Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
jango.exe

Overview

General Information

Sample Name:jango.exe
Analysis ID:876935
MD5:c81e5ecd50fda5d5162ce5c920bfad15
SHA1:7b8929cf91b1cec30ca058117a2fade8d853cef6
SHA256:02aa8d694fcb141522227f5890d5750d3759aa3ed20d6fd6d124d867db894186
Tags:exe
Infos:

Detection

XWorm
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Antivirus / Scanner detection for submitted sample
Yara detected XWorm
Multi AV Scanner detection for domain / URL
Antivirus detection for dropped file
Multi AV Scanner detection for dropped file
Contains functionality to capture screen (.Net source)
Protects its processes via BreakOnTermination flag
Machine Learning detection for sample
.NET source code contains potential unpacker
.NET source code contains method to dynamically call methods (often used by packers)
Machine Learning detection for dropped file
Drops PE files to the user root directory
Connects to a pastebin service (likely for C&C)
Uses schtasks.exe or at.exe to add and modify task schedules
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
May sleep (evasive loops) to hinder dynamic analysis
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Stores files to the Windows start menu directory
JA3 SSL client fingerprint seen in connection with other malware
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Sample file is different than original file name gathered from version info
Drops PE files
Detected TCP or UDP traffic on non-standard ports
Creates a start menu entry (Start Menu\Programs\Startup)
Drops PE files to the user directory
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • jango.exe (PID: 5428 cmdline: C:\Users\user\Desktop\jango.exe MD5: C81E5ECD50FDA5D5162CE5C920BFAD15)
    • schtasks.exe (PID: 748 cmdline: C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "jango" /tr "C:\Users\Public\jango.exe MD5: 838D346D1D28F00783B7A6C6BD03A0DA)
      • conhost.exe (PID: 6984 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • jango.exe (PID: 7132 cmdline: "C:\Users\Public\jango.exe" MD5: C81E5ECD50FDA5D5162CE5C920BFAD15)
  • jango.exe (PID: 2960 cmdline: "C:\Users\Public\jango.exe" MD5: C81E5ECD50FDA5D5162CE5C920BFAD15)
  • jango.exe (PID: 6956 cmdline: C:\Users\Public\jango.exe MD5: C81E5ECD50FDA5D5162CE5C920BFAD15)
  • jango.exe (PID: 3576 cmdline: C:\Users\Public\jango.exe MD5: C81E5ECD50FDA5D5162CE5C920BFAD15)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
jango.exeJoeSecurity_XWormYara detected XWormJoe Security
    jango.exeMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
    • 0xb143:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
    • 0xb1e0:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
    • 0xb2f5:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
    • 0xa9e1:$cnc4: POST / HTTP/1.1
    SourceRuleDescriptionAuthorStrings
    C:\Users\Public\jango.exeJoeSecurity_XWormYara detected XWormJoe Security
      C:\Users\Public\jango.exeMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
      • 0xb143:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
      • 0xb1e0:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
      • 0xb2f5:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
      • 0xa9e1:$cnc4: POST / HTTP/1.1
      SourceRuleDescriptionAuthorStrings
      00000000.00000000.373122947.0000000000032000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_XWormYara detected XWormJoe Security
        00000000.00000000.373122947.0000000000032000.00000002.00000001.01000000.00000003.sdmpMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
        • 0xaf43:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
        • 0xafe0:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
        • 0xb0f5:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
        • 0xa7e1:$cnc4: POST / HTTP/1.1
        Process Memory Space: jango.exe PID: 5428JoeSecurity_XWormYara detected XWormJoe Security
          SourceRuleDescriptionAuthorStrings
          0.0.jango.exe.30000.0.unpackJoeSecurity_XWormYara detected XWormJoe Security
            0.0.jango.exe.30000.0.unpackMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
            • 0xb143:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
            • 0xb1e0:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
            • 0xb2f5:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
            • 0xa9e1:$cnc4: POST / HTTP/1.1
            No Sigma rule has matched
            No Snort rule has matched

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: jango.exeReversingLabs: Detection: 56%
            Source: jango.exeVirustotal: Detection: 60%Perma Link
            Source: jango.exeAvira: detected
            Source: 0.tcp.in.ngrok.ioVirustotal: Detection: 15%Perma Link
            Source: C:\Users\Public\jango.exeAvira: detection malicious, Label: TR/Spy.Gen
            Source: C:\Users\Public\jango.exeReversingLabs: Detection: 56%
            Source: jango.exeJoe Sandbox ML: detected
            Source: C:\Users\Public\jango.exeJoe Sandbox ML: detected
            Source: jango.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: unknownHTTPS traffic detected: 172.67.34.170:443 -> 192.168.2.5:49721 version: TLS 1.2
            Source: jango.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

            Networking

            barindex
            Source: unknownDNS query: name: pastebin.com
            Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
            Source: global trafficHTTP traffic detected: GET /raw/jZsr13qA HTTP/1.1Host: pastebin.comConnection: Keep-Alive
            Source: Joe Sandbox ViewIP Address: 3.6.30.85 3.6.30.85
            Source: Joe Sandbox ViewIP Address: 3.6.115.182 3.6.115.182
            Source: Joe Sandbox ViewIP Address: 3.6.122.107 3.6.122.107
            Source: global trafficTCP traffic: 192.168.2.5:49722 -> 3.6.30.85:19633
            Source: global trafficTCP traffic: 192.168.2.5:49725 -> 3.6.98.232:19633
            Source: global trafficTCP traffic: 192.168.2.5:49731 -> 3.6.115.182:19633
            Source: global trafficTCP traffic: 192.168.2.5:49738 -> 3.6.115.64:19633
            Source: global trafficTCP traffic: 192.168.2.5:49753 -> 3.6.122.107:19633
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49721
            Source: unknownNetwork traffic detected: HTTP traffic on port 49721 -> 443
            Source: jango.exe, 00000000.00000002.641775598.000000001B20C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
            Source: jango.exe, 00000000.00000002.641205813.0000000002306000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pastebin.com
            Source: jango.exe, 00000000.00000002.641205813.0000000002241000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
            Source: jango.exe, 00000000.00000002.641205813.00000000022FC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://pastebin.com
            Source: jango.exe, 00000009.00000002.632296971.0000000002711000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://pastebin.com/raw/jZsr13qA
            Source: unknownDNS traffic detected: queries for: pastebin.com
            Source: global trafficHTTP traffic detected: GET /raw/jZsr13qA HTTP/1.1Host: pastebin.comConnection: Keep-Alive
            Source: unknownHTTPS traffic detected: 172.67.34.170:443 -> 192.168.2.5:49721 version: TLS 1.2

            Key, Mouse, Clipboard, Microphone and Screen Capturing

            barindex
            Source: jango.exe, Stub/TxXKz7l7TMtreUav.cs.Net Code: frtGIr1XzzGLRyjV
            Source: jango.exe.0.dr, Stub/TxXKz7l7TMtreUav.cs.Net Code: frtGIr1XzzGLRyjV
            Source: 0.0.jango.exe.30000.0.unpack, Stub/TxXKz7l7TMtreUav.cs.Net Code: frtGIr1XzzGLRyjV

            Operating System Destruction

            barindex
            Source: C:\Users\user\Desktop\jango.exeProcess information set: 01 00 00 00 Jump to behavior

            System Summary

            barindex
            Source: jango.exe, type: SAMPLEMatched rule: Detects AsyncRAT Author: ditekSHen
            Source: 0.0.jango.exe.30000.0.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
            Source: 00000000.00000000.373122947.0000000000032000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
            Source: C:\Users\Public\jango.exe, type: DROPPEDMatched rule: Detects AsyncRAT Author: ditekSHen
            Source: jango.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: jango.exe, type: SAMPLEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
            Source: 0.0.jango.exe.30000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
            Source: 00000000.00000000.373122947.0000000000032000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
            Source: C:\Users\Public\jango.exe, type: DROPPEDMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
            Source: C:\Users\user\Desktop\jango.exeCode function: 0_2_00007FF9A55C10290_2_00007FF9A55C1029
            Source: C:\Users\user\Desktop\jango.exeCode function: 0_2_00007FF9A55C1AF50_2_00007FF9A55C1AF5
            Source: C:\Users\Public\jango.exeCode function: 3_2_00007FF9A55D10293_2_00007FF9A55D1029
            Source: C:\Users\Public\jango.exeCode function: 3_2_00007FF9A55D1AF53_2_00007FF9A55D1AF5
            Source: C:\Users\Public\jango.exeCode function: 6_2_00007FF9A55A10296_2_00007FF9A55A1029
            Source: C:\Users\Public\jango.exeCode function: 6_2_00007FF9A55A1AF56_2_00007FF9A55A1AF5
            Source: C:\Users\Public\jango.exeCode function: 7_2_00007FF9A55B10297_2_00007FF9A55B1029
            Source: C:\Users\Public\jango.exeCode function: 7_2_00007FF9A55B1AF57_2_00007FF9A55B1AF5
            Source: C:\Users\Public\jango.exeCode function: 9_2_00007FF9A55A10299_2_00007FF9A55A1029
            Source: C:\Users\Public\jango.exeCode function: 9_2_00007FF9A55A1AF59_2_00007FF9A55A1AF5
            Source: jango.exe, 00000000.00000002.639797220.0000000000439000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs jango.exe
            Source: jango.exe, 00000003.00000002.416059414.000000000130C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs jango.exe
            Source: jango.exe, 00000006.00000002.431296790.000000000147A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs jango.exe
            Source: jango.exe, 00000007.00000002.505660923.0000000000A5A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs jango.exe
            Source: jango.exe, 00000009.00000002.631969642.0000000000908000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs jango.exe
            Source: jango.exeReversingLabs: Detection: 56%
            Source: jango.exeVirustotal: Detection: 60%
            Source: C:\Users\user\Desktop\jango.exeFile read: C:\Users\user\Desktop\jango.exeJump to behavior
            Source: jango.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\jango.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\jango.exe C:\Users\user\Desktop\jango.exe
            Source: C:\Users\user\Desktop\jango.exeProcess created: C:\Windows\System32\schtasks.exe C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "jango" /tr "C:\Users\Public\jango.exe
            Source: C:\Windows\System32\schtasks.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: unknownProcess created: C:\Users\Public\jango.exe "C:\Users\Public\jango.exe"
            Source: unknownProcess created: C:\Users\Public\jango.exe "C:\Users\Public\jango.exe"
            Source: unknownProcess created: C:\Users\Public\jango.exe C:\Users\Public\jango.exe
            Source: unknownProcess created: C:\Users\Public\jango.exe C:\Users\Public\jango.exe
            Source: C:\Users\user\Desktop\jango.exeProcess created: C:\Windows\System32\schtasks.exe C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "jango" /tr "C:\Users\Public\jango.exeJump to behavior
            Source: C:\Users\user\Desktop\jango.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{95E15D0A-66E6-93D9-C53C-76E6219D3341}\InProcServer32Jump to behavior
            Source: jango.lnk.0.drLNK file: ..\..\..\..\..\..\..\..\Public\jango.exe
            Source: C:\Users\user\Desktop\jango.exeFile created: C:\Users\Public\jango.exeJump to behavior
            Source: C:\Users\user\Desktop\jango.exeFile created: C:\Users\user\AppData\Local\Temp\Log.tmpJump to behavior
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@8/4@37/7
            Source: C:\Users\user\Desktop\jango.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
            Source: jango.exe.0.dr, Stub/wdMu22PFfmKEXhEb.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
            Source: jango.exe.0.dr, Stub/wdMu22PFfmKEXhEb.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
            Source: jango.exe, Stub/wdMu22PFfmKEXhEb.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
            Source: jango.exe, Stub/wdMu22PFfmKEXhEb.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
            Source: 0.0.jango.exe.30000.0.unpack, Stub/wdMu22PFfmKEXhEb.csSecurity API names: System.Security.Principal.WindowsIdentity System.Security.Principal.WindowsIdentity::GetCurrent()
            Source: 0.0.jango.exe.30000.0.unpack, Stub/wdMu22PFfmKEXhEb.csSecurity API names: System.Boolean System.Security.Principal.WindowsPrincipal::IsInRole(System.Security.Principal.WindowsBuiltInRole)
            Source: jango.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
            Source: C:\Users\user\Desktop\jango.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_64\mscorlib\ac26e2af62f23e37e645b5e44068a025\mscorlib.ni.dllJump to behavior
            Source: C:\Users\Public\jango.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_64\mscorlib\ac26e2af62f23e37e645b5e44068a025\mscorlib.ni.dllJump to behavior
            Source: C:\Users\Public\jango.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_64\mscorlib\ac26e2af62f23e37e645b5e44068a025\mscorlib.ni.dllJump to behavior
            Source: C:\Users\Public\jango.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_64\mscorlib\ac26e2af62f23e37e645b5e44068a025\mscorlib.ni.dllJump to behavior
            Source: C:\Users\Public\jango.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_64\mscorlib\ac26e2af62f23e37e645b5e44068a025\mscorlib.ni.dllJump to behavior
            Source: jango.exe, u0039dVmlx8ErZMGGR8jZPwFeroSjEG7RjgvKMhTsWovd8rJHjaxBOMDiHl232UnH1o0Btv5LNDv4U.csBase64 encoded string: 'kEzhUiMz4egeuu2HGFdnj7P0c4sMCIN1yovMCFgizfkTuCQA5GUheC4M1tFzDjOM'
            Source: jango.exe.0.dr, u0039dVmlx8ErZMGGR8jZPwFeroSjEG7RjgvKMhTsWovd8rJHjaxBOMDiHl232UnH1o0Btv5LNDv4U.csBase64 encoded string: 'kEzhUiMz4egeuu2HGFdnj7P0c4sMCIN1yovMCFgizfkTuCQA5GUheC4M1tFzDjOM'
            Source: 0.0.jango.exe.30000.0.unpack, u0039dVmlx8ErZMGGR8jZPwFeroSjEG7RjgvKMhTsWovd8rJHjaxBOMDiHl232UnH1o0Btv5LNDv4U.csBase64 encoded string: 'kEzhUiMz4egeuu2HGFdnj7P0c4sMCIN1yovMCFgizfkTuCQA5GUheC4M1tFzDjOM'
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6984:120:WilError_01
            Source: C:\Users\user\Desktop\jango.exeMutant created: \Sessions\1\BaseNamedObjects\WHltJHDucgJQY7NF
            Source: jango.exe, Stub/TxlW2zEggC03cCPc.csCryptographic APIs: 'TransformFinalBlock'
            Source: jango.exe, Stub/TxlW2zEggC03cCPc.csCryptographic APIs: 'CreateDecryptor', 'TransformFinalBlock'
            Source: jango.exe, Stub/u0033ESELlDGmCYl6Eas.csCryptographic APIs: 'CreateDecryptor', 'TransformFinalBlock'
            Source: jango.exe.0.dr, Stub/TxlW2zEggC03cCPc.csCryptographic APIs: 'TransformFinalBlock'
            Source: jango.exe.0.dr, Stub/TxlW2zEggC03cCPc.csCryptographic APIs: 'CreateDecryptor', 'TransformFinalBlock'
            Source: jango.exe.0.dr, Stub/u0033ESELlDGmCYl6Eas.csCryptographic APIs: 'CreateDecryptor', 'TransformFinalBlock'
            Source: 0.0.jango.exe.30000.0.unpack, Stub/TxlW2zEggC03cCPc.csCryptographic APIs: 'TransformFinalBlock'
            Source: 0.0.jango.exe.30000.0.unpack, Stub/TxlW2zEggC03cCPc.csCryptographic APIs: 'CreateDecryptor', 'TransformFinalBlock'
            Source: C:\Users\user\Desktop\jango.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Users\user\Desktop\jango.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Users\user\Desktop\jango.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: jango.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
            Source: jango.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

