Edit tour

Windows Analysis Report
pisun.exe

Overview

General Information

Sample name:pisun.exe
Analysis ID:1646174
MD5:45140e967970cd63521eaa76dc4db7d7
SHA1:aae8aa4c5fb8e1d5a830f1f095d7550a89b7634a
SHA256:3990ab6d73f0a92606cb4c86d39e077f014da65413a264be94d03ca8478e64b8
Tags:exeNjratuser-BastianHein
Infos:

Detection

Njrat
Score:100
Range:0 - 100
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Njrat
.NET source code contains potential unpacker
.NET source code references suspicious native API functions
Contains functionality to log keystrokes (.Net Source)
Disables zone checking for all users
Joe Sandbox ML detected suspicious sample
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
AV process strings found (often used to terminate AV products)
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Yara signature match

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • pisun.exe (PID: 6640 cmdline: "C:\Users\user\Desktop\pisun.exe" MD5: 45140E967970CD63521EAA76DC4DB7D7)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
NjRATRedPacket Security describes NJRat as "a remote access trojan (RAT) has capabilities to log keystrokes, access the victim's camera, steal credentials stored in browsers, open a reverse shell, upload/download files, view the victim's desktop, perform process, file, and registry manipulations, and capabilities to let the attacker update, uninstall, restart, close, disconnect the RAT and rename its campaign ID. Through the Command & Control (CnC) server software, the attacker has capabilities to create and configure the malware to spread through USB drives."It is supposedly popular with actors in the Middle East. Similar to other RATs, many leaked builders may be backdoored.
  • AQUATIC PANDA
  • Earth Lusca
  • Operation C-Major
  • The Gorgon Group
https://malpedia.caad.fkie.fraunhofer.de/details/win.njrat
{
  "Host": "such-captain.gl.at.ply.gg",
  "Port": "7723",
  "Version": "<- NjRAT 0.7d Horror Edition ->",
  "Registry Name": "f9f7ecca9c9e7996304b914cc137e66d",
  "Campaign ID": "Victim",
  "Network Seprator": "Y262SUCZ4UJJ"
}
SourceRuleDescriptionAuthorStrings
pisun.exeJoeSecurity_NjratYara detected NjratJoe Security
    pisun.exeWindows_Trojan_Njrat_30f3c220unknownunknown
    • 0x933c:$a1: get_Registry
    • 0xc344:$a2: SEE_MASK_NOZONECHECKS
    • 0xb14e:$a3: Download ERROR
    • 0xc59f:$a4: cmd.exe /c ping 0 -n 2 & del "
    pisun.exeRevengeRAT_Sep17Detects RevengeRAT malwareFlorian Roth
    • 0xa4d5:$x3: 03C7F4E8FB359AEC0EEF0814B66A704FC43FB3A8
    pisun.exeCN_disclosed_20180208_cDetects malware from disclosed CN malware setFlorian Roth
    • 0xc59f:$x1: cmd.exe /c ping 0 -n 2 & del "
    • 0xafae:$s1: winmgmts:\\.\root\SecurityCenter2
    • 0xb174:$s3: Executed As
    • 0x9b5f:$s5: Stub.exe
    • 0xb14e:$s6: Download ERROR
    • 0xaf70:$s8: Select * From AntiVirusProduct
    pisun.exeUnknown_Malware_Sample_Jul17_2Detects unknown malware sample with pastebin RAW URLFlorian Roth
    • 0xcad5:$s1: 4System.Web.Services.Protocols.SoapHttpClientProtocol
    • 0xadbc:$s2: https://pastebin.com/raw/
    • 0xce1f:$s3: My.Computer
    • 0xcaaf:$s4: MyTemplate
    Click to see the 4 entries
    SourceRuleDescriptionAuthorStrings
    00000001.00000000.1269492282.00000000001D2000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_NjratYara detected NjratJoe Security
      00000001.00000000.1269492282.00000000001D2000.00000002.00000001.01000000.00000003.sdmpWindows_Trojan_Njrat_30f3c220unknownunknown
      • 0x913c:$a1: get_Registry
      • 0xc144:$a2: SEE_MASK_NOZONECHECKS
      • 0xaf4e:$a3: Download ERROR
      • 0xc39f:$a4: cmd.exe /c ping 0 -n 2 & del "
      00000001.00000000.1269492282.00000000001D2000.00000002.00000001.01000000.00000003.sdmpnjrat1Identify njRatBrian Wallace @botnet_hunter
      • 0xc144:$a2: SEE_MASK_NOZONECHECKS
      • 0xc427:$b1: [TAP]
      • 0xc39f:$c3: cmd.exe /c ping
      00000001.00000000.1269492282.00000000001D2000.00000002.00000001.01000000.00000003.sdmpNjratdetect njRAT in memoryJPCERT/CC Incident Response Group
      • 0xc144:$reg: SEE_MASK_NOZONECHECKS
      • 0xaf2a:$msg: Execute ERROR
      • 0xaf8e:$msg: Execute ERROR
      • 0xc39f:$ping: cmd.exe /c ping 0 -n 2 & del
      Process Memory Space: pisun.exe PID: 6640JoeSecurity_NjratYara detected NjratJoe Security
        SourceRuleDescriptionAuthorStrings
        1.0.pisun.exe.1d0000.0.unpackJoeSecurity_NjratYara detected NjratJoe Security
          1.0.pisun.exe.1d0000.0.unpackWindows_Trojan_Njrat_30f3c220unknownunknown
          • 0x933c:$a1: get_Registry
          • 0xc344:$a2: SEE_MASK_NOZONECHECKS
          • 0xb14e:$a3: Download ERROR
          • 0xc59f:$a4: cmd.exe /c ping 0 -n 2 & del "
          1.0.pisun.exe.1d0000.0.unpackRevengeRAT_Sep17Detects RevengeRAT malwareFlorian Roth
          • 0xa4d5:$x3: 03C7F4E8FB359AEC0EEF0814B66A704FC43FB3A8
          1.0.pisun.exe.1d0000.0.unpackCN_disclosed_20180208_cDetects malware from disclosed CN malware setFlorian Roth
          • 0xc59f:$x1: cmd.exe /c ping 0 -n 2 & del "
          • 0xafae:$s1: winmgmts:\\.\root\SecurityCenter2
          • 0xb174:$s3: Executed As
          • 0x9b5f:$s5: Stub.exe
          • 0xb14e:$s6: Download ERROR
          • 0xaf70:$s8: Select * From AntiVirusProduct
          1.0.pisun.exe.1d0000.0.unpackUnknown_Malware_Sample_Jul17_2Detects unknown malware sample with pastebin RAW URLFlorian Roth
          • 0xcad5:$s1: 4System.Web.Services.Protocols.SoapHttpClientProtocol
          • 0xadbc:$s2: https://pastebin.com/raw/
          • 0xce1f:$s3: My.Computer
          • 0xcaaf:$s4: MyTemplate
          Click to see the 4 entries
          No Sigma rule has matched
          No Suricata rule has matched

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: pisun.exeAvira: detected
          Source: 1.0.pisun.exe.1d0000.0.unpackMalware Configuration Extractor: Njrat {"Host": "such-captain.gl.at.ply.gg", "Port": "7723", "Version": "<- NjRAT 0.7d Horror Edition ->", "Registry Name": "f9f7ecca9c9e7996304b914cc137e66d", "Campaign ID": "Victim", "Network Seprator": "Y262SUCZ4UJJ"}
          Source: pisun.exeReversingLabs: Detection: 86%
          Source: pisun.exeVirustotal: Detection: 80%Perma Link
          Source: Yara matchFile source: pisun.exe, type: SAMPLE
          Source: Yara matchFile source: 1.0.pisun.exe.1d0000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000001.00000000.1269492282.00000000001D2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: pisun.exe PID: 6640, type: MEMORYSTR
          Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
          Source: pisun.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
          Source: C:\Users\user\Desktop\pisun.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9672_none_d08f9da24428a513\MSVCR80.dllJump to behavior
          Source: pisun.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Source: global trafficTCP traffic: 192.168.2.5:49721 -> 147.185.221.27:7723
          Source: Joe Sandbox ViewIP Address: 147.185.221.27 147.185.221.27
          Source: Joe Sandbox ViewASN Name: SALSGIVERUS SALSGIVERUS
          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
          Source: global trafficDNS traffic detected: DNS query: such-captain.gl.at.ply.gg
          Source: pisun.exeString found in binary or memory: https://pastebin.com/raw/???

          Key, Mouse, Clipboard, Microphone and Screen Capturing

          barindex
          Source: pisun.exe, kl.cs.Net Code: VKCodeToUnicode

          E-Banking Fraud

          barindex
          Source: Yara matchFile source: pisun.exe, type: SAMPLE
          Source: Yara matchFile source: 1.0.pisun.exe.1d0000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000001.00000000.1269492282.00000000001D2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: pisun.exe PID: 6640, type: MEMORYSTR

          System Summary

          barindex
          Source: pisun.exe, type: SAMPLEMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
          Source: pisun.exe, type: SAMPLEMatched rule: Detects RevengeRAT malware Author: Florian Roth
          Source: pisun.exe, type: SAMPLEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
          Source: pisun.exe, type: SAMPLEMatched rule: Detects unknown malware sample with pastebin RAW URL Author: Florian Roth
          Source: pisun.exe, type: SAMPLEMatched rule: Detects njRAT based on some strings Author: Sekoia.io
          Source: pisun.exe, type: SAMPLEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
          Source: pisun.exe, type: SAMPLEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
          Source: pisun.exe, type: SAMPLEMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
          Source: 1.0.pisun.exe.1d0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
          Source: 1.0.pisun.exe.1d0000.0.unpack, type: UNPACKEDPEMatched rule: Detects RevengeRAT malware Author: Florian Roth
          Source: 1.0.pisun.exe.1d0000.0.unpack, type: UNPACKEDPEMatched rule: Detects malware from disclosed CN malware set Author: Florian Roth
          Source: 1.0.pisun.exe.1d0000.0.unpack, type: UNPACKEDPEMatched rule: Detects unknown malware sample with pastebin RAW URL Author: Florian Roth
          Source: 1.0.pisun.exe.1d0000.0.unpack, type: UNPACKEDPEMatched rule: Detects njRAT based on some strings Author: Sekoia.io
          Source: 1.0.pisun.exe.1d0000.0.unpack, type: UNPACKEDPEMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
          Source: 1.0.pisun.exe.1d0000.0.unpack, type: UNPACKEDPEMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
          Source: 1.0.pisun.exe.1d0000.0.unpack, type: UNPACKEDPEMatched rule: Detects NjRAT / Bladabindi Author: ditekSHen
          Source: 00000001.00000000.1269492282.00000000001D2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Njrat_30f3c220 Author: unknown
          Source: 00000001.00000000.1269492282.00000000001D2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Identify njRat Author: Brian Wallace @botnet_hunter
          Source: 00000001.00000000.1269492282.00000000001D2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: detect njRAT in memory Author: JPCERT/CC Incident Response Group
          Source: C:\Users\user\Desktop\pisun.exeProcess Stats: CPU usage > 49%
          Source: C:\Users\user\Desktop\pisun.exeCode function: 1_2_00CC03601_2_00CC0360
          Source: pisun.exe, 00000001.00000002.3737489797.000000000060E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamemscorwks.dllT vs pisun.exe
          Source: pisun.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
          Source: pisun.exe, type: SAMPLEMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
          Source: pisun.exe, type: SAMPLEMatched rule: RevengeRAT_Sep17 date = 2017-09-04, hash3 = fe00c4f9c8439eea50b44f817f760d8107f81e2dba7f383009fde508ff4b8967, hash2 = 7c271484c11795876972aabeb277c7b3035f896c9e860a852d69737df6e14213, hash1 = 2a86a4b2dcf1657bcb2922e70fc787aa9b66ec1c26dc2119f669bd2ce3f2e94a, author = Florian Roth, description = Detects RevengeRAT malware, reference = Internal Research, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: pisun.exe, type: SAMPLEMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: pisun.exe, type: SAMPLEMatched rule: Unknown_Malware_Sample_Jul17_2 date = 2017-08-01, hash1 = 3530d480db082af1823a7eb236203aca24dc3685f08c301466909f0794508a52, author = Florian Roth, description = Detects unknown malware sample with pastebin RAW URL, reference = https://goo.gl/iqH8CK, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: pisun.exe, type: SAMPLEMatched rule: crimeware_njrat_strings author = Sekoia.io, description = Detects njRAT based on some strings, creation_date = 2022-08-22, classification = TLP:CLEAR, version = 1.0, id = 215807ae-fbcb-478d-8941-e0787b883669
          Source: pisun.exe, type: SAMPLEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
          Source: pisun.exe, type: SAMPLEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
          Source: pisun.exe, type: SAMPLEMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
          Source: 1.0.pisun.exe.1d0000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
          Source: 1.0.pisun.exe.1d0000.0.unpack, type: UNPACKEDPEMatched rule: RevengeRAT_Sep17 date = 2017-09-04, hash3 = fe00c4f9c8439eea50b44f817f760d8107f81e2dba7f383009fde508ff4b8967, hash2 = 7c271484c11795876972aabeb277c7b3035f896c9e860a852d69737df6e14213, hash1 = 2a86a4b2dcf1657bcb2922e70fc787aa9b66ec1c26dc2119f669bd2ce3f2e94a, author = Florian Roth, description = Detects RevengeRAT malware, reference = Internal Research, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 1.0.pisun.exe.1d0000.0.unpack, type: UNPACKEDPEMatched rule: CN_disclosed_20180208_c date = 2018-02-08, hash1 = 17475d25d40c877284e73890a9dd55fccedc6a5a071c351a8c342c8ef7f9cea7, author = Florian Roth, description = Detects malware from disclosed CN malware set, reference = https://twitter.com/cyberintproject/status/961714165550342146, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 1.0.pisun.exe.1d0000.0.unpack, type: UNPACKEDPEMatched rule: Unknown_Malware_Sample_Jul17_2 date = 2017-08-01, hash1 = 3530d480db082af1823a7eb236203aca24dc3685f08c301466909f0794508a52, author = Florian Roth, description = Detects unknown malware sample with pastebin RAW URL, reference = https://goo.gl/iqH8CK, license = https://creativecommons.org/licenses/by-nc/4.0/
          Source: 1.0.pisun.exe.1d0000.0.unpack, type: UNPACKEDPEMatched rule: crimeware_njrat_strings author = Sekoia.io, description = Detects njRAT based on some strings, creation_date = 2022-08-22, classification = TLP:CLEAR, version = 1.0, id = 215807ae-fbcb-478d-8941-e0787b883669
          Source: 1.0.pisun.exe.1d0000.0.unpack, type: UNPACKEDPEMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
          Source: 1.0.pisun.exe.1d0000.0.unpack, type: UNPACKEDPEMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
          Source: 1.0.pisun.exe.1d0000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_NjRAT author = ditekSHen, description = Detects NjRAT / Bladabindi
          Source: 00000001.00000000.1269492282.00000000001D2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Njrat_30f3c220 reference_sample = 741a0f3954499c11f9eddc8df7c31e7c59ca41f1a7005646735b8b1d53438c1b, os = windows, severity = x86, creation_date = 2021-06-13, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Njrat, fingerprint = d15e131bca6beddcaecb20fffaff1784ad8a33a25e7ce90f7450d1a362908cc4, id = 30f3c220-b8dc-45a1-bcf0-027c2f76fa63, last_modified = 2021-10-04
          Source: 00000001.00000000.1269492282.00000000001D2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: njrat1 date = 2015-05-27, author = Brian Wallace @botnet_hunter, description = Identify njRat, author_email = bwall@ballastsecurity.net
          Source: 00000001.00000000.1269492282.00000000001D2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Njrat hash1 = d5f63213ce11798879520b0e9b0d1b68d55f7727758ec8c120e370699a41379d, author = JPCERT/CC Incident Response Group, description = detect njRAT in memory, rule_usage = memory scan
          Source: classification engineClassification label: mal100.phis.troj.spyw.evad.winEXE@1/0@1/1
          Source: C:\Users\user\Desktop\pisun.exeCode function: 1_2_049E0F32 AdjustTokenPrivileges,1_2_049E0F32
          Source: C:\Users\user\Desktop\pisun.exeCode function: 1_2_049E0EFB AdjustTokenPrivileges,1_2_049E0EFB
          Source: C:\Users\user\Desktop\pisun.exeMutant created: NULL
          Source: C:\Users\user\Desktop\pisun.exeMutant created: \Sessions\1\BaseNamedObjects\Global\.net clr networking
          Source: C:\Users\user\Desktop\pisun.exeMutant created: \Sessions\1\BaseNamedObjects\f9f7ecca9c9e7996304b914cc137e66d
          Source: pisun.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: pisun.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
          Source: C:\Users\user\Desktop\pisun.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: pisun.exeReversingLabs: Detection: 86%
          Source: pisun.exeVirustotal: Detection: 80%
          Source: C:\Users\user\Desktop\pisun.exeSection loaded: mscoree.dllJump to behavior
          Source: C:\Users\user\Desktop\pisun.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\Desktop\pisun.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\pisun.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\Desktop\pisun.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\Desktop\pisun.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\Desktop\pisun.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Users\user\Desktop\pisun.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\Desktop\pisun.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Users\user\Desktop\pisun.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Users\user\Desktop\pisun.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Users\user\Desktop\pisun.exeSection loaded: mswsock.dllJump to behavior
          Source: C:\Users\user\Desktop\pisun.exeSection loaded: dnsapi.dllJump to behavior
          Source: C:\Users\user\Desktop\pisun.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\pisun.exeSection loaded: rasadhlp.dllJump to behavior
          Source: C:\Users\user\Desktop\pisun.exeSection loaded: fwpuclnt.dllJump to behavior
          Source: C:\Users\user\Desktop\pisun.exeFile opened: C:\Windows\Microsoft.NET\Framework\v2.0.50727\mscorrc.dllJump to behavior
          Source: pisun.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
          Source: C:\Users\user\Desktop\pisun.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9672_none_d08f9da24428a513\MSVCR80.dllJump to behavior
          Source: pisun.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

