Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
jxy62Zm6c4.exe

Overview

General Information

Sample name:jxy62Zm6c4.exe
renamed because original name is a hash value
Original sample name:06cfbe948b8a7ea8c436a72f92cf15324fad43bd6cb233991984d50d009bdbd0.exe
Analysis ID:1587950
MD5:4d96153e0c2c143244edf3b77857a01c
SHA1:39f42b2c05becbab9f3d3a8efe48a210b7f884d1
SHA256:06cfbe948b8a7ea8c436a72f92cf15324fad43bd6cb233991984d50d009bdbd0
Tags:exeMassLoggeruser-adrian__luca
Infos:

Detection

MassLogger RAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected MassLogger RAT
Yara detected Telegram RAT
AI detected suspicious sample
Allocates memory in foreign processes
Injects a PE file into a foreign processes
Machine Learning detection for sample
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Allocates memory with a write watch (potentially for evading sandboxes)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Found inlined nop instructions (likely shell or obfuscated code)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • jxy62Zm6c4.exe (PID: 988 cmdline: "C:\Users\user\Desktop\jxy62Zm6c4.exe" MD5: 4D96153E0C2C143244EDF3B77857A01C)
    • RegAsm.exe (PID: 2996 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
  • cleanup
{"EXfil Mode": "Telegram", "Telegram Token": "7459538222:AAGuCst3-DtyuFFYR_gchsq5lh5abp8uwcc", "Telegram Chatid": "5943299713"}
SourceRuleDescriptionAuthorStrings
00000002.00000002.3414775742.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_MassLoggerYara detected MassLogger RATJoe Security
    00000002.00000002.3414775742.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000002.00000002.3414775742.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
        00000002.00000002.3414775742.0000000000402000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
        • 0xff91:$a1: get_encryptedPassword
        • 0x102cd:$a2: get_encryptedUsername
        • 0xfd1e:$a3: get_timePasswordChanged
        • 0xfe3f:$a4: get_passwordField
        • 0xffa7:$a5: set_encryptedPassword
        • 0x11977:$a7: get_logins
        • 0x11628:$a8: GetOutlookPasswords
        • 0x11406:$a9: StartKeylogger
        • 0x118c7:$a10: KeyLoggerEventArgs
        • 0x11463:$a11: KeyLoggerEventArgsEventHandler
        00000002.00000002.3416355637.00000000034D9000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          Click to see the 12 entries
          SourceRuleDescriptionAuthorStrings
          2.2.RegAsm.exe.400000.0.unpackJoeSecurity_MassLoggerYara detected MassLogger RATJoe Security
            2.2.RegAsm.exe.400000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              2.2.RegAsm.exe.400000.0.unpackJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
                2.2.RegAsm.exe.400000.0.unpackWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
                • 0x10191:$a1: get_encryptedPassword
                • 0x104cd:$a2: get_encryptedUsername
                • 0xff1e:$a3: get_timePasswordChanged
                • 0x1003f:$a4: get_passwordField
                • 0x101a7:$a5: set_encryptedPassword
                • 0x11b77:$a7: get_logins
                • 0x11828:$a8: GetOutlookPasswords
                • 0x11606:$a9: StartKeylogger
                • 0x11ac7:$a10: KeyLoggerEventArgs
                • 0x11663:$a11: KeyLoggerEventArgsEventHandler
                2.2.RegAsm.exe.400000.0.unpackMAL_Envrial_Jan18_1Detects Encrial credential stealer malwareFlorian Roth
                • 0x153bf:$a2: \Comodo\Dragon\User Data\Default\Login Data
                • 0x148bd:$a3: \Google\Chrome\User Data\Default\Login Data
                • 0x14bcb:$a4: \Orbitum\User Data\Default\Login Data
                • 0x159c3:$a5: \Kometa\User Data\Default\Login Data
                Click to see the 30 entries
                No Sigma rule has matched
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-10T19:42:45.260205+010028032742Potentially Bad Traffic192.168.2.649710158.101.44.24280TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: jxy62Zm6c4.exeAvira: detected
                Source: 00000001.00000002.2177758715.0000000003F65000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: MassLogger {"EXfil Mode": "Telegram", "Telegram Token": "7459538222:AAGuCst3-DtyuFFYR_gchsq5lh5abp8uwcc", "Telegram Chatid": "5943299713"}
                Source: jxy62Zm6c4.exeVirustotal: Detection: 75%Perma Link
                Source: jxy62Zm6c4.exeReversingLabs: Detection: 71%
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: jxy62Zm6c4.exeJoe Sandbox ML: detected

                Location Tracking

                barindex
                Source: unknownDNS query: name: reallyfreegeoip.org
                Source: jxy62Zm6c4.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: unknownHTTPS traffic detected: 104.21.96.1:443 -> 192.168.2.6:49732 version: TLS 1.0
                Source: jxy62Zm6c4.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp 0172A7E0h2_2_0172A3C8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp 0172EA98h2_2_0172E7F0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp 0172A0B9h2_2_01729E08
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp 0172A7E0h2_2_0172A3B8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp 0172E640h2_2_0172E398
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp 0172A7E0h2_2_0172A70E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp 0172EEF0h2_2_0172EC48
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp 0172F348h2_2_0172F0A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp 0172F7A0h2_2_0172F4F8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp 0172FBF8h2_2_0172F950
                Source: global trafficHTTP traffic detected: GET /xml/ HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: Joe Sandbox ViewIP Address: 104.21.96.1 104.21.96.1
                Source: Joe Sandbox ViewIP Address: 158.101.44.242 158.101.44.242
                Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
                Source: unknownDNS query: name: checkip.dyndns.org
                Source: unknownDNS query: name: reallyfreegeoip.org
                Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.6:49710 -> 158.101.44.242:80
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: unknownHTTPS traffic detected: 104.21.96.1:443 -> 192.168.2.6:49732 version: TLS 1.0
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: global trafficHTTP traffic detected: GET /xml/ HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
                Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
                Source: RegAsm.exe, 00000002.00000002.3416355637.0000000003400000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
                Source: RegAsm.exe, 00000002.00000002.3416355637.0000000003400000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.comd
                Source: RegAsm.exe, 00000002.00000002.3416355637.0000000003400000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3416355637.00000000033EE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
                Source: RegAsm.exe, 00000002.00000002.3416355637.0000000003381000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
                Source: RegAsm.exe, 00000002.00000002.3416355637.0000000003400000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/d
                Source: jxy62Zm6c4.exe, 00000001.00000002.2177758715.0000000003F65000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3414775742.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
                Source: RegAsm.exe, 00000002.00000002.3416355637.0000000003400000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.orgd
                Source: RegAsm.exe, 00000002.00000002.3416355637.0000000003421000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.org
                Source: RegAsm.exe, 00000002.00000002.3416355637.0000000003421000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.orgd
                Source: RegAsm.exe, 00000002.00000002.3416355637.0000000003381000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: jxy62Zm6c4.exe, 00000001.00000002.2177758715.0000000003F65000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3414775742.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot-/sendDocument?chat_id=
                Source: RegAsm.exe, 00000002.00000002.3416355637.0000000003400000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
                Source: jxy62Zm6c4.exe, 00000001.00000002.2177758715.0000000003F65000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3414775742.0000000000402000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3416355637.0000000003400000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
                Source: RegAsm.exe, 00000002.00000002.3416355637.0000000003400000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/d
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
                Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443

