Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
R5AREmpD4S.exe

Overview

General Information

Sample name:R5AREmpD4S.exe
renamed because original name is a hash value
Original sample name:b395637671eff620f784d4a8652425951fb3e834.exe
Analysis ID:1542939
MD5:851943a365537291c75d267db294961a
SHA1:b395637671eff620f784d4a8652425951fb3e834
SHA256:e1dbec1fea6f0197ac5d3b33dbfd50ce7e2918c9930ed9e9bee16e2f576a2875
Tags:dllexeJohnWalkerTexasLoaderJWTLJWTLoaderReversingLabsuser-NDA0E
Infos:

Detection

JohnWalkerTexasLoader
Score:76
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Yara detected JohnWalkerTexasLoader
AI detected suspicious sample
Queries memory information (via WMI often done to detect virtual machines)
Queries sensitive physical memory information (via WMI, Win32_PhysicalMemory, often done to detect virtual machines)
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Detected potential crypto function
Enables debug privileges
HTTP GET or POST without a user agent
IP address seen in connection with other malware
PE file does not import any functions
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • R5AREmpD4S.exe (PID: 4952 cmdline: "C:\Users\user\Desktop\R5AREmpD4S.exe" MD5: 851943A365537291C75D267DB294961A)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
R5AREmpD4S.exeJoeSecurity_JohnWalkerTexasLoaderYara detected JohnWalkerTexasLoaderJoe Security
    SourceRuleDescriptionAuthorStrings
    00000000.00000000.2050334085.000002517D962000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_JohnWalkerTexasLoaderYara detected JohnWalkerTexasLoaderJoe Security
      00000000.00000002.3306981925.0000025100001000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_JohnWalkerTexasLoaderYara detected JohnWalkerTexasLoaderJoe Security
        Process Memory Space: R5AREmpD4S.exe PID: 4952JoeSecurity_JohnWalkerTexasLoaderYara detected JohnWalkerTexasLoaderJoe Security
          SourceRuleDescriptionAuthorStrings
          0.0.R5AREmpD4S.exe.2517d960000.0.unpackJoeSecurity_JohnWalkerTexasLoaderYara detected JohnWalkerTexasLoaderJoe Security
            No Sigma rule has matched
            No Suricata rule has matched

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: R5AREmpD4S.exeAvira: detected
            Source: R5AREmpD4S.exeReversingLabs: Detection: 34%
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 84.6% probability
            Source: R5AREmpD4S.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: Binary string: C:\Users\Administrator\Pictures\DiffPatchWpf-main\obj\x64\Release\DiffPatchWpf.pdb source: R5AREmpD4S.exe
            Source: global trafficHTTP traffic detected: GET /api.php?status=1&wallets=0&av=1 HTTP/1.1Host: xilloolli.comConnection: Keep-Alive
            Source: Joe Sandbox ViewIP Address: 188.114.96.3 188.114.96.3
            Source: Joe Sandbox ViewIP Address: 188.114.96.3 188.114.96.3
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: global trafficHTTP traffic detected: GET /api.php?status=1&wallets=0&av=1 HTTP/1.1Host: xilloolli.comConnection: Keep-Alive
            Source: global trafficDNS traffic detected: DNS query: xilloolli.com
            Source: R5AREmpD4S.exe, 00000000.00000002.3306981925.0000025100001000.00000004.00000800.00020000.00000000.sdmp, R5AREmpD4S.exe, 00000000.00000002.3306981925.0000025100487000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
            Source: R5AREmpD4S.exe, 00000000.00000002.3306981925.0000025100001000.00000004.00000800.00020000.00000000.sdmp, R5AREmpD4S.exe, 00000000.00000002.3306981925.0000025100487000.00000004.00000800.00020000.00000000.sdmp, R5AREmpD4S.exe, 00000000.00000002.3306981925.0000025100499000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://xilloolli.com
            Source: R5AREmpD4S.exe, 00000000.00000002.3306981925.0000025100001000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://xilloolli.com/api-debug.php
            Source: R5AREmpD4S.exe, 00000000.00000002.3306981925.0000025100001000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://xilloolli.com/api.php
            Source: R5AREmpD4S.exe, 00000000.00000002.3306981925.0000025100458000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://xilloolli.com/api.php?status=1&wa
            Source: R5AREmpD4S.exe, 00000000.00000002.3306981925.0000025100001000.00000004.00000800.00020000.00000000.sdmp, R5AREmpD4S.exe, 00000000.00000002.3306981925.0000025100458000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://xilloolli.com/api.php?status=1&wallets=0&av=1
            Source: R5AREmpD4S.exeString found in binary or memory: http://xilloolli.com/api.phpEhttp://xilloolli.com/api-debug.php
            Source: R5AREmpD4S.exeString found in binary or memory: https://github.com/reproteq/DiffPatchWpf3Copyright
            Source: R5AREmpD4S.exeString found in binary or memory: https://ipinfo.io/country
            Source: R5AREmpD4S.exeString found in binary or memory: https://ipinfo.io/ip
            Source: R5AREmpD4S.exeString found in binary or memory: https://oklibed.com
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeCode function: 0_2_00007FF848CF5DD60_2_00007FF848CF5DD6
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeCode function: 0_2_00007FF848CF6B820_2_00007FF848CF6B82
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeCode function: 0_2_00007FF848CF11800_2_00007FF848CF1180
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeCode function: 0_2_00007FF848CF12D30_2_00007FF848CF12D3
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeCode function: 0_2_00007FF848CF11FA0_2_00007FF848CF11FA
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeCode function: 0_2_00007FF848CFFF7C0_2_00007FF848CFFF7C
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeCode function: 0_2_00007FF848CF12FA0_2_00007FF848CF12FA
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeCode function: 0_2_00007FF848CF12F80_2_00007FF848CF12F8
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeCode function: 0_2_00007FF848CFF8690_2_00007FF848CFF869
            Source: R5AREmpD4S.exeStatic PE information: No import functions for PE file found
            Source: R5AREmpD4S.exe, 00000000.00000000.2050401941.000002517D984000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameDiffPatchWpf.exe2 vs R5AREmpD4S.exe
            Source: R5AREmpD4S.exeBinary or memory string: OriginalFilenameDiffPatchWpf.exe2 vs R5AREmpD4S.exe
            Source: classification engineClassification label: mal76.troj.evad.winEXE@1/0@1/1
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeMutant created: NULL
            Source: R5AREmpD4S.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: R5AREmpD4S.exeStatic file information: TRID: Win64 Executable GUI Net Framework (217006/5) 49.88%
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: R5AREmpD4S.exeReversingLabs: Detection: 34%
            Source: R5AREmpD4S.exeString found in binary or memory: EHH-ADD!IJJoEHH5JKK