            Data Obfuscation

            barindex
            Source: jango.exe, Stub/TxXKz7l7TMtreUav.cs.Net Code: zqvaESzr8Hhulrl5 System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
            Source: jango.exe, Stub/TxXKz7l7TMtreUav.cs.Net Code: 7VrmeT8yupTNkBnt System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
            Source: jango.exe, Stub/TxXKz7l7TMtreUav.cs.Net Code: 7VrmeT8yupTNkBnt
            Source: jango.exe.0.dr, Stub/TxXKz7l7TMtreUav.cs.Net Code: zqvaESzr8Hhulrl5 System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
            Source: jango.exe.0.dr, Stub/TxXKz7l7TMtreUav.cs.Net Code: 7VrmeT8yupTNkBnt System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
            Source: jango.exe.0.dr, Stub/TxXKz7l7TMtreUav.cs.Net Code: 7VrmeT8yupTNkBnt
            Source: 0.0.jango.exe.30000.0.unpack, Stub/TxXKz7l7TMtreUav.cs.Net Code: zqvaESzr8Hhulrl5 System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
            Source: 0.0.jango.exe.30000.0.unpack, Stub/TxXKz7l7TMtreUav.cs.Net Code: 7VrmeT8yupTNkBnt System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
            Source: 0.0.jango.exe.30000.0.unpack, Stub/TxXKz7l7TMtreUav.cs.Net Code: 7VrmeT8yupTNkBnt
            Source: jango.exe, Stub/TxXKz7l7TMtreUav.cs.Net Code: NewLateBinding.LateCall(V_1, null, "Invoke", V_9, null, null, null, true)
            Source: jango.exe.0.dr, Stub/TxXKz7l7TMtreUav.cs.Net Code: NewLateBinding.LateCall(V_1, null, "Invoke", V_9, null, null, null, true)
            Source: 0.0.jango.exe.30000.0.unpack, Stub/TxXKz7l7TMtreUav.cs.Net Code: NewLateBinding.LateCall(V_1, null, "Invoke", V_9, null, null, null, true)
            Source: jango.exe, Stub/TxXKz7l7TMtreUav.csHigh entropy of concatenated method names: '.cctor', '.ctor', 'frtGIr1XzzGLRyjV', 'zqvaESzr8Hhulrl5', '3GnAcR2ROGbLOoSq', 'bdWBwmMn7rKoAKut', 'dOMXCJqpdBJioZ0h', '2Cw131G8gJXbTXj3', '0NT90kpZtvwdDP1Y', 'f3rvyt6RGydLhsXc'
            Source: jango.exe, Stub/TxlW2zEggC03cCPc.csHigh entropy of concatenated method names: '.cctor', 'yCpHZQWwg2awwbIW', 'BN6Ol7TAnSFavunC', 'oZpOrqpbG6qKOeXA', 'rYCjJLcLqKN9ijgp', 'hsLO2zHfSaK3F3eR', 'Ll9WU5OLiVWjU0Z2', 'ezwYMf8SyDSDCsht', 'tl0wsgyMUgUO4Fhs', 'KYrT5FPjsjCzdjBz'
            Source: jango.exe, Stub/wdMu22PFfmKEXhEb.csHigh entropy of concatenated method names: '.cctor', '.ctor', 'Fi2lrgC8lX4PT6E2', 'TK4n2cnDmc0ydRvp', '4RwU31fqwdz0ZxAQ', 'LH8CbPTZjuzCPiSn', 'Y68f1HZdjNds1erj', 'vjdWys8kmLz9KUoK', 'cW58LTxtlRYQTrUS', '4zVQAoIuw3Dmuc1E'
            Source: jango.exe, Stub/aFEL2vOaRPS3edJ6.csHigh entropy of concatenated method names: '.cctor', '.ctor', 'yFRb0ZHa0P00LHsh', 'ONsLjfVpDt47yE24', 'edWzlhqfNupzahmP', 'S70XacZplrXptN35', '4GydiL2QluwRyZKM', 'gaHrzrnUK8Fu0YNd', 'GOT1JK9mHjfPERtq', 'noGgSaWbZroxxL7K'
            Source: jango.exe, Stub/w1nZ4PWCUZwHil60SzE0C7t1G3LjGng2H1Ox1DniTDZzsaHoOURY2DaP733eByQLRUkRJe1Bq0.csHigh entropy of concatenated method names: '.ctor', 'wqsDUKlXJYQbyeQ6', 'tR7kTtsNeKyp7C5b', 'KQbraHvyuGPIa5zu', 'glMVFqkeQqCUQwVH', 'JihJASvo23RsICNt', 'verekihDbYdBRGnX', 'nBwRrMvnXgHIqJIy', 'G9UzX4Zp1KOCZ9cf', '1dBIC1ewSJ5gyTEn'
            Source: jango.exe, Stub/qTGzZlHYZlmaUkbM.csHigh entropy of concatenated method names: '.ctor', 'HXXknsPVylxgmNLJ', 'FVNEbI7p8t7CW4QI', 'UPs7FEJEvgthRwGo', 'Oi1OJMJOKOGKIiIr', '2cWYp8nd1fDrBrFF', 'LtSu66PCzWHEAQAV', '1kXdnN26RNWDdmd6', 'a3PK5kZ1Tt1o8GCS', 'elspSyB8KAjwec7I'
            Source: jango.exe, My/Voxy0FeZ2cxDnE2sZg1wGey6jIfkxHYKupFfAqtxQ7B9e28gRGW822vSRkQLGjWeTsEXu1q7Gd.csHigh entropy of concatenated method names: '.cctor', 'HZt88bHNVPpXZh4rJNSac1dk0QD9MPEJBt4OJh23Z7AvBMP1EksT097Gb9byBHFarM0o55HQZa', 'fk8JPrtm18jWJIBQbq3ZfM2TkQJiwpsdbLccvX0zXIKqwuwOd8ZcpesxaUNthowfVkF9N9o7ex', 'qG3SbFuAkZB5DsvInuiHHD74ezBC1UqqreLkQCefoi7no2yUmFPP69J3Rk4FCn6hHDRaiq4Ose', 'oGUwLNNZ1sdOKCWNUfgXtIMd8sn10jnZCoF6cQMbcXqAZjo3KcMNUUNd6sLbkdH9PzgNeY3r0D', '6AbKv3LnuCINwCnt', '3eVXh44oTeVhTCyH', 'EgOUbzsgOFfa91oj', 'gadndigxhOfTjmkm', '51m0gzRGcTBGzW24'
            Source: jango.exe, Stub/u0033ESELlDGmCYl6Eas.csHigh entropy of concatenated method names: '.ctor', 'as6Gr2ZHEPxIrsOZ', '0mO2ITjQtVimk0eD', 'TOPXQvYuzZ0Oy6F1', 'LMpSGFBQnOgsJuZp', 'P44MOno3AsWiO1rP', 'cqCaT6HOqpP8FvKC', 'hLFfXYoA1zYXcQAr', 'yZmFybFsxWFV3fp4', '7ERPd6wGiC9cJnHm'
            Source: jango.exe.0.dr, Stub/TxXKz7l7TMtreUav.csHigh entropy of concatenated method names: '.cctor', '.ctor', 'frtGIr1XzzGLRyjV', 'zqvaESzr8Hhulrl5', '3GnAcR2ROGbLOoSq', 'bdWBwmMn7rKoAKut', 'dOMXCJqpdBJioZ0h', '2Cw131G8gJXbTXj3', '0NT90kpZtvwdDP1Y', 'f3rvyt6RGydLhsXc'
            Source: jango.exe.0.dr, Stub/wdMu22PFfmKEXhEb.csHigh entropy of concatenated method names: '.cctor', '.ctor', 'Fi2lrgC8lX4PT6E2', 'TK4n2cnDmc0ydRvp', '4RwU31fqwdz0ZxAQ', 'LH8CbPTZjuzCPiSn', 'Y68f1HZdjNds1erj', 'vjdWys8kmLz9KUoK', 'cW58LTxtlRYQTrUS', '4zVQAoIuw3Dmuc1E'
            Source: jango.exe.0.dr, Stub/TxlW2zEggC03cCPc.csHigh entropy of concatenated method names: '.cctor', 'yCpHZQWwg2awwbIW', 'BN6Ol7TAnSFavunC', 'oZpOrqpbG6qKOeXA', 'rYCjJLcLqKN9ijgp', 'hsLO2zHfSaK3F3eR', 'Ll9WU5OLiVWjU0Z2', 'ezwYMf8SyDSDCsht', 'tl0wsgyMUgUO4Fhs', 'KYrT5FPjsjCzdjBz'
            Source: jango.exe.0.dr, Stub/aFEL2vOaRPS3edJ6.csHigh entropy of concatenated method names: '.cctor', '.ctor', 'yFRb0ZHa0P00LHsh', 'ONsLjfVpDt47yE24', 'edWzlhqfNupzahmP', 'S70XacZplrXptN35', '4GydiL2QluwRyZKM', 'gaHrzrnUK8Fu0YNd', 'GOT1JK9mHjfPERtq', 'noGgSaWbZroxxL7K'
            Source: jango.exe.0.dr, Stub/w1nZ4PWCUZwHil60SzE0C7t1G3LjGng2H1Ox1DniTDZzsaHoOURY2DaP733eByQLRUkRJe1Bq0.csHigh entropy of concatenated method names: '.ctor', 'wqsDUKlXJYQbyeQ6', 'tR7kTtsNeKyp7C5b', 'KQbraHvyuGPIa5zu', 'glMVFqkeQqCUQwVH', 'JihJASvo23RsICNt', 'verekihDbYdBRGnX', 'nBwRrMvnXgHIqJIy', 'G9UzX4Zp1KOCZ9cf', '1dBIC1ewSJ5gyTEn'
            Source: jango.exe.0.dr, My/Voxy0FeZ2cxDnE2sZg1wGey6jIfkxHYKupFfAqtxQ7B9e28gRGW822vSRkQLGjWeTsEXu1q7Gd.csHigh entropy of concatenated method names: '.cctor', 'HZt88bHNVPpXZh4rJNSac1dk0QD9MPEJBt4OJh23Z7AvBMP1EksT097Gb9byBHFarM0o55HQZa', 'fk8JPrtm18jWJIBQbq3ZfM2TkQJiwpsdbLccvX0zXIKqwuwOd8ZcpesxaUNthowfVkF9N9o7ex', 'qG3SbFuAkZB5DsvInuiHHD74ezBC1UqqreLkQCefoi7no2yUmFPP69J3Rk4FCn6hHDRaiq4Ose', 'oGUwLNNZ1sdOKCWNUfgXtIMd8sn10jnZCoF6cQMbcXqAZjo3KcMNUUNd6sLbkdH9PzgNeY3r0D', '6AbKv3LnuCINwCnt', '3eVXh44oTeVhTCyH', 'EgOUbzsgOFfa91oj', 'gadndigxhOfTjmkm', '51m0gzRGcTBGzW24'
            Source: jango.exe.0.dr, Stub/qTGzZlHYZlmaUkbM.csHigh entropy of concatenated method names: '.ctor', 'HXXknsPVylxgmNLJ', 'FVNEbI7p8t7CW4QI', 'UPs7FEJEvgthRwGo', 'Oi1OJMJOKOGKIiIr', '2cWYp8nd1fDrBrFF', 'LtSu66PCzWHEAQAV', '1kXdnN26RNWDdmd6', 'a3PK5kZ1Tt1o8GCS', 'elspSyB8KAjwec7I'
            Source: jango.exe.0.dr, Stub/u0033ESELlDGmCYl6Eas.csHigh entropy of concatenated method names: '.ctor', 'as6Gr2ZHEPxIrsOZ', '0mO2ITjQtVimk0eD', 'TOPXQvYuzZ0Oy6F1', 'LMpSGFBQnOgsJuZp', 'P44MOno3AsWiO1rP', 'cqCaT6HOqpP8FvKC', 'hLFfXYoA1zYXcQAr', 'yZmFybFsxWFV3fp4', '7ERPd6wGiC9cJnHm'
            Source: 0.0.jango.exe.30000.0.unpack, Stub/TxXKz7l7TMtreUav.csHigh entropy of concatenated method names: '.cctor', '.ctor', 'frtGIr1XzzGLRyjV', 'zqvaESzr8Hhulrl5', '3GnAcR2ROGbLOoSq', 'bdWBwmMn7rKoAKut', 'dOMXCJqpdBJioZ0h', '2Cw131G8gJXbTXj3', '0NT90kpZtvwdDP1Y', 'f3rvyt6RGydLhsXc'
            Source: 0.0.jango.exe.30000.0.unpack, Stub/wdMu22PFfmKEXhEb.csHigh entropy of concatenated method names: '.cctor', '.ctor', 'Fi2lrgC8lX4PT6E2', 'TK4n2cnDmc0ydRvp', '4RwU31fqwdz0ZxAQ', 'LH8CbPTZjuzCPiSn', 'Y68f1HZdjNds1erj', 'vjdWys8kmLz9KUoK', 'cW58LTxtlRYQTrUS', '4zVQAoIuw3Dmuc1E'
            Source: 0.0.jango.exe.30000.0.unpack, Stub/TxlW2zEggC03cCPc.csHigh entropy of concatenated method names: '.cctor', 'yCpHZQWwg2awwbIW', 'BN6Ol7TAnSFavunC', 'oZpOrqpbG6qKOeXA', 'rYCjJLcLqKN9ijgp', 'hsLO2zHfSaK3F3eR', 'Ll9WU5OLiVWjU0Z2', 'ezwYMf8SyDSDCsht', 'tl0wsgyMUgUO4Fhs', 'KYrT5FPjsjCzdjBz'
            Source: 0.0.jango.exe.30000.0.unpack, Stub/aFEL2vOaRPS3edJ6.csHigh entropy of concatenated method names: '.cctor', '.ctor', 'yFRb0ZHa0P00LHsh', 'ONsLjfVpDt47yE24', 'edWzlhqfNupzahmP', 'S70XacZplrXptN35', '4GydiL2QluwRyZKM', 'gaHrzrnUK8Fu0YNd', 'GOT1JK9mHjfPERtq', 'noGgSaWbZroxxL7K'
            Source: 0.0.jango.exe.30000.0.unpack, Stub/w1nZ4PWCUZwHil60SzE0C7t1G3LjGng2H1Ox1DniTDZzsaHoOURY2DaP733eByQLRUkRJe1Bq0.csHigh entropy of concatenated method names: '.ctor', 'wqsDUKlXJYQbyeQ6', 'tR7kTtsNeKyp7C5b', 'KQbraHvyuGPIa5zu', 'glMVFqkeQqCUQwVH', 'JihJASvo23RsICNt', 'verekihDbYdBRGnX', 'nBwRrMvnXgHIqJIy', 'G9UzX4Zp1KOCZ9cf', '1dBIC1ewSJ5gyTEn'
            Source: 0.0.jango.exe.30000.0.unpack, Stub/u0033ESELlDGmCYl6Eas.csHigh entropy of concatenated method names: '.ctor', 'as6Gr2ZHEPxIrsOZ', '0mO2ITjQtVimk0eD', 'TOPXQvYuzZ0Oy6F1', 'LMpSGFBQnOgsJuZp', 'P44MOno3AsWiO1rP', 'cqCaT6HOqpP8FvKC', 'hLFfXYoA1zYXcQAr', 'yZmFybFsxWFV3fp4', '7ERPd6wGiC9cJnHm'
            Source: 0.0.jango.exe.30000.0.unpack, Stub/qTGzZlHYZlmaUkbM.csHigh entropy of concatenated method names: '.ctor', 'HXXknsPVylxgmNLJ', 'FVNEbI7p8t7CW4QI', 'UPs7FEJEvgthRwGo', 'Oi1OJMJOKOGKIiIr', '2cWYp8nd1fDrBrFF', 'LtSu66PCzWHEAQAV', '1kXdnN26RNWDdmd6', 'a3PK5kZ1Tt1o8GCS', 'elspSyB8KAjwec7I'
            Source: 0.0.jango.exe.30000.0.unpack, My/Voxy0FeZ2cxDnE2sZg1wGey6jIfkxHYKupFfAqtxQ7B9e28gRGW822vSRkQLGjWeTsEXu1q7Gd.csHigh entropy of concatenated method names: '.cctor', 'HZt88bHNVPpXZh4rJNSac1dk0QD9MPEJBt4OJh23Z7AvBMP1EksT097Gb9byBHFarM0o55HQZa', 'fk8JPrtm18jWJIBQbq3ZfM2TkQJiwpsdbLccvX0zXIKqwuwOd8ZcpesxaUNthowfVkF9N9o7ex', 'qG3SbFuAkZB5DsvInuiHHD74ezBC1UqqreLkQCefoi7no2yUmFPP69J3Rk4FCn6hHDRaiq4Ose', 'oGUwLNNZ1sdOKCWNUfgXtIMd8sn10jnZCoF6cQMbcXqAZjo3KcMNUUNd6sLbkdH9PzgNeY3r0D', '6AbKv3LnuCINwCnt', '3eVXh44oTeVhTCyH', 'EgOUbzsgOFfa91oj', 'gadndigxhOfTjmkm', '51m0gzRGcTBGzW24'
            Source: C:\Users\user\Desktop\jango.exeFile created: C:\Users\Public\jango.exeJump to dropped file
            Source: C:\Users\user\Desktop\jango.exeFile created: C:\Users\Public\jango.exeJump to dropped file

            Boot Survival

            barindex
            Source: C:\Users\user\Desktop\jango.exeFile created: C:\Users\Public\jango.exeJump to dropped file
            Source: C:\Users\user\Desktop\jango.exeProcess created: C:\Windows\System32\schtasks.exe C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "jango" /tr "C:\Users\Public\jango.exe
            Source: C:\Users\user\Desktop\jango.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\jango.lnkJump to behavior
            Source: C:\Users\user\Desktop\jango.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\jango.lnkJump to behavior
            Source: C:\Users\user\Desktop\jango.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run jangoJump to behavior
            Source: C:\Users\user\Desktop\jango.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run jangoJump to behavior
            Source: C:\Users\user\Desktop\jango.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\jango.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\jango.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\jango.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\jango.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\jango.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\jango.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\jango.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\jango.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\jango.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\jango.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\jango.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\jango.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\jango.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\jango.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\jango.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\jango.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\jango.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\jango.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\jango.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\jango.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\jango.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\jango.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\jango.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\jango.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\jango.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\jango.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\jango.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\jango.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\jango.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\jango.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\jango.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\jango.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\jango.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\jango.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\jango.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\jango.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\jango.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\jango.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\jango.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\jango.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\jango.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\jango.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\jango.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\jango.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\jango.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\Public\jango.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\Public\jango.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\Public\jango.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\Public\jango.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\Public\jango.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\Public\jango.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\Public\jango.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\Public\jango.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\Public\jango.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\Public\jango.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\Public\jango.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\Public\jango.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\Public\jango.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\Public\jango.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\Public\jango.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\Public\jango.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\Public\jango.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\Public\jango.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\Public\jango.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\Public\jango.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\Public\jango.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\Public\jango.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\Public\jango.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\Public\jango.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\Public\jango.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\Public\jango.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\Public\jango.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\Public\jango.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\Public\jango.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\Public\jango.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\Public\jango.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\Public\jango.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\Public\jango.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\Public\jango.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\Public\jango.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\Public\jango.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\Public\jango.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\Public\jango.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\Public\jango.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\Public\jango.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\Public\jango.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\Public\jango.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\Public\jango.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\Public\jango.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\Public\jango.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\Public\jango.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\Public\jango.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\Public\jango.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\Public\jango.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\Public\jango.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\Public\jango.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\Public\jango.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\Public\jango.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\Public\jango.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\Public\jango.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\Public\jango.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\Public\jango.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\Public\jango.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\Public\jango.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\Public\jango.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\Public\jango.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\Public\jango.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\Public\jango.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\Public\jango.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\Public\jango.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\Public\jango.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\Public\jango.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\Public\jango.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\jango.exe TID: 6944Thread sleep time: -55000s >= -30000sJump to behavior
            Source: C:\Users\Public\jango.exe TID: 3120Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Users\Public\jango.exe TID: 5668Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Users\Public\jango.exe TID: 7148Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Users\Public\jango.exe TID: 5124Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\jango.exeLast function: Thread delayed
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Users\Public\jango.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\Public\jango.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\Public\jango.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\Public\jango.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\jango.exeProcess information queried: ProcessInformationJump to behavior
            Source: C:\Users\Public\jango.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\Public\jango.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\Public\jango.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\Public\jango.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\jango.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Users\Public\jango.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Users\Public\jango.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Users\Public\jango.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: C:\Users\Public\jango.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
            Source: jango.exe, 00000000.00000002.641775598.000000001B1E2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dlln
            Source: jango.exe, jango.exe.0.drBinary or memory string: zQEmuWQB71USZV1e
            Source: C:\Users\user\Desktop\jango.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\Desktop\jango.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\Public\jango.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\Public\jango.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\Desktop\jango.exeMemory allocated: page read and write | page guardJump to behavior
            Source: C:\Users\user\Desktop\jango.exeProcess created: C:\Windows\System32\schtasks.exe C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "jango" /tr "C:\Users\Public\jango.exeJump to behavior
            Source: C:\Users\user\Desktop\jango.exeQueries volume information: C:\Users\user\Desktop\jango.exe VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\jango.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Users\Public\jango.exeQueries volume information: C:\Users\Public\jango.exe VolumeInformationJump to behavior
            Source: C:\Users\Public\jango.exeQueries volume information: C:\Users\Public\jango.exe VolumeInformationJump to behavior
            Source: C:\Users\Public\jango.exeQueries volume information: C:\Users\Public\jango.exe VolumeInformationJump to behavior
            Source: C:\Users\Public\jango.exeQueries volume information: C:\Users\Public\jango.exe VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\jango.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: jango.exe, type: SAMPLE
            Source: Yara matchFile source: 0.0.jango.exe.30000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000000.373122947.0000000000032000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: jango.exe PID: 5428, type: MEMORYSTR
            Source: Yara matchFile source: C:\Users\Public\jango.exe, type: DROPPED

