Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
MHQMJCOxjl.exe

Overview

General Information

Sample name:MHQMJCOxjl.exe
renamed because original name is a hash value
Original sample name:ea9e3fff5f163edc995d23014204b7ec16ac6c29.exe
Analysis ID:1542936
MD5:9b4f2f92797d3029f037dfd7f989abd6
SHA1:ea9e3fff5f163edc995d23014204b7ec16ac6c29
SHA256:99761ef16e32792133fca6cda9abb42dffe63838711a42bb3a2b599b4642e541
Tags:dllexeJohnWalkerTexasLoaderJWTLJWTLoaderReversingLabsuser-NDA0E
Infos:

Detection

JohnWalkerTexasLoader
Score:76
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Yara detected JohnWalkerTexasLoader
AI detected suspicious sample
Queries memory information (via WMI often done to detect virtual machines)
Queries sensitive physical memory information (via WMI, Win32_PhysicalMemory, often done to detect virtual machines)
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Detected potential crypto function
Enables debug privileges
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
PE file does not import any functions
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • MHQMJCOxjl.exe (PID: 5808 cmdline: "C:\Users\user\Desktop\MHQMJCOxjl.exe" MD5: 9B4F2F92797D3029F037DFD7F989ABD6)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
MHQMJCOxjl.exeJoeSecurity_JohnWalkerTexasLoaderYara detected JohnWalkerTexasLoaderJoe Security
    SourceRuleDescriptionAuthorStrings
    00000000.00000000.1390948590.000002DC5D772000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_JohnWalkerTexasLoaderYara detected JohnWalkerTexasLoaderJoe Security
      00000000.00000002.2653298505.000002DC5F451000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_JohnWalkerTexasLoaderYara detected JohnWalkerTexasLoaderJoe Security
        Process Memory Space: MHQMJCOxjl.exe PID: 5808JoeSecurity_JohnWalkerTexasLoaderYara detected JohnWalkerTexasLoaderJoe Security
          SourceRuleDescriptionAuthorStrings
          0.0.MHQMJCOxjl.exe.2dc5d770000.0.unpackJoeSecurity_JohnWalkerTexasLoaderYara detected JohnWalkerTexasLoaderJoe Security
            No Sigma rule has matched
            No Suricata rule has matched

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: MHQMJCOxjl.exeAvira: detected
            Source: MHQMJCOxjl.exeReversingLabs: Detection: 50%
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 93.0% probability
            Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.7:49741 version: TLS 1.2
            Source: MHQMJCOxjl.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: Binary string: C:\Users\Administrator\Pictures\DiffPatchWpf-main\obj\x64\Release\DiffPatchWpf.pdb source: MHQMJCOxjl.exe
            Source: global trafficHTTP traffic detected: GET /api.php?status=1&wallets=0&av=1 HTTP/1.1Host: xilloolli.comConnection: Keep-Alive
            Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
            Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
            Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: global trafficHTTP traffic detected: GET /api.php?status=1&wallets=0&av=1 HTTP/1.1Host: xilloolli.comConnection: Keep-Alive
            Source: global trafficDNS traffic detected: DNS query: xilloolli.com
            Source: MHQMJCOxjl.exe, 00000000.00000002.2656771323.000002DC7C208000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.microsoft
            Source: MHQMJCOxjl.exe, 00000000.00000002.2656771323.000002DC7C208000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://microsoft.co
            Source: MHQMJCOxjl.exe, 00000000.00000002.2653298505.000002DC5F8D6000.00000004.00000800.00020000.00000000.sdmp, MHQMJCOxjl.exe, 00000000.00000002.2653298505.000002DC5F451000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
            Source: MHQMJCOxjl.exe, 00000000.00000002.2653298505.000002DC5F8E9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://xilloolli.com
            Source: MHQMJCOxjl.exeString found in binary or memory: https://github.com/reproteq/DiffPatchWpf3Copyright
            Source: MHQMJCOxjl.exeString found in binary or memory: https://ipinfo.io/country
            Source: MHQMJCOxjl.exeString found in binary or memory: https://ipinfo.io/ip
            Source: MHQMJCOxjl.exeString found in binary or memory: https://oklibed.com
            Source: MHQMJCOxjl.exe, 00000000.00000002.2653298505.000002DC5F8D6000.00000004.00000800.00020000.00000000.sdmp, MHQMJCOxjl.exe, 00000000.00000002.2653298505.000002DC5F451000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://xilloolli.com
            Source: MHQMJCOxjl.exe, 00000000.00000002.2653298505.000002DC5F451000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://xilloolli.com/api-debug.php
            Source: MHQMJCOxjl.exe, 00000000.00000002.2653298505.000002DC5F451000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://xilloolli.com/api.php
            Source: MHQMJCOxjl.exe, 00000000.00000002.2653298505.000002DC5F760000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://xilloolli.com/api.php?status=1&walle
            Source: MHQMJCOxjl.exe, 00000000.00000002.2653298505.000002DC5F760000.00000004.00000800.00020000.00000000.sdmp, MHQMJCOxjl.exe, 00000000.00000002.2653298505.000002DC5F451000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://xilloolli.com/api.php?status=1&wallets=0&av=1
            Source: MHQMJCOxjl.exeString found in binary or memory: https://xilloolli.com/api.phpGhttps://xilloolli.com/api-debug.php
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
            Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
            Source: unknownHTTPS traffic detected: 188.114.97.3:443 -> 192.168.2.7:49741 version: TLS 1.2
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeCode function: 0_2_00007FFAAB6C6B720_2_00007FFAAB6C6B72
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeCode function: 0_2_00007FFAAB6C5DC60_2_00007FFAAB6C5DC6
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeCode function: 0_2_00007FFAAB6C13280_2_00007FFAAB6C1328
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeCode function: 0_2_00007FFAAB6C3ABD0_2_00007FFAAB6C3ABD
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeCode function: 0_2_00007FFAAB6C11FA0_2_00007FFAAB6C11FA
            Source: MHQMJCOxjl.exeStatic PE information: No import functions for PE file found
            Source: MHQMJCOxjl.exe, 00000000.00000000.1390980834.000002DC5D794000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameDiffPatchWpf.exe2 vs MHQMJCOxjl.exe
            Source: MHQMJCOxjl.exeBinary or memory string: OriginalFilenameDiffPatchWpf.exe2 vs MHQMJCOxjl.exe
            Source: classification engineClassification label: mal76.troj.evad.winEXE@1/0@1/1
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeMutant created: NULL
            Source: MHQMJCOxjl.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: MHQMJCOxjl.exeStatic file information: TRID: Win64 Executable GUI Net Framework (217006/5) 49.88%
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: MHQMJCOxjl.exeReversingLabs: Detection: 50%
            Source: MHQMJCOxjl.exeString found in binary or memory: EHH-ADD!IJJoEHH5JKK