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeSection loaded: dwrite.dllJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeSection loaded: msvcp140_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeSection loaded: dwmapi.dllJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeSection loaded: d3d9.dllJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeSection loaded: d3d10warp.dllJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeSection loaded: wtsapi32.dllJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeSection loaded: winsta.dllJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeSection loaded: powrprof.dllJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeSection loaded: umpdc.dllJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeSection loaded: dataexchange.dllJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeSection loaded: d3d11.dllJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeSection loaded: dcomp.dllJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeSection loaded: dxgi.dllJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeSection loaded: twinapi.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeSection loaded: resourcepolicyclient.dllJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeSection loaded: dxcore.dllJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeSection loaded: textshaping.dllJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeSection loaded: textinputframework.dllJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeSection loaded: coreuicomponents.dllJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeSection loaded: msctfui.dllJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeSection loaded: uiautomationcore.dllJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeSection loaded: rasapi32.dllJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeSection loaded: rasman.dllJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeSection loaded: rtutils.dllJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeSection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeSection loaded: d3dcompiler_47.dllJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
            Source: Window RecorderWindow detected: More than 3 window changes detected
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
            Source: R5AREmpD4S.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
            Source: R5AREmpD4S.exeStatic PE information: Image base 0x140000000 > 0x60000000
            Source: R5AREmpD4S.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: R5AREmpD4S.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
            Source: Binary string: C:\Users\Administrator\Pictures\DiffPatchWpf-main\obj\x64\Release\DiffPatchWpf.pdb source: R5AREmpD4S.exe
            Source: R5AREmpD4S.exeStatic PE information: 0x88FC0B2E [Wed Oct 29 18:15:10 2042 UTC]
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeCode function: 0_2_00007FF848BDD2A5 pushad ; iretd 0_2_00007FF848BDD2A6
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeCode function: 0_2_00007FF848CF00BD pushad ; iretd 0_2_00007FF848CF00C1
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PhysicalMemory
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PhysicalMemory
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeMemory allocated: 2517DCD0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeMemory allocated: 2517F600000 memory reserve | memory write watchJump to behavior
            Source: R5AREmpD4S.exe, 00000000.00000002.3308402349.0000025118031000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMware Virtual RAM
            Source: R5AREmpD4S.exe, 00000000.00000002.3308402349.0000025118031000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Win32_PhysicalMemoryPhysical Memory 0Win32_PhysicalMemoryPhysical MemoryPhysical MemoryPhysical MemoryRAM slot #0RAM slot #0VMware Virtual RAM00000001VMW-4096MB
            Source: R5AREmpD4S.exe, 00000000.00000002.3309799986.000002511C424000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeMemory allocated: page read and write | page guardJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeQueries volume information: C:\Users\user\Desktop\R5AREmpD4S.exe VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\PresentationFramework-SystemXml\v4.0_4.0.0.0__b77a5c561934e089\PresentationFramework-SystemXml.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeQueries volume information: C:\Windows\Fonts\segoeuib.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeQueries volume information: C:\Windows\Fonts\segoeuib.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeQueries volume information: C:\Windows\Fonts\segoeui.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeQueries volume information: C:\Windows\Fonts\seguisb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeQueries volume information: C:\Windows\Fonts\segoeuib.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeQueries volume information: C:\Windows\Fonts\segoeui.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeQueries volume information: C:\Windows\Fonts\seguisb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\UIAutomationTypes\v4.0_4.0.0.0__31bf3856ad364e35\UIAutomationTypes.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\UIAutomationProvider\v4.0_4.0.0.0__31bf3856ad364e35\UIAutomationProvider.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeQueries volume information: C:\Windows\Fonts\segoeuib.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeQueries volume information: C:\Windows\Fonts\segoeui.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeQueries volume information: C:\Windows\Fonts\segoeuib.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeQueries volume information: C:\Windows\Fonts\segoeuib.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeQueries volume information: C:\Windows\Fonts\segoeuib.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeQueries volume information: C:\Windows\Fonts\segoeuib.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
            Source: R5AREmpD4S.exe, 00000000.00000002.3309362539.000002511A46E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
            Source: C:\Users\user\Desktop\R5AREmpD4S.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: R5AREmpD4S.exe, type: SAMPLE
            Source: Yara matchFile source: 0.0.R5AREmpD4S.exe.2517d960000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000000.2050334085.000002517D962000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.3306981925.0000025100001000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: R5AREmpD4S.exe PID: 4952, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: R5AREmpD4S.exe, type: SAMPLE
            Source: Yara matchFile source: 0.0.R5AREmpD4S.exe.2517d960000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000000.2050334085.000002517D962000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.3306981925.0000025100001000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: R5AREmpD4S.exe PID: 4952, type: MEMORYSTR
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts21
            Windows Management Instrumentation
            1
            DLL Side-Loading
            1
            DLL Side-Loading
            11
            Virtualization/Sandbox Evasion
            OS Credential Dumping221
            Security Software Discovery
            Remote Services1
            Archive Collected Data
            1
            Encrypted Channel