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: jango.exe, type: SAMPLE
            Source: Yara matchFile source: 0.0.jango.exe.30000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000000.373122947.0000000000032000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: jango.exe PID: 5428, type: MEMORYSTR
            Source: Yara matchFile source: C:\Users\Public\jango.exe, type: DROPPED
            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
            Valid Accounts1
            Scheduled Task/Job
            1
            Scheduled Task/Job
            11
            Process Injection
            111
            Masquerading
            OS Credential Dumping11
            Security Software Discovery
            Remote Services1
            Screen Capture
            Exfiltration Over Other Network Medium1
            Web Service
            Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
            Default AccountsScheduled Task/Job21
            Registry Run Keys / Startup Folder
            1
            Scheduled Task/Job
            1
            Disable or Modify Tools
            LSASS Memory1
            Process Discovery
            Remote Desktop Protocol11
            Archive Collected Data
            Exfiltration Over Bluetooth11
            Encrypted Channel
            Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
            Domain AccountsAt (Linux)Logon Script (Windows)21
            Registry Run Keys / Startup Folder
            21
            Virtualization/Sandbox Evasion
            Security Account Manager21
            Virtualization/Sandbox Evasion
            SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
            Non-Standard Port
            Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
            Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)11
            Process Injection
            NTDS1
            Remote System Discovery
            Distributed Component Object ModelInput CaptureScheduled Transfer1
            Ingress Tool Transfer
            SIM Card SwapCarrier Billing Fraud
            Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
            Deobfuscate/Decode Files or Information
            LSA Secrets1
            File and Directory Discovery
            SSHKeyloggingData Transfer Size Limits2
            Non-Application Layer Protocol
            Manipulate Device CommunicationManipulate App Store Rankings or Ratings
            Replication Through Removable MediaLaunchdRc.commonRc.common1
            Obfuscated Files or Information
            Cached Domain Credentials13
            System Information Discovery
            VNCGUI Input CaptureExfiltration Over C2 Channel3
            Application Layer Protocol
            Jamming or Denial of ServiceAbuse Accessibility Features
            External Remote ServicesScheduled TaskStartup ItemsStartup Items2
            Software Packing
            DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            jango.exe57%ReversingLabsByteCode-MSIL.Trojan.XWorm
            jango.exe60%VirustotalBrowse
            jango.exe100%AviraTR/Spy.Gen
            jango.exe100%Joe Sandbox ML
            SourceDetectionScannerLabelLink
            C:\Users\Public\jango.exe100%AviraTR/Spy.Gen
            C:\Users\Public\jango.exe100%Joe Sandbox ML
            C:\Users\Public\jango.exe57%ReversingLabsByteCode-MSIL.Trojan.XWorm
            No Antivirus matches
            SourceDetectionScannerLabelLink
            0.tcp.in.ngrok.io16%VirustotalBrowse
            No Antivirus matches
            NameIPActiveMaliciousAntivirus DetectionReputation
            pastebin.com
            172.67.34.170
            truefalse
              high
              0.tcp.in.ngrok.io
              3.6.30.85
              truefalseunknown
              NameMaliciousAntivirus DetectionReputation
              https://pastebin.com/raw/jZsr13qAfalse
                high
                NameSourceMaliciousAntivirus DetectionReputation
                http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namejango.exe, 00000000.00000002.641205813.0000000002241000.00000004.00000800.00020000.00000000.sdmpfalse
                  high
                  http://pastebin.comjango.exe, 00000000.00000002.641205813.0000000002306000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    https://pastebin.comjango.exe, 00000000.00000002.641205813.00000000022FC000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      • No. of IPs < 25%
                      • 25% < No. of IPs < 50%
                      • 50% < No. of IPs < 75%
                      • 75% < No. of IPs
                      IPDomainCountryFlagASNASN NameMalicious
                      3.6.30.85
                      0.tcp.in.ngrok.ioUnited States
                      16509AMAZON-02USfalse
                      3.6.115.182
                      unknownUnited States
                      16509AMAZON-02USfalse
                      3.6.122.107
                      unknownUnited States
                      16509AMAZON-02USfalse
                      172.67.34.170
                      pastebin.comUnited States
                      13335CLOUDFLARENETUSfalse
                      3.6.115.64
                      unknownUnited States
                      16509AMAZON-02USfalse
                      3.6.98.232
                      unknownUnited States
                      16509AMAZON-02USfalse
                      IP
                      192.168.2.1
                      Joe Sandbox Version:37.1.0 Beryl
                      Analysis ID:876935
                      Start date and time:2023-05-28 02:36:12 +02:00
                      Joe Sandbox Product:CloudBasic
                      Overall analysis duration:0h 6m 26s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                      Number of analysed new started processes analysed:10
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • HDC enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Sample file name:jango.exe
                      Detection:MAL
                      Classification:mal100.troj.spyw.evad.winEXE@8/4@37/7
                      EGA Information:
                      • Successful, ratio: 20%
                      HDC Information:Failed
                      HCA Information:
                      • Successful, ratio: 95%
                      • Number of executed functions: 38
                      • Number of non-executed functions: 0
                      Cookbook Comments:
                      • Found application associated with file extension: .exe
                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, conhost.exe
                      • Excluded domains from analysis (whitelisted): ctldl.windowsupdate.com
                      • Execution Graph export aborted for target jango.exe, PID 2960 because it is empty
                      • Execution Graph export aborted for target jango.exe, PID 3576 because it is empty
                      • Execution Graph export aborted for target jango.exe, PID 6956 because it is empty
                      • Execution Graph export aborted for target jango.exe, PID 7132 because it is empty
                      • Not all processes where analyzed, report is missing behavior information
                      • Report size exceeded maximum capacity and may have missing behavior information.
                      • Report size getting too big, too many NtDeviceIoControlFile calls found.
                      • Report size getting too big, too many NtOpenKeyEx calls found.
                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                      • Report size getting too big, too many NtQueryValueKey calls found.
                      TimeTypeDescription
                      02:37:08Task SchedulerRun new task: jango path: C:\Users\Public\jango.exe
                      02:37:09AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run jango C:\Users\Public\jango.exe
                      02:37:16API Interceptor21x Sleep call for process: jango.exe modified
                      02:37:17AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run jango C:\Users\Public\jango.exe
                      02:37:26AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\jango.lnk
                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                      3.6.30.85cracksetup.exeGet hashmaliciousNanocoreBrowse
                        LocalStaFvjUblU.exeGet hashmaliciousnjRatBrowse
                          ehqsU9jDFb.exeGet hashmaliciousnjRatBrowse
                            EADSXus8Cw.exeGet hashmaliciousnjRatBrowse
                              KPiASQ9E43.exeGet hashmaliciousNjratBrowse
                                DDD24717592B5B34947AF56B9F84CD2CE01B0B2EFB62D.exeGet hashmaliciousnjRatBrowse
                                  cvh2bWXOjP.exeGet hashmaliciousRedLineBrowse
                                    3.6.115.182RN2vknsx6G.exeGet hashmaliciousRedLineBrowse
                                    • 0.tcp.in.ngrok.io:17440/
                                    3.6.122.107RN2vknsx6G.exeGet hashmaliciousRedLineBrowse
                                    • 0.tcp.in.ngrok.io:17440/
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    pastebin.comap6B2upFrF.exeGet hashmaliciousAsyncRAT, DcRat, StormKittyBrowse
                                    • 104.20.67.143
                                    LauncherPC.exeGet hashmaliciousLaplas Clipper, Vidar, XmrigBrowse
                                    • 172.67.34.170
                                    bMJI.exeGet hashmaliciousNjratBrowse
                                    • 172.67.34.170
                                    file.exeGet hashmaliciousMinerDownloader, RedLine, Vidar, XmrigBrowse
                                    • 104.20.67.143
                                    file.exeGet hashmaliciousAmadey, Babuk, Clipboard Hijacker, Djvu, Fabookie, SmokeLoader, XmrigBrowse
                                    • 104.20.68.143
                                    ChatGPT-4_Online.exeGet hashmaliciousDCRatBrowse
                                    • 172.67.34.170
                                    bohoZFWgIt.exeGet hashmaliciousDCRatBrowse
                                    • 104.20.68.143
                                    parser.exeGet hashmaliciousAmadey, Djvu, Fabookie, SmokeLoader, XmrigBrowse
                                    • 172.67.34.170
                                    file.exeGet hashmaliciousMinerDownloader, RedLine, XmrigBrowse
                                    • 104.20.68.143
                                    Doc736388_pdf.jsGet hashmaliciousUnknownBrowse
                                    • 104.20.68.143
                                    Doc736388_pdf.jsGet hashmaliciousUnknownBrowse
                                    • 172.67.34.170
                                    CTT-MAIO.442-CN.25.msiGet hashmaliciousVMdetectBrowse
                                    • 104.20.68.143
                                    AppInstaller 10.9.exeGet hashmaliciousUnknownBrowse
                                    • 104.20.68.143
                                    AppInstaller 10.9.exeGet hashmaliciousUnknownBrowse
                                    • 104.20.67.143
                                    sdadwqeq.jsGet hashmaliciousUnknownBrowse
                                    • 104.20.67.143
                                    sdadwqeq.jsGet hashmaliciousUnknownBrowse
                                    • 104.20.67.143
                                    werwqrqrq.jsGet hashmaliciousUnknownBrowse
                                    • 104.20.68.143
                                    werwqrqrq.jsGet hashmaliciousUnknownBrowse
                                    • 104.20.67.143
                                    csrss.exeGet hashmaliciousNjratBrowse
                                    • 172.67.34.170
                                    Dorksearchergoldcleaned.exeGet hashmaliciousLimeRATBrowse
                                    • 104.20.68.143
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    AMAZON-02UShttps://dnzsmdndnrrhwhwuqhajwekqwmnsdmds.net/Get hashmaliciousUnknownBrowse
                                    • 13.48.56.233
                                    https://www--wellsfargo--com--2x49329d48d6c.wsipv6.com/Get hashmaliciousUnknownBrowse
                                    • 52.210.27.198
                                    hg7OY4V27j.exeGet hashmaliciousNjratBrowse
                                    • 3.127.181.115
                                    https://smartchimp.com.au/rss/shalette.jones/3mail@b.cGet hashmaliciousHTMLPhisherBrowse
                                    • 52.92.17.97
                                    https://secs-typaueft-knoiabs.yolasite.com/Get hashmaliciousUnknownBrowse
                                    • 13.224.98.110
                                    https://galiciaoffice-1.heartdev.repl.co/Get hashmaliciousUnknownBrowse
                                    • 13.248.151.210
                                    http://mercedesvolvoferrari.net/Get hashmaliciousHTMLPhisherBrowse
                                    • 13.48.56.233
                                    https://dnzgrxrxdnasdsadqweuasdjalsawpeqaa.net/index.phpGet hashmaliciousUnknownBrowse
                                    • 13.48.56.233
                                    2RIfrkwl8Q.elfGet hashmaliciousMirai, MoobotBrowse
                                    • 108.151.215.98
                                    N30FLTPIjo.elfGet hashmaliciousMirai, MoobotBrowse
                                    • 13.233.151.166
                                    ufrz7wcBDi.elfGet hashmaliciousMirai, MoobotBrowse
                                    • 108.129.27.103
                                    6AU1Y1X4Oy.elfGet hashmaliciousMirai, MoobotBrowse
                                    • 65.9.141.226
                                    tIf5bkDmaS.exeGet hashmaliciousnjRatBrowse
                                    • 18.158.249.75
                                    y8vTlQJc3k.exeGet hashmaliciousnjRatBrowse
                                    • 18.158.249.75
                                    https://clicks.aweber.com/y/ct/?l=uF.9An&m=iJtAzEaaLy9AqTX&b=I4gTS31dtQGPsGAgicrNUw#.aHR0cHM6Ly9zbWFydGNoaW1wLmNvbS5hdS9yc3MvYWVuZXVtYW4vYWVuZXVtYW5AbWFkLmNvbQ==Get hashmaliciousHTMLPhisherBrowse
                                    • 52.218.44.161
                                    ATT35778.HTMGet hashmaliciousHTMLPhisherBrowse
                                    • 76.76.21.241
                                    https://myalumni.mcgill.ca/redirect.aspx?linkID=805890&sendId=208699&eid=228301&gid=2&tokenUrl=https%3a%2f%2fvc0r0h.codesandbox.io/?mandate=ZW1pbHlfdGVsbEBtYW51bGlmZS5jb20=Get hashmaliciousUnknownBrowse
                                    • 13.226.150.23
                                    https://myalumni.mcgill.ca/redirect.aspx?linkID=805890&sendId=208699&eid=228301&gid=2&tokenUrl=https%3a%2f%2fgq3z96.codesandbox.io/?mandate=Y3N0c0Bldm9jYW5hZGEuY29tGet hashmaliciousUnknownBrowse
                                    • 13.226.150.45
                                    FpYvEAtlSE.elfGet hashmaliciousMiraiBrowse
                                    • 52.77.75.11
                                    Oea3YPoJ4F.elfGet hashmaliciousMiraiBrowse
                                    • 18.167.112.60
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    3b5074b1b5d032e5620f69f9f700ff0eallah.batGet hashmaliciousQuasarBrowse
                                    • 172.67.34.170
                                    ap6B2upFrF.exeGet hashmaliciousAsyncRAT, DcRat, StormKittyBrowse
                                    • 172.67.34.170
                                    quotation.pdf.exeGet hashmaliciousAgentTesla, zgRATBrowse
                                    • 172.67.34.170
                                    wDeGiI6U9u.exeGet hashmaliciousGurcu StealerBrowse
                                    • 172.67.34.170
                                    Dekont_20230509140935165.exeGet hashmaliciousAgentTesla, zgRATBrowse
                                    • 172.67.34.170
                                    DHL_Documents_8355916__524256.PDF(61kb).exeGet hashmaliciousAgentTesla, zgRATBrowse
                                    • 172.67.34.170
                                    ZiraatBankasiSwiftMesaji26-05-2023.exeGet hashmaliciousAgentTeslaBrowse
                                    • 172.67.34.170
                                    fattura_e_consegna_delle_informazioni_DHL.exeGet hashmaliciousAgentTesla, zgRATBrowse
                                    • 172.67.34.170
                                    Peg9Rc8yFK.exeGet hashmaliciousQuasarBrowse
                                    • 172.67.34.170
                                    UPDATED_PI.pdf_(2).exeGet hashmaliciousAgentTeslaBrowse
                                    • 172.67.34.170
                                    PO451033201.exeGet hashmaliciousAgentTesla, zgRATBrowse
                                    • 172.67.34.170
                                    gE3qA0IdI3.exeGet hashmaliciousAgentTesla, zgRATBrowse
                                    • 172.67.34.170
                                    SecuriteInfo.com.Win32.MalwareX-gen.17658.11235.exeGet hashmaliciousAgentTesla, zgRATBrowse
                                    • 172.67.34.170
                                    qT4VNvfY3r.exeGet hashmaliciousLummaC Stealer, SmokeLoaderBrowse
                                    • 172.67.34.170
                                    Bank_Form_Document.exeGet hashmaliciousAgentTesla, zgRATBrowse
                                    • 172.67.34.170
                                    https://demuseasia.com/MjI4NTUwNFU0MTM4OGw=Get hashmaliciousUnknownBrowse
                                    • 172.67.34.170
                                    KwW85078PI.exeGet hashmaliciousAxlockerBrowse
                                    • 172.67.34.170
                                    Sniepriu.exeGet hashmaliciousLummaC StealerBrowse
                                    • 172.67.34.170
                                    zIJElVbBti.exeGet hashmaliciousAgentTesla, zgRATBrowse
                                    • 172.67.34.170
                                    Obeoyfng.exeGet hashmaliciousSnake KeyloggerBrowse
                                    • 172.67.34.170
                                    No context
                                    Process:C:\Users\user\Desktop\jango.exe
                                    File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                    Category:dropped
                                    Size (bytes):52224
                                    Entropy (8bit):5.860660081133286
                                    Encrypted:false
                                    SSDEEP:1536:K7c2/5rEItNHHc7lwKDjXgebhO+YZbWwAXWvO3kP0y:K7c2/5rncxFHXgebhOdZbWXWvO3ksy
                                    MD5:C81E5ECD50FDA5D5162CE5C920BFAD15
                                    SHA1:7B8929CF91B1CEC30CA058117A2FADE8D853CEF6
                                    SHA-256:02AA8D694FCB141522227F5890D5750D3759AA3ED20D6FD6D124D867DB894186
                                    SHA-512:0BCE58D5D1CE40B1983CA2817CAC5B64BE87C72DA46714482E010B8C7A25AE2C0C86548174AFEF0C0855825FBBA98A62D8634CF89F29CEAF90D4EF16ACFCE7D0
                                    Malicious:true
                                    Yara Hits:
                                    • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: C:\Users\Public\jango.exe, Author: Joe Security
                                    • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: C:\Users\Public\jango.exe, Author: ditekSHen
                                    Antivirus:
                                    • Antivirus: Avira, Detection: 100%
                                    • Antivirus: Joe Sandbox ML, Detection: 100%
                                    • Antivirus: ReversingLabs, Detection: 57%
                                    Reputation:low
                                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....qd................................. ........@.. .......................@............@.................................P...K............................ ....................................................... ............... ..H............text........ ...................... ..`.rsrc...............................@..@.reloc....... ......................@..B........................H........Z..........&.....................................................(....*.r...p*. .(T.*..(....*.r#..p*. ....*.s.........s.........s.........s.........*.rE..p*. .x!.*.rg..p*. 3D..*.r...p*. .~Z.*.r...p*. ~...*.r...p*. ,-..*..((...*.rp..p*. ....*.r...p*. .R..*"(....+.*&(....&+.*.+5sX... .... .'..oY...(,...~....-.(C...(9...~....oZ...&.-.*.rj..p*.r...p*. S...*.r...p*.r...p*.r...p*. x...*.r...p*. .U..*"(D...+.*:.t....(@...+.*.r...p*. .e[.*.r...p*. o[..*.r...p*. *p{.*.r...p*.
                                    Process:C:\Users\Public\jango.exe
                                    File Type:CSV text
                                    Category:dropped
                                    Size (bytes):654
                                    Entropy (8bit):5.374391981354885
                                    Encrypted:false
                                    SSDEEP:12:Q3La/KDLI4MWuPTxAIOKbbDLI4MWuPOKN08JOKhap+92n4MNQpN9tv:ML9E4KrgKDE4KGKN08AKh6+84xpNT
                                    MD5:C8A62E39DE7A3F805D39384E8BABB1E0
                                    SHA1:B32B1257401F17A2D1D5D3CC1D8C1E072E3FEE31
                                    SHA-256:A7BC127854C5327ABD50C86000BF10586B556A5E085BB23523B07A15DD4C5383
                                    SHA-512:7DB2825131F5CDA6AF33A179D9F7CD0A206FF34AE50D6E66DE9E99BE2CD1CB985B88C00F0EDE72BBC4467E7E42B5DC6132403AA2EC1A0A7A6D11766C438B10C3
                                    Malicious:true
                                    Reputation:moderate, very likely benign file
                                    Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\10a17139182a9efd561f01fada9688a5\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\4e05e2e48b8a6dd267a8c9e25ef129a7\System.Core.ni.dll",0..3,"Microsoft.VisualBasic, Version=10.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\Microsoft.V9921e851#\f2e0589ed6d670f264a5f65dd0ad000f\Microsoft.VisualBasic.ni.dll",0..
                                    Process:C:\Users\user\Desktop\jango.exe
                                    File Type:ASCII text, with CRLF line terminators
                                    Category:dropped
                                    Size (bytes):34
                                    Entropy (8bit):3.7189532820450215
                                    Encrypted:false
                                    SSDEEP:3:rRSFYJKXzovNsrzj4Xn:EFYJKDoWrYXn
                                    MD5:DB00A144B8FE7D08CC7B44480B19B2B4
                                    SHA1:3E272505722EC3879412CF70D3C500D79B89FDEA
                                    SHA-256:6BDA88D34F06476BBC45249DEDCC105C56278C5732B0D4E4BA083D281E245126
                                    SHA-512:18BD2256A04F3298CA70EF165F74D957FC99DD3C8F0D15389E1B9AAFDD9C9ED7AD55B7713302C411151FB5532DAA42855DEDF53E191395F417191E393A31E472
                                    Malicious:false
                                    Reputation:low
                                    Preview:....### explorer ###..[WIN][WIN]r
                                    Process:C:\Users\user\Desktop\jango.exe
                                    File Type:MS Windows shortcut, Item id list present, Points to a file or directory, Has Relative path, Archive, ctime=Sun May 28 08:37:07 2023, mtime=Sun May 28 08:37:10 2023, atime=Sun May 28 08:37:10 2023, length=52224, window=hide
                                    Category:dropped
                                    Size (bytes):969
                                    Entropy (8bit):4.638218066234478
                                    Encrypted:false
                                    SSDEEP:12:8GF4FL20UXv6CHqXiXgACmMyNbQkjA+Wmp+EeQzgkNvu+hPhT4t2Y+xIBjKZm:8GF4FzUZNhAxenvRJh7aB6m
                                    MD5:D2AF92964FDF3168C8CA26C5EDE3720B
                                    SHA1:BC3757B0182A7B71C33023512D1B7652CE507A4C
                                    SHA-256:389F0F4BDAD775C0AF2CFC24B726EB5365A01385056287516C576121E4A56EEE
                                    SHA-512:B44F5C86CCEEC551E32AA4997B75627F427FD281424B6C1EBE941419603D6DD56CAF80CB35C2F7D84A57F8B9655C3CD78511644E22439371E761D03F3A0067EC
                                    Malicious:false