          Data Obfuscation

          barindex
          Source: pisun.exe, OK.cs.Net Code: Plugin System.Reflection.Assembly.Load(byte[])
          Source: C:\Users\user\Desktop\pisun.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\pisun.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\pisun.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\pisun.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\pisun.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\pisun.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\pisun.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\pisun.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\pisun.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\pisun.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\pisun.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\pisun.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\pisun.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\pisun.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\pisun.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\pisun.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\pisun.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\pisun.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\pisun.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\pisun.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\pisun.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\pisun.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\pisun.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\pisun.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\pisun.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\pisun.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\pisun.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\pisun.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

          Malware Analysis System Evasion

          barindex
          Source: pisun.exeBinary or memory string: WIRESHARK.EXE9HTTPS://PASTEBIN.COM/RAW/???NULL
          Source: pisun.exe, 00000001.00000002.3738364787.0000000002811000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: WIRESHARK.EXE
          Source: C:\Users\user\Desktop\pisun.exeMemory allocated: B40000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\pisun.exeMemory allocated: 2810000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\pisun.exeMemory allocated: 4810000 memory commit | memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\pisun.exeWindow / User API: threadDelayed 1367Jump to behavior
          Source: C:\Users\user\Desktop\pisun.exeWindow / User API: threadDelayed 3733Jump to behavior
          Source: C:\Users\user\Desktop\pisun.exeWindow / User API: threadDelayed 4415Jump to behavior
          Source: C:\Users\user\Desktop\pisun.exeWindow / User API: foregroundWindowGot 1764Jump to behavior
          Source: C:\Users\user\Desktop\pisun.exe TID: 6644Thread sleep count: 1367 > 30Jump to behavior
          Source: C:\Users\user\Desktop\pisun.exe TID: 6644Thread sleep time: -1367000s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\pisun.exe TID: 8264Thread sleep count: 3733 > 30Jump to behavior
          Source: C:\Users\user\Desktop\pisun.exe TID: 6644Thread sleep count: 4415 > 30Jump to behavior
          Source: C:\Users\user\Desktop\pisun.exe TID: 6644Thread sleep time: -4415000s >= -30000sJump to behavior
          Source: pisun.exeBinary or memory string: VBoxService%\\.\PhysicalDrive0
          Source: pisun.exe, 00000001.00000002.3737489797.000000000063F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
          Source: C:\Users\user\Desktop\pisun.exeProcess token adjusted: DebugJump to behavior
          Source: C:\Users\user\Desktop\pisun.exeMemory allocated: page read and write | page guardJump to behavior

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: pisun.exe, kl.csReference to suspicious API methods: MapVirtualKey(a, 0u)
          Source: pisun.exe, kl.csReference to suspicious API methods: GetAsyncKeyState(num2)
          Source: pisun.exe, OK.csReference to suspicious API methods: capGetDriverDescriptionA(wDriver, ref lpszName, 100, ref lpszVer, 100)
          Source: pisun.exeBinary or memory string: Program Manager
          Source: pisun.exeBinary or memory string: Progman
          Source: pisun.exeBinary or memory string: Shell_TrayWnd+set CDAudio door open/set CDAudio door closed
          Source: pisun.exe, 00000001.00000002.3738364787.00000000028A9000.00000004.00000800.00020000.00000000.sdmp, pisun.exe, 00000001.00000002.3738364787.00000000028D4000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Program Manager@9
          Source: C:\Users\user\Desktop\pisun.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

          Lowering of HIPS / PFW / Operating System Security Settings

          barindex
          Source: C:\Users\user\Desktop\pisun.exeRegistry value created: HKEY_CURRENT_USER\Environment SEE_MASK_NOZONECHECKSJump to behavior
          Source: pisun.exe, 00000001.00000002.3738364787.0000000002811000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: Wireshark.exe

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: pisun.exe, type: SAMPLE
          Source: Yara matchFile source: 1.0.pisun.exe.1d0000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000001.00000000.1269492282.00000000001D2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: pisun.exe PID: 6640, type: MEMORYSTR

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: pisun.exe, type: SAMPLE
          Source: Yara matchFile source: 1.0.pisun.exe.1d0000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000001.00000000.1269492282.00000000001D2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: pisun.exe PID: 6640, type: MEMORYSTR
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
          Native API
          1
          DLL Side-Loading
          1
          Access Token Manipulation
          2
          Virtualization/Sandbox Evasion
          1
          Input Capture
          111
          Security Software Discovery
          Remote Services1
          Input Capture
          1
          Encrypted Channel
          Exfiltration Over Other Network MediumAbuse Accessibility Features
          CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
          Process Injection
          11
          Disable or Modify Tools
          LSASS Memory2
          Virtualization/Sandbox Evasion
          Remote Desktop Protocol1
          Archive Collected Data
          1
          Non-Standard Port
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
          DLL Side-Loading
          1
          Access Token Manipulation
          Security Account Manager1
          Process Discovery
          SMB/Windows Admin SharesData from Network Shared Drive1
          Non-Application Layer Protocol
          Automated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
          Process Injection
          NTDS1
          Application Window Discovery
          Distributed Component Object ModelInput Capture1
          Application Layer Protocol
          Traffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
          Software Packing
          LSA Secrets2
          System Information Discovery
          SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
          DLL Side-Loading
          Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet
          behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1646174 Sample: pisun.exe Startdate: 23/03/2025 Architecture: WINDOWS Score: 100 10 such-captain.gl.at.ply.gg 2->10 14 Found malware configuration 2->14 16 Malicious sample detected (through community Yara rule) 2->16 18 Antivirus / Scanner detection for submitted sample 2->18 20 7 other signatures 2->20 6 pisun.exe 3 4 2->6         started        signatures3 process4 dnsIp5 12 such-captain.gl.at.ply.gg 147.185.221.27, 7723 SALSGIVERUS United States 6->12 22 Disables zone checking for all users 6->22 24 Tries to detect sandboxes and other dynamic analysis tools (process name or module or function) 6->24 signatures6

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          pisun.exe86%ReversingLabsByteCode-MSIL.Backdoor.njRAT
          pisun.exe81%VirustotalBrowse
          pisun.exe100%AviraTR/Dropper.Gen7
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches

