Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
WZ6RvDzQeq.exe

Overview

General Information

Sample name:WZ6RvDzQeq.exe
Analysis ID:1591112
MD5:d63f0d4ccf6dceeb0db924ce75a83251
SHA1:3f0c5c70dd0d4e1a9052a2c6ce00da187b403566
SHA256:25e947b199af51b580a7bc98e1ecea3dfdb1bac24403757a8e832adfb52f6738
Infos:

Detection

Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
AI detected suspicious sample
Found many strings related to Crypto-Wallets (likely being stolen)
Found potential dummy code loops (likely to delay analysis)
Machine Learning detection for sample
Queries memory information (via WMI often done to detect virtual machines)
Queries sensitive Plug and Play Device Information (via WMI, Win32_PnPEntity, often done to detect virtual machines)
Queries sensitive disk information (via WMI, Win32_DiskDrive, often done to detect virtual machines)
Queries sensitive physical memory information (via WMI, Win32_PhysicalMemory, often done to detect virtual machines)
Tries to harvest and steal Bitcoin Wallet information
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains functionality for execution timing, often used to detect debuggers
Contains long sleeps (>= 3 min)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Potential time zone aware malware
Program does not show much activity (idle)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Yara detected Credential Stealer

Classification

  • System is w10x64native
  • WZ6RvDzQeq.exe (PID: 2084 cmdline: "C:\Users\user\Desktop\WZ6RvDzQeq.exe" MD5: D63F0D4CCF6DCEEB0DB924CE75A83251)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000000.00000002.18000596484.0000000002D7F000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    Process Memory Space: WZ6RvDzQeq.exe PID: 2084JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      No Sigma rule has matched
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2025-01-14T17:56:52.804853+010020355951Domain Observed Used for C2 Detected92.255.57.15556001192.168.11.2049758TCP

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: WZ6RvDzQeq.exeAvira: detected
      Source: WZ6RvDzQeq.exeVirustotal: Detection: 55%Perma Link
      Source: WZ6RvDzQeq.exeReversingLabs: Detection: 52%
      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
      Source: WZ6RvDzQeq.exeJoe Sandbox ML: detected
      Source: WZ6RvDzQeq.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
      Source: WZ6RvDzQeq.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

      Networking

      barindex
      Source: Network trafficSuricata IDS: 2035595 - Severity 1 - ET MALWARE Generic AsyncRAT Style SSL Cert : 92.255.57.155:56001 -> 192.168.11.20:49758
      Source: global trafficTCP traffic: 192.168.11.20:49758 -> 92.255.57.155:56001
      Source: Joe Sandbox ViewIP Address: 92.255.57.155 92.255.57.155
      Source: Joe Sandbox ViewIP Address: 92.255.57.155 92.255.57.155
      Source: Joe Sandbox ViewASN Name: TELSPRU TELSPRU
      Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.155
      Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.155
      Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.155
      Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.155
      Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.155
      Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.155
      Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.155
      Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.155
      Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.155
      Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.155
      Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.155
      Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.155
      Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.155
      Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.155
      Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.155
      Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.155
      Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.155
      Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.155
      Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.155
      Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.155
      Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.155
      Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.155
      Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.155
      Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.155
      Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.155
      Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.155
      Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.155
      Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.155
      Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.155
      Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.155
      Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.155
      Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.155
      Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.155
      Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.155
      Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.155
      Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.155
      Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.155
      Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.155
      Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.155
      Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.155
      Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.155
      Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.155
      Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.155
      Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.155
      Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.155
      Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.155
      Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.155
      Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.155
      Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.155
      Source: unknownTCP traffic detected without corresponding DNS query: 92.255.57.155
      Source: WZ6RvDzQeq.exe, 00000000.00000002.18005688059.0000000005560000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
      Source: WZ6RvDzQeq.exe, 00000000.00000002.18005688059.0000000005560000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
      Source: WZ6RvDzQeq.exe, 00000000.00000002.17998975929.0000000000D4D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en
      Source: WZ6RvDzQeq.exe, 00000000.00000002.17998975929.0000000000D9D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
      Source: WZ6RvDzQeq.exe, 00000000.00000002.18000596484.0000000002D7F000.00000004.00000800.00020000.00000000.sdmp, WZ6RvDzQeq.exe, 00000000.00000002.18000596484.000000000323E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
      Source: WZ6RvDzQeq.exe, 00000000.00000002.18005688059.0000000005560000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.quovadis.bm0
      Source: WZ6RvDzQeq.exe, 00000000.00000002.18000596484.0000000002D7F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/DFfe9ewf/test3/raw/refs/heads/main/WebDriver.dll
      Source: WZ6RvDzQeq.exe, 00000000.00000002.18000596484.0000000002D7F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/DFfe9ewf/test3/raw/refs/heads/main/chromedriver.exe
      Source: WZ6RvDzQeq.exe, 00000000.00000002.18000596484.0000000002D7F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/DFfe9ewf/test3/raw/refs/heads/main/msedgedriver.exe
      Source: WZ6RvDzQeq.exe, 00000000.00000002.18005688059.0000000005560000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ocsp.quovadisoffshore.com0
      Source: WZ6RvDzQeq.exe, 00000000.00000002.18000596484.0000000002D7F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/11564914/23354;
      Source: WZ6RvDzQeq.exe, 00000000.00000002.18000596484.0000000002D7F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/14436606/23354
      Source: WZ6RvDzQeq.exe, 00000000.00000002.18000596484.0000000002D7F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://stackoverflow.com/q/2152978/23354rCannot
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeCode function: 0_2_02D3469D0_2_02D3469D
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeCode function: 0_2_02D347E50_2_02D347E5
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeCode function: 0_2_02D348A00_2_02D348A0
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeCode function: 0_2_02D31C1F0_2_02D31C1F
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeCode function: 0_2_02D31C300_2_02D31C30
      Source: WZ6RvDzQeq.exe, 00000000.00000002.18000596484.0000000002D51000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamePutsblg.dll" vs WZ6RvDzQeq.exe
      Source: WZ6RvDzQeq.exe, 00000000.00000002.17998975929.0000000000CDE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs WZ6RvDzQeq.exe
      Source: WZ6RvDzQeq.exe, 00000000.00000002.18003238917.0000000003E17000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenamePutsblg.dll" vs WZ6RvDzQeq.exe
      Source: WZ6RvDzQeq.exe, 00000000.00000002.18004515214.00000000052C0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenamePutsblg.dll" vs WZ6RvDzQeq.exe
      Source: WZ6RvDzQeq.exe, 00000000.00000000.15539935795.00000000007BC000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameFzewje.exe" vs WZ6RvDzQeq.exe
      Source: WZ6RvDzQeq.exeBinary or memory string: OriginalFilenameFzewje.exe" vs WZ6RvDzQeq.exe
      Source: WZ6RvDzQeq.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
      Source: WZ6RvDzQeq.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: classification engineClassification label: mal100.spyw.evad.winEXE@1/0@0/1
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeMutant created: NULL
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeMutant created: \Sessions\1\BaseNamedObjects\ba5217eadeaf
      Source: WZ6RvDzQeq.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: WZ6RvDzQeq.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: WZ6RvDzQeq.exeVirustotal: Detection: 55%
      Source: WZ6RvDzQeq.exeReversingLabs: Detection: 52%
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeSection loaded: mscoree.dllJump to behavior
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeSection loaded: version.dllJump to behavior
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeSection loaded: edgegdi.dllJump to behavior
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeSection loaded: cryptsp.dllJump to behavior
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeSection loaded: rsaenh.dllJump to behavior
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeSection loaded: cryptbase.dllJump to behavior
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeSection loaded: amsi.dllJump to behavior
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeSection loaded: gpapi.dllJump to behavior
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeSection loaded: msasn1.dllJump to behavior
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeSection loaded: mswsock.dllJump to behavior
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeSection loaded: secur32.dllJump to behavior
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeSection loaded: schannel.dllJump to behavior
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeSection loaded: mskeyprotect.dllJump to behavior
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeSection loaded: ntasn1.dllJump to behavior
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeSection loaded: ncrypt.dllJump to behavior
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeSection loaded: ncryptsslp.dllJump to behavior
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeSection loaded: wbemcomn.dllJump to behavior
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
      Source: WZ6RvDzQeq.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
      Source: WZ6RvDzQeq.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Source: WZ6RvDzQeq.exeStatic PE information: 0xCAFB9F6F [Tue Nov 30 08:53:03 2077 UTC]
      Source: WZ6RvDzQeq.exeStatic PE information: section name: .text entropy: 7.872285671131451
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