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault Accounts2
            Command and Scripting Interpreter
            Boot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
            Disable or Modify Tools
            LSASS Memory11
            Virtualization/Sandbox Evasion
            Remote Desktop ProtocolData from Removable Media1
            Ingress Tool Transfer
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
            Obfuscated Files or Information
            Security Account Manager12
            System Information Discovery
            SMB/Windows Admin SharesData from Network Shared Drive2
            Non-Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
            Timestomp
            NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture2
            Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
            DLL Side-Loading
            LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            R5AREmpD4S.exe34%ReversingLabsByteCode-MSIL.Trojan.Walgentz
            R5AREmpD4S.exe100%AviraTR/Agent.tvuqm
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
            NameIPActiveMaliciousAntivirus DetectionReputation
            xilloolli.com
            188.114.96.3
            truefalse
              unknown
              NameMaliciousAntivirus DetectionReputation
              http://xilloolli.com/api.php?status=1&wallets=0&av=1false
                unknown
                NameSourceMaliciousAntivirus DetectionReputation
                http://xilloolli.com/api.php?status=1&waR5AREmpD4S.exe, 00000000.00000002.3306981925.0000025100458000.00000004.00000800.00020000.00000000.sdmpfalse
                  unknown
                  https://ipinfo.io/countryR5AREmpD4S.exefalse
                    unknown
                    http://xilloolli.com/api.phpEhttp://xilloolli.com/api-debug.phpR5AREmpD4S.exefalse
                      unknown
                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameR5AREmpD4S.exe, 00000000.00000002.3306981925.0000025100001000.00000004.00000800.00020000.00000000.sdmp, R5AREmpD4S.exe, 00000000.00000002.3306981925.0000025100487000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://xilloolli.com/api-debug.phpR5AREmpD4S.exe, 00000000.00000002.3306981925.0000025100001000.00000004.00000800.00020000.00000000.sdmpfalse
                        unknown
                        http://xilloolli.comR5AREmpD4S.exe, 00000000.00000002.3306981925.0000025100001000.00000004.00000800.00020000.00000000.sdmp, R5AREmpD4S.exe, 00000000.00000002.3306981925.0000025100487000.00000004.00000800.00020000.00000000.sdmp, R5AREmpD4S.exe, 00000000.00000002.3306981925.0000025100499000.00000004.00000800.00020000.00000000.sdmpfalse
                          unknown
                          http://xilloolli.com/api.phpR5AREmpD4S.exe, 00000000.00000002.3306981925.0000025100001000.00000004.00000800.00020000.00000000.sdmpfalse
                            unknown
                            https://oklibed.comR5AREmpD4S.exefalse
                              unknown
                              https://github.com/reproteq/DiffPatchWpf3CopyrightR5AREmpD4S.exefalse
                                unknown
                                https://ipinfo.io/ipR5AREmpD4S.exefalse
                                  unknown
                                  • No. of IPs < 25%
                                  • 25% < No. of IPs < 50%
                                  • 50% < No. of IPs < 75%
                                  • 75% < No. of IPs
                                  IPDomainCountryFlagASNASN NameMalicious
                                  188.114.96.3
                                  xilloolli.comEuropean Union
                                  13335CLOUDFLARENETUSfalse
                                  Joe Sandbox version:41.0.0 Charoite
                                  Analysis ID:1542939
                                  Start date and time:2024-10-26 22:44:51 +02:00
                                  Joe Sandbox product:CloudBasic
                                  Overall analysis duration:0h 4m 2s
                                  Hypervisor based Inspection enabled:false
                                  Report type:full
                                  Cookbook file name:default.jbs
                                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                  Number of analysed new started processes analysed:5
                                  Number of new started drivers analysed:0
                                  Number of existing processes analysed:0
                                  Number of existing drivers analysed:0
                                  Number of injected processes analysed:0
                                  Technologies:
                                  • HCA enabled
                                  • EGA enabled
                                  • AMSI enabled
                                  Analysis Mode:default
                                  Analysis stop reason:Timeout
                                  Sample name:R5AREmpD4S.exe
                                  renamed because original name is a hash value
                                  Original Sample Name:b395637671eff620f784d4a8652425951fb3e834.exe
                                  Detection:MAL
                                  Classification:mal76.troj.evad.winEXE@1/0@1/1
                                  EGA Information:Failed
                                  HCA Information:
                                  • Successful, ratio: 92%
                                  • Number of executed functions: 26
                                  • Number of non-executed functions: 7
                                  Cookbook Comments:
                                  • Found application associated with file extension: .exe
                                  • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                                  • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                  • Execution Graph export aborted for target R5AREmpD4S.exe, PID 4952 because it is empty
                                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                  • Report size getting too big, too many NtQueryValueKey calls found.
                                  • Report size getting too big, too many NtReadVirtualMemory calls found.
                                  • VT rate limit hit for: R5AREmpD4S.exe
                                  No simulations
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  188.114.96.37950COPY.exeGet hashmaliciousFormBookBrowse
                                  • www.globaltrend.xyz/b2h2/
                                  transferencia interbancaria_667553466579.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
                                  • paste.ee/d/Gitmx
                                  19387759999PO-RFQ-INVOICE-doc.exeGet hashmaliciousFormBookBrowse
                                  • www.zonguldakescortg.xyz/483l/
                                  PO 4800040256.exeGet hashmaliciousFormBookBrowse
                                  • www.rtpngk.xyz/876i/