                                    Preview:L..................F.... .....N.G...;...G...;...G................................P.O. .:i.....+00.../C:\...................x.1......Ng...Users.d......L...V.L....................:......B..U.s.e.r.s...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.3.....|.1......Nlv..Public..f......L..V.L....................<......o2.P.u.b.l.i.c...@.s.h.e.l.l.3.2...d.l.l.,.-.2.1.8.1.6.....\.2......V.L .jango.exe.D......V.L.V.L....@V.....................I..j.a.n.g.o...e.x.e.......H...............-.......G.............t......C:\Users\Public\jango.exe..(.....\.....\.....\.....\.....\.....\.....\.....\.P.u.b.l.i.c.\.j.a.n.g.o...e.x.e.............!............v..*.cM.jVD.Es.!...`.......X.......632922...........!a..%.H.VZAj...M0...........W...!a..%.H.VZAj...M0...........W..............1SPS.XF.L8C....&.m.q............/...S.-.1.-.5.-.2.1.-.3.8.5.3.3.2.1.9.3.5.-.2.1.2.5.5.6.3.2.0.9.-.4.0.5.3.0.6.2.3.3.2.-.1.0.0.2.........9...1SPS..mD..pH.H@..=x.....h....H......K*..@.A..7sFJ............
                                    File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                    Entropy (8bit):5.860660081133286
                                    TrID:
                                    • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                    • Win32 Executable (generic) a (10002005/4) 49.75%
                                    • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                    • Windows Screen Saver (13104/52) 0.07%
                                    • Generic Win/DOS Executable (2004/3) 0.01%
                                    File name:jango.exe
                                    File size:52224
                                    MD5:c81e5ecd50fda5d5162ce5c920bfad15
                                    SHA1:7b8929cf91b1cec30ca058117a2fade8d853cef6
                                    SHA256:02aa8d694fcb141522227f5890d5750d3759aa3ed20d6fd6d124d867db894186
                                    SHA512:0bce58d5d1ce40b1983ca2817cac5b64be87c72da46714482e010b8c7a25ae2c0c86548174afef0c0855825fbba98a62d8634cf89f29ceaf90d4ef16acfce7d0
                                    SSDEEP:1536:K7c2/5rEItNHHc7lwKDjXgebhO+YZbWwAXWvO3kP0y:K7c2/5rncxFHXgebhOdZbWXWvO3ksy
                                    TLSH:5D336B6CB7E14135D1FF6BB56CB6B226D735A3174913872F38D900DA2623A9CCA007E6
                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....qd................................. ........@.. .......................@............@................................
                                    Icon Hash:90cececece8e8eb0
                                    Entrypoint:0x40e09e
                                    Entrypoint Section:.text
                                    Digitally signed:false
                                    Imagebase:0x400000
                                    Subsystem:windows gui
                                    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                    Time Stamp:0x6471D1C6 [Sat May 27 09:47:50 2023 UTC]
                                    TLS Callbacks:
                                    CLR (.Net) Version:
                                    OS Version Major:4
                                    OS Version Minor:0
                                    File Version Major:4
                                    File Version Minor:0
                                    Subsystem Version Major:4
                                    Subsystem Version Minor:0
                                    Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                    Instruction
                                    jmp dword ptr [00402000h]
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax], al
                                    NameVirtual AddressVirtual Size Is in Section
                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IMPORT0xe0500x4b.text
                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x100000x4c6.rsrc
                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x120000xc.reloc
                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                    NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                    .text0x20000xc0a40xc200False0.5760107925257731data5.966728890995258IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                    .rsrc0x100000x4c60x600False0.3723958333333333data3.6932198257026454IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    .reloc0x120000xc0x200False0.044921875data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                    NameRVASizeTypeLanguageCountry
                                    RT_VERSION0x100a00x23cdata
                                    RT_MANIFEST0x102dc0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                    DLLImport
                                    mscoree.dll_CorExeMain
                                    TimestampSource PortDest PortSource IPDest IP
                                    May 28, 2023 02:37:11.258579016 CEST49721443192.168.2.5172.67.34.170
                                    May 28, 2023 02:37:11.258662939 CEST44349721172.67.34.170192.168.2.5
                                    May 28, 2023 02:37:11.258785963 CEST49721443192.168.2.5172.67.34.170
                                    May 28, 2023 02:37:11.281801939 CEST49721443192.168.2.5172.67.34.170
                                    May 28, 2023 02:37:11.281874895 CEST44349721172.67.34.170192.168.2.5
                                    May 28, 2023 02:37:11.338058949 CEST44349721172.67.34.170192.168.2.5
                                    May 28, 2023 02:37:11.338351011 CEST49721443192.168.2.5172.67.34.170
                                    May 28, 2023 02:37:11.342880964 CEST49721443192.168.2.5172.67.34.170
                                    May 28, 2023 02:37:11.342915058 CEST44349721172.67.34.170192.168.2.5
                                    May 28, 2023 02:37:11.343264103 CEST44349721172.67.34.170192.168.2.5
                                    May 28, 2023 02:37:11.387365103 CEST49721443192.168.2.5172.67.34.170
                                    May 28, 2023 02:37:11.557549953 CEST49721443192.168.2.5172.67.34.170
                                    May 28, 2023 02:37:11.600313902 CEST44349721172.67.34.170192.168.2.5
                                    May 28, 2023 02:37:11.737963915 CEST44349721172.67.34.170192.168.2.5
                                    May 28, 2023 02:37:11.738318920 CEST44349721172.67.34.170192.168.2.5
                                    May 28, 2023 02:37:11.738468885 CEST49721443192.168.2.5172.67.34.170
                                    May 28, 2023 02:37:11.746597052 CEST49721443192.168.2.5172.67.34.170
                                    May 28, 2023 02:37:15.097285986 CEST4972219633192.168.2.53.6.30.85
                                    May 28, 2023 02:37:15.245146990 CEST19633497223.6.30.85192.168.2.5
                                    May 28, 2023 02:37:15.747095108 CEST4972219633192.168.2.53.6.30.85
                                    May 28, 2023 02:37:15.898403883 CEST19633497223.6.30.85192.168.2.5
                                    May 28, 2023 02:37:16.403444052 CEST4972219633192.168.2.53.6.30.85
                                    May 28, 2023 02:37:16.551621914 CEST19633497223.6.30.85192.168.2.5
                                    May 28, 2023 02:37:16.700459003 CEST4972319633192.168.2.53.6.30.85
                                    May 28, 2023 02:37:16.848072052 CEST19633497233.6.30.85192.168.2.5
                                    May 28, 2023 02:37:17.356592894 CEST4972319633192.168.2.53.6.30.85
                                    May 28, 2023 02:37:17.505129099 CEST19633497233.6.30.85192.168.2.5
                                    May 28, 2023 02:37:18.012845039 CEST4972319633192.168.2.53.6.30.85
                                    May 28, 2023 02:37:18.160440922 CEST19633497233.6.30.85192.168.2.5
                                    May 28, 2023 02:37:18.871542931 CEST4972419633192.168.2.53.6.30.85
                                    May 28, 2023 02:37:19.018238068 CEST19633497243.6.30.85192.168.2.5
                                    May 28, 2023 02:37:19.528630972 CEST4972419633192.168.2.53.6.30.85
                                    May 28, 2023 02:37:19.675120115 CEST19633497243.6.30.85192.168.2.5
                                    May 28, 2023 02:37:20.310244083 CEST4972419633192.168.2.53.6.30.85
                                    May 28, 2023 02:37:20.456868887 CEST19633497243.6.30.85192.168.2.5
                                    May 28, 2023 02:37:25.177723885 CEST4972519633192.168.2.53.6.98.232
                                    May 28, 2023 02:37:25.325246096 CEST19633497253.6.98.232192.168.2.5
                                    May 28, 2023 02:37:25.826124907 CEST4972519633192.168.2.53.6.98.232
                                    May 28, 2023 02:37:25.973740101 CEST19633497253.6.98.232192.168.2.5
                                    May 28, 2023 02:37:26.482397079 CEST4972519633192.168.2.53.6.98.232
                                    May 28, 2023 02:37:26.629761934 CEST19633497253.6.98.232192.168.2.5
                                    May 28, 2023 02:37:26.836822987 CEST4972619633192.168.2.53.6.30.85
                                    May 28, 2023 02:37:26.983297110 CEST19633497263.6.30.85192.168.2.5
                                    May 28, 2023 02:37:27.498024940 CEST4972619633192.168.2.53.6.30.85
                                    May 28, 2023 02:37:27.644473076 CEST19633497263.6.30.85192.168.2.5
                                    May 28, 2023 02:37:28.154366970 CEST4972619633192.168.2.53.6.30.85
                                    May 28, 2023 02:37:28.300839901 CEST19633497263.6.30.85192.168.2.5
                                    May 28, 2023 02:37:28.479214907 CEST4972719633192.168.2.53.6.98.232
                                    May 28, 2023 02:37:28.625823021 CEST19633497273.6.98.232192.168.2.5
                                    May 28, 2023 02:37:29.138835907 CEST4972719633192.168.2.53.6.98.232
                                    May 28, 2023 02:37:29.285613060 CEST19633497273.6.98.232192.168.2.5
                                    May 28, 2023 02:37:29.795207977 CEST4972719633192.168.2.53.6.98.232
                                    May 28, 2023 02:37:29.945208073 CEST19633497273.6.98.232192.168.2.5
                                    May 28, 2023 02:37:30.099139929 CEST4972819633192.168.2.53.6.30.85
                                    May 28, 2023 02:37:30.246069908 CEST19633497283.6.30.85192.168.2.5
                                    May 28, 2023 02:37:30.748380899 CEST4972819633192.168.2.53.6.30.85
                                    May 28, 2023 02:37:30.895426989 CEST19633497283.6.30.85192.168.2.5
                                    May 28, 2023 02:37:31.404612064 CEST4972819633192.168.2.53.6.30.85
                                    May 28, 2023 02:37:31.552023888 CEST19633497283.6.30.85192.168.2.5
                                    May 28, 2023 02:37:35.010090113 CEST4972919633192.168.2.53.6.30.85
                                    May 28, 2023 02:37:35.157059908 CEST19633497293.6.30.85192.168.2.5
                                    May 28, 2023 02:37:35.670780897 CEST4972919633192.168.2.53.6.30.85
                                    May 28, 2023 02:37:35.817781925 CEST19633497293.6.30.85192.168.2.5
                                    May 28, 2023 02:37:36.326950073 CEST4972919633192.168.2.53.6.30.85
                                    May 28, 2023 02:37:36.473773003 CEST19633497293.6.30.85192.168.2.5
                                    May 28, 2023 02:37:36.614166975 CEST4973019633192.168.2.53.6.30.85
                                    May 28, 2023 02:37:36.761260033 CEST19633497303.6.30.85192.168.2.5
                                    May 28, 2023 02:37:37.264492989 CEST4973019633192.168.2.53.6.30.85
                                    May 28, 2023 02:37:37.411603928 CEST19633497303.6.30.85192.168.2.5
                                    May 28, 2023 02:37:37.920851946 CEST4973019633192.168.2.53.6.30.85
                                    May 28, 2023 02:37:38.068130970 CEST19633497303.6.30.85192.168.2.5
                                    May 28, 2023 02:37:43.025927067 CEST4973119633192.168.2.53.6.115.182
                                    May 28, 2023 02:37:43.173337936 CEST19633497313.6.115.182192.168.2.5
                                    May 28, 2023 02:37:43.686965942 CEST4973119633192.168.2.53.6.115.182
                                    May 28, 2023 02:37:43.834502935 CEST19633497313.6.115.182192.168.2.5
                                    May 28, 2023 02:37:44.343337059 CEST4973119633192.168.2.53.6.115.182
                                    May 28, 2023 02:37:44.490936995 CEST19633497313.6.115.182192.168.2.5
                                    May 28, 2023 02:37:44.637707949 CEST4973219633192.168.2.53.6.98.232
                                    May 28, 2023 02:37:44.784900904 CEST19633497323.6.98.232192.168.2.5
                                    May 28, 2023 02:37:45.296478987 CEST4973219633192.168.2.53.6.98.232
                                    May 28, 2023 02:37:45.443784952 CEST19633497323.6.98.232192.168.2.5
                                    May 28, 2023 02:37:45.952730894 CEST4973219633192.168.2.53.6.98.232
                                    May 28, 2023 02:37:46.100029945 CEST19633497323.6.98.232192.168.2.5
                                    May 28, 2023 02:37:46.242317915 CEST4973319633192.168.2.53.6.30.85
                                    May 28, 2023 02:37:46.389925957 CEST19633497333.6.30.85192.168.2.5
                                    May 28, 2023 02:37:46.890449047 CEST4973319633192.168.2.53.6.30.85
                                    May 28, 2023 02:37:48.536684036 CEST19633497333.6.30.85192.168.2.5
                                    May 28, 2023 02:37:49.046740055 CEST4973319633192.168.2.53.6.30.85
                                    May 28, 2023 02:37:49.194235086 CEST19633497333.6.30.85192.168.2.5
                                    May 28, 2023 02:37:53.627674103 CEST4973419633192.168.2.53.6.30.85
                                    May 28, 2023 02:37:53.775465965 CEST19633497343.6.30.85192.168.2.5
                                    May 28, 2023 02:37:54.281608105 CEST4973419633192.168.2.53.6.30.85
                                    May 28, 2023 02:37:54.429503918 CEST19633497343.6.30.85192.168.2.5
                                    May 28, 2023 02:37:54.937881947 CEST4973419633192.168.2.53.6.30.85
                                    May 28, 2023 02:37:55.085612059 CEST19633497343.6.30.85192.168.2.5
                                    May 28, 2023 02:37:55.598202944 CEST4973619633192.168.2.53.6.115.182
                                    May 28, 2023 02:37:55.748488903 CEST19633497363.6.115.182192.168.2.5
                                    May 28, 2023 02:37:56.266181946 CEST4973619633192.168.2.53.6.115.182
                                    May 28, 2023 02:37:56.412923098 CEST19633497363.6.115.182192.168.2.5
                                    May 28, 2023 02:37:56.922426939 CEST4973619633192.168.2.53.6.115.182
                                    May 28, 2023 02:37:57.069132090 CEST19633497363.6.115.182192.168.2.5
                                    May 28, 2023 02:38:01.314528942 CEST4973719633192.168.2.53.6.30.85
                                    May 28, 2023 02:38:01.461361885 CEST19633497373.6.30.85192.168.2.5
                                    May 28, 2023 02:38:01.969700098 CEST4973719633192.168.2.53.6.30.85
                                    May 28, 2023 02:38:02.116434097 CEST19633497373.6.30.85192.168.2.5
                                    May 28, 2023 02:38:02.625987053 CEST4973719633192.168.2.53.6.30.85
                                    May 28, 2023 02:38:02.772747040 CEST19633497373.6.30.85192.168.2.5
                                    May 28, 2023 02:38:02.923073053 CEST4973819633192.168.2.53.6.115.64
                                    May 28, 2023 02:38:03.070107937 CEST19633497383.6.115.64192.168.2.5
                                    May 28, 2023 02:38:03.579396009 CEST4973819633192.168.2.53.6.115.64
                                    May 28, 2023 02:38:03.726557970 CEST19633497383.6.115.64192.168.2.5
                                    May 28, 2023 02:38:04.235611916 CEST4973819633192.168.2.53.6.115.64
                                    May 28, 2023 02:38:04.382757902 CEST19633497383.6.115.64192.168.2.5
                                    May 28, 2023 02:38:04.511495113 CEST4973919633192.168.2.53.6.30.85
                                    May 28, 2023 02:38:04.658509016 CEST19633497393.6.30.85192.168.2.5
                                    May 28, 2023 02:38:05.173114061 CEST4973919633192.168.2.53.6.30.85
                                    May 28, 2023 02:38:05.320163012 CEST19633497393.6.30.85192.168.2.5
                                    May 28, 2023 02:38:05.829432011 CEST4973919633192.168.2.53.6.30.85
                                    May 28, 2023 02:38:05.976555109 CEST19633497393.6.30.85192.168.2.5
                                    May 28, 2023 02:38:06.128752947 CEST4974019633192.168.2.53.6.30.85
                                    May 28, 2023 02:38:06.275918007 CEST19633497403.6.30.85192.168.2.5
                                    May 28, 2023 02:38:06.782716036 CEST4974019633192.168.2.53.6.30.85
                                    May 28, 2023 02:38:06.929919958 CEST19633497403.6.30.85192.168.2.5
                                    May 28, 2023 02:38:07.438960075 CEST4974019633192.168.2.53.6.30.85
                                    May 28, 2023 02:38:07.586091042 CEST19633497403.6.30.85192.168.2.5
                                    May 28, 2023 02:38:07.728776932 CEST4974119633192.168.2.53.6.98.232
                                    May 28, 2023 02:38:07.875655890 CEST19633497413.6.98.232192.168.2.5
                                    May 28, 2023 02:38:08.380451918 CEST4974119633192.168.2.53.6.98.232
                                    May 28, 2023 02:38:08.527587891 CEST19633497413.6.98.232192.168.2.5
                                    May 28, 2023 02:38:09.032808065 CEST4974119633192.168.2.53.6.98.232
                                    May 28, 2023 02:38:09.179979086 CEST19633497413.6.98.232192.168.2.5
                                    May 28, 2023 02:38:12.643940926 CEST4974219633192.168.2.53.6.115.182
                                    May 28, 2023 02:38:12.791904926 CEST19633497423.6.115.182192.168.2.5
                                    May 28, 2023 02:38:13.298789024 CEST4974219633192.168.2.53.6.115.182
                                    May 28, 2023 02:38:13.446257114 CEST19633497423.6.115.182192.168.2.5
                                    May 28, 2023 02:38:13.970738888 CEST4974219633192.168.2.53.6.115.182
                                    May 28, 2023 02:38:14.118016958 CEST19633497423.6.115.182192.168.2.5
                                    May 28, 2023 02:38:17.668950081 CEST4974319633192.168.2.53.6.30.85
                                    May 28, 2023 02:38:17.816446066 CEST19633497433.6.30.85192.168.2.5
                                    May 28, 2023 02:38:18.330497980 CEST4974319633192.168.2.53.6.30.85
                                    May 28, 2023 02:38:18.478022099 CEST19633497433.6.30.85192.168.2.5
                                    May 28, 2023 02:38:18.986854076 CEST4974319633192.168.2.53.6.30.85
                                    May 28, 2023 02:38:19.134543896 CEST19633497433.6.30.85192.168.2.5
                                    May 28, 2023 02:38:19.299890041 CEST4974419633192.168.2.53.6.30.85
                                    May 28, 2023 02:38:19.447869062 CEST19633497443.6.30.85192.168.2.5
                                    May 28, 2023 02:38:19.955818892 CEST4974419633192.168.2.53.6.30.85
                                    May 28, 2023 02:38:20.103851080 CEST19633497443.6.30.85192.168.2.5
                                    May 28, 2023 02:38:20.612052917 CEST4974419633192.168.2.53.6.30.85
                                    May 28, 2023 02:38:20.760418892 CEST19633497443.6.30.85192.168.2.5
                                    May 28, 2023 02:38:24.075433016 CEST4974519633192.168.2.53.6.98.232
                                    May 28, 2023 02:38:24.222718954 CEST19633497453.6.98.232192.168.2.5
                                    May 28, 2023 02:38:24.726977110 CEST4974519633192.168.2.53.6.98.232
                                    May 28, 2023 02:38:24.874185085 CEST19633497453.6.98.232192.168.2.5
                                    May 28, 2023 02:38:25.374394894 CEST4974519633192.168.2.53.6.98.232
                                    May 28, 2023 02:38:25.522058010 CEST19633497453.6.98.232192.168.2.5
                                    May 28, 2023 02:38:25.657434940 CEST4974619633192.168.2.53.6.115.64
                                    May 28, 2023 02:38:25.804722071 CEST19633497463.6.115.64192.168.2.5
                                    May 28, 2023 02:38:26.318207026 CEST4974619633192.168.2.53.6.115.64
                                    May 28, 2023 02:38:26.465708017 CEST19633497463.6.115.64192.168.2.5
                                    May 28, 2023 02:38:26.988208055 CEST4974619633192.168.2.53.6.115.64
                                    May 28, 2023 02:38:27.135691881 CEST19633497463.6.115.64192.168.2.5
                                    May 28, 2023 02:38:27.314811945 CEST4974719633192.168.2.53.6.115.64
                                    May 28, 2023 02:38:27.461239100 CEST19633497473.6.115.64192.168.2.5
                                    May 28, 2023 02:38:27.969352007 CEST4974719633192.168.2.53.6.115.64
                                    May 28, 2023 02:38:28.115792036 CEST19633497473.6.115.64192.168.2.5
                                    May 28, 2023 02:38:28.624783993 CEST4974719633192.168.2.53.6.115.64
                                    May 28, 2023 02:38:28.771209955 CEST19633497473.6.115.64192.168.2.5
                                    May 28, 2023 02:38:32.248198986 CEST4974819633192.168.2.53.6.115.64
                                    May 28, 2023 02:38:32.395009041 CEST19633497483.6.115.64192.168.2.5
                                    May 28, 2023 02:38:32.902540922 CEST4974819633192.168.2.53.6.115.64
                                    May 28, 2023 02:38:33.049424887 CEST19633497483.6.115.64192.168.2.5
                                    May 28, 2023 02:38:33.559962988 CEST4974819633192.168.2.53.6.115.64
                                    May 28, 2023 02:38:33.706893921 CEST19633497483.6.115.64192.168.2.5
                                    May 28, 2023 02:38:33.850270987 CEST4974919633192.168.2.53.6.115.64
                                    May 28, 2023 02:38:33.996798038 CEST19633497493.6.115.64192.168.2.5
                                    May 28, 2023 02:38:34.512028933 CEST4974919633192.168.2.53.6.115.64
                                    May 28, 2023 02:38:34.658479929 CEST19633497493.6.115.64192.168.2.5
                                    May 28, 2023 02:38:35.168458939 CEST4974919633192.168.2.53.6.115.64
                                    May 28, 2023 02:38:35.314876080 CEST19633497493.6.115.64192.168.2.5
                                    May 28, 2023 02:38:38.911722898 CEST4975019633192.168.2.53.6.98.232
                                    May 28, 2023 02:38:39.058516026 CEST19633497503.6.98.232192.168.2.5
                                    May 28, 2023 02:38:39.560115099 CEST4975019633192.168.2.53.6.98.232
                                    May 28, 2023 02:38:39.706862926 CEST19633497503.6.98.232192.168.2.5
                                    May 28, 2023 02:38:40.215809107 CEST4975019633192.168.2.53.6.98.232
                                    May 28, 2023 02:38:40.362531900 CEST19633497503.6.98.232192.168.2.5
                                    May 28, 2023 02:38:44.237306118 CEST4975119633192.168.2.53.6.115.64
                                    May 28, 2023 02:38:44.384092093 CEST19633497513.6.115.64192.168.2.5
                                    May 28, 2023 02:38:44.887969971 CEST4975119633192.168.2.53.6.115.64
                                    May 28, 2023 02:38:45.034626961 CEST19633497513.6.115.64192.168.2.5
                                    May 28, 2023 02:38:45.544281006 CEST4975119633192.168.2.53.6.115.64
                                    May 28, 2023 02:38:45.691154957 CEST19633497513.6.115.64192.168.2.5
                                    May 28, 2023 02:38:45.836178064 CEST4975219633192.168.2.53.6.115.64
                                    May 28, 2023 02:38:45.982594013 CEST19633497523.6.115.64192.168.2.5
                                    May 28, 2023 02:38:46.497436047 CEST4975219633192.168.2.53.6.115.64
                                    May 28, 2023 02:38:46.644015074 CEST19633497523.6.115.64192.168.2.5
                                    May 28, 2023 02:38:47.153785944 CEST4975219633192.168.2.53.6.115.64
                                    May 28, 2023 02:38:47.300164938 CEST19633497523.6.115.64192.168.2.5
                                    May 28, 2023 02:38:47.432097912 CEST4975319633192.168.2.53.6.122.107