      Malware Analysis System Evasion

      barindex
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_PhysicalMemory
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PnPEntity WHERE (PNPClass = 'Image' OR PNPClass = 'Camera')
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_DiskDrive
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_PhysicalMemory
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeMemory allocated: 2B50000 memory reserve | memory write watchJump to behavior
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeMemory allocated: 2D50000 memory reserve | memory write watchJump to behavior
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeMemory allocated: 2B50000 memory reserve | memory write watchJump to behavior
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeCode function: 0_2_02D34589 rdtsc 0_2_02D34589
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeWindow / User API: threadDelayed 9945Jump to behavior
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exe TID: 3704Thread sleep time: -922337203685477s >= -30000sJump to behavior
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exe TID: 3704Thread sleep time: -33000s >= -30000sJump to behavior
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exe TID: 4276Thread sleep count: 9945 > 30Jump to behavior
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exe TID: 3704Thread sleep time: -32875s >= -30000sJump to behavior
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exe TID: 3704Thread sleep time: -32766s >= -30000sJump to behavior
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exe TID: 3704Thread sleep time: -32656s >= -30000sJump to behavior
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exe TID: 3704Thread sleep time: -32547s >= -30000sJump to behavior
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exe TID: 3704Thread sleep time: -32438s >= -30000sJump to behavior
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exe TID: 3704Thread sleep time: -32313s >= -30000sJump to behavior
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exe TID: 3704Thread sleep time: -32203s >= -30000sJump to behavior
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exe TID: 3704Thread sleep time: -32094s >= -30000sJump to behavior
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exe TID: 3704Thread sleep time: -31969s >= -30000sJump to behavior
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exe TID: 3704Thread sleep time: -31860s >= -30000sJump to behavior
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exe TID: 3704Thread sleep time: -31735s >= -30000sJump to behavior
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeSystem information queried: CurrentTimeZoneInformationJump to behavior
      Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeThread delayed: delay time: 33000Jump to behavior
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeThread delayed: delay time: 32875Jump to behavior
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeThread delayed: delay time: 32766Jump to behavior
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeThread delayed: delay time: 32656Jump to behavior
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeThread delayed: delay time: 32547Jump to behavior
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeThread delayed: delay time: 32438Jump to behavior
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeThread delayed: delay time: 32313Jump to behavior
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeThread delayed: delay time: 32203Jump to behavior
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeThread delayed: delay time: 32094Jump to behavior
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeThread delayed: delay time: 31969Jump to behavior
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeThread delayed: delay time: 31860Jump to behavior
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeThread delayed: delay time: 31735Jump to behavior
      Source: WZ6RvDzQeq.exe, 00000000.00000002.17998975929.0000000000D9D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dlliig

      Anti Debugging

      barindex
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeProcess Stats: CPU usage > 5% for more than 60s
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeCode function: 0_2_02D34589 rdtsc 0_2_02D34589
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeProcess token adjusted: DebugJump to behavior
      Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeMemory allocated: page read and write | page guardJump to behavior
      Source: WZ6RvDzQeq.exe, 00000000.00000002.18000596484.000000000320A000.00000004.00000800.00020000.00000000.sdmp, WZ6RvDzQeq.exe, 00000000.00000002.18000596484.00000000031B8000.00000004.00000800.00020000.00000000.sdmp, WZ6RvDzQeq.exe, 00000000.00000002.18000596484.00000000030FA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
      Source: WZ6RvDzQeq.exe, 00000000.00000002.18000596484.000000000320A000.00000004.00000800.00020000.00000000.sdmp, WZ6RvDzQeq.exe, 00000000.00000002.18000596484.000000000307F000.00000004.00000800.00020000.00000000.sdmp, WZ6RvDzQeq.exe, 00000000.00000002.18007085145.00000000072FD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager*
      Source: WZ6RvDzQeq.exe, 00000000.00000002.18000596484.00000000030FA000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Managerh{
      Source: WZ6RvDzQeq.exe, 00000000.00000002.18000596484.000000000320A000.00000004.00000800.00020000.00000000.sdmp, WZ6RvDzQeq.exe, 00000000.00000002.18000596484.00000000031B8000.00000004.00000800.00020000.00000000.sdmp, WZ6RvDzQeq.exe, 00000000.00000002.18000596484.0000000003146000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerTe
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeQueries volume information: C:\Users\user\Desktop\WZ6RvDzQeq.exe VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.dll VolumeInformationJump to behavior
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : SELECT * FROM AntiVirusProduct