                                  yGktPvplJn.exeGet hashmaliciousPushdoBrowse
                                  • www.fnsds.org/
                                  rPedidodecompra__PO20441__ARIMComponentes.exeGet hashmaliciousLokibot, PureLog Stealer, zgRATBrowse
                                  • dddotx.shop/Mine/PWS/fre.php
                                  Orden de Compra No. 78986756565344657.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
                                  • paste.ee/d/nwtkd
                                  Doc 784-01965670.exeGet hashmaliciousFormBookBrowse
                                  • www.launchdreamidea.xyz/bd77/
                                  PO1268931024 - Bank Slip.exeGet hashmaliciousPureLog StealerBrowse
                                  • www.timizoasisey.shop/3p0l/
                                  BL.exeGet hashmaliciousFormBookBrowse
                                  • www.launchdreamidea.xyz/bd77/
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  xilloolli.comMHQMJCOxjl.exeGet hashmaliciousJohnWalkerTexasLoaderBrowse
                                  • 188.114.97.3
                                  73OPQbICEW.exeGet hashmaliciousJohnWalkerTexasLoaderBrowse
                                  • 188.114.96.3
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  CLOUDFLARENETUSMHQMJCOxjl.exeGet hashmaliciousJohnWalkerTexasLoaderBrowse
                                  • 188.114.97.3
                                  73OPQbICEW.exeGet hashmaliciousJohnWalkerTexasLoaderBrowse
                                  • 188.114.96.3
                                  file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                  • 104.21.95.91
                                  file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, StealcBrowse
                                  • 172.67.170.64
                                  7950COPY.exeGet hashmaliciousFormBookBrowse
                                  • 188.114.96.3
                                  file.exeGet hashmaliciousLummaCBrowse
                                  • 188.114.96.3
                                  GK059kPZ5B.exeGet hashmaliciousStealcBrowse
                                  • 172.67.179.207
                                  TP77MvSzt2.exeGet hashmaliciousStealcBrowse
                                  • 104.21.56.70
                                  ZnPyVAOUBc.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, StealcBrowse
                                  • 188.114.96.3
                                  jicQJ2cdlM.exeGet hashmaliciousStealcBrowse
                                  • 104.21.56.70
                                  No context
                                  No context
                                  No created / dropped files found
                                  File type:PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
                                  Entropy (8bit):3.850711697927339
                                  TrID:
                                  • Win64 Executable GUI Net Framework (217006/5) 49.88%
                                  • Win64 Executable GUI (202006/5) 46.43%
                                  • Win64 Executable (generic) (12005/4) 2.76%
                                  • Generic Win/DOS Executable (2004/3) 0.46%
                                  • DOS Executable Generic (2002/1) 0.46%
                                  File name:R5AREmpD4S.exe
                                  File size:235'520 bytes
                                  MD5:851943a365537291c75d267db294961a
                                  SHA1:b395637671eff620f784d4a8652425951fb3e834
                                  SHA256:e1dbec1fea6f0197ac5d3b33dbfd50ce7e2918c9930ed9e9bee16e2f576a2875
                                  SHA512:cf752e0fb4c0ffe15d993c4f0a6584aa227dc888be4d66d992933c5a986c6223686a40669ce66571b473bd79568a8f6cb91dd83913096ef29a9bee99a3ceb2ff
                                  SSDEEP:768:I5SMwiB8a92H26PwqcyU6GR4kIKugg0Apk/OIaEyEb3GOd53BRnW2i38SmFhXzgj:cH8dPhYv4zApoePwzhpmy
                                  TLSH:1E34D4ABE32F6809CC2A32F5C8E443B45E605F116E10D6F964BDF2C5123599BFD189AC
                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d................."...0.................. .....@..... ....................................`...@......@............... .....
                                  Icon Hash:1761174505056997
                                  Entrypoint:0x140000000
                                  Entrypoint Section:
                                  Digitally signed:false
                                  Imagebase:0x140000000
                                  Subsystem:windows gui
                                  Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                  DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                  Time Stamp:0x88FC0B2E [Wed Oct 29 18:15:10 2042 UTC]
                                  TLS Callbacks:
                                  CLR (.Net) Version:
                                  OS Version Major:4
                                  OS Version Minor:0
                                  File Version Major:4
                                  File Version Minor:0
                                  Subsystem Version Major:4
                                  Subsystem Version Minor:0
                                  Import Hash:
                                  Instruction
                                  dec ebp
                                  pop edx
                                  nop
                                  add byte ptr [ebx], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax+eax], al
                                  add byte ptr [eax], al
                                  NameVirtual AddressVirtual Size Is in Section
                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x240000x18ca8.rsrc
                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x226a80x38.text
                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20000x48.text
                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                  .text0x20000x2074b0x208003a7ceae3da5db0554955e9d67bec1b4dFalse0.17765925480769232data4.281313969731251IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                  .rsrc0x240000x18ca80x18e00d46f216a7dfee89a5dd1ba2c032f2ffeFalse0.10476209170854271data3.1344838579936667IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                  RT_ICON0x241800x468Device independent bitmap graphic, 16 x 32 x 32, image size 10880.3962765957446808
                                  RT_ICON0x245f80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 42240.23381801125703564
                                  RT_ICON0x256b00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 96000.23278008298755187
                                  RT_ICON0x27c680x4228Device independent bitmap graphic, 64 x 128 x 32, image size 168960.12133915918752952
                                  RT_ICON0x2bea00x10828Device independent bitmap graphic, 128 x 256 x 32, image size 675840.06113214243463859
                                  RT_GROUP_ICON0x3c6d80x4cdata0.75