                                    May 28, 2023 02:38:47.578839064 CEST19633497533.6.122.107192.168.2.5
                                    May 28, 2023 02:38:48.091487885 CEST4975319633192.168.2.53.6.122.107
                                    May 28, 2023 02:38:48.238325119 CEST19633497533.6.122.107192.168.2.5
                                    May 28, 2023 02:38:48.747652054 CEST4975319633192.168.2.53.6.122.107
                                    May 28, 2023 02:38:48.894172907 CEST19633497533.6.122.107192.168.2.5
                                    May 28, 2023 02:38:53.286106110 CEST4975419633192.168.2.53.6.122.107
                                    May 28, 2023 02:38:53.433610916 CEST19633497543.6.122.107192.168.2.5
                                    May 28, 2023 02:38:54.138772011 CEST4975419633192.168.2.53.6.122.107
                                    May 28, 2023 02:38:54.286401033 CEST19633497543.6.122.107192.168.2.5
                                    May 28, 2023 02:38:54.795139074 CEST4975419633192.168.2.53.6.122.107
                                    May 28, 2023 02:38:54.942537069 CEST19633497543.6.122.107192.168.2.5
                                    May 28, 2023 02:38:55.117973089 CEST4975519633192.168.2.53.6.115.64
                                    May 28, 2023 02:38:55.263935089 CEST19633497553.6.115.64192.168.2.5
                                    May 28, 2023 02:38:55.779486895 CEST4975519633192.168.2.53.6.115.64
                                    May 28, 2023 02:38:55.925589085 CEST19633497553.6.115.64192.168.2.5
                                    May 28, 2023 02:38:56.435802937 CEST4975519633192.168.2.53.6.115.64
                                    May 28, 2023 02:38:56.581983089 CEST19633497553.6.115.64192.168.2.5
                                    May 28, 2023 02:39:00.170706034 CEST4975619633192.168.2.53.6.115.64
                                    May 28, 2023 02:39:00.317711115 CEST19633497563.6.115.64192.168.2.5
                                    May 28, 2023 02:39:00.826725006 CEST4975619633192.168.2.53.6.115.64
                                    May 28, 2023 02:39:00.973714113 CEST19633497563.6.115.64192.168.2.5
                                    May 28, 2023 02:39:01.483150005 CEST4975619633192.168.2.53.6.115.64
                                    May 28, 2023 02:39:01.630197048 CEST19633497563.6.115.64192.168.2.5
                                    May 28, 2023 02:39:01.767811060 CEST4975719633192.168.2.53.6.115.64
                                    May 28, 2023 02:39:01.914962053 CEST19633497573.6.115.64192.168.2.5
                                    May 28, 2023 02:39:02.420713902 CEST4975719633192.168.2.53.6.115.64
                                    May 28, 2023 02:39:02.567764044 CEST19633497573.6.115.64192.168.2.5
                                    May 28, 2023 02:39:03.077056885 CEST4975719633192.168.2.53.6.115.64
                                    May 28, 2023 02:39:03.224575043 CEST19633497573.6.115.64192.168.2.5
                                    May 28, 2023 02:39:10.109649897 CEST4975819633192.168.2.53.6.115.64
                                    May 28, 2023 02:39:10.256009102 CEST19633497583.6.115.64192.168.2.5
                                    May 28, 2023 02:39:10.779946089 CEST4975819633192.168.2.53.6.115.64
                                    May 28, 2023 02:39:10.926518917 CEST19633497583.6.115.64192.168.2.5
                                    May 28, 2023 02:39:11.546399117 CEST4975819633192.168.2.53.6.115.64
                                    May 28, 2023 02:39:11.692593098 CEST19633497583.6.115.64192.168.2.5
                                    TimestampSource PortDest PortSource IPDest IP
                                    May 28, 2023 02:37:11.214557886 CEST6145253192.168.2.58.8.8.8
                                    May 28, 2023 02:37:11.240665913 CEST53614528.8.8.8192.168.2.5
                                    May 28, 2023 02:37:15.065180063 CEST6532353192.168.2.58.8.8.8
                                    May 28, 2023 02:37:15.091980934 CEST53653238.8.8.8192.168.2.5
                                    May 28, 2023 02:37:16.684528112 CEST5148453192.168.2.58.8.8.8
                                    May 28, 2023 02:37:16.699400902 CEST53514848.8.8.8192.168.2.5
                                    May 28, 2023 02:37:18.681440115 CEST6344653192.168.2.58.8.8.8
                                    May 28, 2023 02:37:18.717134953 CEST53634468.8.8.8192.168.2.5
                                    May 28, 2023 02:37:25.129283905 CEST5675153192.168.2.58.8.8.8
                                    May 28, 2023 02:37:25.175338984 CEST53567518.8.8.8192.168.2.5
                                    May 28, 2023 02:37:26.805531025 CEST5503953192.168.2.58.8.8.8
                                    May 28, 2023 02:37:26.833374023 CEST53550398.8.8.8192.168.2.5
                                    May 28, 2023 02:37:28.439970016 CEST6097553192.168.2.58.8.8.8
                                    May 28, 2023 02:37:28.469187021 CEST53609758.8.8.8192.168.2.5
                                    May 28, 2023 02:37:30.068753004 CEST5922053192.168.2.58.8.8.8
                                    May 28, 2023 02:37:30.097670078 CEST53592208.8.8.8192.168.2.5
                                    May 28, 2023 02:37:34.987512112 CEST5506853192.168.2.58.8.8.8
                                    May 28, 2023 02:37:35.008835077 CEST53550688.8.8.8192.168.2.5
                                    May 28, 2023 02:37:36.597054958 CEST5668253192.168.2.58.8.8.8
                                    May 28, 2023 02:37:36.611414909 CEST53566828.8.8.8192.168.2.5
                                    May 28, 2023 02:37:43.002919912 CEST5853253192.168.2.58.8.8.8
                                    May 28, 2023 02:37:43.024866104 CEST53585328.8.8.8192.168.2.5
                                    May 28, 2023 02:37:44.615221024 CEST6265953192.168.2.58.8.8.8
                                    May 28, 2023 02:37:44.636091948 CEST53626598.8.8.8192.168.2.5
                                    May 28, 2023 02:37:46.211803913 CEST5858153192.168.2.58.8.8.8
                                    May 28, 2023 02:37:46.240569115 CEST53585818.8.8.8192.168.2.5
                                    May 28, 2023 02:37:53.594909906 CEST5626353192.168.2.58.8.8.8
                                    May 28, 2023 02:37:53.623619080 CEST53562638.8.8.8192.168.2.5
                                    May 28, 2023 02:37:55.575706959 CEST5668753192.168.2.58.8.8.8
                                    May 28, 2023 02:37:55.596112967 CEST53566878.8.8.8192.168.2.5
                                    May 28, 2023 02:38:01.289494038 CEST6441953192.168.2.58.8.8.8
                                    May 28, 2023 02:38:01.309165001 CEST53644198.8.8.8192.168.2.5
                                    May 28, 2023 02:38:02.897015095 CEST5268853192.168.2.58.8.8.8
                                    May 28, 2023 02:38:02.919218063 CEST53526888.8.8.8192.168.2.5
                                    May 28, 2023 02:38:04.494837999 CEST6134453192.168.2.58.8.8.8
                                    May 28, 2023 02:38:04.509617090 CEST53613448.8.8.8192.168.2.5
                                    May 28, 2023 02:38:06.096405983 CEST5397253192.168.2.58.8.8.8
                                    May 28, 2023 02:38:06.124767065 CEST53539728.8.8.8192.168.2.5
                                    May 28, 2023 02:38:07.698357105 CEST6493253192.168.2.58.8.8.8
                                    May 28, 2023 02:38:07.726929903 CEST53649328.8.8.8192.168.2.5
                                    May 28, 2023 02:38:12.627775908 CEST5847253192.168.2.58.8.8.8
                                    May 28, 2023 02:38:12.642714024 CEST53584728.8.8.8192.168.2.5
                                    May 28, 2023 02:38:17.638019085 CEST6017753192.168.2.58.8.8.8
                                    May 28, 2023 02:38:17.667330027 CEST53601778.8.8.8192.168.2.5
                                    May 28, 2023 02:38:19.272417068 CEST6028453192.168.2.58.8.8.8
                                    May 28, 2023 02:38:19.295516968 CEST53602848.8.8.8192.168.2.5
                                    May 28, 2023 02:38:24.053095102 CEST6001953192.168.2.58.8.8.8
                                    May 28, 2023 02:38:24.073513031 CEST53600198.8.8.8192.168.2.5
                                    May 28, 2023 02:38:25.635863066 CEST5090253192.168.2.58.8.8.8
                                    May 28, 2023 02:38:25.655822992 CEST53509028.8.8.8192.168.2.5
                                    May 28, 2023 02:38:27.277374983 CEST5382353192.168.2.58.8.8.8
                                    May 28, 2023 02:38:27.313344002 CEST53538238.8.8.8192.168.2.5
                                    May 28, 2023 02:38:32.225725889 CEST4976953192.168.2.58.8.8.8
                                    May 28, 2023 02:38:32.246100903 CEST53497698.8.8.8192.168.2.5
                                    May 28, 2023 02:38:33.825591087 CEST4957953192.168.2.58.8.8.8
                                    May 28, 2023 02:38:33.848961115 CEST53495798.8.8.8192.168.2.5
                                    May 28, 2023 02:38:38.880816936 CEST5355553192.168.2.58.8.8.8
                                    May 28, 2023 02:38:38.910556078 CEST53535558.8.8.8192.168.2.5
                                    May 28, 2023 02:38:44.205729008 CEST6129353192.168.2.58.8.8.8
                                    May 28, 2023 02:38:44.234205961 CEST53612938.8.8.8192.168.2.5
                                    May 28, 2023 02:38:45.813411951 CEST5008653192.168.2.58.8.8.8
                                    May 28, 2023 02:38:45.833396912 CEST53500868.8.8.8192.168.2.5
                                    May 28, 2023 02:38:47.408828020 CEST5218853192.168.2.58.8.8.8
                                    May 28, 2023 02:38:47.430206060 CEST53521888.8.8.8192.168.2.5
                                    May 28, 2023 02:38:53.261418104 CEST5458553192.168.2.58.8.8.8
                                    May 28, 2023 02:38:53.281160116 CEST53545858.8.8.8192.168.2.5
                                    May 28, 2023 02:38:55.082707882 CEST5210053192.168.2.58.8.8.8
                                    May 28, 2023 02:38:55.116307974 CEST53521008.8.8.8192.168.2.5
                                    May 28, 2023 02:39:00.149355888 CEST6090853192.168.2.58.8.8.8
                                    May 28, 2023 02:39:00.169478893 CEST53609088.8.8.8192.168.2.5
                                    May 28, 2023 02:39:01.742073059 CEST5862353192.168.2.58.8.8.8
                                    May 28, 2023 02:39:01.765650034 CEST53586238.8.8.8192.168.2.5
                                    May 28, 2023 02:39:10.079174042 CEST6549353192.168.2.58.8.8.8
                                    May 28, 2023 02:39:10.107728004 CEST53654938.8.8.8192.168.2.5
                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                    May 28, 2023 02:37:11.214557886 CEST192.168.2.58.8.8.80xb36bStandard query (0)pastebin.comA (IP address)IN (0x0001)false
                                    May 28, 2023 02:37:15.065180063 CEST192.168.2.58.8.8.80xae17Standard query (0)0.tcp.in.ngrok.ioA (IP address)IN (0x0001)false
                                    May 28, 2023 02:37:16.684528112 CEST192.168.2.58.8.8.80x319aStandard query (0)0.tcp.in.ngrok.ioA (IP address)IN (0x0001)false
                                    May 28, 2023 02:37:18.681440115 CEST192.168.2.58.8.8.80x39aeStandard query (0)0.tcp.in.ngrok.ioA (IP address)IN (0x0001)false
                                    May 28, 2023 02:37:25.129283905 CEST192.168.2.58.8.8.80xc606Standard query (0)0.tcp.in.ngrok.ioA (IP address)IN (0x0001)false
                                    May 28, 2023 02:37:26.805531025 CEST192.168.2.58.8.8.80x5fe5Standard query (0)0.tcp.in.ngrok.ioA (IP address)IN (0x0001)false
                                    May 28, 2023 02:37:28.439970016 CEST192.168.2.58.8.8.80xfafcStandard query (0)0.tcp.in.ngrok.ioA (IP address)IN (0x0001)false
                                    May 28, 2023 02:37:30.068753004 CEST192.168.2.58.8.8.80x884dStandard query (0)0.tcp.in.ngrok.ioA (IP address)IN (0x0001)false
                                    May 28, 2023 02:37:34.987512112 CEST192.168.2.58.8.8.80xd0dbStandard query (0)0.tcp.in.ngrok.ioA (IP address)IN (0x0001)false
                                    May 28, 2023 02:37:36.597054958 CEST192.168.2.58.8.8.80x2f15Standard query (0)0.tcp.in.ngrok.ioA (IP address)IN (0x0001)false
                                    May 28, 2023 02:37:43.002919912 CEST192.168.2.58.8.8.80xdb47Standard query (0)0.tcp.in.ngrok.ioA (IP address)IN (0x0001)false
                                    May 28, 2023 02:37:44.615221024 CEST192.168.2.58.8.8.80x48feStandard query (0)0.tcp.in.ngrok.ioA (IP address)IN (0x0001)false
                                    May 28, 2023 02:37:46.211803913 CEST192.168.2.58.8.8.80xe220Standard query (0)0.tcp.in.ngrok.ioA (IP address)IN (0x0001)false
                                    May 28, 2023 02:37:53.594909906 CEST192.168.2.58.8.8.80xc943Standard query (0)0.tcp.in.ngrok.ioA (IP address)IN (0x0001)false
                                    May 28, 2023 02:37:55.575706959 CEST192.168.2.58.8.8.80x77d1Standard query (0)0.tcp.in.ngrok.ioA (IP address)IN (0x0001)false
                                    May 28, 2023 02:38:01.289494038 CEST192.168.2.58.8.8.80x4422Standard query (0)0.tcp.in.ngrok.ioA (IP address)IN (0x0001)false
                                    May 28, 2023 02:38:02.897015095 CEST192.168.2.58.8.8.80xe51eStandard query (0)0.tcp.in.ngrok.ioA (IP address)IN (0x0001)false
                                    May 28, 2023 02:38:04.494837999 CEST192.168.2.58.8.8.80x8e7eStandard query (0)0.tcp.in.ngrok.ioA (IP address)IN (0x0001)false
                                    May 28, 2023 02:38:06.096405983 CEST192.168.2.58.8.8.80x45acStandard query (0)0.tcp.in.ngrok.ioA (IP address)IN (0x0001)false
                                    May 28, 2023 02:38:07.698357105 CEST192.168.2.58.8.8.80x1692Standard query (0)0.tcp.in.ngrok.ioA (IP address)IN (0x0001)false
                                    May 28, 2023 02:38:12.627775908 CEST192.168.2.58.8.8.80xcee2Standard query (0)0.tcp.in.ngrok.ioA (IP address)IN (0x0001)false
                                    May 28, 2023 02:38:17.638019085 CEST192.168.2.58.8.8.80xff63Standard query (0)0.tcp.in.ngrok.ioA (IP address)IN (0x0001)false
                                    May 28, 2023 02:38:19.272417068 CEST192.168.2.58.8.8.80xc1dStandard query (0)0.tcp.in.ngrok.ioA (IP address)IN (0x0001)false
                                    May 28, 2023 02:38:24.053095102 CEST192.168.2.58.8.8.80x8296Standard query (0)0.tcp.in.ngrok.ioA (IP address)IN (0x0001)false
                                    May 28, 2023 02:38:25.635863066 CEST192.168.2.58.8.8.80x3313Standard query (0)0.tcp.in.ngrok.ioA (IP address)IN (0x0001)false
                                    May 28, 2023 02:38:27.277374983 CEST192.168.2.58.8.8.80x4efdStandard query (0)0.tcp.in.ngrok.ioA (IP address)IN (0x0001)false
                                    May 28, 2023 02:38:32.225725889 CEST192.168.2.58.8.8.80xa9eaStandard query (0)0.tcp.in.ngrok.ioA (IP address)IN (0x0001)false
                                    May 28, 2023 02:38:33.825591087 CEST192.168.2.58.8.8.80xa4a4Standard query (0)0.tcp.in.ngrok.ioA (IP address)IN (0x0001)false
                                    May 28, 2023 02:38:38.880816936 CEST192.168.2.58.8.8.80x47dbStandard query (0)0.tcp.in.ngrok.ioA (IP address)IN (0x0001)false
                                    May 28, 2023 02:38:44.205729008 CEST192.168.2.58.8.8.80xeb2eStandard query (0)0.tcp.in.ngrok.ioA (IP address)IN (0x0001)false
                                    May 28, 2023 02:38:45.813411951 CEST192.168.2.58.8.8.80x4eb5Standard query (0)0.tcp.in.ngrok.ioA (IP address)IN (0x0001)false
                                    May 28, 2023 02:38:47.408828020 CEST192.168.2.58.8.8.80x87b1Standard query (0)0.tcp.in.ngrok.ioA (IP address)IN (0x0001)false
                                    May 28, 2023 02:38:53.261418104 CEST192.168.2.58.8.8.80x2d0fStandard query (0)0.tcp.in.ngrok.ioA (IP address)IN (0x0001)false
                                    May 28, 2023 02:38:55.082707882 CEST192.168.2.58.8.8.80x99ccStandard query (0)0.tcp.in.ngrok.ioA (IP address)IN (0x0001)false
                                    May 28, 2023 02:39:00.149355888 CEST192.168.2.58.8.8.80x7d10Standard query (0)0.tcp.in.ngrok.ioA (IP address)IN (0x0001)false
                                    May 28, 2023 02:39:01.742073059 CEST192.168.2.58.8.8.80x508cStandard query (0)0.tcp.in.ngrok.ioA (IP address)IN (0x0001)false
                                    May 28, 2023 02:39:10.079174042 CEST192.168.2.58.8.8.80xeb28Standard query (0)0.tcp.in.ngrok.ioA (IP address)IN (0x0001)false
                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                    May 28, 2023 02:37:11.240665913 CEST8.8.8.8192.168.2.50xb36bNo error (0)pastebin.com172.67.34.170A (IP address)IN (0x0001)false
                                    May 28, 2023 02:37:11.240665913 CEST8.8.8.8192.168.2.50xb36bNo error (0)pastebin.com104.20.68.143A (IP address)IN (0x0001)false
                                    May 28, 2023 02:37:11.240665913 CEST8.8.8.8192.168.2.50xb36bNo error (0)pastebin.com104.20.67.143A (IP address)IN (0x0001)false
                                    May 28, 2023 02:37:15.091980934 CEST8.8.8.8192.168.2.50xae17No error (0)0.tcp.in.ngrok.io3.6.30.85A (IP address)IN (0x0001)false
                                    May 28, 2023 02:37:16.699400902 CEST8.8.8.8192.168.2.50x319aNo error (0)0.tcp.in.ngrok.io3.6.30.85A (IP address)IN (0x0001)false
                                    May 28, 2023 02:37:18.717134953 CEST8.8.8.8192.168.2.50x39aeNo error (0)0.tcp.in.ngrok.io3.6.30.85A (IP address)IN (0x0001)false
                                    May 28, 2023 02:37:25.175338984 CEST8.8.8.8192.168.2.50xc606No error (0)0.tcp.in.ngrok.io3.6.98.232A (IP address)IN (0x0001)false
                                    May 28, 2023 02:37:26.833374023 CEST8.8.8.8192.168.2.50x5fe5No error (0)0.tcp.in.ngrok.io3.6.30.85A (IP address)IN (0x0001)false
                                    May 28, 2023 02:37:28.469187021 CEST8.8.8.8192.168.2.50xfafcNo error (0)0.tcp.in.ngrok.io3.6.98.232A (IP address)IN (0x0001)false
                                    May 28, 2023 02:37:30.097670078 CEST8.8.8.8192.168.2.50x884dNo error (0)0.tcp.in.ngrok.io3.6.30.85A (IP address)IN (0x0001)false
                                    May 28, 2023 02:37:35.008835077 CEST8.8.8.8192.168.2.50xd0dbNo error (0)0.tcp.in.ngrok.io3.6.30.85A (IP address)IN (0x0001)false
                                    May 28, 2023 02:37:36.611414909 CEST8.8.8.8192.168.2.50x2f15No error (0)0.tcp.in.ngrok.io3.6.30.85A (IP address)IN (0x0001)false
                                    May 28, 2023 02:37:43.024866104 CEST8.8.8.8192.168.2.50xdb47No error (0)0.tcp.in.ngrok.io3.6.115.182A (IP address)IN (0x0001)false
                                    May 28, 2023 02:37:44.636091948 CEST8.8.8.8192.168.2.50x48feNo error (0)0.tcp.in.ngrok.io3.6.98.232A (IP address)IN (0x0001)false
                                    May 28, 2023 02:37:46.240569115 CEST8.8.8.8192.168.2.50xe220No error (0)0.tcp.in.ngrok.io3.6.30.85A (IP address)IN (0x0001)false
                                    May 28, 2023 02:37:53.623619080 CEST8.8.8.8192.168.2.50xc943No error (0)0.tcp.in.ngrok.io3.6.30.85A (IP address)IN (0x0001)false
                                    May 28, 2023 02:37:55.596112967 CEST8.8.8.8192.168.2.50x77d1No error (0)0.tcp.in.ngrok.io3.6.115.182A (IP address)IN (0x0001)false
                                    May 28, 2023 02:38:01.309165001 CEST8.8.8.8192.168.2.50x4422No error (0)0.tcp.in.ngrok.io3.6.30.85A (IP address)IN (0x0001)false
                                    May 28, 2023 02:38:02.919218063 CEST8.8.8.8192.168.2.50xe51eNo error (0)0.tcp.in.ngrok.io3.6.115.64A (IP address)IN (0x0001)false
                                    May 28, 2023 02:38:04.509617090 CEST8.8.8.8192.168.2.50x8e7eNo error (0)0.tcp.in.ngrok.io3.6.30.85A (IP address)IN (0x0001)false
                                    May 28, 2023 02:38:06.124767065 CEST8.8.8.8192.168.2.50x45acNo error (0)0.tcp.in.ngrok.io3.6.30.85A (IP address)IN (0x0001)false
                                    May 28, 2023 02:38:07.726929903 CEST8.8.8.8192.168.2.50x1692No error (0)0.tcp.in.ngrok.io3.6.98.232A (IP address)IN (0x0001)false
                                    May 28, 2023 02:38:12.642714024 CEST8.8.8.8192.168.2.50xcee2No error (0)0.tcp.in.ngrok.io3.6.115.182A (IP address)IN (0x0001)false
                                    May 28, 2023 02:38:17.667330027 CEST8.8.8.8192.168.2.50xff63No error (0)0.tcp.in.ngrok.io3.6.30.85A (IP address)IN (0x0001)false
                                    May 28, 2023 02:38:19.295516968 CEST8.8.8.8192.168.2.50xc1dNo error (0)0.tcp.in.ngrok.io3.6.30.85A (IP address)IN (0x0001)false
                                    May 28, 2023 02:38:24.073513031 CEST8.8.8.8192.168.2.50x8296No error (0)0.tcp.in.ngrok.io3.6.98.232A (IP address)IN (0x0001)false
                                    May 28, 2023 02:38:25.655822992 CEST8.8.8.8192.168.2.50x3313No error (0)0.tcp.in.ngrok.io3.6.115.64A (IP address)IN (0x0001)false
                                    May 28, 2023 02:38:27.313344002 CEST8.8.8.8192.168.2.50x4efdNo error (0)0.tcp.in.ngrok.io3.6.115.64A (IP address)IN (0x0001)false
                                    May 28, 2023 02:38:32.246100903 CEST8.8.8.8192.168.2.50xa9eaNo error (0)0.tcp.in.ngrok.io3.6.115.64A (IP address)IN (0x0001)false
                                    May 28, 2023 02:38:33.848961115 CEST8.8.8.8192.168.2.50xa4a4No error (0)0.tcp.in.ngrok.io3.6.115.64A (IP address)IN (0x0001)false
                                    May 28, 2023 02:38:38.910556078 CEST8.8.8.8192.168.2.50x47dbNo error (0)0.tcp.in.ngrok.io3.6.98.232A (IP address)IN (0x0001)false
                                    May 28, 2023 02:38:44.234205961 CEST8.8.8.8192.168.2.50xeb2eNo error (0)0.tcp.in.ngrok.io3.6.115.64A (IP address)IN (0x0001)false
                                    May 28, 2023 02:38:45.833396912 CEST8.8.8.8192.168.2.50x4eb5No error (0)0.tcp.in.ngrok.io3.6.115.64A (IP address)IN (0x0001)false
                                    May 28, 2023 02:38:47.430206060 CEST8.8.8.8192.168.2.50x87b1No error (0)0.tcp.in.ngrok.io3.6.122.107A (IP address)IN (0x0001)false
                                    May 28, 2023 02:38:53.281160116 CEST8.8.8.8192.168.2.50x2d0fNo error (0)0.tcp.in.ngrok.io3.6.122.107A (IP address)IN (0x0001)false
                                    May 28, 2023 02:38:55.116307974 CEST8.8.8.8192.168.2.50x99ccNo error (0)0.tcp.in.ngrok.io3.6.115.64A (IP address)IN (0x0001)false
                                    May 28, 2023 02:39:00.169478893 CEST8.8.8.8192.168.2.50x7d10No error (0)0.tcp.in.ngrok.io3.6.115.64A (IP address)IN (0x0001)false
                                    May 28, 2023 02:39:01.765650034 CEST8.8.8.8192.168.2.50x508cNo error (0)0.tcp.in.ngrok.io3.6.115.64A (IP address)IN (0x0001)false
                                    May 28, 2023 02:39:10.107728004 CEST8.8.8.8192.168.2.50xeb28No error (0)0.tcp.in.ngrok.io3.6.115.64A (IP address)IN (0x0001)false
                                    • pastebin.com
                                    Session IDSource IPSource PortDestination IPDestination PortProcess
                                    0192.168.2.549721172.67.34.170443C:\Users\user\Desktop\jango.exe
                                    TimestampkBytes transferredDirectionData
                                    2023-05-28 00:37:11 UTC0OUTGET /raw/jZsr13qA HTTP/1.1
                                    Host: pastebin.com
                                    Connection: Keep-Alive
                                    2023-05-28 00:37:11 UTC0INHTTP/1.1 200 OK
                                    Date: Sun, 28 May 2023 00:37:11 GMT
                                    Content-Type: text/plain; charset=utf-8
                                    Transfer-Encoding: chunked
                                    Connection: close
                                    x-frame-options: DENY
                                    x-content-type-options: nosniff
                                    x-xss-protection: 1;mode=block
                                    cache-control: public, max-age=1801
                                    CF-Cache-Status: MISS
                                    Last-Modified: Sun, 28 May 2023 00:37:11 GMT
                                    Server: cloudflare
                                    CF-RAY: 7ce26d7b3a4b18e0-FRA
                                    2023-05-28 00:37:11 UTC0INData Raw: 31 37 0d 0a 30 2e 74 63 70 2e 69 6e 2e 6e 67 72 6f 6b 2e 69 6f 3a 31 39 36 33 33 0d 0a
                                    Data Ascii: 170.tcp.in.ngrok.io:19633
                                    2023-05-28 00:37:11 UTC0INData Raw: 30 0d 0a 0d 0a
                                    Data Ascii: 0