          Download Network PCAP: filteredfull

          NameIPActiveMaliciousAntivirus DetectionReputation
          such-captain.gl.at.ply.gg
          147.185.221.27
          truetrue
            unknown
            NameSourceMaliciousAntivirus DetectionReputation
            https://pastebin.com/raw/???pisun.exefalse
              high
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              147.185.221.27
              such-captain.gl.at.ply.ggUnited States
              12087SALSGIVERUStrue
              Joe Sandbox version:42.0.0 Malachite
              Analysis ID:1646174
              Start date and time:2025-03-23 14:58:09 +01:00
              Joe Sandbox product:CloudBasic
              Overall analysis duration:0h 6m 10s
              Hypervisor based Inspection enabled:false
              Report type:full
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 134, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
              Number of analysed new started processes analysed:13
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Sample name:pisun.exe
              Detection:MAL
              Classification:mal100.phis.troj.spyw.evad.winEXE@1/0@1/1
              EGA Information:
              • Successful, ratio: 100%
              HCA Information:
              • Successful, ratio: 99%
              • Number of executed functions: 66
              • Number of non-executed functions: 0
              Cookbook Comments:
              • Found application associated with file extension: .exe
              • Override analysis time to 240000 for current running targets taking high CPU consumption
              • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, backgroundTaskHost.exe, conhost.exe, svchost.exe
              • Excluded IPs from analysis (whitelisted): 23.204.23.20, 20.12.23.50, 20.96.153.111, 150.171.28.10
              • Excluded domains from analysis (whitelisted): fs.microsoft.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, g.bing.com, prod.fs.microsoft.com.akadns.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, e16604.dscf.akamaiedge.net, arc.msn.com, fe3cr.delivery.mp.microsoft.com
              • Not all processes where analyzed, report is missing behavior information
              • Report size getting too big, too many NtQueryValueKey calls found.
              TimeTypeDescription
              09:59:37API Interceptor1197990x Sleep call for process: pisun.exe modified
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              147.185.221.27XClient.exeGet hashmaliciousXWormBrowse
                Server.exe.bin.exeGet hashmaliciousNjratBrowse
                  RobloxInstaller.exeGet hashmaliciousUnknownBrowse
                    tsetup-x64.5.9.0.exeGet hashmaliciousRDPWrap ToolBrowse
                      123123.exe.bin.exeGet hashmaliciousNjratBrowse
                        Payload.exe.bin.exeGet hashmaliciousNjratBrowse
                          Payload1234.exe.bin.exeGet hashmaliciousNjratBrowse
                            remover.exeGet hashmaliciousUnknownBrowse
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              such-captain.gl.at.ply.ggXClient.exeGet hashmaliciousXWormBrowse
                              • 147.185.221.27
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              SALSGIVERUSXClient.exeGet hashmaliciousXWormBrowse
                              • 147.185.221.27
                              winupdate.scr.exeGet hashmaliciousUnknownBrowse
                              • 147.185.221.26
                              Bootstrapper.exeGet hashmaliciousXWormBrowse
                              • 147.185.221.26
                              Microsoft Word Host.exeGet hashmaliciousSheetRatBrowse
                              • 147.185.221.26
                              Client.exe.bin.exeGet hashmaliciousSheetRatBrowse
                              • 147.185.221.26
                              Server.exe.bin.exeGet hashmaliciousNjratBrowse
                              • 147.185.221.27
                              8M42o4UI1xlnUeX.exeGet hashmaliciousPureLog Stealer, XWormBrowse
                              • 147.185.221.26
                              RobloxInstaller.exeGet hashmaliciousUnknownBrowse
                              • 147.185.221.27
                              tsetup-x64.5.9.0.exeGet hashmaliciousRDPWrap ToolBrowse
                              • 147.185.221.27
                              ZGZ3X_nig.exeGet hashmaliciousChaos, StormKitty, TrojanRansomBrowse
                              • 147.185.221.26
                              No context
                              No context
                              No created / dropped files found
                              File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                              Entropy (8bit):5.616094873873246
                              TrID:
                              • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                              • Win32 Executable (generic) a (10002005/4) 49.75%
                              • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                              • Windows Screen Saver (13104/52) 0.07%
                              • Generic Win/DOS Executable (2004/3) 0.01%
                              File name:pisun.exe
                              File size:55'808 bytes
                              MD5:45140e967970cd63521eaa76dc4db7d7
                              SHA1:aae8aa4c5fb8e1d5a830f1f095d7550a89b7634a
                              SHA256:3990ab6d73f0a92606cb4c86d39e077f014da65413a264be94d03ca8478e64b8
                              SHA512:d8c5274fc1c66700c3fb63527973cb20106070698eebdf90e6b3f9ace371e34a653e382f949683d9aab0cb33fdd00ab2b943e499a4d2d6f42a24822fa2142129
                              SSDEEP:768:U8I0g652Esltuq55JR2ET3NwJSNbxWQG35bmaePD5PvXOC2XXJdxIEpmvg:U8ZVGtZ5DTCGlWQcGD0LX3xIEpmvg
                              TLSH:5C432944BBE68A01E2BD8F7468F655150B74AA23E932DB1F8CD558DB13327C68C80FE5
                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L......g............................>.... ........@.. .......................@............@................................
                              Icon Hash:90cececece8e8eb0
                              Entrypoint:0x40f03e
                              Entrypoint Section:.text
                              Digitally signed:false
                              Imagebase:0x400000
                              Subsystem:windows gui
                              Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                              DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                              Time Stamp:0x67DD8E03 [Fri Mar 21 16:04:19 2025 UTC]
                              TLS Callbacks:
                              CLR (.Net) Version:
                              OS Version Major:4
                              OS Version Minor:0
                              File Version Major:4
                              File Version Minor:0
                              Subsystem Version Major:4
                              Subsystem Version Minor:0
                              Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                              Instruction
                              jmp dword ptr [00402000h]
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              add byte ptr [eax], al
                              NameVirtual AddressVirtual Size Is in Section
                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IMPORT0xefe80x53.text
                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x100000x240.rsrc
                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x120000xc.reloc
                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                              .text0x20000xd0440xd200cc9ca2dc8d5fc1df659b46b6abfcd3c7False0.45202752976190474data5.636936645908858IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                              .rsrc0x100000x2400x4000da1702fee35fb285b88cc25720ab75aFalse0.310546875data4.964962934397579IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .reloc0x120000xc0x200a44a373176d72c27a795808f061fdec2False0.044921875data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                              NameRVASizeTypeLanguageCountryZLIB Complexity
                              RT_MANIFEST0x100580x1e7XML 1.0 document, ASCII text, with CRLF line terminators0.5338809034907598
                              DLLImport
                              mscoree.dll_CorExeMain

                              Download Network PCAP: filteredfull

                              • Total Packets: 55
                              • 7723 undefined
                              • 53 (DNS)
                              TimestampSource PortDest PortSource IPDest IP
                              Mar 23, 2025 14:59:08.763803959 CET497217723192.168.2.5147.185.221.27
                              Mar 23, 2025 14:59:09.779674053 CET497217723192.168.2.5147.185.221.27
                              Mar 23, 2025 14:59:11.795562029 CET497217723192.168.2.5147.185.221.27
                              Mar 23, 2025 14:59:15.808643103 CET497217723192.168.2.5147.185.221.27
                              Mar 23, 2025 14:59:23.808676958 CET497217723192.168.2.5147.185.221.27
                              Mar 23, 2025 14:59:31.842751980 CET497297723192.168.2.5147.185.221.27
                              Mar 23, 2025 14:59:32.842094898 CET497297723192.168.2.5147.185.221.27
                              Mar 23, 2025 14:59:34.840379000 CET497297723192.168.2.5147.185.221.27
                              Mar 23, 2025 14:59:38.839937925 CET497297723192.168.2.5147.185.221.27
                              Mar 23, 2025 14:59:46.839942932 CET497297723192.168.2.5147.185.221.27
                              Mar 23, 2025 14:59:54.858201027 CET497347723192.168.2.5147.185.221.27
                              Mar 23, 2025 14:59:55.855571985 CET497347723192.168.2.5147.185.221.27
                              Mar 23, 2025 14:59:57.871213913 CET497347723192.168.2.5147.185.221.27
                              Mar 23, 2025 15:00:01.949345112 CET497347723192.168.2.5147.185.221.27
                              Mar 23, 2025 15:00:09.949364901 CET497347723192.168.2.5147.185.221.27
                              Mar 23, 2025 15:00:17.982551098 CET497357723192.168.2.5147.185.221.27
                              Mar 23, 2025 15:00:18.980628014 CET497357723192.168.2.5147.185.221.27
                              Mar 23, 2025 15:00:20.980627060 CET497357723192.168.2.5147.185.221.27
                              Mar 23, 2025 15:00:24.980662107 CET497357723192.168.2.5147.185.221.27
                              Mar 23, 2025 15:00:32.980686903 CET497357723192.168.2.5147.185.221.27
                              Mar 23, 2025 15:00:41.005840063 CET497367723192.168.2.5147.185.221.27
                              Mar 23, 2025 15:00:42.011986017 CET497367723192.168.2.5147.185.221.27
                              Mar 23, 2025 15:00:44.027559042 CET497367723192.168.2.5147.185.221.27
                              Mar 23, 2025 15:00:48.027684927 CET497367723192.168.2.5147.185.221.27
                              Mar 23, 2025 15:00:56.027580976 CET497367723192.168.2.5147.185.221.27
                              Mar 23, 2025 15:01:04.044759989 CET497377723192.168.2.5147.185.221.27
                              Mar 23, 2025 15:01:05.215116024 CET497377723192.168.2.5147.185.221.27
                              Mar 23, 2025 15:01:07.215131044 CET497377723192.168.2.5147.185.221.27
                              Mar 23, 2025 15:01:11.215131998 CET497377723192.168.2.5147.185.221.27
                              Mar 23, 2025 15:01:19.215188980 CET497377723192.168.2.5147.185.221.27
                              Mar 23, 2025 15:01:27.263868093 CET497387723192.168.2.5147.185.221.27
                              Mar 23, 2025 15:01:28.433962107 CET497387723192.168.2.5147.185.221.27
                              Mar 23, 2025 15:01:30.434058905 CET497387723192.168.2.5147.185.221.27
                              Mar 23, 2025 15:01:34.449522018 CET497387723192.168.2.5147.185.221.27
                              Mar 23, 2025 15:01:42.465187073 CET497387723192.168.2.5147.185.221.27
                              Mar 23, 2025 15:01:50.513664007 CET497397723192.168.2.5147.185.221.27
                              Mar 23, 2025 15:01:51.699680090 CET497397723192.168.2.5147.185.221.27
                              Mar 23, 2025 15:01:53.715270042 CET497397723192.168.2.5147.185.221.27
                              Mar 23, 2025 15:01:57.730899096 CET497397723192.168.2.5147.185.221.27
                              Mar 23, 2025 15:02:05.746464014 CET497397723192.168.2.5147.185.221.27
                              Mar 23, 2025 15:02:13.795100927 CET497407723192.168.2.5147.185.221.27
                              Mar 23, 2025 15:02:14.965236902 CET497407723192.168.2.5147.185.221.27
                              Mar 23, 2025 15:02:16.981004953 CET497407723192.168.2.5147.185.221.27
                              Mar 23, 2025 15:02:20.996453047 CET497407723192.168.2.5147.185.221.27
                              Mar 23, 2025 15:02:29.012209892 CET497407723192.168.2.5147.185.221.27
                              Mar 23, 2025 15:02:37.045190096 CET497417723192.168.2.5147.185.221.27
                              Mar 23, 2025 15:02:38.059001923 CET497417723192.168.2.5147.185.221.27
                              Mar 23, 2025 15:02:40.059040070 CET497417723192.168.2.5147.185.221.27
                              Mar 23, 2025 15:02:44.074620008 CET497417723192.168.2.5147.185.221.27
                              Mar 23, 2025 15:02:52.090311050 CET497417723192.168.2.5147.185.221.27
                              Mar 23, 2025 15:03:00.108047009 CET497427723192.168.2.5147.185.221.27
                              Mar 23, 2025 15:03:01.121618986 CET497427723192.168.2.5147.185.221.27
                              Mar 23, 2025 15:03:03.137269020 CET497427723192.168.2.5147.185.221.27
                              Mar 23, 2025 15:03:07.278201103 CET497427723192.168.2.5147.185.221.27
                              TimestampSource PortDest PortSource IPDest IP
                              Mar 23, 2025 14:59:08.576785088 CET6148453192.168.2.51.1.1.1
                              Mar 23, 2025 14:59:08.760263920 CET53614841.1.1.1192.168.2.5
                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                              Mar 23, 2025 14:59:08.576785088 CET192.168.2.51.1.1.10x9466Standard query (0)such-captain.gl.at.ply.ggA (IP address)IN (0x0001)false
                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                              Mar 23, 2025 14:59:08.760263920 CET1.1.1.1192.168.2.50x9466No error (0)such-captain.gl.at.ply.gg147.185.221.27A (IP address)IN (0x0001)false
                              050100150200s020406080100

                              Click to jump to process

                              050100150200s0.0051015MB

                              Click to jump to process

                              • File
                              • Registry
                              • Network

                              Click to dive into process behavior distribution

                              Target ID:1
                              Start time:09:58:58
                              Start date:23/03/2025
                              Path:C:\Users\user\Desktop\pisun.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Users\user\Desktop\pisun.exe"
                              Imagebase:0x1d0000
                              File size:55'808 bytes
                              MD5 hash:45140E967970CD63521EAA76DC4DB7D7
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: JoeSecurity_Njrat, Description: Yara detected Njrat, Source: 00000001.00000000.1269492282.00000000001D2000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                              • Rule: Windows_Trojan_Njrat_30f3c220, Description: unknown, Source: 00000001.00000000.1269492282.00000000001D2000.00000002.00000001.01000000.00000003.sdmp, Author: unknown
                              • Rule: njrat1, Description: Identify njRat, Source: 00000001.00000000.1269492282.00000000001D2000.00000002.00000001.01000000.00000003.sdmp, Author: Brian Wallace @botnet_hunter
                              • Rule: Njrat, Description: detect njRAT in memory, Source: 00000001.00000000.1269492282.00000000001D2000.00000002.00000001.01000000.00000003.sdmp, Author: JPCERT/CC Incident Response Group
                              Reputation:low
                              Has exited:false

                              Execution Graph

                              Execution Coverage

                              Dynamic/Packed Code Coverage

                              Signature Coverage

                              Execution Coverage:17.9%
                              Dynamic/Decrypted Code Coverage:100%
                              Signature Coverage:5.4%
                              Total number of Nodes:111
                              Total number of Limit Nodes:4
                              Show Legend
                              Hide Nodes/Edges
                              execution_graph 3373 aead2e 3374 aead6c DuplicateHandle 3373->3374 3375 aeada4 3373->3375 3376 aead7a 3374->3376 3375->3374 3384 aeb722 3385 aeb75a CreateFileW 3384->3385 3387 aeb7a9 3385->3387 3482 49e0492 3484 49e04b2 MapViewOfFile 3482->3484 3485 49e0539 3484->3485 3392 cc1541 KiUserExceptionDispatcher 3393 cc1584 3392->3393 3486 aeaea3 3487 aeaed2 OleInitialize 3486->3487 3489 aeaf0c 3487->3489 3490 49e1880 3491 49e18a0 FormatMessageW 3490->3491 3493 49e192a 3491->3493 3494 49e0cba 3496 49e0cea WSAConnect 3494->3496 3497 49e0d3e 3496->3497 3546 aead07 3547 aead2e DuplicateHandle 3546->3547 3549 aead7a 3547->3549 3458 49e0f32 3459 49e0f61 AdjustTokenPrivileges 3458->3459 3461 49e0f83 3459->3461 3498 49e14a8 3500 49e14ca RegCreateKeyExW 3498->3500 3501 49e1574 3500->3501 3550 aea612 3551 aea646 CreateMutexW 3550->3551 3553 aea6c1 3551->3553 3554 aea710 3555 aea74e CloseHandle 3554->3555 3557 aea788 3555->3557 3502 49e02dc 3504 49e0302 ConvertStringSecurityDescriptorToSecurityDescriptorW 3502->3504 3505 49e037b 3504->3505 3506 aeb6e2 3507 aeb722 CreateFileW 3506->3507 3509 aeb7a9 3507->3509 3558 aea462 3559 aea486 RegSetValueExW 3558->3559 3561 aea507 3559->3561 3562 49e0152 3563 49e0159 GetComputerNameW 3562->3563 3565 49e01dc 3563->3565 3566 aea361 3567 aea392 RegQueryValueExW 3566->3567 3569 aea41b 3567->3569 3394 aea2fe 3395 aea32a SetErrorMode 3394->3395 3396 aea353 3394->3396 3397 aea33f 3395->3397 3396->3395 3398 aebafa 3399 aebb2f ReadFile 3398->3399 3401 aebb61 3399->3401 3570 49e124b 3571 49e126e SetProcessWorkingSetSize 3570->3571 3573 49e12cf 3571->3573 3510 aeb7f8 3511 aeb83a GetFileType 3510->3511 3513 aeb89c 3511->3513 3428 aea74e 3429 aea77a CloseHandle 3428->3429 3430 aea7b9 3428->3430 3431 aea788 3429->3431 3430->3429 3432 49e017e 3433 49e01ce GetComputerNameW 3432->3433 3434 49e01dc 3433->3434 3578 49e107d 3579 49e10ae GetExitCodeProcess 3578->3579 3581 49e110c 3579->3581 3514 49e0efb 3515 49e0f05 AdjustTokenPrivileges 3514->3515 3517 49e0f83 3515->3517 3442 aea646 3443 aea67e CreateMutexW 3442->3443 3445 aea6c1 3443->3445 3582 49e0d76 3583 49e0db2 LookupPrivilegeValueW 3582->3583 3585 49e0e02 3583->3585 3522 aea7c7 3523 aea7fa RegOpenKeyExW 3522->3523 3525 aea888 3523->3525 3586 aebd42 3588 aebd62 WSASocketW 3586->3588 3589 aebdd6 3588->3589 3526 aea8c1 3527 aea902 SendMessageTimeoutA 3526->3527 3529 aea985 3527->3529 3530 aebada 3531 aebafa ReadFile 3530->3531 3533 aebb61 3531->3533 3534 49e0ae8 3536 49e0b0a getaddrinfo 3534->3536 3537 49e0bb7 3536->3537 3590 49e1167 3591 49e118a GetProcessWorkingSetSize 3590->3591 3593 49e11eb 3591->3593 3474 aeaed2 3475 aeaefe OleInitialize 3474->3475 3476 aeaf34 3474->3476 3477 aeaf0c 3475->3477 3476->3475 3538 aea2d2 3539 aea2d6 SetErrorMode 3538->3539 3541 aea33f 3539->3541 3542 49e09e0 3543 49e09fe GetProcessTimes 3542->3543 3545 49e0a85 3543->3545