                                  RT_VERSION0x3c7340x374data0.416289592760181
                                  RT_MANIFEST0x3cab80x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                  TimestampSource PortDest PortSource IPDest IP
                                  Oct 26, 2024 22:45:45.719017029 CEST4970480192.168.2.5188.114.96.3
                                  Oct 26, 2024 22:45:45.724359989 CEST8049704188.114.96.3192.168.2.5
                                  Oct 26, 2024 22:45:45.724447966 CEST4970480192.168.2.5188.114.96.3
                                  Oct 26, 2024 22:45:45.726176977 CEST4970480192.168.2.5188.114.96.3
                                  Oct 26, 2024 22:45:45.734466076 CEST8049704188.114.96.3192.168.2.5
                                  Oct 26, 2024 22:45:46.913866997 CEST8049704188.114.96.3192.168.2.5
                                  Oct 26, 2024 22:45:46.960107088 CEST4970480192.168.2.5188.114.96.3
                                  Oct 26, 2024 22:47:26.932492018 CEST4970480192.168.2.5188.114.96.3
                                  Oct 26, 2024 22:47:26.938658953 CEST8049704188.114.96.3192.168.2.5
                                  Oct 26, 2024 22:47:26.938755989 CEST4970480192.168.2.5188.114.96.3
                                  TimestampSource PortDest PortSource IPDest IP
                                  Oct 26, 2024 22:45:45.701085091 CEST6155653192.168.2.51.1.1.1
                                  Oct 26, 2024 22:45:45.708774090 CEST53615561.1.1.1192.168.2.5
                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                  Oct 26, 2024 22:45:45.701085091 CEST192.168.2.51.1.1.10x8a44Standard query (0)xilloolli.comA (IP address)IN (0x0001)false
                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                  Oct 26, 2024 22:45:45.708774090 CEST1.1.1.1192.168.2.50x8a44No error (0)xilloolli.com188.114.96.3A (IP address)IN (0x0001)false
                                  Oct 26, 2024 22:45:45.708774090 CEST1.1.1.1192.168.2.50x8a44No error (0)xilloolli.com188.114.97.3A (IP address)IN (0x0001)false
                                  • xilloolli.com
                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  0192.168.2.549704188.114.96.3804952C:\Users\user\Desktop\R5AREmpD4S.exe
                                  TimestampBytes transferredDirectionData
                                  Oct 26, 2024 22:45:45.726176977 CEST94OUTGET /api.php?status=1&wallets=0&av=1 HTTP/1.1
                                  Host: xilloolli.com
                                  Connection: Keep-Alive
                                  Oct 26, 2024 22:45:46.913866997 CEST752INHTTP/1.1 200 OK
                                  Date: Sat, 26 Oct 2024 20:45:46 GMT
                                  Content-Type: text/html; charset=UTF-8
                                  Transfer-Encoding: chunked
                                  Connection: keep-alive
                                  cf-cache-status: DYNAMIC
                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=m3Ue8LDgCJvSQVq87EsmhHi0hGaK3d7aleW2n2CECN9HpUF2Nc9C%2FdI1qUJB3uSZbE8J01SmBWSqxQc6AaCpFv2Ou5yXVVK1kPuG3imTZ7cJq4qdKQr2S1NTaiHV%2BKDZ"}],"group":"cf-nel","max_age":604800}
                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                  Server: cloudflare
                                  CF-RAY: 8d8d4abc3fc46b2c-DFW
                                  alt-svc: h3=":443"; ma=86400
                                  server-timing: cfL4;desc="?proto=TCP&rtt=1910&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=94&delivery_rate=0&cwnd=249&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                  Data Raw: 30 0d 0a 0d 0a
                                  Data Ascii: 0


                                  Click to jump to process

                                  Click to jump to process

                                  Click to dive into process behavior distribution

                                  Target ID:0
                                  Start time:16:45:42
                                  Start date:26/10/2024
                                  Path:C:\Users\user\Desktop\R5AREmpD4S.exe
                                  Wow64 process (32bit):false
                                  Commandline:"C:\Users\user\Desktop\R5AREmpD4S.exe"
                                  Imagebase:0x2517d960000
                                  File size:235'520 bytes
                                  MD5 hash:851943A365537291C75D267DB294961A
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_JohnWalkerTexasLoader, Description: Yara detected JohnWalkerTexasLoader, Source: 00000000.00000000.2050334085.000002517D962000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_JohnWalkerTexasLoader, Description: Yara detected JohnWalkerTexasLoader, Source: 00000000.00000002.3306981925.0000025100001000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  Reputation:low
                                  Has exited:false

                                  Reset < >
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3312118193.00007FF848CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848CF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7ff848cf0000_R5AREmpD4S.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 25593dbbc316534a50edeba4271dd4ef43c5510adee9b52c604c4c8442c76777
                                    • Instruction ID: 1501f2edb18954cf4552060d733a9deabf455bc35a27bfecd6d81daed861e2f9
                                    • Opcode Fuzzy Hash: 25593dbbc316534a50edeba4271dd4ef43c5510adee9b52c604c4c8442c76777
                                    • Instruction Fuzzy Hash: BAF1A33090CA8D8FEBA8EF28D855BE977E1FF58340F04426AE84DC7295DB3498458B85
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3312118193.00007FF848CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848CF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7ff848cf0000_R5AREmpD4S.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: dad27fa3938d5a76793393332d856e591439a265afd3431012bb29fdcc88d320
                                    • Instruction ID: 3a628ec5438ff711fab8596126905bfe7c20a72e45976de03b93a809c9aebf14
                                    • Opcode Fuzzy Hash: dad27fa3938d5a76793393332d856e591439a265afd3431012bb29fdcc88d320
                                    • Instruction Fuzzy Hash: 0FE1923090CA8D8FEBA8EF28C855BE977E1FF58350F04426ED84DC7291DB74A9458B85
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3312118193.00007FF848CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848CF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7ff848cf0000_R5AREmpD4S.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: L_h
                                    • API String ID: 0-554164850
                                    • Opcode ID: 57c536d1b94a50a5ef358cc02902b6474c9ea9a4dd4da2e16ee738887a7a8f55
                                    • Instruction ID: 67131d0667e937ee74b4b4e656172fad9273784054a4053a0adbc143a680bdf7
                                    • Opcode Fuzzy Hash: 57c536d1b94a50a5ef358cc02902b6474c9ea9a4dd4da2e16ee738887a7a8f55
