B19FB61FB84324F24C6A9D8494B656C33AD80ACB92
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3312286952.0000000000AB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AB0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_ab0000_SBkuP3ACSA.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: cb3e8adad94939a62b4f007da2205fa688699bc00b96178d48891a73b3a9729e
                                      • Instruction ID: 2862eb2e011b1befd109a9e0c09e396c80f8d75f13caa45e5ca7cde8f0bc04f5
                                      • Opcode Fuzzy Hash: cb3e8adad94939a62b4f007da2205fa688699bc00b96178d48891a73b3a9729e
                                      • Instruction Fuzzy Hash: 28A16E36E002098FCF15DFB4C9405DEB7B6FF85300B1985BAE805AB266EB31E956CB50
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2196393753.0000000002A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_2a40000_SBkuP3ACSA.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 0oHp$LjHp$LjHp$PHeq$PHeq
                                      • API String ID: 0-2617784740
                                      • Opcode ID: 0e3ac55090656379edeb7d0f59cedd0273e0934427980a3f5b801c08a2a7c1c8
                                      • Instruction ID: 2ddcdfa38d1816cba8fb34d4075da9d8c3f0d925c15fb1c19bfe2e228dd264db
                                      • Opcode Fuzzy Hash: 0e3ac55090656379edeb7d0f59cedd0273e0934427980a3f5b801c08a2a7c1c8
                                      • Instruction Fuzzy Hash: F9E1E975E00618CFDB14CFA9C984A9DBBB2FF98314F558469E819AB365DB30E841CF60
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2196393753.0000000002A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_2a40000_SBkuP3ACSA.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 0oHp$LjHp$LjHp$PHeq$PHeq
                                      • API String ID: 0-2617784740
                                      • Opcode ID: c6fc2d6a4acde9f04efcabad2624ecb215ef2bdcf81bd4d372fcbd51bae1daee
                                      • Instruction ID: b506d9b32840ad8d68db04909f51eab2b4543db7d2c5922cddeeb3c516b1f23e
                                      • Opcode Fuzzy Hash: c6fc2d6a4acde9f04efcabad2624ecb215ef2bdcf81bd4d372fcbd51bae1daee
                                      • Instruction Fuzzy Hash: 2C81C574E01218DFDB58DFA9D984A9DBBF2BF88310F14C46AE419AB365DB349981CF10
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2196393753.0000000002A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_2a40000_SBkuP3ACSA.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 0oHp$LjHp$LjHp$PHeq$PHeq
                                      • API String ID: 0-2617784740
                                      • Opcode ID: a1dd845e94a40e6a9cc91b878814b1836cb1f6f12d915d43ac1fea75bfa5099f
                                      • Instruction ID: fb862b13fb87193904aded57797355755bcb8031ef0939f7153d9a122df8c674
                                      • Opcode Fuzzy Hash: a1dd845e94a40e6a9cc91b878814b1836cb1f6f12d915d43ac1fea75bfa5099f
                                      • Instruction Fuzzy Hash: 5D81E774E01218DFDB14DFA9D984A9DBBF2BF88310F14C46AE819AB355DB34A981CF50
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2196393753.0000000002A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_2a40000_SBkuP3ACSA.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 0oHp$LjHp$LjHp$PHeq$PHeq
                                      • API String ID: 0-2617784740
                                      • Opcode ID: 92d856f80c7d3636db1389b9fb26ec71dc87acf7c40c63e986b109f2a6d5624c
                                      • Instruction ID: cad4415b43db40b9c1631b03aa30b1f61ef9396cb080ac6d44e47542521b9b34
                                      • Opcode Fuzzy Hash: 92d856f80c7d3636db1389b9fb26ec71dc87acf7c40c63e986b109f2a6d5624c
                                      • Instruction Fuzzy Hash: E881C474E01218DFDB54DFAAD984A9DBBF2BF88314F14C06AE819A7365DB349941CF10
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2196393753.0000000002A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_2a40000_SBkuP3ACSA.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 0oHp$LjHp$LjHp$PHeq$PHeq
                                      • API String ID: 0-2617784740
                                      • Opcode ID: 913ab50f7625919b15c6362cd7a347fe66a39fa5a40892f41880bfd66dff4a83
                                      • Instruction ID: dcf63b26dee204e7d9da1d1f81639996335da730c3ba8761b2ff44c38a5d8f64
                                      • Opcode Fuzzy Hash: 913ab50f7625919b15c6362cd7a347fe66a39fa5a40892f41880bfd66dff4a83
                                      • Instruction Fuzzy Hash: 9C81B374E01218DFDB54DFA9D984A9DBBF2BF88310F14D06AE819AB365DB349981CF10
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2196393753.0000000002A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_2a40000_SBkuP3ACSA.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 0oHp$LjHp$LjHp$PHeq$PHeq
                                      • API String ID: 0-2617784740
                                      • Opcode ID: 18100bba8b567703a7a6f91f154a5a24f5b260dad8e1caf56fc3bd886f25197b
                                      • Instruction ID: 735e3040030e9a4a5c51c0d6a0187e44918ccee36d6e531465f250c18e63c06e
                                      • Opcode Fuzzy Hash: 18100bba8b567703a7a6f91f154a5a24f5b260dad8e1caf56fc3bd886f25197b
                                      • Instruction Fuzzy Hash: 47817274E00218DFDB58DFA9D984B9DBBB2BF89300F14C069E819AB365DB349981CF50