                              Executed Functions

                              APIs
                              • AdjustTokenPrivileges.KERNELBASE(?,?,?,?,?,?), ref: 049E0F7B
                              Memory Dump Source
                              • Source File: 00000001.00000002.3739380110.00000000049E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_49e0000_pisun.jbxd
                              Similarity
                              • API ID: AdjustPrivilegesToken
                              • String ID:
                              • API String ID: 2874748243-0
                              • Opcode ID: cf3b35390b61dd167a3e92af12a28417ee73dbc6f4d34306ff61bd9fdf7fefe8
                              • Instruction ID: 1bb19e8926b69932c556bebc58a098735a8c241142e7c76b7ba2ea9a1283a7e8
                              • Opcode Fuzzy Hash: cf3b35390b61dd167a3e92af12a28417ee73dbc6f4d34306ff61bd9fdf7fefe8
                              • Instruction Fuzzy Hash: B4219F755097849FDB238F25DC44B62BFB8EF06310F0984EAE9858B163D271A918CB62
                              APIs
                              • AdjustTokenPrivileges.KERNELBASE(?,?,?,?,?,?), ref: 049E0F7B
                              Memory Dump Source
                              • Source File: 00000001.00000002.3739380110.00000000049E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_49e0000_pisun.jbxd
                              Similarity
                              • API ID: AdjustPrivilegesToken
                              • String ID:
                              • API String ID: 2874748243-0
                              • Opcode ID: 7a0b93d70e5aa7a0b7a908ed02530ae106ada4d76f3f6b0d70302df3dc542751
                              • Instruction ID: c8149d5221933c7cccda4aef96b4d292d0aa8a3222d57fc81d4ac5799e91c6f4
                              • Opcode Fuzzy Hash: 7a0b93d70e5aa7a0b7a908ed02530ae106ada4d76f3f6b0d70302df3dc542751
                              • Instruction Fuzzy Hash: BB1191715003049FDB21CF55D944B66FBE8EF04210F08C86AEE858B652D371E418DF61
                              Memory Dump Source
                              • Source File: 00000001.00000002.3738284261.0000000000CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_cc0000_pisun.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 49d40b320593dd2e8d43ca3e7b385f3995c27acf64db833bc260653f840c3ee6
                              • Instruction ID: 8033791139f431d0be3d37e198723c2c1d7239e53055c79f3501f66c09d59cf9
                              • Opcode Fuzzy Hash: 49d40b320593dd2e8d43ca3e7b385f3995c27acf64db833bc260653f840c3ee6
                              • Instruction Fuzzy Hash: 42925974A00208CFDB18EF74D994BADB7B6BF88308F1041A9D909AB795DB35AD85CF50

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 19 cc1550-cc1595 KiUserExceptionDispatcher 23 cc1598-cc159e 19->23 24 cc169c-cc16c7 23->24 25 cc15a4-cc15a7 23->25 26 cc15a9 25->26 57 cc15ab call d205e0 26->57 58 cc15ab call d20606 26->58 28 cc15b0-cc15dd 33 cc15df-cc15e3 call cc2410 28->33 34 cc1624-cc1627 28->34 39 cc15e9-cc15f0 33->39 34->24 36 cc1629-cc162f 34->36 36->26 38 cc1635-cc163c 36->38 40 cc168d-cc1697 38->40 41 cc163e-cc1654 38->41 42 cc1621 39->42 43 cc15f2-cc1619 39->43 40->23 41->24 48 cc1656-cc165e 41->48 42->34 43->42 49 cc167f-cc1687 call cc2358 48->49 50 cc1660-cc166b 48->50 49->40 50->24 52 cc166d-cc1677 50->52 52->49 57->28 58->28
                              APIs
                              • KiUserExceptionDispatcher.NTDLL ref: 00CC1577
                              Memory Dump Source
                              • Source File: 00000001.00000002.3738284261.0000000000CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_cc0000_pisun.jbxd
                              Similarity
                              • API ID: DispatcherExceptionUser
                              • String ID:
                              • API String ID: 6842923-0
                              • Opcode ID: a3044d227a55dbc92bf66f979f8dec98c8196ed21b747b839a13846f82cfb967
                              • Instruction ID: d20ac2d286df62e7c70b335401702c802f0b2dfa3726d857c6afe9be9218ded4
                              • Opcode Fuzzy Hash: a3044d227a55dbc92bf66f979f8dec98c8196ed21b747b839a13846f82cfb967
                              • Instruction Fuzzy Hash: 11418671A002048FCB04EF79C5856ADB7F2EF88354B188169E819DB399DB34DD45C7A4

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 60 cc1541-cc157d KiUserExceptionDispatcher 61 cc1584-cc1595 60->61 64 cc1598-cc159e 61->64 65 cc169c-cc16c7 64->65 66 cc15a4-cc15a7 64->66 67 cc15a9 66->67 99 cc15ab call d205e0 67->99 100 cc15ab call d20606 67->100 69 cc15b0-cc15dd 74 cc15df-cc15e3 call cc2410 69->74 75 cc1624-cc1627 69->75 80 cc15e9-cc15f0 74->80 75->65 77 cc1629-cc162f 75->77 77->67 79 cc1635-cc163c 77->79 81 cc168d-cc1697 79->81 82 cc163e-cc1654 79->82 83 cc1621 80->83 84 cc15f2-cc1619 80->84 81->64 82->65 89 cc1656-cc165e 82->89 83->75 84->83 90 cc167f-cc1687 call cc2358 89->90 91 cc1660-cc166b 89->91 90->81 91->65 93 cc166d-cc1677 91->93 93->90 99->69 100->69
                              APIs
                              • KiUserExceptionDispatcher.NTDLL ref: 00CC1577
                              Memory Dump Source
                              • Source File: 00000001.00000002.3738284261.0000000000CC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CC0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_cc0000_pisun.jbxd
                              Similarity
                              • API ID: DispatcherExceptionUser
                              • String ID:
                              • API String ID: 6842923-0
                              • Opcode ID: a7e96c7df9ea6abd030d175d5d8dfcb080091295d48dfe1889d7ddc4f452ab66
                              • Instruction ID: e49a60075baf57a1cfb3aaa11389579fbc83d2efb97e66131292a3e08fbcd23c
                              • Opcode Fuzzy Hash: a7e96c7df9ea6abd030d175d5d8dfcb080091295d48dfe1889d7ddc4f452ab66
                              • Instruction Fuzzy Hash: 49413271A002048FCB04DF79C595AADB7F2EF89344B188569E809DB39ADB34DD85CBA4

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 101 aeb6e2-aeb77a 105 aeb77f-aeb78b 101->105 106 aeb77c 101->106 107 aeb78d 105->107 108 aeb790-aeb799 105->108 106->105 107->108 109 aeb7ea-aeb7ef 108->109 110 aeb79b-aeb7bf CreateFileW 108->110 109->110 113 aeb7f1-aeb7f6 110->113 114 aeb7c1-aeb7e7 110->114 113->114
                              APIs
                              • CreateFileW.KERNELBASE(?,?,?,?,?,?), ref: 00AEB7A1
                              Memory Dump Source
                              • Source File: 00000001.00000002.3737861829.0000000000AEA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AEA000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_aea000_pisun.jbxd
                              Similarity
                              • API ID: CreateFile
                              • String ID:
                              • API String ID: 823142352-0
                              • Opcode ID: 40e008acec435dc6ce4ed571ea8b60763a5daea798cd6a9d7042c36ce5f5b7b1
                              • Instruction ID: b9b3bcfa88d6fa36ec5aded0b5b3d40df702e67e1645650c6708db196cb12b17
                              • Opcode Fuzzy Hash: 40e008acec435dc6ce4ed571ea8b60763a5daea798cd6a9d7042c36ce5f5b7b1
                              • Instruction Fuzzy Hash: 5931B271505380AFE722CF26DC44BA6BFE8EF46314F08849EE9858B653D335A809CB71

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 117 49e14a8-49e1522 121 49e1527-49e1533 117->121 122 49e1524 117->122 123 49e1538-49e1541 121->123 124 49e1535 121->124 122->121 125 49e1546-49e155d 123->125 126 49e1543 123->126 124->123 128 49e159f-49e15a4 125->128 129 49e155f-49e1572 RegCreateKeyExW 125->129 126->125 128->129 130 49e15a6-49e15ab 129->130 131 49e1574-49e159c 129->131 130->131
                              APIs
                              • RegCreateKeyExW.KERNELBASE(?,00000E24), ref: 049E1565
                              Memory Dump Source
                              • Source File: 00000001.00000002.3739380110.00000000049E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_49e0000_pisun.jbxd
                              Similarity
                              • API ID: Create
                              • String ID:
                              • API String ID: 2289755597-0
                              • Opcode ID: 5f405f16cb1dd90188c5e0f42b951fc76977ec95d05c638eea921b5226d18148
                              • Instruction ID: 6653592d6ed5d249029501f97b74d3104db45775fd96b2dc2c95b88d39ed6900
                              • Opcode Fuzzy Hash: 5f405f16cb1dd90188c5e0f42b951fc76977ec95d05c638eea921b5226d18148
                              • Instruction Fuzzy Hash: 04318EB2504344AFEB228B26CC45FA7BBFCEF09614F08855AF985C7652D220E909CB61

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 136 aebc4f-aebc6f 137 aebc91-aebcc3 136->137 138 aebc71-aebc90 136->138 142 aebcc6-aebd1e RegQueryValueExW 137->142 138->137 144 aebd24-aebd3a 142->144
                              APIs
                              • RegQueryValueExW.KERNELBASE(?,00000E24,?,?), ref: 00AEBD16
                              Memory Dump Source
                              • Source File: 00000001.00000002.3737861829.0000000000AEA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AEA000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_aea000_pisun.jbxd
                              Similarity
                              • API ID: QueryValue
                              • String ID:
                              • API String ID: 3660427363-0
                              • Opcode ID: 40c9220cbc2e422c9b54a17de7287f21729104fa79c350986e7463400dfd5462
                              • Instruction ID: 7092834498cebca2f297c74732eb1db4898dc0e612da4d930d462ab2ef49671e
                              • Opcode Fuzzy Hash: 40c9220cbc2e422c9b54a17de7287f21729104fa79c350986e7463400dfd5462
                              • Instruction Fuzzy Hash: 98318D7510E3C06FD3138B258C65A62BFB4EF47610B0E45CBD8C48B6A3D2296809C7B2

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 145 aea7c7-aea855 149 aea85a-aea871 145->149 150 aea857 145->150 152 aea8b3-aea8b8 149->152 153 aea873-aea886 RegOpenKeyExW 149->153 150->149 152->153 154 aea8ba-aea8bf 153->154 155 aea888-aea8b0 153->155 154->155
                              APIs
                              • RegOpenKeyExW.KERNELBASE(?,00000E24), ref: 00AEA879
                              Memory Dump Source
                              • Source File: 00000001.00000002.3737861829.0000000000AEA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AEA000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_aea000_pisun.jbxd
                              Similarity
                              • API ID: Open
                              • String ID:
                              • API String ID: 71445658-0
                              • Opcode ID: 9a5f59503535308c8cb4454bf93c62478dbce3d6bcf8407ea7c5f9f9f5a3055d
                              • Instruction ID: b0c52a9c7037bfe26d0da401e902e61ab6b01bd22fd68ae606252ca08eb0e24b
                              • Opcode Fuzzy Hash: 9a5f59503535308c8cb4454bf93c62478dbce3d6bcf8407ea7c5f9f9f5a3055d
                              • Instruction Fuzzy Hash: 0731B8764083846FE7228B51DC44FA7BFBCEF16714F04449AE985CB653D264A90DC771