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeSection loaded: dwrite.dllJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeSection loaded: msvcp140_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeSection loaded: dwmapi.dllJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeSection loaded: d3d9.dllJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeSection loaded: d3d10warp.dllJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeSection loaded: wtsapi32.dllJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeSection loaded: winsta.dllJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeSection loaded: powrprof.dllJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeSection loaded: umpdc.dllJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeSection loaded: dataexchange.dllJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeSection loaded: d3d11.dllJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeSection loaded: dcomp.dllJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeSection loaded: dxgi.dllJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeSection loaded: twinapi.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeSection loaded: resourcepolicyclient.dllJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeSection loaded: dxcore.dllJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeSection loaded: textshaping.dllJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeSection loaded: textinputframework.dllJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeSection loaded: coreuicomponents.dllJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeSection loaded: msctfui.dllJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeSection loaded: uiautomationcore.dllJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeSection loaded: rasapi32.dllJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeSection loaded: rasman.dllJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeSection loaded: rtutils.dllJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeSection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeSection loaded: schannel.dllJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeSection loaded: mskeyprotect.dllJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeSection loaded: ncryptsslp.dllJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeSection loaded: d3dcompiler_47.dllJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
            Source: Window RecorderWindow detected: More than 3 window changes detected
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
            Source: MHQMJCOxjl.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
            Source: MHQMJCOxjl.exeStatic PE information: Image base 0x140000000 > 0x60000000
            Source: MHQMJCOxjl.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: MHQMJCOxjl.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
            Source: Binary string: C:\Users\Administrator\Pictures\DiffPatchWpf-main\obj\x64\Release\DiffPatchWpf.pdb source: MHQMJCOxjl.exe
            Source: MHQMJCOxjl.exeStatic PE information: 0xD7A9D229 [Sun Aug 27 16:07:05 2084 UTC]
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeCode function: 0_2_00007FFAAB5AD2A5 pushad ; iretd 0_2_00007FFAAB5AD2A6
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeCode function: 0_2_00007FFAAB6C841A push E9606ACAh; ret 0_2_00007FFAAB6C84A9
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeCode function: 0_2_00007FFAAB6C00AD pushad ; iretd 0_2_00007FFAAB6C00C1
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PhysicalMemory
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PhysicalMemory
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeMemory allocated: 2DC5F290000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeMemory allocated: 2DC77450000 memory reserve | memory write watchJump to behavior
            Source: MHQMJCOxjl.exe, 00000000.00000002.2655411453.000002DC77E2C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMware Virtual RAM
            Source: MHQMJCOxjl.exe, 00000000.00000002.2655411453.000002DC77E2C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Win32_PhysicalMemoryPhysical Memory 0Win32_PhysicalMemoryPhysical MemoryPhysical MemoryPhysical MemoryRAM slot #0RAM slot #0VMware Virtual RAM00000001VMW-4096MBS
            Source: MHQMJCOxjl.exe, 00000000.00000002.2655411453.000002DC77DFF000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Win32_PhysicalMemoryPhysical Memory 0Win32_PhysicalMemoryPhysical MemoryPhysical MemoryPhysical MemoryRAM slot #0RAM slot #0VMware Virtual RAM00000001VMW-4096MB
            Source: MHQMJCOxjl.exe, 00000000.00000002.2656062076.000002DC7A12E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeMemory allocated: page read and write | page guardJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeQueries volume information: C:\Users\user\Desktop\MHQMJCOxjl.exe VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\PresentationFramework-SystemXml\v4.0_4.0.0.0__b77a5c561934e089\PresentationFramework-SystemXml.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeQueries volume information: C:\Windows\Fonts\segoeuib.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeQueries volume information: C:\Windows\Fonts\segoeuib.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeQueries volume information: C:\Windows\Fonts\segoeui.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeQueries volume information: C:\Windows\Fonts\segoeuib.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeQueries volume information: C:\Windows\Fonts\segoeui.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeQueries volume information: C:\Windows\Fonts\seguisb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\UIAutomationTypes\v4.0_4.0.0.0__31bf3856ad364e35\UIAutomationTypes.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\UIAutomationProvider\v4.0_4.0.0.0__31bf3856ad364e35\UIAutomationProvider.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeQueries volume information: C:\Windows\Fonts\segoeuib.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeQueries volume information: C:\Windows\Fonts\segoeui.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeQueries volume information: C:\Windows\Fonts\segoeuib.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeQueries volume information: C:\Windows\Fonts\segoeuib.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
            Source: MHQMJCOxjl.exe, 00000000.00000002.2656062076.000002DC7A26A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
            Source: C:\Users\user\Desktop\MHQMJCOxjl.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: MHQMJCOxjl.exe, type: SAMPLE
            Source: Yara matchFile source: 0.0.MHQMJCOxjl.exe.2dc5d770000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000000.1390948590.000002DC5D772000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.2653298505.000002DC5F451000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: MHQMJCOxjl.exe PID: 5808, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: MHQMJCOxjl.exe, type: SAMPLE
            Source: Yara matchFile source: 0.0.MHQMJCOxjl.exe.2dc5d770000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000000.1390948590.000002DC5D772000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.2653298505.000002DC5F451000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: MHQMJCOxjl.exe PID: 5808, type: MEMORYSTR
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts21
            Windows Management Instrumentation
            1
            DLL Side-Loading
            1
            DLL Side-Loading
            11
            Virtualization/Sandbox Evasion
            OS Credential Dumping221
            Security Software Discovery
            Remote Services1
            Archive Collected Data
            11
            Encrypted Channel
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault Accounts2
            Command and Scripting Interpreter
            Boot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
            Disable or Modify Tools
            LSASS Memory11
            Virtualization/Sandbox Evasion
            Remote Desktop ProtocolData from Removable Media1
            Ingress Tool Transfer
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
            Obfuscated Files or Information
            Security Account Manager12
            System Information Discovery
            SMB/Windows Admin SharesData from Network Shared Drive2
            Non-Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
            Timestomp
            NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture3
            Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
            DLL Side-Loading
            LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            MHQMJCOxjl.exe50%ReversingLabsByteCode-MSIL.Trojan.Walgentz
            MHQMJCOxjl.exe100%AviraTR/Agent.ckmos
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            http://crl.microsoft0%URL Reputationsafe
            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
            NameIPActiveMaliciousAntivirus DetectionReputation
            xilloolli.com
            188.114.97.3
            truefalse
              unknown
              NameMaliciousAntivirus DetectionReputation
              https://xilloolli.com/api.php?status=1&wallets=0&av=1false
                unknown
                NameSourceMaliciousAntivirus DetectionReputation
                https://ipinfo.io/countryMHQMJCOxjl.exefalse
                  unknown
                  http://crl.microsoftMHQMJCOxjl.exe, 00000000.00000002.2656771323.000002DC7C208000.00000004.00000020.00020000.00000000.sdmpfalse
                  • URL Reputation: safe
                  unknown
                  http://microsoft.coMHQMJCOxjl.exe, 00000000.00000002.2656771323.000002DC7C208000.00000004.00000020.00020000.00000000.sdmpfalse
                    unknown
                    https://xilloolli.com/api.phpGhttps://xilloolli.com/api-debug.phpMHQMJCOxjl.exefalse
                      unknown
                      https://oklibed.comMHQMJCOxjl.exefalse
                        unknown
                        https://xilloolli.comMHQMJCOxjl.exe, 00000000.00000002.2653298505.000002DC5F8D6000.00000004.00000800.00020000.00000000.sdmp, MHQMJCOxjl.exe, 00000000.00000002.2653298505.000002DC5F451000.00000004.00000800.00020000.00000000.sdmpfalse
                          unknown
                          https://xilloolli.com/api.phpMHQMJCOxjl.exe, 00000000.00000002.2653298505.000002DC5F451000.00000004.00000800.00020000.00000000.sdmpfalse
                            unknown
                            https://xilloolli.com/api-debug.phpMHQMJCOxjl.exe, 00000000.00000002.2653298505.000002DC5F451000.00000004.00000800.00020000.00000000.sdmpfalse
                              unknown
                              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameMHQMJCOxjl.exe, 00000000.00000002.2653298505.000002DC5F8D6000.00000004.00000800.00020000.00000000.sdmp, MHQMJCOxjl.exe, 00000000.00000002.2653298505.000002DC5F451000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://xilloolli.comMHQMJCOxjl.exe, 00000000.00000002.2653298505.000002DC5F8E9000.00000004.00000800.00020000.00000000.sdmpfalse
                                unknown
                                https://xilloolli.com/api.php?status=1&walleMHQMJCOxjl.exe, 00000000.00000002.2653298505.000002DC5F760000.00000004.00000800.00020000.00000000.sdmpfalse
                                  unknown
                                  https://github.com/reproteq/DiffPatchWpf3CopyrightMHQMJCOxjl.exefalse
                                    unknown
                                    https://ipinfo.io/ipMHQMJCOxjl.exefalse
                                      unknown
                                      • No. of IPs < 25%
                                      • 25% < No. of IPs < 50%
                                      • 50% < No. of IPs < 75%
                                      • 75% < No. of IPs
                                      IPDomainCountryFlagASNASN NameMalicious
                                      188.114.97.3
                                      xilloolli.comEuropean Union
                                      13335CLOUDFLARENETUSfalse
                                      Joe Sandbox version:41.0.0 Charoite
                                      Analysis ID:1542936
                                      Start date and time:2024-10-26 22:42:10 +02:00
                                      Joe Sandbox product:CloudBasic
                                      Overall analysis duration:0h 4m 29s
                                      Hypervisor based Inspection enabled:false
                                      Report type:full
                                      Cookbook file name:default.jbs
                                      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                      Number of analysed new started processes analysed:8
                                      Number of new started drivers analysed:0
                                      Number of existing processes analysed:0
                                      Number of existing drivers analysed:0
                                      Number of injected processes analysed:0
                                      Technologies:
                                      • HCA enabled
                                      • EGA enabled
                                      • AMSI enabled
                                      Analysis Mode:default
                                      Analysis stop reason:Timeout
                                      Sample name:MHQMJCOxjl.exe
                                      renamed because original name is a hash value
                                      Original Sample Name:ea9e3fff5f163edc995d23014204b7ec16ac6c29.exe
                                      Detection:MAL
                                      Classification:mal76.troj.evad.winEXE@1/0@1/1
                                      EGA Information:Failed
                                      HCA Information:
                                      • Successful, ratio: 100%
                                      • Number of executed functions: 25
                                      • Number of non-executed functions: 6
                                      Cookbook Comments:
                                      • Found application associated with file extension: .exe
                                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                      • Excluded domains from analysis (whitelisted): fs.microsoft.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                      • Execution Graph export aborted for target MHQMJCOxjl.exe, PID 5808 because it is empty
                                      • Not all processes where analyzed, report is missing behavior information
                                      • Report size getting too big, too many NtOpenKeyEx calls found.
                                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                      • Report size getting too big, too many NtQueryValueKey calls found.
                                      • Report size getting too big, too many NtReadVirtualMemory calls found.
                                      • VT rate limit hit for: MHQMJCOxjl.exe
                                      No simulations
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      188.114.97.35Z1WFRMTOXRH6X21Z8NU8.exeGet hashmaliciousUnknownBrowse
                                      • artvisions-autoinsider.com/8bkjdSdfjCe/index.php
                                      PO 4800040256.exeGet hashmaliciousFormBookBrowse
                                      • www.cc101.pro/4hfb/
                                      QUOTATION_OCTQTRA071244#U00b7PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                      • filetransfer.io/data-package/cDXpxO66/download
                                      Instruction_1928.pdf.lnk.download.lnkGet hashmaliciousLummaCBrowse
                                      • tech-tribune.shop/pLQvfD4d5/index.php
                                      WBCDZ4Z3M2667YBDZ5K4.bin.exeGet hashmaliciousUnknownBrowse
                                      • tech-tribune.shop/pLQvfD4d5/index.php
                                      yGktPvplJn.exeGet hashmaliciousPushdoBrowse
                                      • www.rs-ag.com/
                                      https://is.gd/6NgVrQGet hashmaliciousHTMLPhisherBrowse
