Edit tour

Windows Analysis Report
MAdjnpU2Xp.exe

Overview

General Information

Sample name:MAdjnpU2Xp.exe
renamed because original name is a hash value
Original sample name:157a3f7a20b22e78c4d3f7ea88538ff7.exe
Analysis ID:1628657
MD5:157a3f7a20b22e78c4d3f7ea88538ff7
SHA1:5289f49becfab4122f62ac5dc5f4ed4a6430d1e3
SHA256:0ffd5b54317e01a658684577fee5d5c5f53d5b2e105e7cf8c1cdfd9bd8fee780
Tags:AsyncRATexeRATuser-abuse_ch
Infos:

Detection

AsyncRAT
Score:100
Range:0 - 100
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected AsyncRAT
.NET source code references suspicious native API functions
Allocates memory in foreign processes
Injects a PE file into a foreign processes
Joe Sandbox ML detected suspicious sample
Sample uses string decryption to hide its real strings
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Writes to foreign memory regions
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Yara signature match

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • MAdjnpU2Xp.exe (PID: 6104 cmdline: "C:\Users\user\Desktop\MAdjnpU2Xp.exe" MD5: 157A3F7A20B22E78C4D3F7EA88538FF7)
    • RegAsm.exe (PID: 6660 cmdline: #system32 MD5: 0D5DF43AF2916F47D00C1573797C1A13)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
AsyncRATAsyncRAT is a Remote Access Tool (RAT) designed to remotely monitor and control other computers through a secure encrypted connection. It is an open source remote administration tool, however, it could also be used maliciously because it provides functionality such as keylogger, remote desktop control, and many other functions that may cause harm to the victims computer. In addition, AsyncRAT can be delivered via various methods such as spear-phishing, malvertising, exploit kit and other techniques.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.asyncrat
{
  "Server": "164.92.163.239",
  "Ports": "3898",
  "Version": "0.5.8",
  "Autorun": "false",
  "Install_Folder": "%AppData%",
  "AES_key": "M8gFCqrOJJZqCx1JYq0tXKezzud1GklJ",
  "Mutex": "AbDUeHz1cUxL",
  "Certificate": "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",
  "ServerSignature": "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",
  "BDOS": "false",
  "External_config_on_Pastebin": "null"
}
SourceRuleDescriptionAuthorStrings
00000001.00000002.3303566672.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
    00000001.00000002.3303566672.0000000000402000.00000040.00000400.00020000.00000000.sdmpINDICATOR_SUSPICIOUS_EXE_ASEP_REG_ReverseDetects file containing reversed ASEP Autorun registry keysditekSHen
    • 0x9789:$s1: nuR\noisreVtnerruC\swodniW\tfosorciM
    00000001.00000002.3305094853.0000000003331000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
      00000000.00000002.2061714758.00000000024A1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
        00000000.00000002.2061714758.00000000024A1000.00000004.00000800.00020000.00000000.sdmpWindows_Trojan_Asyncrat_11a11ba1unknownunknown
        • 0x902d7:$a1: /c schtasks /create /f /sc onlogon /rl highest /tn "
        • 0x9b71b:$a1: /c schtasks /create /f /sc onlogon /rl highest /tn "
        • 0xa6b77:$a1: /c schtasks /create /f /sc onlogon /rl highest /tn "
        • 0xb21d7:$a1: /c schtasks /create /f /sc onlogon /rl highest /tn "
        • 0x91618:$a2: Stub.exe
        • 0x916a8:$a2: Stub.exe
        • 0x9ca5c:$a2: Stub.exe
        • 0x9caec:$a2: Stub.exe
        • 0xa7eb8:$a2: Stub.exe
        • 0xa7f48:$a2: Stub.exe
        • 0xb3530:$a2: Stub.exe
        • 0xb35c0:$a2: Stub.exe
        • 0x8d0e7:$a3: get_ActivatePong
        • 0x9852b:$a3: get_ActivatePong
        • 0xa3987:$a3: get_ActivatePong
        • 0xaefe7:$a3: get_ActivatePong
        • 0x904ef:$a4: vmware
        • 0x9b933:$a4: vmware
        • 0xa6d8f:$a4: vmware
        • 0xb23ef:$a4: vmware
        • 0x90367:$a5: \nuR\noisreVtnerruC\swodniW\tfosorciM\erawtfoS
        Click to see the 5 entries
        SourceRuleDescriptionAuthorStrings
        0.2.MAdjnpU2Xp.exe.253e280.1.unpackJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
          0.2.MAdjnpU2Xp.exe.253e280.1.unpackWindows_Trojan_Asyncrat_11a11ba1unknownunknown
          • 0x7af7:$a1: /c schtasks /create /f /sc onlogon /rl highest /tn "
          • 0x8e38:$a2: Stub.exe
          • 0x8ec8:$a2: Stub.exe
          • 0x4907:$a3: get_ActivatePong
          • 0x7d0f:$a4: vmware
          • 0x7b87:$a5: \nuR\noisreVtnerruC\swodniW\tfosorciM\erawtfoS
          • 0x5656:$a6: get_SslClient
          0.2.MAdjnpU2Xp.exe.253e280.1.unpackrat_win_asyncratDetect AsyncRAT based on specific stringsSekoia.io
          • 0x4907:$str01: get_ActivatePong
          • 0x5656:$str02: get_SslClient
          • 0x5672:$str03: get_TcpClient
          • 0x3f18:$str04: get_SendSync
          • 0x3f68:$str05: get_IsConnected
          • 0x4697:$str06: set_UseShellExecute
          • 0x7e2d:$str07: Pastebin
          • 0x7eaf:$str08: Select * from AntivirusProduct
          • 0x8e38:$str09: Stub.exe
          • 0x8ec8:$str09: Stub.exe
          • 0x7c07:$str10: timeout 3 > NUL
          • 0x7af7:$str11: /c schtasks /create /f /sc onlogon /rl highest /tn
          • 0x7b87:$str12: \nuR\noisreVtnerruC\swodniW\tfosorciM\erawtfoS
          0.2.MAdjnpU2Xp.exe.253e280.1.unpackINDICATOR_SUSPICIOUS_EXE_ASEP_REG_ReverseDetects file containing reversed ASEP Autorun registry keysditekSHen
          • 0x7b89:$s1: nuR\noisreVtnerruC\swodniW\tfosorciM
          0.2.MAdjnpU2Xp.exe.2532e24.2.unpackJoeSecurity_AsyncRATYara detected AsyncRATJoe Security
            Click to see the 23 entries
            No Sigma rule has matched
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-03-04T01:52:15.261108+010020355951Domain Observed Used for C2 Detected164.92.163.2393898192.168.2.549704TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-03-04T01:52:15.261108+010020356071Domain Observed Used for C2 Detected164.92.163.2393898192.168.2.549704TCP
            TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
            2025-03-04T01:52:15.261108+010028424781Malware Command and Control Activity Detected164.92.163.2393898192.168.2.549704TCP

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: MAdjnpU2Xp.exeAvira: detected
            Source: 00000000.00000002.2061714758.00000000024A1000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: AsyncRAT {"Server": "164.92.163.239", "Ports": "3898", "Version": "0.5.8", "Autorun": "false", "Install_Folder": "%AppData%", "AES_key": "M8gFCqrOJJZqCx1JYq0tXKezzud1GklJ", "Mutex": "AbDUeHz1cUxL", "Certificate": "MIIE8jCCAtqgAwIBAgIQAMgufplwZXWUObORbETzPTANBgkqhkiG9w0BAQ0FADAaMRgwFgYDVQQDDA9Bc3luY1JBVCBTZXJ2ZXIwIBcNMjUwMjI3MTIyNTM3WhgPOTk5OTEyMzEyMzU5NTlaMBoxGDAWBgNVBAMMD0FzeW5jUkFUIFNlcnZlcjCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoCggIBALAXG8I0Oda301Kb/b25SFQ5fFLOjXPGpbnc1CFJU8j8YhBdWRJtt4UXy19hKnAK188qpk8h4v6syQ4KPMmnMh87xdEs1BDkVcZoICVNHxqoffFLr6kVbwlVpseLHkyKlHAmnIfM9DwRZih0UQPvPn+rq0j9e7dAVZ6q5UbC/XvuGnJvG0N76oxm62TpMzrFp8aSSPLUjnb7cK0K9SnJTeuHKXuCzBz6ybHPeZrIGceNKzNdMwFM6f6Fv7XW33Y+TrfBJ5YcxULk8zbAaR32pXsS9PA+sQh3Hlq+bRBYLwXJtzu6Xf6cDvNL9XOzA41i7vQnhU0B70HCjZmsnKDqWbIlne6MWasnpTAHIFlcGnvfVom7ST0nQIFkFEfvTdxR5cEn4bnIOVoYZJ3dobf3xeAJ57XflyEHQFW0hUPN3UHRH+DqX5Xztf3U+HRgRyBNUAszcBIaSCJFTYq6GlZU0Hf0ICcVROCEBapE5ey0GwV4eGqDIIs47su1bmVwUt8U8dtVz+urOHKNw6EmC5uP71znTIxry4C/ypAZWG1LxcYxid/zKVNMZB+E0MFXZZfdz1Hn1FRSWskf7jN0hSMrD+dj4EruaIoBHtcwvuQHfWBLDeaqnTWgxZV7mwciOb5PwBDwCV/gnW4l4Jmc5fWU0djS0DxWY1Ay0nysXkHA78m3AgMBAAGjMjAwMB0GA1UdDgQWBBRnnlfc8PeW+7qR5y9AYLUe9ltaUjAPBgNVHRMBAf8EBTADAQH/MA0GCSqGSIb3DQEBDQUAA4ICAQB/eReV/2V7aX+2wFV5wiRlIKUXEIenLdJtbuYSByqD0b0+Zhbm9MJtmSLVf1GwPCH+QUNJvqPe880VnuprYb726nCFeOX87hrofCKyxjO5CpSoo2/mT+ysOqyykdAnvkCbw8kyXu7UBXw7vIZIxW3etoK+JFrwpy1u0jJ6llnnj9Z6kdYibFrzKwmJYbJbdGHk3Ah0LgQrYwnEvt9RmgD3WsXAoHItBtXmzW8Cd4lMpfH4OZFESZf031MfVBAlXXuJHW4KxDy5/wFRFAGd5afl6lfzflqXmnXeG9LvGs28MclqDRmaEaZAnos5YEy7caXtD79bHOC6sAj4WPso2X+h97Cx7LMuXiVE5t+kVrnzNxgUUl9dmPrNu3Sf0NCfOvJZkrutScadynVqxGLQ3LPHURALsMQNUGhE7dSzxGTIw9FUzwPbE1IGuO0KzOCkRqBjzRqEEXXXjd2tckpAnPH91rGh8rC+Nre83Quhyupcs9XfClahlLTpVht/eZvkAQLJ4RD33bksoeVKsKtcxYvzodbu3Zny+aWeF89Ford0wvLoAPzbGBdpzPvsqax63HQJCql5h98ovIfG1wnBylDi7XR+f4LQm5KWJxMH2ovJH6xOZM1HVSCQO+Fvd3OWR5cLBthKHk0fqJXOjSf50OZSQOERTt6xq9biTUkjEdI4MA==", "ServerSignature": "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", "BDOS": "false", "External_config_on_Pastebin": "null"}
            Source: MAdjnpU2Xp.exeReversingLabs: Detection: 73%
            Source: MAdjnpU2Xp.exeVirustotal: Detection: 70%Perma Link
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
            Source: 00000001.00000002.3303566672.0000000000402000.00000040.00000400.00020000.00000000.sdmpString decryptor: 3898
            Source: 00000001.00000002.3303566672.0000000000402000.00000040.00000400.00020000.00000000.sdmpString decryptor: 164.92.163.239
            Source: 00000001.00000002.3303566672.0000000000402000.00000040.00000400.00020000.00000000.sdmpString decryptor: 0.5.8
            Source: 00000001.00000002.3303566672.0000000000402000.00000040.00000400.00020000.00000000.sdmpString decryptor: false
            Source: 00000001.00000002.3303566672.0000000000402000.00000040.00000400.00020000.00000000.sdmpString decryptor: AbDUeHz1cUxL
            Source: 00000001.00000002.3303566672.0000000000402000.00000040.00000400.00020000.00000000.sdmpString decryptor: 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
            Source: 00000001.00000002.3303566672.0000000000402000.00000040.00000400.00020000.00000000.sdmpString decryptor: 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
            Source: 00000001.00000002.3303566672.0000000000402000.00000040.00000400.00020000.00000000.sdmpString decryptor: null
            Source: 00000001.00000002.3303566672.0000000000402000.00000040.00000400.00020000.00000000.sdmpString decryptor: 1
            Source: 1.2.RegAsm.exe.400000.0.unpackString decryptor: 3898
            Source: 1.2.RegAsm.exe.400000.0.unpackString decryptor: 164.92.163.239
            Source: 1.2.RegAsm.exe.400000.0.unpackString decryptor: 0.5.8
            Source: 1.2.RegAsm.exe.400000.0.unpackString decryptor: false
            Source: 1.2.RegAsm.exe.400000.0.unpackString decryptor: AbDUeHz1cUxL
            Source: 1.2.RegAsm.exe.400000.0.unpackString decryptor: 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
            Source: 1.2.RegAsm.exe.400000.0.unpackString decryptor: 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
            Source: 1.2.RegAsm.exe.400000.0.unpackString decryptor: false
            Source: 1.2.RegAsm.exe.400000.0.unpackString decryptor: null
            Source: 1.2.RegAsm.exe.400000.0.unpackString decryptor: false
            Source: 1.2.RegAsm.exe.400000.0.unpackString decryptor: 1
            Source: MAdjnpU2Xp.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: MAdjnpU2Xp.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

            Networking

            barindex
            Source: Network trafficSuricata IDS: 2842478 - Severity 1 - ETPRO JA3 Hash - Suspected ASYNCRAT Server Cert (ja3s) : 164.92.163.239:3898 -> 192.168.2.5:49704
            Source: Network trafficSuricata IDS: 2030673 - Severity 1 - ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server) : 164.92.163.239:3898 -> 192.168.2.5:49704
            Source: Network trafficSuricata IDS: 2035595 - Severity 1 - ET MALWARE Generic AsyncRAT/zgRAT Style SSL Cert : 164.92.163.239:3898 -> 192.168.2.5:49704
            Source: Network trafficSuricata IDS: 2035607 - Severity 1 - ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server) : 164.92.163.239:3898 -> 192.168.2.5:49704
            Source: global trafficTCP traffic: 192.168.2.5:49704 -> 164.92.163.239:3898
            Source: Joe Sandbox ViewASN Name: ASN-DPSDUS ASN-DPSDUS
            Source: unknownTCP traffic detected without corresponding DNS query: 164.92.163.239
            Source: unknownTCP traffic detected without corresponding DNS query: 164.92.163.239
            Source: unknownTCP traffic detected without corresponding DNS query: 164.92.163.239
            Source: unknownTCP traffic detected without corresponding DNS query: 164.92.163.239
            Source: unknownTCP traffic detected without corresponding DNS query: 164.92.163.239
            Source: unknownTCP traffic detected without corresponding DNS query: 164.92.163.239
            Source: unknownTCP traffic detected without corresponding DNS query: 164.92.163.239
            Source: unknownTCP traffic detected without corresponding DNS query: 164.92.163.239
            Source: unknownTCP traffic detected without corresponding DNS query: 164.92.163.239
            Source: unknownTCP traffic detected without corresponding DNS query: 164.92.163.239
            Source: unknownTCP traffic detected without corresponding DNS query: 164.92.163.239
            Source: unknownTCP traffic detected without corresponding DNS query: 164.92.163.239
            Source: unknownTCP traffic detected without corresponding DNS query: 164.92.163.239
            Source: unknownTCP traffic detected without corresponding DNS query: 164.92.163.239
            Source: unknownTCP traffic detected without corresponding DNS query: 164.92.163.239
            Source: unknownTCP traffic detected without corresponding DNS query: 164.92.163.239
            Source: unknownTCP traffic detected without corresponding DNS query: 164.92.163.239
            Source: unknownTCP traffic detected without corresponding DNS query: 164.92.163.239
            Source: unknownTCP traffic detected without corresponding DNS query: 164.92.163.239
            Source: unknownTCP traffic detected without corresponding DNS query: 164.92.163.239
            Source: unknownTCP traffic detected without corresponding DNS query: 164.92.163.239
            Source: unknownTCP traffic detected without corresponding DNS query: 164.92.163.239
            Source: unknownTCP traffic detected without corresponding DNS query: 164.92.163.239
            Source: unknownTCP traffic detected without corresponding DNS query: 164.92.163.239
            Source: unknownTCP traffic detected without corresponding DNS query: 164.92.163.239
            Source: unknownTCP traffic detected without corresponding DNS query: 164.92.163.239
            Source: unknownTCP traffic detected without corresponding DNS query: 164.92.163.239
            Source: unknownTCP traffic detected without corresponding DNS query: 164.92.163.239
            Source: unknownTCP traffic detected without corresponding DNS query: 164.92.163.239
            Source: unknownTCP traffic detected without corresponding DNS query: 164.92.163.239
            Source: unknownTCP traffic detected without corresponding DNS query: 164.92.163.239
            Source: unknownTCP traffic detected without corresponding DNS query: 164.92.163.239
            Source: unknownTCP traffic detected without corresponding DNS query: 164.92.163.239
            Source: unknownTCP traffic detected without corresponding DNS query: 164.92.163.239
            Source: unknownTCP traffic detected without corresponding DNS query: 164.92.163.239
            Source: unknownTCP traffic detected without corresponding DNS query: 164.92.163.239
            Source: unknownTCP traffic detected without corresponding DNS query: 164.92.163.239
            Source: unknownTCP traffic detected without corresponding DNS query: 164.92.163.239
            Source: unknownTCP traffic detected without corresponding DNS query: 164.92.163.239
            Source: unknownTCP traffic detected without corresponding DNS query: 164.92.163.239
            Source: unknownTCP traffic detected without corresponding DNS query: 164.92.163.239
            Source: unknownTCP traffic detected without corresponding DNS query: 164.92.163.239
            Source: unknownTCP traffic detected without corresponding DNS query: 164.92.163.239
            Source: unknownTCP traffic detected without corresponding DNS query: 164.92.163.239
            Source: unknownTCP traffic detected without corresponding DNS query: 164.92.163.239
            Source: unknownTCP traffic detected without corresponding DNS query: 164.92.163.239
            Source: unknownTCP traffic detected without corresponding DNS query: 164.92.163.239
            Source: unknownTCP traffic detected without corresponding DNS query: 164.92.163.239
            Source: unknownTCP traffic detected without corresponding DNS query: 164.92.163.239
            Source: unknownTCP traffic detected without corresponding DNS query: 164.92.163.239
            Source: RegAsm.exe, 00000001.00000002.3304562828.00000000016E1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en
            Source: 77EC63BDA74BD0D0E0426DC8F80085060.1.drString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab
            Source: RegAsm.exe, 00000001.00000002.3304562828.00000000016E1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cabj
            Source: RegAsm.exe, 00000001.00000002.3305094853.0000000003331000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name