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2196393753.0000000002A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_2a40000_SBkuP3ACSA.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 0oHp$LjHp$LjHp$PHeq$PHeq
                                      • API String ID: 0-2617784740
                                      • Opcode ID: 6afa56e9716aef6816d29219a0f56316ecd7c2796d3d4fdd496f529919237c3a
                                      • Instruction ID: 71913eec574584e52b2f65e37721c34e4eecd802a6b11a03285229693f62bfe6
                                      • Opcode Fuzzy Hash: 6afa56e9716aef6816d29219a0f56316ecd7c2796d3d4fdd496f529919237c3a
                                      • Instruction Fuzzy Hash: 0C819674E01218DFDB58DFA9D984A9DBBF2BF88310F14C06AE819AB365DB349941CF10
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2196393753.0000000002A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_2a40000_SBkuP3ACSA.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 0oHp$LjHp$LjHp$PHeq$PHeq
                                      • API String ID: 0-2617784740
                                      • Opcode ID: e6f7dbe6966ddeebaffeaaf8cea6f09108d9afa5571c8f820931d284fe0605ec
                                      • Instruction ID: 4f3ef56d10b6526188150daf3f43002156c171cfbc92d61f542457b5e12dd07d
                                      • Opcode Fuzzy Hash: e6f7dbe6966ddeebaffeaaf8cea6f09108d9afa5571c8f820931d284fe0605ec
                                      • Instruction Fuzzy Hash: 10819474E00218DFDB58DFA9D984A9DBBF2BF89304F14C469E819AB365DB349981CF10
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2196393753.0000000002A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_2a40000_SBkuP3ACSA.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: (oeq$(oeq$,iq$,iq
                                      • API String ID: 0-2093320806
                                      • Opcode ID: cd567e3b016b0b808bdc1903abd79717bafea4b5832b3f26a6c673dda2cbf34e
                                      • Instruction ID: 884dddb31654861c320832dc1c475b7aed6a2970e1943db3c6f168048ac8e294
                                      • Opcode Fuzzy Hash: cd567e3b016b0b808bdc1903abd79717bafea4b5832b3f26a6c673dda2cbf34e
                                      • Instruction Fuzzy Hash: 1DD11B71A00219DFCB14CFA9C984AADBBFAFF8A705F158069E505AB265DF30ED41CB50
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2196393753.0000000002A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_2a40000_SBkuP3ACSA.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 0oHp$PHeq$PHeq
                                      • API String ID: 0-4068647697
                                      • Opcode ID: 17de569ab763e0d930e4fce168c75c8f1e5758b267b92d8f013d2cf01ca7661e
                                      • Instruction ID: 3c7c29f3db7ddb5f52189b5a76b723d228382cd1af0bf1ba3c3c4d74dd3d61aa
                                      • Opcode Fuzzy Hash: 17de569ab763e0d930e4fce168c75c8f1e5758b267b92d8f013d2cf01ca7661e
                                      • Instruction Fuzzy Hash: 1761A474E00608DFDB18DFAAD984A9DBBF2BF89304F24C469E415AB365DB349941CF50
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2196393753.0000000002A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_2a40000_SBkuP3ACSA.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: (oeq$4'eq
                                      • API String ID: 0-2258195259
                                      • Opcode ID: ee9228452da01f9522ee022961847ad4d83efd2a585e3c1864c1c836574a8ed1
                                      • Instruction ID: 0960adeff2c2080d428fd83fb35bbbc14cd3e0cb89e86596b1ea57471617c3ad
                                      • Opcode Fuzzy Hash: ee9228452da01f9522ee022961847ad4d83efd2a585e3c1864c1c836574a8ed1
                                      • Instruction Fuzzy Hash: 53727275A0020ADFCB15CF68C994AAEBBF2FF88304F158559E8059B3A5DF30E955CB50
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2196393753.0000000002A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_2a40000_SBkuP3ACSA.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: (oeq$Hiq
                                      • API String ID: 0-1760408109
                                      • Opcode ID: 725abf0b386774e01250f3c89e839f04361711f20f50edd4ad606b44132a95e7
                                      • Instruction ID: 7fc7dc1b995250d58644010c1a9a05028452d3bd8ad0010fe430a13c1eff8dca
                                      • Opcode Fuzzy Hash: 725abf0b386774e01250f3c89e839f04361711f20f50edd4ad606b44132a95e7
                                      • Instruction Fuzzy Hash: 51129C70A002199FCB14DF69C984BAEBBFABFC9704F208569E4099B395DF34D941CB90
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2196393753.0000000002A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_2a40000_SBkuP3ACSA.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: Xiq$$eq
                                      • API String ID: 0-3760103188
                                      • Opcode ID: 1377e6a17ecfd21f90a980966905be8453266ab3ae138e411e08d465fff0a9c5
                                      • Instruction ID: 89387c49bb937e420c3b90ea23c813444b35b222a3a97f1309eaa7d75bdd1b1c
                                      • Opcode Fuzzy Hash: 1377e6a17ecfd21f90a980966905be8453266ab3ae138e411e08d465fff0a9c5