                                    • Instruction Fuzzy Hash: 1E51D55085E6C56FE743E77808A65EABFF0DF1B250B4C45EAC4C88B0A7C61C680BC365
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3312118193.00007FF848CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848CF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7ff848cf0000_R5AREmpD4S.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 3L_H
                                    • API String ID: 0-4286477518
                                    • Opcode ID: ae868a4b64ff9902bb02f18d89f2709335abb8d861aff932690bfb632fa7197a
                                    • Instruction ID: 3829f610eaa4ae939497a01cb79f205bae163c0aec7a11d6a730dc34a22b944b
                                    • Opcode Fuzzy Hash: ae868a4b64ff9902bb02f18d89f2709335abb8d861aff932690bfb632fa7197a
                                    • Instruction Fuzzy Hash: 3541A230A1E949AFEB48FB68D8557EC7BE1EF89344F4401B9E00DD72E2DE286846C705
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3312118193.00007FF848CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848CF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7ff848cf0000_R5AREmpD4S.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 14bd1fba1418033c07815c7711ce1cfd74135d1adf7ffcb942ad47cd09ba0577
                                    • Instruction ID: 989b0974ce7096dd072b8c686a859a9dcddd31e33e68ccf9d5796e0ceebd5aab
                                    • Opcode Fuzzy Hash: 14bd1fba1418033c07815c7711ce1cfd74135d1adf7ffcb942ad47cd09ba0577
                                    • Instruction Fuzzy Hash: DA51F23190DA8A4FEB96F72898162B97BF1EF56250F4801FBD449C72E3DE2C9C468351
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3312118193.00007FF848CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848CF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7ff848cf0000_R5AREmpD4S.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 1e522fcd55e474a34ee11b9a591bc5b2d6cf3d5d7d047882dfe658b7ec083b23
                                    • Instruction ID: 45c9387909a2494bcc9b118878eb59e33d6cdddaaf3a47d5aeaa22e3024ee9d4
                                    • Opcode Fuzzy Hash: 1e522fcd55e474a34ee11b9a591bc5b2d6cf3d5d7d047882dfe658b7ec083b23
                                    • Instruction Fuzzy Hash: 37518471908A1C9FDB59EB58D845BE9BBF1FB59310F0081AAD04DD3292DF346985CB81
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3312118193.00007FF848CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848CF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7ff848cf0000_R5AREmpD4S.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 647d0f91531f37c0161d0183ffa7b0508fa0ce46b2b3c3e3659dec51dc4d7a68
                                    • Instruction ID: 70adff1caa98cbd6f6d49317c263dc1dbe471e206613d428ba6edf72e88ad083
                                    • Opcode Fuzzy Hash: 647d0f91531f37c0161d0183ffa7b0508fa0ce46b2b3c3e3659dec51dc4d7a68
                                    • Instruction Fuzzy Hash: 6E511E7090DB8C8FDB98EF59D889AE9BBE0FB69311F10412EE54DC3252C774A445CB91
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3312118193.00007FF848CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848CF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7ff848cf0000_R5AREmpD4S.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: c49a9e581ea46b25c8b16da5995530183bfb347636317b8b551ab1bbb04e885b
                                    • Instruction ID: a7b6ddbf0f567d0df8f8b5ab9c955825696b51e56eb9177a2519b61ff034bd50
                                    • Opcode Fuzzy Hash: c49a9e581ea46b25c8b16da5995530183bfb347636317b8b551ab1bbb04e885b
                                    • Instruction Fuzzy Hash: E851002095DAC41FE745E778482A7EA7FE1DF5A250F5845FED0C9CB2E3DA1C580A8702
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3312118193.00007FF848CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848CF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7ff848cf0000_R5AREmpD4S.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: f76373d88d7016f05f59a541be68fe09e13cab35be273553819cdbecb2f7b00c
                                    • Instruction ID: 5f52cb9aefee1b83142d16537d7d6e38f1b614f0374a74afed88c9f371bc7d7c
                                    • Opcode Fuzzy Hash: f76373d88d7016f05f59a541be68fe09e13cab35be273553819cdbecb2f7b00c
                                    • Instruction Fuzzy Hash: E2414572F0D9698FF795F76868595F9BBD0EF58760F0402BAD049C3292DF18A8028389
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3312118193.00007FF848CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848CF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7ff848cf0000_R5AREmpD4S.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: f61bea1ca27e27cc3390924cb56810970f9a265628de7ace2c167d8220c64584
                                    • Instruction ID: d77154a2e1ed7d30c06e857ca00994722595afb00ff0244b1801cf48566416a4
                                    • Opcode Fuzzy Hash: f61bea1ca27e27cc3390924cb56810970f9a265628de7ace2c167d8220c64584
                                    • Instruction Fuzzy Hash: CE419E31E1D94A4FEBD4FB2894192B977E1FF98391B4401BAE50DD32E6DF289C428784
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3311832721.00007FF848BDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848BDD000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7ff848bdd000_R5AREmpD4S.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: d1f77b4d5488da88f48f21051a4ddbd9b307deb9ff58d77365ce885b75598eba
                                    • Instruction ID: bfaa582351e85981dea9e3c504c8f0483681761d6bd4c76274b6c491ada2136e
                                    • Opcode Fuzzy Hash: d1f77b4d5488da88f48f21051a4ddbd9b307deb9ff58d77365ce885b75598eba
                                    • Instruction Fuzzy Hash: 9D41093180DBC45FD7569B389C459A23FF0EF56360F1501EFD088CB1A3D625A846CBA6
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3312118193.00007FF848CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848CF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7ff848cf0000_R5AREmpD4S.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 37414ef7c2481ad82e080201e5c0394fe8c17bd53693ba09d4b1782064648867
                                    • Instruction ID: 5b978e83ad93cf797aed2fe53727527cb592878915d57fdb3b0632b9ec33001f
                                    • Opcode Fuzzy Hash: 37414ef7c2481ad82e080201e5c0394fe8c17bd53693ba09d4b1782064648867
                                    • Instruction Fuzzy Hash: 4B41B662A0DAD65FE346A73C58A50E83FE0EF92994B0A01B7C2948F4D3EF1C18478685
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3312118193.00007FF848CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848CF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7ff848cf0000_R5AREmpD4S.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 975fe93151fa0f97a8f824659d44b0d025cc9abe046a23437afab12889a8247d
                                    • Instruction ID: 328174fb3b2c17b08a4fb93c0676203370229e9e2654dc1c98637bc7fcf97e17
                                    • Opcode Fuzzy Hash: 975fe93151fa0f97a8f824659d44b0d025cc9abe046a23437afab12889a8247d
                                    • Instruction Fuzzy Hash: AE415B71A08A4C8FEB98EF98D455BEDBBB1FB59310F00816ED00DE7292DB75A485CB41