            Key, Mouse, Clipboard, Microphone and Screen Capturing

            barindex
            Source: Yara matchFile source: 0.2.MAdjnpU2Xp.exe.253e280.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.MAdjnpU2Xp.exe.2532e24.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.MAdjnpU2Xp.exe.25279e0.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.MAdjnpU2Xp.exe.253e280.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.MAdjnpU2Xp.exe.2532e24.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.MAdjnpU2Xp.exe.25279e0.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000001.00000002.3303566672.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.3305094853.0000000003331000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.2061714758.00000000024A1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: MAdjnpU2Xp.exe PID: 6104, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 6660, type: MEMORYSTR

            System Summary

            barindex
            Source: 0.2.MAdjnpU2Xp.exe.253e280.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
            Source: 0.2.MAdjnpU2Xp.exe.253e280.1.unpack, type: UNPACKEDPEMatched rule: Detect AsyncRAT based on specific strings Author: Sekoia.io
            Source: 0.2.MAdjnpU2Xp.exe.253e280.1.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
            Source: 0.2.MAdjnpU2Xp.exe.2532e24.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
            Source: 0.2.MAdjnpU2Xp.exe.2532e24.2.unpack, type: UNPACKEDPEMatched rule: Detect AsyncRAT based on specific strings Author: Sekoia.io
            Source: 0.2.MAdjnpU2Xp.exe.2532e24.2.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
            Source: 0.2.MAdjnpU2Xp.exe.25279e0.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
            Source: 0.2.MAdjnpU2Xp.exe.25279e0.0.unpack, type: UNPACKEDPEMatched rule: Detect AsyncRAT based on specific strings Author: Sekoia.io
            Source: 0.2.MAdjnpU2Xp.exe.25279e0.0.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
            Source: 1.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
            Source: 1.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detect AsyncRAT based on specific strings Author: Sekoia.io
            Source: 1.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
            Source: 0.2.MAdjnpU2Xp.exe.253e280.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
            Source: 0.2.MAdjnpU2Xp.exe.253e280.1.raw.unpack, type: UNPACKEDPEMatched rule: Detect AsyncRAT based on specific strings Author: Sekoia.io
            Source: 0.2.MAdjnpU2Xp.exe.253e280.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
            Source: 0.2.MAdjnpU2Xp.exe.2532e24.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
            Source: 0.2.MAdjnpU2Xp.exe.2532e24.2.raw.unpack, type: UNPACKEDPEMatched rule: Detect AsyncRAT based on specific strings Author: Sekoia.io
            Source: 0.2.MAdjnpU2Xp.exe.2532e24.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
            Source: 0.2.MAdjnpU2Xp.exe.25279e0.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
            Source: 0.2.MAdjnpU2Xp.exe.25279e0.0.raw.unpack, type: UNPACKEDPEMatched rule: Detect AsyncRAT based on specific strings Author: Sekoia.io
            Source: 0.2.MAdjnpU2Xp.exe.25279e0.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
            Source: 00000001.00000002.3303566672.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
            Source: 00000000.00000002.2061714758.00000000024A1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Asyncrat_11a11ba1 Author: unknown
            Source: 00000000.00000002.2061714758.00000000024A1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
            Source: Process Memory Space: MAdjnpU2Xp.exe PID: 6104, type: MEMORYSTRMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
            Source: Process Memory Space: RegAsm.exe PID: 6660, type: MEMORYSTRMatched rule: Detects file containing reversed ASEP Autorun registry keys Author: ditekSHen
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_015865C01_2_015865C0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_01585CF01_2_01585CF0
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_015859A81_2_015859A8
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_0158A8781_2_0158A878
            Source: MAdjnpU2Xp.exe, 00000000.00000002.2061714758.00000000024A1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameStub.exe" vs MAdjnpU2Xp.exe
            Source: MAdjnpU2Xp.exe, 00000000.00000002.2061115097.000000000089E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs MAdjnpU2Xp.exe
            Source: MAdjnpU2Xp.exe, 00000000.00000000.2058639999.0000000000162000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameaitstatic.exe4 vs MAdjnpU2Xp.exe
            Source: MAdjnpU2Xp.exeBinary or memory string: OriginalFilenameaitstatic.exe4 vs MAdjnpU2Xp.exe
            Source: MAdjnpU2Xp.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: 0.2.MAdjnpU2Xp.exe.253e280.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
            Source: 0.2.MAdjnpU2Xp.exe.253e280.1.unpack, type: UNPACKEDPEMatched rule: rat_win_asyncrat author = Sekoia.io, description = Detect AsyncRAT based on specific strings, creation_date = 2023-01-25, classification = TLP:CLEAR, version = 1.0, id = d698e4a1-77ff-4cd7-acb3-27fb16168ceb
            Source: 0.2.MAdjnpU2Xp.exe.253e280.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
            Source: 0.2.MAdjnpU2Xp.exe.2532e24.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
            Source: 0.2.MAdjnpU2Xp.exe.2532e24.2.unpack, type: UNPACKEDPEMatched rule: rat_win_asyncrat author = Sekoia.io, description = Detect AsyncRAT based on specific strings, creation_date = 2023-01-25, classification = TLP:CLEAR, version = 1.0, id = d698e4a1-77ff-4cd7-acb3-27fb16168ceb
            Source: 0.2.MAdjnpU2Xp.exe.2532e24.2.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
            Source: 0.2.MAdjnpU2Xp.exe.25279e0.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
            Source: 0.2.MAdjnpU2Xp.exe.25279e0.0.unpack, type: UNPACKEDPEMatched rule: rat_win_asyncrat author = Sekoia.io, description = Detect AsyncRAT based on specific strings, creation_date = 2023-01-25, classification = TLP:CLEAR, version = 1.0, id = d698e4a1-77ff-4cd7-acb3-27fb16168ceb
            Source: 0.2.MAdjnpU2Xp.exe.25279e0.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
            Source: 1.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
            Source: 1.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: rat_win_asyncrat author = Sekoia.io, description = Detect AsyncRAT based on specific strings, creation_date = 2023-01-25, classification = TLP:CLEAR, version = 1.0, id = d698e4a1-77ff-4cd7-acb3-27fb16168ceb
            Source: 1.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
            Source: 0.2.MAdjnpU2Xp.exe.253e280.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
            Source: 0.2.MAdjnpU2Xp.exe.253e280.1.raw.unpack, type: UNPACKEDPEMatched rule: rat_win_asyncrat author = Sekoia.io, description = Detect AsyncRAT based on specific strings, creation_date = 2023-01-25, classification = TLP:CLEAR, version = 1.0, id = d698e4a1-77ff-4cd7-acb3-27fb16168ceb
            Source: 0.2.MAdjnpU2Xp.exe.253e280.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
            Source: 0.2.MAdjnpU2Xp.exe.2532e24.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
            Source: 0.2.MAdjnpU2Xp.exe.2532e24.2.raw.unpack, type: UNPACKEDPEMatched rule: rat_win_asyncrat author = Sekoia.io, description = Detect AsyncRAT based on specific strings, creation_date = 2023-01-25, classification = TLP:CLEAR, version = 1.0, id = d698e4a1-77ff-4cd7-acb3-27fb16168ceb
            Source: 0.2.MAdjnpU2Xp.exe.2532e24.2.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
            Source: 0.2.MAdjnpU2Xp.exe.25279e0.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
            Source: 0.2.MAdjnpU2Xp.exe.25279e0.0.raw.unpack, type: UNPACKEDPEMatched rule: rat_win_asyncrat author = Sekoia.io, description = Detect AsyncRAT based on specific strings, creation_date = 2023-01-25, classification = TLP:CLEAR, version = 1.0, id = d698e4a1-77ff-4cd7-acb3-27fb16168ceb
            Source: 0.2.MAdjnpU2Xp.exe.25279e0.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
            Source: 00000001.00000002.3303566672.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
            Source: 00000000.00000002.2061714758.00000000024A1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Asyncrat_11a11ba1 reference_sample = fe09cd1d13b87c5e970d3cbc1ebc02b1523c0a939f961fc02c1395707af1c6d1, os = windows, severity = x86, creation_date = 2021-08-05, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Asyncrat, fingerprint = 715ede969076cd413cebdfcf0cdda44e3a6feb5343558f18e656f740883b41b8, id = 11a11ba1-c178-4415-9c09-45030b500f50, last_modified = 2021-10-04
            Source: 00000000.00000002.2061714758.00000000024A1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
            Source: Process Memory Space: MAdjnpU2Xp.exe PID: 6104, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
            Source: Process Memory Space: RegAsm.exe PID: 6660, type: MEMORYSTRMatched rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse author = ditekSHen, description = Detects file containing reversed ASEP Autorun registry keys
            Source: MAdjnpU2Xp.exe, by-unknown-------------------------.csBase64 encoded string: 'QzpcV2luZG93c1xNaWNyb3NvZnQuTkVUXEZyYW1ld29ya1x2NC4wLjMwMzE5XFJlZ0FzbS5leGU='
            Source: 0.2.MAdjnpU2Xp.exe.253e280.1.raw.unpack, Settings.csBase64 encoded string: 'sVohXfKrijEkGH2c0tJkCBeeUU3iLoSonfcYaKeM4wVa81M+9yJBmv7oj47DOLL5s8sLGbRPLkJSPD144E3WqQ==', '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', 'iUdWGOAoTNMYjBUpIfXXBiJtqLwZr0OkZj+ZMDbPdUK9XuovjA8gJ1JYC6GgSlvhjMaRzGf2TFATfudct3MGXA==', 'KH5gIq5lpA7PV71+vW7LBB4xH9eN36+xAaoxuvuDLJ9qQouHMeA7C/6ppJXkBxGjevPAQ0knZgGcuffA64OlXA=='
            Source: 0.2.MAdjnpU2Xp.exe.2532e24.2.raw.unpack, Settings.csBase64 encoded string: 'sVohXfKrijEkGH2c0tJkCBeeUU3iLoSonfcYaKeM4wVa81M+9yJBmv7oj47DOLL5s8sLGbRPLkJSPD144E3WqQ==', 'qph12/RO46gxGPPkuJpFTTgUGGY0pOdsXOg16gAj297DNrUp7SuzrocJreMMWA1RNeHHvIoLBr1cy8vXaI6VhXcClWABWzayNjzefsvmefJUxGwHFiVFaeZgJAVU+kAdO+vOlB3+ha00AOWxFXZMOTaI78gdx2WdBTgDAS15UfTckuKuynGks2OwFWYN5OYeCUkCvESxBn+uHfHyCW3xaRu0Xm9KdoD+8xq5aYSXzAFef6nImcYbRkb3J6ismGU6iHUKBnvlLB2rqJ8DToSkSVZAZZeo0XwAXizfgsRuEZoszKSgV29uZ9DL8PGW11iE245cVcOSAkZAogANk4Yr0VVTkMhF5FPGRWOzURTtk46BKOoO5baIGmGIKgIB+YqV4dCmjwDp/n8LCxaevSBCuz6FeIgnxfrwhQaRIHUVgaVhVleU+MijRgrLzg6DvRMz3i1GnX2HBB3DXpgw1q1PHrKstS3IE/89DC0xNJ5B8sXR6Zo70hOYBImjiusHVJFhi09D4695JIk+fRcSLL1vY+090I/lgqCHhjlws+kS5gXeLWk3Dgj4R3LeYQWETfMlXD2tXnUtIBRiERcSyL2etbfUprt+AUlGqXyqpwN6bJzpbu1AG3cbwBWV7QQ4qepKELuBdcJm4/fwWpcLhkjG1J32vI+VI3xKjmUCRvkEKqaZIStC2oSFsXHM/Fq23QeFU+KQIeh9vxiT6pHh6o54vRz7pGndx6L30ZQL5K0jrTdGgJ9zMzONaKw0/y1Mkq3spO8dEQf5uq25VxgaASiyVTNfUd1NyXnTeELjH2ox6SMJSOpmAg5Az7n0AzJ4/ZE28BoLTmTU4T2byCpQZ2K5KHwjW5CqCXoMrM8uW4PCYm7NmdZPtBm/GUEEporIGvPnzXfqBpUPUBhaSKsud3MhrXVdXNioIDKH3l/EAm9vdbyF0UU/mcrZoJHXsYrNZ+tsZt3Fh4HZ/m03Wnpbr/zPUw==', 'iUdWGOAoTNMYjBUpIfXXBiJtqLwZr0OkZj+ZMDbPdUK9XuovjA8gJ1JYC6GgSlvhjMaRzGf2TFATfudct3MGXA==', 'KH5gIq5lpA7PV71+vW7LBB4xH9eN36+xAaoxuvuDLJ9qQouHMeA7C/6ppJXkBxGjevPAQ0knZgGcuffA64OlXA=='
            Source: 0.2.MAdjnpU2Xp.exe.25279e0.0.raw.unpack, Settings.csBase64 encoded string: 'sVohXfKrijEkGH2c0tJkCBeeUU3iLoSonfcYaKeM4wVa81M+9yJBmv7oj47DOLL5s8sLGbRPLkJSPD144E3WqQ==', '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', 'iUdWGOAoTNMYjBUpIfXXBiJtqLwZr0OkZj+ZMDbPdUK9XuovjA8gJ1JYC6GgSlvhjMaRzGf2TFATfudct3MGXA==', 'KH5gIq5lpA7PV71+vW7LBB4xH9eN36+xAaoxuvuDLJ9qQouHMeA7C/6ppJXkBxGjevPAQ0knZgGcuffA64OlXA=='
            Source: 0.2.MAdjnpU2Xp.exe.25279e0.0.raw.unpack, Methods.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
            Source: 0.2.MAdjnpU2Xp.exe.25279e0.0.raw.unpack, Methods.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
            Source: 0.2.MAdjnpU2Xp.exe.253e280.1.raw.unpack, Methods.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
            Source: 0.2.MAdjnpU2Xp.exe.253e280.1.raw.unpack, Methods.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
            Source: 0.2.MAdjnpU2Xp.exe.2532e24.2.raw.unpack, Methods.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
            Source: 0.2.MAdjnpU2Xp.exe.2532e24.2.raw.unpack, Methods.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
            Source: classification engineClassification label: mal100.troj.evad.winEXE@3/3@0/1
            Source: C:\Users\user\Desktop\MAdjnpU2Xp.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\MAdjnpU2Xp.exe.logJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMutant created: NULL
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMutant created: \Sessions\1\BaseNamedObjects\AbDUeHz1cUxL
            Source: MAdjnpU2Xp.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: MAdjnpU2Xp.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
            Source: C:\Users\user\Desktop\MAdjnpU2Xp.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: MAdjnpU2Xp.exeReversingLabs: Detection: 73%
            Source: MAdjnpU2Xp.exeVirustotal: Detection: 70%
            Source: unknownProcess created: C:\Users\user\Desktop\MAdjnpU2Xp.exe "C:\Users\user\Desktop\MAdjnpU2Xp.exe"
            Source: C:\Users\user\Desktop\MAdjnpU2Xp.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe #system32
            Source: C:\Users\user\Desktop\MAdjnpU2Xp.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe #system32Jump to behavior
            Source: C:\Users\user\Desktop\MAdjnpU2Xp.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\Desktop\MAdjnpU2Xp.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\MAdjnpU2Xp.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\MAdjnpU2Xp.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\MAdjnpU2Xp.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\MAdjnpU2Xp.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\MAdjnpU2Xp.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\MAdjnpU2Xp.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\MAdjnpU2Xp.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\MAdjnpU2Xp.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\MAdjnpU2Xp.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\MAdjnpU2Xp.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\MAdjnpU2Xp.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: aclayers.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: schannel.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mskeyprotect.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ncryptsslp.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptnet.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: webio.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cabinet.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
            Source: MAdjnpU2Xp.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
            Source: MAdjnpU2Xp.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: MAdjnpU2Xp.exeStatic PE information: section name: .text entropy: 7.297608531471922