                                      • Instruction Fuzzy Hash: FBF13E74E002589FDF18DFB9D5946AEBBB2BFC8300B248469E806A7358DF35D846CB51
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2196393753.0000000002A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_2a40000_SBkuP3ACSA.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: (oeq$(oeq$(oeq$(oeq$(oeq$(oeq$,iq$,iq
                                      • API String ID: 0-4181857939
                                      • Opcode ID: 1d1d411d5872948d52d53edb87aac28d0bc490fe009efce43f8487796d916ec3
                                      • Instruction ID: 919985a30af935c86c02b7ac4a0d0a2058704beab6f79a99a64a1700e6f29fbc
                                      • Opcode Fuzzy Hash: 1d1d411d5872948d52d53edb87aac28d0bc490fe009efce43f8487796d916ec3
                                      • Instruction Fuzzy Hash: BA124631A006498FCB15CF69D984A9EBBF6FF89318F158599E809DB2A1DF30ED41CB50
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2196393753.0000000002A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_2a40000_SBkuP3ACSA.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: $eq$$eq
                                      • API String ID: 0-2246304398
                                      • Opcode ID: 43a25c0474ec03e2f48f1a6bca7a97f7b88a3f36e00d2c79df240bed9618edcb
                                      • Instruction ID: 94e02f89467c418b172358cc0324bcd4841eb44bdefe41e23e5a336b54dfca40
                                      • Opcode Fuzzy Hash: 43a25c0474ec03e2f48f1a6bca7a97f7b88a3f36e00d2c79df240bed9618edcb
                                      • Instruction Fuzzy Hash: B9524378A10218CFEB559BA4C860BAEBB77FF98300F5080A9C11A6B355CF399D85DF51
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2196393753.0000000002A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_2a40000_SBkuP3ACSA.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 4'eq$4'eq
                                      • API String ID: 0-907361030
                                      • Opcode ID: dc09362a0fc10d171b850317bd8975d8c1d8ac994cdfc221b03f45abde27e952
                                      • Instruction ID: 509545893476e07f8d8c8c65288dda83f6021d68fb621994e77c55e7acfd10bf
                                      • Opcode Fuzzy Hash: dc09362a0fc10d171b850317bd8975d8c1d8ac994cdfc221b03f45abde27e952
                                      • Instruction Fuzzy Hash: B2B129B17105018FDB159B29ED99B3D36AAAFC5744F19446AE602CF3A2EF6CCC42C742
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2196393753.0000000002A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_2a40000_SBkuP3ACSA.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: Hiq$Hiq
                                      • API String ID: 0-2624443307
                                      • Opcode ID: caf8a5f1d1f48ee3b72e14a5d951c4ff14f70a7c974a2ac018e4b11ebc6b36da
                                      • Instruction ID: e704c0a66d0fc5c53761c18ed63d71ece4dd656e802f10344455707c70eed4e2
                                      • Opcode Fuzzy Hash: caf8a5f1d1f48ee3b72e14a5d951c4ff14f70a7c974a2ac018e4b11ebc6b36da
                                      • Instruction Fuzzy Hash: 62B1BC75B04215CFCB159F68C898B2A7BE6ABD8314F58896AE406CB395DF34C841D790
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2196393753.0000000002A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_2a40000_SBkuP3ACSA.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: ,iq$,iq
                                      • API String ID: 0-3242339887
                                      • Opcode ID: 3e8697d5071c5045ef35d4fadabf5050b21126ea16196f6fc86126d7762ded2d
                                      • Instruction ID: fcc48c31c347dd6858693163f7e613ea612614af1530995cc3a86263437e3f99
                                      • Opcode Fuzzy Hash: 3e8697d5071c5045ef35d4fadabf5050b21126ea16196f6fc86126d7762ded2d
                                      • Instruction Fuzzy Hash: 6E818C75E002059FCB18CF69C8C9A6AB7B2BFD9214BA58169D416DB364DF31E841CF90
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2196393753.0000000002A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_2a40000_SBkuP3ACSA.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 4'eq$T
                                      • API String ID: 0-2582472209
                                      • Opcode ID: c1fe8a49ca80098d9f2d9c2b4caf2169fea9101d07e9dde3002a674e0e5bd289
                                      • Instruction ID: 6f7252398ce56d6330e9797d6a0e0148b29b6db2439c6f9903592535e70f4a96
                                      • Opcode Fuzzy Hash: c1fe8a49ca80098d9f2d9c2b4caf2169fea9101d07e9dde3002a674e0e5bd289
                                      • Instruction Fuzzy Hash: 9751D6716042468FDB05DB788894BBFBBBAEFC5300F18846AE405DB291DF25DC42CBA1
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2196393753.0000000002A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_2a40000_SBkuP3ACSA.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 4'eq$4'eq
                                      • API String ID: 0-907361030
                                      • Opcode ID: 0d70eb67fcbdeddd73c24cc9b62d5bebf1b32c3737527f249869133a5a1bc656
                                      • Instruction ID: da2a754fcdc18992c5dc10f167061f7bbc37d960dd7d0cef83fc9c508a7288b5
                                      • Opcode Fuzzy Hash: 0d70eb67fcbdeddd73c24cc9b62d5bebf1b32c3737527f249869133a5a1bc656