                System Summary

                barindex
                Source: 2.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 2.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 1.2.jxy62Zm6c4.exe.3fed618.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 1.2.jxy62Zm6c4.exe.3fed618.1.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 1.2.jxy62Zm6c4.exe.3fbd5d0.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 1.2.jxy62Zm6c4.exe.3fd55f8.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 1.2.jxy62Zm6c4.exe.3fbd5d0.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 1.2.jxy62Zm6c4.exe.3fd55f8.2.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 1.2.jxy62Zm6c4.exe.3fed618.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 1.2.jxy62Zm6c4.exe.3fed618.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 1.2.jxy62Zm6c4.exe.3fd55f8.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 1.2.jxy62Zm6c4.exe.3fd55f8.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 1.2.jxy62Zm6c4.exe.3fbd5d0.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 1.2.jxy62Zm6c4.exe.3fbd5d0.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 00000002.00000002.3414775742.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 00000001.00000002.2177758715.0000000003F65000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: Process Memory Space: jxy62Zm6c4.exe PID: 988, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: Process Memory Space: RegAsm.exe PID: 2996, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0172E7F02_2_0172E7F0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_01722DD12_2_01722DD1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_01729E082_2_01729E08
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0172E3982_2_0172E398
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0172E2112_2_0172E211
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0172E7E02_2_0172E7E0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0172EC482_2_0172EC48
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0172EC392_2_0172EC39
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0172F0A02_2_0172F0A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0172F0902_2_0172F090
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0172F4F82_2_0172F4F8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0172F4E82_2_0172F4E8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0172F9502_2_0172F950
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0172F9412_2_0172F941
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_01729BEC2_2_01729BEC
                Source: jxy62Zm6c4.exe, 00000001.00000002.2177716038.0000000002F61000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCloudServices.exe< vs jxy62Zm6c4.exe
                Source: jxy62Zm6c4.exe, 00000001.00000002.2177758715.0000000003F65000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCloudServices.exe< vs jxy62Zm6c4.exe
                Source: jxy62Zm6c4.exe, 00000001.00000002.2176590739.000000000119E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs jxy62Zm6c4.exe
                Source: jxy62Zm6c4.exe, 00000001.00000000.2173504563.0000000000C22000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameDHL Shpping Document GMBH.exe4 vs jxy62Zm6c4.exe
                Source: jxy62Zm6c4.exeBinary or memory string: OriginalFilenameDHL Shpping Document GMBH.exe4 vs jxy62Zm6c4.exe
                Source: jxy62Zm6c4.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: 2.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 2.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 1.2.jxy62Zm6c4.exe.3fed618.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 1.2.jxy62Zm6c4.exe.3fed618.1.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 1.2.jxy62Zm6c4.exe.3fbd5d0.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 1.2.jxy62Zm6c4.exe.3fd55f8.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 1.2.jxy62Zm6c4.exe.3fbd5d0.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 1.2.jxy62Zm6c4.exe.3fd55f8.2.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 1.2.jxy62Zm6c4.exe.3fed618.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 1.2.jxy62Zm6c4.exe.3fed618.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 1.2.jxy62Zm6c4.exe.3fd55f8.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 1.2.jxy62Zm6c4.exe.3fd55f8.2.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 1.2.jxy62Zm6c4.exe.3fbd5d0.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 1.2.jxy62Zm6c4.exe.3fbd5d0.0.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 00000002.00000002.3414775742.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 00000001.00000002.2177758715.0000000003F65000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: Process Memory Space: jxy62Zm6c4.exe PID: 988, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: Process Memory Space: RegAsm.exe PID: 2996, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/1@2/2
                Source: C:\Users\user\Desktop\jxy62Zm6c4.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\jxy62Zm6c4.exe.logJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMutant created: NULL
                Source: jxy62Zm6c4.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: jxy62Zm6c4.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                Source: C:\Users\user\Desktop\jxy62Zm6c4.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: RegAsm.exe, 00000002.00000002.3416355637.0000000003496000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3416355637.0000000003473000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3416355637.0000000003481000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3416355637.00000000034A2000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3416355637.0000000003463000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3417116196.00000000043AD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: jxy62Zm6c4.exeVirustotal: Detection: 75%
                Source: jxy62Zm6c4.exeReversingLabs: Detection: 71%
                Source: unknownProcess created: C:\Users\user\Desktop\jxy62Zm6c4.exe "C:\Users\user\Desktop\jxy62Zm6c4.exe"
                Source: C:\Users\user\Desktop\jxy62Zm6c4.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                Source: C:\Users\user\Desktop\jxy62Zm6c4.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
                Source: C:\Users\user\Desktop\jxy62Zm6c4.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\Desktop\jxy62Zm6c4.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\jxy62Zm6c4.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\jxy62Zm6c4.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\jxy62Zm6c4.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\jxy62Zm6c4.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\jxy62Zm6c4.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\jxy62Zm6c4.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\jxy62Zm6c4.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\jxy62Zm6c4.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\jxy62Zm6c4.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\jxy62Zm6c4.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: aclayers.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rasapi32.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rasman.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rtutils.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dhcpcsvc6.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: schannel.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mskeyprotect.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ntasn1.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ncrypt.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ncryptsslp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: jxy62Zm6c4.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: jxy62Zm6c4.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: C:\Users\user\Desktop\jxy62Zm6c4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\jxy62Zm6c4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\jxy62Zm6c4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\jxy62Zm6c4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\jxy62Zm6c4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\jxy62Zm6c4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\jxy62Zm6c4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\jxy62Zm6c4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\jxy62Zm6c4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\jxy62Zm6c4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\jxy62Zm6c4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\jxy62Zm6c4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\jxy62Zm6c4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\jxy62Zm6c4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\jxy62Zm6c4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\jxy62Zm6c4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\jxy62Zm6c4.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\jxy62Zm6c4.exeMemory allocated: 2EB0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\jxy62Zm6c4.exeMemory allocated: 2F60000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\jxy62Zm6c4.exeMemory allocated: 2EB0000 memory reserve | memory write watchJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 16E0000 memory reserve | memory write watchJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 3380000 memory reserve | memory write watchJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 3100000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\jxy62Zm6c4.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\jxy62Zm6c4.exe TID: 5196Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\jxy62Zm6c4.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: RegAsm.exe, 00000002.00000002.3415052281.0000000001535000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\jxy62Zm6c4.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Users\user\Desktop\jxy62Zm6c4.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 protect: page execute and read and writeJump to behavior
                Source: C:\Users\user\Desktop\jxy62Zm6c4.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 value starts with: 4D5AJump to behavior
                Source: C:\Users\user\Desktop\jxy62Zm6c4.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000Jump to behavior
                Source: C:\Users\user\Desktop\jxy62Zm6c4.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 402000Jump to behavior
                Source: C:\Users\user\Desktop\jxy62Zm6c4.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 41A000Jump to behavior
                Source: C:\Users\user\Desktop\jxy62Zm6c4.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 41C000Jump to behavior
                Source: C:\Users\user\Desktop\jxy62Zm6c4.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 1064008Jump to behavior
                Source: C:\Users\user\Desktop\jxy62Zm6c4.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
                Source: C:\Users\user\Desktop\jxy62Zm6c4.exeQueries volume information: C:\Users\user\Desktop\jxy62Zm6c4.exe VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\jxy62Zm6c4.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 2.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.jxy62Zm6c4.exe.3fed618.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.jxy62Zm6c4.exe.3fbd5d0.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.jxy62Zm6c4.exe.3fd55f8.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.jxy62Zm6c4.exe.3fed618.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.jxy62Zm6c4.exe.3fd55f8.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.jxy62Zm6c4.exe.3fbd5d0.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000002.3414775742.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.2177758715.0000000003F65000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: jxy62Zm6c4.exe PID: 988, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 2996, type: MEMORYSTR
                Source: Yara matchFile source: 2.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.jxy62Zm6c4.exe.3fed618.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.jxy62Zm6c4.exe.3fbd5d0.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.jxy62Zm6c4.exe.3fd55f8.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.jxy62Zm6c4.exe.3fed618.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.jxy62Zm6c4.exe.3fd55f8.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.jxy62Zm6c4.exe.3fbd5d0.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000002.3414775742.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.2177758715.0000000003F65000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: jxy62Zm6c4.exe PID: 988, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 2996, type: MEMORYSTR
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: Yara matchFile source: 2.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.jxy62Zm6c4.exe.3fed618.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.jxy62Zm6c4.exe.3fbd5d0.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.jxy62Zm6c4.exe.3fd55f8.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.jxy62Zm6c4.exe.3fed618.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.jxy62Zm6c4.exe.3fd55f8.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.jxy62Zm6c4.exe.3fbd5d0.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000002.3414775742.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.3416355637.00000000034D9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.2177758715.0000000003F65000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: jxy62Zm6c4.exe PID: 988, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 2996, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 2.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.jxy62Zm6c4.exe.3fed618.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.jxy62Zm6c4.exe.3fbd5d0.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.jxy62Zm6c4.exe.3fd55f8.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.jxy62Zm6c4.exe.3fed618.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.jxy62Zm6c4.exe.3fd55f8.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.jxy62Zm6c4.exe.3fbd5d0.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000002.3414775742.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.2177758715.0000000003F65000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: jxy62Zm6c4.exe PID: 988, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 2996, type: MEMORYSTR
                Source: Yara matchFile source: 2.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.jxy62Zm6c4.exe.3fed618.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.jxy62Zm6c4.exe.3fbd5d0.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.jxy62Zm6c4.exe.3fd55f8.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.jxy62Zm6c4.exe.3fed618.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.jxy62Zm6c4.exe.3fd55f8.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.jxy62Zm6c4.exe.3fbd5d0.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000002.3414775742.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.2177758715.0000000003F65000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: jxy62Zm6c4.exe PID: 988, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 2996, type: MEMORYSTR
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
                DLL Side-Loading
                311
                Process Injection
                1
                Masquerading
                1
                OS Credential Dumping
                1
                Security Software Discovery
                Remote Services1
                Email Collection
                11
                Encrypted Channel
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                DLL Side-Loading
                1
                Disable or Modify Tools
                LSASS Memory1
                Process Discovery
                Remote Desktop Protocol1
                Archive Collected Data
                1
                Ingress Tool Transfer
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)31
                Virtualization/Sandbox Evasion
                Security Account Manager31
                Virtualization/Sandbox Evasion
                SMB/Windows Admin Shares1
                Data from Local System
                2
                Non-Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook311
                Process Injection
                NTDS1
                System Network Configuration Discovery
                Distributed Component Object ModelInput Capture13
                Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                Obfuscated Files or Information
                LSA Secrets13
                System Information Discovery
                SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                DLL Side-Loading
                Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                jxy62Zm6c4.exe75%VirustotalBrowse
                jxy62Zm6c4.exe71%ReversingLabsByteCode-MSIL.Trojan.Jalapeno
                jxy62Zm6c4.exe100%AviraTR/Dropper.Gen
                jxy62Zm6c4.exe100%Joe Sandbox ML
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                NameIPActiveMaliciousAntivirus DetectionReputation
                reallyfreegeoip.org
                104.21.96.1
                truefalse
                  high
                  checkip.dyndns.com
                  158.101.44.242
                  truefalse
                    high
                    checkip.dyndns.org
                    unknown
                    unknownfalse
                      high
                      NameMaliciousAntivirus DetectionReputation
                      http://checkip.dyndns.org/false
                        high
                        https://reallyfreegeoip.org/xml/false
                          high
                          NameSourceMaliciousAntivirus DetectionReputation
                          https://reallyfreegeoip.org/xml/dRegAsm.exe, 00000002.00000002.3416355637.0000000003400000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://checkip.dyndns.comdRegAsm.exe, 00000002.00000002.3416355637.0000000003400000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              http://checkip.dyndns.org/qjxy62Zm6c4.exe, 00000001.00000002.2177758715.0000000003F65000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3414775742.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                                high
                                http://reallyfreegeoip.orgdRegAsm.exe, 00000002.00000002.3416355637.0000000003421000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://reallyfreegeoip.orgRegAsm.exe, 00000002.00000002.3416355637.0000000003421000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://checkip.dyndns.orgdRegAsm.exe, 00000002.00000002.3416355637.0000000003400000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      https://reallyfreegeoip.orgRegAsm.exe, 00000002.00000002.3416355637.0000000003400000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://checkip.dyndns.orgRegAsm.exe, 00000002.00000002.3416355637.0000000003400000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3416355637.00000000033EE000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://checkip.dyndns.comRegAsm.exe, 00000002.00000002.3416355637.0000000003400000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://checkip.dyndns.org/dRegAsm.exe, 00000002.00000002.3416355637.0000000003400000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegAsm.exe, 00000002.00000002.3416355637.0000000003381000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                https://api.telegram.org/bot-/sendDocument?chat_id=jxy62Zm6c4.exe, 00000001.00000002.2177758715.0000000003F65000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3414775742.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                                                  high
                                                  • No. of IPs < 25%
                                                  • 25% < No. of IPs < 50%
                                                  • 50% < No. of IPs < 75%
                                                  • 75% < No. of IPs
                                                  IPDomainCountryFlagASNASN NameMalicious
                                                  104.21.96.1
                                                  reallyfreegeoip.orgUnited States
                                                  13335CLOUDFLARENETUSfalse
                                                  158.101.44.242
                                                  checkip.dyndns.comUnited States
                                                  31898ORACLE-BMC-31898USfalse
                                                  Joe Sandbox version:42.0.0 Malachite
                                                  Analysis ID:1587950
                                                  Start date and time:2025-01-10 19:41:43 +01:00
                                                  Joe Sandbox product:CloudBasic
                                                  Overall analysis duration:0h 4m 46s
                                                  Hypervisor based Inspection enabled:false
                                                  Report type:full
                                                  Cookbook file name:default.jbs
                                                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                  Number of analysed new started processes analysed:5
                                                  Number of new started drivers analysed:0
                                                  Number of existing processes analysed:0
                                                  Number of existing drivers analysed:0
                                                  Number of injected processes analysed:0
                                                  Technologies:
                                                  • HCA enabled
                                                  • EGA enabled
                                                  • AMSI enabled
                                                  Analysis Mode:default
                                                  Analysis stop reason:Timeout
                                                  Sample name:jxy62Zm6c4.exe
                                                  renamed because original name is a hash value
                                                  Original Sample Name:06cfbe948b8a7ea8c436a72f92cf15324fad43bd6cb233991984d50d009bdbd0.exe
                                                  Detection:MAL
                                                  Classification:mal100.troj.spyw.evad.winEXE@3/1@2/2
                                                  EGA Information:
                                                  • Successful, ratio: 50%
                                                  HCA Information:
                                                  • Successful, ratio: 99%
                                                  • Number of executed functions: 69
                                                  • Number of non-executed functions: 10
                                                  Cookbook Comments:
                                                  • Found application associated with file extension: .exe
                                                  • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                                  • Excluded IPs from analysis (whitelisted): 13.107.246.45, 4.175.87.197
                                                  • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                  • Execution Graph export aborted for target RegAsm.exe, PID 2996 because it is empty
                                                  • Report size getting too big, too many NtOpenKeyEx calls found.
                                                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                  • Report size getting too big, too many NtQueryValueKey calls found.
                                                  • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                  No simulations
                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                  104.21.96.1zE1VxVoZ3W.exeGet hashmaliciousFormBookBrowse
                                                  • www.aonline.top/fqlg/
                                                  QUOTATION#070125-ELITE MARINE .exeGet hashmaliciousFormBookBrowse
                                                  • www.mzkd6gp5.top/3u0p/
                                                  SH8ZyOWNi2.exeGet hashmaliciousCMSBruteBrowse
                                                  • pelisplus.so/administrator/index.php
                                                  Recibos.exeGet hashmaliciousFormBookBrowse
                                                  • www.mffnow.info/1a34/
                                                  158.101.44.242MzqLQjCwrw.exeGet hashmaliciousMassLogger RATBrowse
                                                  • checkip.dyndns.org/
                                                  RmIYOfX0yO.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                  • checkip.dyndns.org/
                                                  2V7usxd7Vc.exeGet hashmaliciousMassLogger RATBrowse
                                                  • checkip.dyndns.org/
                                                  tx4pkcHL9o.exeGet hashmaliciousMassLogger RATBrowse