                                      • aa.opencompanies.co.uk/vEXJm/
                                      Comprobante de pago.xlam.xlsxGet hashmaliciousUnknownBrowse
                                      • paste.ee/d/KXy1F
                                      01YP9Lwum8.exeGet hashmaliciousDCRatBrowse
                                      • 77777cm.nyashtyan.in/externalpipejsprocessAuthapiDbtrackWordpressCdn.php
                                      PO-000041522.exeGet hashmaliciousFormBookBrowse
                                      • www.freedietbuilder.online/nnla/
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      xilloolli.com73OPQbICEW.exeGet hashmaliciousJohnWalkerTexasLoaderBrowse
                                      • 188.114.96.3
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      CLOUDFLARENETUS73OPQbICEW.exeGet hashmaliciousJohnWalkerTexasLoaderBrowse
                                      • 188.114.96.3
                                      file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                      • 104.21.95.91
                                      file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, StealcBrowse
                                      • 172.67.170.64
                                      7950COPY.exeGet hashmaliciousFormBookBrowse
                                      • 188.114.96.3
                                      file.exeGet hashmaliciousLummaCBrowse
                                      • 188.114.96.3
                                      GK059kPZ5B.exeGet hashmaliciousStealcBrowse
                                      • 172.67.179.207
                                      TP77MvSzt2.exeGet hashmaliciousStealcBrowse
                                      • 104.21.56.70
                                      ZnPyVAOUBc.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, StealcBrowse
                                      • 188.114.96.3
                                      jicQJ2cdlM.exeGet hashmaliciousStealcBrowse
                                      • 104.21.56.70
                                      http://cio.krqe.com/gtdhffgjghfj3081868fB16927453Xe78849729yB17367Xb25vBr206268IGGet hashmaliciousUnknownBrowse
                                      • 172.67.189.243
                                      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                      3b5074b1b5d032e5620f69f9f700ff0e73OPQbICEW.exeGet hashmaliciousJohnWalkerTexasLoaderBrowse
                                      • 188.114.97.3
                                      6VTskjqyxX.exeGet hashmaliciousUnknownBrowse
                                      • 188.114.97.3
                                      6VTskjqyxX.exeGet hashmaliciousUnknownBrowse
                                      • 188.114.97.3
                                      gI1wz7QtZV.lnkGet hashmaliciousLonePageBrowse
                                      • 188.114.97.3
                                      Hxn7F5YIYJ.lnkGet hashmaliciousUnknownBrowse
                                      • 188.114.97.3
                                      SecuriteInfo.com.Program.Unwanted.5510.8307.25058.exeGet hashmaliciousUnknownBrowse
                                      • 188.114.97.3
                                      SecuriteInfo.com.Trojan.Inject5.10837.16335.2292.exeGet hashmaliciousAgentTeslaBrowse
                                      • 188.114.97.3
                                      SecuriteInfo.com.Trojan.Agent.GMXD.11819.15970.exeGet hashmaliciousUnknownBrowse
                                      • 188.114.97.3
                                      SecuriteInfo.com.Trojan.Agent.GMXD.11819.15970.exeGet hashmaliciousUnknownBrowse
                                      • 188.114.97.3
                                      ACTION required to activate your account - bp Supplier Portal.emlGet hashmaliciousUnknownBrowse
                                      • 188.114.97.3
                                      No context
                                      No created / dropped files found
                                      File type:PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
                                      Entropy (8bit):3.847462827956578
                                      TrID:
                                      • Win64 Executable GUI Net Framework (217006/5) 49.88%
                                      • Win64 Executable GUI (202006/5) 46.43%
                                      • Win64 Executable (generic) (12005/4) 2.76%
                                      • Generic Win/DOS Executable (2004/3) 0.46%
                                      • DOS Executable Generic (2002/1) 0.46%
                                      File name:MHQMJCOxjl.exe
                                      File size:235'520 bytes
                                      MD5:9b4f2f92797d3029f037dfd7f989abd6
                                      SHA1:ea9e3fff5f163edc995d23014204b7ec16ac6c29
                                      SHA256:99761ef16e32792133fca6cda9abb42dffe63838711a42bb3a2b599b4642e541
                                      SHA512:0e08a25fc2dc840a731ae9e2531909178b0b1fa3ba386b6eba3773480a6e6c2276a36c733c415c7020b8a34d262586ef3c20a45c97c1528faca6472d41c59e85
                                      SSDEEP:768:ovcWXZEftUfQE0D0i6jUcyU6GJHcqPugg0Apk/OIaEyEb3GOd53BRnW2i38SmFhq:oB+f6N0TUAo8lzApoePUzhpmy
                                      TLSH:BB34C6ABE32F6809CD2A32F5C8E443B45E605F116E10D6F964BDF2C5123499BFD189AC
                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d...)............."...0.................. .....@..... ....................................`...@......@............... .....
                                      Icon Hash:1761174505056997
                                      Entrypoint:0x140000000
                                      Entrypoint Section:
                                      Digitally signed:false
                                      Imagebase:0x140000000
                                      Subsystem:windows gui
                                      Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                      DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                      Time Stamp:0xD7A9D229 [Sun Aug 27 16:07:05 2084 UTC]
                                      TLS Callbacks:
                                      CLR (.Net) Version:
                                      OS Version Major:4
                                      OS Version Minor:0
                                      File Version Major:4
                                      File Version Minor:0
                                      Subsystem Version Major:4
                                      Subsystem Version Minor:0
                                      Import Hash:
                                      Instruction
                                      dec ebp
                                      pop edx
                                      nop
                                      add byte ptr [ebx], al
                                      add byte ptr [eax], al
                                      add byte ptr [eax+eax], al
                                      add byte ptr [eax], al
                                      NameVirtual AddressVirtual Size Is in Section
                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x240000x18ca8.rsrc
                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x225c80x38.text
                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20000x48.text
                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                      .text0x20000x2066b0x20800141b9ea34b3f0ecc4c602055de4cfa88False0.1779296875data4.274558562667064IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                      .rsrc0x240000x18ca80x18e00d46f216a7dfee89a5dd1ba2c032f2ffeFalse0.10476209170854271data3.1344838579936667IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                      NameRVASizeTypeLanguageCountryZLIB Complexity