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 160 49e0ae8-49e0ba7 166 49e0bf9-49e0bfe 160->166 167 49e0ba9-49e0bb1 getaddrinfo 160->167 166->167 168 49e0bb7-49e0bc9 167->168 170 49e0bcb-49e0bf6 168->170 171 49e0c00-49e0c05 168->171 171->170
                              APIs
                              • getaddrinfo.WS2_32(?,00000E24), ref: 049E0BAF
                              Memory Dump Source
                              • Source File: 00000001.00000002.3739380110.00000000049E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_49e0000_pisun.jbxd
                              Similarity
                              • API ID: getaddrinfo
                              • String ID:
                              • API String ID: 300660673-0
                              • Opcode ID: 0dbfdc52f0853b9cf89ff14330b09713e520015cdd7406613aea0100dce486c5
                              • Instruction ID: b7f4d3ccf49fb6f2dd7ceba0cfc4d36e88d4145333b11095ec3f8d4562b56758
                              • Opcode Fuzzy Hash: 0dbfdc52f0853b9cf89ff14330b09713e520015cdd7406613aea0100dce486c5
                              • Instruction Fuzzy Hash: 5331A2B1504344AFEB21CB51DC44FAAFBACEF04714F04889AFA489B692D375A949CB71

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 175 aea612-aea695 179 aea69a-aea6a3 175->179 180 aea697 175->180 181 aea6a8-aea6b1 179->181 182 aea6a5 179->182 180->179 183 aea702-aea707 181->183 184 aea6b3-aea6d7 CreateMutexW 181->184 182->181 183->184 187 aea709-aea70e 184->187 188 aea6d9-aea6ff 184->188 187->188
                              APIs
                              • CreateMutexW.KERNELBASE(?,?), ref: 00AEA6B9
                              Memory Dump Source
                              • Source File: 00000001.00000002.3737861829.0000000000AEA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AEA000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_aea000_pisun.jbxd
                              Similarity
                              • API ID: CreateMutex
                              • String ID:
                              • API String ID: 1964310414-0
                              • Opcode ID: d5eecfa827a474a20f664688604e6597326822f11781c47acc0d9c445ce21513
                              • Instruction ID: 0854e143ac1110d0a13ad79f679e0c5adc9dfa76991b0410002cb2dc76780344
                              • Opcode Fuzzy Hash: d5eecfa827a474a20f664688604e6597326822f11781c47acc0d9c445ce21513
                              • Instruction Fuzzy Hash: 813193755093845FE712CB25CC95B96BFF8EF06314F08849AE984CB293D375E909C762

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 191 49e02dc-49e035d 195 49e035f 191->195 196 49e0362-49e036b 191->196 195->196 197 49e036d-49e0375 ConvertStringSecurityDescriptorToSecurityDescriptorW 196->197 198 49e03c3-49e03c8 196->198 200 49e037b-49e038d 197->200 198->197 201 49e038f-49e03c0 200->201 202 49e03ca-49e03cf 200->202 202->201
                              APIs
                              • ConvertStringSecurityDescriptorToSecurityDescriptorW.ADVAPI32(?,00000E24), ref: 049E0373
                              Memory Dump Source
                              • Source File: 00000001.00000002.3739380110.00000000049E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_49e0000_pisun.jbxd
                              Similarity
                              • API ID: DescriptorSecurity$ConvertString
                              • String ID:
                              • API String ID: 3907675253-0
                              • Opcode ID: 127f6f104f80ad3616005c0e9bfe52b7041d409d59265fbe19d97a1e093b730d
                              • Instruction ID: 5b1fd434d8620dea9e6f2e1c6a6de175f8c031f9c3a821c77bd9c8b7390c8be1
                              • Opcode Fuzzy Hash: 127f6f104f80ad3616005c0e9bfe52b7041d409d59265fbe19d97a1e093b730d
                              • Instruction Fuzzy Hash: 18318471505384AFD722CF65DC45FABBFACEF05210F0884AAE944CB552D364E808CB71

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 206 49e09e0-49e0a75 211 49e0a77-49e0a7f GetProcessTimes 206->211 212 49e0ac2-49e0ac7 206->212 213 49e0a85-49e0a97 211->213 212->211 215 49e0ac9-49e0ace 213->215 216 49e0a99-49e0abf 213->216 215->216
                              APIs
                              • GetProcessTimes.KERNELBASE(?,00000E24,6DCD202F,00000000,00000000,00000000,00000000), ref: 049E0A7D
                              Memory Dump Source
                              • Source File: 00000001.00000002.3739380110.00000000049E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_49e0000_pisun.jbxd
                              Similarity
                              • API ID: ProcessTimes
                              • String ID:
                              • API String ID: 1995159646-0
                              • Opcode ID: 92413ddf05a26686a24b1a8289fb1b669371ecad93398db74abd5095f91e88a7
                              • Instruction ID: c6dd38b507502297aea6ca5e1508f726dc7d0ab4f7a500ac9418c92f69c62165
                              • Opcode Fuzzy Hash: 92413ddf05a26686a24b1a8289fb1b669371ecad93398db74abd5095f91e88a7
                              • Instruction Fuzzy Hash: 6331F772409380AFE722CF61DC45BA6BFB8EF06310F08849BE9848F193D361A509CB75

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 219 aea8c1-aea975 223 aea9b9-aea9be 219->223 224 aea977-aea97f SendMessageTimeoutA 219->224 223->224 226 aea985-aea997 224->226 227 aea999-aea9b6 226->227 228 aea9c0-aea9c5 226->228 228->227
                              APIs
                              • SendMessageTimeoutA.USER32(?,00000E24), ref: 00AEA97D
                              Memory Dump Source
                              • Source File: 00000001.00000002.3737861829.0000000000AEA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AEA000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_aea000_pisun.jbxd
                              Similarity
                              • API ID: MessageSendTimeout
                              • String ID:
                              • API String ID: 1599653421-0
                              • Opcode ID: 45725cbf1cadd9efc11bc187c7ea51136fd81ef13b04dfce4e639931b0e19a98
                              • Instruction ID: ea7379fe54a2833d6ffdfcd26e1a4684e8ad96946a149ae576ea04c217e6d484
                              • Opcode Fuzzy Hash: 45725cbf1cadd9efc11bc187c7ea51136fd81ef13b04dfce4e639931b0e19a98
                              • Instruction Fuzzy Hash: A231C271009384AFEB228F61CC45FA6BFB8EF06314F08849AE9858B553D275A809CB65

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 231 49e14ca-49e1522 234 49e1527-49e1533 231->234 235 49e1524 231->235 236 49e1538-49e1541 234->236 237 49e1535 234->237 235->234 238 49e1546-49e155d 236->238 239 49e1543 236->239 237->236 241 49e159f-49e15a4 238->241 242 49e155f-49e1572 RegCreateKeyExW 238->242 239->238 241->242 243 49e15a6-49e15ab 242->243 244 49e1574-49e159c 242->244 243->244
                              APIs
                              • RegCreateKeyExW.KERNELBASE(?,00000E24), ref: 049E1565
                              Memory Dump Source
                              • Source File: 00000001.00000002.3739380110.00000000049E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_49e0000_pisun.jbxd
                              Similarity
                              • API ID: Create
                              • String ID:
                              • API String ID: 2289755597-0
                              • Opcode ID: 9c92dfe05bddb97d18fcbb8a1ced6703f35c5fb4f89c17c9884fe9c4362f7ca7
                              • Instruction ID: f833cc845969592c26a3f0c082e0bef611436510e7813754f43b7ac3cb8c0ba6
                              • Opcode Fuzzy Hash: 9c92dfe05bddb97d18fcbb8a1ced6703f35c5fb4f89c17c9884fe9c4362f7ca7
                              • Instruction Fuzzy Hash: 88215172500204AFEB21DF16CC45FBBBBECEF08614F04856AE946D7652D730F548CA61

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 249 aea361-aea3cf 252 aea3d4-aea3dd 249->252 253 aea3d1 249->253 254 aea3df 252->254 255 aea3e2-aea3e8 252->255 253->252 254->255 256 aea3ed-aea404 255->256 257 aea3ea 255->257 259 aea43b-aea440 256->259 260 aea406-aea419 RegQueryValueExW 256->260 257->256 259->260 261 aea41b-aea438 260->261 262 aea442-aea447 260->262 262->261
                              APIs
                              • RegQueryValueExW.KERNELBASE(?,00000E24,6DCD202F,00000000,00000000,00000000,00000000), ref: 00AEA40C
                              Memory Dump Source
                              • Source File: 00000001.00000002.3737861829.0000000000AEA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AEA000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_aea000_pisun.jbxd
                              Similarity
                              • API ID: QueryValue
                              • String ID:
                              • API String ID: 3660427363-0
                              • Opcode ID: fddd745a04ebb712cb6b9d57cc8408ce60f7a3edbe85bd68c481c402951e9be9
                              • Instruction ID: 26f8b99f51577f671cd734ebd3daf7cde43176b7bad59fc9ef58f98799de3579
                              • Opcode Fuzzy Hash: fddd745a04ebb712cb6b9d57cc8408ce60f7a3edbe85bd68c481c402951e9be9
                              • Instruction Fuzzy Hash: 79318175505784AFD722CF11CC84F96BBF8EF05710F08849AE9858B693D364E949CB72