                                                  • checkip.dyndns.org/
                                                  PO#17971.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                  • checkip.dyndns.org/
                                                  PO#3_RKG367.batGet hashmaliciousDBatLoader, MassLogger RAT, PureLog StealerBrowse
                                                  • checkip.dyndns.org/
                                                  BgroUcYHpy.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                  • checkip.dyndns.org/
                                                  FORTUNE RICH_PARTICULARS.pdf.scr.exeGet hashmaliciousMassLogger RATBrowse
                                                  • checkip.dyndns.org/
                                                  fiyati_teklif 615TBI507_ ON-SAN Vakum san tic_ Sipari#U015fi jpeg docx.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                  • checkip.dyndns.org/
                                                  PI ITS15235.docGet hashmaliciousDBatLoader, PureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                  • checkip.dyndns.org/
                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                  checkip.dyndns.comfGu8xWoMrg.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                  • 132.226.247.73
                                                  RubzLi27lr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                  • 193.122.6.168
                                                  YJwE2gTm02.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                  • 193.122.6.168
                                                  xom6WSISuh.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                  • 132.226.8.169
                                                  AHSlIDftf1.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                  • 193.122.6.168
                                                  eLo1khn7DQ.exeGet hashmaliciousMassLogger RATBrowse
                                                  • 132.226.247.73
                                                  MzqLQjCwrw.exeGet hashmaliciousMassLogger RATBrowse
                                                  • 158.101.44.242
                                                  3WgNXsWvMO.exeGet hashmaliciousMassLogger RATBrowse
                                                  • 132.226.8.169
                                                  SBkuP3ACSA.exeGet hashmaliciousSnake KeyloggerBrowse
                                                  • 193.122.6.168
                                                  v3tK92KcJV.exeGet hashmaliciousSnake KeyloggerBrowse
                                                  • 132.226.247.73
                                                  reallyfreegeoip.orgfGu8xWoMrg.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                  • 104.21.96.1
                                                  RubzLi27lr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                  • 104.21.16.1
                                                  YJwE2gTm02.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                  • 104.21.112.1
                                                  xom6WSISuh.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                  • 104.21.112.1
                                                  AHSlIDftf1.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                  • 104.21.64.1
                                                  eLo1khn7DQ.exeGet hashmaliciousMassLogger RATBrowse
                                                  • 104.21.64.1
                                                  MzqLQjCwrw.exeGet hashmaliciousMassLogger RATBrowse
                                                  • 104.21.96.1
                                                  3WgNXsWvMO.exeGet hashmaliciousMassLogger RATBrowse
                                                  • 104.21.80.1
                                                  SBkuP3ACSA.exeGet hashmaliciousSnake KeyloggerBrowse
                                                  • 104.21.16.1
                                                  v3tK92KcJV.exeGet hashmaliciousSnake KeyloggerBrowse
                                                  • 104.21.16.1
                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                  ORACLE-BMC-31898USfGu8xWoMrg.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                  • 193.122.6.168
                                                  RubzLi27lr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                  • 193.122.6.168
                                                  YJwE2gTm02.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                  • 193.122.6.168
                                                  AHSlIDftf1.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                  • 193.122.6.168
                                                  MzqLQjCwrw.exeGet hashmaliciousMassLogger RATBrowse
                                                  • 158.101.44.242
                                                  SBkuP3ACSA.exeGet hashmaliciousSnake KeyloggerBrowse
                                                  • 193.122.6.168
                                                  RmIYOfX0yO.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                  • 158.101.44.242
                                                  zAK7HHniGW.exeGet hashmaliciousSnake KeyloggerBrowse
                                                  • 193.122.130.0
                                                  ql8KpEHT7y.exeGet hashmaliciousSnake KeyloggerBrowse
                                                  • 193.122.6.168
                                                  8kDIr4ZdNj.exeGet hashmaliciousSnake KeyloggerBrowse
                                                  • 193.122.6.168
                                                  CLOUDFLARENETUSfrosty.arm.elfGet hashmaliciousMiraiBrowse
                                                  • 104.23.145.230
                                                  Message.emlGet hashmaliciousUnknownBrowse
                                                  • 1.1.1.1
                                                  s2Jg1MAahY.exeGet hashmaliciousAgentTeslaBrowse
                                                  • 104.26.12.205
                                                  fGu8xWoMrg.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                  • 104.21.96.1
                                                  https://eu2.contabostorage.com/69e36f1a5de941bb877627f90e79fd6d:gip/document.html#phishme@arrowbank.comGet hashmaliciousHTMLPhisherBrowse
                                                  • 1.1.1.1
                                                  https://eu2.contabostorage.com/69e36f1a5de941bb877627f90e79fd6d:gip/document.html#phishme@arrowbank.comGet hashmaliciousHTMLPhisherBrowse
                                                  • 172.64.147.188
                                                  jd4t3R7hOq.exeGet hashmaliciousAzorultBrowse
                                                  • 104.21.75.48
                                                  RubzLi27lr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                  • 104.21.16.1
                                                  6mllsKaB2q.exeGet hashmaliciousAsyncRAT, StormKitty, WorldWind StealerBrowse
                                                  • 172.67.196.114
                                                  Voicemail_+Transcription+_ATT006151.docxGet hashmaliciousUnknownBrowse
                                                  • 104.17.25.14
                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                  54328bd36c14bd82ddaa0c04b25ed9adfGu8xWoMrg.exeGet hashmaliciousGuLoader, Snake Keylogger, VIP KeyloggerBrowse
                                                  • 104.21.96.1
                                                  RubzLi27lr.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                  • 104.21.96.1
                                                  YJwE2gTm02.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                  • 104.21.96.1
                                                  xom6WSISuh.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                  • 104.21.96.1
                                                  AHSlIDftf1.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                  • 104.21.96.1
                                                  eLo1khn7DQ.exeGet hashmaliciousMassLogger RATBrowse
                                                  • 104.21.96.1
                                                  MzqLQjCwrw.exeGet hashmaliciousMassLogger RATBrowse
                                                  • 104.21.96.1
                                                  3WgNXsWvMO.exeGet hashmaliciousMassLogger RATBrowse
                                                  • 104.21.96.1
                                                  SBkuP3ACSA.exeGet hashmaliciousSnake KeyloggerBrowse
                                                  • 104.21.96.1
                                                  v3tK92KcJV.exeGet hashmaliciousSnake KeyloggerBrowse
                                                  • 104.21.96.1
                                                  No context
                                                  Process:C:\Users\user\Desktop\jxy62Zm6c4.exe
                                                  File Type:CSV text
                                                  Category:dropped
                                                  Size (bytes):226
                                                  Entropy (8bit):5.360398796477698
                                                  Encrypted:false
                                                  SSDEEP:6:Q3La/xw5DLIP12MUAvvR+uTL2ql2ABgTv:Q3La/KDLI4MWuPTAv
                                                  MD5:3A8957C6382192B71471BD14359D0B12
                                                  SHA1:71B96C965B65A051E7E7D10F61BEBD8CCBB88587
                                                  SHA-256:282FBEFDDCFAA0A9DBDEE6E123791FC4B8CB870AE9D450E6394D2ACDA3D8F56D
                                                  SHA-512:76C108641F682F785A97017728ED51565C4F74B61B24E190468E3A2843FCC43615C6C8ABE298750AF238D7A44E97C001E3BE427B49900432F905A7CE114AA9AD
                                                  Malicious:true
                                                  Reputation:high, very likely benign file
                                                  Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..
                                                  File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                  Entropy (8bit):4.191239485063231
                                                  TrID:
                                                  • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                  • Win32 Executable (generic) a (10002005/4) 49.78%
                                                  • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                  • Generic Win/DOS Executable (2004/3) 0.01%
                                                  • DOS Executable Generic (2002/1) 0.01%
                                                  File name:jxy62Zm6c4.exe
                                                  File size:276'480 bytes
                                                  MD5:4d96153e0c2c143244edf3b77857a01c
                                                  SHA1:39f42b2c05becbab9f3d3a8efe48a210b7f884d1
                                                  SHA256:06cfbe948b8a7ea8c436a72f92cf15324fad43bd6cb233991984d50d009bdbd0
                                                  SHA512:8b629da54ad94fc8a5f130da232a477b906df96d842552b20bdb7017bfc5d8a617d56ffca6d546b373385b3b4e90c09e1982e2706e969d154d25f612965ee71b
                                                  SSDEEP:6144:/fnABIMnpvtxp1gZmMsGJB40QOnZxF3k/Fxg:/fABIMnpvtxLgovmq0QOnZxF3Srg
                                                  TLSH:B344382439EA5019F1B3EFB94BE879AADA6FB7733B07646E109003464723981DEC153D
                                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...*'ag................. ...........>... ...@....@.. ....................................@................................
                                                  Icon Hash:6c693168c8e0e0b0
                                                  Entrypoint:0x443eae
                                                  Entrypoint Section:.text
                                                  Digitally signed:false
                                                  Imagebase:0x400000
                                                  Subsystem:windows gui
                                                  Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                  DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                  Time Stamp:0x6761272A [Tue Dec 17 07:24:26 2024 UTC]
                                                  TLS Callbacks:
                                                  CLR (.Net) Version:
                                                  OS Version Major:4
                                                  OS Version Minor:0
                                                  File Version Major:4
                                                  File Version Minor:0
                                                  Subsystem Version Major:4
                                                  Subsystem Version Minor:0
                                                  Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                  Instruction
                                                  jmp dword ptr [00402000h]
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  add byte ptr [eax], al
                                                  NameVirtual AddressVirtual Size Is in Section
                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x43e580x53.text
                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x440000x1250.rsrc
                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x460000xc.reloc
                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                  .text0x20000x41eb40x42000e6cd014685b60c9b6069615770daa3b2False0.48583984375data4.102458915188676IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                  .rsrc0x440000x12500x1400166a03d8656bd46bd43cffa1b01794acFalse0.51328125data5.286142231382264IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                  .reloc0x460000xc0x200aac1f55ec40d54720613d590f0ed7d94False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                                  RT_ICON0x443c00xc88Device independent bitmap graphic, 32 x 48 x 32, image size 30720.5819825436408977
                                                  RT_GROUP_ICON0x450480x14data1.2
                                                  RT_VERSION0x441300x28cPGP symmetric key encrypted data - Plaintext or unencrypted data0.4493865030674847
                                                  RT_MANIFEST0x450600x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5469387755102041
                                                  DLLImport
                                                  mscoree.dll_CorExeMain
                                                  TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                  2025-01-10T19:42:45.260205+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.649710158.101.44.24280TCP
                                                  TimestampSource PortDest PortSource IPDest IP
                                                  Jan 10, 2025 19:42:40.243839025 CET4971080192.168.2.6158.101.44.242
                                                  Jan 10, 2025 19:42:40.248697042 CET8049710158.101.44.242192.168.2.6
                                                  Jan 10, 2025 19:42:40.248784065 CET4971080192.168.2.6158.101.44.242
                                                  Jan 10, 2025 19:42:40.249033928 CET4971080192.168.2.6158.101.44.242
                                                  Jan 10, 2025 19:42:40.253807068 CET8049710158.101.44.242192.168.2.6
                                                  Jan 10, 2025 19:42:42.925111055 CET8049710158.101.44.242192.168.2.6
                                                  Jan 10, 2025 19:42:42.939908028 CET4971080192.168.2.6158.101.44.242
                                                  Jan 10, 2025 19:42:42.944664001 CET8049710158.101.44.242192.168.2.6
                                                  Jan 10, 2025 19:42:45.215405941 CET8049710158.101.44.242192.168.2.6
                                                  Jan 10, 2025 19:42:45.227070093 CET49732443192.168.2.6104.21.96.1
                                                  Jan 10, 2025 19:42:45.227101088 CET44349732104.21.96.1192.168.2.6
                                                  Jan 10, 2025 19:42:45.227184057 CET49732443192.168.2.6104.21.96.1
                                                  Jan 10, 2025 19:42:45.237807989 CET49732443192.168.2.6104.21.96.1
                                                  Jan 10, 2025 19:42:45.237827063 CET44349732104.21.96.1192.168.2.6
                                                  Jan 10, 2025 19:42:45.260205030 CET4971080192.168.2.6158.101.44.242
                                                  Jan 10, 2025 19:42:45.704996109 CET44349732104.21.96.1192.168.2.6
                                                  Jan 10, 2025 19:42:45.705199003 CET49732443192.168.2.6104.21.96.1
                                                  Jan 10, 2025 19:42:45.708144903 CET49732443192.168.2.6104.21.96.1
                                                  Jan 10, 2025 19:42:45.708159924 CET44349732104.21.96.1192.168.2.6
                                                  Jan 10, 2025 19:42:45.708522081 CET44349732104.21.96.1192.168.2.6
                                                  Jan 10, 2025 19:42:45.760270119 CET49732443192.168.2.6104.21.96.1
                                                  Jan 10, 2025 19:42:45.768047094 CET49732443192.168.2.6104.21.96.1
                                                  Jan 10, 2025 19:42:45.811332941 CET44349732104.21.96.1192.168.2.6
                                                  Jan 10, 2025 19:42:45.994328976 CET44349732104.21.96.1192.168.2.6
                                                  Jan 10, 2025 19:42:45.994396925 CET44349732104.21.96.1192.168.2.6
                                                  Jan 10, 2025 19:42:45.994446993 CET49732443192.168.2.6104.21.96.1
                                                  Jan 10, 2025 19:42:46.003748894 CET49732443192.168.2.6104.21.96.1
                                                  Jan 10, 2025 19:43:50.197277069 CET8049710158.101.44.242192.168.2.6
                                                  Jan 10, 2025 19:43:50.197339058 CET4971080192.168.2.6158.101.44.242
                                                  Jan 10, 2025 19:44:25.230115891 CET4971080192.168.2.6158.101.44.242
                                                  Jan 10, 2025 19:44:25.234877110 CET8049710158.101.44.242192.168.2.6
                                                  TimestampSource PortDest PortSource IPDest IP
                                                  Jan 10, 2025 19:42:40.228818893 CET6121353192.168.2.61.1.1.1
                                                  Jan 10, 2025 19:42:40.235752106 CET53612131.1.1.1192.168.2.6
                                                  Jan 10, 2025 19:42:45.218616962 CET6073753192.168.2.61.1.1.1
                                                  Jan 10, 2025 19:42:45.226139069 CET53607371.1.1.1192.168.2.6
                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                  Jan 10, 2025 19:42:40.228818893 CET192.168.2.61.1.1.10x15e2Standard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                                  Jan 10, 2025 19:42:45.218616962 CET192.168.2.61.1.1.10x6312Standard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                  Jan 10, 2025 19:42:40.235752106 CET1.1.1.1192.168.2.60x15e2No error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                                  Jan 10, 2025 19:42:40.235752106 CET1.1.1.1192.168.2.60x15e2No error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                                  Jan 10, 2025 19:42:40.235752106 CET1.1.1.1192.168.2.60x15e2No error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                                  Jan 10, 2025 19:42:40.235752106 CET1.1.1.1192.168.2.60x15e2No error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                                  Jan 10, 2025 19:42:40.235752106 CET1.1.1.1192.168.2.60x15e2No error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                                  Jan 10, 2025 19:42:40.235752106 CET1.1.1.1192.168.2.60x15e2No error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                                  Jan 10, 2025 19:42:45.226139069 CET1.1.1.1192.168.2.60x6312No error (0)reallyfreegeoip.org104.21.96.1A (IP address)IN (0x0001)false
                                                  Jan 10, 2025 19:42:45.226139069 CET1.1.1.1192.168.2.60x6312No error (0)reallyfreegeoip.org104.21.80.1A (IP address)IN (0x0001)false
                                                  Jan 10, 2025 19:42:45.226139069 CET1.1.1.1192.168.2.60x6312No error (0)reallyfreegeoip.org104.21.48.1A (IP address)IN (0x0001)false
                                                  Jan 10, 2025 19:42:45.226139069 CET1.1.1.1192.168.2.60x6312No error (0)reallyfreegeoip.org104.21.64.1A (IP address)IN (0x0001)false
                                                  Jan 10, 2025 19:42:45.226139069 CET1.1.1.1192.168.2.60x6312No error (0)reallyfreegeoip.org104.21.112.1A (IP address)IN (0x0001)false
                                                  Jan 10, 2025 19:42:45.226139069 CET1.1.1.1192.168.2.60x6312No error (0)reallyfreegeoip.org104.21.16.1A (IP address)IN (0x0001)false
                                                  Jan 10, 2025 19:42:45.226139069 CET1.1.1.1192.168.2.60x6312No error (0)reallyfreegeoip.org104.21.32.1A (IP address)IN (0x0001)false
                                                  • reallyfreegeoip.org
                                                  • checkip.dyndns.org
                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  0192.168.2.649710158.101.44.242802996C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                  TimestampBytes transferredDirectionData
                                                  Jan 10, 2025 19:42:40.249033928 CET151OUTGET / HTTP/1.1
                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                  Host: checkip.dyndns.org
                                                  Connection: Keep-Alive
                                                  Jan 10, 2025 19:42:42.925111055 CET730INHTTP/1.1 502 Bad Gateway
                                                  Date: Fri, 10 Jan 2025 18:42:42 GMT
                                                  Content-Type: text/html
                                                  Content-Length: 547
                                                  Connection: keep-alive
                                                  X-Request-ID: 2daacacebc19efe419f2421d01d7b792
                                                  Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 35 30 32 20 42 61 64 20 47 61 74 65 77 61 79 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 35 30 32 20 42 61 64 20 47 61 74 65 77 61 79 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 [TRUNCATED]
                                                  Data Ascii: <html><head><title>502 Bad Gateway</title></head><body><center><h1>502 Bad Gateway</h1></center><hr><center></center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->
                                                  Jan 10, 2025 19:42:42.939908028 CET127OUTGET / HTTP/1.1
                                                  User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                  Host: checkip.dyndns.org
                                                  Jan 10, 2025 19:42:45.215405941 CET730INHTTP/1.1 502 Bad Gateway
                                                  Date: Fri, 10 Jan 2025 18:42:45 GMT
                                                  Content-Type: text/html
                                                  Content-Length: 547
                                                  Connection: keep-alive
                                                  X-Request-ID: 96c33fe636e4aa7e323cf9c4e35c66a0
                                                  Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 35 30 32 20 42 61 64 20 47 61 74 65 77 61 79 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 35 30 32 20 42 61 64 20 47 61 74 65 77 61 79 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 67 65 20 2d 2d 3e 0d 0a 3c 21 2d 2d 20 61 20 70 61 64 64 69 6e 67 20 74 6f 20 64 69 73 61 62 6c 65 20 4d 53 49 45 20 61 6e 64 20 43 68 72 6f 6d 65 20 66 72 69 65 6e 64 6c 79 20 65 72 72 6f 72 20 70 61 [TRUNCATED]
                                                  Data Ascii: <html><head><title>502 Bad Gateway</title></head><body><center><h1>502 Bad Gateway</h1></center><hr><center></center></body></html>... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->... a padding to disable MSIE and Chrome friendly error page -->