                                      RT_ICON0x241800x468Device independent bitmap graphic, 16 x 32 x 32, image size 10880.3962765957446808
                                      RT_ICON0x245f80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 42240.23381801125703564
                                      RT_ICON0x256b00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 96000.23278008298755187
                                      RT_ICON0x27c680x4228Device independent bitmap graphic, 64 x 128 x 32, image size 168960.12133915918752952
                                      RT_ICON0x2bea00x10828Device independent bitmap graphic, 128 x 256 x 32, image size 675840.06113214243463859
                                      RT_GROUP_ICON0x3c6d80x4cdata0.75
                                      RT_VERSION0x3c7340x374data0.416289592760181
                                      RT_MANIFEST0x3cab80x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                      TimestampSource PortDest PortSource IPDest IP
                                      Oct 26, 2024 22:43:23.631913900 CEST49741443192.168.2.7188.114.97.3
                                      Oct 26, 2024 22:43:23.631964922 CEST44349741188.114.97.3192.168.2.7
                                      Oct 26, 2024 22:43:23.632065058 CEST49741443192.168.2.7188.114.97.3
                                      Oct 26, 2024 22:43:23.701884985 CEST49741443192.168.2.7188.114.97.3
                                      Oct 26, 2024 22:43:23.701916933 CEST44349741188.114.97.3192.168.2.7
                                      Oct 26, 2024 22:43:24.325218916 CEST44349741188.114.97.3192.168.2.7
                                      Oct 26, 2024 22:43:24.325330973 CEST49741443192.168.2.7188.114.97.3
                                      Oct 26, 2024 22:43:24.328881979 CEST49741443192.168.2.7188.114.97.3
                                      Oct 26, 2024 22:43:24.328887939 CEST44349741188.114.97.3192.168.2.7
                                      Oct 26, 2024 22:43:24.329150915 CEST44349741188.114.97.3192.168.2.7
                                      Oct 26, 2024 22:43:24.371135950 CEST49741443192.168.2.7188.114.97.3
                                      Oct 26, 2024 22:43:24.389373064 CEST49741443192.168.2.7188.114.97.3
                                      Oct 26, 2024 22:43:24.435323954 CEST44349741188.114.97.3192.168.2.7
                                      Oct 26, 2024 22:43:24.965200901 CEST44349741188.114.97.3192.168.2.7
                                      Oct 26, 2024 22:43:24.965270042 CEST44349741188.114.97.3192.168.2.7
                                      Oct 26, 2024 22:43:24.965315104 CEST49741443192.168.2.7188.114.97.3
                                      Oct 26, 2024 22:43:25.067684889 CEST49741443192.168.2.7188.114.97.3
                                      TimestampSource PortDest PortSource IPDest IP
                                      Oct 26, 2024 22:43:23.605989933 CEST5568753192.168.2.71.1.1.1
                                      Oct 26, 2024 22:43:23.621714115 CEST53556871.1.1.1192.168.2.7
                                      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                      Oct 26, 2024 22:43:23.605989933 CEST192.168.2.71.1.1.10xd701Standard query (0)xilloolli.comA (IP address)IN (0x0001)false
                                      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                      Oct 26, 2024 22:43:23.621714115 CEST1.1.1.1192.168.2.70xd701No error (0)xilloolli.com188.114.97.3A (IP address)IN (0x0001)false
                                      Oct 26, 2024 22:43:23.621714115 CEST1.1.1.1192.168.2.70xd701No error (0)xilloolli.com188.114.96.3A (IP address)IN (0x0001)false
                                      • xilloolli.com
                                      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                      0192.168.2.749741188.114.97.34435808C:\Users\user\Desktop\MHQMJCOxjl.exe
                                      TimestampBytes transferredDirectionData
                                      2024-10-26 20:43:24 UTC94OUTGET /api.php?status=1&wallets=0&av=1 HTTP/1.1
                                      Host: xilloolli.com
                                      Connection: Keep-Alive
                                      2024-10-26 20:43:24 UTC764INHTTP/1.1 200 OK
                                      Date: Sat, 26 Oct 2024 20:43:24 GMT
                                      Content-Type: text/html; charset=UTF-8
                                      Transfer-Encoding: chunked
                                      Connection: close
                                      cf-cache-status: DYNAMIC
                                      Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=ynujdId%2FS9xYQ0AgHQcq%2FEbzY9NxtYwi3UMOv0%2F%2F%2BAU9K4psDw5VuyF1AP56CeA%2Fim7ICqs11ZDRYaGgd1mZ0%2FblP2tpwMktvoqUq5yH7zj4rcbbocjWSfQVBOCjnRN6"}],"group":"cf-nel","max_age":604800}
                                      NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                      Server: cloudflare
                                      CF-RAY: 8d8d4745dfb5358d-DFW
                                      alt-svc: h3=":443"; ma=86400
                                      server-timing: cfL4;desc="?proto=TCP&rtt=1153&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2833&recv_bytes=708&delivery_rate=2606660&cwnd=251&unsent_bytes=0&cid=9ec18ff30c192f88&ts=652&x=0"
                                      2024-10-26 20:43:24 UTC5INData Raw: 30 0d 0a 0d 0a
                                      Data Ascii: 0


                                      Click to jump to process

                                      Click to jump to process

                                      Click to dive into process behavior distribution

                                      Target ID:0
                                      Start time:16:43:20
                                      Start date:26/10/2024
                                      Path:C:\Users\user\Desktop\MHQMJCOxjl.exe
                                      Wow64 process (32bit):false
                                      Commandline:"C:\Users\user\Desktop\MHQMJCOxjl.exe"
                                      Imagebase:0x2dc5d770000
                                      File size:235'520 bytes
                                      MD5 hash:9B4F2F92797D3029F037DFD7F989ABD6
                                      Has elevated privileges:true
                                      Has administrator privileges:true
                                      Programmed in:C, C++ or other language
                                      Yara matches:
                                      • Rule: JoeSecurity_JohnWalkerTexasLoader, Description: Yara detected JohnWalkerTexasLoader, Source: 00000000.00000000.1390948590.000002DC5D772000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                      • Rule: JoeSecurity_JohnWalkerTexasLoader, Description: Yara detected JohnWalkerTexasLoader, Source: 00000000.00000002.2653298505.000002DC5F451000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                      Reputation:low
                                      Has exited:false

                                      Reset < >
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2659465582.00007FFAAB6C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB6C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ffaab6c0000_MHQMJCOxjl.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 8455c5eef0b5e261eeb3bf5150334c636381f8190cd076dc1ed2d0deb0988153
                                        • Instruction ID: f18d8d1ed7958210d3f37750403920b81e0c9d366abed1e3c03f7770b5889b1e