            Boot Survival

            barindex
            Source: Yara matchFile source: 0.2.MAdjnpU2Xp.exe.253e280.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.MAdjnpU2Xp.exe.2532e24.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.MAdjnpU2Xp.exe.25279e0.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.MAdjnpU2Xp.exe.253e280.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.MAdjnpU2Xp.exe.2532e24.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.MAdjnpU2Xp.exe.25279e0.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000001.00000002.3303566672.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.3305094853.0000000003331000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.2061714758.00000000024A1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: MAdjnpU2Xp.exe PID: 6104, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 6660, type: MEMORYSTR
            Source: C:\Users\user\Desktop\MAdjnpU2Xp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MAdjnpU2Xp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MAdjnpU2Xp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MAdjnpU2Xp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MAdjnpU2Xp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MAdjnpU2Xp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MAdjnpU2Xp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MAdjnpU2Xp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MAdjnpU2Xp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MAdjnpU2Xp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MAdjnpU2Xp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MAdjnpU2Xp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MAdjnpU2Xp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MAdjnpU2Xp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MAdjnpU2Xp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MAdjnpU2Xp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: Yara matchFile source: 0.2.MAdjnpU2Xp.exe.253e280.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.MAdjnpU2Xp.exe.2532e24.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.MAdjnpU2Xp.exe.25279e0.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.MAdjnpU2Xp.exe.253e280.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.MAdjnpU2Xp.exe.2532e24.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.MAdjnpU2Xp.exe.25279e0.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000001.00000002.3303566672.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.3305094853.0000000003331000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.2061714758.00000000024A1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: MAdjnpU2Xp.exe PID: 6104, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 6660, type: MEMORYSTR
            Source: MAdjnpU2Xp.exe, 00000000.00000002.2061714758.00000000024A1000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.3303566672.0000000000402000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
            Source: C:\Users\user\Desktop\MAdjnpU2Xp.exeMemory allocated: 22B0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\MAdjnpU2Xp.exeMemory allocated: 24A0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\MAdjnpU2Xp.exeMemory allocated: 44A0000 memory reserve | memory write watchJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 1580000 memory reserve | memory write watchJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 3330000 memory reserve | memory write watchJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 5330000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\MAdjnpU2Xp.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWindow / User API: threadDelayed 2357Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWindow / User API: threadDelayed 7488Jump to behavior
            Source: C:\Users\user\Desktop\MAdjnpU2Xp.exe TID: 6156Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7032Thread sleep time: -30000s >= -30000sJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 1276Thread sleep count: 40 > 30Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 1276Thread sleep time: -36893488147419080s >= -30000sJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5560Thread sleep count: 2357 > 30Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 5560Thread sleep count: 7488 > 30Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Users\user\Desktop\MAdjnpU2Xp.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: RegAsm.exe, 00000001.00000002.3303566672.0000000000402000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: vmware
            Source: RegAsm.exe, 00000001.00000002.3304701900.0000000001725000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWP
            Source: RegAsm.exe, 00000001.00000002.3306852373.0000000005880000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.3306767759.0000000005874000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\Desktop\MAdjnpU2Xp.exeMemory allocated: page read and write | page guardJump to behavior

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: MAdjnpU2Xp.exe, by-unknown-------------------------.csReference to suspicious API methods: ReadProcessMemory(by_002Dunknown_2642_D83D_DCA3_FFFD_D83D_DD2D_FFFD_FFFD_FFFD_D83E_DD70_FFFD_200D_FFFD_FFFD_D83D_DE33_D83D_DE1C_FFFD_FFFD_D83D_DDE8_FFFD_FFFD.ProcessHandle, num3 + 4 + 4, ref by_002Dunknown_FFFD_FFFD_FFFD_FFFD_FE0F_FE0F_FFFD_26A7_FFFD_FE0F_D83D_DE36_FFFD_FFFD_FFFD_FE0F_FFFD_D83C_DEC1_FFFD_D83E_DCA3_FFFD_200D_FFFD, 4, ref by_002Dunknown_FFFD_D83E_DCAB_FE0F_26A7_200D_FE0F_D83D_DEA0_200D_FFFD_FFFD_FFFD_FFFD_FFFD_FE0F_FFFD_D83E_DD14_FFFD_D83D_DD70_D83D_DF2B_FFFD)
            Source: MAdjnpU2Xp.exe, by-unknown-------------------------.csReference to suspicious API methods: VirtualAllocEx(by_002Dunknown_2642_D83D_DCA3_FFFD_D83D_DD2D_FFFD_FFFD_FFFD_D83E_DD70_FFFD_200D_FFFD_FFFD_D83D_DE33_D83D_DE1C_FFFD_FFFD_D83D_DDE8_FFFD_FFFD.ProcessHandle, num2, num4, 12288, 64)
            Source: MAdjnpU2Xp.exe, by-unknown-------------------------.csReference to suspicious API methods: WriteProcessMemory(by_002Dunknown_2642_D83D_DCA3_FFFD_D83D_DD2D_FFFD_FFFD_FFFD_D83E_DD70_FFFD_200D_FFFD_FFFD_D83D_DE33_D83D_DE1C_FFFD_FFFD_D83D_DDE8_FFFD_FFFD.ProcessHandle, num6, by_002Dunknown_FFFD_FE0F_FFFD_2642_FFFD_D83E_DCAB_FFFD_FFFD_D83E_DD2D_200D_D83D_DFF3_FFFD_D83D_DD29_D83E_DEC1_FE0F_FFFD_FFFD_FFFD_D83D_DD75, num5, ref by_002Dunknown_FFFD_D83E_DCAB_FE0F_26A7_200D_FE0F_D83D_DEA0_200D_FFFD_FFFD_FFFD_FFFD_FFFD_FE0F_FFFD_D83E_DD14_FFFD_D83D_DD70_D83D_DF2B_FFFD)
            Source: C:\Users\user\Desktop\MAdjnpU2Xp.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 protect: page execute and read and writeJump to behavior
            Source: C:\Users\user\Desktop\MAdjnpU2Xp.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 value starts with: 4D5AJump to behavior
            Source: C:\Users\user\Desktop\MAdjnpU2Xp.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000Jump to behavior
            Source: C:\Users\user\Desktop\MAdjnpU2Xp.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 402000Jump to behavior
            Source: C:\Users\user\Desktop\MAdjnpU2Xp.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 40E000Jump to behavior
            Source: C:\Users\user\Desktop\MAdjnpU2Xp.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 410000Jump to behavior
            Source: C:\Users\user\Desktop\MAdjnpU2Xp.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 1067008Jump to behavior
            Source: C:\Users\user\Desktop\MAdjnpU2Xp.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe #system32Jump to behavior
            Source: RegAsm.exe, 00000001.00000002.3305094853.0000000003399000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.3305094853.000000000339D000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.3305094853.0000000003390000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager@\]q
            Source: RegAsm.exe, 00000001.00000002.3305094853.0000000003399000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.3305094853.000000000339D000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.3305094853.0000000003390000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager
            Source: RegAsm.exe, 00000001.00000002.3305094853.0000000003399000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.3305094853.0000000003390000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.3305094853.00000000033BF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager@\]q%
            Source: RegAsm.exe, 00000001.00000002.3305094853.0000000003399000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.3305094853.0000000003390000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerTe]q
            Source: RegAsm.exe, 00000001.00000002.3305094853.00000000033BF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerTe]qDG<
            Source: RegAsm.exe, 00000001.00000002.3305094853.00000000033BF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program ManagerTe]q$I<
            Source: C:\Users\user\Desktop\MAdjnpU2Xp.exeQueries volume information: C:\Users\user\Desktop\MAdjnpU2Xp.exe VolumeInformationJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe VolumeInformationJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\MAdjnpU2Xp.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Lowering of HIPS / PFW / Operating System Security Settings

            barindex
            Source: Yara matchFile source: 0.2.MAdjnpU2Xp.exe.253e280.1.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.MAdjnpU2Xp.exe.2532e24.2.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.MAdjnpU2Xp.exe.25279e0.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 1.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.MAdjnpU2Xp.exe.253e280.1.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.MAdjnpU2Xp.exe.2532e24.2.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 0.2.MAdjnpU2Xp.exe.25279e0.0.raw.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000001.00000002.3303566672.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000001.00000002.3305094853.0000000003331000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.2061714758.00000000024A1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: MAdjnpU2Xp.exe PID: 6104, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 6660, type: MEMORYSTR
            Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
            Windows Management Instrumentation
            1
            Scheduled Task/Job
            312
            Process Injection
            1
            Masquerading
            OS Credential Dumping111
            Security Software Discovery
            Remote Services1
            Archive Collected Data
            1
            Encrypted Channel
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault Accounts1
            Scheduled Task/Job
            1
            DLL Side-Loading
            1
            Scheduled Task/Job
            1
            Disable or Modify Tools
            LSASS Memory1
            Process Discovery
            Remote Desktop ProtocolData from Removable Media1
            Non-Standard Port
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain Accounts1
            Native API
            Logon Script (Windows)1
            DLL Side-Loading
            31
            Virtualization/Sandbox Evasion
            Security Account Manager31
            Virtualization/Sandbox Evasion
            SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook312
            Process Injection
            NTDS1
            Application Window Discovery
            Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script111
            Obfuscated Files or Information
            LSA Secrets13
            System Information Discovery
            SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
            Software Packing
            Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
            DLL Side-Loading
            DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 signatures2 2 Behavior Graph ID: 1628657 Sample: MAdjnpU2Xp.exe Startdate: 04/03/2025 Architecture: WINDOWS Score: 100 17 Suricata IDS alerts for network traffic 2->17 19 Found malware configuration 2->19 21 Malicious sample detected (through community Yara rule) 2->21 23 6 other signatures 2->23 6 MAdjnpU2Xp.exe 3 2->6         started        process3 file4 13 C:\Users\user\AppData\...\MAdjnpU2Xp.exe.log, CSV 6->13 dropped 25 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 6->25 27 Writes to foreign memory regions 6->27 29 Allocates memory in foreign processes 6->29 31 Injects a PE file into a foreign processes 6->31 10 RegAsm.exe 2 6->10         started        signatures5 process6 dnsIp7 15 164.92.163.239, 3898, 49704 ASN-DPSDUS United States 10->15

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            MAdjnpU2Xp.exe74%ReversingLabsWin32.Spyware.AsyncRAT
            MAdjnpU2Xp.exe70%VirustotalBrowse
            MAdjnpU2Xp.exe100%AviraTR/Dropper.Gen
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches

            Download Network PCAP: filteredfull

            NameIPActiveMaliciousAntivirus DetectionReputation
            edge.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com
            217.20.57.19
            truefalse
              high
              NameSourceMaliciousAntivirus DetectionReputation
              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegAsm.exe, 00000001.00000002.3305094853.0000000003331000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                164.92.163.239
                unknownUnited States
                46930ASN-DPSDUStrue
                Joe Sandbox version:42.0.0 Malachite
                Analysis ID:1628657
                Start date and time:2025-03-04 01:51:16 +01:00
                Joe Sandbox product:CloudBasic
                Overall analysis duration:0h 4m 25s
                Hypervisor based Inspection enabled:false
                Report type:full
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                Number of analysed new started processes analysed:4
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Sample name:MAdjnpU2Xp.exe
                renamed because original name is a hash value
                Original Sample Name:157a3f7a20b22e78c4d3f7ea88538ff7.exe
                Detection:MAL
                Classification:mal100.troj.evad.winEXE@3/3@0/1
                EGA Information:
                • Successful, ratio: 50%
                HCA Information:
                • Successful, ratio: 100%
                • Number of executed functions: 64
                • Number of non-executed functions: 2
                Cookbook Comments:
                • Found application associated with file extension: .exe
                • Exclude process from analysis (whitelisted): WMIADAP.exe, SIHClient.exe
                • Excluded IPs from analysis (whitelisted): 217.20.57.19, 13.107.246.60, 172.202.163.200
                • Excluded domains from analysis (whitelisted): ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, ctldl.windowsupdate.com, wu-b-net.trafficmanager.net, fe3cr.delivery.mp.microsoft.com
                • Execution Graph export aborted for target RegAsm.exe, PID 6660 because it is empty
                • Report size getting too big, too many NtOpenKeyEx calls found.
                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                • Report size getting too big, too many NtQueryValueKey calls found.
                • Report size getting too big, too many NtReadVirtualMemory calls found.
                TimeTypeDescription
                19:52:15API Interceptor1x Sleep call for process: RegAsm.exe modified
                No context
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                edge.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.comIPE Rigging Corp Request For Proposal.pdfGet hashmaliciousUnknownBrowse
                • 217.20.57.36
                TR Swisslife Request for Timely Document Review and Approval.msgGet hashmaliciousUnknownBrowse
                • 84.201.210.39
                SecuriteInfo.com.Other.Malware-gen.10169.30262.xlsxGet hashmaliciousUnknownBrowse
                • 84.201.210.23
                door.batGet hashmaliciousUnknownBrowse
                • 217.20.57.34
                POETDB24-25815.xla.xlsxGet hashmaliciousUnknownBrowse
                • 217.20.57.19
                TxSGVmS8uR.exeGet hashmaliciousPureCrypter, AsyncRATBrowse
                • 84.201.210.39
                q3na5Mc.exeGet hashmaliciousVidarBrowse
                • 84.201.210.23
                Technical_Requirements.xlsGet hashmaliciousUnknownBrowse
                • 217.20.57.20
                Technical_Requirements.xlsGet hashmaliciousUnknownBrowse
                • 217.20.57.18
                RFQ-JC25-#595837.xlsxGet hashmaliciousUnknownBrowse
                • 217.20.57.19
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                ASN-DPSDUSyakov.ppc.elfGet hashmaliciousMiraiBrowse
                • 164.92.0.31
                yakov.arm7.elfGet hashmaliciousMiraiBrowse
                • 164.94.100.158
                https://infocorporacion.pe/Kennyiryiio/COCOPOOOUT.htmlGet hashmaliciousHTMLPhisherBrowse
                • 164.92.93.159
                telnet.arm.elfGet hashmaliciousUnknownBrowse
                • 164.92.71.254
                sora.arm.elfGet hashmaliciousMiraiBrowse
                • 164.92.178.93
                RFQ PC25-1301 Product Specifications_PDF.exeGet hashmaliciousFormBookBrowse
                • 164.92.166.75
                Fantazy.ppc.elfGet hashmaliciousUnknownBrowse
                • 164.92.178.86
                x86_64.nn.elfGet hashmaliciousMirai, OkiruBrowse
                • 164.94.212.231
                https://webservice.ucampaign.unear.net/UmailTracking/t.aspx?p=64620006&c=MTI2NjMxOA==&up=46435316&e=jlim@vvblawyers.com&l=MTczODQ=&i=1126&u=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Get hashmaliciousHTMLPhisherBrowse
                • 164.92.188.247
                https://google.sk/url?q=gcwogJLi6z3yh&rct=tTPvvq6xRyj7Y00xDjnlx9kIjusucT&sa=t&url=amp/s%2falvoradavisual.com.br%2fyoya/fvh1/emVnZXJ0dmFuZGVybGluZ2VuQHJveWFsZmxvcmFob2xsYW5kLmNvbQ==%C3%A3%E2%82%AC%E2%80%9A$$$%C3%A3%E2%82%AC%E2%80%9AGet hashmaliciousHTMLPhisherBrowse
                • 164.92.191.86
                No context
                No context
                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                File Type:Microsoft Cabinet archive data, Windows 2000/XP setup, 73305 bytes, 1 file, at 0x2c +A "authroot.stl", number 1, 6 datablocks, 0x1 compression
                Category:dropped
                Size (bytes):73305
                Entropy (8bit):7.996028107841645
                Encrypted:true
                SSDEEP:1536:krha8mqJ7v3CeFMz/akys7nSTK7QMuK+C/Oh5:kAOFq+Mba9Ok7C/O/
                MD5:83142242E97B8953C386F988AA694E4A
                SHA1:833ED12FC15B356136DCDD27C61A50F59C5C7D50
                SHA-256:D72761E1A334A754CE8250E3AF7EA4BF25301040929FD88CF9E50B4A9197D755
                SHA-512:BB6DA177BD16D163F377D9B4C63F6D535804137887684C113CC2F643CEAB4F34338C06B5A29213C23D375E95D22EF417EAC928822DFB3688CE9E2DE9D5242D10
                Malicious:false
                Reputation:moderate, very likely benign file
                Preview:MSCF....Y.......,...................I.................;Za. .authroot.stl.98.?.6..CK..<Tk......4..c... .Ec...U.d.d.E&I.DH*..M.KB."..rK.RQ*..}f..f...}..1....9...........$.8q..fa...7.o.1.0...bfsM4.........u..l..0..4.a.t....0.....6#....n. :... ....%.,CQ5uU..(.3.<7#.0..JN.$...=j|w..*.#.oU..Eq[..P..^..~.V...;..m...I|...l..@-W..=.QQ.._./.M.nZ..(.........`.$Z.9wW:W.]..8*E.......I.D{..n...K:.m..^.(.S.......c..s.y..<...2.%o.o.....H.B.R.....11.|!.(...........h.SZ........<...^....Z>.Pp?... .pT@p.#.&..........#VEV=.....p........y..."T=l.n..egf.w..X.Y..-G...........KQ.]...pM..[m..-6.wd:........T...:.P5Zs....c.oT`..F1#......EuD.......7....V ..-....!.N..%S...k...S. ...@.J..../..b!B.(=\../.l......`.\...q9..>4!b..8EH.....zdy.....#...X>%0w...i.,>c.z.g"p.S..2W.+mMs.....5Def.....#._D.4....>}...i...\.&`D.......z;..ZY.3.+t.`....z_.q'w.z.)..j3.+.co.s..:.........qK...{...E....uPO...#vs.XxH.B!..(t. 8k+.....G\..?..GF8....'..w.>.ms..\ve.nFN..W)....xi..u..5.f.l....
                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                File Type:data
                Category:dropped
                Size (bytes):330
                Entropy (8bit):3.183651560957911
                Encrypted:false
                SSDEEP:6:kKLBGmcvSN+SkQlPlEGYRMY9z+4KlDA3RUeqpGVuys1:zBGmCkPlE99SNxAhUeq8S
                MD5:0B146A43825A8DB9838E9A4A6520DE7E
                SHA1:D624254046DE0E38A728D0BA68FB7DB34F20A8BF
                SHA-256:E4601024715A25BD428AEC2990DE47A9220776AB0774FDF79829C7A58DB86552
                SHA-512:E5162F5533E15618402C212D203AE87A11B0480951709EAD5E365B9C928D385A067A77346202009EADAABFFE878DC520464CD8A56A11EE39E4218F890CACB38E
                Malicious:false
                Reputation:low
                Preview:p...... ..........W.....(....................................................... ..................(...........Y...h.t.t.p.:././.c.t.l.d.l...w.i.n.d.o.w.s.u.p.d.a.t.e...c.o.m./.m.s.d.o.w.n.l.o.a.d./.u.p.d.a.t.e./.v.3./.s.t.a.t.i.c./.t.r.u.s.t.e.d.r./.e.n./.a.u.t.h.r.o.o.t.s.t.l...c.a.b...".6.4.2.7.f.6.c.2.b.7.8.7.d.b.1.:.0."...
                Process:C:\Users\user\Desktop\MAdjnpU2Xp.exe
                File Type:CSV text
                Category:dropped
                Size (bytes):226
                Entropy (8bit):5.360398796477698
                Encrypted:false
                SSDEEP:6:Q3La/xw5DLIP12MUAvvR+uTL2ql2ABgTv:Q3La/KDLI4MWuPTAv
                MD5:3A8957C6382192B71471BD14359D0B12
                SHA1:71B96C965B65A051E7E7D10F61BEBD8CCBB88587
                SHA-256:282FBEFDDCFAA0A9DBDEE6E123791FC4B8CB870AE9D450E6394D2ACDA3D8F56D
                SHA-512:76C108641F682F785A97017728ED51565C4F74B61B24E190468E3A2843FCC43615C6C8ABE298750AF238D7A44E97C001E3BE427B49900432F905A7CE114AA9AD
                Malicious:true
                Reputation:high, very likely benign file
                Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..
                File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                Entropy (8bit):7.2464499623102805
                TrID:
                • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                • Win32 Executable (generic) a (10002005/4) 49.97%
                • Generic Win/DOS Executable (2004/3) 0.01%
                • DOS Executable Generic (2002/1) 0.01%
                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                File name:MAdjnpU2Xp.exe
                File size:90'112 bytes
                MD5:157a3f7a20b22e78c4d3f7ea88538ff7
                SHA1:5289f49becfab4122f62ac5dc5f4ed4a6430d1e3
                SHA256:0ffd5b54317e01a658684577fee5d5c5f53d5b2e105e7cf8c1cdfd9bd8fee780
                SHA512:cd517f17d8253dfd8681fce97eaf5f591b8a7427cea2de132d68e1bc047227c287e9d5b11890e16503cf730d52c1117a5312b506ddcca4e223413f271f79f652
                SSDEEP:1536:fMQTBX+ACkkNQDm4KWtVeZJmDKmVBo2wJhtycPPsahIP7fsLt/vO35T:fMuzFkeS47tgJeKmfoBJhNPsahIP7fsy
                TLSH:ED93D64B40C0762ECA272A3B84535FC19B737A932D0DDF7964224B4D61682CFE647DAB
                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......g.................V...........t... ........@.. ....................................@................................
                Icon Hash:90cececece8e8eb0
                Entrypoint:0x41749e
                Entrypoint Section:.text
                Digitally signed:false
                Imagebase:0x400000
                Subsystem:windows gui
                Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Time Stamp:0x67C30C96 [Sat Mar 1 13:33:10 2025 UTC]
                TLS Callbacks:
                CLR (.Net) Version:
                OS Version Major:4
                OS Version Minor:0
                File Version Major:4
                File Version Minor:0
                Subsystem Version Major:4
                Subsystem Version Minor:0
                Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                Instruction
                jmp dword ptr [00402000h]
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                NameVirtual AddressVirtual Size Is in Section
                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IMPORT0x174480x53.text
                IMAGE_DIRECTORY_ENTRY_RESOURCE0x180000x552.rsrc
                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                IMAGE_DIRECTORY_ENTRY_BASERELOC0x1a0000xc.reloc
                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                .text0x20000x154a40x15600d5d74c60fcadbdd0df24dcbeb5b6d7adFalse0.6929253472222222data7.297608531471922IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                .rsrc0x180000x5520x600afb933c344bc5da46512319ef8f74810False0.4055989583333333data3.9187396535488928IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                .reloc0x1a0000xc0x2003b5caf221fe36d81ad297934a2e33486False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                NameRVASizeTypeLanguageCountryZLIB Complexity
                RT_VERSION0x180a00x2c8data0.4508426966292135
                RT_MANIFEST0x183680x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5469387755102041
                DLLImport
                mscoree.dll_CorExeMain
                DescriptionData
                Translation0x0000 0x04b0
                CompanyNameMicrosoft .NET Assembly Registration Utility
                FileDescription
                FileVersion0.0.0.0
                InternalNameaitstatic.exe
                LegalCopyright
                OriginalFilenameaitstatic.exe
                ProductVersion0.0.0.0
                Assembly Version0.0.0.0

                Download Network PCAP: filteredfull

                TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                2025-03-04T01:52:15.261108+01002842478ETPRO JA3 Hash - Suspected ASYNCRAT Server Cert (ja3s)1164.92.163.2393898192.168.2.549704TCP
                2025-03-04T01:52:15.261108+01002030673ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server)1164.92.163.2393898192.168.2.549704TCP
                2025-03-04T01:52:15.261108+01002035595ET MALWARE Generic AsyncRAT/zgRAT Style SSL Cert1164.92.163.2393898192.168.2.549704TCP
                2025-03-04T01:52:15.261108+01002035607ET MALWARE Observed Malicious SSL Cert (AsyncRAT Server)1164.92.163.2393898192.168.2.549704TCP
                TimestampSource PortDest PortSource IPDest IP
                Mar 4, 2025 01:52:14.609786034 CET497043898192.168.2.5164.92.163.239
                Mar 4, 2025 01:52:14.614942074 CET389849704164.92.163.239192.168.2.5
                Mar 4, 2025 01:52:14.615056038 CET497043898192.168.2.5164.92.163.239
                Mar 4, 2025 01:52:14.628148079 CET497043898192.168.2.5164.92.163.239
                Mar 4, 2025 01:52:14.633233070 CET389849704164.92.163.239192.168.2.5
                Mar 4, 2025 01:52:15.247400999 CET389849704164.92.163.239192.168.2.5
                Mar 4, 2025 01:52:15.247450113 CET389849704164.92.163.239192.168.2.5
                Mar 4, 2025 01:52:15.247648954 CET497043898192.168.2.5164.92.163.239
                Mar 4, 2025 01:52:15.256038904 CET497043898192.168.2.5164.92.163.239
                Mar 4, 2025 01:52:15.261107922 CET389849704164.92.163.239192.168.2.5
                Mar 4, 2025 01:52:15.440079927 CET389849704164.92.163.239192.168.2.5
                Mar 4, 2025 01:52:15.487679958 CET497043898192.168.2.5164.92.163.239
                Mar 4, 2025 01:52:16.681968927 CET497043898192.168.2.5164.92.163.239
                Mar 4, 2025 01:52:16.687118053 CET389849704164.92.163.239192.168.2.5
                Mar 4, 2025 01:52:16.687207937 CET497043898192.168.2.5164.92.163.239
                Mar 4, 2025 01:52:16.692256927 CET389849704164.92.163.239192.168.2.5
                Mar 4, 2025 01:52:29.801711082 CET497043898192.168.2.5164.92.163.239
                Mar 4, 2025 01:52:29.806787968 CET389849704164.92.163.239192.168.2.5
                Mar 4, 2025 01:52:29.806848049 CET497043898192.168.2.5164.92.163.239
                Mar 4, 2025 01:52:29.811846018 CET389849704164.92.163.239192.168.2.5
                Mar 4, 2025 01:52:30.123770952 CET389849704164.92.163.239192.168.2.5
                Mar 4, 2025 01:52:30.172631979 CET497043898192.168.2.5164.92.163.239
                Mar 4, 2025 01:52:30.267973900 CET389849704164.92.163.239192.168.2.5
                Mar 4, 2025 01:52:30.298475027 CET497043898192.168.2.5164.92.163.239
                Mar 4, 2025 01:52:30.303560972 CET389849704164.92.163.239192.168.2.5
                Mar 4, 2025 01:52:30.303628922 CET497043898192.168.2.5164.92.163.239
                Mar 4, 2025 01:52:30.308595896 CET389849704164.92.163.239192.168.2.5
                Mar 4, 2025 01:52:41.949733019 CET389849704164.92.163.239192.168.2.5
                Mar 4, 2025 01:52:42.003329992 CET497043898192.168.2.5164.92.163.239
                Mar 4, 2025 01:52:42.081604004 CET389849704164.92.163.239192.168.2.5
                Mar 4, 2025 01:52:42.128403902 CET497043898192.168.2.5164.92.163.239
                Mar 4, 2025 01:52:42.926160097 CET497043898192.168.2.5164.92.163.239
                Mar 4, 2025 01:52:42.931364059 CET389849704164.92.163.239192.168.2.5
                Mar 4, 2025 01:52:42.931435108 CET497043898192.168.2.5164.92.163.239
                Mar 4, 2025 01:52:42.936589003 CET389849704164.92.163.239192.168.2.5
                Mar 4, 2025 01:52:43.268027067 CET389849704164.92.163.239192.168.2.5
                Mar 4, 2025 01:52:43.315840960 CET497043898192.168.2.5164.92.163.239
                Mar 4, 2025 01:52:43.408642054 CET389849704164.92.163.239192.168.2.5
                Mar 4, 2025 01:52:43.410826921 CET497043898192.168.2.5164.92.163.239
                Mar 4, 2025 01:52:43.415879965 CET389849704164.92.163.239192.168.2.5
                Mar 4, 2025 01:52:43.415951014 CET497043898192.168.2.5164.92.163.239
                Mar 4, 2025 01:52:43.421026945 CET389849704164.92.163.239192.168.2.5
                Mar 4, 2025 01:52:56.050875902 CET497043898192.168.2.5164.92.163.239
                Mar 4, 2025 01:52:56.055898905 CET389849704164.92.163.239192.168.2.5
                Mar 4, 2025 01:52:56.055963993 CET497043898192.168.2.5164.92.163.239
                Mar 4, 2025 01:52:56.060899019 CET389849704164.92.163.239192.168.2.5
                Mar 4, 2025 01:52:56.376832008 CET389849704164.92.163.239192.168.2.5
                Mar 4, 2025 01:52:56.425363064 CET497043898192.168.2.5164.92.163.239
                Mar 4, 2025 01:52:56.518532991 CET389849704164.92.163.239192.168.2.5
                Mar 4, 2025 01:52:56.520261049 CET497043898192.168.2.5164.92.163.239
                Mar 4, 2025 01:52:56.525289059 CET389849704164.92.163.239192.168.2.5
                Mar 4, 2025 01:52:56.525346994 CET497043898192.168.2.5164.92.163.239
                Mar 4, 2025 01:52:56.530318022 CET389849704164.92.163.239192.168.2.5
                Mar 4, 2025 01:53:09.176001072 CET497043898192.168.2.5164.92.163.239
                Mar 4, 2025 01:53:09.181201935 CET389849704164.92.163.239192.168.2.5
                Mar 4, 2025 01:53:09.181351900 CET497043898192.168.2.5164.92.163.239
                Mar 4, 2025 01:53:09.186799049 CET389849704164.92.163.239192.168.2.5
                Mar 4, 2025 01:53:09.499767065 CET389849704164.92.163.239192.168.2.5
                Mar 4, 2025 01:53:09.550204992 CET497043898192.168.2.5164.92.163.239
                Mar 4, 2025 01:53:09.669048071 CET389849704164.92.163.239192.168.2.5
                Mar 4, 2025 01:53:09.692729950 CET497043898192.168.2.5164.92.163.239
                Mar 4, 2025 01:53:09.697932005 CET389849704164.92.163.239192.168.2.5
                Mar 4, 2025 01:53:09.698010921 CET497043898192.168.2.5164.92.163.239
                Mar 4, 2025 01:53:09.703088999 CET389849704164.92.163.239192.168.2.5
                Mar 4, 2025 01:53:11.954149008 CET389849704164.92.163.239192.168.2.5
                Mar 4, 2025 01:53:12.003344059 CET497043898192.168.2.5164.92.163.239
                Mar 4, 2025 01:53:12.096697092 CET389849704164.92.163.239192.168.2.5
                Mar 4, 2025 01:53:12.143960953 CET497043898192.168.2.5164.92.163.239
                Mar 4, 2025 01:53:22.300976038 CET497043898192.168.2.5164.92.163.239
                Mar 4, 2025 01:53:22.306117058 CET389849704164.92.163.239192.168.2.5
                Mar 4, 2025 01:53:22.306236029 CET497043898192.168.2.5164.92.163.239
                Mar 4, 2025 01:53:22.311347961 CET389849704164.92.163.239192.168.2.5
                Mar 4, 2025 01:53:22.658247948 CET389849704164.92.163.239192.168.2.5
                Mar 4, 2025 01:53:22.706486940 CET497043898192.168.2.5164.92.163.239
                Mar 4, 2025 01:53:22.800137043 CET389849704164.92.163.239192.168.2.5
                Mar 4, 2025 01:53:22.801948071 CET497043898192.168.2.5164.92.163.239
                Mar 4, 2025 01:53:22.807102919 CET389849704164.92.163.239192.168.2.5
                Mar 4, 2025 01:53:22.807183981 CET497043898192.168.2.5164.92.163.239
                Mar 4, 2025 01:53:22.812292099 CET389849704164.92.163.239192.168.2.5
                Mar 4, 2025 01:53:35.425898075 CET497043898192.168.2.5164.92.163.239
                Mar 4, 2025 01:53:35.431171894 CET389849704164.92.163.239192.168.2.5
                Mar 4, 2025 01:53:35.431395054 CET497043898192.168.2.5164.92.163.239
                Mar 4, 2025 01:53:35.436449051 CET389849704164.92.163.239192.168.2.5
                Mar 4, 2025 01:53:35.756277084 CET389849704164.92.163.239192.168.2.5
                Mar 4, 2025 01:53:35.800261974 CET497043898192.168.2.5164.92.163.239
                Mar 4, 2025 01:53:35.894412994 CET389849704164.92.163.239192.168.2.5
                Mar 4, 2025 01:53:35.896178961 CET497043898192.168.2.5164.92.163.239
                Mar 4, 2025 01:53:35.901248932 CET389849704164.92.163.239192.168.2.5
                Mar 4, 2025 01:53:35.901328087 CET497043898192.168.2.5164.92.163.239
                Mar 4, 2025 01:53:35.906356096 CET389849704164.92.163.239192.168.2.5
                Mar 4, 2025 01:53:41.968741894 CET389849704164.92.163.239192.168.2.5
                Mar 4, 2025 01:53:42.019007921 CET497043898192.168.2.5164.92.163.239
                Mar 4, 2025 01:53:42.097666979 CET389849704164.92.163.239192.168.2.5
                Mar 4, 2025 01:53:42.144157887 CET497043898192.168.2.5164.92.163.239
                Mar 4, 2025 01:53:48.550873995 CET497043898192.168.2.5164.92.163.239
                Mar 4, 2025 01:53:48.562475920 CET389849704164.92.163.239192.168.2.5
                Mar 4, 2025 01:53:48.562653065 CET497043898192.168.2.5164.92.163.239
                Mar 4, 2025 01:53:48.569953918 CET389849704164.92.163.239192.168.2.5
                Mar 4, 2025 01:53:48.946065903 CET389849704164.92.163.239192.168.2.5
                Mar 4, 2025 01:53:48.987720966 CET497043898192.168.2.5164.92.163.239
                Mar 4, 2025 01:53:49.112689018 CET389849704164.92.163.239192.168.2.5
                Mar 4, 2025 01:53:49.114450932 CET497043898192.168.2.5164.92.163.239
                Mar 4, 2025 01:53:49.119498968 CET389849704164.92.163.239192.168.2.5
                Mar 4, 2025 01:53:49.120342016 CET497043898192.168.2.5164.92.163.239
                Mar 4, 2025 01:53:49.125690937 CET389849704164.92.163.239192.168.2.5
                Mar 4, 2025 01:54:01.675724030 CET497043898192.168.2.5164.92.163.239
                Mar 4, 2025 01:54:01.681030035 CET389849704164.92.163.239192.168.2.5
                Mar 4, 2025 01:54:01.682485104 CET497043898192.168.2.5164.92.163.239
                Mar 4, 2025 01:54:01.687565088 CET389849704164.92.163.239192.168.2.5
                Mar 4, 2025 01:54:02.000709057 CET389849704164.92.163.239192.168.2.5
                Mar 4, 2025 01:54:02.050255060 CET497043898192.168.2.5164.92.163.239
                Mar 4, 2025 01:54:02.144678116 CET389849704164.92.163.239192.168.2.5
                Mar 4, 2025 01:54:02.147219896 CET497043898192.168.2.5164.92.163.239
                Mar 4, 2025 01:54:02.152337074 CET389849704164.92.163.239192.168.2.5
                Mar 4, 2025 01:54:02.152473927 CET497043898192.168.2.5164.92.163.239
                Mar 4, 2025 01:54:02.157527924 CET389849704164.92.163.239192.168.2.5
                Mar 4, 2025 01:54:11.975524902 CET389849704164.92.163.239192.168.2.5
                Mar 4, 2025 01:54:12.019022942 CET497043898192.168.2.5164.92.163.239
                Mar 4, 2025 01:54:12.113581896 CET389849704164.92.163.239192.168.2.5
                Mar 4, 2025 01:54:12.159632921 CET497043898192.168.2.5164.92.163.239
                Mar 4, 2025 01:54:15.019376993 CET497043898192.168.2.5164.92.163.239
                Mar 4, 2025 01:54:15.024662018 CET389849704164.92.163.239192.168.2.5
                Mar 4, 2025 01:54:15.028160095 CET497043898192.168.2.5164.92.163.239
                Mar 4, 2025 01:54:15.035207987 CET389849704164.92.163.239192.168.2.5
                Mar 4, 2025 01:54:15.334325075 CET389849704164.92.163.239192.168.2.5
                Mar 4, 2025 01:54:15.378504038 CET497043898192.168.2.5164.92.163.239
                Mar 4, 2025 01:54:15.472992897 CET389849704164.92.163.239192.168.2.5
                Mar 4, 2025 01:54:15.473735094 CET497043898192.168.2.5164.92.163.239
                Mar 4, 2025 01:54:15.478897095 CET389849704164.92.163.239192.168.2.5
                Mar 4, 2025 01:54:15.478986979 CET497043898192.168.2.5164.92.163.239
                Mar 4, 2025 01:54:15.484134912 CET389849704164.92.163.239192.168.2.5
                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                Mar 4, 2025 01:52:15.571625948 CET1.1.1.1192.168.2.50xb902No error (0)edge.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com217.20.57.19A (IP address)IN (0x0001)false
                Mar 4, 2025 01:52:15.571625948 CET1.1.1.1192.168.2.50xb902No error (0)edge.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com217.20.57.36A (IP address)IN (0x0001)false
                Mar 4, 2025 01:52:15.571625948 CET1.1.1.1192.168.2.50xb902No error (0)edge.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com217.20.57.34A (IP address)IN (0x0001)false
                Mar 4, 2025 01:52:15.571625948 CET1.1.1.1192.168.2.50xb902No error (0)edge.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com217.20.57.20A (IP address)IN (0x0001)false
                Mar 4, 2025 01:52:15.571625948 CET1.1.1.1192.168.2.50xb902No error (0)edge.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com84.201.210.39A (IP address)IN (0x0001)false
                Mar 4, 2025 01:52:15.571625948 CET1.1.1.1192.168.2.50xb902No error (0)edge.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com217.20.57.18A (IP address)IN (0x0001)false
                Mar 4, 2025 01:52:15.571625948 CET1.1.1.1192.168.2.50xb902No error (0)edge.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com84.201.210.23A (IP address)IN (0x0001)false
                Mar 4, 2025 01:52:15.571625948 CET1.1.1.1192.168.2.50xb902No error (0)edge.ds-c7110-microsoft.global.dns.qwilted-cds.cqloud.com217.20.57.35A (IP address)IN (0x0001)false
                050100s020406080100