      Stealing of Sensitive Information

      barindex
      Source: WZ6RvDzQeq.exe, 00000000.00000002.18005688059.000000000557F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: \??\C:\Users\user\AppData\Roaming\Electrum\wallets
      Source: WZ6RvDzQeq.exe, 00000000.00000002.18000596484.000000000307F000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: q com.liberty.jaxx
      Source: WZ6RvDzQeq.exe, 00000000.00000002.17998975929.0000000000D4D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: \??\C:\Users\user\AppData\Roaming\Exodus\exodus.wallet*
      Source: WZ6RvDzQeq.exe, 00000000.00000002.18005688059.000000000557F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: \??\C:\Users\user\AppData\Roaming\Ethereum\keystore
      Source: WZ6RvDzQeq.exe, 00000000.00000002.17998975929.0000000000D4D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: \??\C:\Users\user\AppData\Roaming\Exodus\exodus.wallet*
      Source: WZ6RvDzQeq.exe, 00000000.00000002.18005688059.000000000557F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: \??\C:\Users\user\AppData\Roaming\Ethereum\keystore
      Source: WZ6RvDzQeq.exe, 00000000.00000002.18005688059.000000000557F000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: \??\C:\Users\user\AppData\Roaming\Ethereum\keystore
      Source: C:\Users\user\Desktop\WZ6RvDzQeq.exeKey opened: HKEY_CURRENT_USER\Software\Bitcoin\Bitcoin-QtJump to behavior
      Source: Yara matchFile source: 00000000.00000002.18000596484.0000000002D7F000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: Process Memory Space: WZ6RvDzQeq.exe PID: 2084, type: MEMORYSTR
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid Accounts321
      Windows Management Instrumentation
      1
      DLL Side-Loading
      1
      Process Injection
      1
      Disable or Modify Tools
      OS Credential Dumping1
      System Time Discovery
      Remote Services1
      Archive Collected Data
      1
      Encrypted Channel
      Exfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
      DLL Side-Loading
      442
      Virtualization/Sandbox Evasion
      LSASS Memory531
      Security Software Discovery
      Remote Desktop Protocol1
      Data from Local System
      1
      Non-Standard Port
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
      Process Injection
      Security Account Manager1
      Process Discovery
      SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
      Obfuscated Files or Information
      NTDS442
      Virtualization/Sandbox Evasion
      Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
      Software Packing
      LSA Secrets1
      Application Window Discovery
      SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
      Timestomp
      Cached Domain Credentials213
      System Information Discovery
      VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
      DLL Side-Loading
      DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      WZ6RvDzQeq.exe56%VirustotalBrowse
      WZ6RvDzQeq.exe53%ReversingLabsByteCode-MSIL.Trojan.Jalapeno
      WZ6RvDzQeq.exe100%AviraHEUR/AGEN.1323341
      WZ6RvDzQeq.exe100%Joe Sandbox ML
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      No contacted domains info
      NameSourceMaliciousAntivirus DetectionReputation
      http://www.quovadis.bm0WZ6RvDzQeq.exe, 00000000.00000002.18005688059.0000000005560000.00000004.00000020.00020000.00000000.sdmpfalse
        high
        https://stackoverflow.com/q/14436606/23354WZ6RvDzQeq.exe, 00000000.00000002.18000596484.0000000002D7F000.00000004.00000800.00020000.00000000.sdmpfalse
          high
          https://ocsp.quovadisoffshore.com0WZ6RvDzQeq.exe, 00000000.00000002.18005688059.0000000005560000.00000004.00000020.00020000.00000000.sdmpfalse
            high
            https://github.com/DFfe9ewf/test3/raw/refs/heads/main/WebDriver.dllWZ6RvDzQeq.exe, 00000000.00000002.18000596484.0000000002D7F000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameWZ6RvDzQeq.exe, 00000000.00000002.18000596484.0000000002D7F000.00000004.00000800.00020000.00000000.sdmp, WZ6RvDzQeq.exe, 00000000.00000002.18000596484.000000000323E000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                https://stackoverflow.com/q/2152978/23354rCannotWZ6RvDzQeq.exe, 00000000.00000002.18000596484.0000000002D7F000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  https://stackoverflow.com/q/11564914/23354;WZ6RvDzQeq.exe, 00000000.00000002.18000596484.0000000002D7F000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    https://github.com/DFfe9ewf/test3/raw/refs/heads/main/chromedriver.exeWZ6RvDzQeq.exe, 00000000.00000002.18000596484.0000000002D7F000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      https://github.com/DFfe9ewf/test3/raw/refs/heads/main/msedgedriver.exeWZ6RvDzQeq.exe, 00000000.00000002.18000596484.0000000002D7F000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        • No. of IPs < 25%
                        • 25% < No. of IPs < 50%
                        • 50% < No. of IPs < 75%
                        • 75% < No. of IPs
                        IPDomainCountryFlagASNASN NameMalicious
                        92.255.57.155
                        unknownRussian Federation
                        42253TELSPRUtrue
                        Joe Sandbox version:42.0.0 Malachite
                        Analysis ID:1591112
                        Start date and time:2025-01-14 17:54:40 +01:00
                        Joe Sandbox product:CloudBasic
                        Overall analysis duration:0h 8m 15s
                        Hypervisor based Inspection enabled:false
                        Report type:full
                        Cookbook file name:default.jbs
                        Analysis system description:Windows 10 64 bit 20H2 Native physical Machine for testing VM-aware malware (Office 2019, Chrome 128, Firefox 91, Adobe Reader DC 21, Java 8 Update 301
                        Run name:Suspected VM Detection
                        Number of analysed new started processes analysed:2
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • HCA enabled