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3312118193.00007FF848CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848CF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7ff848cf0000_R5AREmpD4S.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 290c7c29798378fe5a320b4a3eb86927a19540b6b5ebf9fd30461828e952263d
                                    • Instruction ID: b94506ba6113db39c0f92ddb1c82c2f7e1e038c160d814ac8a60606a6223a36e
                                    • Opcode Fuzzy Hash: 290c7c29798378fe5a320b4a3eb86927a19540b6b5ebf9fd30461828e952263d
                                    • Instruction Fuzzy Hash: 5131D36191EAC96FF78BE77848265BA7F90EF46690B0805FBD08DDB1D3CE0D58068315
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3312118193.00007FF848CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848CF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7ff848cf0000_R5AREmpD4S.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 3deb858a1046e47563f99c471fef1196e8341cd33db5e92d3e2adc66b30a72d6
                                    • Instruction ID: c7aab5a466bb33d4c5dc9f93db335320c274c48326c118ceed5f609df52f7ae8
                                    • Opcode Fuzzy Hash: 3deb858a1046e47563f99c471fef1196e8341cd33db5e92d3e2adc66b30a72d6
                                    • Instruction Fuzzy Hash: 0A31C411B5E9856FE749B37C68123FD67C1EF867A0F5405BED049C32C7DD1D6806428A
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3312118193.00007FF848CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848CF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7ff848cf0000_R5AREmpD4S.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 3ac7ad325a3b18a9d0c76097bbe50714cab6f085aa89dfdbd817ae17dd8ff349
                                    • Instruction ID: 5c4acc6cbca893b6c74815e15861d95d1b52153f1d7862282c1a00be86686617
                                    • Opcode Fuzzy Hash: 3ac7ad325a3b18a9d0c76097bbe50714cab6f085aa89dfdbd817ae17dd8ff349
                                    • Instruction Fuzzy Hash: AB317051A5EAC56FE746B3B818272ED7BA1EF46290F4801FAE548C71D3DE1C2C05836A
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3312118193.00007FF848CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848CF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7ff848cf0000_R5AREmpD4S.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 954338a395e1cc344fcfb4e52007e5f2c817f33f6ed3e6b2887ddc8402e6b6fa
                                    • Instruction ID: 17eb60229802719bd16849d98e5b844f6fcdde1b395191951373ff83fb7b3434
                                    • Opcode Fuzzy Hash: 954338a395e1cc344fcfb4e52007e5f2c817f33f6ed3e6b2887ddc8402e6b6fa
                                    • Instruction Fuzzy Hash: D121F213B0D5662AE351B37DB8011F96BE1EF813B2F184177D38C8A083CE19648A82ED
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3312118193.00007FF848CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848CF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7ff848cf0000_R5AREmpD4S.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 29f61d2d7f9a9fb64d3bf38ce510bcda9c7037f1ff62a008dc06e002d55ada58
                                    • Instruction ID: 92177be4dc9b80f18fe5cc9212d18a3d5f0baff588c2c9affd8e832f3a1bfd8c
                                    • Opcode Fuzzy Hash: 29f61d2d7f9a9fb64d3bf38ce510bcda9c7037f1ff62a008dc06e002d55ada58
                                    • Instruction Fuzzy Hash: 24212921A0EAC60FE3D5E77C5C5A2B57BD1DF866A1B0842FBC588C75E7CD0998058382
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3312118193.00007FF848CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848CF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7ff848cf0000_R5AREmpD4S.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 448a03da2478eb7c90a9097c4f5741dacceddc6139d0a740610a7f90ec264868
                                    • Instruction ID: 92eb71a2c21b936772772b6caa78d2d6a15259bcbb5b9a7cc5d4b043a34b0a52
                                    • Opcode Fuzzy Hash: 448a03da2478eb7c90a9097c4f5741dacceddc6139d0a740610a7f90ec264868
                                    • Instruction Fuzzy Hash: 1821B694E5E0372DFB98F6A250A20FE25915F017C2F81143AF3AE491C38F0CB51865AE
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3312118193.00007FF848CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848CF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7ff848cf0000_R5AREmpD4S.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 7116b8c68c6f03217a055bcc9cc916a90b6477032b42a47df0cf50e1680ae945
                                    • Instruction ID: f4abc5b63ac30605cac8d66c133d8573c97621ae21af51d12c26933fd265945f
                                    • Opcode Fuzzy Hash: 7116b8c68c6f03217a055bcc9cc916a90b6477032b42a47df0cf50e1680ae945
                                    • Instruction Fuzzy Hash: 45F01D5290E7E18FE75B977818651A07F705F03550F0E00EBC588DB1E7D90C6C889367
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3312118193.00007FF848CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848CF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7ff848cf0000_R5AREmpD4S.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 02865a84f7aae2de5d4aaa29f094c805d709c5a6505dfd7a566a47fcdadde072
                                    • Instruction ID: 8ef0c6e17ff0cbbafa853d008f65cd63328f854f5fe0f2757d0bf26324507f71
                                    • Opcode Fuzzy Hash: 02865a84f7aae2de5d4aaa29f094c805d709c5a6505dfd7a566a47fcdadde072
                                    • Instruction Fuzzy Hash: 4EF08252F0D6D60FF785E63C18691A82E81AF66290F8901FAD609CB1D3D919C8458245
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3312118193.00007FF848CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848CF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7ff848cf0000_R5AREmpD4S.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 6aab9a2ff73af65e899bb2eb77e46681ee3b373894172c42e269df3e9ed02fa6
                                    • Instruction ID: 011eafa0854affa55c4b5a383f8b0c05dc5a7d7d06e7f6f4aa7dd96ce04cc24c
                                    • Opcode Fuzzy Hash: 6aab9a2ff73af65e899bb2eb77e46681ee3b373894172c42e269df3e9ed02fa6
                                    • Instruction Fuzzy Hash: EBF08252F0D9B24FF7ECF57D28592F46580EB40A50F0840B6CA58C71D6D94D6DC8538A
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3312118193.00007FF848CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848CF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7ff848cf0000_R5AREmpD4S.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: d257f27a99c121b901e156a36a98e96a478385a9184c08feb2408bfb7abe7296
                                    • Instruction ID: aeb00186777b0497a2024e3e3fb89198ced8c3a6e42adf1eaa20a8f276b07841
                                    • Opcode Fuzzy Hash: d257f27a99c121b901e156a36a98e96a478385a9184c08feb2408bfb7abe7296
                                    • Instruction Fuzzy Hash: F2F0E220A5DA856BF34977BC68126F876C1EF44790F1800BCE149831C3CC0CA805529A
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3312118193.00007FF848CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848CF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7ff848cf0000_R5AREmpD4S.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 20b8d95a6bd14e747e78b8f4df2802f2b4f073d398c7cae15f08723c5503798d