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 266 49e0b0a-49e0ba7 271 49e0bf9-49e0bfe 266->271 272 49e0ba9-49e0bb1 getaddrinfo 266->272 271->272 273 49e0bb7-49e0bc9 272->273 275 49e0bcb-49e0bf6 273->275 276 49e0c00-49e0c05 273->276 276->275
                              APIs
                              • getaddrinfo.WS2_32(?,00000E24), ref: 049E0BAF
                              Memory Dump Source
                              • Source File: 00000001.00000002.3739380110.00000000049E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_49e0000_pisun.jbxd
                              Similarity
                              • API ID: getaddrinfo
                              • String ID:
                              • API String ID: 300660673-0
                              • Opcode ID: 5c4567fb3a9e42cbbac88b312cdc78ec8915fc398b43ddf17cfa59129293f58a
                              • Instruction ID: 10163ed1f35ae37e34c0f3f8a47229c3ebf00475b65ec75416c21bf4a809fc4a
                              • Opcode Fuzzy Hash: 5c4567fb3a9e42cbbac88b312cdc78ec8915fc398b43ddf17cfa59129293f58a
                              • Instruction Fuzzy Hash: 6621BF71100204AEEB21DB51CC84FBAF7ACEF04714F14885AFA489B681D7B5B54DCB71
                              APIs
                              • GetFileType.KERNELBASE(?,00000E24,6DCD202F,00000000,00000000,00000000,00000000), ref: 00AEB88D
                              Memory Dump Source
                              • Source File: 00000001.00000002.3737861829.0000000000AEA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AEA000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_aea000_pisun.jbxd
                              Similarity
                              • API ID: FileType
                              • String ID:
                              • API String ID: 3081899298-0
                              • Opcode ID: 26a47d903df04198675ce84a3e42b58fe9d065bf1af0e9fdf06a8622b8bec71b
                              • Instruction ID: fbc3afd2cad9323957eb0516bdc71b1b29574e467e2035c9ac879e0f9dd480d1
                              • Opcode Fuzzy Hash: 26a47d903df04198675ce84a3e42b58fe9d065bf1af0e9fdf06a8622b8bec71b
                              • Instruction Fuzzy Hash: B521F8B54093C46FE7128B21DC85BA6BFACEF47720F0880D6E9808B693D264A909C775
                              APIs
                              • FormatMessageW.KERNELBASE(?,00000E24,?,?), ref: 049E1922
                              Memory Dump Source
                              • Source File: 00000001.00000002.3739380110.00000000049E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_49e0000_pisun.jbxd
                              Similarity
                              • API ID: FormatMessage
                              • String ID:
                              • API String ID: 1306739567-0
                              • Opcode ID: 113247376822b710b96be6b31eb74664a6a5b67b13c55dd53b5d8f0ec4cdb075
                              • Instruction ID: b0d2a20b9d93fe68416d28dccb34ba529a4057ff762d028739d66d2de1b0039c
                              • Opcode Fuzzy Hash: 113247376822b710b96be6b31eb74664a6a5b67b13c55dd53b5d8f0ec4cdb075
                              • Instruction Fuzzy Hash: 4321D17150D3C46FD302CB658C65B66BFB4EF87610F0980CBD8849F6A3D624A919C7B2
                              APIs
                              • GetExitCodeProcess.KERNELBASE(?,00000E24,6DCD202F,00000000,00000000,00000000,00000000), ref: 049E1104
                              Memory Dump Source
                              • Source File: 00000001.00000002.3739380110.00000000049E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_49e0000_pisun.jbxd
                              Similarity
                              • API ID: CodeExitProcess
                              • String ID:
                              • API String ID: 3861947596-0
                              • Opcode ID: 2a243fc874f0bf20edcd94fc7b56104eba540e7fe3669820db3e81c9809ff5b8
                              • Instruction ID: 560560e1f5dbd943402764400ca56cdce41c14c06a37359578c67104fb731488
                              • Opcode Fuzzy Hash: 2a243fc874f0bf20edcd94fc7b56104eba540e7fe3669820db3e81c9809ff5b8
                              • Instruction Fuzzy Hash: A121C1715093846FE712CB25CC45FA6BFA8EF06714F0884EBE984CF593D264A908C775
                              APIs
                              • RegSetValueExW.KERNELBASE(?,00000E24,6DCD202F,00000000,00000000,00000000,00000000), ref: 00AEA4F8
                              Memory Dump Source
                              • Source File: 00000001.00000002.3737861829.0000000000AEA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AEA000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_aea000_pisun.jbxd
                              Similarity
                              • API ID: Value
                              • String ID:
                              • API String ID: 3702945584-0
                              • Opcode ID: a7b7c94e1998a4a5e01e9ddfcc1167cc52136e3bb774351eddd5c0de2de39c9a
                              • Instruction ID: 3c5b63eb50cb64f17235915abba98fabdd065503b064eebee6bb4e4af003c6b4
                              • Opcode Fuzzy Hash: a7b7c94e1998a4a5e01e9ddfcc1167cc52136e3bb774351eddd5c0de2de39c9a
                              • Instruction Fuzzy Hash: EE2190765053846FD7228F15DC44FA7BFB8EF46710F08849AE985CB692D264E848C772
                              APIs
                              • WSASocketW.WS2_32(?,?,?,?,?), ref: 00AEBDCE
                              Memory Dump Source
                              • Source File: 00000001.00000002.3737861829.0000000000AEA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AEA000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_aea000_pisun.jbxd
                              Similarity
                              • API ID: Socket
                              • String ID:
                              • API String ID: 38366605-0
                              • Opcode ID: 1c021d414e31da8c1fb72cb9c720086c6cf02bd5ee94218ed56b3cd041b0810d
                              • Instruction ID: 6970008a07d8d808f4067c455e7b7cfe87af39ee235cc9749cca950823dd1732
                              • Opcode Fuzzy Hash: 1c021d414e31da8c1fb72cb9c720086c6cf02bd5ee94218ed56b3cd041b0810d
                              • Instruction Fuzzy Hash: 17217E71405384AFD722CF55DC49F96FFB8EF05314F08889EE9858B692D375A818CB62
                              APIs
                              Memory Dump Source
                              • Source File: 00000001.00000002.3739380110.00000000049E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_49e0000_pisun.jbxd
                              Similarity
                              • API ID: FileView
                              • String ID:
                              • API String ID: 3314676101-0
                              • Opcode ID: 7ee6516182b172ce2348145f2e9f5a386af17ea5a668ae0306f0d5c126d8e92e
                              • Instruction ID: b5828c4a7c62b846ad3387b66ecd61b355b3ebb3bad7187a88d7556e95367884
                              • Opcode Fuzzy Hash: 7ee6516182b172ce2348145f2e9f5a386af17ea5a668ae0306f0d5c126d8e92e
                              • Instruction Fuzzy Hash: 3721A071405384AFE722CF16DC44F96FFF8EF09224F04849EE9858B652D365A508CB65
                              APIs
                              • CreateFileW.KERNELBASE(?,?,?,?,?,?), ref: 00AEB7A1
                              Memory Dump Source
                              • Source File: 00000001.00000002.3737861829.0000000000AEA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AEA000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_aea000_pisun.jbxd
                              Similarity
                              • API ID: CreateFile
                              • String ID:
                              • API String ID: 823142352-0
                              • Opcode ID: a4e7aaf3f6e8d996332956f3e06903512b88c24a4b431fcbda08a7369cf9851b
                              • Instruction ID: ff64ce682e0a1ebd72191d8a8b7436bd84bf5223c46939030955f990d78126ae
                              • Opcode Fuzzy Hash: a4e7aaf3f6e8d996332956f3e06903512b88c24a4b431fcbda08a7369cf9851b
                              • Instruction Fuzzy Hash: C621AE71501244AFEB20CF26CD89B66FBE8EF08314F04846EE9858BA52D371E808CB71
                              APIs
                              • ConvertStringSecurityDescriptorToSecurityDescriptorW.ADVAPI32(?,00000E24), ref: 049E0373
                              Memory Dump Source
                              • Source File: 00000001.00000002.3739380110.00000000049E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_49e0000_pisun.jbxd
                              Similarity
                              • API ID: DescriptorSecurity$ConvertString
                              • String ID:
                              • API String ID: 3907675253-0
                              • Opcode ID: bd1518cd4ac8a315cb29e3761262a5ddf522272fc932d60ab4fdb955125009e5
                              • Instruction ID: 767da5cc4c8d040bb5b8e221c1745a223d0c452d7ff5ce7d215ca12627b193c1
                              • Opcode Fuzzy Hash: bd1518cd4ac8a315cb29e3761262a5ddf522272fc932d60ab4fdb955125009e5
                              • Instruction Fuzzy Hash: 70219F72600244AFEB21DF25DC45BBAFBACEF04714F04886AE945DB642D774E4088A71
                              APIs
                              • RegQueryValueExW.KERNELBASE(?,00000E24,6DCD202F,00000000,00000000,00000000,00000000), ref: 049E0288
                              Memory Dump Source
                              • Source File: 00000001.00000002.3739380110.00000000049E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_49e0000_pisun.jbxd
                              Similarity
                              • API ID: QueryValue
                              • String ID:
                              • API String ID: 3660427363-0
                              • Opcode ID: 4adc3d03339dc3ec85e0dca06a3f07f6a4c6f1194ea3cfd585e8de8061515f65
                              • Instruction ID: 32cc46698d9996d0766fdb809a1c93a3c62e8f26bb4661b0b8e51977b98a7bf3
                              • Opcode Fuzzy Hash: 4adc3d03339dc3ec85e0dca06a3f07f6a4c6f1194ea3cfd585e8de8061515f65
                              • Instruction Fuzzy Hash: 74219D72505384AFD722CF12DC44FA7BBFCEF05610F08849AE9858B652D365E948CB75
                              APIs
                              • LookupPrivilegeValueW.ADVAPI32(?,?,?), ref: 049E0DFA
                              Memory Dump Source
                              • Source File: 00000001.00000002.3739380110.00000000049E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_49e0000_pisun.jbxd
                              Similarity
                              • API ID: LookupPrivilegeValue
                              • String ID:
                              • API String ID: 3899507212-0
                              • Opcode ID: 2e6f4ac7c1ae38605c02a67f84521edb73ebdca0350e7f37cb403c19ffc60235
                              • Instruction ID: 2634bbcc8cffbacf53e58e112ce4b95e3b4446e548dd18547396ff0f1e1b49a9
                              • Opcode Fuzzy Hash: 2e6f4ac7c1ae38605c02a67f84521edb73ebdca0350e7f37cb403c19ffc60235
                              • Instruction Fuzzy Hash: 65217F725093805FDB22CB25DC55BA6BFE8AF06210F0984EAD8C5CB263D264E849C761
                              APIs
                              • RegOpenKeyExW.KERNELBASE(?,00000E24), ref: 00AEA879
                              Memory Dump Source
                              • Source File: 00000001.00000002.3737861829.0000000000AEA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AEA000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_aea000_pisun.jbxd
                              Similarity
                              • API ID: Open
                              • String ID:
                              • API String ID: 71445658-0
                              • Opcode ID: a4b303cd7fb5ca7d4aaec24b4f5094b60636c2fc6eebcb2f952e637d12ab886e
                              • Instruction ID: 41ce26c6e2a45409901aa9573d396c19691d3a9fdeb0ccf04543909f9d873d68
                              • Opcode Fuzzy Hash: a4b303cd7fb5ca7d4aaec24b4f5094b60636c2fc6eebcb2f952e637d12ab886e
                              • Instruction Fuzzy Hash: 2121CF72500244AEE7209B52CC44FABFBACEF14314F04845AFA458BA42D330E80DCAB2
                              APIs
                              • SetProcessWorkingSetSize.KERNEL32(?,00000E24,6DCD202F,00000000,00000000,00000000,00000000), ref: 049E12C7
                              Memory Dump Source
                              • Source File: 00000001.00000002.3739380110.00000000049E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_49e0000_pisun.jbxd
                              Similarity
                              • API ID: ProcessSizeWorking
                              • String ID:
                              • API String ID: 3584180929-0
                              • Opcode ID: 6bad1755e801fcfe449c34d0892e4c3a1474d7a7d7f7c80e056ce7ac17be5e0b
                              • Instruction ID: cbb8e44c6c1bcb0161ebaf810d1bcee9956aeed17cf7d7843b607c93b63d3c50
                              • Opcode Fuzzy Hash: 6bad1755e801fcfe449c34d0892e4c3a1474d7a7d7f7c80e056ce7ac17be5e0b
                              • Instruction Fuzzy Hash: 0E2195715053846FD722CF15DC49BAABFA8EF45310F0884ABE9858B552D374A508CB65
                              APIs
                              • GetProcessWorkingSetSize.KERNEL32(?,00000E24,6DCD202F,00000000,00000000,00000000,00000000), ref: 049E11E3
                              Memory Dump Source
                              • Source File: 00000001.00000002.3739380110.00000000049E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_49e0000_pisun.jbxd
                              Similarity
                              • API ID: ProcessSizeWorking
                              • String ID:
                              • API String ID: 3584180929-0
                              • Opcode ID: 6bad1755e801fcfe449c34d0892e4c3a1474d7a7d7f7c80e056ce7ac17be5e0b
                              • Instruction ID: da7c85934355e3ec9eba6f0c331842777fdd37667dbb5620aa387f52676fc13d
                              • Opcode Fuzzy Hash: 6bad1755e801fcfe449c34d0892e4c3a1474d7a7d7f7c80e056ce7ac17be5e0b
                              • Instruction Fuzzy Hash: 6F21C2715093846FD722CF55DC49FAABFA8EF06210F0884ABE944CB652D274A908CB65
                              APIs
                              • CreateMutexW.KERNELBASE(?,?), ref: 00AEA6B9
                              Memory Dump Source
                              • Source File: 00000001.00000002.3737861829.0000000000AEA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AEA000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_aea000_pisun.jbxd
                              Similarity
                              • API ID: CreateMutex
                              • String ID:
                              • API String ID: 1964310414-0
                              • Opcode ID: f90ea74cbc005199bb9fa56547d0c2beb15d223569712780845240397ff1e523
                              • Instruction ID: 94b3d9fcc8de2165fc07de0502351e808c4b2afecffff6407a7788e5b7e18c55
                              • Opcode Fuzzy Hash: f90ea74cbc005199bb9fa56547d0c2beb15d223569712780845240397ff1e523
                              • Instruction Fuzzy Hash: 4121D4716002449FE720DF26CD85BA6FBE8EF14314F08846AE945CB742D371F809CA72
                              APIs
                              • ReadFile.KERNELBASE(?,00000E24,6DCD202F,00000000,00000000,00000000,00000000), ref: 00AEBB59
                              Memory Dump Source
                              • Source File: 00000001.00000002.3737861829.0000000000AEA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AEA000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_aea000_pisun.jbxd
                              Similarity
                              • API ID: FileRead
                              • String ID:
                              • API String ID: 2738559852-0
                              • Opcode ID: 3f9e9cfa590d849e02ddcda6135aee4d0fb1b9f10583f2d61d48b9313b9f79e9
                              • Instruction ID: a9a2359b5d993b1ce5f353edec67d0f5c29f976103422201edd2765648cd124c
                              • Opcode Fuzzy Hash: 3f9e9cfa590d849e02ddcda6135aee4d0fb1b9f10583f2d61d48b9313b9f79e9