                                      • Instruction Fuzzy Hash: 1B517B357002069FDB00DB68C884B6BBBEAEFC8354F54C469E908CB295EF35DC118B61
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2196393753.0000000002A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_2a40000_SBkuP3ACSA.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: Xiq$Xiq
                                      • API String ID: 0-733771754
                                      • Opcode ID: 406df7120f4dc84f5c52bd3e279d2e0d4c372827f51db70bbe3c9c37ec9fd642
                                      • Instruction ID: 09a22e127f20803d4ed96b444d0035c3340a440d68a97097474e07caa01e5420
                                      • Opcode Fuzzy Hash: 406df7120f4dc84f5c52bd3e279d2e0d4c372827f51db70bbe3c9c37ec9fd642
                                      • Instruction Fuzzy Hash: 2031D575B003258BDF2D9AAA49D42BE76EABBC4311F74447DE816C7380DFB4CC418652
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2196393753.0000000002A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_2a40000_SBkuP3ACSA.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: LReq
                                      • API String ID: 0-2687900687
                                      • Opcode ID: 3a0e1f393c4764e0f6a13fab3428dc87fe8360c62075bb0e1004a1e2bd8738f3
                                      • Instruction ID: 5ded98b9c88208cf5395638f6721d27099fc6c8cc8fce5c65a6e7e71bf7375e7
                                      • Opcode Fuzzy Hash: 3a0e1f393c4764e0f6a13fab3428dc87fe8360c62075bb0e1004a1e2bd8738f3
                                      • Instruction Fuzzy Hash: C322CE79D00219CFCB55EF68E889A9DBBB2FF88301F1085A9E409A7359DB706D85CF40
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2196393753.0000000002A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_2a40000_SBkuP3ACSA.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: LReq
                                      • API String ID: 0-2687900687
                                      • Opcode ID: d7ddf7b226136c91bdd7b143c28229895d6e4755f6ba5623e7d880aa96d4d5d8
                                      • Instruction ID: 20f96c5d13b092635bb66667f88c3c8f38df2899483d88f1a3f95f86f133eb50
                                      • Opcode Fuzzy Hash: d7ddf7b226136c91bdd7b143c28229895d6e4755f6ba5623e7d880aa96d4d5d8
                                      • Instruction Fuzzy Hash: 4722CE79D00219CFCB55EF68E889A9DBBB2FF88301F1085A9E409A7359DB706D85CF40
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2196393753.0000000002A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_2a40000_SBkuP3ACSA.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 4'eq
                                      • API String ID: 0-1552367303
                                      • Opcode ID: f6ab716a252e76efe00bb74ad3d1fe13090a53bf757c7466eda16139cd311525
                                      • Instruction ID: f09198f9b572ca144e8e70644035b35b74ce13ff7edbf081e24fb67b08b8e583
                                      • Opcode Fuzzy Hash: f6ab716a252e76efe00bb74ad3d1fe13090a53bf757c7466eda16139cd311525
                                      • Instruction Fuzzy Hash: F7418F75B041568FDF15DBA98980ABFB7BAAFC8310F148469E802DB251DF34DC51CBA0
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2196393753.0000000002A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_2a40000_SBkuP3ACSA.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: (oeq
                                      • API String ID: 0-952175256
                                      • Opcode ID: b91e945954f5a5cb27eda7fc9fc841d06a6f18740511f2c33577859db97a1fad
                                      • Instruction ID: 56f6b8dbdbc0e7f55433b09860b450c2221c0b07f1498fc73e3a5475356bcaea
                                      • Opcode Fuzzy Hash: b91e945954f5a5cb27eda7fc9fc841d06a6f18740511f2c33577859db97a1fad
                                      • Instruction Fuzzy Hash: 2541CF36B102148FCB199B68D965AAE7BF6BBC8310F148469E516EB391DF34DC01CB90
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2196393753.0000000002A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_2a40000_SBkuP3ACSA.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: fcaf21c4789dc37b959776f8f91b54afa68141c7961079deff26adc163426713
                                      • Instruction ID: ec711aaee289ba8e215b7e7caed0c0b4c12d2095edf3994fd0a132ffad65a721
                                      • Opcode Fuzzy Hash: fcaf21c4789dc37b959776f8f91b54afa68141c7961079deff26adc163426713
                                      • Instruction Fuzzy Hash: 1DF1FA75A405158FCB04CFADC994A9DBBF6BF88314B1A8069E515EB362CF35EC42CB50
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2196393753.0000000002A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_2a40000_SBkuP3ACSA.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: aa9e3540f76150f78fcb1a49098c5f5277be5f81a59e6d68dffb08a97d6826ed
                                      • Instruction ID: 534521a876376785e751f2bd926cb8d206bf74f68ae9f325a8a935131f263821
                                      • Opcode Fuzzy Hash: aa9e3540f76150f78fcb1a49098c5f5277be5f81a59e6d68dffb08a97d6826ed
                                      • Instruction Fuzzy Hash: 2A81D4315006469FCB11CF6CC884AABFBBAFF85324F558665E85897255CF31F862CBA0