                                        • Opcode Fuzzy Hash: 8455c5eef0b5e261eeb3bf5150334c636381f8190cd076dc1ed2d0deb0988153
                                        • Instruction Fuzzy Hash: DFF1C570509A8D8FEBA9DF28C8567E937D1FF56351F04826EE84DC7291CF34A8458B82
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2659465582.00007FFAAB6C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB6C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ffaab6c0000_MHQMJCOxjl.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e8353e9ddde1db1ccc32ae09620f2ac22f73caa8f4b423349621f0cbead9ce94
                                        • Instruction ID: 5781afa8babf1008bb3c10db79e669930b463ff268ad4071a70396fb486a77b0
                                        • Opcode Fuzzy Hash: e8353e9ddde1db1ccc32ae09620f2ac22f73caa8f4b423349621f0cbead9ce94
                                        • Instruction Fuzzy Hash: 2BE1E370509A4E8FEBA9DF28C8557E977E1EF59310F04826ED84DC72A1CE34A8458BC1
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2659465582.00007FFAAB6C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB6C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ffaab6c0000_MHQMJCOxjl.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: )Go$ *Go$()Go$(*Go$0)Go$0*Go$8)Go$8*Go$@)Go$@*Go$H)Go$H*Go$P)Go$P*Go$X)Go$X*Go$`)Go$`*Go$h)Go$h*Go$p)Go$p*Go$x)Go$x*Go$)Go$)Go$*Go$*Go$ZEo
                                        • API String ID: 0-1590743529
                                        • Opcode ID: 679ec81bdd4c533e34cdb6a09794ad35fbb77d3779b68029000154551e071e22
                                        • Instruction ID: 8a2dc3dff2c0b09724bca3bbd543df1e7744e35a4fc39b49e10ae66f22300f63
                                        • Opcode Fuzzy Hash: 679ec81bdd4c533e34cdb6a09794ad35fbb77d3779b68029000154551e071e22
                                        • Instruction Fuzzy Hash: BD928664B1DE8A4FE34AAB3C8510991BBA1EF8F384B1485F2D14DCF2D7CD3869958351
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2659465582.00007FFAAB6C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB6C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ffaab6c0000_MHQMJCOxjl.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: +Go$ +Go$(+Go$(+Go$0+Go$0+Go$8+Go$8+Go$@+Go$@+Go$H+Go$H+Go$P+Go$P+Go$X]$X+Go$X+Go$`+Go$`+Go$h+Go$h+Go$p+Go$p+Go$x"Go$x+Go$x+Go
                                        • API String ID: 0-218777942
                                        • Opcode ID: 2787bd65b591c3dbe0032b9456dde5db8d6956b6c7bf61ae27fb013b5024eb77
                                        • Instruction ID: 8cd6c231241a09825c7acf4a33dfc128451f9afae0bbecd6a32a353a33c67dc5
                                        • Opcode Fuzzy Hash: 2787bd65b591c3dbe0032b9456dde5db8d6956b6c7bf61ae27fb013b5024eb77
                                        • Instruction Fuzzy Hash: 62127D6470898A8FE749AF6CD420BA5B7D2EF9B344F1446FAE04DCB2D3CD64AC858315
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2659465582.00007FFAAB6C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB6C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ffaab6c0000_MHQMJCOxjl.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: (Go$((Go$0(Go$8(Go$@(Go$H(Go$P(Go$X(Go$`(Go$h(Go$p(Go$x(Go$'Go$'Go$(Go$(Go
                                        • API String ID: 0-1385727780
                                        • Opcode ID: c9c0440fc39d475f6c7dea54a7a772d63fbcf904ff3e21c2d3d3f0919d19dc99
                                        • Instruction ID: 162d89c34c2a1c224db996f408d4f7080e547b05462a6c6d01874974a0812cff
                                        • Opcode Fuzzy Hash: c9c0440fc39d475f6c7dea54a7a772d63fbcf904ff3e21c2d3d3f0919d19dc99
                                        • Instruction Fuzzy Hash: 9B32A564A1DE8A4FE74AAB38C511991BBA1FF8F38471185F2D20DCF297CD386D858361
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2659465582.00007FFAAB6C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB6C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ffaab6c0000_MHQMJCOxjl.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: x"Go$+Go$+Go
                                        • API String ID: 0-3121570501
                                        • Opcode ID: 9748932b41831504a2fd9ff94a09934ea7b6b85a6c59e62efaebfeaa898cab6a
                                        • Instruction ID: 3cbaf509f677fc042664120b447023e848884dd6525580213d881431140f352a
                                        • Opcode Fuzzy Hash: 9748932b41831504a2fd9ff94a09934ea7b6b85a6c59e62efaebfeaa898cab6a
                                        • Instruction Fuzzy Hash: 35919470A0D94E8FE759EB2CD4617A877E1EF8B344F1441BAE14DCB293CD34A8868781
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2659465582.00007FFAAB6C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB6C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ffaab6c0000_MHQMJCOxjl.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: [Eo$ZEo$ZEo
                                        • API String ID: 0-3953797561
                                        • Opcode ID: ed29c75b2a49a87c357f33e8517f56c9f44dfadbab7695a9dfcd03ce39d8d923
                                        • Instruction ID: ea72b9532a3d6680954ffce80ffe7a6322a54a78440acb20088612cb4ceaa415
                                        • Opcode Fuzzy Hash: ed29c75b2a49a87c357f33e8517f56c9f44dfadbab7695a9dfcd03ce39d8d923
                                        • Instruction Fuzzy Hash: E151C16890DA8A8FE746AF3CC5219A5BFB1EF9B344B0584F2D049CF597CE34A845C351
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2659465582.00007FFAAB6C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB6C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ffaab6c0000_MHQMJCOxjl.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: (Q[$X]
                                        • API String ID: 0-77106607
                                        • Opcode ID: 925ec93acb4392000cabde53ea5788094b75db65c04b0a6f492e9220b970e6f0
                                        • Instruction ID: 3987c41bdf27b287624d711f78aef5afe26b9d2e1cb08eb9de7938dea3de9e4d
                                        • Opcode Fuzzy Hash: 925ec93acb4392000cabde53ea5788094b75db65c04b0a6f492e9220b970e6f0
                                        • Instruction Fuzzy Hash: 5F81283190EA8A8FE746DB2888556697BF1EF5B340B0440FAD44DC71E2DE38AC4A8791
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2659465582.00007FFAAB6C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB6C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ffaab6c0000_MHQMJCOxjl.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: ^
                                        • API String ID: 0-1590793086
                                        • Opcode ID: d6131ef2d572a140a05762a0193917e3c35c8a84a44d634d84b54bc2181c967e
                                        • Instruction ID: 379ef7f11fc5482cfe222efac8b9c866cad94c254f78eb38968e00aa3b4799f4
                                        • Opcode Fuzzy Hash: d6131ef2d572a140a05762a0193917e3c35c8a84a44d634d84b54bc2181c967e
                                        • Instruction Fuzzy Hash: A201283290855486EB217FBCA8095FB7FD4DF16365F1401BAE54DC6053DF28540682D4
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2659465582.00007FFAAB6C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB6C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ffaab6c0000_MHQMJCOxjl.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: \M_L
                                        • API String ID: 0-2593406389
                                        • Opcode ID: 947c1eae68e5a7895530be3a9c6208eeaa79e86a63d23bc71ddfc9307041a4a0
                                        • Instruction ID: 1d6daf6d75991c54ea5362c7b0a9599f52778cb21417ddf922942666660be475
                                        • Opcode Fuzzy Hash: 947c1eae68e5a7895530be3a9c6208eeaa79e86a63d23bc71ddfc9307041a4a0