                Click to jump to process

                050100s0.00102030MB

                Click to jump to process

                • File
                • Registry
                • Network

                Click to dive into process behavior distribution

                Click to jump to process

                Target ID:0
                Start time:19:52:09
                Start date:03/03/2025
                Path:C:\Users\user\Desktop\MAdjnpU2Xp.exe
                Wow64 process (32bit):true
                Commandline:"C:\Users\user\Desktop\MAdjnpU2Xp.exe"
                Imagebase:0x160000
                File size:90'112 bytes
                MD5 hash:157A3F7A20B22E78C4D3F7EA88538FF7
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000000.00000002.2061714758.00000000024A1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                • Rule: Windows_Trojan_Asyncrat_11a11ba1, Description: unknown, Source: 00000000.00000002.2061714758.00000000024A1000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                • Rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse, Description: Detects file containing reversed ASEP Autorun registry keys, Source: 00000000.00000002.2061714758.00000000024A1000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                Reputation:low
                Has exited:true

                Target ID:1
                Start time:19:52:09
                Start date:03/03/2025
                Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                Wow64 process (32bit):true
                Commandline:#system32
                Imagebase:0xee0000
                File size:65'440 bytes
                MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000001.00000002.3303566672.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                • Rule: INDICATOR_SUSPICIOUS_EXE_ASEP_REG_Reverse, Description: Detects file containing reversed ASEP Autorun registry keys, Source: 00000001.00000002.3303566672.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: ditekSHen
                • Rule: JoeSecurity_AsyncRAT, Description: Yara detected AsyncRAT, Source: 00000001.00000002.3305094853.0000000003331000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                Reputation:high
                Has exited:false
                There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
                There is hidden Windows Behavior. Click on Show Windows Behavior to show it.

                Execution Graph

                Execution Coverage

                Dynamic/Packed Code Coverage

                Signature Coverage

                Execution Coverage:37.3%
                Dynamic/Decrypted Code Coverage:100%
                Signature Coverage:0%
                Total number of Nodes:55
                Total number of Limit Nodes:3
                Show Legend
                Hide Nodes/Edges
                execution_graph 530 22f120c 531 22f1218 CreateProcessW 530->531 533 22f1369 531->533 488 22f0848 489 22f0852 488->489 494 22f09c2 489->494 490 22f089d 493 22f0c17 7 API calls 490->493 491 22f08c9 493->491 495 22f0a09 494->495 498 22f0cd1 495->498 497 22f0bd5 497->497 499 22f0cf3 498->499 518 22f0548 499->518 501 22f0d74 502 22f0554 Wow64SetThreadContext 501->502 512 22f0ffa 501->512 503 22f0dcc 502->503 504 22f0560 ReadProcessMemory 503->504 503->512 505 22f0e0a 504->505 506 22f0e9e VirtualAllocEx 505->506 505->512 508 22f0ee5 506->508 507 22f056c WriteProcessMemory 507->512 509 22f056c WriteProcessMemory 508->509 508->512 510 22f0f1c 509->510 511 22f056c WriteProcessMemory 510->511 510->512 513 22f0f6e 511->513 512->507 517 22f1018 512->517 513->512 514 22f0578 Wow64SetThreadContext 513->514 515 22f0fb8 514->515 515->512 516 22f0fc0 ResumeThread 515->516 516->512 517->497 519 22f1218 CreateProcessW 518->519 521 22f1369 519->521 526 22f15b8 527 22f1608 526->527 528 22f1610 WriteProcessMemory 526->528 527->528 529 22f164b 528->529 538 22f0598 539 22f059d 538->539 542 22f09c2 7 API calls 539->542 540 22f089d 544 22f0c17 540->544 542->540 545 22f0c39 544->545 546 22f08c9 545->546 547 22f0cd1 7 API calls 545->547 547->545 548 22f14f8 ReadProcessMemory 549 22f1580 548->549 550 22f1443 551 22f148a 550->551 552 22f1494 Wow64SetThreadContext 550->552 551->552 553 22f14c2 552->553 534 22f0b81 535 22f0b78 534->535 536 22f0cd1 7 API calls 535->536 537 22f0bd5 536->537 537->537

                Callgraph

                Hide Legend
                • Executed
                • Not Executed
                • Opacity -> Relevance
                • Disassembly available
                callgraph 0 Function_022F052D 1 Function_022F012C 2 Function_022F0529 3 Function_022F0525 4 Function_022F0521 5 Function_022F0138 6 Function_022F0434 7 Function_022F0533 8 Function_022F0230 9 Function_022F050D 10 Function_022F120C 11 Function_022F010C 12 Function_022F0509 13 Function_022F0C09 14 Function_022F0505 15 Function_022F0C02 16 Function_022F0501 17 Function_022F0100 18 Function_022F021D 19 Function_022F051D 20 Function_022F011C 21 Function_022F0519 22 Function_022F0C17 102 Function_022F0CD1 22->102 23 Function_022F0515 24 Function_022F0511 25 Function_022F056C 26 Function_022F0168 27 Function_022F0468 28 Function_022F0264 29 Function_022F0060 30 Function_022F0560 31 Function_022F027C 32 Function_022F0C78 33 Function_022F0578 34 Function_022F0178 35 Function_022F0474 36 Function_022F0270 37 Function_022F0070 38 Function_022F004D 39 Function_022F0148 40 Function_022F0848 40->22 95 Function_022F09C2 40->95 41 Function_022F0548 42 Function_022F1443 43 Function_022F045C 44 Function_022F0158 45 Function_022F0258 46 Function_022F0554 47 Function_022F02AC 48 Function_022F0BAC 48->102 49 Function_022F01A8 50 Function_022F09A7 51 Function_022F0BA5 52 Function_022F04A4 53 Function_022F00A0 54 Function_022F02A0 55 Function_022F11BE 67 Function_022F0584 55->67 56 Function_022F00BC 57 Function_022F04BC 58 Function_022F01B8 59 Function_022F02B8 60 Function_022F15B8 61 Function_022F04B5 62 Function_022F00B0 63 Function_022F048C 64 Function_022F0C88 65 Function_022F0288 66 Function_022F0184 68 Function_022F0B81 68->102 69 Function_022F0080 70 Function_022F0480 71 Function_022F019C 72 Function_022F0498 73 Function_022F0598 73->22 73->95 74 Function_022F0294 75 Function_022F0090 76 Function_022F0190 77 Function_022F04ED 78 Function_022F01E4 79 Function_022F00E4 80 Function_022F04E0 81 Function_022F0BFF 82 Function_022F04FD 83 Function_022F01FC 84 Function_022F04F9 85 Function_022F14F8 86 Function_022F04F5 87 Function_022F04F1 88 Function_022F00F0 89 Function_022F01F0 90 Function_022F08CF 91 Function_022F13CF 92 Function_022F00C8 93 Function_022F04C8 94 Function_022F01C4 95->26 95->44 95->102 96 Function_022F13DF 97 Function_022F0BDC 98 Function_022F13D8 99 Function_022F00D4 100 Function_022F01D4 101 Function_022F04D4 102->25 102->30 102->33 102->41 102->46

                Executed Functions

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 0 22f0cd1-22f0d76 call 22f0548 9 22f0d7c-22f0db5 0->9 10 22f1124-22f1137 0->10 16 22f113e 9->16 17 22f0dbb-22f0dce call 22f0554 9->17 10->16 19 22f1143-22f1176 16->19 21 22f110a-22f111d 17->21 22 22f0dd4-22f0dde 17->22 35 22f1178-22f11a8 call 22f056c 19->35 36 22f11b5-22f11b8 19->36 21->10 22->16 24 22f0de4-22f0e0c call 22f0560 22->24 29 22f0e12-22f0e20 24->29 30 22f10f0-22f1103 24->30 33 22f0e22-22f0e5d 29->33 34 22f0e80-22f0ee3 VirtualAllocEx 29->34 30->21 42 22f0e5f-22f0e65 33->42 43 22f0e66-22f0e7a 33->43 51 22f0eec-22f0f03 34->51 52 22f0ee5-22f0eeb 34->52 53 22f11ad-22f11af 35->53 40 22f11e0-22f11ff 36->40 42->43 43->34 47 22f10d6-22f10e9 43->47 47->30 54 22f10bc-22f10cf 51->54 55 22f0f09-22f0f1e call 22f056c 51->55 52->51 53->36 57 22f103a-22f104d 53->57 54->47 63 22f0f24-22f0f4b 55->63 64 22f10a2-22f10b5 55->64 72 22f1054-22f1067 57->72 63->19 70 22f0f51-22f0f70 call 22f056c 63->70 64->54 70->72 78 22f0f76-22f0f8d 70->78 79 22f106e-22f1081 72->79 81 22f0f8f-22f0f92 78->81 82 22f0f95-22f0fa4 78->82 91 22f1088-22f109b 79->91 81->82 82->16 84 22f0faa-22f0fba call 22f0578 82->84 84->79 88 22f0fc0-22f0ff8 ResumeThread 84->88 89 22f0ffa-22f1000 88->89 90 22f1001-22f1016 88->90 89->90 90->91 92 22f1018-22f1026 90->92 91->64 92->40 94 22f102c-22f1035 92->94 94->40
                APIs
                  • Part of subcall function 022F0548: CreateProcessW.KERNELBASE(00000000,?,00000009,?,?,?,?,?,?,?), ref: 022F1354
                  • Part of subcall function 022F0554: Wow64SetThreadContext.KERNEL32(?,00000000,?,?,?,?,00000000,?,?,?,022F0DCC), ref: 022F14B3
                  • Part of subcall function 022F0560: ReadProcessMemory.KERNELBASE(?,?,?,?,00010002,?,?,?,?,?,?,022F0E0A,?,00000004,?), ref: 022F1571
                • VirtualAllocEx.KERNELBASE(?,?,00000000,00003000,00000040), ref: 022F0ECF
                • ResumeThread.KERNELBASE(?), ref: 022F0FE4
                Memory Dump Source
                • Source File: 00000000.00000002.2061584689.00000000022F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022F0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_22f0000_MAdjnpU2Xp.jbxd
                Similarity
                • API ID: ProcessThread$AllocContextCreateMemoryReadResumeVirtualWow64
                • String ID:
                • API String ID: 2498194165-0
                • Opcode ID: b3b9580a6150a956f27072ec4300a55592b40500c467b91bdc9956f80c019cde
                • Instruction ID: 63562a5866d9a32b954b83e28b4925d14f6942c01c2763537b17f27166003aac
                • Opcode Fuzzy Hash: b3b9580a6150a956f27072ec4300a55592b40500c467b91bdc9956f80c019cde
                • Instruction Fuzzy Hash: 07D19C71E102198BDB64DFA8C890BAEBBB2BF84304F548168D509EB395DF349E45CB91

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 147 22f120c-22f1291 149 22f1299-22f12a0 147->149 150 22f1293-22f1296 147->150 151 22f12ab-22f12c1 149->151 152 22f12a2-22f12a8 149->152 150->149 153 22f12cc-22f1367 CreateProcessW 151->153 154 22f12c3-22f12c9 151->154 152->151 156 22f1369-22f136f 153->156 157 22f1370-22f13e4 153->157 154->153 156->157 165 22f13f6-22f13fd 157->165 166 22f13e6-22f13ec 157->166 167 22f13ff-22f140e 165->167 168 22f1414 165->168 166->165 167->168 170 22f1415 168->170 170->170
                APIs
                • CreateProcessW.KERNELBASE(00000000,?,00000009,?,?,?,?,?,?,?), ref: 022F1354
                Memory Dump Source
                • Source File: 00000000.00000002.2061584689.00000000022F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022F0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_22f0000_MAdjnpU2Xp.jbxd
                Similarity
                • API ID: CreateProcess
                • String ID:
                • API String ID: 963392458-0
                • Opcode ID: eacd5e4ace9464c23b9b430f4622d15806def6c6d1c80315b7bfa9ceca54d337
                • Instruction ID: 1eb63a7f5058e6728b6b3126df4a47524e19548708ace82ec89ab18264d6068c
                • Opcode Fuzzy Hash: eacd5e4ace9464c23b9b430f4622d15806def6c6d1c80315b7bfa9ceca54d337
                • Instruction Fuzzy Hash: 17513671901329DFDF25CFA9C944BDDBBB1BF49304F0080AAE508AB254C7759A88CF51