                              • Instruction Fuzzy Hash: FA219F71405384AFDB22CF51DC48FABBFB8EF45710F08849AE9858B552D325A808CBB6
                              APIs
                              • RegQueryValueExW.KERNELBASE(?,00000E24,6DCD202F,00000000,00000000,00000000,00000000), ref: 00AEA40C
                              Memory Dump Source
                              • Source File: 00000001.00000002.3737861829.0000000000AEA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AEA000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_aea000_pisun.jbxd
                              Similarity
                              • API ID: QueryValue
                              • String ID:
                              • API String ID: 3660427363-0
                              • Opcode ID: 1e7db82fc6e65a4944ead8cb8e7b58fa9f531afe9507ec9656aa002a094081cd
                              • Instruction ID: 2395d51f81a660bec3fbdb00a2963a0988359635678daf71ee5e8807bb245def
                              • Opcode Fuzzy Hash: 1e7db82fc6e65a4944ead8cb8e7b58fa9f531afe9507ec9656aa002a094081cd
                              • Instruction Fuzzy Hash: E6219DB5600244AFE720CF16CC84FA6F7ECEF14710F08845AE9468B692D370F849CA72
                              APIs
                              • WSASocketW.WS2_32(?,?,?,?,?), ref: 00AEBDCE
                              Memory Dump Source
                              • Source File: 00000001.00000002.3737861829.0000000000AEA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AEA000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_aea000_pisun.jbxd
                              Similarity
                              • API ID: Socket
                              • String ID:
                              • API String ID: 38366605-0
                              • Opcode ID: 01f6efd738165afa959b9d4372c3c5105ca9cfaac41df13329f7e33cf7521443
                              • Instruction ID: da9823c6d42e7d9d9ebcf37ebc740ff8481c3b7378973929768ce858d36919a2
                              • Opcode Fuzzy Hash: 01f6efd738165afa959b9d4372c3c5105ca9cfaac41df13329f7e33cf7521443
                              • Instruction Fuzzy Hash: 96212671400244AFE721CF56DC49FA6FBE8EF04314F04845EEA458B652D375E418CB71
                              APIs
                              • WSAConnect.WS2_32(?,?,?,?,?,?,?), ref: 049E0D36
                              Memory Dump Source
                              • Source File: 00000001.00000002.3739380110.00000000049E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_49e0000_pisun.jbxd
                              Similarity
                              • API ID: Connect
                              • String ID:
                              • API String ID: 3144859779-0
                              • Opcode ID: d41f3e0a84bc75eeb5bcea635cfa06b18d489049864d59115109de6e79a3654d
                              • Instruction ID: 2d703fa88457149585e0e728fe994f4c0933154f946d3afc15ced202bd2bae2a
                              • Opcode Fuzzy Hash: d41f3e0a84bc75eeb5bcea635cfa06b18d489049864d59115109de6e79a3654d
                              • Instruction Fuzzy Hash: BE218E71409384AFDB228F55DC44BA2FFF8EF0A310F08849AE9858B163D275A859DB61
                              APIs
                              Memory Dump Source
                              • Source File: 00000001.00000002.3739380110.00000000049E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_49e0000_pisun.jbxd
                              Similarity
                              • API ID: FileView
                              • String ID:
                              • API String ID: 3314676101-0
                              • Opcode ID: 76254fafdd7f40cf8976c2a9c139e33a7fe23cdf7e159d22c4c9d143700e1d95
                              • Instruction ID: 75d73cf3ab1c442087949518328164757e340ed0bbe187f5c7af89b049f42b38
                              • Opcode Fuzzy Hash: 76254fafdd7f40cf8976c2a9c139e33a7fe23cdf7e159d22c4c9d143700e1d95
                              • Instruction Fuzzy Hash: 4621D171500244AFE721CF16DC44FAAFBE8EF08224F048459E9858B652D775F408CBA5
                              APIs
                              • SendMessageTimeoutA.USER32(?,00000E24), ref: 00AEA97D
                              Memory Dump Source
                              • Source File: 00000001.00000002.3737861829.0000000000AEA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AEA000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_aea000_pisun.jbxd
                              Similarity
                              • API ID: MessageSendTimeout
                              • String ID:
                              • API String ID: 1599653421-0
                              • Opcode ID: 02b38d39daf7c31777e4368bcbf7b9df1a8a525b345fd73a46e3a535925d2f86
                              • Instruction ID: e393e89d5df77ba755ec67720aeddc1c9a21876d615ce23d96c1d1a589ad7d91
                              • Opcode Fuzzy Hash: 02b38d39daf7c31777e4368bcbf7b9df1a8a525b345fd73a46e3a535925d2f86
                              • Instruction Fuzzy Hash: A521D271100244AFEB318F51DC44FA6FBA8EF08710F14845AFE854A652D371B419CB76
                              APIs
                              • RegSetValueExW.KERNELBASE(?,00000E24,6DCD202F,00000000,00000000,00000000,00000000), ref: 00AEA4F8
                              Memory Dump Source
                              • Source File: 00000001.00000002.3737861829.0000000000AEA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AEA000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_aea000_pisun.jbxd
                              Similarity
                              • API ID: Value
                              • String ID:
                              • API String ID: 3702945584-0
                              • Opcode ID: 481e42a1160ec66e8187df7b933993b11811231c1e3200d096d8a8bced81b146
                              • Instruction ID: 070c8d14b0e802ecc4e7c70d779ed685a9628cc82613fee4e1667b7175fc036f
                              • Opcode Fuzzy Hash: 481e42a1160ec66e8187df7b933993b11811231c1e3200d096d8a8bced81b146
                              • Instruction Fuzzy Hash: 6F1181B6500644AFE7218F16DC45FA7FBECEF14714F04845AED458AA92D370F848CA76
                              APIs
                              • RegQueryValueExW.KERNELBASE(?,00000E24,6DCD202F,00000000,00000000,00000000,00000000), ref: 049E0288
                              Memory Dump Source
                              • Source File: 00000001.00000002.3739380110.00000000049E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_49e0000_pisun.jbxd
                              Similarity
                              • API ID: QueryValue
                              • String ID:
                              • API String ID: 3660427363-0
                              • Opcode ID: 4694d7516eee73ad8d2ec10189160e16d7a18a28849783985a3db26ff8ae10f8
                              • Instruction ID: e7814b95c8f58d68d80e2b078c05a82d51f2b3be16eb89ee0ad0e7c85dfe5040
                              • Opcode Fuzzy Hash: 4694d7516eee73ad8d2ec10189160e16d7a18a28849783985a3db26ff8ae10f8
                              • Instruction Fuzzy Hash: 60119D76500204AFEB21CE16DC44FA6BBECEF04610F04846AE9458A752D7A0E448CAB5
                              APIs
                              • GetProcessTimes.KERNELBASE(?,00000E24,6DCD202F,00000000,00000000,00000000,00000000), ref: 049E0A7D
                              Memory Dump Source
                              • Source File: 00000001.00000002.3739380110.00000000049E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_49e0000_pisun.jbxd
                              Similarity
                              • API ID: ProcessTimes
                              • String ID:
                              • API String ID: 1995159646-0
                              • Opcode ID: 62cca84fb6f5e375b820764bc0516b2cc03a8f552c7d64ca46b81176af291d78
                              • Instruction ID: afe44f28bcf060b194ef0fc43d4926d1ee4b34e56ca736524fd04900b91760a6
                              • Opcode Fuzzy Hash: 62cca84fb6f5e375b820764bc0516b2cc03a8f552c7d64ca46b81176af291d78
                              • Instruction Fuzzy Hash: 4F11E671600204AFEB21CF56DC48BBAFBECEF04310F08846AE9458B652D371E458DBB1
                              APIs
                              • GetProcessWorkingSetSize.KERNEL32(?,00000E24,6DCD202F,00000000,00000000,00000000,00000000), ref: 049E11E3
                              Memory Dump Source
                              • Source File: 00000001.00000002.3739380110.00000000049E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_49e0000_pisun.jbxd
                              Similarity
                              • API ID: ProcessSizeWorking
                              • String ID:
                              • API String ID: 3584180929-0
                              • Opcode ID: 4a55b0bd066f9147f63154087b26a65720e21a6bf3c7d9b3b844eb90bbcbac36
                              • Instruction ID: bbb667dedaed2d6edd03b8a9ebf0a876dd745a09994ac949035f509269e9c8e7
                              • Opcode Fuzzy Hash: 4a55b0bd066f9147f63154087b26a65720e21a6bf3c7d9b3b844eb90bbcbac36
                              • Instruction Fuzzy Hash: 4E11B2715002449FEB21CF56DC45BBAB7A8EF04324F04846AE945CB642D775E448CAA5
                              APIs
                              • SetProcessWorkingSetSize.KERNEL32(?,00000E24,6DCD202F,00000000,00000000,00000000,00000000), ref: 049E12C7
                              Memory Dump Source
                              • Source File: 00000001.00000002.3739380110.00000000049E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_49e0000_pisun.jbxd
                              Similarity
                              • API ID: ProcessSizeWorking
                              • String ID:
                              • API String ID: 3584180929-0
                              • Opcode ID: 4a55b0bd066f9147f63154087b26a65720e21a6bf3c7d9b3b844eb90bbcbac36
                              • Instruction ID: 0a816f5b4e047df64c9b926a9f56cacbc22ab25b440a3a80bbf112fb5b55b6a8
                              • Opcode Fuzzy Hash: 4a55b0bd066f9147f63154087b26a65720e21a6bf3c7d9b3b844eb90bbcbac36
                              • Instruction Fuzzy Hash: 9111BF71600204AFEB21CF56DC45BBAFBE8EF04324F04846AEA45CBA42D774A448CAA5
                              APIs
                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00AEAD72
                              Memory Dump Source
                              • Source File: 00000001.00000002.3737861829.0000000000AEA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AEA000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_aea000_pisun.jbxd
                              Similarity
                              • API ID: DuplicateHandle
                              • String ID:
                              • API String ID: 3793708945-0
                              • Opcode ID: 6fe906216c1fb8036388ad681d3a901f954ce7c55b330974a73f9b662c74c0b6
                              • Instruction ID: aa97528e6cf8f6d576c4ec00be871c7843da041ac4e5b70854bc69260f1c791c
                              • Opcode Fuzzy Hash: 6fe906216c1fb8036388ad681d3a901f954ce7c55b330974a73f9b662c74c0b6
                              • Instruction Fuzzy Hash: E9118471409380AFDB228F55DC44B62FFF4EF4A310F0884DAED858B563D275A819DB62
                              APIs
                              • GetExitCodeProcess.KERNELBASE(?,00000E24,6DCD202F,00000000,00000000,00000000,00000000), ref: 049E1104
                              Memory Dump Source
                              • Source File: 00000001.00000002.3739380110.00000000049E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_49e0000_pisun.jbxd
                              Similarity
                              • API ID: CodeExitProcess
                              • String ID:
                              • API String ID: 3861947596-0
                              • Opcode ID: 964ca9762b7aa4543dc6a44fb99fe47e98ec6ce190b1b7cbb1b256e7a013775b
                              • Instruction ID: f9869a0caf15f501798f62de507fe9e21e67164cb9d8d92ac6973fc4e663867c
                              • Opcode Fuzzy Hash: 964ca9762b7aa4543dc6a44fb99fe47e98ec6ce190b1b7cbb1b256e7a013775b
                              • Instruction Fuzzy Hash: B711E371600244AFEB21CF16DC45FBAF79CEF04724F04846AED04CB642D775E448CAA5
                              APIs
                              • ReadFile.KERNELBASE(?,00000E24,6DCD202F,00000000,00000000,00000000,00000000), ref: 00AEBB59
                              Memory Dump Source
                              • Source File: 00000001.00000002.3737861829.0000000000AEA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AEA000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_aea000_pisun.jbxd
                              Similarity
                              • API ID: FileRead
                              • String ID:
                              • API String ID: 2738559852-0
                              • Opcode ID: 0345348aea6e0513b36e2e0613985708ccf4350cc0a42ebe116445df227ac3e4
                              • Instruction ID: 22bcc6f92aca117de487ed73827660e8065a3d2919fc50f8a46fe9fd022208de
                              • Opcode Fuzzy Hash: 0345348aea6e0513b36e2e0613985708ccf4350cc0a42ebe116445df227ac3e4
                              • Instruction Fuzzy Hash: D4110172400244AFEB21CF52CC48FABFBE8EF04320F04845AEA458B646C331A408CBB1
                              APIs
                              • GetComputerNameW.KERNEL32(?,00000E24,?,?), ref: 049E01CE
                              Memory Dump Source
                              • Source File: 00000001.00000002.3739380110.00000000049E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_49e0000_pisun.jbxd
                              Similarity
                              • API ID: ComputerName
                              • String ID:
                              • API String ID: 3545744682-0
                              • Opcode ID: e35949b602026c0eedddea31609dbb5dd5acb83db1534ec690f82491e6059a71
                              • Instruction ID: 66fc753c9b5c9908127251f52eef3d20cd9d5896d113f8b92728480489b65347
                              • Opcode Fuzzy Hash: e35949b602026c0eedddea31609dbb5dd5acb83db1534ec690f82491e6059a71
                              • Instruction Fuzzy Hash: 5011B6715093806FD311CB16CC55F26FFB4EF86610F09818BE8449B693D225B915C7A2
                              APIs
                              • SetErrorMode.KERNELBASE(?), ref: 00AEA330
                              Memory Dump Source
                              • Source File: 00000001.00000002.3737861829.0000000000AEA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AEA000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_aea000_pisun.jbxd
                              Similarity
                              • API ID: ErrorMode
                              • String ID:
                              • API String ID: 2340568224-0
                              • Opcode ID: 0637d469cb8c3673870229e614d0341d673381dc60af1730cb72fb859846f264
                              • Instruction ID: d563e05d65ef4bc6144718986441092443c824d301fc33e5659d2cc1227cae41
                              • Opcode Fuzzy Hash: 0637d469cb8c3673870229e614d0341d673381dc60af1730cb72fb859846f264
                              • Instruction Fuzzy Hash: 8E1191754093C4AFD7228B15DC54762BFA4EF56620F0880CAED848B263D265A809DB72
                              APIs
                              • LookupPrivilegeValueW.ADVAPI32(?,?,?), ref: 049E0DFA
                              Memory Dump Source
                              • Source File: 00000001.00000002.3739380110.00000000049E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_49e0000_pisun.jbxd
                              Similarity
                              • API ID: LookupPrivilegeValue
                              • String ID:
                              • API String ID: 3899507212-0
                              • Opcode ID: c0454954b8e3ac0d603e74ae0161403ee55f8624d73a2fd1267cf6d2fb2db0f7
                              • Instruction ID: aa952bc6b6f6091cc9828e59cfb707a148a2bbfd9899016238233068a1da3eba
                              • Opcode Fuzzy Hash: c0454954b8e3ac0d603e74ae0161403ee55f8624d73a2fd1267cf6d2fb2db0f7