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2196393753.0000000002A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_2a40000_SBkuP3ACSA.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: d1d2be84ed073e88c275b56c3ecb3a9fe08aff7e84a5ce006fb98b89f8e93185
                                      • Instruction ID: 9df81f14ff4b402a861934cacb77e78f1562672aedce9a1a87ba1fe08b7f4020
                                      • Opcode Fuzzy Hash: d1d2be84ed073e88c275b56c3ecb3a9fe08aff7e84a5ce006fb98b89f8e93185
                                      • Instruction Fuzzy Hash: 3971F9347002858FCB15DF28C898AA9BBFAAF89705F5540A9E806CB3B1DF74DC41CB91
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2196393753.0000000002A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_2a40000_SBkuP3ACSA.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 5c11c9889bd976f8b1db7c81079198adf1796b30b4041b5feec7510d6206fbf3
                                      • Instruction ID: 7110c37a885b049550c0497b069ed236f56644381a50fdf705d5b2e032b6376a
                                      • Opcode Fuzzy Hash: 5c11c9889bd976f8b1db7c81079198adf1796b30b4041b5feec7510d6206fbf3
                                      • Instruction Fuzzy Hash: 8751C0302313438FC3552F62A5AE12ABFA9FB0F717B55AC58F11E89419DF705494CB24
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2196393753.0000000002A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_2a40000_SBkuP3ACSA.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 884a54cc6507b68788d66b10023d50bf7b79867b1162f2ec72e237189f5813df
                                      • Instruction ID: 4a1aaa6d9cb32117c9bf19669a4de2c00ff310480728e245ec32ccbc8a76d89f
                                      • Opcode Fuzzy Hash: 884a54cc6507b68788d66b10023d50bf7b79867b1162f2ec72e237189f5813df
                                      • Instruction Fuzzy Hash: B551AF302313478FC2952F62A1AE12ABFA9FB4F727B55AC58F11E89419DF705494CB24
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2196393753.0000000002A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_2a40000_SBkuP3ACSA.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 6fc69c082888b802ac8022a7fd6766f0214b4a1483df25747f62d07367c38cb4
                                      • Instruction ID: 8eb74ccca59f071c9503751b383a09d93221bdbfe6b2ded281fa46c36d01e9bd
                                      • Opcode Fuzzy Hash: 6fc69c082888b802ac8022a7fd6766f0214b4a1483df25747f62d07367c38cb4
                                      • Instruction Fuzzy Hash: DA518174E012189FDB48DFA9D9849DDBBF2FF89310F248169E419AB364DB30A901CF50
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2196393753.0000000002A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_2a40000_SBkuP3ACSA.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 3960f64feb6d16ea9d263e1efa48f359020086f46313d1bab426d646ebe09602
                                      • Instruction ID: a1032325e4c5f80ff8776baaa03673caa85aaaaa6f759ab76aaef267945e777d
                                      • Opcode Fuzzy Hash: 3960f64feb6d16ea9d263e1efa48f359020086f46313d1bab426d646ebe09602
                                      • Instruction Fuzzy Hash: B551A379E01208CFCB48DFA9D59499DBBB2FF89311B209469E805BB368DB31A845CF50
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2196393753.0000000002A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_2a40000_SBkuP3ACSA.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 1e0cbbe7555bd93762ab093c9722a8bbcb020193244598c23a98d5722c3e8e5f
                                      • Instruction ID: b2e2cdcff6751c338d3c13c0645194aaa93ba3b991f8414196ae199b77c704b2
                                      • Opcode Fuzzy Hash: 1e0cbbe7555bd93762ab093c9722a8bbcb020193244598c23a98d5722c3e8e5f
                                      • Instruction Fuzzy Hash: 6E41A231A0424ADFCF11CFA4C884B9FBFB2AF89314F048566E915AF255DB34D961CBA0
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2196393753.0000000002A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_2a40000_SBkuP3ACSA.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: dec82e45573221ae3bf9004dd24d16296ee5b5acbd7ab1c6af0e8dc90c5c1b7b
                                      • Instruction ID: 1863cabe2a60daabb2d6e8c89b7a058bf066f026475f1a41cde37772df4b6543
                                      • Opcode Fuzzy Hash: dec82e45573221ae3bf9004dd24d16296ee5b5acbd7ab1c6af0e8dc90c5c1b7b
                                      • Instruction Fuzzy Hash: 9B41CE31A00208DFCB148F64C944BAABBFAFB89714F04842AE8559B251DF78ED45CFA1
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2196393753.0000000002A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_2a40000_SBkuP3ACSA.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 5fb37eae3772689c060069f35b3a9c7fe30a80c0d0f01f277575f309e0b297b6
                                      • Instruction ID: e3e996dce09550d7f8a6c0e01214ebd46ae0bc1989d7c4e0accea635c73a92f0
                                      • Opcode Fuzzy Hash: 5fb37eae3772689c060069f35b3a9c7fe30a80c0d0f01f277575f309e0b297b6
                                      • Instruction Fuzzy Hash: EE315C3521415AEFCB059F64D895AAF3BA6FB8C314F108428F9198B254CF38DD65DFA0
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2196393753.0000000002A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_2a40000_SBkuP3ACSA.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f46a4704a1ec39695221b77715c326a94e485ce3cc8db9528838c55b6577ccdd
                                      • Instruction ID: 4521a378c6c8833acd38230fbc44adb4cdf76eddfac78591be5aba5ed30c66bb