                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                  0192.168.2.649732104.21.96.14432996C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                  TimestampBytes transferredDirectionData
                                                  2025-01-10 18:42:45 UTC73OUTGET /xml/ HTTP/1.1
                                                  Host: reallyfreegeoip.org
                                                  Connection: Keep-Alive
                                                  2025-01-10 18:42:45 UTC766INHTTP/1.1 200 OK
                                                  Date: Fri, 10 Jan 2025 18:42:45 GMT
                                                  Content-Type: text/xml
                                                  Content-Length: 362
                                                  Connection: close
                                                  cf-cache-status: DYNAMIC
                                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=vRZmiNsIXNRWn9Xjez%2Bf50SpncpRslLcRcK2ZpP3SFFVuLQdPmWW6uIWowZu%2FLBTH%2FD1E5r6tCPcwM64sDGKMZy0whCWOgcYrSCp2bTCEvXDw4dbm0s4fVPpGhaKMj8mOk11FeC5"}],"group":"cf-nel","max_age":604800}
                                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                  Server: cloudflare
                                                  CF-RAY: 8ffecf0c6b9c1a48-EWR
                                                  alt-svc: h3=":443"; ma=86400
                                                  server-timing: cfL4;desc="?proto=TCP&rtt=1952&min_rtt=1945&rtt_var=744&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2847&recv_bytes=687&delivery_rate=1457813&cwnd=157&unsent_bytes=0&cid=50cb745a8a67aa7f&ts=302&x=0"
                                                  2025-01-10 18:42:45 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                  Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                  Click to jump to process