                                    • Instruction ID: 858ae9a61b4b7df7be1486d7a61bf97f8883400db5e2088dc3a7f7d78c9f6ae5
                                    • Opcode Fuzzy Hash: 20b8d95a6bd14e747e78b8f4df2802f2b4f073d398c7cae15f08723c5503798d
                                    • Instruction Fuzzy Hash: 36E0E5A1F2C5950FF38CE138045A1792BC1DB99640F0501BDC05AC32D2DE08AC46528A
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3312118193.00007FF848CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848CF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7ff848cf0000_R5AREmpD4S.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 479d902875f0f9ceb6c405eb72df6bd9fe67578dc04d75b0f1483056c8fbab8f
                                    • Instruction ID: 390929fbb24aa52b172ee84e147f1ade17a5af480366977ea435d94afacaba12
                                    • Opcode Fuzzy Hash: 479d902875f0f9ceb6c405eb72df6bd9fe67578dc04d75b0f1483056c8fbab8f
                                    • Instruction Fuzzy Hash: 4AF0823094D68C9FDB42EB7488654EDBFB0EF05300F0440EBE544D7092EA3859488741
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3312118193.00007FF848CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848CF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7ff848cf0000_R5AREmpD4S.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 43a2c4cbd29d36b00bfe3eb66ebb7f8ebe34abe6e09b01a0d2b590490223d863
                                    • Instruction ID: 6fcfd1d1a755691a0161138b62ea83a1049794cfb0b537bdc96e994c85334ee9
                                    • Opcode Fuzzy Hash: 43a2c4cbd29d36b00bfe3eb66ebb7f8ebe34abe6e09b01a0d2b590490223d863
                                    • Instruction Fuzzy Hash: 85E04FA284E6C10FE74293250C2E294BF90BF12261F4942FBD6848B5E3DA0C5889D725
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3312118193.00007FF848CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848CF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7ff848cf0000_R5AREmpD4S.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: EL_H
                                    • API String ID: 0-2972355470
                                    • Opcode ID: d554deaff616136a0c9c3bde3ea303eb2f1e4b26f878da50c1da7b038e9616fa
                                    • Instruction ID: 9229586bad61d74728d407b1d230da0b16d54128176d15a3af5b504f5fc7b533
                                    • Opcode Fuzzy Hash: d554deaff616136a0c9c3bde3ea303eb2f1e4b26f878da50c1da7b038e9616fa
                                    • Instruction Fuzzy Hash: 9C91705055E9C46FE346E3B81C66AEA7FA2CF8B250B8C49FED0C99F0A3C50D64579342
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3312118193.00007FF848CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848CF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7ff848cf0000_R5AREmpD4S.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: =L_H
                                    • API String ID: 0-530646013
                                    • Opcode ID: a334cf69ad73966b358bd6f3bba4460ae013fc49c224dd8d8a26368d5177362c
                                    • Instruction ID: 2e44a9060659a62bf11a03992a031870cca9082ecfd2a9505657d9064347348a
                                    • Opcode Fuzzy Hash: a334cf69ad73966b358bd6f3bba4460ae013fc49c224dd8d8a26368d5177362c
                                    • Instruction Fuzzy Hash: E6916A9065E9C46FE346E3B81C26AEA6FA1CF4B21179C09FDD0C99F4A3C50D6407D38A
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3312118193.00007FF848CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848CF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7ff848cf0000_R5AREmpD4S.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 1M_^
                                    • API String ID: 0-2690736931
                                    • Opcode ID: 85ef41139c41c7faaa97c1bfd646ccfe27dd790c927ab464f6b816f0aefa6161
                                    • Instruction ID: 7e818360a85a109881a8907c3474c060e20b3151a2c72cd50780bcfc391913f6
                                    • Opcode Fuzzy Hash: 85ef41139c41c7faaa97c1bfd646ccfe27dd790c927ab464f6b816f0aefa6161
                                    • Instruction Fuzzy Hash: 4D41A737A0D6D79FE747EB3C68950E87BA0EF432A5B0901F7C185CA093DA15B40B8799
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3312118193.00007FF848CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848CF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7ff848cf0000_R5AREmpD4S.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 1M_^
                                    • API String ID: 0-2690736931
                                    • Opcode ID: ef1a64e466efbe2f84ed2266a5f15433aa2983d8ca1d3efbd90d40a5674a2a90
                                    • Instruction ID: 525ffd1326ffaa4e60460ec98478d0cf4276235f086fd08e37ad9de986f1f2cb
                                    • Opcode Fuzzy Hash: ef1a64e466efbe2f84ed2266a5f15433aa2983d8ca1d3efbd90d40a5674a2a90
                                    • Instruction Fuzzy Hash: 3141C727A0D6D79FE707EB3C68550E87BA0EF432A5B0902F7C185CA093DA15740B8799
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3312118193.00007FF848CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848CF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7ff848cf0000_R5AREmpD4S.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 4db937671c15a15968392e1b00c95dbfbd3d6792242d609a6fb805a7bb01788f
                                    • Instruction ID: 639c5b78fabe6a9445dbf0cd5cb53f8ee6311ac5b6887d9e4e37d0dffd8a645a
                                    • Opcode Fuzzy Hash: 4db937671c15a15968392e1b00c95dbfbd3d6792242d609a6fb805a7bb01788f
                                    • Instruction Fuzzy Hash: F2B1DD27B0E6969FD703BB7C78510E57B60EF432B6B1903B7C1888A093DA15644AC79D
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3312118193.00007FF848CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848CF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7ff848cf0000_R5AREmpD4S.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 20675153e517b728697fb1a04c5c507e6045f8217d6b19d983e09523a395fb32
                                    • Instruction ID: 653a3046265b5cd2c00cbbd4b53fb32da1f9ab627ecfa7af77c5fd07b8e9fffe
                                    • Opcode Fuzzy Hash: 20675153e517b728697fb1a04c5c507e6045f8217d6b19d983e09523a395fb32
                                    • Instruction Fuzzy Hash: 0761A837A0D5A68FD706BB3CA8450E97B60EF423B6B1902B7C185CA083DA15744AC799
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3312118193.00007FF848CF0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848CF0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7ff848cf0000_R5AREmpD4S.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 6eb858bd1a4f52586a2ff678d4130ec714aa8c130cedb74f7f075c9febdd25b4
                                    • Instruction ID: d7e54f4142e1e0763f834c5a6516bd516803677c0ce796d5fdd5f32c7eb7a479
                                    • Opcode Fuzzy Hash: 6eb858bd1a4f52586a2ff678d4130ec714aa8c130cedb74f7f075c9febdd25b4
                                    • Instruction Fuzzy Hash: EB41B727A0E6D69FE707EA3C68550E97F60EF432A5B0902F7C285CA093DA15740B8699