                                    Click to jump to process

                                    Click to jump to process

                                    Click to dive into process behavior distribution

                                    Click to jump to process

                                    Target ID:0
                                    Start time:02:37:03
                                    Start date:28/05/2023
                                    Path:C:\Users\user\Desktop\jango.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Users\user\Desktop\jango.exe
                                    Imagebase:0x30000
                                    File size:52224 bytes
                                    MD5 hash:C81E5ECD50FDA5D5162CE5C920BFAD15
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:.Net C# or VB.NET
                                    Yara matches:
                                    • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000000.00000000.373122947.0000000000032000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                    • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000000.00000000.373122947.0000000000032000.00000002.00000001.01000000.00000003.sdmp, Author: ditekSHen
                                    Reputation:low

                                    Target ID:1
                                    Start time:02:37:08
                                    Start date:28/05/2023
                                    Path:C:\Windows\System32\schtasks.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\System32\schtasks.exe" /create /f /RL HIGHEST /sc minute /mo 1 /tn "jango" /tr "C:\Users\Public\jango.exe
                                    Imagebase:0x7ff6aabe0000
                                    File size:226816 bytes
                                    MD5 hash:838D346D1D28F00783B7A6C6BD03A0DA
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high

                                    Target ID:2
                                    Start time:02:37:08
                                    Start date:28/05/2023
                                    Path:C:\Windows\System32\conhost.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                    Imagebase:0x7ff7fcd70000
                                    File size:625664 bytes
                                    MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Reputation:high

                                    Target ID:3
                                    Start time:02:37:17
                                    Start date:28/05/2023
                                    Path:C:\Users\Public\jango.exe
                                    Wow64 process (32bit):false
                                    Commandline:"C:\Users\Public\jango.exe"
                                    Imagebase:0xe80000
                                    File size:52224 bytes
                                    MD5 hash:C81E5ECD50FDA5D5162CE5C920BFAD15
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:.Net C# or VB.NET
                                    Yara matches:
                                    • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: C:\Users\Public\jango.exe, Author: Joe Security
                                    • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: C:\Users\Public\jango.exe, Author: ditekSHen
                                    Antivirus matches:
                                    • Detection: 100%, Avira
                                    • Detection: 100%, Joe Sandbox ML
                                    • Detection: 57%, ReversingLabs
                                    Reputation:low

                                    Target ID:6
                                    Start time:02:37:26
                                    Start date:28/05/2023
                                    Path:C:\Users\Public\jango.exe
                                    Wow64 process (32bit):false
                                    Commandline:"C:\Users\Public\jango.exe"
                                    Imagebase:0xf60000
                                    File size:52224 bytes
                                    MD5 hash:C81E5ECD50FDA5D5162CE5C920BFAD15
                                    Has elevated privileges:false
                                    Has administrator privileges:false
                                    Programmed in:.Net C# or VB.NET
                                    Reputation:low