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 171 22f0548-22f1291 173 22f1299-22f12a0 171->173 174 22f1293-22f1296 171->174 175 22f12ab-22f12c1 173->175 176 22f12a2-22f12a8 173->176 174->173 177 22f12cc-22f1367 CreateProcessW 175->177 178 22f12c3-22f12c9 175->178 176->175 180 22f1369-22f136f 177->180 181 22f1370-22f13e4 177->181 178->177 180->181 189 22f13f6-22f13fd 181->189 190 22f13e6-22f13ec 181->190 191 22f13ff-22f140e 189->191 192 22f1414 189->192 190->189 191->192 194 22f1415 192->194 194->194
                APIs
                • CreateProcessW.KERNELBASE(00000000,?,00000009,?,?,?,?,?,?,?), ref: 022F1354
                Memory Dump Source
                • Source File: 00000000.00000002.2061584689.00000000022F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022F0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_22f0000_MAdjnpU2Xp.jbxd
                Similarity
                • API ID: CreateProcess
                • String ID:
                • API String ID: 963392458-0
                • Opcode ID: 0ebe38bd9af08e3cb60ebc563a0c3a235eff73c0243417fa4f0751aa790c7223
                • Instruction ID: 426cf42c88b732edd805955ed5d8cdce752a63fda42ef28b9f9f7a273003e9d4
                • Opcode Fuzzy Hash: 0ebe38bd9af08e3cb60ebc563a0c3a235eff73c0243417fa4f0751aa790c7223
                • Instruction Fuzzy Hash: 42511571900229DFDF64CF99C944BDDBBB6FF49304F1080AAE608AB254D7759A88CF91

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 195 22f056c-22f1606 197 22f1608-22f160e 195->197 198 22f1610-22f1649 WriteProcessMemory 195->198 197->198 199 22f164b-22f1651 198->199 200 22f1652-22f1673 198->200 199->200
                APIs
                • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?,?,?,?,00000000,00000000,?,022F11AD,?,?,00000000), ref: 022F163C
                Memory Dump Source
                • Source File: 00000000.00000002.2061584689.00000000022F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022F0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_22f0000_MAdjnpU2Xp.jbxd
                Similarity
                • API ID: MemoryProcessWrite
                • String ID:
                • API String ID: 3559483778-0
                • Opcode ID: 8b1a95b2d9635bc9a47f7a4c203387f5c4a28c9a76773a9b6c0ff540a4f4667f
                • Instruction ID: 2c3166e12c40691c02df4d5220828520446d36c4c5c78c4683c82d3b2345fec2
                • Opcode Fuzzy Hash: 8b1a95b2d9635bc9a47f7a4c203387f5c4a28c9a76773a9b6c0ff540a4f4667f
                • Instruction Fuzzy Hash: AC21D5B5910349DFDB10DF99C884BDEFBF4FB48314F54842AEA18A7240D378A954CBA5

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 202 22f15b8-22f1606 203 22f1608-22f160e 202->203 204 22f1610-22f1649 WriteProcessMemory 202->204 203->204 205 22f164b-22f1651 204->205 206 22f1652-22f1673 204->206 205->206
                APIs
                • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?,?,?,?,00000000,00000000,?,022F11AD,?,?,00000000), ref: 022F163C
                Memory Dump Source
                • Source File: 00000000.00000002.2061584689.00000000022F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022F0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_22f0000_MAdjnpU2Xp.jbxd
                Similarity
                • API ID: MemoryProcessWrite
                • String ID:
                • API String ID: 3559483778-0
                • Opcode ID: 2970d6e4330452337fd80acb18d2ba596ba2f4a6c9d3e520948212111980b0c0
                • Instruction ID: 667115898f28ee50b20fb7d3755dc2463f30e5b9d3c40236a9c9fb9cd261bc3d
                • Opcode Fuzzy Hash: 2970d6e4330452337fd80acb18d2ba596ba2f4a6c9d3e520948212111980b0c0
                • Instruction Fuzzy Hash: 1F21F0B5901249DFDB10CFAAD884ADEFBF4FB48314F54842AE958A7250D378A944CFA1

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 208 22f0560-22f157e ReadProcessMemory 210 22f1587-22f15a8 208->210 211 22f1580-22f1586 208->211 211->210
                APIs
                • ReadProcessMemory.KERNELBASE(?,?,?,?,00010002,?,?,?,?,?,?,022F0E0A,?,00000004,?), ref: 022F1571
                Memory Dump Source
                • Source File: 00000000.00000002.2061584689.00000000022F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022F0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_22f0000_MAdjnpU2Xp.jbxd
                Similarity
                • API ID: MemoryProcessRead
                • String ID:
                • API String ID: 1726664587-0
                • Opcode ID: 07f5c84af1c3563e269ba96771fcd393400f92954fe9b7a74a9dc8fe6bc4f900
                • Instruction ID: 50898062c96132222c6bb0edcdfb6e65203512821b1f0f208fafd51186698dff
                • Opcode Fuzzy Hash: 07f5c84af1c3563e269ba96771fcd393400f92954fe9b7a74a9dc8fe6bc4f900
                • Instruction Fuzzy Hash: ED21E4B5900349DFCB10DF9AC884BDEFBF4FB08310F50842AE918A7250D378A954CBA5

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 220 22f0578-22f1488 222 22f148a-22f1492 220->222 223 22f1494-22f14c0 Wow64SetThreadContext 220->223 222->223 224 22f14c9-22f14ea 223->224 225 22f14c2-22f14c8 223->225 225->224
                APIs
                • Wow64SetThreadContext.KERNEL32(?,00000000,?,?,?,?,00000000,?,?,?,022F0DCC), ref: 022F14B3
                Memory Dump Source
                • Source File: 00000000.00000002.2061584689.00000000022F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022F0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_22f0000_MAdjnpU2Xp.jbxd
                Similarity
                • API ID: ContextThreadWow64
                • String ID:
                • API String ID: 983334009-0
                • Opcode ID: ae5a28e08f93101b226649b08ffb1d24239242b1710d8448f10e0e711b70dabc
                • Instruction ID: 73544bd4d3388fbbf2cbbc1a69642fc441f9126a921b9d48f06016a2604f09c7
                • Opcode Fuzzy Hash: ae5a28e08f93101b226649b08ffb1d24239242b1710d8448f10e0e711b70dabc
                • Instruction Fuzzy Hash: E51123B5D106498FCB10DF9AC944BEEFBF8FB88320F548029E518A3200D378A545CFA1

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 213 22f0554-22f1488 215 22f148a-22f1492 213->215 216 22f1494-22f14c0 Wow64SetThreadContext 213->216 215->216 217 22f14c9-22f14ea 216->217 218 22f14c2-22f14c8 216->218 218->217
                APIs
                • Wow64SetThreadContext.KERNEL32(?,00000000,?,?,?,?,00000000,?,?,?,022F0DCC), ref: 022F14B3
                Memory Dump Source
                • Source File: 00000000.00000002.2061584689.00000000022F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022F0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_22f0000_MAdjnpU2Xp.jbxd
                Similarity
                • API ID: ContextThreadWow64
                • String ID:
                • API String ID: 983334009-0
                • Opcode ID: 2fc0a2aed4859a6399894ae0d496480ee632b7d8014aa7e1261d9c95be951632
                • Instruction ID: b4f33706f326897259beca470b33052646a4c3ffd0d945bdc4b93dd0075c5730
                • Opcode Fuzzy Hash: 2fc0a2aed4859a6399894ae0d496480ee632b7d8014aa7e1261d9c95be951632
                • Instruction Fuzzy Hash: D31112B59106498FCB10DF9AC944BEEFBF8EB88320F548069E518A7200D378A545CFA1

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 227 22f14f8-22f157e ReadProcessMemory 228 22f1587-22f15a8 227->228 229 22f1580-22f1586 227->229 229->228
                APIs
                • ReadProcessMemory.KERNELBASE(?,?,?,?,00010002,?,?,?,?,?,?,022F0E0A,?,00000004,?), ref: 022F1571
                Memory Dump Source
                • Source File: 00000000.00000002.2061584689.00000000022F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022F0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_22f0000_MAdjnpU2Xp.jbxd
                Similarity
                • API ID: MemoryProcessRead
                • String ID:
                • API String ID: 1726664587-0
                • Opcode ID: b0ab6657a07ac75bf4a0ff5275a3dd46bcbbfb1c84b46dd2351ea9ada97ea13c
                • Instruction ID: 26dd7ebd18df6300faf8b5304977f6e8fedd7b15ca39fafab9cfe519adc7373c
                • Opcode Fuzzy Hash: b0ab6657a07ac75bf4a0ff5275a3dd46bcbbfb1c84b46dd2351ea9ada97ea13c
                • Instruction Fuzzy Hash: 1B21E4B5C012499FDB10CF9AD885ADEFBF4FB48310F10856AE958A3251C3789544CFA5

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 231 22f1443-22f1488 232 22f148a-22f1492 231->232 233 22f1494-22f14c0 Wow64SetThreadContext 231->233 232->233 234 22f14c9-22f14ea 233->234 235 22f14c2-22f14c8 233->235 235->234
                APIs
                • Wow64SetThreadContext.KERNEL32(?,00000000,?,?,?,?,00000000,?,?,?,022F0DCC), ref: 022F14B3
                Memory Dump Source
                • Source File: 00000000.00000002.2061584689.00000000022F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 022F0000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_22f0000_MAdjnpU2Xp.jbxd
                Similarity
                • API ID: ContextThreadWow64
                • String ID:
                • API String ID: 983334009-0
                • Opcode ID: a2f5f6f8e3604fe64b381cac476f2bd8a66c55446f65276acc27efd7730b4e30
                • Instruction ID: 29ee85bf6ddfcbf0a38a50dbcc6ccd0fbbd49f84e7ca47fa45258e70ee10a134
                • Opcode Fuzzy Hash: a2f5f6f8e3604fe64b381cac476f2bd8a66c55446f65276acc27efd7730b4e30
                • Instruction Fuzzy Hash: E01112B6D042498FDB10CFAAC884BEEFBF4AB88210F14816AD458A3241D3789545CFA1