                                                  Click to jump to process

                                                  Click to dive into process behavior distribution

                                                  Click to jump to process

                                                  Target ID:1
                                                  Start time:13:42:38
                                                  Start date:10/01/2025
                                                  Path:C:\Users\user\Desktop\jxy62Zm6c4.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:"C:\Users\user\Desktop\jxy62Zm6c4.exe"
                                                  Imagebase:0xc20000
                                                  File size:276'480 bytes
                                                  MD5 hash:4D96153E0C2C143244EDF3B77857A01C
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Yara matches:
                                                  • Rule: JoeSecurity_MassLogger, Description: Yara detected MassLogger RAT, Source: 00000001.00000002.2177758715.0000000003F65000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.2177758715.0000000003F65000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000001.00000002.2177758715.0000000003F65000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                  • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000001.00000002.2177758715.0000000003F65000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                  Reputation:low
                                                  Has exited:true

                                                  Target ID:2
                                                  Start time:13:42:39
                                                  Start date:10/01/2025
                                                  Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                  Wow64 process (32bit):true
                                                  Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                  Imagebase:0xf30000
                                                  File size:65'440 bytes
                                                  MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                                                  Has elevated privileges:true
                                                  Has administrator privileges:true
                                                  Programmed in:C, C++ or other language
                                                  Yara matches:
                                                  • Rule: JoeSecurity_MassLogger, Description: Yara detected MassLogger RAT, Source: 00000002.00000002.3414775742.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.3414775742.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                  • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000002.00000002.3414775742.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                  • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000002.00000002.3414775742.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.3416355637.00000000034D9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                  Reputation:high
                                                  Has exited:false

                                                  Reset < >

                                                    Execution Graph

                                                    Execution Coverage:43.6%
                                                    Dynamic/Decrypted Code Coverage:100%
                                                    Signature Coverage:0%
                                                    Total number of Nodes:79
                                                    Total number of Limit Nodes:4
                                                    execution_graph 675 53e0848 676 53e085d 675->676 679 53e08a1 676->679 680 53e08fd 679->680 684 53e0948 680->684 688 53e0939 680->688 685 53e0971 684->685 692 53e09c0 685->692 686 53e098b 686->686 689 53e0948 688->689 691 53e09c0 5 API calls 689->691 690 53e098b 691->690 694 53e09fa 692->694 693 53e0a28 693->686 694->693 697 53e0c70 694->697 708 53e0c80 694->708 698 53e0c80 697->698 700 53e0d39 698->700 703 53e0d70 698->703 719 53e1321 698->719 724 53e05b4 698->724 728 53e1548 700->728 701 53e0d4e 733 53e1670 701->733 702 53e0d5c 738 53e18b0 702->738 703->693 713 53e0ca4 708->713 709 53e05b4 ReadProcessMemory 709->713 710 53e0d39 716 53e1548 VirtualAllocEx 710->716 711 53e0d4e 717 53e1670 WriteProcessMemory 711->717 712 53e0d5c 715 53e18b0 ResumeThread 712->715 713->709 713->710 714 53e0d70 713->714 718 53e1321 Wow64SetThreadContext 713->718 714->693 715->714 716->711 717->712 718->713 721 53e1343 719->721 720 53e137a 720->698 721->720 722 53e1418 Wow64SetThreadContext 721->722 723 53e1446 722->723 723->698 725 53e1488 ReadProcessMemory 724->725 727 53e1516 725->727 727->698 729 53e1556 728->729 730 53e1584 729->730 731 53e160b VirtualAllocEx 729->731 730->701 732 53e1642 731->732 732->701 736 53e167e 733->736 734 53e1756 734->702 735 53e1844 WriteProcessMemory 737 53e187c 735->737 736->734 736->735 737->702 742 53e18db 738->742 739 53e1a39 ResumeThread 740 53e1a66 739->740 740->703 741 53e1957 741->703 742->739 742->741 755 53e19f8 756 53e1a39 ResumeThread 755->756 757 53e1a66 756->757 762 53e0658 763 53e0665 762->763 765 53e08a1 5 API calls 763->765 764 53e087b 765->764 770 53e15c8 771 53e160b VirtualAllocEx 770->771 772 53e1642 771->772 766 53e0f54 767 53e0fe9 CreateProcessA 766->767 769 53e11fe 767->769 743 53e0f60 744 53e0fe9 CreateProcessA 743->744 746 53e11fe 744->746 751 53e1480 752 53e1488 ReadProcessMemory 751->752 754 53e1516 752->754 758 53e17e0 759 53e182b WriteProcessMemory 758->759 761 53e187c 759->761 773 53e13c0 774 53e1408 Wow64SetThreadContext 773->774 776 53e1446 774->776

                                                    Callgraph

                                                    • Executed
                                                    • Not Executed
                                                    • Opacity -> Relevance
                                                    • Disassembly available
                                                    callgraph 0 Function_053E013C 1 Function_053E053D 2 Function_053E0238 3 Function_053E0C39 4 Function_053E0939 110 Function_053E09C0 4->110 5 Function_053E0539 6 Function_053E0434 7 Function_053E0535 8 Function_053E012C 9 Function_053E0A2A 10 Function_053E0C2B 11 Function_053E1321 16 Function_053E0610 11->16 12 Function_053E011C 13 Function_053E051D 14 Function_053E0519 15 Function_053E0515 17 Function_053E0511 18 Function_053E010C 19 Function_053E050D 20 Function_053E0608 21 Function_053E0F08 22 Function_053E0509 23 Function_053E0006 24 Function_053E0505 25 Function_053E0100 26 Function_053E0501 27 Function_053E0A78 27->0 27->8 51 Function_053E014C 27->51 28 Function_053E0278 29 Function_053E0678 30 Function_053E0174 31 Function_053E0474 32 Function_053E1274 75 Function_053E029C 32->75 33 Function_053E1670 34 Function_053E0C70 34->11 34->21 34->33 54 Function_053E1548 34->54 63 Function_053E05B4 34->63 66 Function_053E18B0 34->66 103 Function_053E05CC 34->103 112 Function_053E05C0 34->112 35 Function_053E0E71 36 Function_053E026C 37 Function_053E066C 38 Function_053E126B 39 Function_053E0168 40 Function_053E0468 41 Function_053E0A69 41->0 41->8 41->51 42 Function_053E0F60 42->75 43 Function_053E015C 44 Function_053E045C 45 Function_053E0C58 46 Function_053E0658 73 Function_053E08A1 46->73 47 Function_053E0557 48 Function_053E0254 49 Function_053E0F54 49->75 50 Function_053E0450 52 Function_053E004D 53 Function_053E0948 53->110 55 Function_053E0848 55->73 56 Function_053E0248 57 Function_053E0C49 58 Function_053E0444 59 Function_053E0541 60 Function_053E00BC 61 Function_053E04BD 62 Function_053E04B9 64 Function_053E01B4 65 Function_053E04B5 66->29 66->37 67 Function_053E00B0 68 Function_053E04B1 69 Function_053E09AB 70 Function_053E01A8 71 Function_053E04A4 72 Function_053E00A0 73->4 73->53 74 Function_053E0BA1 76 Function_053E019C 77 Function_053E0498 78 Function_053E0090 79 Function_053E0290 80 Function_053E018C 81 Function_053E048C 82 Function_053E0688 82->73 83 Function_053E0284 84 Function_053E0C80 84->11 84->21 84->33 84->54 84->63 84->66 84->103 84->112 85 Function_053E0180 86 Function_053E0080 87 Function_053E0480 88 Function_053E1480 89 Function_053E04FD 90 Function_053E0BFD 91 Function_053E19F8 92 Function_053E04F9 93 Function_053E04F5 94 Function_053E00F0 95 Function_053E04F1 96 Function_053E00E4 97 Function_053E17E0 98 Function_053E04D9 99 Function_053E00D4 100 Function_053E04D5 101 Function_053E04D1 102 Function_053E0BCF 104 Function_053E04CD 105 Function_053E15C8 106 Function_053E00C8 107 Function_053E04C9 108 Function_053E01C5 109 Function_053E04C5 110->27 110->34 110->41 110->84 111 Function_053E13C0 113 Function_053E04C1

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 0 53e0f54-53e0ff5 2 53e1049-53e1069 0->2 3 53e0ff7-53e101c 0->3 6 53e10bd-53e10ee 2->6 7 53e106b-53e1090 2->7 3->2 8 53e101e-53e1020 3->8 16 53e1145-53e11fc CreateProcessA 6->16 17 53e10f0-53e1118 6->17 7->6 18 53e1092-53e1094 7->18 9 53e1022-53e102c 8->9 10 53e1043-53e1046 8->10 13 53e102e 9->13 14 53e1030-53e103f 9->14 10->2 13->14 14->14 15 53e1041 14->15 15->10 32 53e11fe-53e1204 16->32 33 53e1205-53e1280 16->33 17->16 25 53e111a-53e111c 17->25 19 53e1096-53e10a0 18->19 20 53e10b7-53e10ba 18->20 22 53e10a4-53e10b3 19->22 23 53e10a2 19->23 20->6 22->22 26 53e10b5 22->26 23->22 27 53e111e-53e1128 25->27 28 53e113f-53e1142 25->28 26->20 30 53e112c-53e113b 27->30 31 53e112a 27->31 28->16 30->30 34 53e113d 30->34 31->30 32->33 43 53e1282-53e1286 33->43 44 53e1290-53e1294 33->44 34->28 43->44 45 53e1288-53e128b call 53e029c 43->45 46 53e1296-53e129a 44->46 47 53e12a4-53e12a8 44->47 45->44 46->47 48 53e129c-53e129f call 53e029c 46->48 49 53e12aa-53e12ae 47->49 50 53e12b8-53e12bc 47->50 48->47 49->50 53 53e12b0-53e12b3 call 53e029c 49->53 54 53e12ce-53e12d5 50->54 55 53e12be-53e12c4 50->55 53->50 57 53e12ec 54->57 58 53e12d7-53e12e6 54->58 55->54 60 53e12ed 57->60 58->57 60->60
                                                    APIs
                                                    • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 053E11E9
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2177957900.00000000053E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053E0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_53e0000_jxy62Zm6c4.jbxd
                                                    Similarity
                                                    • API ID: CreateProcess
                                                    • String ID:
                                                    • API String ID: 963392458-0
                                                    • Opcode ID: 67d79dc8b947536528a0acdae6ad8406147e8ba7472be2a46cf936e9e3936cd3
                                                    • Instruction ID: f962f166eef1368b84f66aae796434b10b6633f844cfbc6e5b5ac4151e8bce6c
                                                    • Opcode Fuzzy Hash: 67d79dc8b947536528a0acdae6ad8406147e8ba7472be2a46cf936e9e3936cd3
                                                    • Instruction Fuzzy Hash: 77A14D71E002699FDB10CFA8C8857EDBBF2BF48314F1481A9E819E7290DB759985CF91

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 61 53e0f60-53e0ff5 63 53e1049-53e1069 61->63 64 53e0ff7-53e101c 61->64 67 53e10bd-53e10ee 63->67 68 53e106b-53e1090 63->68 64->63 69 53e101e-53e1020 64->69 77 53e1145-53e11fc CreateProcessA 67->77 78 53e10f0-53e1118 67->78 68->67 79 53e1092-53e1094 68->79 70 53e1022-53e102c 69->70 71 53e1043-53e1046 69->71 74 53e102e 70->74 75 53e1030-53e103f 70->75 71->63 74->75 75->75 76 53e1041 75->76 76->71 93 53e11fe-53e1204 77->93 94 53e1205-53e1280 77->94 78->77 86 53e111a-53e111c 78->86 80 53e1096-53e10a0 79->80 81 53e10b7-53e10ba 79->81 83 53e10a4-53e10b3 80->83 84 53e10a2 80->84 81->67 83->83 87 53e10b5 83->87 84->83 88 53e111e-53e1128 86->88 89 53e113f-53e1142 86->89 87->81 91 53e112c-53e113b 88->91 92 53e112a 88->92 89->77 91->91 95 53e113d 91->95 92->91 93->94 104 53e1282-53e1286 94->104 105 53e1290-53e1294 94->105 95->89 104->105 106 53e1288-53e128b call 53e029c 104->106 107 53e1296-53e129a 105->107 108 53e12a4-53e12a8 105->108 106->105 107->108 109 53e129c-53e129f call 53e029c 107->109 110 53e12aa-53e12ae 108->110 111 53e12b8-53e12bc 108->111 109->108 110->111 114 53e12b0-53e12b3 call 53e029c 110->114 115 53e12ce-53e12d5 111->115 116 53e12be-53e12c4 111->116 114->111 118 53e12ec 115->118 119 53e12d7-53e12e6 115->119 116->115 121 53e12ed 118->121 119->118 121->121
                                                    APIs
                                                    • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 053E11E9
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2177957900.00000000053E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053E0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_53e0000_jxy62Zm6c4.jbxd
                                                    Similarity
                                                    • API ID: CreateProcess
                                                    • String ID:
                                                    • API String ID: 963392458-0
                                                    • Opcode ID: d1997d569b7deaa7b125aa1c478b460adc2253e46c123af428397cdf40238443
                                                    • Instruction ID: c330001386169d4db9fe6d131db9fb04108ec51678388a68313ca8c7d51ca9df
                                                    • Opcode Fuzzy Hash: d1997d569b7deaa7b125aa1c478b460adc2253e46c123af428397cdf40238443
                                                    • Instruction Fuzzy Hash: B2A14E71E002699FDB14CFA8C8417EDBBF2BF48304F148169E819E7290DB759985CF91