                                      • Opcode Fuzzy Hash: f46a4704a1ec39695221b77715c326a94e485ce3cc8db9528838c55b6577ccdd
                                      • Instruction Fuzzy Hash: 8021BE393102418BEB1557299DD4F3AB69BAFC8B18F948078E506CB798EF65CC41D780
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2196393753.0000000002A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_2a40000_SBkuP3ACSA.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 70dd442402203e1d6f29a6beb9342b1f78e0d05a61894fa20108ab535b974aaf
                                      • Instruction ID: 1dde11a12a1263de84a831a2c36afefdb9e33caa6710948354b04883674dd751
                                      • Opcode Fuzzy Hash: 70dd442402203e1d6f29a6beb9342b1f78e0d05a61894fa20108ab535b974aaf
                                      • Instruction Fuzzy Hash: 39319E70A405098FCB04CF69C895AAEBBB6BFC8314F168159E5159B3A6CF30EC42CB90
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2196393753.0000000002A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_2a40000_SBkuP3ACSA.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 2decda9b55257b604b82b49380312a41118b5458f7227226bd1646b2daef36b1
                                      • Instruction ID: db66bb59e5bfc557bdbf427fcc63b9e436c347092b3c44a6e0116ddd55318de5
                                      • Opcode Fuzzy Hash: 2decda9b55257b604b82b49380312a41118b5458f7227226bd1646b2daef36b1
                                      • Instruction Fuzzy Hash: 1021AE35A002159FCB54DF24D580AAE77B6EFD8260F60C419EC0A8B358DF31EE46CB91
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2196393753.0000000002A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_2a40000_SBkuP3ACSA.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: ff9231f30c10e8edb494b925fe27de147e910f8325b3893e22572dcf0fbb8753
                                      • Instruction ID: e6ee7a672db1fa382a21acccee80e945e95bd7e41f294d58358498374a32aa13
                                      • Opcode Fuzzy Hash: ff9231f30c10e8edb494b925fe27de147e910f8325b3893e22572dcf0fbb8753
                                      • Instruction Fuzzy Hash: 8C212631C106099ECB10EFE8E9446ECFBB4FF4A305F109529E95477218EB30A68ACB50
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2195753869.000000000112D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0112D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_112d000_SBkuP3ACSA.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 8a5729f360dc93924a2b00cae49472dd57055c2d8eac634cb27c23981c7af6a7
                                      • Instruction ID: 31f9cae8295df1c6c0a606a1cc0bc9b2296a7835e09cff9ceb35a653e5b4c21c
                                      • Opcode Fuzzy Hash: 8a5729f360dc93924a2b00cae49472dd57055c2d8eac634cb27c23981c7af6a7
                                      • Instruction Fuzzy Hash: 25210671504240DFDF09DF58E9C0B26BF75FB88328F24C569E9050A246C376D465CBA2
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2196393753.0000000002A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_2a40000_SBkuP3ACSA.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 0a6da00fe35aa320bbb2fb3a1bde5d967cfc3d88b19ad4b72dba553953ed2fd9
                                      • Instruction ID: a0bf9243788cd1d15e437a4362f3a8ec68273ea84e27bead988af5aeaa0323f3
                                      • Opcode Fuzzy Hash: 0a6da00fe35aa320bbb2fb3a1bde5d967cfc3d88b19ad4b72dba553953ed2fd9
                                      • Instruction Fuzzy Hash: C521AE35B016128FC7299B25C4E852AB7A6EBC8765B948179E906DB354DF30DC06CBC0
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2196393753.0000000002A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_2a40000_SBkuP3ACSA.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: a3347938fca5b6eea826a78aa1cb36d0ad11f34b57d94e4f0546f875aa7efe73
                                      • Instruction ID: ba19e4b1c53d8e5a2d8e0ba62439526843804b9cb86f237e07d4ceec1c67495c
                                      • Opcode Fuzzy Hash: a3347938fca5b6eea826a78aa1cb36d0ad11f34b57d94e4f0546f875aa7efe73
                                      • Instruction Fuzzy Hash: 0C212974A012098FCF08DFB4D450AEDBBB2FB8A304F105869D41577394DB39A942CF64
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2196393753.0000000002A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_2a40000_SBkuP3ACSA.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 452ffabd363a7ebdd5163b6bc8964516732cb5df10916d455047511b6050e4f6
                                      • Instruction ID: db628ced2a81486d1aa0e282040ef6572ec8a6e7cc4ca567716e63319d18fc91
                                      • Opcode Fuzzy Hash: 452ffabd363a7ebdd5163b6bc8964516732cb5df10916d455047511b6050e4f6
                                      • Instruction Fuzzy Hash: 05318979E11209DFCB44DFA8E5948ADBBF6FF49301B204469E909AB369DB31AD05CF40
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2196393753.0000000002A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_2a40000_SBkuP3ACSA.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 062ca21c5c47f40f5a85d96ccdfab3a39addc497fcfa1a4aad87424719266023
                                      • Instruction ID: 60a70e9b10726373503161703abaa4fe9703a374f4bd225770dfdf148096432a
                                      • Opcode Fuzzy Hash: 062ca21c5c47f40f5a85d96ccdfab3a39addc497fcfa1a4aad87424719266023