                Executed Functions

                Memory Dump Source
                • Source File: 00000001.00000002.3304334051.0000000001580000.00000040.00000800.00020000.00000000.sdmp, Offset: 01580000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_1580000_RegAsm.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 3ceba6f55af4677ee64f4fe4040f988fdc44f2ad472a40c15342382e9dac8133
                • Instruction ID: 14cc417e3aa135af9240472b69557e3ad9fd5a80f877a6af203074548c23d9c5
                • Opcode Fuzzy Hash: 3ceba6f55af4677ee64f4fe4040f988fdc44f2ad472a40c15342382e9dac8133
                • Instruction Fuzzy Hash: F9B14C70E10209CFDF14DFA9C98579EBBF2BF88314F148529E815BB294EB749846CB85
                Memory Dump Source
                • Source File: 00000001.00000002.3304334051.0000000001580000.00000040.00000800.00020000.00000000.sdmp, Offset: 01580000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_1580000_RegAsm.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 74afd6ff2cacbddea4287fd5e64fb93add4c26b1ff195cba4df78a1953c81bf4
                • Instruction ID: de45a67596f71bfa202fb772b79acb245ec357a5a2db083e1a372b1889acaee3
                • Opcode Fuzzy Hash: 74afd6ff2cacbddea4287fd5e64fb93add4c26b1ff195cba4df78a1953c81bf4
                • Instruction Fuzzy Hash: E6B12AB0E102098FDF14EFA9D9857ADBBF2BF88314F148529D419BB254EB749885CB81
                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.3304334051.0000000001580000.00000040.00000800.00020000.00000000.sdmp, Offset: 01580000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_1580000_RegAsm.jbxd
                Similarity
                • API ID:
                • String ID: a]q$ a]q$,$xaq
                • API String ID: 0-452644037
                • Opcode ID: 33561871381e650c006b47982b52de5486b0a9827010f833d1aeb43446de94ca
                • Instruction ID: cff78d03bf56ec73adff465cfb1f3998709ce31bf33970feb84bf1bc80295262
                • Opcode Fuzzy Hash: 33561871381e650c006b47982b52de5486b0a9827010f833d1aeb43446de94ca
                • Instruction Fuzzy Hash: 0B027B707002059FD714AF68D494B2E7BE6FF88315F248969D406AF3A9DBB89C46CB81
                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.3304334051.0000000001580000.00000040.00000800.00020000.00000000.sdmp, Offset: 01580000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_1580000_RegAsm.jbxd
                Similarity
                • API ID:
                • String ID: a]q$ a]q$xaq
                • API String ID: 0-315583803
                • Opcode ID: cda3ce86e48ef2c2bfba03df9d4c1b231d9d5fcf122c651a6fac6ae6d282788c
                • Instruction ID: 4575408b52e89086a2301d51ca7fc9fb013c79a0224c47219eda44ac611cd346
                • Opcode Fuzzy Hash: cda3ce86e48ef2c2bfba03df9d4c1b231d9d5fcf122c651a6fac6ae6d282788c
                • Instruction Fuzzy Hash: 9561AA707402018FD714AF29D484B2E7BE6FF89704F158929D506AF3A8DBB59C4ACB80
                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.3304334051.0000000001580000.00000040.00000800.00020000.00000000.sdmp, Offset: 01580000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_1580000_RegAsm.jbxd
                Similarity
                • API ID:
                • String ID: xaq$+
                • API String ID: 0-1432214038
                • Opcode ID: 9c5c3b966ccc079691b26a80a3d3439ef089689c509e0ff03da45da78c6fcb06
                • Instruction ID: 89746ab5fbe258c5ff5323bf3c6010d23543e5385e2a3c50bd3cfddccfc31a8b
                • Opcode Fuzzy Hash: 9c5c3b966ccc079691b26a80a3d3439ef089689c509e0ff03da45da78c6fcb06
                • Instruction Fuzzy Hash: 18918A70502201CFD739EF2CE4047183FE1B785719F9E852ACA819BAA8D7B59A45CF92
                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.3304334051.0000000001580000.00000040.00000800.00020000.00000000.sdmp, Offset: 01580000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_1580000_RegAsm.jbxd
                Similarity
                • API ID:
                • String ID: (aq$Te]q
                • API String ID: 0-2961548996
                • Opcode ID: 2beb31f4506fd48b3a688a56b2738665879264bfb70ea91e65f5130ad5c2e8c2
                • Instruction ID: 08ee58e532eee721df6f3d2cfd31268b757b3a4323d1f2187d932c2dec516d34
                • Opcode Fuzzy Hash: 2beb31f4506fd48b3a688a56b2738665879264bfb70ea91e65f5130ad5c2e8c2
                • Instruction Fuzzy Hash: BA517F70B505158FCB54EF69C494A9DBBF2FF89710F2581AAE406EB3A5CA75DC02CB80
                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.3304334051.0000000001580000.00000040.00000800.00020000.00000000.sdmp, Offset: 01580000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_1580000_RegAsm.jbxd
                Similarity
                • API ID:
                • String ID: Haq$dLcq
                • API String ID: 0-1713614415
                • Opcode ID: ac4bf95799c07a03c376ed8d5e490968374dcd3e3794769edcf95ec5726d62e6
                • Instruction ID: db98d729e04741465ab09a8f853d2796ff77dce3fecdfa927146ec5b4dbd3a16
                • Opcode Fuzzy Hash: ac4bf95799c07a03c376ed8d5e490968374dcd3e3794769edcf95ec5726d62e6
                • Instruction Fuzzy Hash: DB51B0307042048FDB189F69D494AAEBBF6FF89310F1585AAE405EB3A1CB759C05CB90
                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.3304334051.0000000001580000.00000040.00000800.00020000.00000000.sdmp, Offset: 01580000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_1580000_RegAsm.jbxd
                Similarity
                • API ID:
                • String ID: $]q$$]q
                • API String ID: 0-127220927
                • Opcode ID: 1c567b754fb346e20d29d1db9038c71cee91b4aa1b07eb923dce4b85e1c7ab3b
                • Instruction ID: b093ca36e746b6984de5cd364074ed444df56e8b33cce6e128a4e31a8a2b6755
                • Opcode Fuzzy Hash: 1c567b754fb346e20d29d1db9038c71cee91b4aa1b07eb923dce4b85e1c7ab3b
                • Instruction Fuzzy Hash: 55418C34708401DBC3296F6A908843DBBB7BFC47093689858E156AB798CF329C53CB95
                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.3304334051.0000000001580000.00000040.00000800.00020000.00000000.sdmp, Offset: 01580000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_1580000_RegAsm.jbxd
                Similarity
                • API ID:
                • String ID: LR]q
                • API String ID: 0-3081347316
                • Opcode ID: d4377f1f39367df415e6551dc7e2fc6e6a1c6b3581428787ab1e08e2837f7532
                • Instruction ID: 4250e5eb0d8bd00822cc34216f11130de5e5aac5186d7b19ac2c401d939cfdfe
                • Opcode Fuzzy Hash: d4377f1f39367df415e6551dc7e2fc6e6a1c6b3581428787ab1e08e2837f7532
                • Instruction Fuzzy Hash: A211A170B052919FC745EB7888117AE3BF1FFAA200F54419ED045EF2A2E7745D018791
                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.3304334051.0000000001580000.00000040.00000800.00020000.00000000.sdmp, Offset: 01580000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_1580000_RegAsm.jbxd
                Similarity
                • API ID:
                • String ID: ./\
                • API String ID: 0-3176372042
                • Opcode ID: 977287aaeb2d8aa63e21246344f6dc8c5dfa41edc86e8770b2691a33b6892d01
                • Instruction ID: 119377cb5223955075974c009060294b8d66ac918ec0b009fd55004ee188fba0
                • Opcode Fuzzy Hash: 977287aaeb2d8aa63e21246344f6dc8c5dfa41edc86e8770b2691a33b6892d01
                • Instruction Fuzzy Hash: FF91BE30A002058FCB16EF68C5805AEBFF2FF85310F1585AAD419AF296DB34EC46CB91
                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.3304334051.0000000001580000.00000040.00000800.00020000.00000000.sdmp, Offset: 01580000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_1580000_RegAsm.jbxd
                Similarity
                • API ID:
                • String ID: Te]q
                • API String ID: 0-52440209
                • Opcode ID: a015ee6b85eb51e6110f563d4759ac3b1c20dd3a3336345908756347939ab1b9
                • Instruction ID: 0abecb80a52fc1b3c518f71434cd905042b768f6106273ccd5d082a2b83abf58
                • Opcode Fuzzy Hash: a015ee6b85eb51e6110f563d4759ac3b1c20dd3a3336345908756347939ab1b9
                • Instruction Fuzzy Hash: 32517A706402019FE714EF29C954BA9BBF6FF88719F208159E502AB3E1CBB1AC41CF40
                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.3304334051.0000000001580000.00000040.00000800.00020000.00000000.sdmp, Offset: 01580000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_1580000_RegAsm.jbxd
                Similarity
                • API ID:
                • String ID: LR]q
                • API String ID: 0-3081347316
                • Opcode ID: 0f4df5e4b3b2d2c9644017263d25a2f9e899af7c99d0b93301020c110b08b4b1
                • Instruction ID: 6060edd68daf51e50b0d05656678a86d0be2c2bf9ccfc936b2f95dd58f5bd50f
                • Opcode Fuzzy Hash: 0f4df5e4b3b2d2c9644017263d25a2f9e899af7c99d0b93301020c110b08b4b1
                • Instruction Fuzzy Hash: B0310334F002168FCB14AB7D949056E7BF6FFC9220B14456ED54AEB3A5DE34CC028792
                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.3304334051.0000000001580000.00000040.00000800.00020000.00000000.sdmp, Offset: 01580000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_1580000_RegAsm.jbxd
                Similarity
                • API ID:
                • String ID: $]q
                • API String ID: 0-1007455737
                • Opcode ID: 9cb2d7f15cde37f2d44c06a9be3c774f86ebf0ebcbc452e92d6993541979052f
                • Instruction ID: d51d884ec2bbf35c6c30433f2f9850b1bdb2bf98177de50345af0c8b7c3a4c0d
                • Opcode Fuzzy Hash: 9cb2d7f15cde37f2d44c06a9be3c774f86ebf0ebcbc452e92d6993541979052f
                • Instruction Fuzzy Hash: 8341AE30708541DBC72A2F69908443CBFB3BFC57093288889E086AF699CF318D53CB92
                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.3304334051.0000000001580000.00000040.00000800.00020000.00000000.sdmp, Offset: 01580000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_1580000_RegAsm.jbxd
                Similarity
                • API ID:
                • String ID: dLcq
                • API String ID: 0-2236789282
                • Opcode ID: d66a617647581d08379c906df901be50574dc9c41664857d728ca69a2c0c5ba1
                • Instruction ID: 39404d327812d12ab539c35ceafcd65c3806490650c5f01c987b5e181a4d1f32
                • Opcode Fuzzy Hash: d66a617647581d08379c906df901be50574dc9c41664857d728ca69a2c0c5ba1
                • Instruction Fuzzy Hash: 56318171A002048FDB14DF69C454BAEBBF5FF88300F14856AE405AB3A1C775ED45CB90
                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.3304334051.0000000001580000.00000040.00000800.00020000.00000000.sdmp, Offset: 01580000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_1580000_RegAsm.jbxd
                Similarity
                • API ID:
                • String ID: Te]q
                • API String ID: 0-52440209
                • Opcode ID: 92cac8faf69437572cb2bdbd80735eaed274aed20db68d0ef2a42b0556f9afe6
                • Instruction ID: ec2f5108e86b1d45a2ba6a14e1cdab655b2289d54d73971e1e3c7a3fde66210d
                • Opcode Fuzzy Hash: 92cac8faf69437572cb2bdbd80735eaed274aed20db68d0ef2a42b0556f9afe6
                • Instruction Fuzzy Hash: C42189317101158FDB14AB68C828BAD7BF2BF89704F154099E502EB3A0CBB08C01CB51
                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.3304334051.0000000001580000.00000040.00000800.00020000.00000000.sdmp, Offset: 01580000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_1580000_RegAsm.jbxd
                Similarity
                • API ID:
                • String ID: Te]q
                • API String ID: 0-52440209
                • Opcode ID: dded48561681a5327695419c863c88dc83638b790bffcfb09bd0985dd52c1428
                • Instruction ID: add4cb5ce7e3011a2b69f48ea39ec61b7604e249c291746b2ff7e4566017f8fe
                • Opcode Fuzzy Hash: dded48561681a5327695419c863c88dc83638b790bffcfb09bd0985dd52c1428
                • Instruction Fuzzy Hash: 982156317101158FDB14AB68C868BAE7BF6BFC8B14F21815AE502EB3A1CF718C058B91
                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.3304334051.0000000001580000.00000040.00000800.00020000.00000000.sdmp, Offset: 01580000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_1580000_RegAsm.jbxd
                Similarity
                • API ID:
                • String ID: |
                • API String ID: 0-2343686810
                • Opcode ID: f2c3c1faf30e601ff7a44d5cf19e7ae8300f61083590b0427c587c6e8adbf310
                • Instruction ID: ec9293562d70cb36069963b1206998e49da52f39c13a9ac108f744e820620e7c
                • Opcode Fuzzy Hash: f2c3c1faf30e601ff7a44d5cf19e7ae8300f61083590b0427c587c6e8adbf310
                • Instruction Fuzzy Hash: 3A219071F442259FCB54EB7888547AD7BF1BF48710F1084AAE50AEB3A5DB749901CB81
                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.3304334051.0000000001580000.00000040.00000800.00020000.00000000.sdmp, Offset: 01580000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_1580000_RegAsm.jbxd
                Similarity
                • API ID:
                • String ID: Te]q
                • API String ID: 0-52440209
                • Opcode ID: 08646bce49e55bee4ca33eefb62a0937a3735f752a6a8536b840cf5a21487e21
                • Instruction ID: 3c8027ddb86ac951fa808d13abced2b212493c3059b75e4d4953ed85a367971e
                • Opcode Fuzzy Hash: 08646bce49e55bee4ca33eefb62a0937a3735f752a6a8536b840cf5a21487e21
                • Instruction Fuzzy Hash: 47119070B502049FDB14AF29C899B6EBFE6BF89710F14405AE502EF3A6CA719C01CB91
                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.3304334051.0000000001580000.00000040.00000800.00020000.00000000.sdmp, Offset: 01580000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_1580000_RegAsm.jbxd
                Similarity
                • API ID:
                • String ID: 4']q
                • API String ID: 0-1259897404
                • Opcode ID: 19081e74b40582268b39cbf29bdb463f3478500330a11a897c9f250f8e2ba060
                • Instruction ID: 2fc8181962c5644896f5a08d182a0e32c8a6633ac76d84687a6ea10897aa3952
                • Opcode Fuzzy Hash: 19081e74b40582268b39cbf29bdb463f3478500330a11a897c9f250f8e2ba060
                • Instruction Fuzzy Hash: 96110132B0100A8FCB09EF74F8815EC3FA4FF96604B4015D9D584AF366DB3A9C068B82
                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.3304334051.0000000001580000.00000040.00000800.00020000.00000000.sdmp, Offset: 01580000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_1580000_RegAsm.jbxd
                Similarity
                • API ID:
                • String ID: Te]q
                • API String ID: 0-52440209
                • Opcode ID: 30d7f0e92c5fbaa6226e8fa35833259f1f6aa929e73ae967fa7ed002f8b1ad47
                • Instruction ID: 0d1f2f2e27bcf89d7b608aa4e144ea70145d5df443905ce1f89093befefdf491
                • Opcode Fuzzy Hash: 30d7f0e92c5fbaa6226e8fa35833259f1f6aa929e73ae967fa7ed002f8b1ad47
                • Instruction Fuzzy Hash: 96118C70B50105DFDB14AF29C899BAEBBE6FF88710F144059E902EF3A5CAB19C01CB90
                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.3304334051.0000000001580000.00000040.00000800.00020000.00000000.sdmp, Offset: 01580000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_1580000_RegAsm.jbxd
                Similarity
                • API ID:
                • String ID: Te]q
                • API String ID: 0-52440209
                • Opcode ID: 2d7feb564dd8ff2335844bbd34cfb9f291e5b823c1faca04b0ac37bd9fbf3aba
                • Instruction ID: bb49b81df3747f622890b8415f00a8cb5ea591be4389687b8d7f05285cd0a9c3
                • Opcode Fuzzy Hash: 2d7feb564dd8ff2335844bbd34cfb9f291e5b823c1faca04b0ac37bd9fbf3aba
                • Instruction Fuzzy Hash: D711A3357102009FCB25AB68C869BAD7BF2BF89700F5540A9E502EB7A1CB715D02CB91
                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.3304334051.0000000001580000.00000040.00000800.00020000.00000000.sdmp, Offset: 01580000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_1580000_RegAsm.jbxd
                Similarity
                • API ID:
                • String ID: Haq
                • API String ID: 0-725504367
                • Opcode ID: 93039f01f7dcaa0217c82732b3dcc6939fad39b2a6a7d10da2a626ac11c217ef
                • Instruction ID: 23525048842e5541e036cf1f01fb8e69e512cb2b50f4ecf02ea52127007f8219
                • Opcode Fuzzy Hash: 93039f01f7dcaa0217c82732b3dcc6939fad39b2a6a7d10da2a626ac11c217ef
                • Instruction Fuzzy Hash: E901DC307482504FC7899B3D94544AE3FE2AFDA22035A88FBD009CF7A6CE288C068391
                Strings
                Memory Dump Source
                • Source File: 00000001.00000002.3304334051.0000000001580000.00000040.00000800.00020000.00000000.sdmp, Offset: 01580000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_1580000_RegAsm.jbxd
                Similarity
                • API ID:
                • String ID: LR]q
                • API String ID: 0-3081347316
                • Opcode ID: d4328b67bf065325a16a4c5caae6d4d9bb4e1a2d3846d9b5b8ee944e4d09a545
                • Instruction ID: 3d8b9926f49cc13abb3cc60e938be2c21acbf14ac44ba605091398da9e2536c3
                • Opcode Fuzzy Hash: d4328b67bf065325a16a4c5caae6d4d9bb4e1a2d3846d9b5b8ee944e4d09a545
                • Instruction Fuzzy Hash: B9016971B001169FCB44EFB8D9016AE77F5FB98610F5040A9E50AEF290EA70AE018BD1
                Memory Dump Source
                • Source File: 00000001.00000002.3304334051.0000000001580000.00000040.00000800.00020000.00000000.sdmp, Offset: 01580000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_1580000_RegAsm.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 2485ca628a65fce5bc3a3299effb206e7198f38ff9db2bb3c9122bd72854b400
                • Instruction ID: eedc7863698020a1232f9fe6ae8613fd412bd9affa4fe0570199e195dd06d861
                • Opcode Fuzzy Hash: 2485ca628a65fce5bc3a3299effb206e7198f38ff9db2bb3c9122bd72854b400
                • Instruction Fuzzy Hash: 33B14C70E10209CFDB11DFA9C98579EBBF2BF88314F148129D815BB294EB749846CF85
                Memory Dump Source
                • Source File: 00000001.00000002.3304334051.0000000001580000.00000040.00000800.00020000.00000000.sdmp, Offset: 01580000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_1580000_RegAsm.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 852d13013fbce70f95b4832d0d5dcc73b2fefb9f888e74c59623a87806711394
                • Instruction ID: 353c728cda589df702b72003d2aceb701d63cced1c3ec96c930a80395d867266
                • Opcode Fuzzy Hash: 852d13013fbce70f95b4832d0d5dcc73b2fefb9f888e74c59623a87806711394
                • Instruction Fuzzy Hash: 78B139B0E10209CFDF10EFA9D98579DBBF2BF88314F148529D819BB254EB749885CB81
                Memory Dump Source
                • Source File: 00000001.00000002.3304334051.0000000001580000.00000040.00000800.00020000.00000000.sdmp, Offset: 01580000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_1580000_RegAsm.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 795ff8bbb446f2a59f863e3bf82510753f50aa6802f2997c269d043f400afc6a
                • Instruction ID: 687fe417555be1a12f61af628110f56a715140da15e87fde659949b6aad59ddd
                • Opcode Fuzzy Hash: 795ff8bbb446f2a59f863e3bf82510753f50aa6802f2997c269d043f400afc6a
                • Instruction Fuzzy Hash: 8BA17B70B012068FCB19EF35E450A6E7BE6FFC9305F14856AD806AB365DB399C46CB81
                Memory Dump Source
                • Source File: 00000001.00000002.3304334051.0000000001580000.00000040.00000800.00020000.00000000.sdmp, Offset: 01580000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_1580000_RegAsm.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 0f6f9d8b25687b7aa8dda4d7f7fb932e014f4fe7c4d763af739d368d3e92dfa7
                • Instruction ID: 63c85f96be57681eadcb5d68c11d475488afd4fe57c0d250392f4eabd023433c
                • Opcode Fuzzy Hash: 0f6f9d8b25687b7aa8dda4d7f7fb932e014f4fe7c4d763af739d368d3e92dfa7
                • Instruction Fuzzy Hash: C3A18E706002418FDB05EF30E444A6E7FBAFF89311F218669D5068B36ADB399D4ACF81
                Memory Dump Source
                • Source File: 00000001.00000002.3304334051.0000000001580000.00000040.00000800.00020000.00000000.sdmp, Offset: 01580000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_1580000_RegAsm.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 88b616fe669153798b59fd65bf6813d413da53b50441116eda2b6b2f87d0342d
                • Instruction ID: 4a15e2406ad8b28d3b933b7ebc05eb75b02099245b12b9ca72a624a59eeb4206
                • Opcode Fuzzy Hash: 88b616fe669153798b59fd65bf6813d413da53b50441116eda2b6b2f87d0342d
                • Instruction Fuzzy Hash: 58A16D746002419FDB05EF30E444A2E7BBAFF89315F218669D5068B36ADB399D4ACFC1
                Memory Dump Source
                • Source File: 00000001.00000002.3304334051.0000000001580000.00000040.00000800.00020000.00000000.sdmp, Offset: 01580000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_1580000_RegAsm.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: a33d0b5e870a3f18d6f960cc1069307447e893ee37e66bc7c35ff4a74c76013f
                • Instruction ID: 6b836006fb609f2af94de680233453e51055f1ea48800259d0340a5e9c3f91ea
                • Opcode Fuzzy Hash: a33d0b5e870a3f18d6f960cc1069307447e893ee37e66bc7c35ff4a74c76013f
                • Instruction Fuzzy Hash: A8518C74604255DFCB15EF68C884A6EBBB2FF89315F5580A5E446AF3A6C730EC01CB60
                Memory Dump Source
                • Source File: 00000001.00000002.3304334051.0000000001580000.00000040.00000800.00020000.00000000.sdmp, Offset: 01580000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_1580000_RegAsm.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: d01707fd44729aeffeae27aca1b5eb66e2789465e9a494165009465d36bb7556
                • Instruction ID: 3051dab6944f772244ba758088619bfb15f173027fefef945903e3a1c4c82e4a
                • Opcode Fuzzy Hash: d01707fd44729aeffeae27aca1b5eb66e2789465e9a494165009465d36bb7556
                • Instruction Fuzzy Hash: F4419171B042448FCB24EFB9D4546AEBBE6BFD9710F14882DD50AAB354CF349846CB91
                Memory Dump Source
                • Source File: 00000001.00000002.3304334051.0000000001580000.00000040.00000800.00020000.00000000.sdmp, Offset: 01580000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_1580000_RegAsm.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 976c404456484f1c4606545ce2750224b9490e9c8428dbe673ca5ec1850bef81
                • Instruction ID: 6688c07e36afdac35a4ff210cb9ad0c1464b61d9e66010777d6ab82afec87940
                • Opcode Fuzzy Hash: 976c404456484f1c4606545ce2750224b9490e9c8428dbe673ca5ec1850bef81
                • Instruction Fuzzy Hash: 3451A330600205CFD719DF28F5449697B6AFF88306F91E669D805CB269EB3DAD46CF80
                Memory Dump Source
                • Source File: 00000001.00000002.3304334051.0000000001580000.00000040.00000800.00020000.00000000.sdmp, Offset: 01580000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_1580000_RegAsm.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: fec1179f857bda1743e4a5dadda25c2ca80ceddfe121a725191805e0a633a442
                • Instruction ID: 225b37749135d0eb9da658ae6171f2be1a2d248b177339c70687cc41ac750d79
                • Opcode Fuzzy Hash: fec1179f857bda1743e4a5dadda25c2ca80ceddfe121a725191805e0a633a442
                • Instruction Fuzzy Hash: 4F41A2B0E00209AFCB44EFBAC54466EBFFAFF89300F20856AD449D7355DA349D428B91
                Memory Dump Source
                • Source File: 00000001.00000002.3304334051.0000000001580000.00000040.00000800.00020000.00000000.sdmp, Offset: 01580000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_1580000_RegAsm.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 8dacbdda2f0d49b3b1ff1aa9d0584e77d2cb162c87211b4aba8e6e1f762d76c6
                • Instruction ID: f4e3422ed19220dc5b8c052687431ead13b8d21dddb7789c141cc22e9b6d7b01
                • Opcode Fuzzy Hash: 8dacbdda2f0d49b3b1ff1aa9d0584e77d2cb162c87211b4aba8e6e1f762d76c6
                • Instruction Fuzzy Hash: 3A41F2B1D00349DFDB14DFA9C480ADEBFB1FF48314F248429E809AB254DB75A985CB90
                Memory Dump Source
                • Source File: 00000001.00000002.3304334051.0000000001580000.00000040.00000800.00020000.00000000.sdmp, Offset: 01580000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_1580000_RegAsm.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 3af1157a8a6c5795c18b4aa87321bda08cf6d8888ecdd404485a1102c2759a63
                • Instruction ID: cb74ce6acf2b68a4495b6c23ca891b574afd264cdbc5beec595a674132c3d1b8
                • Opcode Fuzzy Hash: 3af1157a8a6c5795c18b4aa87321bda08cf6d8888ecdd404485a1102c2759a63
                • Instruction Fuzzy Hash: 3A41EEB0D00349DFDB14DF99C584ADEBFB5BF48314F24842AE809AB214DB75A985CB90
                Memory Dump Source
                • Source File: 00000001.00000002.3304334051.0000000001580000.00000040.00000800.00020000.00000000.sdmp, Offset: 01580000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_1580000_RegAsm.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: f12119858a76540700e43c17bf2ab3d9999d87bea44a4cd570196e26cc139b96
                • Instruction ID: 96c28e338014d689f2a88fe345bc22805ed595c8c8c13d9b23f7c749d37c96af
                • Opcode Fuzzy Hash: f12119858a76540700e43c17bf2ab3d9999d87bea44a4cd570196e26cc139b96
                • Instruction Fuzzy Hash: 5921A1307442029FEB64BB78D50867EBFA4BF44301B469A2DB807EE1D1EBB4C948CB51
                Memory Dump Source
                • Source File: 00000001.00000002.3303865747.000000000149D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0149D000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_149d000_RegAsm.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: ab4229d43b0682718a5ef64255c669aa34d820e5b9240625bced4ea4544fbe23
                • Instruction ID: 7e14770a905bdc18f932ce96f340a695067afa8a9e92582acb3a199c3d3044da
                • Opcode Fuzzy Hash: ab4229d43b0682718a5ef64255c669aa34d820e5b9240625bced4ea4544fbe23
                • Instruction Fuzzy Hash: 4D210371944240DFDF06DF98D9C0B27BF65FB88328F24C56AD9090A326C33AD456CBA2
                Memory Dump Source
                • Source File: 00000001.00000002.3304334051.0000000001580000.00000040.00000800.00020000.00000000.sdmp, Offset: 01580000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_1580000_RegAsm.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: d861a105184caa6ca48aa0c4234b8a639fb2c26a32cdd14c9d459aef8c389858
                • Instruction ID: f2157287ef19a96b9091eeacc8155ff7d8be930dabc20187013a5f252e7f941e
                • Opcode Fuzzy Hash: d861a105184caa6ca48aa0c4234b8a639fb2c26a32cdd14c9d459aef8c389858
                • Instruction Fuzzy Hash: 08212730600215CFDB19EBB8D4546BE7BF6FF89709F144468C402AB364DB359C42DB92
                Memory Dump Source
                • Source File: 00000001.00000002.3304334051.0000000001580000.00000040.00000800.00020000.00000000.sdmp, Offset: 01580000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_1580000_RegAsm.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: c6e7b8733d70cb3aecc7a20e2412600d5df91b5ac49858e48780d6483b7b0c24
                • Instruction ID: ab22bf450a3eb3a8728572b7966c9e425c590d263ef72cadb54470b2fbae4ff7
                • Opcode Fuzzy Hash: c6e7b8733d70cb3aecc7a20e2412600d5df91b5ac49858e48780d6483b7b0c24
                • Instruction Fuzzy Hash: 2921A1307002039FEB64BB78E51863EBFA8BF04201B454639B907EE1D1EBB0C908CB52
                Memory Dump Source
                • Source File: 00000001.00000002.3304334051.0000000001580000.00000040.00000800.00020000.00000000.sdmp, Offset: 01580000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_1580000_RegAsm.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 2ab27bf2725d204c50c89def10285ff0c5ebca7c4b15960c9541c5164aa1d7b5
                • Instruction ID: 618554e661df3022e1037c11792c6d13f9caa5270296858671be22f8cde6257e
                • Opcode Fuzzy Hash: 2ab27bf2725d204c50c89def10285ff0c5ebca7c4b15960c9541c5164aa1d7b5
                • Instruction Fuzzy Hash: 051101317002014BCB19AB79E85056E7BEAEFCD614F00857AC906DB359EF359D0687D2
                Memory Dump Source
                • Source File: 00000001.00000002.3304334051.0000000001580000.00000040.00000800.00020000.00000000.sdmp, Offset: 01580000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_1580000_RegAsm.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 229af2962756e3f44a60b1b4e2a006e12915b13729c783de24e80b57c9ccbe40
                • Instruction ID: 3f71dbe9f760649691359d3ad2e3479579bd67a56924492bdbd8c2c7b2b0aa92
                • Opcode Fuzzy Hash: 229af2962756e3f44a60b1b4e2a006e12915b13729c783de24e80b57c9ccbe40
                • Instruction Fuzzy Hash: 9721A1B1A002464FCB05FF34E400AAE7FA5EFD6214F5486AAC0069F255EB359906CBD1
                Memory Dump Source
                • Source File: 00000001.00000002.3304334051.0000000001580000.00000040.00000800.00020000.00000000.sdmp, Offset: 01580000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_1580000_RegAsm.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: cccd16b43fd746c4792c88c8c58fb04e6dcd88b989c57e13d5e67d2eb8035352
                • Instruction ID: 030c403d3a6c5937f49adc793209e8a644bddb2ea78484fd9a151b1c7258a7de
                • Opcode Fuzzy Hash: cccd16b43fd746c4792c88c8c58fb04e6dcd88b989c57e13d5e67d2eb8035352
                • Instruction Fuzzy Hash: 83118870A00215CFCB54EB78D44456E7BE6FF88312B1249B9D405DB220EB398C52CB80
                Memory Dump Source
                • Source File: 00000001.00000002.3303865747.000000000149D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0149D000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_149d000_RegAsm.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 07d586b370810bf15e8d939e07fb0dccd80900219e7a08ccebccaf9c83e80135
                • Instruction ID: 70b24f61fd7c38717d20403abe4c2cf495b4d59e4266d8ec57324a09feba19bb
                • Opcode Fuzzy Hash: 07d586b370810bf15e8d939e07fb0dccd80900219e7a08ccebccaf9c83e80135
                • Instruction Fuzzy Hash: 2311B176904280CFDF16CF58D9C4B16BF61FB84324F24C5AAD9094B627C336D45ACBA2
                Memory Dump Source
                • Source File: 00000001.00000002.3304334051.0000000001580000.00000040.00000800.00020000.00000000.sdmp, Offset: 01580000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_1580000_RegAsm.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 4404a21fe7e1cd28b2227ca5583ea96b1782a5a34e99cdd30b40482cd13c57aa
                • Instruction ID: ba7891d60ee594cfe7da9790fec755e7458e9f789bd6124a7b40988efdefa13b
                • Opcode Fuzzy Hash: 4404a21fe7e1cd28b2227ca5583ea96b1782a5a34e99cdd30b40482cd13c57aa
                • Instruction Fuzzy Hash: 23117970A002059FCB54EBBDD44462A7BEAFF88206B1048B8D50ADB364EA349C42CB90
                Memory Dump Source
                • Source File: 00000001.00000002.3304334051.0000000001580000.00000040.00000800.00020000.00000000.sdmp, Offset: 01580000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_1580000_RegAsm.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: c7a5efbf08cf19412fff1fb1faa4b8db66e1ad1f0e24b356c156ce9bd92be6ec
                • Instruction ID: 7f74364806ee5cea8e0a27c7b6185f0847a05beb08602bcd1a01da4186fd8cdf
                • Opcode Fuzzy Hash: c7a5efbf08cf19412fff1fb1faa4b8db66e1ad1f0e24b356c156ce9bd92be6ec
                • Instruction Fuzzy Hash: B8118FB06002068FCB44FF39E400AAE7FA9FFD5314F508669C105AF295EB75990ACBD5
                Memory Dump Source
                • Source File: 00000001.00000002.3304334051.0000000001580000.00000040.00000800.00020000.00000000.sdmp, Offset: 01580000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_1580000_RegAsm.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 3eaa05c00bf397dfb99bcf6bf7ceaf6362b49b5a317f188dfcaf1f36a5bd9d8c
                • Instruction ID: 7cede44a9f7edd7d42d95fedde26e2e3e7bb8d9cd969c5908ea9fd8108f62b1a
                • Opcode Fuzzy Hash: 3eaa05c00bf397dfb99bcf6bf7ceaf6362b49b5a317f188dfcaf1f36a5bd9d8c
                • Instruction Fuzzy Hash: 8301C0303092808BC726B63895A423D7BD7BFC6250B04457DD006CB352CF74CC46D742
                Memory Dump Source
                • Source File: 00000001.00000002.3304334051.0000000001580000.00000040.00000800.00020000.00000000.sdmp, Offset: 01580000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_1580000_RegAsm.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: ac9bcf9bcfd1c86956fc412a6d9ee45b7766ac84945b6fe8967cd8bedd0fc68c
                • Instruction ID: 86045f393fc3b217563c87aba4d82dc6e9edc20b93dac5a3695688f2b34ae33f
                • Opcode Fuzzy Hash: ac9bcf9bcfd1c86956fc412a6d9ee45b7766ac84945b6fe8967cd8bedd0fc68c
                • Instruction Fuzzy Hash: F71100B58002498FDB20DF9AD984BDEBFF4EB09324F208819D529B7210C778A584CFA1
                Memory Dump Source
                • Source File: 00000001.00000002.3304334051.0000000001580000.00000040.00000800.00020000.00000000.sdmp, Offset: 01580000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_1580000_RegAsm.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 5cc3e87b9fc90ab1d995eb7e898538359035698e4b6f9593b0aacae305bffb8f
                • Instruction ID: 57e78495271dec08adab72edad1ffdcfacc7fdf1c1c4d3aac140aa1f9dec6de3
                • Opcode Fuzzy Hash: 5cc3e87b9fc90ab1d995eb7e898538359035698e4b6f9593b0aacae305bffb8f
                • Instruction Fuzzy Hash: 69110DB58002498FDB20DF9AC584B9EBBF4EB08324F20881AD519B7210C378A984CFA1
                Memory Dump Source
                • Source File: 00000001.00000002.3304334051.0000000001580000.00000040.00000800.00020000.00000000.sdmp, Offset: 01580000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_1580000_RegAsm.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: a2010c54623210f356ba8246fe9e120a60e905871f014a669779bb4252dde15f
                • Instruction ID: 08ef342f2c67d032dd3e04605bc82eb391bd22be1a96c168f52b02836420c35e
                • Opcode Fuzzy Hash: a2010c54623210f356ba8246fe9e120a60e905871f014a669779bb4252dde15f
                • Instruction Fuzzy Hash: A5F0EC79A45107AFD701BF11C911ABD3BB4BF9660DF541446D052FF263D7348801CB65
                Memory Dump Source
                • Source File: 00000001.00000002.3304334051.0000000001580000.00000040.00000800.00020000.00000000.sdmp, Offset: 01580000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_1580000_RegAsm.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 570ba49b27884f325106765c6993b9771ae4e7a020e04d2f905076aad0fbf295
                • Instruction ID: 1662505fb015cf067f9bb67525c4d1039b27b8103f52b2f7260be9b4b8fad299
                • Opcode Fuzzy Hash: 570ba49b27884f325106765c6993b9771ae4e7a020e04d2f905076aad0fbf295
                • Instruction Fuzzy Hash: 45F0A7712041478ACF04FB30E4046AD7B91FFD1355F648759C1111F295DB759517CBC5
                Memory Dump Source
                • Source File: 00000001.00000002.3304334051.0000000001580000.00000040.00000800.00020000.00000000.sdmp, Offset: 01580000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_1580000_RegAsm.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 9ac5ca0df61453493b502174df01e9019105b3356a3fdd6f54d115d7a1873106
                • Instruction ID: 01a5c4299c980012bb38e0211e2a66465bd41b4957514958ecb27267b66f8c85
                • Opcode Fuzzy Hash: 9ac5ca0df61453493b502174df01e9019105b3356a3fdd6f54d115d7a1873106
                • Instruction Fuzzy Hash: 24F0157150E3C18FC3039F34C861810BF74BE6720574A40CBD481CF2B3D22A9819DB22
                Memory Dump Source
                • Source File: 00000001.00000002.3304334051.0000000001580000.00000040.00000800.00020000.00000000.sdmp, Offset: 01580000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_1580000_RegAsm.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 9109c44fa679e2a89fedf15a0f4cbf2a4ba1d02a7aa2ad8ee5f86d555a75ca44
                • Instruction ID: 9bb51ec321515a79b7ebe347d2084f4a09c4f503399c1bb1fc1a147ba9ae35eb
                • Opcode Fuzzy Hash: 9109c44fa679e2a89fedf15a0f4cbf2a4ba1d02a7aa2ad8ee5f86d555a75ca44
                • Instruction Fuzzy Hash: FAE08C313001005F83449A2EA88485ABBDBEBC922535544BAE10DC7325CD60DC024790
                Memory Dump Source
                • Source File: 00000001.00000002.3304334051.0000000001580000.00000040.00000800.00020000.00000000.sdmp, Offset: 01580000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_1580000_RegAsm.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: ee4835e3a36bb21f61ce502e068c7fa5be7962dfac5b8372b12e596ae384d670
                • Instruction ID: 749d59b7a19e2685bade873f468111acff5cebfccffd7e7b1ebe3537d6548207
                • Opcode Fuzzy Hash: ee4835e3a36bb21f61ce502e068c7fa5be7962dfac5b8372b12e596ae384d670
                • Instruction Fuzzy Hash: 5AC08C2211424ACEDB303374D20C66CBEA1BB40301F890616B1431C4FA8EF404088B1B
                Memory Dump Source
                • Source File: 00000001.00000002.3304334051.0000000001580000.00000040.00000800.00020000.00000000.sdmp, Offset: 01580000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_1580000_RegAsm.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: deae0148b1796b3a8d017b047c3c8383414b660bc7f97861b17c490898a9349a
                • Instruction ID: b0a415ebf02e02f5ec57958e0433f6d19113341e74460ac83d035acda33faebf
                • Opcode Fuzzy Hash: deae0148b1796b3a8d017b047c3c8383414b660bc7f97861b17c490898a9349a
                • Instruction Fuzzy Hash: 30C08C26114207CED73033B4D20C66CBEA1BF40301F890612B1431C4FA8EF404088B1B
                Memory Dump Source
                • Source File: 00000001.00000002.3304334051.0000000001580000.00000040.00000800.00020000.00000000.sdmp, Offset: 01580000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_1580000_RegAsm.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: c70a0165c991a4214281ceb308803981f595dc0176e12e8f3cb9891f2b239ac6
                • Instruction ID: 594ce7855cf9e0600e82d4add5b8400af3c6f6efbd893ffd15526bdcbbd1d4ea
                • Opcode Fuzzy Hash: c70a0165c991a4214281ceb308803981f595dc0176e12e8f3cb9891f2b239ac6
                • Instruction Fuzzy Hash: E9C048352602088F8244EA99E588C22B7ACFF58B02B415099E9018B722CB21FC10DA61