                        • EGA enabled
                        • AMSI enabled
                        Analysis Mode:default
                        Sample name:WZ6RvDzQeq.exe
                        Detection:MAL
                        Classification:mal100.spyw.evad.winEXE@1/0@0/1
                        EGA Information:Failed
                        HCA Information:
                        • Successful, ratio: 100%
                        • Number of executed functions: 16
                        • Number of non-executed functions: 6
                        Cookbook Comments:
                        • Found application associated with file extension: .exe
                        • Override analysis time to 240000 for current running targets taking high CPU consumption
                        • Exclude process from analysis (whitelisted): dllhost.exe
                        • Execution Graph export aborted for target WZ6RvDzQeq.exe, PID 2084 because it is empty
                        • Report size getting too big, too many NtOpenFile calls found.
                        • Report size getting too big, too many NtOpenKeyEx calls found.
                        • Report size getting too big, too many NtQueryValueKey calls found.
                        • Report size getting too big, too many NtReadVirtualMemory calls found.
                        TimeTypeDescription
                        11:56:51API Interceptor13282212x Sleep call for process: WZ6RvDzQeq.exe modified
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        92.255.57.155http://92.255.57.155/1/1.pngGet hashmaliciousUnknownBrowse
                        • 92.255.57.155/1/1.png
                        anyrunsample.ps1Get hashmaliciousUnknownBrowse
                        • 92.255.57.155/1/1.png
                        https://reviewgustereports.com/Get hashmaliciousCAPTCHA Scam ClickFix, XWormBrowse
                        • 92.255.57.155/1/1.png
                        No context
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        TELSPRU2.ps1Get hashmaliciousUnknownBrowse
                        • 92.255.57.155
                        2.ps1Get hashmaliciousUnknownBrowse
                        • 92.255.57.155
                        92.255.57_1.112.ps1Get hashmaliciousXWormBrowse
                        • 92.255.57.112
                        book_lumm2.dat.exeGet hashmaliciousXWormBrowse
                        • 92.255.57.112
                        http://92.255.57.155/1/1.pngGet hashmaliciousUnknownBrowse
                        • 92.255.57.155
                        92.255.57.155.ps1Get hashmaliciousXWormBrowse
                        • 92.255.57.155
                        png2obj1_XClient.exeGet hashmaliciousXWormBrowse
                        • 92.255.57.155
                        Dm35sdidf3.exeGet hashmaliciousXWormBrowse
                        • 92.255.57.155
                        No context
                        No context
                        No created / dropped files found
                        File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                        Entropy (8bit):7.856791476993461
                        TrID:
                        • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                        • Win32 Executable (generic) a (10002005/4) 49.78%
                        • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                        • Generic Win/DOS Executable (2004/3) 0.01%
                        • DOS Executable Generic (2002/1) 0.01%
                        File name:WZ6RvDzQeq.exe
                        File size:365'568 bytes
                        MD5:d63f0d4ccf6dceeb0db924ce75a83251
                        SHA1:3f0c5c70dd0d4e1a9052a2c6ce00da187b403566
                        SHA256:25e947b199af51b580a7bc98e1ecea3dfdb1bac24403757a8e832adfb52f6738
                        SHA512:a9846ee5541e2a140a541b5d78af9476c2d9606a581d2eb0109b1ceb75abcb244e8b4c0f32facfff5f5e568e7b27b4cad9bccf26f3ba8720ebb58cb4cc0ef064
                        SSDEEP:6144:rygIsrPEg1pEZS8pV07t854csHTE1WJvYSM3D5To6wUXZRC2L/mdsIsfyEaJaa:W21uZS8pq71cCJvCm6nXLFLO2qaa
                        TLSH:9C74021077CF8321E1284AB688E7686613F5D3072E73C7577A4692C11EE33C69B96B8D
                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...o.................0.............~.... ........@.. ....................................@................................
                        Icon Hash:90cececece8e8eb0
                        Entrypoint:0x45a97e
                        Entrypoint Section:.text
                        Digitally signed:false
                        Imagebase:0x400000
                        Subsystem:windows gui
                        Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                        DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                        Time Stamp:0xCAFB9F6F [Tue Nov 30 08:53:03 2077 UTC]
                        TLS Callbacks:
                        CLR (.Net) Version:
                        OS Version Major:4
                        OS Version Minor:0
                        File Version Major:4
                        File Version Minor:0
                        Subsystem Version Major:4
                        Subsystem Version Minor:0
                        Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                        Instruction
                        jmp dword ptr [00402000h]
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        add byte ptr [eax], al
                        NameVirtual AddressVirtual Size Is in Section
                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IMPORT0x5a9300x4b.text
                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x5c0000x560.rsrc
                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x5e0000xc.reloc