                                        • Instruction Fuzzy Hash: FB01F271B0DA18CFDB59DB5CA8115B877E1EB8F780B0401AAE00DC72A2DE20AC4183C1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2659465582.00007FFAAB6C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB6C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ffaab6c0000_MHQMJCOxjl.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 87d890ddc4aaa8520f754e93a1d2854f84f1e3dffdd0eaf54eb04368026d563a
                                        • Instruction ID: 43f860ab33429193aa7a809804dbc6bc7d01311d312577ec0ad8c263dd0c7aea
                                        • Opcode Fuzzy Hash: 87d890ddc4aaa8520f754e93a1d2854f84f1e3dffdd0eaf54eb04368026d563a
                                        • Instruction Fuzzy Hash: D1512627A0D52A8AE312AB7CF4515F97F90DF97370B1856F7D18DCB0A3CE28684A42D0
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2659465582.00007FFAAB6C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB6C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ffaab6c0000_MHQMJCOxjl.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 25db0189647bb97660899266801af7ac6db2f42931b423a57bf8ca88a334d4a3
                                        • Instruction ID: 75994dcdc16122cd2eb65dd3e52929f16777b630d641bf9ded199e23f17c655e
                                        • Opcode Fuzzy Hash: 25db0189647bb97660899266801af7ac6db2f42931b423a57bf8ca88a334d4a3
                                        • Instruction Fuzzy Hash: AD512961B0DA8A8FE74AA73CC4216B97B91EF5B340F1585FAD04DCB5D3CD28AC458391
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2659465582.00007FFAAB6C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB6C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ffaab6c0000_MHQMJCOxjl.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e1782420bc9d75381eaadff04c6fe42629099abdf40db6e3d7f473034036d169
                                        • Instruction ID: 5d95fb2b4eb0757d20e2e45162136ce02d4a7bc447bd5da57e18d311056aabe5
                                        • Opcode Fuzzy Hash: e1782420bc9d75381eaadff04c6fe42629099abdf40db6e3d7f473034036d169
                                        • Instruction Fuzzy Hash: 71517F71908A1C8FDB59DF68D845BE9BBF1FB59310F1082AAD00DD3252DE34A9858B81
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2659465582.00007FFAAB6C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB6C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ffaab6c0000_MHQMJCOxjl.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 7e8f1834ef801ee79fddf6b85f83016fb03feb017fe0e560d5d015917c0fd74a
                                        • Instruction ID: 0e6a3a98dbee6309cbd613a9b7bf5ba3c9a6704c5839dc941a8ac800187c2431
                                        • Opcode Fuzzy Hash: 7e8f1834ef801ee79fddf6b85f83016fb03feb017fe0e560d5d015917c0fd74a
                                        • Instruction Fuzzy Hash: 9B513671A0991D8FEB55DF6CD8556F97BE0EF5B390B1442BAE00CC72A2DE24AC4583C0
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2659465582.00007FFAAB6C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB6C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ffaab6c0000_MHQMJCOxjl.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: a0709d3779a2b600b37f9645d4796c8f2734fbed9e755f5db1f50bffb05c9259
                                        • Instruction ID: 064b46df72edefa53d15e4595559053bf2049e2fad6f48e430340ec017171fc5
                                        • Opcode Fuzzy Hash: a0709d3779a2b600b37f9645d4796c8f2734fbed9e755f5db1f50bffb05c9259
                                        • Instruction Fuzzy Hash: FC513E7090CB8C8FDB58DF59D889AE97BE0FB69311F10412EE54DC3262CB71A845CB91
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2659465582.00007FFAAB6C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB6C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ffaab6c0000_MHQMJCOxjl.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 41a418808e6a34dc0fe0857c06dbdd0ce0168931021050ae93d66e9e123f4620
                                        • Instruction ID: db3cc1b0197328da379597cf2efcb19711bc1c09d329d5065e4fadebf982ffdf
                                        • Opcode Fuzzy Hash: 41a418808e6a34dc0fe0857c06dbdd0ce0168931021050ae93d66e9e123f4620
                                        • Instruction Fuzzy Hash: E1416E96A0F6E74EE717573C58A51E93F90DF932A470A90BBC1C88F0A3DD28184B83D5
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2659465582.00007FFAAB6C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB6C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ffaab6c0000_MHQMJCOxjl.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 95cc4ea01ca1093171af2a164ad21b349facb994f3cfef50099e5a4c14aa5710
                                        • Instruction ID: 248d522fcd16a55be3e3baf7f87a0ad369f40e6be45c297ff79a1e7b885d902b
                                        • Opcode Fuzzy Hash: 95cc4ea01ca1093171af2a164ad21b349facb994f3cfef50099e5a4c14aa5710
                                        • Instruction Fuzzy Hash: 74516E7190864C8FDB59EFA8D855BEDBBB0EF5A310F0081AAD00DD7252DA74A549CB81
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2658775773.00007FFAAB5AD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB5AD000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ffaab5ad000_MHQMJCOxjl.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f6595f633c4aed885d463be0cf3e7cb32d8d7b8879a54738b5bad8f329d9b0ff
                                        • Instruction ID: 79f16fdc48c1c4820c6b4f14bb4b536643e6d14d66a462327e25d3e3eec31bf8
                                        • Opcode Fuzzy Hash: f6595f633c4aed885d463be0cf3e7cb32d8d7b8879a54738b5bad8f329d9b0ff
                                        • Instruction Fuzzy Hash: 5641277140DBC48FE3569B2998559523FF4EF47360F2501EFD08DCB0A3D625A84AC792
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2659465582.00007FFAAB6C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB6C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ffaab6c0000_MHQMJCOxjl.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: e74210662483f47c28374f6428f403d1d0e6e6eb5d6fb9aaa4a03572f649be52
                                        • Instruction ID: c4f6284242dfbae403e13d0386258e90772e9aea41ba17e91e091478f1cbac78
                                        • Opcode Fuzzy Hash: e74210662483f47c28374f6428f403d1d0e6e6eb5d6fb9aaa4a03572f649be52
                                        • Instruction Fuzzy Hash: 5E416191C0F5669AE60B7BB514624B939D19F473C0F44A0BAF09D8A0F3CC2C745E92E6
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2659465582.00007FFAAB6C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB6C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ffaab6c0000_MHQMJCOxjl.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: aede0630861f38d55682cdaa1801b7d7cc35bb0f459692913ed2402032d19dda
                                        • Instruction ID: 69f8c2791bb3d0cfbaae82e90721688062308df06a033f01ec643fa640b1ae8c
                                        • Opcode Fuzzy Hash: aede0630861f38d55682cdaa1801b7d7cc35bb0f459692913ed2402032d19dda
                                        • Instruction Fuzzy Hash: BD31517460851A8FFB95BB788119BA837D1DF9B380F5440B5E80CCB2A7ED285C9683A1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2659465582.00007FFAAB6C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB6C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ffaab6c0000_MHQMJCOxjl.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: fab77c32034b3001c219e67fa702ada06793850c945dbb8cda2446958a452e9b
                                        • Instruction ID: 66c1cc1f4203d1be48c7f4eaf8eb1c7502355b78e8e76fb1e9c78e7e97196c69
                                        • Opcode Fuzzy Hash: fab77c32034b3001c219e67fa702ada06793850c945dbb8cda2446958a452e9b
                                        • Instruction Fuzzy Hash: 31310651A0EE8A4FD396EB3C88596647BD1DF8B29070882F7D44CCB2B3CC28AC5583D1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2659465582.00007FFAAB6C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB6C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ffaab6c0000_MHQMJCOxjl.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: df9eb9f9eb83dd670089576c87e4c17c899a6491e0670f0b9aa48a1f59bb44c6