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 122 53e1670-53e167c 123 53e16ce-53e16de 122->123 124 53e167e-53e16b5 call 53e0654 122->124 128 53e1756-53e175d 123->128 129 53e16e0-53e1708 123->129 130 53e16ba-53e16bc 124->130 138 53e170a-53e173f call 53e0654 129->138 139 53e1748-53e1754 129->139 131 53e16c2-53e16cd 130->131 132 53e1760-53e1784 130->132 131->123 142 53e178b-53e17dc 132->142 146 53e1744-53e1746 138->146 139->128 139->129 151 53e17de-53e1831 142->151 152 53e1844-53e187a WriteProcessMemory 142->152 146->139 146->142 159 53e1833-53e183f 151->159 160 53e1841 151->160 153 53e187c-53e1882 152->153 154 53e1883-53e18ab 152->154 153->154 159->160 160->152
                                                    APIs
                                                    • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 053E186D
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2177957900.00000000053E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053E0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_53e0000_jxy62Zm6c4.jbxd
                                                    Similarity
                                                    • API ID: MemoryProcessWrite
                                                    • String ID:
                                                    • API String ID: 3559483778-0
                                                    • Opcode ID: 1c60656cf93cb4d44b4206885462ac72257d994b75e2c7ed6a7d2c22d4594e9c
                                                    • Instruction ID: 98181ea7d9e4b923389eadeeeaa92c36019f1206488d0caa53b3e916bc4db096
                                                    • Opcode Fuzzy Hash: 1c60656cf93cb4d44b4206885462ac72257d994b75e2c7ed6a7d2c22d4594e9c
                                                    • Instruction Fuzzy Hash: 9061B771A002199FCB15DFA9C880AEFBBF6FF88300F148569E505EB385DB749905CBA4

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 161 53e18b0-53e18fa call 53e0654 165 53e195e-53e1982 161->165 166 53e18fc-53e1910 161->166 181 53e1989-53e19ad 165->181 169 53e19df-53e1a64 ResumeThread 166->169 170 53e1916-53e192e call 53e066c 166->170 185 53e1a6d-53e1a8a 169->185 186 53e1a66-53e1a6c 169->186 176 53e1944-53e194d call 53e0684 170->176 177 53e1930-53e1942 call 53e0678 170->177 184 53e1952-53e1955 176->184 177->176 177->181 188 53e19b4-53e19d8 181->188 187 53e1957-53e195b 184->187 184->188 186->185 188->169
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2177957900.00000000053E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053E0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_53e0000_jxy62Zm6c4.jbxd
                                                    Similarity
                                                    • API ID: ResumeThread
                                                    • String ID:
                                                    • API String ID: 947044025-0
                                                    • Opcode ID: 09935050a61aa8eedfca5d7f9d120180cf05a77c17eb798a139750efe7aa58e6
                                                    • Instruction ID: 351e0777d49fa50e536678b72816921d5a08fed676a9418b3ba48dee6a5276e7
                                                    • Opcode Fuzzy Hash: 09935050a61aa8eedfca5d7f9d120180cf05a77c17eb798a139750efe7aa58e6
                                                    • Instruction Fuzzy Hash: D051C270B002188FD714EFA9D454BAEBBF6EFC8310F18806AD519DB394DA749C06CBA5

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 197 53e1321-53e1349 199 53e13aa-53e140c 197->199 200 53e134b-53e135d call 53e0604 197->200 208 53e140e-53e1416 199->208 209 53e1418-53e1444 Wow64SetThreadContext 199->209 203 53e1362-53e1364 200->203 204 53e137a-53e137e 203->204 205 53e1366-53e1378 call 53e0610 203->205 205->204 213 53e137f-53e13a3 205->213 208->209 211 53e144d-53e1475 209->211 212 53e1446-53e144c 209->212 212->211 213->199
                                                    APIs
                                                    • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 053E1437
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2177957900.00000000053E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053E0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_53e0000_jxy62Zm6c4.jbxd
                                                    Similarity
                                                    • API ID: ContextThreadWow64
                                                    • String ID:
                                                    • API String ID: 983334009-0
                                                    • Opcode ID: 66148ff85c1400dc4f65c15022a54ec415ce95efae561d524e3c1c87b7600781
                                                    • Instruction ID: 768922b107930f1239e171aa2674b67aa69e1dcd79e1f3f948f6b7fa53da7c7e
                                                    • Opcode Fuzzy Hash: 66148ff85c1400dc4f65c15022a54ec415ce95efae561d524e3c1c87b7600781
                                                    • Instruction Fuzzy Hash: FF41EC31A042698FCB15DFA9C8547AEBBF1FF49310F1980AAD458EB391D7789C01CBA1

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 219 53e1548-53e1554 220 53e15a6-53e1640 VirtualAllocEx 219->220 221 53e1556-53e157b call 53e063c 219->221 231 53e1649-53e1666 220->231 232 53e1642-53e1648 220->232 226 53e1580-53e1582 221->226 227 53e158a-53e15a5 226->227 228 53e1584-53e1587 226->228 227->220 232->231
                                                    APIs
                                                    • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 053E1633
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2177957900.00000000053E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053E0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_53e0000_jxy62Zm6c4.jbxd
                                                    Similarity
                                                    • API ID: AllocVirtual
                                                    • String ID:
                                                    • API String ID: 4275171209-0
                                                    • Opcode ID: 7039e8d3006fed6b5f1ee459143ccace6b2793cd0b9b2b941edb4b6c746cf4bb
                                                    • Instruction ID: d9546840e16997ad13ce8f3e3bfd7294ef059a3cec590921289f015ea9f84a43
                                                    • Opcode Fuzzy Hash: 7039e8d3006fed6b5f1ee459143ccace6b2793cd0b9b2b941edb4b6c746cf4bb
                                                    • Instruction Fuzzy Hash: 5531E371A003489FCB11DFA9C844BDEBFF5EF8A310F18806AE519AB391C7359801CBA4

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 236 53e17e0-53e1831 238 53e1833-53e183f 236->238 239 53e1841-53e187a WriteProcessMemory 236->239 238->239 241 53e187c-53e1882 239->241 242 53e1883-53e18ab 239->242 241->242
                                                    APIs
                                                    • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 053E186D
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2177957900.00000000053E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053E0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_53e0000_jxy62Zm6c4.jbxd
                                                    Similarity
                                                    • API ID: MemoryProcessWrite
                                                    • String ID:
                                                    • API String ID: 3559483778-0
                                                    • Opcode ID: 110951986d277791c73e44b8716b51e05895dba9167ace094f4bd3cdf16e8a32
                                                    • Instruction ID: 0348cd7765908a41013af925685bf64f1706b7d29f6e2d49b864cdc6fb2aa289
                                                    • Opcode Fuzzy Hash: 110951986d277791c73e44b8716b51e05895dba9167ace094f4bd3cdf16e8a32
                                                    • Instruction Fuzzy Hash: B821F2B5900259DFDB10CF9AC885BDEBBF5FB48310F10842AE919A7250D778A940CBA4

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 245 53e05b4-53e1514 ReadProcessMemory 248 53e151d-53e1545 245->248 249 53e1516-53e151c 245->249 249->248
                                                    APIs
                                                    • ReadProcessMemory.KERNELBASE(02F8B7B8,?,?,?,?), ref: 053E1507
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2177957900.00000000053E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053E0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_53e0000_jxy62Zm6c4.jbxd
                                                    Similarity
                                                    • API ID: MemoryProcessRead
                                                    • String ID:
                                                    • API String ID: 1726664587-0
                                                    • Opcode ID: 7f73f2b20d0b9eab98e175f95e733e325865429e61cdb92959756cee7f1d5477
                                                    • Instruction ID: 8088474e29bbc77ecea0fa77f77f1f02d7c46012df98e158a07c5d88d2196a00
                                                    • Opcode Fuzzy Hash: 7f73f2b20d0b9eab98e175f95e733e325865429e61cdb92959756cee7f1d5477
                                                    • Instruction Fuzzy Hash: C32100B5900259DFCB10CF9AD884BDEBBF5FB48310F10842AE919A7350D378A950CBA4

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 252 53e1480-53e1514 ReadProcessMemory 255 53e151d-53e1545 252->255 256 53e1516-53e151c 252->256 256->255
                                                    APIs
                                                    • ReadProcessMemory.KERNELBASE(02F8B7B8,?,?,?,?), ref: 053E1507
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2177957900.00000000053E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053E0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_53e0000_jxy62Zm6c4.jbxd
                                                    Similarity
                                                    • API ID: MemoryProcessRead
                                                    • String ID:
                                                    • API String ID: 1726664587-0
                                                    • Opcode ID: 3f665d52e6714f69f21986c5e93bd8accdd0989f9b5cd73c1a0cf7fccbe462fd
                                                    • Instruction ID: 9af8f373172434c5b450bea448fe885c26f5a862db2d43e723f52b23194ec617
                                                    • Opcode Fuzzy Hash: 3f665d52e6714f69f21986c5e93bd8accdd0989f9b5cd73c1a0cf7fccbe462fd
                                                    • Instruction Fuzzy Hash: B52100B6900359DFCB10CF9AC884ADEBBF4FB48310F10842AE919A7250D339A940CFA5

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 259 53e13c0-53e140c 261 53e140e-53e1416 259->261 262 53e1418-53e1444 Wow64SetThreadContext 259->262 261->262 263 53e144d-53e1475 262->263 264 53e1446-53e144c 262->264 264->263
                                                    APIs
                                                    • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 053E1437
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2177957900.00000000053E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053E0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_53e0000_jxy62Zm6c4.jbxd
                                                    Similarity
                                                    • API ID: ContextThreadWow64
                                                    • String ID:
                                                    • API String ID: 983334009-0
                                                    • Opcode ID: 71f106692f7b51a731f8a6c42f405f3b6ff072283920d3ad1c3bed3267eed307
                                                    • Instruction ID: 2bce24577dc422c0fe258baa5777386cbd2d0307f62dc5dd102da4aae92345a2
                                                    • Opcode Fuzzy Hash: 71f106692f7b51a731f8a6c42f405f3b6ff072283920d3ad1c3bed3267eed307
                                                    • Instruction Fuzzy Hash: A92124B1D0062A9FDB10CF9AC885B9EFBF4BB48620F54812AD518B7340D378A954CFA1

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 267 53e15c8-53e1603 268 53e160b-53e1640 VirtualAllocEx 267->268 269 53e1649-53e1666 268->269 270 53e1642-53e1648 268->270 270->269
                                                    APIs
                                                    • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 053E1633
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2177957900.00000000053E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053E0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_53e0000_jxy62Zm6c4.jbxd
                                                    Similarity
                                                    • API ID: AllocVirtual
                                                    • String ID:
                                                    • API String ID: 4275171209-0
                                                    • Opcode ID: 73204701e4653da96c2a47abbbc434edc5981b55cc312918f09485f83899d79f
                                                    • Instruction ID: ba7053950365ee00bafb11d5f0097e161696b7e42ff64de8f313351b2fee92c4
                                                    • Opcode Fuzzy Hash: 73204701e4653da96c2a47abbbc434edc5981b55cc312918f09485f83899d79f
                                                    • Instruction Fuzzy Hash: 2D1104B5900249DFDB20DF9AC884BDEFBF4FB88324F248419E519A7250C775A940CFA5