                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                        .text0x20000x589840x58a00d2ca19ae7178665eadbda2dac9b663f4False0.9205196579689704data7.872285671131451IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        .rsrc0x5c0000x5600x600d73e5769a0afb2d9a9a3c1152abe6084False0.4016927083333333data3.9326269831708895IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .reloc0x5e0000xc0x20093e2d3f363bbc8046e2c6cbf9530b91eFalse0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                        NameRVASizeTypeLanguageCountryZLIB Complexity
                        RT_VERSION0x5c0a00x2d4data0.43370165745856354
                        RT_MANIFEST0x5c3740x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                        DLLImport
                        mscoree.dll_CorExeMain
                        TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                        2025-01-14T17:56:52.804853+01002035595ET MALWARE Generic AsyncRAT Style SSL Cert192.255.57.15556001192.168.11.2049758TCP
                        TimestampSource PortDest PortSource IPDest IP
                        Jan 14, 2025 17:56:51.849020958 CET4975856001192.168.11.2092.255.57.155
                        Jan 14, 2025 17:56:52.082362890 CET560014975892.255.57.155192.168.11.20
                        Jan 14, 2025 17:56:52.082539082 CET4975856001192.168.11.2092.255.57.155
                        Jan 14, 2025 17:56:52.083579063 CET4975856001192.168.11.2092.255.57.155
                        Jan 14, 2025 17:56:52.316586971 CET560014975892.255.57.155192.168.11.20
                        Jan 14, 2025 17:56:52.316714048 CET4975856001192.168.11.2092.255.57.155
                        Jan 14, 2025 17:56:52.556423903 CET560014975892.255.57.155192.168.11.20
                        Jan 14, 2025 17:56:52.556557894 CET560014975892.255.57.155192.168.11.20
                        Jan 14, 2025 17:56:52.556761026 CET4975856001192.168.11.2092.255.57.155
                        Jan 14, 2025 17:56:52.570533037 CET4975856001192.168.11.2092.255.57.155
                        Jan 14, 2025 17:56:52.804852962 CET560014975892.255.57.155192.168.11.20
                        Jan 14, 2025 17:56:52.854824066 CET4975856001192.168.11.2092.255.57.155
                        Jan 14, 2025 17:56:54.283312082 CET4975856001192.168.11.2092.255.57.155
                        Jan 14, 2025 17:56:54.568799019 CET560014975892.255.57.155192.168.11.20
                        Jan 14, 2025 17:56:54.568991899 CET4975856001192.168.11.2092.255.57.155
                        Jan 14, 2025 17:56:54.848220110 CET560014975892.255.57.155192.168.11.20
                        Jan 14, 2025 17:57:15.309118986 CET560014975892.255.57.155192.168.11.20
                        Jan 14, 2025 17:57:15.350003958 CET4975856001192.168.11.2092.255.57.155
                        Jan 14, 2025 17:57:15.583373070 CET560014975892.255.57.155192.168.11.20
                        Jan 14, 2025 17:57:15.631120920 CET4975856001192.168.11.2092.255.57.155
                        Jan 14, 2025 17:57:25.833779097 CET4975856001192.168.11.2092.255.57.155
                        Jan 14, 2025 17:57:26.113456964 CET560014975892.255.57.155192.168.11.20
                        Jan 14, 2025 17:57:26.113668919 CET4975856001192.168.11.2092.255.57.155
                        Jan 14, 2025 17:57:26.347662926 CET560014975892.255.57.155192.168.11.20
                        Jan 14, 2025 17:57:26.394449949 CET4975856001192.168.11.2092.255.57.155
                        Jan 14, 2025 17:57:26.627814054 CET560014975892.255.57.155192.168.11.20
                        Jan 14, 2025 17:57:26.633359909 CET4975856001192.168.11.2092.255.57.155
                        Jan 14, 2025 17:57:26.920375109 CET560014975892.255.57.155192.168.11.20
                        Jan 14, 2025 17:57:26.920576096 CET4975856001192.168.11.2092.255.57.155
                        Jan 14, 2025 17:57:27.201646090 CET560014975892.255.57.155192.168.11.20
                        Jan 14, 2025 17:57:38.320220947 CET560014975892.255.57.155192.168.11.20
                        Jan 14, 2025 17:57:38.376188993 CET4975856001192.168.11.2092.255.57.155
                        Jan 14, 2025 17:57:38.610364914 CET560014975892.255.57.155192.168.11.20
                        Jan 14, 2025 17:57:38.657295942 CET4975856001192.168.11.2092.255.57.155
                        Jan 14, 2025 17:57:58.840792894 CET4975856001192.168.11.2092.255.57.155
                        Jan 14, 2025 17:57:59.116759062 CET560014975892.255.57.155192.168.11.20
                        Jan 14, 2025 17:57:59.116971970 CET4975856001192.168.11.2092.255.57.155
                        Jan 14, 2025 17:57:59.350339890 CET560014975892.255.57.155192.168.11.20
                        Jan 14, 2025 17:57:59.402750015 CET4975856001192.168.11.2092.255.57.155
                        Jan 14, 2025 17:57:59.635885000 CET560014975892.255.57.155192.168.11.20
                        Jan 14, 2025 17:57:59.637610912 CET4975856001192.168.11.2092.255.57.155
                        Jan 14, 2025 17:57:59.923686981 CET560014975892.255.57.155192.168.11.20
                        Jan 14, 2025 17:57:59.923912048 CET4975856001192.168.11.2092.255.57.155
                        Jan 14, 2025 17:58:00.200330973 CET560014975892.255.57.155192.168.11.20
                        Jan 14, 2025 17:58:01.331717014 CET560014975892.255.57.155192.168.11.20
                        Jan 14, 2025 17:58:01.386909008 CET4975856001192.168.11.2092.255.57.155
                        Jan 14, 2025 17:58:01.620390892 CET560014975892.255.57.155192.168.11.20
                        Jan 14, 2025 17:58:01.667932034 CET4975856001192.168.11.2092.255.57.155
                        Jan 14, 2025 17:58:31.843808889 CET4975856001192.168.11.2092.255.57.155
                        Jan 14, 2025 17:58:32.120848894 CET560014975892.255.57.155192.168.11.20
                        Jan 14, 2025 17:58:32.121047974 CET4975856001192.168.11.2092.255.57.155
                        Jan 14, 2025 17:58:32.354345083 CET560014975892.255.57.155192.168.11.20
                        Jan 14, 2025 17:58:32.395538092 CET4975856001192.168.11.2092.255.57.155
                        Jan 14, 2025 17:58:32.635607004 CET560014975892.255.57.155192.168.11.20