                                        • Instruction ID: 0b06418e7076201e463085fd0d0d088b42822a0c6c76b7779cea213730dbed12
                                        • Opcode Fuzzy Hash: df9eb9f9eb83dd670089576c87e4c17c899a6491e0670f0b9aa48a1f59bb44c6
                                        • Instruction Fuzzy Hash: B6F0F99284E7E19FE32B97B4186A1A03F605B17290F0A55EBD88DDB0E3D45C5C8883E3
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2659465582.00007FFAAB6C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB6C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ffaab6c0000_MHQMJCOxjl.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 7370840a4112a401ce0e5d456fb802ae20135c99da37302b4d2dce90c0d5dd36
                                        • Instruction ID: bd28d0cc6ef2f942a486c422fa24e26c07287619fb02bc704bccd53bdce6d4df
                                        • Opcode Fuzzy Hash: 7370840a4112a401ce0e5d456fb802ae20135c99da37302b4d2dce90c0d5dd36
                                        • Instruction Fuzzy Hash: 76F05982D0DA928BF738DAEC141E2F43980E703340F0861B6D80C871E2D80C1CC803C2
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2659465582.00007FFAAB6C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB6C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ffaab6c0000_MHQMJCOxjl.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 0743c11348fcc7f6de47822525ba0ed138aa09e7879b8d86e705761b80cc2af0
                                        • Instruction ID: 1139905c8df826c77b8b4a763a4275b7ad82d2e280105e6e3d9da282b153d19c
                                        • Opcode Fuzzy Hash: 0743c11348fcc7f6de47822525ba0ed138aa09e7879b8d86e705761b80cc2af0
                                        • Instruction Fuzzy Hash: 55E02600B1AD4A47E34AAA2D0C0523838C2EB8B280FD89074E40CC22E1EC58CC9802C1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2659465582.00007FFAAB6C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB6C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ffaab6c0000_MHQMJCOxjl.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 94e9e38fbd0fbeab5b07c4136c6d31c828ec02c980d260edeffe853f00f3dd42
                                        • Instruction ID: cdeafbe6e40971c0367acd72bed454a39c078e78890733c869fcc03f9ed1b5ad
                                        • Opcode Fuzzy Hash: 94e9e38fbd0fbeab5b07c4136c6d31c828ec02c980d260edeffe853f00f3dd42
                                        • Instruction Fuzzy Hash: 72E08C9284F3C14FC702A3740C2A2947F506F23110F4D86FFC0884B9A3E50D94588B92
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2659465582.00007FFAAB6C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB6C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ffaab6c0000_MHQMJCOxjl.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: f04e0933bcdd632748d6a0067ffaecf89dc1067b94a9c5a16a801a6bc8692428
                                        • Instruction ID: c32f304547538d79b21c7a2f8608742f840e9465246e9100fa7e748e3d85baaa
                                        • Opcode Fuzzy Hash: f04e0933bcdd632748d6a0067ffaecf89dc1067b94a9c5a16a801a6bc8692428
                                        • Instruction Fuzzy Hash: 41C1D13090DA8C8FDB59DB68C855BA9BBB1FF56310F0482EED04DD3192CE746945CB82
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2659465582.00007FFAAB6C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB6C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ffaab6c0000_MHQMJCOxjl.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 312ccfceef3add3fe8a3863fa07cdbd1f7dbecd0d481ddfbefa3d147afb886ce
                                        • Instruction ID: b688d9a71f5a81b1eafd1950e2dad24e23c2dbcfa8053c9889c59490a9a3d56e
                                        • Opcode Fuzzy Hash: 312ccfceef3add3fe8a3863fa07cdbd1f7dbecd0d481ddfbefa3d147afb886ce
                                        • Instruction Fuzzy Hash: 29519257A0D6E28BE713A77C98650D67F60DF532A9B0A50F7C1CCCB4A399292C0A93D1
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2659465582.00007FFAAB6C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB6C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ffaab6c0000_MHQMJCOxjl.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID:
                                        • API String ID:
                                        • Opcode ID: 1a71e6e3b4f9128808134634986203ff08d583de749a72bd052a3dbfc9d2d072
                                        • Instruction ID: 526ff1a45d68034549c42cf2fc118e2130346d9f01fbe26dcf9c9d8e02f5c0f7
                                        • Opcode Fuzzy Hash: 1a71e6e3b4f9128808134634986203ff08d583de749a72bd052a3dbfc9d2d072
                                        • Instruction Fuzzy Hash: 2531D33BB08A358B86147ABDF9415E7FF58EF8137634806BBD2C9CA4139E14744A8BD0
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2659465582.00007FFAAB6C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB6C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ffaab6c0000_MHQMJCOxjl.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: &Go$(&Go$0&Go$8&Go$@&Go$H&Go$P&Go$X&Go$`&Go$h&Go$p&Go$x&Go
                                        • API String ID: 0-4004421376
                                        • Opcode ID: 34c2d48d676414c6f1678c415533d3499bb4ee883fcd190300287b30178485fa
                                        • Instruction ID: 8ebf1d346f08b642bf9a7aca38eb507448de0905e9629049463f80610985171e
                                        • Opcode Fuzzy Hash: 34c2d48d676414c6f1678c415533d3499bb4ee883fcd190300287b30178485fa
                                        • Instruction Fuzzy Hash: 11D19568A0EE8A4FD74AAB288510991BFB1EF8F340B5085F6D24CCF297DD3879658351
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2659465582.00007FFAAB6C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB6C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ffaab6c0000_MHQMJCOxjl.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: 8'Go$@'Go$H'Go$P'Go$X'Go$`'Go$h'Go$p'Go$x'Go
                                        • API String ID: 0-2964062656
                                        • Opcode ID: a9ee3adc4f4877035f63195da570ac4ba4a1925d40d9e854e0096f98ff73cd76
                                        • Instruction ID: a8b230cf0bc3dc073e122f7f7851823af1221a7a6e5e2d5913233361312f4bb5
                                        • Opcode Fuzzy Hash: a9ee3adc4f4877035f63195da570ac4ba4a1925d40d9e854e0096f98ff73cd76
                                        • Instruction Fuzzy Hash: 3671A468A0DE8A4FD74AAB388610991BFB1EF4F344B1485F2D20DCF297DD386D558352
                                        Strings
                                        Memory Dump Source
                                        • Source File: 00000000.00000002.2659465582.00007FFAAB6C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAB6C0000, based on PE: false
                                        Joe Sandbox IDA Plugin
                                        • Snapshot File: hcaresult_0_2_7ffaab6c0000_MHQMJCOxjl.jbxd
                                        Similarity
                                        • API ID:
                                        • String ID: (0w$P/w$P7Eo$p0w$-w
                                        • API String ID: 0-4157586676
                                        • Opcode ID: 1ce4cd15ef228b73c9960b9f9a5cc0e06de5ab7dd5141670ea667527753d0a7c
                                        • Instruction ID: c5be724189e4becf28c25359fc2972dbd8696500e90538c146657f49c39d6f35
                                        • Opcode Fuzzy Hash: 1ce4cd15ef228b73c9960b9f9a5cc0e06de5ab7dd5141670ea667527753d0a7c
                                        • Instruction Fuzzy Hash: F431AE8790FBD14FE36A87AC28152A56FA1DF97390B1890FBD08CCA1ABD8355D0D83D1