                                    Target ID:7
                                    Start time:02:38:01
                                    Start date:28/05/2023
                                    Path:C:\Users\Public\jango.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Users\Public\jango.exe
                                    Imagebase:0x4f0000
                                    File size:52224 bytes
                                    MD5 hash:C81E5ECD50FDA5D5162CE5C920BFAD15
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:.Net C# or VB.NET
                                    Reputation:low

                                    Target ID:9
                                    Start time:02:39:00
                                    Start date:28/05/2023
                                    Path:C:\Users\Public\jango.exe
                                    Wow64 process (32bit):false
                                    Commandline:C:\Users\Public\jango.exe
                                    Imagebase:0x4b0000
                                    File size:52224 bytes
                                    MD5 hash:C81E5ECD50FDA5D5162CE5C920BFAD15
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:.Net C# or VB.NET
                                    Reputation:low

                                    Reset < >

                                      Execution Graph

                                      Execution Coverage:27.5%
                                      Dynamic/Decrypted Code Coverage:100%
                                      Signature Coverage:0%
                                      Total number of Nodes:6
                                      Total number of Limit Nodes:0
                                      execution_graph 1795 7ff9a55c3048 1796 7ff9a55c3051 SetWindowsHookExW 1795->1796 1798 7ff9a55c3121 1796->1798 1799 7ff9a55c2b29 1800 7ff9a55c2b4f RtlSetProcessIsCritical 1799->1800 1802 7ff9a55c2c02 1800->1802

                                      Callgraph

                                      • Executed
                                      • Not Executed
                                      • Opacity -> Relevance
                                      • Disassembly available
                                      callgraph 0 Function_00007FF9A55C2C44 1 Function_00007FF9A55C4A41 2 Function_00007FF9A55C1D41 3 Function_00007FF9A55C0F48 8 Function_00007FF9A55C0458 3->8 4 Function_00007FF9A55C3048 5 Function_00007FF9A55C1A47 6 Function_00007FF9A55C3A39 55 Function_00007FF9A55C3EBA 6->55 76 Function_00007FF9A55C26A0 6->76 84 Function_00007FF9A55C26B0 6->84 7 Function_00007FF9A55C0258 9 Function_00007FF9A55C3558 10 Function_00007FF9A55C0155 11 Function_00007FF9A55C0250 12 Function_00007FF9A55C0450 13 Function_00007FF9A55C0150 14 Function_00007FF9A55C4350 15 Function_00007FF9A55C2A4D 32 Function_00007FF9A55C2600 15->32 16 Function_00007FF9A55C2D25 17 Function_00007FF9A55C2720 18 Function_00007FF9A55C2620 19 Function_00007FF9A55C2E1D 19->18 26 Function_00007FF9A55C2630 19->26 100 Function_00007FF9A55C2E94 19->100 20 Function_00007FF9A55C3B32 20->55 20->84 21 Function_00007FF9A55C362C 63 Function_00007FF9A55C09D0 21->63 102 Function_00007FF9A55C0998 21->102 114 Function_00007FF9A55C3969 21->114 22 Function_00007FF9A55C392C 23 Function_00007FF9A55C2B29 24 Function_00007FF9A55C1029 24->12 24->13 25 Function_00007FF9A55C0230 24->25 73 Function_00007FF9A55C0BA8 24->73 85 Function_00007FF9A55C09B0 24->85 94 Function_00007FF9A55C0088 24->94 107 Function_00007FF9A55C0290 24->107 27 Function_00007FF9A55C4A04 28 Function_00007FF9A55C4504 29 Function_00007FF9A55C0208 97 Function_00007FF9A55C2680 29->97 30 Function_00007FF9A55C2005 95 Function_00007FF9A55C0C80 30->95 31 Function_00007FF9A55C2700 33 Function_00007FF9A55C1DFD 34 Function_00007FF9A55C4418 35 Function_00007FF9A55C4115 36 Function_00007FF9A55C080A 37 Function_00007FF9A55C000A 38 Function_00007FF9A55C2710 39 Function_00007FF9A55C1A0E 40 Function_00007FF9A55C35E2 41 Function_00007FF9A55C09E5 42 Function_00007FF9A55C45DC 113 Function_00007FF9A55C485D 42->113 43 Function_00007FF9A55C26E0 44 Function_00007FF9A55C09E0 45 Function_00007FF9A55C3EF1 46 Function_00007FF9A55C2AF7 47 Function_00007FF9A55C1AF5 48 Function_00007FF9A55C26F0 49 Function_00007FF9A55C2DF0 110 Function_00007FF9A55C0D68 49->110 50 Function_00007FF9A55C31F0 51 Function_00007FF9A55C33F0 52 Function_00007FF9A55C1DC2 53 Function_00007FF9A55C25C1 54 Function_00007FF9A55C07C7 56 Function_00007FF9A55C1AB9 57 Function_00007FF9A55C0CC0 58 Function_00007FF9A55C3FD4 58->17 58->31 58->38 58->43 58->48 65 Function_00007FF9A55C26D0 58->65 59 Function_00007FF9A55C0FD2 60 Function_00007FF9A55C1CD1 61 Function_00007FF9A55C19D5 62 Function_00007FF9A55C1FC9 64 Function_00007FF9A55C2CD0 64->29 66 Function_00007FF9A55C2ECD 66->44 105 Function_00007FF9A55C0990 66->105 67 Function_00007FF9A55C02A2 68 Function_00007FF9A55C03A2 69 Function_00007FF9A55C0AA2 70 Function_00007FF9A55C0DA2 71 Function_00007FF9A55C0EA2 72 Function_00007FF9A55C39A1 72->84 74 Function_00007FF9A55C199C 75 Function_00007FF9A55C1F9B 77 Function_00007FF9A55C359D 78 Function_00007FF9A55C09B5 79 Function_00007FF9A55C09AB 80 Function_00007FF9A55C02AA 81 Function_00007FF9A55C00AA 82 Function_00007FF9A55C0EAA 83 Function_00007FF9A55C06A9 83->7 86 Function_00007FF9A55C48AE 86->31 86->48 87 Function_00007FF9A55C24AD 88 Function_00007FF9A55C2584 89 Function_00007FF9A55C0983 90 Function_00007FF9A55C0E83 91 Function_00007FF9A55C2783 92 Function_00007FF9A55C2C81 92->29 93 Function_00007FF9A55C4181 96 Function_00007FF9A55C1A80 98 Function_00007FF9A55C4280 99 Function_00007FF9A55C247F 101 Function_00007FF9A55C1E91 101->75 103 Function_00007FF9A55C0995 104 Function_00007FF9A55C0C8A 105->63 105->102 105->114 106 Function_00007FF9A55C0B90 108 Function_00007FF9A55C3164 108->50 109 Function_00007FF9A55C0561 109->11 110->84 111 Function_00007FF9A55C0E67 112 Function_00007FF9A55C2F65 115 Function_00007FF9A55C1F6D

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 204 7ff9a55c1029-7ff9a55c1060 206 7ff9a55c1951 204->206 207 7ff9a55c1066-7ff9a55c1116 call 7ff9a55c0150 * 4 call 7ff9a55c0290 204->207 208 7ff9a55c1956-7ff9a55c199b 206->208 234 7ff9a55c1118 207->234 235 7ff9a55c111f-7ff9a55c115e 207->235 234->235 239 7ff9a55c1186-7ff9a55c11a6 235->239 240 7ff9a55c1160-7ff9a55c116d 235->240 249 7ff9a55c11ae-7ff9a55c11ba 239->249 243 7ff9a55c116f-7ff9a55c117f 240->243 244 7ff9a55c11ce 240->244 243->239 245 7ff9a55c11cf-7ff9a55c11d2 244->245 250 7ff9a55c11d4-7ff9a55c11e9 call 7ff9a55c09b0 245->250 251 7ff9a55c11ff-7ff9a55c128d 245->251 249->245 254 7ff9a55c11bc-7ff9a55c11cd 249->254 260 7ff9a55c11f0-7ff9a55c11f2 250->260 277 7ff9a55c1327-7ff9a55c13df call 7ff9a55c0450 251->277 254->244 261 7ff9a55c1292-7ff9a55c1320 260->261 262 7ff9a55c11f8-7ff9a55c11fe 260->262 261->277 262->251 292 7ff9a55c13e1-7ff9a55c13ff 277->292 293 7ff9a55c1406-7ff9a55c146e 277->293 292->293 302 7ff9a55c1496-7ff9a55c14bf 293->302 303 7ff9a55c1470-7ff9a55c147d 293->303 314 7ff9a55c14c9-7ff9a55c14d5 302->314 305 7ff9a55c147f-7ff9a55c148f 303->305 306 7ff9a55c14de-7ff9a55c1581 303->306 305->302 320 7ff9a55c1583-7ff9a55c159a 306->320 321 7ff9a55c15ce-7ff9a55c15f4 306->321 314->306 326 7ff9a55c15fb-7ff9a55c1601 320->326 327 7ff9a55c159d-7ff9a55c15b5 320->327 321->326 329 7ff9a55c1603-7ff9a55c1624 326->329 330 7ff9a55c1626-7ff9a55c1656 326->330 327->321 333 7ff9a55c15b7-7ff9a55c15c4 327->333 334 7ff9a55c165d-7ff9a55c1694 329->334 330->334 333->321 337 7ff9a55c15c6-7ff9a55c15cc 333->337 342 7ff9a55c1696-7ff9a55c16b7 334->342 343 7ff9a55c16b9-7ff9a55c16e9 334->343 337->321 345 7ff9a55c16f0-7ff9a55c1705 342->345 343->345 347 7ff9a55c1707-7ff9a55c1715 345->347 348 7ff9a55c1716-7ff9a55c173e 345->348 347->348 351 7ff9a55c1798-7ff9a55c17b1 348->351 352 7ff9a55c1740-7ff9a55c176c call 7ff9a55c0088 348->352 351->208 356 7ff9a55c17b7-7ff9a55c17ff 351->356 361 7ff9a55c1771-7ff9a55c1796 352->361 356->208 366 7ff9a55c1805-7ff9a55c187f call 7ff9a55c0230 call 7ff9a55c09b0 356->366 361->351 379 7ff9a55c1881 call 7ff9a55c0ba8 366->379 380 7ff9a55c1886-7ff9a55c1931 366->380 379->380 393 7ff9a55c1938-7ff9a55c1950 380->393
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.644395381.00007FF9A55C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9A55C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff9a55c0000_jango.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f27a40a341c596382a8a0f135e1d148103c79307ee6c009b0435d2402e5ad98b
                                      • Instruction ID: 7bb3846ffc0a21d3ad0076bab6f30c8051e4dbc990e3e5118efbc223284bdeb9
                                      • Opcode Fuzzy Hash: f27a40a341c596382a8a0f135e1d148103c79307ee6c009b0435d2402e5ad98b
                                      • Instruction Fuzzy Hash: 9B52C224F18A5A4FE798EB3894A53BDB7D2FF8A700F544579E44EC32D2DE29AC014781
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 537 7ff9a55c1af5-7ff9a55c1b01 538 7ff9a55c1b04-7ff9a55c1b15 537->538 539 7ff9a55c1b03 537->539 540 7ff9a55c1b18-7ff9a55c1b29 538->540 541 7ff9a55c1b17 538->541 539->538 542 7ff9a55c1b2c-7ff9a55c1b3d 540->542 543 7ff9a55c1b2b 540->543 541->540 544 7ff9a55c1b40-7ff9a55c1b51 542->544 545 7ff9a55c1b3f 542->545 543->542 546 7ff9a55c1b54-7ff9a55c1b65 544->546 547 7ff9a55c1b53 544->547 545->544 548 7ff9a55c1b68-7ff9a55c1b79 546->548 549 7ff9a55c1b67 546->549 547->546 550 7ff9a55c1b7c-7ff9a55c1b8d 548->550 551 7ff9a55c1b7b 548->551 549->548 552 7ff9a55c1b90-7ff9a55c1bb8 550->552 553 7ff9a55c1b8f 550->553 551->550 556 7ff9a55c1bc3-7ff9a55c1c70 552->556 557 7ff9a55c1bba-7ff9a55c1bc0 552->557 553->552 568 7ff9a55c1c7a-7ff9a55c1c7b 556->568 557->556 569 7ff9a55c1c82-7ff9a55c1ccc 568->569
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.644395381.00007FF9A55C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9A55C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff9a55c0000_jango.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 0f905fd2106c09568ccf0705f60e13ec13a3dac6a50e5bb4b5a41284dc6fb0d3
                                      • Instruction ID: 79c338a73516c65394bbd6843fdec42856b5479b8cedbb584c6f9a38858d6502
                                      • Opcode Fuzzy Hash: 0f905fd2106c09568ccf0705f60e13ec13a3dac6a50e5bb4b5a41284dc6fb0d3
                                      • Instruction Fuzzy Hash: 8061E024A1E6C54FD786E7785864676BFE4EF87219B1840FFE0CDC61A3ED491806C742
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 110 7ff9a55c3048-7ff9a55c304f 111 7ff9a55c3051-7ff9a55c3059 110->111 112 7ff9a55c305a-7ff9a55c30cd 110->112 111->112 116 7ff9a55c30d3-7ff9a55c30e0 112->116 117 7ff9a55c3159-7ff9a55c315d 112->117 118 7ff9a55c30e2-7ff9a55c311f SetWindowsHookExW 116->118 117->118 119 7ff9a55c3121 118->119 120 7ff9a55c3127-7ff9a55c3158 118->120 119->120
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.644395381.00007FF9A55C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9A55C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff9a55c0000_jango.jbxd
                                      Similarity
                                      • API ID: HookWindows
                                      • String ID:
                                      • API String ID: 2559412058-0
                                      • Opcode ID: fc4f24e747b77975f6cb8f0faa50c6c0260b099b2b78a6bc87bd1cb0efd2e8fd
                                      • Instruction ID: cfd5b2645caccf135a2eccb62a63ee07c9947c0abc631ccf8ea7d68a7e917567
                                      • Opcode Fuzzy Hash: fc4f24e747b77975f6cb8f0faa50c6c0260b099b2b78a6bc87bd1cb0efd2e8fd
                                      • Instruction Fuzzy Hash: 5F41D631A1CA4D4FDB58DB6CE8466F9BBE0EB5A321F10427ED04DD3292CA65B81687C1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Control-flow Graph