                                      • Instruction Fuzzy Hash: D021AE35204159DFCB199F68D495BAB3BA6FB8C314F508428F9198B244CF38DC55CBE0
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2196393753.0000000002A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_2a40000_SBkuP3ACSA.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 7e98daa6bb2863a31fb45cbf62fea5408ecaba40b69a9d5162d5a41d8f65dbed
                                      • Instruction ID: a102e2f4586a022978d4678cbc83eb7427b5cf1b4c9ce7aff29745bea46f5939
                                      • Opcode Fuzzy Hash: 7e98daa6bb2863a31fb45cbf62fea5408ecaba40b69a9d5162d5a41d8f65dbed
                                      • Instruction Fuzzy Hash: AE216874A00248DFCB04CFA1E890AAEBFB6BF88304F24806AE411E6294CF35E941CF50
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2196393753.0000000002A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_2a40000_SBkuP3ACSA.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 831e5b2f382dd7292076c76b477dcff6fb9dec952eb92e758ef43f3b5a0da44c
                                      • Instruction ID: d692b9afa528cb9678c475ed511a3baab866a8ca67ff6c2a351cc3f133299a2d
                                      • Opcode Fuzzy Hash: 831e5b2f382dd7292076c76b477dcff6fb9dec952eb92e758ef43f3b5a0da44c
                                      • Instruction Fuzzy Hash: 4021E435A012088FDF08DFB4D854AEEB7B2FB8A305F109829D81577394DB39A942CF64
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2196393753.0000000002A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_2a40000_SBkuP3ACSA.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 9ef2db6ae0dccce7acf7e8adb8269dbc240a0e94ca5c1a822de93d17f4cefa45
                                      • Instruction ID: a6f657e503f84a7ed759eebdbced28828b7cd03b1e7c778d5e1397b0ca909e84
                                      • Opcode Fuzzy Hash: 9ef2db6ae0dccce7acf7e8adb8269dbc240a0e94ca5c1a822de93d17f4cefa45
                                      • Instruction Fuzzy Hash: BB11CE707002058FC344AF7AD490A2AB7D9BFD964475544BDE60ACB3A0EFA5DC06C7A8
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2196393753.0000000002A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_2a40000_SBkuP3ACSA.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 680ca243487102c2e25e44ea024840d10aa11e8d427db5ba1be5d97773f06de5
                                      • Instruction ID: bac56f351fdcc2e3e760d440d3c2f5538920913bb6ea6803e52d6e959e49c4ed
                                      • Opcode Fuzzy Hash: 680ca243487102c2e25e44ea024840d10aa11e8d427db5ba1be5d97773f06de5
                                      • Instruction Fuzzy Hash: 0621C274C1020A8FCB44EFA8D9456EEFFF4BF48300F10812AE805B7214EB305A46CBA1
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2195753869.000000000112D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0112D000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_112d000_SBkuP3ACSA.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 2a42a10f79047cfc5a8dfbea04f5877e4b045e58f4eb555799dbe40d0299e0d1
                                      • Instruction ID: ecb3f9a8fc31e7130bd13624c13852a5dbe235932d8ed5bb1a401b88f3468f5a
                                      • Opcode Fuzzy Hash: 2a42a10f79047cfc5a8dfbea04f5877e4b045e58f4eb555799dbe40d0299e0d1
                                      • Instruction Fuzzy Hash: CB11AF76504280CFDF16CF54D5C4B16BF71FB84324F24C6A9D9090B256C37AD46ACBA2
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2196393753.0000000002A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_2a40000_SBkuP3ACSA.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 743d9a7bfcc584c1826f43535c4fe5af668dc187d50c954782e4e45a17109b8e
                                      • Instruction ID: 43ccaf6069fe58dcd53d04cf17a1a68dd53be25d08b12a6238bf06f8202bbf13
                                      • Opcode Fuzzy Hash: 743d9a7bfcc584c1826f43535c4fe5af668dc187d50c954782e4e45a17109b8e
                                      • Instruction Fuzzy Hash: 6601F532B00115AFCB058E549810BAE7FEBDBD8350F588029F514DB240CE35C8128BA4
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2196393753.0000000002A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_2a40000_SBkuP3ACSA.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 6a5c6de5f674e98ccad46629d58de3407993ce11e61955081cd5dc48e31c1c2b
                                      • Instruction ID: c56bc370e6d3359d1978a07952415bd701f84fb73f2ad999e85a11680e721bc2
                                      • Opcode Fuzzy Hash: 6a5c6de5f674e98ccad46629d58de3407993ce11e61955081cd5dc48e31c1c2b
                                      • Instruction Fuzzy Hash: C711E2B4C1460A8FCB00EFA8D4555EEFFF0BF49300F10826AE805B7264EB305A85CBA1
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2196393753.0000000002A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_2a40000_SBkuP3ACSA.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 8d0eac277667710f32f3a000d2c1926be45ab2c6f45a2366d02a4b0fb5df6ca8
                                      • Instruction ID: 8d9dfa8098d85264d54f57ff71720d18d187dad271c04625dd9b71b30ca80126
                                      • Opcode Fuzzy Hash: 8d0eac277667710f32f3a000d2c1926be45ab2c6f45a2366d02a4b0fb5df6ca8
                                      • Instruction Fuzzy Hash: CAE0AB7474414CE6CB55EB38A4009EFB321FAC5121720175DE967870D4DE239C07C241