                                                    Control-flow Graph

                                                    • Executed
                                                    • Not Executed
                                                    control_flow_graph 273 53e19f8-53e1a64 ResumeThread 275 53e1a6d-53e1a8a 273->275 276 53e1a66-53e1a6c 273->276 276->275
                                                    APIs
                                                    Memory Dump Source
                                                    • Source File: 00000001.00000002.2177957900.00000000053E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 053E0000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_1_2_53e0000_jxy62Zm6c4.jbxd
                                                    Similarity
                                                    • API ID: ResumeThread
                                                    • String ID:
                                                    • API String ID: 947044025-0
                                                    • Opcode ID: a7076f3df7dc7903e8abd4504e8f4651a96b973e8e133eb09d421c1c68be571f
                                                    • Instruction ID: 0fedc7480bc4e0a50e230bf28eaf00d01c98ad993cfa6d3a7743c1860c168989
                                                    • Opcode Fuzzy Hash: a7076f3df7dc7903e8abd4504e8f4651a96b973e8e133eb09d421c1c68be571f
                                                    • Instruction Fuzzy Hash: F51122B1800349CFDB20DF9AC885B9EFBF8AB88320F24841AD519A7250C774A940CFA5
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.3415755283.0000000001720000.00000040.00000800.00020000.00000000.sdmp, Offset: 01720000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_1720000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 2a1d57f8bdb7e17d36d1803f1ada3f52e019c170dc37e79b9fa5d04309a22207
                                                    • Instruction ID: 669571ffb2f37a56ca244955360628713452662ee92f579251d54294b72e603c
                                                    • Opcode Fuzzy Hash: 2a1d57f8bdb7e17d36d1803f1ada3f52e019c170dc37e79b9fa5d04309a22207
                                                    • Instruction Fuzzy Hash: FE410474D01258CBEB18CFAAD9446AEFBF2BF88300F24D16AC418AB255DB345946CF50
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.3415755283.0000000001720000.00000040.00000800.00020000.00000000.sdmp, Offset: 01720000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_1720000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: b32eee2b3c834a874887354fc965641e532a0da4f986614e310019e1912ad5e1
                                                    • Instruction ID: 9d6bb245a23802aa9ef7c7d3aea560e30a14b0c2ab1e58853087a97b0bd07859
                                                    • Opcode Fuzzy Hash: b32eee2b3c834a874887354fc965641e532a0da4f986614e310019e1912ad5e1
                                                    • Instruction Fuzzy Hash: 5AC1AF74E00218CFDB54DFA9D954BADBBB2AF89300F2090A9D809AB355DB359E81CF51
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.3415755283.0000000001720000.00000040.00000800.00020000.00000000.sdmp, Offset: 01720000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_1720000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: e6beeab2bf3449c856a86a7d4c14a982af95537475186bd52e85786f85ad1a8d
                                                    • Instruction ID: 003cb1209698710851cb10f3d8604c889538ae6364bffb0ac31596fdbf86fbaa
                                                    • Opcode Fuzzy Hash: e6beeab2bf3449c856a86a7d4c14a982af95537475186bd52e85786f85ad1a8d
                                                    • Instruction Fuzzy Hash: 50919734B04255DBEB28DB74985467EFBB7BFC8710B08896DE506E7388DE39C9028791
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.3415755283.0000000001720000.00000040.00000800.00020000.00000000.sdmp, Offset: 01720000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_1720000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 0cd32f80645786e43f51f9b58ae5eeec0988cb4627f417c8eb6fd4ed8af880f6
                                                    • Instruction ID: 49db454e9018a9499aa31b7d76b1ef28fb03fc5c40610d261d104aac2c26a710
                                                    • Opcode Fuzzy Hash: 0cd32f80645786e43f51f9b58ae5eeec0988cb4627f417c8eb6fd4ed8af880f6
                                                    • Instruction Fuzzy Hash: 15C19E78E00218CFDB14DFA5D994BADBBB2FB89300F2490A9D909A7355DB359E81CF50
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.3415755283.0000000001720000.00000040.00000800.00020000.00000000.sdmp, Offset: 01720000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_1720000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 1b42c4ea3f7a803396af09079547146afb63c2c795ab15778dc72070f0fd7ec9
                                                    • Instruction ID: 32374acb2e9f07cf9dd36838b8faa94c325b6a735bf8dfbb9ee5408ad8aeff14
                                                    • Opcode Fuzzy Hash: 1b42c4ea3f7a803396af09079547146afb63c2c795ab15778dc72070f0fd7ec9
                                                    • Instruction Fuzzy Hash: 30A10370D00218CFEB24DFA9D948B9DBBB1FF88300F249269D509A7395DB749A85CF54
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.3415755283.0000000001720000.00000040.00000800.00020000.00000000.sdmp, Offset: 01720000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_1720000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: dc36803400c9d96f71f7a93d4eb4f941f64ab3728c60906b6988c3ccdfcaddc5
                                                    • Instruction ID: c6f18efb642d15b1ace12205f53cf7021a4aa2e12388524f4ef3990d6195f4db
                                                    • Opcode Fuzzy Hash: dc36803400c9d96f71f7a93d4eb4f941f64ab3728c60906b6988c3ccdfcaddc5
                                                    • Instruction Fuzzy Hash: D1A10370D00218CFEB24DFA9D948B9DBBB1FF88310F209269E509A73A5DB749985CF54
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.3415755283.0000000001720000.00000040.00000800.00020000.00000000.sdmp, Offset: 01720000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_1720000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 95976532250dd6275dea3c92ab546efdf09514d2c2020cd69cb80b96898e2e8b
                                                    • Instruction ID: 654150e533ae89aecf06a9139a2adb7776ba1352220e26cb8938e74c47bcd644
                                                    • Opcode Fuzzy Hash: 95976532250dd6275dea3c92ab546efdf09514d2c2020cd69cb80b96898e2e8b
                                                    • Instruction Fuzzy Hash: 3D91E274D00218CFEB20DFA9D948B9DFBB1FF48310F209269E509AB291DB759986CF14
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.3415755283.0000000001720000.00000040.00000800.00020000.00000000.sdmp, Offset: 01720000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_1720000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 3274631d8bb5fea64c74c41e766c62896431ce1706e1a8b745a4f954d77a71cf
                                                    • Instruction ID: 3a2af90e7066bb25f2b6239d1eb96f5018a1efc6e7e0e3744f0a30ea12fdb81d
                                                    • Opcode Fuzzy Hash: 3274631d8bb5fea64c74c41e766c62896431ce1706e1a8b745a4f954d77a71cf
                                                    • Instruction Fuzzy Hash: 1B41F670E01658CBEB18CFBAD8546ADFBF2AF89300F24D22AC415AB295DB344946CF50
                                                    Strings
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.3415755283.0000000001720000.00000040.00000800.00020000.00000000.sdmp, Offset: 01720000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_1720000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID: 0-3916222277
                                                    • Opcode ID: e9d5d935ceac67ff27cc6440bbf4060af3672bca482a0169ca7ab30ba71be093
                                                    • Instruction ID: 299ccb8ebee4ae7ac3e77c3de3cb6f7d84c09dc6b34ce74d4c3077edd7376b7a
                                                    • Opcode Fuzzy Hash: e9d5d935ceac67ff27cc6440bbf4060af3672bca482a0169ca7ab30ba71be093
                                                    • Instruction Fuzzy Hash: 21A18630B003249FDB25AF78D49866DBBA2FF85321F148629E9158B3D1DF349D42CB51
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.3415755283.0000000001720000.00000040.00000800.00020000.00000000.sdmp, Offset: 01720000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_1720000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: de702b25df2b2b1c14bd8e61376e56753bf22afd65e6c8fb481a6b8bad3b457e
                                                    • Instruction ID: 2939fc2f825ed64ac1129d7ca93357ee2ffb4d475e502b7770022c6a858bf460
                                                    • Opcode Fuzzy Hash: de702b25df2b2b1c14bd8e61376e56753bf22afd65e6c8fb481a6b8bad3b457e
                                                    • Instruction Fuzzy Hash: BA721234A00219CFEB159BA4C860BAEBB77FF89300F1081ADD54AA7391DF359E85DB51
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.3415755283.0000000001720000.00000040.00000800.00020000.00000000.sdmp, Offset: 01720000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_1720000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 76e42541032282a4f5622e2a7adcd8a6d6e428cdaecacb1ab81b26dc42e6f489
                                                    • Instruction ID: e3ccbe22c75507ae82812ec9db48e03eb23e738ac5e33e2e118aa1989c1e874c
                                                    • Opcode Fuzzy Hash: 76e42541032282a4f5622e2a7adcd8a6d6e428cdaecacb1ab81b26dc42e6f489
                                                    • Instruction Fuzzy Hash: F0B1B431B002158FDB15DB6CC894AAEBBB2FF89320F194469E505EB3A5DB31DD42CB91
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.3415755283.0000000001720000.00000040.00000800.00020000.00000000.sdmp, Offset: 01720000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_1720000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 271f807662803eb4b22fdc35505357463f25721a756cfbb344571f2cf61663dc
                                                    • Instruction ID: b18434542f0e7db7e09b1325b279c0d01c4d384e88bdbfdebf10f2bb278f2521
                                                    • Opcode Fuzzy Hash: 271f807662803eb4b22fdc35505357463f25721a756cfbb344571f2cf61663dc
                                                    • Instruction Fuzzy Hash: 32D1D975E005248FCB15CF9CD9889ADBBF6BF9C310B1A8069E515AB362DB31EC42CB50
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.3415755283.0000000001720000.00000040.00000800.00020000.00000000.sdmp, Offset: 01720000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_1720000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: bf8a7d85ac7ca2ee251077aa1ff3dfaaa069f79795f2bbe95130839b6555be1c
                                                    • Instruction ID: 12e96e1b2a546a22cfeb540c75290aa4c2b85b7714a0ed6dae2e222f3db195d9
                                                    • Opcode Fuzzy Hash: bf8a7d85ac7ca2ee251077aa1ff3dfaaa069f79795f2bbe95130839b6555be1c
                                                    • Instruction Fuzzy Hash: 5AD1F875E006558FCB15CFA8C9889ADBBF6BF9D310F1A8059E515AB362CB31EC42CB50
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.3415755283.0000000001720000.00000040.00000800.00020000.00000000.sdmp, Offset: 01720000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_1720000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 0295d4a55666802e8d69739c2abf97b53654e6d91d880fbe9f79170be88ba1ee
                                                    • Instruction ID: 3ed107ec672e56039573396359debe43a00f9da90806fdef3b2f26ad750852c2
                                                    • Opcode Fuzzy Hash: 0295d4a55666802e8d69739c2abf97b53654e6d91d880fbe9f79170be88ba1ee
                                                    • Instruction Fuzzy Hash: 0B61B4307041618FDB16CF3DD884A7EBBEAEF59610B1544AAE916CB362EB31DC42DB50
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.3415755283.0000000001720000.00000040.00000800.00020000.00000000.sdmp, Offset: 01720000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_1720000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 2ac83d620e0698eae1f27b3dcc536719cc0ca66cdb52220c38b72bb3b915816c
                                                    • Instruction ID: da6c3ede8c6187643d557eaa614b20a9b3a6f6f4a669cb1815ad09b9923a5bdc
                                                    • Opcode Fuzzy Hash: 2ac83d620e0698eae1f27b3dcc536719cc0ca66cdb52220c38b72bb3b915816c
                                                    • Instruction Fuzzy Hash: 55A1B774A0030ACFCB04DFA8E8949AEFBB6FB48305F105669E505A7365DB74AD46CF81
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.3415755283.0000000001720000.00000040.00000800.00020000.00000000.sdmp, Offset: 01720000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_1720000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 8d2786c11f3cfdb89e8f34dff4fa360e1848ed58ced5e0272d6dd8157901dda6
                                                    • Instruction ID: 8e92f0cc8d65424cee2a9228f13818e08d3ca85a6e6867f77ab16cac671b6f46
                                                    • Opcode Fuzzy Hash: 8d2786c11f3cfdb89e8f34dff4fa360e1848ed58ced5e0272d6dd8157901dda6
                                                    • Instruction Fuzzy Hash: E651F072A006119FCB25CB6DDC84AAFFBB5FFD9320B14896AE519C7311D730DA028B90
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.3415755283.0000000001720000.00000040.00000800.00020000.00000000.sdmp, Offset: 01720000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_1720000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 897a2d867199db4c1cd9b2c959f84e622af9b09d9c1735957c3ad089dc813dc0
                                                    • Instruction ID: 8bc84cbce2e59e06f2644f51939d9f94e3613165edb0a6b3afc68294f0435e25
                                                    • Opcode Fuzzy Hash: 897a2d867199db4c1cd9b2c959f84e622af9b09d9c1735957c3ad089dc813dc0
                                                    • Instruction Fuzzy Hash: CDA1B774A0030ACFCB04DFA8E8949AEFBB6FB48305F106569E505A7355DB74AD46CF81
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.3415755283.0000000001720000.00000040.00000800.00020000.00000000.sdmp, Offset: 01720000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_1720000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 93ea645fcaac6f4a9942cf11c40b30b37146eaa2d4d2663c24f2542e09317fe4
                                                    • Instruction ID: 58706c5610b4f921982c48a1f5ba40b957ff53e3d0408bf7e728a57c166ceeb1
                                                    • Opcode Fuzzy Hash: 93ea645fcaac6f4a9942cf11c40b30b37146eaa2d4d2663c24f2542e09317fe4
                                                    • Instruction Fuzzy Hash: 8351A074E10258CFDB14DFA9D894AADFBF2BF89300F109069E816AB364DB749842CF50
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.3415755283.0000000001720000.00000040.00000800.00020000.00000000.sdmp, Offset: 01720000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_1720000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: f9bcf75424cf572471dd788f315fb6665fb6525a5edd9c077a65ed520f4e6041
                                                    • Instruction ID: 02a5b58ce1533a33826d8511b6a0f43d4f323f392000be175d561534c853a6be
                                                    • Opcode Fuzzy Hash: f9bcf75424cf572471dd788f315fb6665fb6525a5edd9c077a65ed520f4e6041
                                                    • Instruction Fuzzy Hash: AB4121B642638A8FD7017B60F9AC17A7F70FF0B327B08AC45E55A86919DB3042498F51
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.3415755283.0000000001720000.00000040.00000800.00020000.00000000.sdmp, Offset: 01720000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_1720000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 67f32fbbc6e6ebcc2ede7c500daa25fe9a524ba9599129e10588246dee638166
                                                    • Instruction ID: d2968baca74e01dc8c851025fe7f4a0317966c60aedec53b0c3dc311044b4724
                                                    • Opcode Fuzzy Hash: 67f32fbbc6e6ebcc2ede7c500daa25fe9a524ba9599129e10588246dee638166
                                                    • Instruction Fuzzy Hash: 4431C531B002059FCB19EFB9D854AAEBBB6EF89200B1445BEE509DB355DF349D02C790
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.3415755283.0000000001720000.00000040.00000800.00020000.00000000.sdmp, Offset: 01720000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_1720000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 0e3dc384fb86441a4f49455168aedecfa6050759ec526561d0ef4bfe743dae93
                                                    • Instruction ID: 6a692ffd86b5b0b32db82578cf74a7b9a79ce428a653b6ccffa2aa3486832334
                                                    • Opcode Fuzzy Hash: 0e3dc384fb86441a4f49455168aedecfa6050759ec526561d0ef4bfe743dae93
                                                    • Instruction Fuzzy Hash: 554127747001259FDB16DF29C948AAEBBB5FB48310F144069EA56CB3A1CB71DD42CB90
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.3415755283.0000000001720000.00000040.00000800.00020000.00000000.sdmp, Offset: 01720000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_1720000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 15a579d1a3844af7379dc73b46e66db76d0574be424b08a496eab6be1b4ff113
                                                    • Instruction ID: 8fd8db70fe68a6b07df31ec048a84d1755e48ebf0e01767d06ebefa6381d60cd
                                                    • Opcode Fuzzy Hash: 15a579d1a3844af7379dc73b46e66db76d0574be424b08a496eab6be1b4ff113
                                                    • Instruction Fuzzy Hash: DC41AE74E012188FDB18DFAAD89499DBBF2BF89300F249529E805B7364DB34A842CF14
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.3415755283.0000000001720000.00000040.00000800.00020000.00000000.sdmp, Offset: 01720000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_1720000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: d1b14b37620448bcf8e7cde548059ef8fa09557c9bbcfad96bfad747905928f4
                                                    • Instruction ID: 63619e78c59d241e1ad3a1586640ece6676165f269cacab716c4f1977a8a2f42
                                                    • Opcode Fuzzy Hash: d1b14b37620448bcf8e7cde548059ef8fa09557c9bbcfad96bfad747905928f4
                                                    • Instruction Fuzzy Hash: C4310735B002198FDB05DFA8C494E9DBBB2FF88220F155454E601AB365CA71ED82CBA0
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.3415755283.0000000001720000.00000040.00000800.00020000.00000000.sdmp, Offset: 01720000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_1720000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 8b451c0421bc860997965d5a34c040ce43ebaa9b7a06c42121dfd05a35024294
                                                    • Instruction ID: e52aa4ca8840f794c47f5f463b8d90652a1e291918a79c3eeb664a0b4541b3f4
                                                    • Opcode Fuzzy Hash: 8b451c0421bc860997965d5a34c040ce43ebaa9b7a06c42121dfd05a35024294
                                                    • Instruction Fuzzy Hash: A7311735B0021A8FDB05DFA8C494E9DBBB2EF88320F155454E601AF365CA71ED82CBA0
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.3415755283.0000000001720000.00000040.00000800.00020000.00000000.sdmp, Offset: 01720000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_1720000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 3aada8d26ea578d6194013e837363fcf183aa4298abd1a579c17ae2e1609b5ca
                                                    • Instruction ID: 8fa92de5f690cc41d5d6e6349086aaa89d1470e7ce93872bd6bcb2eddb333842
                                                    • Opcode Fuzzy Hash: 3aada8d26ea578d6194013e837363fcf183aa4298abd1a579c17ae2e1609b5ca
                                                    • Instruction Fuzzy Hash: B821F3357043758BDF294A69989427DFBA6FF84210B18406FD942C7397DB78C88A8762
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.3415755283.0000000001720000.00000040.00000800.00020000.00000000.sdmp, Offset: 01720000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_1720000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 56616adf51b22b8266cd7b98d72251aa9164ad1ba35aae7a4d05a7beaf47b283
                                                    • Instruction ID: 8dbba8d46818b7c48d234c5a804372ca789649c175e4d7cc37e41e0da38b7932
                                                    • Opcode Fuzzy Hash: 56616adf51b22b8266cd7b98d72251aa9164ad1ba35aae7a4d05a7beaf47b283
                                                    • Instruction Fuzzy Hash: 9621C5353042214BEB276B39885437EBE97AFD9614F1884B9D602CB396EE36CCC39751
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.3415755283.0000000001720000.00000040.00000800.00020000.00000000.sdmp, Offset: 01720000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_1720000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 6e4454197bc1903e899f09d038a9ffc80d5e866a7cd36be59316a45dd8f63433
                                                    • Instruction ID: c8f37e2ac8b1b71165870f19ed92af0cd683fdf5b2d4204cab919aae62aa0398
                                                    • Opcode Fuzzy Hash: 6e4454197bc1903e899f09d038a9ffc80d5e866a7cd36be59316a45dd8f63433
                                                    • Instruction Fuzzy Hash: 792126346042458FC71ADF78C86565EBBB2FF9A201F2480AAE4058B765DB308E06C791
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.3415755283.0000000001720000.00000040.00000800.00020000.00000000.sdmp, Offset: 01720000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_1720000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: cdfd574557e70f05c2abe0933da0cf754879a95a1feaee7bf54536c860b47ab3
                                                    • Instruction ID: dec9240fc61ae6605a8e2030c2359fb25e6a21227ce6ecb0606b55590aaa5f14
                                                    • Opcode Fuzzy Hash: cdfd574557e70f05c2abe0933da0cf754879a95a1feaee7bf54536c860b47ab3
                                                    • Instruction Fuzzy Hash: 2221A435B00296AFCF14DB24C4509BEB7A9FB89360F50C05DE959AB340EA31EE06CB91
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.3415755283.0000000001720000.00000040.00000800.00020000.00000000.sdmp, Offset: 01720000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_1720000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: fb8350d6f6511fc2d4ad6d58f2ba6bd4bbb5c7fa68669183c3df15b3b5d77f0e
                                                    • Instruction ID: 5e91740db600c8bffcb010e73bd94e1f50f99c57a9d7412ecedbf7083bf7e82d
                                                    • Opcode Fuzzy Hash: fb8350d6f6511fc2d4ad6d58f2ba6bd4bbb5c7fa68669183c3df15b3b5d77f0e
                                                    • Instruction Fuzzy Hash: 26215172B051159F9705DE6DE8808BAFBFAFBD9225324C06EE909C7341EA32D806C760
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.3415457107.000000000164D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0164D000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_164d000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 3ffd9a5284b0a81ccc683b2a439635ee84d7c9761e8e57e29f8cfc554b666ed5
                                                    • Instruction ID: 2afad6a80d4035e408444f2fbe65cb769cb185e1447a7589451e5ebb1534fe54
                                                    • Opcode Fuzzy Hash: 3ffd9a5284b0a81ccc683b2a439635ee84d7c9761e8e57e29f8cfc554b666ed5
                                                    • Instruction Fuzzy Hash: 36213471A04204DFDB11DF94DDC0B26BBA1EB94B14F24C56DD9094B382C37AD447CA62
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.3415755283.0000000001720000.00000040.00000800.00020000.00000000.sdmp, Offset: 01720000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_1720000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 06d41965db10b0b2835375f954287213beccf62dce267b99f3b76af3173b7b55
                                                    • Instruction ID: f9f3a97407ee42d48752a32a9116bae6a79021cc93feed122361dfdde2aa21a9
                                                    • Opcode Fuzzy Hash: 06d41965db10b0b2835375f954287213beccf62dce267b99f3b76af3173b7b55
                                                    • Instruction Fuzzy Hash: DD214A70E012199FDB14EFB8D8546AEFBB2FB88704F1084ADD9149B354DB798A42CF50
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.3415755283.0000000001720000.00000040.00000800.00020000.00000000.sdmp, Offset: 01720000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_1720000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 62e5fc2094dc3a21398cc867964fa3b33f0f42be017f13af81a09bc68ff4a2f4
                                                    • Instruction ID: 52daff872178d004084108f5f075473cb056546ba8b602ba7ef634ca488cf337
                                                    • Opcode Fuzzy Hash: 62e5fc2094dc3a21398cc867964fa3b33f0f42be017f13af81a09bc68ff4a2f4
                                                    • Instruction Fuzzy Hash: DF118B36700214CFC714CB69E994E56BBE6FF88721F1584AAE20ACB771CA71EC46CB11
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.3415755283.0000000001720000.00000040.00000800.00020000.00000000.sdmp, Offset: 01720000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_1720000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: f9320b4b7c58ab0d2057a4160758f41399873473d69aed3926fc8daf8f5eed0c
                                                    • Instruction ID: 697b703aa7244d4c7b08a2541b4cca9d80937275963e7ac0b67b7067212d2dcb