                        Jan 14, 2025 17:58:32.637285948 CET4975856001192.168.11.2092.255.57.155
                        Jan 14, 2025 17:58:32.913991928 CET560014975892.255.57.155192.168.11.20
                        Jan 14, 2025 17:58:32.914128065 CET4975856001192.168.11.2092.255.57.155
                        Jan 14, 2025 17:58:33.189059019 CET560014975892.255.57.155192.168.11.20
                        Jan 14, 2025 17:59:04.854506969 CET4975856001192.168.11.2092.255.57.155
                        Jan 14, 2025 17:59:05.138462067 CET560014975892.255.57.155192.168.11.20
                        Jan 14, 2025 17:59:05.138596058 CET4975856001192.168.11.2092.255.57.155
                        Jan 14, 2025 17:59:05.372198105 CET560014975892.255.57.155192.168.11.20
                        Jan 14, 2025 17:59:05.419562101 CET4975856001192.168.11.2092.255.57.155
                        Jan 14, 2025 17:59:05.652785063 CET560014975892.255.57.155192.168.11.20
                        Jan 14, 2025 17:59:05.654802084 CET4975856001192.168.11.2092.255.57.155
                        Jan 14, 2025 17:59:05.929833889 CET560014975892.255.57.155192.168.11.20
                        Jan 14, 2025 17:59:05.929979086 CET4975856001192.168.11.2092.255.57.155
                        Jan 14, 2025 17:59:06.211208105 CET560014975892.255.57.155192.168.11.20
                        Jan 14, 2025 17:59:37.865052938 CET4975856001192.168.11.2092.255.57.155
                        Jan 14, 2025 17:59:38.142647982 CET560014975892.255.57.155192.168.11.20
                        Jan 14, 2025 17:59:38.142802954 CET4975856001192.168.11.2092.255.57.155
                        Jan 14, 2025 17:59:38.376672029 CET560014975892.255.57.155192.168.11.20
                        Jan 14, 2025 17:59:38.428006887 CET4975856001192.168.11.2092.255.57.155
                        Jan 14, 2025 17:59:38.661217928 CET560014975892.255.57.155192.168.11.20
                        Jan 14, 2025 17:59:38.665175915 CET4975856001192.168.11.2092.255.57.155
                        Jan 14, 2025 17:59:38.951673031 CET560014975892.255.57.155192.168.11.20
                        Jan 14, 2025 17:59:38.951843023 CET4975856001192.168.11.2092.255.57.155
                        Jan 14, 2025 17:59:39.226263046 CET560014975892.255.57.155192.168.11.20
                        Jan 14, 2025 18:00:03.064182043 CET4975856001192.168.11.2092.255.57.155
                        Jan 14, 2025 18:00:03.341628075 CET560014975892.255.57.155192.168.11.20
                        Jan 14, 2025 18:00:03.341856003 CET4975856001192.168.11.2092.255.57.155
                        Jan 14, 2025 18:00:03.575596094 CET560014975892.255.57.155192.168.11.20
                        Jan 14, 2025 18:00:03.625632048 CET4975856001192.168.11.2092.255.57.155
                        Jan 14, 2025 18:00:03.858916044 CET560014975892.255.57.155192.168.11.20
                        Jan 14, 2025 18:00:03.860342979 CET4975856001192.168.11.2092.255.57.155
                        Jan 14, 2025 18:00:04.143266916 CET560014975892.255.57.155192.168.11.20
                        Jan 14, 2025 18:00:04.143431902 CET4975856001192.168.11.2092.255.57.155
                        Jan 14, 2025 18:00:04.425740004 CET560014975892.255.57.155192.168.11.20
                        Jan 14, 2025 18:00:36.071046114 CET4975856001192.168.11.2092.255.57.155
                        Jan 14, 2025 18:00:36.346498013 CET560014975892.255.57.155192.168.11.20
                        Jan 14, 2025 18:00:36.346649885 CET4975856001192.168.11.2092.255.57.155
                        Jan 14, 2025 18:00:36.579754114 CET560014975892.255.57.155192.168.11.20
                        Jan 14, 2025 18:00:36.633989096 CET4975856001192.168.11.2092.255.57.155
                        Jan 14, 2025 18:00:36.867266893 CET560014975892.255.57.155192.168.11.20
                        Jan 14, 2025 18:00:36.870126009 CET4975856001192.168.11.2092.255.57.155
                        Jan 14, 2025 18:00:37.154436111 CET560014975892.255.57.155192.168.11.20
                        Jan 14, 2025 18:00:37.154649019 CET4975856001192.168.11.2092.255.57.155
                        Jan 14, 2025 18:00:37.435682058 CET560014975892.255.57.155192.168.11.20
                        Jan 14, 2025 18:00:53.174429893 CET4975856001192.168.11.2092.255.57.155
                        Jan 14, 2025 18:00:53.457833052 CET560014975892.255.57.155192.168.11.20
                        Jan 14, 2025 18:00:53.457981110 CET4975856001192.168.11.2092.255.57.155
                        Jan 14, 2025 18:00:53.691591978 CET560014975892.255.57.155192.168.11.20
                        Jan 14, 2025 18:00:53.739648104 CET4975856001192.168.11.2092.255.57.155
                        Jan 14, 2025 18:00:53.972924948 CET560014975892.255.57.155192.168.11.20
                        Jan 14, 2025 18:00:53.973535061 CET4975856001192.168.11.2092.255.57.155
                        Jan 14, 2025 18:00:54.249327898 CET560014975892.255.57.155192.168.11.20
                        Jan 14, 2025 18:00:54.249500036 CET4975856001192.168.11.2092.255.57.155
                        Jan 14, 2025 18:00:54.525280952 CET560014975892.255.57.155192.168.11.20
                        Jan 14, 2025 18:01:26.170380116 CET4975856001192.168.11.2092.255.57.155
                        Jan 14, 2025 18:01:26.446623087 CET560014975892.255.57.155192.168.11.20
                        Jan 14, 2025 18:01:26.446796894 CET4975856001192.168.11.2092.255.57.155
                        Jan 14, 2025 18:01:26.680833101 CET560014975892.255.57.155192.168.11.20
                        Jan 14, 2025 18:01:26.732472897 CET4975856001192.168.11.2092.255.57.155
                        Jan 14, 2025 18:01:26.966114044 CET560014975892.255.57.155192.168.11.20
                        Jan 14, 2025 18:01:26.966819048 CET4975856001192.168.11.2092.255.57.155
                        Jan 14, 2025 18:01:27.254079103 CET560014975892.255.57.155192.168.11.20
                        Jan 14, 2025 18:01:27.254268885 CET4975856001192.168.11.2092.255.57.155
                        Jan 14, 2025 18:01:27.535067081 CET560014975892.255.57.155192.168.11.20