                                      • Executed
                                      • Not Executed
                                      control_flow_graph 124 7ff9a55c2b29-7ff9a55c2c00 RtlSetProcessIsCritical 128 7ff9a55c2c02 124->128 129 7ff9a55c2c08-7ff9a55c2c3d 124->129 128->129
                                      APIs
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.644395381.00007FF9A55C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9A55C0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ff9a55c0000_jango.jbxd
                                      Similarity
                                      • API ID: CriticalProcess
                                      • String ID:
                                      • API String ID: 2695349919-0
                                      • Opcode ID: 73914f36490d31fc7c67abc77f2111d5db13e3b358c956e32a1cef4ad91b6770
                                      • Instruction ID: 4d592e33916f9dfba5d380b28b2a21d562344335cd3b3a651fbd35030dcd1dbd
                                      • Opcode Fuzzy Hash: 73914f36490d31fc7c67abc77f2111d5db13e3b358c956e32a1cef4ad91b6770
                                      • Instruction Fuzzy Hash: 5541BF3180C7588FD719DFA8D885AE9BBF0FF5A311F04416EE08AD3692CB646846CB91
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000003.00000002.416397685.00007FF9A55D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9A55D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_7ff9a55d0000_jango.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 39fa410c8d7a3310905d95ca81b58111b381932742b6584096afec9085a48899
                                      • Instruction ID: 2cb25847540f01a841f9025147a273968cf59961da1644aca5b0cd3410f4c44c
                                      • Opcode Fuzzy Hash: 39fa410c8d7a3310905d95ca81b58111b381932742b6584096afec9085a48899
                                      • Instruction Fuzzy Hash: 0D52B426F29A094FE798F738A4953B9B7D2FF8A700F444179E44EC32D2DE69B8414781
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000003.00000002.416397685.00007FF9A55D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9A55D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_7ff9a55d0000_jango.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: ?]_^
                                      • API String ID: 0-1553512288
                                      • Opcode ID: fc348c2e9c03162969c4166e7935d858629305b9255f0b4a8a9ac336177ffbfe
                                      • Instruction ID: 2ac1d367ff989fd304833871731f3cc05eb63645d2234c6f2a32137f139ef6f6
                                      • Opcode Fuzzy Hash: fc348c2e9c03162969c4166e7935d858629305b9255f0b4a8a9ac336177ffbfe
                                      • Instruction Fuzzy Hash: 4881C42BB5961A9BD600FBBCF4C11F8B790FF83336B405177C988C6193DE5A648A8691
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000003.00000002.416397685.00007FF9A55D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9A55D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_7ff9a55d0000_jango.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: bb61ba2a2beabbd1625d5b55c5edd1ee6c88c604595952db4cba91014dd4b04c
                                      • Instruction ID: 57ad819add30ea13eb4b597cc9653c053a34771e93c997974b18aa1fe3d0a312
                                      • Opcode Fuzzy Hash: bb61ba2a2beabbd1625d5b55c5edd1ee6c88c604595952db4cba91014dd4b04c
                                      • Instruction Fuzzy Hash: 6701496BE1DB984FE355F73868965713FE0EB67610B0940BBD8CCCB1E3D91868818382
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000003.00000002.416397685.00007FF9A55D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9A55D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_7ff9a55d0000_jango.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 36c60f8cbd3658731bdc6596c7e4448480f78bed646bc20596b001aa03b88f3c
                                      • Instruction ID: cb86f0d931dd61680932057c2db6e9c03f293516665e35da0025b095a62770c5
                                      • Opcode Fuzzy Hash: 36c60f8cbd3658731bdc6596c7e4448480f78bed646bc20596b001aa03b88f3c
                                      • Instruction Fuzzy Hash: B7713A16A1D7960EEB52B73CB4561F93BD1DF87334B0840BBD4CCCA1A3DE48688A8791
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000003.00000002.416397685.00007FF9A55D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9A55D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_7ff9a55d0000_jango.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 484b3364cd7303cca523a2713df17955474c1abd0401645c8b1591f2e38d0e99
                                      • Instruction ID: c5217a434fc83194280a496b5918ff42966dd39de5b85eb490946f26d729f103
                                      • Opcode Fuzzy Hash: 484b3364cd7303cca523a2713df17955474c1abd0401645c8b1591f2e38d0e99
                                      • Instruction Fuzzy Hash: 57319222F29B5A4FF744E77C589A3B9B6D2FF9A601F448176E44CC3293DE5868014391
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000003.00000002.416397685.00007FF9A55D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9A55D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_7ff9a55d0000_jango.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 1206db9a7637b8253a97921584267be4977ebf04d6ca0f9d0e75492550e48f5e
                                      • Instruction ID: 22580a4945750d9a0c14d093be73cb7ae128bd138ffbc306e08041ec39f91324
                                      • Opcode Fuzzy Hash: 1206db9a7637b8253a97921584267be4977ebf04d6ca0f9d0e75492550e48f5e
                                      • Instruction Fuzzy Hash: 6031B335E18A0E8FD744EBB8D4952BDB7E2FF9A310F808475D44DD7286DE39A8418740
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000003.00000002.416397685.00007FF9A55D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9A55D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_7ff9a55d0000_jango.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 23215a6c252922c72fbcd1dd03cb6a696db183c691843b53197928b965918856
                                      • Instruction ID: 8667bf2f9eff393d1da34d190a75be18d9006e2bf39ca7f98a25cd0725293e55
                                      • Opcode Fuzzy Hash: 23215a6c252922c72fbcd1dd03cb6a696db183c691843b53197928b965918856
                                      • Instruction Fuzzy Hash: 23218734A1978DDFD345EBB8E4D15A9BBE1FF87200B4180E5D889C7282DE786804C751
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000003.00000002.416397685.00007FF9A55D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9A55D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_3_2_7ff9a55d0000_jango.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 43ee3a4d12a4c2c8578dfd432090758df9bc0880ed1b9571bec3e60ddf316d06
                                      • Instruction ID: 4578dd51131b41a794f7b4a7b306deb46dda1c74f16d39694f7b72b244ce66c2
                                      • Opcode Fuzzy Hash: 43ee3a4d12a4c2c8578dfd432090758df9bc0880ed1b9571bec3e60ddf316d06
                                      • Instruction Fuzzy Hash: A521F737E2958A4FE784DB58D8456BDBBF0FF56600B9401B9C08DD71A2EE6828418740
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000006.00000002.431674616.00007FF9A55A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9A55A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_7ff9a55a0000_jango.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 800cecec539e090635db3758100aa1a4155b580ef61c37095a383aa6b5be17f9
                                      • Instruction ID: 4385b54040419aef2860375f30a94eb1013c87aa251e0b2a10968b25bb1c5908
                                      • Opcode Fuzzy Hash: 800cecec539e090635db3758100aa1a4155b580ef61c37095a383aa6b5be17f9
                                      • Instruction Fuzzy Hash: 2052A124F18A0A4FE798FB3894993B9B7D2FF8A710F545179E44EC32D6DF28A8014781
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000006.00000002.431674616.00007FF9A55A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9A55A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_7ff9a55a0000_jango.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: ?`_^
                                      • API String ID: 0-1881915811
                                      • Opcode ID: adf8fd4e4eabe4abba5f3d74326dc3cae97945f4e9c781a29c721608db78f818
                                      • Instruction ID: 512970cfdcaf1fd5443c215ee1a5d5dc26c04fe4e1d05cd055533df4729df9bd
                                      • Opcode Fuzzy Hash: adf8fd4e4eabe4abba5f3d74326dc3cae97945f4e9c781a29c721608db78f818
                                      • Instruction Fuzzy Hash: 2681042BB582165FE601FB7CF4C51E8BBA4FF83335B205037D588C6192EFA8355A46A0
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000006.00000002.431674616.00007FF9A55A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9A55A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_7ff9a55a0000_jango.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: ae7a90325ea34ad926b21b302271124fe1f594387d8a54c0a0903095e58268bc
                                      • Instruction ID: 19d95458c443cfce50232a4a3821e28f0b38e793279201cbb0f014b9e66b396f
                                      • Opcode Fuzzy Hash: ae7a90325ea34ad926b21b302271124fe1f594387d8a54c0a0903095e58268bc
                                      • Instruction Fuzzy Hash: D3711716A1D7960EEB52B33CB4561F92FD1EF8733470840BBD4CCCA1A3DE48688A8395
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000006.00000002.431674616.00007FF9A55A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9A55A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_7ff9a55a0000_jango.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 3640e1c9fabefce00fe0024f170a54b1ec3f7488a492681bb761e7e49d48106c
                                      • Instruction ID: 12732d9c5bd8d54f22e5efa3b8782eed5e69977bf8ff4c381e29178e63d4a3d7
                                      • Opcode Fuzzy Hash: 3640e1c9fabefce00fe0024f170a54b1ec3f7488a492681bb761e7e49d48106c
                                      • Instruction Fuzzy Hash: 1831C221F28B4A4FF744B77C589A3B9B6D2FF9A701F44817AE44CC3293DE6868014391
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000006.00000002.431674616.00007FF9A55A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9A55A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_7ff9a55a0000_jango.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 60aa74aeb08d7419f853c38cf99cf0eb5bf8576932f85b98e372089cb9549824
                                      • Instruction ID: fe135f2a59cd183139e897381f5904ee69b925563042de2c6d5923799003547b
                                      • Opcode Fuzzy Hash: 60aa74aeb08d7419f853c38cf99cf0eb5bf8576932f85b98e372089cb9549824
                                      • Instruction Fuzzy Hash: CC31A034E18A0E8FDB88FB78D4952A9B7E2FF9A310F904479D40CD7686DE38A8418750
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000006.00000002.431674616.00007FF9A55A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9A55A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_7ff9a55a0000_jango.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 5e2011bddddac499bf9249c28175147d9d196a01cea04edca1d12065041a005a
                                      • Instruction ID: d25128a7548443537130b6c5a3dfba0d38350311b3c468a939d13f5b5afdfd67
                                      • Opcode Fuzzy Hash: 5e2011bddddac499bf9249c28175147d9d196a01cea04edca1d12065041a005a
                                      • Instruction Fuzzy Hash: EF21B134A0974E9FD389FBB4D4D0168BBB1FF8B200BA154A6D84DC3786EF2869108761
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000006.00000002.431674616.00007FF9A55A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9A55A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_7ff9a55a0000_jango.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: aa4ec681c443e3fa6f69ed36b502fd4bdc72577edb05bb1ec3d8063d287cb92e
                                      • Instruction ID: 430e96608f37c682a5e791f87bded26be16beeb6481dbc0929fa9c5ecb01b2bd
                                      • Opcode Fuzzy Hash: aa4ec681c443e3fa6f69ed36b502fd4bdc72577edb05bb1ec3d8063d287cb92e
                                      • Instruction Fuzzy Hash: 7021FB36D1854E4FE780EB64C8952BDBBF1FF86600B54157DC18DE71E2DE686C418741
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000006.00000002.431674616.00007FF9A55A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9A55A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_6_2_7ff9a55a0000_jango.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: e6f14fbe85b2fa90bbe866a9d7ec308be6df6a358f6ef5242747ce766b125e5b
                                      • Instruction ID: 7a9369ca195d78789ebb320e1eab0f7876b8880aef26c90343d692ca7b6c1d69
                                      • Opcode Fuzzy Hash: e6f14fbe85b2fa90bbe866a9d7ec308be6df6a358f6ef5242747ce766b125e5b
                                      • Instruction Fuzzy Hash: 0BE0CD20608D14579644F724B4C157973C1F785394B444424FC4DD3195DD18994147D1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000007.00000002.506703965.00007FF9A55B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9A55B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_7ff9a55b0000_jango.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 6bb24fd90b5f2ce5cc3bd4365ee9aa271c3fe7f33f358ea11ea3201690244c79
                                      • Instruction ID: 58245354ec6c5a3f81b71d866e6b09b3d36591a09a118deb579719480c8dfa9c
                                      • Opcode Fuzzy Hash: 6bb24fd90b5f2ce5cc3bd4365ee9aa271c3fe7f33f358ea11ea3201690244c79
                                      • Instruction Fuzzy Hash: EC52C324F18A094FE798FB38A4A93B9B7D2FF8A700F544579E44EC32D2DD69B8414781
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000007.00000002.506703965.00007FF9A55B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9A55B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_7ff9a55b0000_jango.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: ?__^
                                      • API String ID: 0-1595695886
                                      • Opcode ID: 63e349d43e9db96bd94c928fe44034998071a290dffc28cbfd8da29949b65e6b
                                      • Instruction ID: 12cd2c9474abd278dcb73bda690030e87f8152f29ce057c116666abbac52aeca
                                      • Opcode Fuzzy Hash: 63e349d43e9db96bd94c928fe44034998071a290dffc28cbfd8da29949b65e6b
                                      • Instruction Fuzzy Hash: B681E42BB593164BE700BB7EF4C91EC7790EFC33327509037D688CA192DE5865AE46A4
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000007.00000002.506703965.00007FF9A55B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9A55B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_7ff9a55b0000_jango.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 42ad529b0cc1918d2bf0a56efdd81a24a8145bb19c9b8cc80ad100da32fdf396
                                      • Instruction ID: a7451f2de31bde893797fed7a23706f7a2c2b919c8b0fee2ca39cf11859e8e3a
                                      • Opcode Fuzzy Hash: 42ad529b0cc1918d2bf0a56efdd81a24a8145bb19c9b8cc80ad100da32fdf396
                                      • Instruction Fuzzy Hash: 27710B16A1D7960EEB52777CB4561F92BD1DF8733470880BBE4CCCA1A3DE48688B8791
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000007.00000002.506703965.00007FF9A55B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9A55B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_7ff9a55b0000_jango.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 51b7a073a9389a9637b4c362644728b4d50928dc710dbcb695299dfaa85fc26c
                                      • Instruction ID: 5750d91720357f920ec0e9b066dd83aae7de0e25a1fe887a2807aff69c42700e
                                      • Opcode Fuzzy Hash: 51b7a073a9389a9637b4c362644728b4d50928dc710dbcb695299dfaa85fc26c
                                      • Instruction Fuzzy Hash: 50319065F18B4A4FF744A77C589A3B9A6D2FF9A701F4481BAE44CC3293DE5868014391
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000007.00000002.506703965.00007FF9A55B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9A55B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_7ff9a55b0000_jango.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 4578401a6cdce4b6c8e7b0420a37c90539ceaa6b6f094a01ab02ff69c0431d7b
                                      • Instruction ID: 6f84b94b2979f45ed5ba14435bce0c5e6fb1da094fc3e34f91e4f3c347fb93ca
                                      • Opcode Fuzzy Hash: 4578401a6cdce4b6c8e7b0420a37c90539ceaa6b6f094a01ab02ff69c0431d7b
                                      • Instruction Fuzzy Hash: F2317174A18A0D8FDB44FB78D8A52ADBBE1FF99310F848479D40DD7296DE38A8518740
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000007.00000002.506703965.00007FF9A55B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9A55B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_7ff9a55b0000_jango.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 2d61c1daac01c4a0e1aed502f43fe86fc7c68a1a5cde1ca26145ba3c88e1f996
                                      • Instruction ID: 1c3ae26b8b9b8446aa5cb5135dce9ebb93140e974d9034b33f5a165ae0ecb92d
                                      • Opcode Fuzzy Hash: 2d61c1daac01c4a0e1aed502f43fe86fc7c68a1a5cde1ca26145ba3c88e1f996
                                      • Instruction Fuzzy Hash: F221A5349097899FD345FFB5E5D01ACBFA1FF8B200B9540AAD889C33C2ED246A748751
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000007.00000002.506703965.00007FF9A55B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9A55B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_7ff9a55b0000_jango.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 4a44e36e296361996e3f8d441a31679e1fe73d12bd75ee7f1ba90e310910f105
                                      • Instruction ID: c3ddc25f0b4814ef6f052117f91104d100636670b773c1c371d65616268ccae3
                                      • Opcode Fuzzy Hash: 4a44e36e296361996e3f8d441a31679e1fe73d12bd75ee7f1ba90e310910f105
                                      • Instruction Fuzzy Hash: B6213D36E1854A8FE784DF58C84D2BDBBF1FF86600B4541BEC08DE71E2ED6868418741
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000007.00000002.506703965.00007FF9A55B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9A55B0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_7_2_7ff9a55b0000_jango.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: f4bf48ee21f599be7b0b5b2cb2e68d3fd5aa2c9afd063cf38e4d426a81ee82d2
                                      • Instruction ID: 70b7c1ad7f8cd36d840988a6b5044cfd6b14a66640e600e2b8f54618d5cace77
                                      • Opcode Fuzzy Hash: f4bf48ee21f599be7b0b5b2cb2e68d3fd5aa2c9afd063cf38e4d426a81ee82d2
                                      • Instruction Fuzzy Hash: BEE0C230A08E281BA748F728B8D19BD73D1FB853A0B488428FC4DE32D2DC18AA9147C1
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000009.00000002.632456789.00007FF9A55A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9A55A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_7ff9a55a0000_jango.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 94aaf1bd0487d71857ed454048923ce058c70870a40b2ad077915ce3aeb940bf
                                      • Instruction ID: 74adfcabdbea7bf8f725c1241cab7923490d09f3ea58790b27fb8ec82c7435c1
                                      • Opcode Fuzzy Hash: 94aaf1bd0487d71857ed454048923ce058c70870a40b2ad077915ce3aeb940bf
                                      • Instruction Fuzzy Hash: 3152C224F18A094FE798FB38A4993B9B7D2FF8A710F445579E44EC32D6DE28B8054781
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000009.00000002.632456789.00007FF9A55A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9A55A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_7ff9a55a0000_jango.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: fff19041abc7c5e1ceaa61e8e558c539522399b6af6bd4eac8f80ff8cd904ed7
                                      • Instruction ID: c1b044002c4643d68c59b7db4c8ccff8f17e20be8e61b4108a14dded5093d726
                                      • Opcode Fuzzy Hash: fff19041abc7c5e1ceaa61e8e558c539522399b6af6bd4eac8f80ff8cd904ed7
                                      • Instruction Fuzzy Hash: A461E124A5E6C94FD786E77858686767FE4EF87215B1840FFE0CDC61A3EE481846C342
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000009.00000002.632456789.00007FF9A55A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9A55A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_7ff9a55a0000_jango.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: ?`_^
                                      • API String ID: 0-1881915811
                                      • Opcode ID: d61e506a443ebe832d9eb4ad44c6975fd96ee6ffe981adde945369ededd2d489
                                      • Instruction ID: ee597b1e004b7f14d35a84307c913c1f893a08f586065312777659e373643d40
                                      • Opcode Fuzzy Hash: d61e506a443ebe832d9eb4ad44c6975fd96ee6ffe981adde945369ededd2d489
                                      • Instruction Fuzzy Hash: E881F26BB582165FE601FB7DF4C51EABB94FF83331B104037D588C6192EEA8254E46A8
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000009.00000002.632456789.00007FF9A55A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9A55A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_7ff9a55a0000_jango.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 334ad00a7f8ea1af7e2c4bcf32f41c395897f175e33050d732d25372eee3e8fa
                                      • Instruction ID: f3f4d46d827a716cf5f4585ea780c11d98a8edb0d29dbd3d9aae6cfede465203
                                      • Opcode Fuzzy Hash: 334ad00a7f8ea1af7e2c4bcf32f41c395897f175e33050d732d25372eee3e8fa
                                      • Instruction Fuzzy Hash: D9711716A1D7960EEB52B33CB4561F92FD1EF8733070840BBD4CCCA1A3DE48688A8395
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000009.00000002.632456789.00007FF9A55A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9A55A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_7ff9a55a0000_jango.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: c1b161976f903746bb8f8bfbcee2e067dd36d32fee96d61714d76491099c2adf
                                      • Instruction ID: 03972b90327b02661ee8e9e816bfb5b133f9d15b777e9c4dab9db86129ca6589
                                      • Opcode Fuzzy Hash: c1b161976f903746bb8f8bfbcee2e067dd36d32fee96d61714d76491099c2adf
                                      • Instruction Fuzzy Hash: 0731B630B18A494FE688E73CA45A779B6D2FF9A311F0441BEE44EC32A3DE696C418641
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000009.00000002.632456789.00007FF9A55A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9A55A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_7ff9a55a0000_jango.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 3640e1c9fabefce00fe0024f170a54b1ec3f7488a492681bb761e7e49d48106c
                                      • Instruction ID: 12732d9c5bd8d54f22e5efa3b8782eed5e69977bf8ff4c381e29178e63d4a3d7
                                      • Opcode Fuzzy Hash: 3640e1c9fabefce00fe0024f170a54b1ec3f7488a492681bb761e7e49d48106c
                                      • Instruction Fuzzy Hash: 1831C221F28B4A4FF744B77C589A3B9B6D2FF9A701F44817AE44CC3293DE6868014391
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000009.00000002.632456789.00007FF9A55A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9A55A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_7ff9a55a0000_jango.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 94f342db5e9115f8b08d4ca3598f5a17f2876b17bf8048a7c916b35dda99d443
                                      • Instruction ID: 2bf909dc8851b2f83f473702231486807c770274c5ba14dc518f762b68693cc5
                                      • Opcode Fuzzy Hash: 94f342db5e9115f8b08d4ca3598f5a17f2876b17bf8048a7c916b35dda99d443
                                      • Instruction Fuzzy Hash: 29319374E18A0E8FD744FBB8D4952AEB7E2FF9A310F804475D40DD7296DE38A8458740
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000009.00000002.632456789.00007FF9A55A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9A55A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_7ff9a55a0000_jango.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: abbf837bc2402f6df090c0ef490226d258dcae62ade7014e0b7d7be27c8ffd6e
                                      • Instruction ID: 951f70315845ccee1dc12910364ceea1139b3e0aec7b2669daaf45467d7d6c1f
                                      • Opcode Fuzzy Hash: abbf837bc2402f6df090c0ef490226d258dcae62ade7014e0b7d7be27c8ffd6e
                                      • Instruction Fuzzy Hash: 2721D030A097499FD341EBB4E4D016BBFE1FF8B200B8240A6D848C3386ED38290C8759
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000009.00000002.632456789.00007FF9A55A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9A55A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_7ff9a55a0000_jango.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 209c3e0775a2aed74f45915f410b7610c24f1d602e17a60622a33033dd32af77
                                      • Instruction ID: 585c6a92beab462ece9836d852add9aa5b0be7bbbbb839defe909a9cb61c76cc
                                      • Opcode Fuzzy Hash: 209c3e0775a2aed74f45915f410b7610c24f1d602e17a60622a33033dd32af77
                                      • Instruction Fuzzy Hash: 27212B36D1854A4FE780EB24C8852BDBBF0FF46700B54017DC18DE71E2DE682C418740
                                      Uniqueness

                                      Uniqueness Score: -1.00%

                                      Memory Dump Source
                                      • Source File: 00000009.00000002.632456789.00007FF9A55A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF9A55A0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_9_2_7ff9a55a0000_jango.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 89128fd3361eb51b2adf6b4b6d2aced1c4a9b70d4ca358afdd6ec945a9f4f70f
                                      • Instruction ID: 7c2dc00750b57a1c53bd0107558d0c277cac01c69fe8c32d5ee916bca34ca85f
                                      • Opcode Fuzzy Hash: 89128fd3361eb51b2adf6b4b6d2aced1c4a9b70d4ca358afdd6ec945a9f4f70f
                                      • Instruction Fuzzy Hash: 5BE0C220A08E241BA644F728B4C19BA73C1FB8A3A0B448424FC4DD3296DC28AA8547C5
                                      Uniqueness

                                      Uniqueness Score: -1.00%