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2196393753.0000000002A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_2a40000_SBkuP3ACSA.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: ed789c4ba19d799fe7b7913d89825d6ed0c1100fb7c169cbd9411eb956b187dd
                                      • Instruction ID: c618f9500b118d03086e092fff3d42e7f1cc4a1c303e44c85b52fbf79f94ebe0
                                      • Opcode Fuzzy Hash: ed789c4ba19d799fe7b7913d89825d6ed0c1100fb7c169cbd9411eb956b187dd
                                      • Instruction Fuzzy Hash: 34E08C33D2072B53CB00A6B5DC06ADEF778EFD6260F848626D82476544EB70275A82E1
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2196393753.0000000002A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_2a40000_SBkuP3ACSA.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 41fa493bd2cceb6c2d0f4647dee7c357f987aa5a9a7befa355494f20eb5fabc1
                                      • Instruction ID: 029bc0a622d6c8ecf8e7d7f29d452ea5785f4d4c389dded27e885aa293771617
                                      • Opcode Fuzzy Hash: 41fa493bd2cceb6c2d0f4647dee7c357f987aa5a9a7befa355494f20eb5fabc1
                                      • Instruction Fuzzy Hash: AFD05E32D2032B97CB00EBA5EC048EFFB38EED6261B958626D52437154FB702659C6E1
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2196393753.0000000002A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_2a40000_SBkuP3ACSA.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 4bdaacd32790817b91c477bf05988045433f614a4c8c6b26760f84615e577b64
                                      • Instruction ID: 137787a9d7fefc7cc0c04a953cef4b76d1c67f97f477bd9b643fd77081d43a36
                                      • Opcode Fuzzy Hash: 4bdaacd32790817b91c477bf05988045433f614a4c8c6b26760f84615e577b64
                                      • Instruction Fuzzy Hash: 9CC0127320C1282EA624108E7C84AA3AB8CC6C12F8A250177F92CA3200AC46AC8041A8
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2196393753.0000000002A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_2a40000_SBkuP3ACSA.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: acd0b93d3f0de82e50c32cbb1ff5ce81e43c67e84f1e47f551e7e45d76ddc7d0
                                      • Instruction ID: 1253f29924abc2af0fa13fadb04669a28553d90df06bc0369a5ff9c31f392750
                                      • Opcode Fuzzy Hash: acd0b93d3f0de82e50c32cbb1ff5ce81e43c67e84f1e47f551e7e45d76ddc7d0
                                      • Instruction Fuzzy Hash: 8ED0677AB51018DFCB049F98EC408DDBBB6FB9C321B048116F915A7261C6319961DBA0
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2196393753.0000000002A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_2a40000_SBkuP3ACSA.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 92c7b50942d520c99f007fc20484e24f0f4dbbd268652287acb9240a363e4a45
                                      • Instruction ID: 1e3c417ea1dea906d194cf9afc8559e5ba82d5720a3c421d1a7cda8490ed096d
                                      • Opcode Fuzzy Hash: 92c7b50942d520c99f007fc20484e24f0f4dbbd268652287acb9240a363e4a45
                                      • Instruction Fuzzy Hash: B3D05EAA80878047C30BF660ED921143F26BA80208BD84996F4658AB1AE7684A488261
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2196393753.0000000002A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_2a40000_SBkuP3ACSA.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: eff3bfff52d4e980ae3c4b6860496f5c46e7b99577a61ee975e296e623591d2a
                                      • Instruction ID: da93ec0bfe751b253fbf3fb419d2c521c2adcc76112f2584cf8a9a9fcfbe6b93
                                      • Opcode Fuzzy Hash: eff3bfff52d4e980ae3c4b6860496f5c46e7b99577a61ee975e296e623591d2a
                                      • Instruction Fuzzy Hash: 5CC0127511474A47C506FB75F9855153B2EFBC0304F908950F01A0A61AEF7819844690
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2196393753.0000000002A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_2a40000_SBkuP3ACSA.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: Xiq$Xiq$Xiq$Xiq
                                      • API String ID: 0-4026295062
                                      • Opcode ID: 5a777e32c02b7612086cd08a4129b0716ba8bd34a0db168f458e862488acb871
                                      • Instruction ID: 66181b43dfd76eea40d8fa6c55095f53543ecf112631262e3e7ce966eba6b7d9
                                      • Opcode Fuzzy Hash: 5a777e32c02b7612086cd08a4129b0716ba8bd34a0db168f458e862488acb871
                                      • Instruction Fuzzy Hash: 5051A870E043198BDF659B6889553BEBBB2BFC8300F1444A5DD1997245DF30DE81CB92
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000002.00000002.2196393753.0000000002A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A40000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_2_2_2a40000_SBkuP3ACSA.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: \;eq$\;eq$\;eq$\;eq
                                      • API String ID: 0-3455962030
                                      • Opcode ID: 0715cbbe9cb4efe0e0a0ea660efa0be694c17379b5e0bab6d71a570ed4187454
                                      • Instruction ID: 6cc73063b4163e19999771a00baca53339bb780c232f8e432784189b7e208b7d
                                      • Opcode Fuzzy Hash: 0715cbbe9cb4efe0e0a0ea660efa0be694c17379b5e0bab6d71a570ed4187454
                                      • Instruction Fuzzy Hash: E4017C317101148F8B648F2DC484A2677EAAFDAF64725817AE501CB3B4EFB2EC41C790