                        Click to jump to process

                        Click to jump to process

                        Click to dive into process behavior distribution

                        Target ID:0
                        Start time:11:56:45
                        Start date:14/01/2025
                        Path:C:\Users\user\Desktop\WZ6RvDzQeq.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Users\user\Desktop\WZ6RvDzQeq.exe"
                        Imagebase:0x760000
                        File size:365'568 bytes
                        MD5 hash:D63F0D4CCF6DCEEB0DB924CE75A83251
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.18000596484.0000000002D7F000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                        Reputation:low
                        Has exited:false

                        Reset < >
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.18000541539.0000000002D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D30000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_2d30000_WZ6RvDzQeq.jbxd
                          Similarity
                          • API ID:
                          • String ID: Teq$Teq$Teq$Teq
                          • API String ID: 0-3690903476
                          • Opcode ID: ae3c302c08020bb951a9896fec4296938750e114f8533192950e6be7dc763883
                          • Instruction ID: 00a7eb448c9f98adb542cdc18b2693b4ace3da699a33d16ae620312161037295
                          • Opcode Fuzzy Hash: ae3c302c08020bb951a9896fec4296938750e114f8533192950e6be7dc763883
                          • Instruction Fuzzy Hash: 50515A74B042158FCB05DF78D498A6DBBF2BF89300F2544A9E44ADB3A5CA70DC02CB61
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.18000541539.0000000002D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D30000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_2d30000_WZ6RvDzQeq.jbxd
                          Similarity
                          • API ID:
                          • String ID: Teq$Teq$Teq$Teq
                          • API String ID: 0-3690903476
                          • Opcode ID: 29385d7e1b178a2ea188cdd2126e6f3d3bba39123b3589f92bf04a7d0e9f4fc6
                          • Instruction ID: f207555c89877c76d6c9e5f9347429fbf567d8e275ff35057deb2b3fbb10f9c3
                          • Opcode Fuzzy Hash: 29385d7e1b178a2ea188cdd2126e6f3d3bba39123b3589f92bf04a7d0e9f4fc6
                          • Instruction Fuzzy Hash: 43513874B001158FDB45DF69D498AADB7F2BF8C300F254469E54ADB3A4CA70DC02CB61
                          Memory Dump Source
                          • Source File: 00000000.00000002.18000541539.0000000002D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D30000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_2d30000_WZ6RvDzQeq.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 6b52b5a4b073ae075cbd090e3beac4a4b1b271b08cab047cbc41026cba247cc9
                          • Instruction ID: 9a8e35350e14b78d6069c6bf221a6008210982c5c557d28d673a682b8aa5e5b8
                          • Opcode Fuzzy Hash: 6b52b5a4b073ae075cbd090e3beac4a4b1b271b08cab047cbc41026cba247cc9
                          • Instruction Fuzzy Hash: FEC1CD75A003009FD716DF29D498B9ABBF2FF89310F1585A9D802AB365DB31EC46CB90
                          Memory Dump Source
                          • Source File: 00000000.00000002.18000541539.0000000002D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D30000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_2d30000_WZ6RvDzQeq.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: e42a040746c925c65f71550c2669d486db59a780c2286cc6c196ca1b6504f430
                          • Instruction ID: 1a3c1431cedfaa00546d843cc20100a026a59d56146bdf1896510fc26ebdcad0
                          • Opcode Fuzzy Hash: e42a040746c925c65f71550c2669d486db59a780c2286cc6c196ca1b6504f430
                          • Instruction Fuzzy Hash: C511E335700241AFC307EB39E858B2B7BE5EFC9650B1541A9E905CF39AEB60DC00CB90
                          Memory Dump Source
                          • Source File: 00000000.00000002.18000541539.0000000002D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D30000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_2d30000_WZ6RvDzQeq.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 66cc5b3a3a3f968cb185fa1658c5cf1bca43033a6bc3799e1cbf120a2065031e
                          • Instruction ID: 31a73cb446144d181b3f8fbbd2974b95edc4de7580d1343456d78adb45902edb
                          • Opcode Fuzzy Hash: 66cc5b3a3a3f968cb185fa1658c5cf1bca43033a6bc3799e1cbf120a2065031e
                          • Instruction Fuzzy Hash: E611A135700201AFD356EB29E998F2B77E6EFC8690B558169E909CB355EF70EC01CB90
                          Memory Dump Source
                          • Source File: 00000000.00000002.17999977357.00000000011FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 011FD000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_11fd000_WZ6RvDzQeq.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 229a5a69cae6dd09e7475501ab47eca9d4c235d1e028e715cdcf10eb60582556
                          • Instruction ID: 2fec44ae34047893a04a2fa9a2a08a5630922b08ce09065d7ad8e02697abd391
                          • Opcode Fuzzy Hash: 229a5a69cae6dd09e7475501ab47eca9d4c235d1e028e715cdcf10eb60582556
                          • Instruction Fuzzy Hash: 3001F7724043409BFB244A99DCC0776BF98EF81270F14801EEE4C0E283C3389840CAB2
                          Memory Dump Source
                          • Source File: 00000000.00000002.17999977357.00000000011FD000.00000040.00000800.00020000.00000000.sdmp, Offset: 011FD000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_11fd000_WZ6RvDzQeq.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 578094ba9f1fe2a71eb27412f3d63a659f72f2810b680dd82bf974e5ca70d09b
                          • Instruction ID: da9d83cd86745314f7fdfc2fe1aabf7f49a7faf130626d72bf1bf7ba0b9526aa
                          • Opcode Fuzzy Hash: 578094ba9f1fe2a71eb27412f3d63a659f72f2810b680dd82bf974e5ca70d09b
                          • Instruction Fuzzy Hash: 65F0CD72405344AEEB218A0ADCC4B62FF98EB81734F18C05EEE0C0F283C3789844CAB1
                          Memory Dump Source
                          • Source File: 00000000.00000002.18000541539.0000000002D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D30000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_2d30000_WZ6RvDzQeq.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 37b3be34b508519e93f9f601104b881a2a9a231065476944461f8b97a8cb4a8d
                          • Instruction ID: 4d819719b6cbb1908f6a200516ebe57a6f606be688ad8b8ef45a4888efe15107
                          • Opcode Fuzzy Hash: 37b3be34b508519e93f9f601104b881a2a9a231065476944461f8b97a8cb4a8d
                          • Instruction Fuzzy Hash: 9AF08160908643CBD30BAB35D014296BBE1BF92315F19C66AC59E5B646DA35DC02C702
                          Memory Dump Source
                          • Source File: 00000000.00000002.18000541539.0000000002D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D30000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_2d30000_WZ6RvDzQeq.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 25498eb8b0082e76255930790d2fb5853cd3f1bd3a20e0ce8ba9b057e77ee91f
                          • Instruction ID: 6d43babb1c8ba0c5b772fbe94b2b2e9d63052941186ba47479c45f53712feeec
                          • Opcode Fuzzy Hash: 25498eb8b0082e76255930790d2fb5853cd3f1bd3a20e0ce8ba9b057e77ee91f
                          • Instruction Fuzzy Hash: BAE0DF70905309EFCB02EFB0E90486DBBBAEB05209B100199D905CB341EA305E00DBC1
                          Memory Dump Source
                          • Source File: 00000000.00000002.18000541539.0000000002D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D30000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_2d30000_WZ6RvDzQeq.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 4b854b8f488438b11237c86eadd6562553d79b9ef56d44493062733c4f354523
                          • Instruction ID: f50414d141243b862dc202b94b8f98720b79197a6e96310f1138414d2bd61234
                          • Opcode Fuzzy Hash: 4b854b8f488438b11237c86eadd6562553d79b9ef56d44493062733c4f354523
                          • Instruction Fuzzy Hash: 7BE08C30900309EFCB06EFB0EA0896CB7B6FB08205B100199D909DB340EB305E00DBC1
                          Memory Dump Source
                          • Source File: 00000000.00000002.18000541539.0000000002D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D30000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_2d30000_WZ6RvDzQeq.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 619a9ae16db2f11ea9dbd6909f79d20d59fd42b57bbbc064188daf9090bfea38