                Non-executed Functions

                Memory Dump Source
                • Source File: 00000001.00000002.3304334051.0000000001580000.00000040.00000800.00020000.00000000.sdmp, Offset: 01580000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_1580000_RegAsm.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 578c99e5ab378aef8003e4e7e80b1d82a6b4821fbd7816178b3480ff9c9bbc5b
                • Instruction ID: c4dd58547a5ed5d81fe5a4d77f65392e24edef48566af2b6c24aca4be664e9b9
                • Opcode Fuzzy Hash: 578c99e5ab378aef8003e4e7e80b1d82a6b4821fbd7816178b3480ff9c9bbc5b
                • Instruction Fuzzy Hash: B9825A707002058FDB18EF69C994B2EBAE6FF84700F248869D5069B3A5DBB5DC0ACB51
                Memory Dump Source
                • Source File: 00000001.00000002.3304334051.0000000001580000.00000040.00000800.00020000.00000000.sdmp, Offset: 01580000, based on PE: false
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_1_2_1580000_RegAsm.jbxd
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: c1da9ed059886779328fa0fabee30d2d67fdb17df19e0c1174b469908a5f77ae
                • Instruction ID: 6f909edd54eb6f768780ecb7701658bd6ac2543899f6704a937d9cf2ee399c3f
                • Opcode Fuzzy Hash: c1da9ed059886779328fa0fabee30d2d67fdb17df19e0c1174b469908a5f77ae
                • Instruction Fuzzy Hash: 0F915B70E102098FDF14DFA9C98179DBBF2BF88715F248529E419BB294EB749885CF81