                                                    • Opcode Fuzzy Hash: f9320b4b7c58ab0d2057a4160758f41399873473d69aed3926fc8daf8f5eed0c
                                                    • Instruction Fuzzy Hash: 99211274D0525A8FCB11EFA8C8945EEBFF0FF4A310F0451AAD905B7225EB305A85CBA1
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.3415755283.0000000001720000.00000040.00000800.00020000.00000000.sdmp, Offset: 01720000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_1720000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 59724b0dfcb9901dd7b30cdd2a2f0fb9fac2aa11d6f4b7e30fc40336c866ef31
                                                    • Instruction ID: f92c0ba3b9a2db6a08209614ea49b4f55a885543f650cfaeb206487e0501f972
                                                    • Opcode Fuzzy Hash: 59724b0dfcb9901dd7b30cdd2a2f0fb9fac2aa11d6f4b7e30fc40336c866ef31
                                                    • Instruction Fuzzy Hash: 541125307053608FCB25AB79D858969BFE5AF9A34171844BAD501CB795DE35DC02CBA0
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.3415755283.0000000001720000.00000040.00000800.00020000.00000000.sdmp, Offset: 01720000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_1720000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: d0e9d3abfc52132de88a24de619cc98d6697f1bec8cd82bab7ebc57ff6c937c2
                                                    • Instruction ID: 67b74684d0f0baf24a6ae5817e8449b3352a3972a16e6bfdc53e836c2f5668bb
                                                    • Opcode Fuzzy Hash: d0e9d3abfc52132de88a24de619cc98d6697f1bec8cd82bab7ebc57ff6c937c2
                                                    • Instruction Fuzzy Hash: 15115A31E003299BDB21EFB9D4846AFFFF6AB98250B154179C509E3204EB319D02CBA1
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.3415755283.0000000001720000.00000040.00000800.00020000.00000000.sdmp, Offset: 01720000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_1720000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 4a660637556ca4c0fe80a876fa753c66f9f8e3724ba5272ff41003f45915d626
                                                    • Instruction ID: 1b96315d52c15c9f42c69a07f10ff478f925468d083e0684c6fc11d8e2b0e0f7
                                                    • Opcode Fuzzy Hash: 4a660637556ca4c0fe80a876fa753c66f9f8e3724ba5272ff41003f45915d626
                                                    • Instruction Fuzzy Hash: 2A012832B092514FEB219B79888457EB7F7AFC8620715447AD406CB265FF30CC018751
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.3415457107.000000000164D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0164D000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_164d000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: e5dafeece261ed5f36609df0c38f61fd31d97a5851a4554c05f514f158599941
                                                    • Instruction ID: 31117d51537ec4984d3cbcbe2cd0afb46b36afb8902d0d7cf5c6742a42cc2dc4
                                                    • Opcode Fuzzy Hash: e5dafeece261ed5f36609df0c38f61fd31d97a5851a4554c05f514f158599941
                                                    • Instruction Fuzzy Hash: E111B875904284CFCB12CF58D9C0B15BBA2FB84718F28C6AAD8494B756C33AD44ACB62
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.3415755283.0000000001720000.00000040.00000800.00020000.00000000.sdmp, Offset: 01720000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_1720000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 55de7ddb2405b89c71f9c3017045756f62f3be101cc81df19c5297a1dd5cd0d0
                                                    • Instruction ID: 7f0913fdc9c76249ce7c0fdee804e2700858d688accc20fcefa911679f23ecbe
                                                    • Opcode Fuzzy Hash: 55de7ddb2405b89c71f9c3017045756f62f3be101cc81df19c5297a1dd5cd0d0
                                                    • Instruction Fuzzy Hash: 0601D632B052154BDB24AB79484453FB6EBAFC8560710443DD90AC7215FF71CC014790
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.3415755283.0000000001720000.00000040.00000800.00020000.00000000.sdmp, Offset: 01720000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_1720000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: c928835810e7015d71394fb72ff240971fc4185383ab160ceed71c75e3ecb091
                                                    • Instruction ID: 0fa8ae203deffb7a0432d6e96ede0aabb4ddbe6e21910ada5b6905fd59f19c69
                                                    • Opcode Fuzzy Hash: c928835810e7015d71394fb72ff240971fc4185383ab160ceed71c75e3ecb091
                                                    • Instruction Fuzzy Hash: FD0124367082108FCB265FB4E80855D7BE2EB86221319846BE04ACB252CF34C816C795
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.3415755283.0000000001720000.00000040.00000800.00020000.00000000.sdmp, Offset: 01720000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_1720000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 534896c381e69ec3eca4859858a8e42ac7f9ffa1ea8b799786e24575f09f9f5d
                                                    • Instruction ID: 5a3c9d0b62c82c3d213a716be27a7444c78f06b048b7cc33dd787be040138fbc
                                                    • Opcode Fuzzy Hash: 534896c381e69ec3eca4859858a8e42ac7f9ffa1ea8b799786e24575f09f9f5d
                                                    • Instruction Fuzzy Hash: 5B015E31E00319DFDF14AFB9E8589AE7BB5FF88250B008539F916D3240EB308A118BA1
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.3415755283.0000000001720000.00000040.00000800.00020000.00000000.sdmp, Offset: 01720000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_1720000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 72db519678edf974abbdb015cc4af0364f3c91731ddca8408fa381910452b0c9
                                                    • Instruction ID: 4dff37d6bc7d139dabfce12775d7b2db51f8bc86100962f46fa0e68a12a9e235
                                                    • Opcode Fuzzy Hash: 72db519678edf974abbdb015cc4af0364f3c91731ddca8408fa381910452b0c9
                                                    • Instruction Fuzzy Hash: CD017C317002148FD714CB2AD998E26F7E6FF88721F55846DE20A8B761CB71EC46CB11
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.3415755283.0000000001720000.00000040.00000800.00020000.00000000.sdmp, Offset: 01720000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_1720000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 3c7486ba90e1bc0a04edf0eadbf65ee7a9f581d4aacf65d2cbd47f83163514d8
                                                    • Instruction ID: 034efbca31c752d20614c1f67fc89f35678d3758ec79786406ab8b7ce30c8e7d
                                                    • Opcode Fuzzy Hash: 3c7486ba90e1bc0a04edf0eadbf65ee7a9f581d4aacf65d2cbd47f83163514d8
                                                    • Instruction Fuzzy Hash: 4D015E32900219DFCF10EFA8E8889AEBBB1FF88310B108529FC59D7204E7305A21CF91
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.3415755283.0000000001720000.00000040.00000800.00020000.00000000.sdmp, Offset: 01720000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_1720000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 686a5016f735325e82a0b91bd3016e228493842b093278666138e652446a20ff
                                                    • Instruction ID: b788cca2650e8221a3f19d27114cb4241f2808e0e7ca6e5e26fab7589c572569
                                                    • Opcode Fuzzy Hash: 686a5016f735325e82a0b91bd3016e228493842b093278666138e652446a20ff
                                                    • Instruction Fuzzy Hash: B4F02B32B046208FCB169B6DE45855EBBF5DFD522072900AFD408DB351CE31D802C750
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.3415755283.0000000001720000.00000040.00000800.00020000.00000000.sdmp, Offset: 01720000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_1720000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: df16930f2f17a1094f6b21f94d1f5392e8f7fa8477132ad0f527c34caf45d152
                                                    • Instruction ID: 0faa98d056975637eb27ac40358a38b7de3b6cc1d027f5ed25f4f9372eff4ed0
                                                    • Opcode Fuzzy Hash: df16930f2f17a1094f6b21f94d1f5392e8f7fa8477132ad0f527c34caf45d152
                                                    • Instruction Fuzzy Hash: 1DF0C272B011569FCB01DE7C98405BABFFAEBD8214324C16FE459C7381DA30DC0687A0
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.3415755283.0000000001720000.00000040.00000800.00020000.00000000.sdmp, Offset: 01720000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_1720000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 8891bc933487d91af699470b0cea8b2a2b0b64f104cfd9c75e923ea1fc5a65b8
                                                    • Instruction ID: 844597771457e7ec6093e4bbacb598d43d3da6c95e16f76370b836a4d8ed9c15
                                                    • Opcode Fuzzy Hash: 8891bc933487d91af699470b0cea8b2a2b0b64f104cfd9c75e923ea1fc5a65b8
                                                    • Instruction Fuzzy Hash: 59F06D729001199F8B50DFADD8809AEBBF2FF9C250704452AE609D3210D630A6128BA0
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.3415755283.0000000001720000.00000040.00000800.00020000.00000000.sdmp, Offset: 01720000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_1720000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 382c3adf04d56c54add18495fefd8333ec2f29af038797c6ab216bde4ebcc510
                                                    • Instruction ID: 4af54e9e1016ab214e792fb30e973199ccd66b225d469e547eb7919ddcc1d8b6
                                                    • Opcode Fuzzy Hash: 382c3adf04d56c54add18495fefd8333ec2f29af038797c6ab216bde4ebcc510
                                                    • Instruction Fuzzy Hash: D5F03A35300115DFC7019F6AD888C5ABBEAFF897247508169EA0987331CB71AC52CB50
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.3415755283.0000000001720000.00000040.00000800.00020000.00000000.sdmp, Offset: 01720000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_1720000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: cfc356c98cb074ac2fba0d0213badbd0838dd28de3bf8d679681a3dac31f74c4
                                                    • Instruction ID: aeaa093bd3eda81dbf809451e79d1bef6ab2bcdc774a4d9fd82f8674dcb37b68
                                                    • Opcode Fuzzy Hash: cfc356c98cb074ac2fba0d0213badbd0838dd28de3bf8d679681a3dac31f74c4
                                                    • Instruction Fuzzy Hash: 2DE0AE794213529FD33A6BA4ACAC27A7BB1EB0B3237447D01E00BC2029DB744465CB40
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.3415755283.0000000001720000.00000040.00000800.00020000.00000000.sdmp, Offset: 01720000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_1720000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 09e5c9f1e8c4d416bae67b4ed2ae394833520cff4c2b8678ee8dd2b7f13f43d8
                                                    • Instruction ID: e3d6afbe0173994eacac4aeba8ca44ee7cafa49f68e95c4606c16f074c34c183
                                                    • Opcode Fuzzy Hash: 09e5c9f1e8c4d416bae67b4ed2ae394833520cff4c2b8678ee8dd2b7f13f43d8
                                                    • Instruction Fuzzy Hash: 1AE002790623168BD7393B64BCAC23E7A65EB0B313B407D00A11FC10299B7144648B95
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.3415755283.0000000001720000.00000040.00000800.00020000.00000000.sdmp, Offset: 01720000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_1720000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: b87fa2bec908ab7d5f903040fd46dfcf19850a30046b72eeff5837577138f0ab
                                                    • Instruction ID: 9ac3d886d90f023eddff1122d37f1937656c0d4c0e4fdbf6653098d1622410ae
                                                    • Opcode Fuzzy Hash: b87fa2bec908ab7d5f903040fd46dfcf19850a30046b72eeff5837577138f0ab
                                                    • Instruction Fuzzy Hash: 62E02631D512268FCB02EBA0EC405EDBB34AEC12107884253D0243B560EB30272DCB91
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.3415755283.0000000001720000.00000040.00000800.00020000.00000000.sdmp, Offset: 01720000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_1720000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 43d06ab3aaf20f1ace19a956732f3e4b2ea47baac67fe353f1b7ca798368d29e
                                                    • Instruction ID: 2b78b2b191f2a85c5a08beb852e25268db20db237915be6cd8853eb7b48ad859
                                                    • Opcode Fuzzy Hash: 43d06ab3aaf20f1ace19a956732f3e4b2ea47baac67fe353f1b7ca798368d29e
                                                    • Instruction Fuzzy Hash: 3CE08C35B011369F8720A6ACD688D68BB91EF683507288076EA01C7624EA71D8418BD0
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.3415755283.0000000001720000.00000040.00000800.00020000.00000000.sdmp, Offset: 01720000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_1720000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: b3dce284e9d081b9a6d5f435c7a542cf2dcf3a1f894fa8dd49ca695085c8a493
                                                    • Instruction ID: 9e33b1754078abffef56331e4db53bd9e954f9767aac81f327011c2b344f89b3
                                                    • Opcode Fuzzy Hash: b3dce284e9d081b9a6d5f435c7a542cf2dcf3a1f894fa8dd49ca695085c8a493
                                                    • Instruction Fuzzy Hash: 6DE08C3A2112508FC7119BA4E869D5977B1AF4A22031A40DAE009DF3B3CA34ED10CB81
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.3415755283.0000000001720000.00000040.00000800.00020000.00000000.sdmp, Offset: 01720000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_1720000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 533902f670c61e00c6584a90f941ec458dee84bc713e944a8be361d3e8c6985e
                                                    • Instruction ID: 76d11c61ae604af78a2df147a7dd9ff603c47e304809cef8dd32cb21c2aae4f9
                                                    • Opcode Fuzzy Hash: 533902f670c61e00c6584a90f941ec458dee84bc713e944a8be361d3e8c6985e
                                                    • Instruction Fuzzy Hash: 16D05B31D2126B57CB00E7A5DC044EFF738EED5661B544626D51437140FB702659C7E1
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.3415755283.0000000001720000.00000040.00000800.00020000.00000000.sdmp, Offset: 01720000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_1720000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: e15b32a990f77704ff6d9bf65fbc0fb039239f1d513455ab69e74e5c0482b231
                                                    • Instruction ID: 9245e5976fcee311be2e6e91a460e49561537bf9299bb667f6c9560a3e697e32
                                                    • Opcode Fuzzy Hash: e15b32a990f77704ff6d9bf65fbc0fb039239f1d513455ab69e74e5c0482b231
                                                    • Instruction Fuzzy Hash: 7DD0C737300324A74B153A49B408CAE7B5ED7CD771704C026F905C3304CE759D1297E5
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.3415755283.0000000001720000.00000040.00000800.00020000.00000000.sdmp, Offset: 01720000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_1720000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 0d8acaa16506b5d36c94ef49575efa251587fbe140d4a377435002f81b9c5773
                                                    • Instruction ID: e8e4385e1ade1631ca62bc82ce3d494a4efb31d23e3ff216b8cf76d13097fe71
                                                    • Opcode Fuzzy Hash: 0d8acaa16506b5d36c94ef49575efa251587fbe140d4a377435002f81b9c5773
                                                    • Instruction Fuzzy Hash: 11E02D78E44209CFCF10DFA9E5444ADFBB9FB49711B10946AE92AA7210D7389A12CF15
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.3415755283.0000000001720000.00000040.00000800.00020000.00000000.sdmp, Offset: 01720000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_1720000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 4c3ffe475a67ac74b2df26c46e34a541d842b36fdf84092f426f375a7aaeb79c
                                                    • Instruction ID: 088cfedd9660cf1d68272b13d6b5380421b9d11e26ea91278b44e019aca3fec0
                                                    • Opcode Fuzzy Hash: 4c3ffe475a67ac74b2df26c46e34a541d842b36fdf84092f426f375a7aaeb79c
                                                    • Instruction Fuzzy Hash: 8ED0673AB00008DFCB149F99E8449DDB7B6FB98221B048116F926A3260CA31A925DB60
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.3415755283.0000000001720000.00000040.00000800.00020000.00000000.sdmp, Offset: 01720000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_1720000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: ec3a849397244beb573a2c1ed74d94d98630dd104df215eb7fcfa1129a679905
                                                    • Instruction ID: 913ac6145902a2d27e91cbe057cf2b9814b1e5b210aac4015e56e6b38141c2db
                                                    • Opcode Fuzzy Hash: ec3a849397244beb573a2c1ed74d94d98630dd104df215eb7fcfa1129a679905
                                                    • Instruction Fuzzy Hash: 8FD0A9353403288FC314AB68E468C6A73A9EF4863070180A5E90ACB372CF72EC00CBC1
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.3415755283.0000000001720000.00000040.00000800.00020000.00000000.sdmp, Offset: 01720000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_1720000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: caca84e1167d5db970fb76f1f649890c0ad059066533d93c90c6264b51ba9104
                                                    • Instruction ID: 5bbf7a0e667021915d7fd4e833a67ce7b4383250a49d40f5ec55b31140fa1993
                                                    • Opcode Fuzzy Hash: caca84e1167d5db970fb76f1f649890c0ad059066533d93c90c6264b51ba9104
                                                    • Instruction Fuzzy Hash: 5BC04C764993A28FCF13576455551A07BF4A94B336305D0D3D494CA567D7284847CB23
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.3415755283.0000000001720000.00000040.00000800.00020000.00000000.sdmp, Offset: 01720000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_1720000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 4157f9d77bad90fd7e7243467c1dc6425f4b06988907f8bbb20f731ade96ddc1
                                                    • Instruction ID: a3c7517038a91537157398b91cab0ee54f6cdec7899737429912a72751e403cb
                                                    • Opcode Fuzzy Hash: 4157f9d77bad90fd7e7243467c1dc6425f4b06988907f8bbb20f731ade96ddc1
                                                    • Instruction Fuzzy Hash: 43C1A074E00218CFDB54DFA9D954BADBBB2AF88300F2090A9D809AB355DB359E81CF51
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.3415755283.0000000001720000.00000040.00000800.00020000.00000000.sdmp, Offset: 01720000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_1720000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 50f8ca64b810fc21f8eba7a90c12d3ccf20d1cbb8bd8b42f66b3b9a34dae07d7
                                                    • Instruction ID: c08e1e80dcacf9d259129bff0443c4b3a8745198f2feb236875418f8bd4b0a23
                                                    • Opcode Fuzzy Hash: 50f8ca64b810fc21f8eba7a90c12d3ccf20d1cbb8bd8b42f66b3b9a34dae07d7
                                                    • Instruction Fuzzy Hash: 5CC1A174E00218CFDB54DFA9D954BADBBB2BF88300F1090A9D409AB355DB359E81CF51
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.3415755283.0000000001720000.00000040.00000800.00020000.00000000.sdmp, Offset: 01720000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_1720000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: ef4327386e4ff7f7cd6cf45b600c44a2fac1c24f75d94328aedb7bc4ae04921a
                                                    • Instruction ID: ee569023fa64c2248eea2ef5468b939561d6d3c75573aea7ef1a38a0b745e79a
                                                    • Opcode Fuzzy Hash: ef4327386e4ff7f7cd6cf45b600c44a2fac1c24f75d94328aedb7bc4ae04921a
                                                    • Instruction Fuzzy Hash: 1DC1A074E00218CFDB54DFA9D954BADBBB2EF89300F2090A9D809AB355DB359E81CF51
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.3415755283.0000000001720000.00000040.00000800.00020000.00000000.sdmp, Offset: 01720000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_1720000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 436d974f39045f3e3a12ec6ec6d0f3803405c115bf329388671c6a3244d80cc2
                                                    • Instruction ID: 40d6be9b7b3d4dc6e1adce5bf78bbf486ad10cdfc5167a51f996bbc952fe70da
                                                    • Opcode Fuzzy Hash: 436d974f39045f3e3a12ec6ec6d0f3803405c115bf329388671c6a3244d80cc2
                                                    • Instruction Fuzzy Hash: EBC1AF74E00218CFDB54DFA9D954BADBBB2EF89300F2090A9D909AB355DB359E81CF11
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.3415755283.0000000001720000.00000040.00000800.00020000.00000000.sdmp, Offset: 01720000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_1720000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: e1fb979676ba52d1e7a92ad36d547dde3e94deb8007ea5c6a790d0d4999a1f79
                                                    • Instruction ID: fc03a8ecdb8f385c1c6a5c2908cb65b4201e6fe83cd96568b77012628139fe2d
                                                    • Opcode Fuzzy Hash: e1fb979676ba52d1e7a92ad36d547dde3e94deb8007ea5c6a790d0d4999a1f79
                                                    • Instruction Fuzzy Hash: 2DC1B174E00218CFDB54DFA9D954BADBBB2EF88300F2090A9D819AB355DB359E81CF11
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.3415755283.0000000001720000.00000040.00000800.00020000.00000000.sdmp, Offset: 01720000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_1720000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 9bbbd14d4343e3194d90f31adfe9facbfe0d5b7ac70f6103ec3e068c2960f9f7
                                                    • Instruction ID: 6ea43e8d6e4a1e69a9d0dbc8976ec66f4de690c0d02dcab384ac5f4495d3f80c
                                                    • Opcode Fuzzy Hash: 9bbbd14d4343e3194d90f31adfe9facbfe0d5b7ac70f6103ec3e068c2960f9f7
                                                    • Instruction Fuzzy Hash: 06915E75E00259CFDB14CFA9C584A9DFBF2BF89301F158169D855AB3A2DB30E942CB50
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.3415755283.0000000001720000.00000040.00000800.00020000.00000000.sdmp, Offset: 01720000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_1720000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: e5c044301e4aaa08c0aa4eac1574a505a1244e716b83af7694917f20b4ea8df5
                                                    • Instruction ID: 5b0b4fdd01afa8ba41e0cef60f3e718f0db4b39fd3b4634b437a4066afee767d
                                                    • Opcode Fuzzy Hash: e5c044301e4aaa08c0aa4eac1574a505a1244e716b83af7694917f20b4ea8df5
                                                    • Instruction Fuzzy Hash: A841F770D01248CBEB18CFEAD9547AEFBF2AF89300F24D12AC414AB295EB345946CF44
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.3415755283.0000000001720000.00000040.00000800.00020000.00000000.sdmp, Offset: 01720000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_1720000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: e7eb6a71e46f31ee988ac4a557f2c55817b33616f0d323ada95d2ebc4102e48c
                                                    • Instruction ID: 69b10d3bce8dc5c5b4d06641343ae37671caffd5e75cd743ae67521368822c42
                                                    • Opcode Fuzzy Hash: e7eb6a71e46f31ee988ac4a557f2c55817b33616f0d323ada95d2ebc4102e48c
                                                    • Instruction Fuzzy Hash: 1D41F970E012498BEB18CFA6D8507AEFBF2AF89300F24D129C414AB255DB344942CF54
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.3415755283.0000000001720000.00000040.00000800.00020000.00000000.sdmp, Offset: 01720000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_1720000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: a453d3e3a448042fbbe0702be890d2c19d8c4579d8dc7b5bc279b1336cd13783
                                                    • Instruction ID: ed27c61333f503adddd32e9d90646b8cb0ed642b704f4bd901fe8422f1ce82aa
                                                    • Opcode Fuzzy Hash: a453d3e3a448042fbbe0702be890d2c19d8c4579d8dc7b5bc279b1336cd13783
                                                    • Instruction Fuzzy Hash: 5141F870E052588FEB18CFBAD9546AEFBF2AF89300F24D129C418AB295DB345946CF10
                                                    Memory Dump Source
                                                    • Source File: 00000002.00000002.3415755283.0000000001720000.00000040.00000800.00020000.00000000.sdmp, Offset: 01720000, based on PE: false
                                                    Joe Sandbox IDA Plugin
                                                    • Snapshot File: hcaresult_2_2_1720000_RegAsm.jbxd
                                                    Similarity
                                                    • API ID:
                                                    • String ID:
                                                    • API String ID:
                                                    • Opcode ID: 8c2c2cf1e6e5d5d24047e4378defdd1c60a4f64fa78c37f89daf9c4816f256b9
                                                    • Instruction ID: bf39bbcc82f46e9ea6ffd81f4480644be809d5b0ab6f715b047705b7c1c4411d
                                                    • Opcode Fuzzy Hash: 8c2c2cf1e6e5d5d24047e4378defdd1c60a4f64fa78c37f89daf9c4816f256b9
                                                    • Instruction Fuzzy Hash: 4F41F870D052588FEB18DFAAD9506EEFBF2AF89300F24D12AC424AB295DB344942CF50