                              • Instruction Fuzzy Hash: 1D1130756003058FDB61DF16D845766FBE8EF04620F08847ADD45CB746D675E444CB61
                              APIs
                              Memory Dump Source
                              • Source File: 00000001.00000002.3737861829.0000000000AEA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AEA000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_aea000_pisun.jbxd
                              Similarity
                              • API ID: Initialize
                              • String ID:
                              • API String ID: 2538663250-0
                              • Opcode ID: 6fc6819033caaaf947929e76246c3df9cd12130f5d35864754e09f3aa2ffa543
                              • Instruction ID: 169ad4b3de26e773d27c8268d32d85fb6e852b03ad47454ed8a2209b00d6de36
                              • Opcode Fuzzy Hash: 6fc6819033caaaf947929e76246c3df9cd12130f5d35864754e09f3aa2ffa543
                              • Instruction Fuzzy Hash: 90119E714493C49FDB11CF15DC89B52BFB4EF06321F0884DAED888B293D276A809CB62
                              APIs
                              • GetFileType.KERNELBASE(?,00000E24,6DCD202F,00000000,00000000,00000000,00000000), ref: 00AEB88D
                              Memory Dump Source
                              • Source File: 00000001.00000002.3737861829.0000000000AEA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AEA000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_aea000_pisun.jbxd
                              Similarity
                              • API ID: FileType
                              • String ID:
                              • API String ID: 3081899298-0
                              • Opcode ID: 7a33e6331b409c20d0a8f27f579acdfa2cf5857563f7db1976fef969c07d279e
                              • Instruction ID: 2b5afceee791426beacc0d5055246dc77fe9d8e7553e8692d8d45cff88697c3f
                              • Opcode Fuzzy Hash: 7a33e6331b409c20d0a8f27f579acdfa2cf5857563f7db1976fef969c07d279e
                              • Instruction Fuzzy Hash: 1601C075500244AEE720DB16DC89BABFBACDF04724F188096EE448B742D374A84CCAB6
                              APIs
                              • WSAConnect.WS2_32(?,?,?,?,?,?,?), ref: 049E0D36
                              Memory Dump Source
                              • Source File: 00000001.00000002.3739380110.00000000049E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_49e0000_pisun.jbxd
                              Similarity
                              • API ID: Connect
                              • String ID:
                              • API String ID: 3144859779-0
                              • Opcode ID: 9f938e8ddeff6809e7f460137e57ff254a66dd43adb3a00339272169ccb298c4
                              • Instruction ID: fb4eb5d98f147767e09ef629413b35a852b28e91ad55674db6535ac119b99c88
                              • Opcode Fuzzy Hash: 9f938e8ddeff6809e7f460137e57ff254a66dd43adb3a00339272169ccb298c4
                              • Instruction Fuzzy Hash: 65117C71500704DFDB21CF56D844BA6FBE8EF08710F0888AAEE898B622D375F458DB61
                              APIs
                              • FormatMessageW.KERNELBASE(?,00000E24,?,?), ref: 049E1922
                              Memory Dump Source
                              • Source File: 00000001.00000002.3739380110.00000000049E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_49e0000_pisun.jbxd
                              Similarity
                              • API ID: FormatMessage
                              • String ID:
                              • API String ID: 1306739567-0
                              • Opcode ID: e4ee9ef63ab56bb23778951ebdf84824dc9168f032dddb10825bf3004b53275b
                              • Instruction ID: 75e68a9591c6f8aa9c8d9e2fc167d575a6eec9c2d91668d5380741847cfcfbf7
                              • Opcode Fuzzy Hash: e4ee9ef63ab56bb23778951ebdf84824dc9168f032dddb10825bf3004b53275b
                              • Instruction Fuzzy Hash: 79015E71500204ABD350DF16DC46B66FBA8FB88A20F14855AED089BB42D731B915CBE5
                              APIs
                              • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00AEAD72
                              Memory Dump Source
                              • Source File: 00000001.00000002.3737861829.0000000000AEA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AEA000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_aea000_pisun.jbxd
                              Similarity
                              • API ID: DuplicateHandle
                              • String ID:
                              • API String ID: 3793708945-0
                              • Opcode ID: a5b66ebd683e1b2c96ffb73d54495e605d154b23a7dbfd9d307995a8739b250f
                              • Instruction ID: c1289ee1467416c4181d35303b9227ec57c096e591023d2de44a8574e8cda266
                              • Opcode Fuzzy Hash: a5b66ebd683e1b2c96ffb73d54495e605d154b23a7dbfd9d307995a8739b250f
                              • Instruction Fuzzy Hash: EA0179724002449FDB218F55DD84B66FBE4EF08320F08889AEE894AA52C236E419DB62
                              APIs
                              • RegQueryValueExW.KERNELBASE(?,00000E24,?,?), ref: 00AEBD16
                              Memory Dump Source
                              • Source File: 00000001.00000002.3737861829.0000000000AEA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AEA000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_aea000_pisun.jbxd
                              Similarity
                              • API ID: QueryValue
                              • String ID:
                              • API String ID: 3660427363-0
                              • Opcode ID: dfa143976bdc33f9ca2bb7f3084e460d946ef441ff393e6565c1587c1dc6af7d
                              • Instruction ID: 182ac17a71dd32de5268e13418d9c1088f84f19cf51cd97d81aa8554af5e4bdc
                              • Opcode Fuzzy Hash: dfa143976bdc33f9ca2bb7f3084e460d946ef441ff393e6565c1587c1dc6af7d
                              • Instruction Fuzzy Hash: C501A271500204ABD310DF16CC46B66FBE8FB88A20F14811AED089BB42D771F915CBE5
                              APIs
                              • GetComputerNameW.KERNEL32(?,00000E24,?,?), ref: 049E01CE
                              Memory Dump Source
                              • Source File: 00000001.00000002.3739380110.00000000049E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 049E0000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_49e0000_pisun.jbxd
                              Similarity
                              • API ID: ComputerName
                              • String ID:
                              • API String ID: 3545744682-0
                              • Opcode ID: eb0fa8a74f7014ecef970f11038df133f33da2cb258450415604499d1da66e4e
                              • Instruction ID: a8962359eeb639321383f13f24475e39f64f4d5c51e96b80b0aaac39ff5262f3
                              • Opcode Fuzzy Hash: eb0fa8a74f7014ecef970f11038df133f33da2cb258450415604499d1da66e4e
                              • Instruction Fuzzy Hash: 0101A271500200ABD310DF16CC46B66FBE8FB88A20F14815AED089BB41D731F915CBE5
                              APIs
                              Memory Dump Source
                              • Source File: 00000001.00000002.3737861829.0000000000AEA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AEA000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_aea000_pisun.jbxd
                              Similarity
                              • API ID: Initialize
                              • String ID:
                              • API String ID: 2538663250-0
                              • Opcode ID: 1384db2033b98e5d84538c5887a079ce2de09d3b208082975378344a6909fb14
                              • Instruction ID: 7e8e7713a907a5e1012969f5bf2e1690d6899389a079e843e87c64503147eaf1
                              • Opcode Fuzzy Hash: 1384db2033b98e5d84538c5887a079ce2de09d3b208082975378344a6909fb14
                              • Instruction Fuzzy Hash: 2B01A2B5504284DFDB10CF16D984765FBE4EF14320F08C4AADD498F746D375E448CA62
                              APIs
                              • SetErrorMode.KERNELBASE(?), ref: 00AEA330
                              Memory Dump Source
                              • Source File: 00000001.00000002.3737861829.0000000000AEA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AEA000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_aea000_pisun.jbxd
                              Similarity
                              • API ID: ErrorMode
                              • String ID:
                              • API String ID: 2340568224-0
                              • Opcode ID: 5fb47e56c003e13f2e6feccfe595cc06d963dc4eb4f066e6edda5acdfc3d0fa3
                              • Instruction ID: e921013e8a0c36a99254004eeb4d331d79cf18db36040ddd93fba2431224414a
                              • Opcode Fuzzy Hash: 5fb47e56c003e13f2e6feccfe595cc06d963dc4eb4f066e6edda5acdfc3d0fa3
                              • Instruction Fuzzy Hash: 73F08C79904684CFDB209F0AD988765FBE4EF14720F08C09ADE594F756D275A848CAA2
                              APIs
                              • CloseHandle.KERNELBASE(?), ref: 00AEA780
                              Memory Dump Source
                              • Source File: 00000001.00000002.3737861829.0000000000AEA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AEA000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_aea000_pisun.jbxd
                              Similarity
                              • API ID: CloseHandle
                              • String ID:
                              • API String ID: 2962429428-0
                              • Opcode ID: 79e684c352a17fa1c1c04d54c6061f67ec53fa082023560ef6e1fbc223f2255a
                              • Instruction ID: 66748392a8322197b3e8126687128ea620d7f071ea219659931c0a2eb72be16f
                              • Opcode Fuzzy Hash: 79e684c352a17fa1c1c04d54c6061f67ec53fa082023560ef6e1fbc223f2255a
                              • Instruction Fuzzy Hash: 9821E7B55043809FD711CF25DC95752BFB8EF06324F0984DBED858B253D235A909CB62
                              APIs
                              • CloseHandle.KERNELBASE(?), ref: 00AEA780
                              Memory Dump Source
                              • Source File: 00000001.00000002.3737861829.0000000000AEA000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AEA000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_aea000_pisun.jbxd
                              Similarity
                              • API ID: CloseHandle
                              • String ID:
                              • API String ID: 2962429428-0
                              • Opcode ID: 073d3c1a2548685e941582a224ef1e9ce0ba13ea919036562bfcfbbf771cd6d6
                              • Instruction ID: e6c405e00e0ce335432914be41736e6784eecbfe583f30603da0b5c7a40d0ed2
                              • Opcode Fuzzy Hash: 073d3c1a2548685e941582a224ef1e9ce0ba13ea919036562bfcfbbf771cd6d6
                              • Instruction Fuzzy Hash: 9B018F75504244CFDB10CF16D9857A6FBE4EF14720F08C4ABED49CB756D275E848CAA2
                              Memory Dump Source
                              • Source File: 00000001.00000002.3738344628.0000000000D20000.00000040.00000020.00020000.00000000.sdmp, Offset: 00D20000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_d20000_pisun.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 4d6f623fa29ac3a94fe2877a7b789933331992a76c3108699dd8a831a74dd709
                              • Instruction ID: 86aeb9d0fe67eb18a0f52499d5c8c72b88b11d6643c1e3594b154bdad86a1d98
                              • Opcode Fuzzy Hash: 4d6f623fa29ac3a94fe2877a7b789933331992a76c3108699dd8a831a74dd709
                              • Instruction Fuzzy Hash: 0211E430208284DFC715EB10E540B26FFA5ABA870CF28C9ACE8490B753C737D807DAA1
                              Memory Dump Source
                              • Source File: 00000001.00000002.3738344628.0000000000D20000.00000040.00000020.00020000.00000000.sdmp, Offset: 00D20000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_d20000_pisun.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 64afcac7d591dcf21d10bcaf45c8b3e0d5695bda4bfa98fbabb8423f14ee11b9
                              • Instruction ID: 33a0c63e9973165f7657d54119f19f4e01f17578d3bcab3fed8cc0e6442c7fa7
                              • Opcode Fuzzy Hash: 64afcac7d591dcf21d10bcaf45c8b3e0d5695bda4bfa98fbabb8423f14ee11b9
                              • Instruction Fuzzy Hash: 34116D3010D3C4CFD712DB14D950B11BFA1AB56718F2986DED4884B6A3C33A9C16CBA2
                              Memory Dump Source
                              • Source File: 00000001.00000002.3738344628.0000000000D20000.00000040.00000020.00020000.00000000.sdmp, Offset: 00D20000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_d20000_pisun.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: f27c638625453601b2b4d8fe5df0824b5a550e029765d5eb9a6516039f6e2572
                              • Instruction ID: 239bbfd0f4084e8a9b4ec7559b4dbe2865702df5b14222f27a246f906f1415ba
                              • Opcode Fuzzy Hash: f27c638625453601b2b4d8fe5df0824b5a550e029765d5eb9a6516039f6e2572
                              • Instruction Fuzzy Hash: 110186755093945FD7118F05EC41862FFA8EF8A660719849BFC898B613D225B849CBB2
                              Memory Dump Source
                              • Source File: 00000001.00000002.3738344628.0000000000D20000.00000040.00000020.00020000.00000000.sdmp, Offset: 00D20000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_d20000_pisun.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 26a8e24a9f260a375dd5c471da3df068d5184580853e9502b8bd4008e6011b53
                              • Instruction ID: 5b8829bd91ebcdc1fca137715c6f4a421b3e844c471753bf14e7186725da2b10
                              • Opcode Fuzzy Hash: 26a8e24a9f260a375dd5c471da3df068d5184580853e9502b8bd4008e6011b53
                              • Instruction Fuzzy Hash: 6EF01D35108644DFC705CF00D580B16FBA2EB99718F28CAADE94917B62C737E813DA91
                              Memory Dump Source
                              • Source File: 00000001.00000002.3738344628.0000000000D20000.00000040.00000020.00020000.00000000.sdmp, Offset: 00D20000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_d20000_pisun.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 40bdc72e290f002c0dc7ae45f4eb89e32329bf425ac78bfe0e4a98b628a98370
                              • Instruction ID: f1caac81341cf9780ccadd5c43db2e105712f161be016665e66dfb878703ab70
                              • Opcode Fuzzy Hash: 40bdc72e290f002c0dc7ae45f4eb89e32329bf425ac78bfe0e4a98b628a98370
                              • Instruction Fuzzy Hash: 03E092B66006448B9650CF0AFC41462F7D8EB88630708C07FDC0D8B701E235B508CAA5
                              Memory Dump Source
                              • Source File: 00000001.00000002.3737830367.0000000000AE2000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AE2000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_ae2000_pisun.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: b5dffa714d35efb6d425d1c84233b08a0fa0451a144acd7eb1d1f732ce8df9af
                              • Instruction ID: 75b3925e5318e5c1fb7a3f1cbe31f2392f4328729de2fa8938e3299921fde90b
                              • Opcode Fuzzy Hash: b5dffa714d35efb6d425d1c84233b08a0fa0451a144acd7eb1d1f732ce8df9af
                              • Instruction Fuzzy Hash: 97D05E792456C14FD3169B1CD1A4B9A37D8AB51714F4A44F9A800CB7A7C768D981D700
                              Memory Dump Source
                              • Source File: 00000001.00000002.3737830367.0000000000AE2000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AE2000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_1_2_ae2000_pisun.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: e7103a66687567d2b4c4e723ab8a771fb466db24ad99289ee48729c55f6b0f5a
                              • Instruction ID: 812323758885dd48d2a3e830e011554334c7ef25b46ea7b832db9b07e5f6c7cd
                              • Opcode Fuzzy Hash: e7103a66687567d2b4c4e723ab8a771fb466db24ad99289ee48729c55f6b0f5a
                              • Instruction Fuzzy Hash: B5D05E342002C24BD716DB0DD2E4F5937D8AB40714F1A44E8AC108F762C7A8D8C0DF00