                          • Instruction ID: 5f73a22230edadfe4998f95736baebaffa5ef4892059e066c8c502da90743459
                          • Opcode Fuzzy Hash: 619a9ae16db2f11ea9dbd6909f79d20d59fd42b57bbbc064188daf9090bfea38
                          • Instruction Fuzzy Hash: C1D0A774A04A06C6D7067F26D504359F7D9BFA1312F49C63AC98EA2344EB30DC41C701
                          Memory Dump Source
                          • Source File: 00000000.00000002.18000541539.0000000002D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D30000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_2d30000_WZ6RvDzQeq.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 7c51cb15eaadb523707788a9a259f329027ea053e781eced5aff9cda1b01cbda
                          • Instruction ID: 09e88bc8b8bf07c82d01e6b7e1addf54a1c73cb85466404a5c2569feea06a871
                          • Opcode Fuzzy Hash: 7c51cb15eaadb523707788a9a259f329027ea053e781eced5aff9cda1b01cbda
                          • Instruction Fuzzy Hash: D0D0127109E7D45FC34307B064154913FB89D0321934A00C6D048CE063D65D081AC767
                          Memory Dump Source
                          • Source File: 00000000.00000002.18000541539.0000000002D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D30000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_2d30000_WZ6RvDzQeq.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 343b20dc68d5a56c9c5ff8d5a56851a5dedbd5b981eea8419af6d3d94556f015
                          • Instruction ID: 1e829709ae7d4bc46546f36775e17be8a52d7548f0e5839a3d80c8bd3a5e0236
                          • Opcode Fuzzy Hash: 343b20dc68d5a56c9c5ff8d5a56851a5dedbd5b981eea8419af6d3d94556f015
                          • Instruction Fuzzy Hash: 47C01239980302AFDB1646B470890943B72A9652243420696E0048515AD73508A68B00
                          Memory Dump Source
                          • Source File: 00000000.00000002.18000541539.0000000002D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D30000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_2d30000_WZ6RvDzQeq.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: ad4e43d3cddb9bbb5065666386fc6f0411a45c66a897e7c629d73bddf7d9d4a2
                          • Instruction ID: 871752682e0d23106224a6d7c983b4f6e95895f21b0b408e180085cf1e85a61e
                          • Opcode Fuzzy Hash: ad4e43d3cddb9bbb5065666386fc6f0411a45c66a897e7c629d73bddf7d9d4a2
                          • Instruction Fuzzy Hash: 82C08C38A00104ABCF076BD0E8188ECBAF3FF88340F00011AFA0272390CA22AD50CB11
                          Memory Dump Source
                          • Source File: 00000000.00000002.18000541539.0000000002D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D30000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_2d30000_WZ6RvDzQeq.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 6dd9913665a73b169165466d4c1cb88ec9571760d774390fadb80624900df7a0
                          • Instruction ID: 921a8490fc37d79205d48b8af33907f12b2aa6034f8a7e44238b082e4f36fb8a
                          • Opcode Fuzzy Hash: 6dd9913665a73b169165466d4c1cb88ec9571760d774390fadb80624900df7a0
                          • Instruction Fuzzy Hash: 07C04CA195F3D45FCB435730142D4443F701D6320431941CFC2818D0ABC445815AD356
                          Memory Dump Source
                          • Source File: 00000000.00000002.18000541539.0000000002D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D30000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_2d30000_WZ6RvDzQeq.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 04588a8996ba5413dd6b0f4267be440c6694246e7a136c0135a6da670ddc7d75
                          • Instruction ID: 822a61add2c3866e9c877a6244f8ad6e657845bf14b921ac51cfaa6686030e0e
                          • Opcode Fuzzy Hash: 04588a8996ba5413dd6b0f4267be440c6694246e7a136c0135a6da670ddc7d75
                          • Instruction Fuzzy Hash: 34900271144A0C9B85512795750D955779C95447157C00151A50D555066A55642046A6
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.18000541539.0000000002D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D30000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_2d30000_WZ6RvDzQeq.jbxd
                          Similarity
                          • API ID:
                          • String ID: 4'q$4'q
                          • API String ID: 0-1467158625
                          • Opcode ID: 5fff1b89fd1bba14e6f90c36a886dad7a4198bc1b1ca0ca274fc718d3e3255e1
                          • Instruction ID: df0d0aca37b72f2ed3b30b78df4fe86405f6c8c5e53f3ea203e05b094b1afa47
                          • Opcode Fuzzy Hash: 5fff1b89fd1bba14e6f90c36a886dad7a4198bc1b1ca0ca274fc718d3e3255e1
                          • Instruction Fuzzy Hash: FE515A76E107448FE71AEF7AF85578ABBE3BBD8244F04C129C1089B369EB355806CB50
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.18000541539.0000000002D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D30000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_2d30000_WZ6RvDzQeq.jbxd
                          Similarity
                          • API ID:
                          • String ID: 4'q$4'q
                          • API String ID: 0-1467158625
                          • Opcode ID: 4486534fce11c1137a1e83db74c36ae4ea4991ec6e1c08e7e1c4c22c7f7c2ad2
                          • Instruction ID: 31f0342654b947a643f2291376f649ee980f20d00b28c4dbfd916b38cfee7f4a
                          • Opcode Fuzzy Hash: 4486534fce11c1137a1e83db74c36ae4ea4991ec6e1c08e7e1c4c22c7f7c2ad2
                          • Instruction Fuzzy Hash: 1E514775E107448FE71AEF7AF85578ABBE3BBD8244F04C12AC1089B369EB355806CB51
                          Memory Dump Source
                          • Source File: 00000000.00000002.18000541539.0000000002D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D30000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_2d30000_WZ6RvDzQeq.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: b28471773b61233ae6623bc08d12df8a61b4294afe3cdf8dfe5cad11f34f78d9
                          • Instruction ID: b10f03b37aeaf513df4cb9086c272c7e675fdfe0c8954962fb8e9a6ab24bef8f
                          • Opcode Fuzzy Hash: b28471773b61233ae6623bc08d12df8a61b4294afe3cdf8dfe5cad11f34f78d9
                          • Instruction Fuzzy Hash: B0B15C71A0165ACFDB02CF68C8952EEFBB1FF49314F5885A9C455EB201D738994ACF90
                          Memory Dump Source
                          • Source File: 00000000.00000002.18000541539.0000000002D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D30000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_2d30000_WZ6RvDzQeq.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: a4117ecf7fad0ca740a44d80a9e91c8f8805257696728a988486114572aaff54
                          • Instruction ID: db891673bffb771ff3d1895ded4e57b8132d652ad871e8ffcface647c8ac411a
                          • Opcode Fuzzy Hash: a4117ecf7fad0ca740a44d80a9e91c8f8805257696728a988486114572aaff54
                          • Instruction Fuzzy Hash: 5FB15A71E045298FDB15CBA8C8806AEFBF1FB48304F588669D465E7306D778ED42CB94
                          Memory Dump Source
                          • Source File: 00000000.00000002.18000541539.0000000002D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D30000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_2d30000_WZ6RvDzQeq.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: a140730c20bf7c744d50e0aa40e1076998d203ddad92a5c3dc50f55bdc2d532e
                          • Instruction ID: d0c544c1a1aac00312d735db0d31e2eb76243b00e35d0cdb0c47e5f2418d24dc
                          • Opcode Fuzzy Hash: a140730c20bf7c744d50e0aa40e1076998d203ddad92a5c3dc50f55bdc2d532e
                          • Instruction Fuzzy Hash: C4515E71546682DFE7134F34C1AA1D6FFB1EE87224B9958D9C8828F502C72A489FDF90
                          Memory Dump Source
                          • Source File: 00000000.00000002.18000541539.0000000002D30000.00000040.00000800.00020000.00000000.sdmp, Offset: 02D30000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_2d30000_WZ6RvDzQeq.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 5e04c0976d52b73d41607b7e50cafc2b2f8a7a613054039bfa351c14f251e8c3
                          • Instruction ID: a8d93e5097032d78cac569784210c71bbea2e81e3c3fbd27242e3ab027e01b33
                          • Opcode Fuzzy Hash: 5e04c0976d52b73d41607b7e50cafc2b2f8a7a613054039bfa351c14f251e8c3
                          • Instruction Fuzzy Hash: 2D41E332916782DBE7034F20C5AA192FFB0FF53260B5459EAC8829F141C729598EDF85