Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
DBUfLVzZhf.exe

Overview

General Information

Sample name:DBUfLVzZhf.exe
renamed because original name is a hash value
Original sample name:ac52bcde75a75288f6cedfe766870179ceb2f18b.exe
Analysis ID:1542940
MD5:ac775ce03263340619836c9d01e8b2c3
SHA1:ac52bcde75a75288f6cedfe766870179ceb2f18b
SHA256:b966428056fbf13e8c0684e477c0ed6fd3b742762eac490b3beca8224e342927
Tags:dllexeJohnWalkerTexasLoaderJWTLJWTLoaderReversingLabsuser-NDA0E
Infos:

Detection

JohnWalkerTexasLoader
Score:68
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected JohnWalkerTexasLoader
AI detected suspicious sample
Queries memory information (via WMI often done to detect virtual machines)
Queries sensitive physical memory information (via WMI, Win32_PhysicalMemory, often done to detect virtual machines)
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Detected potential crypto function
Enables debug privileges
HTTP GET or POST without a user agent
IP address seen in connection with other malware
PE file does not import any functions
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • DBUfLVzZhf.exe (PID: 6084 cmdline: "C:\Users\user\Desktop\DBUfLVzZhf.exe" MD5: AC775CE03263340619836C9D01E8B2C3)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
DBUfLVzZhf.exeJoeSecurity_JohnWalkerTexasLoaderYara detected JohnWalkerTexasLoaderJoe Security
    SourceRuleDescriptionAuthorStrings
    00000000.00000000.2117061251.00000176D2342000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_JohnWalkerTexasLoaderYara detected JohnWalkerTexasLoaderJoe Security
      00000000.00000002.3358819159.00000176D4171000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_JohnWalkerTexasLoaderYara detected JohnWalkerTexasLoaderJoe Security
        Process Memory Space: DBUfLVzZhf.exe PID: 6084JoeSecurity_JohnWalkerTexasLoaderYara detected JohnWalkerTexasLoaderJoe Security
          SourceRuleDescriptionAuthorStrings
          0.0.DBUfLVzZhf.exe.176d2340000.0.unpackJoeSecurity_JohnWalkerTexasLoaderYara detected JohnWalkerTexasLoaderJoe Security
            No Sigma rule has matched
            No Suricata rule has matched

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: DBUfLVzZhf.exeReversingLabs: Detection: 28%
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.8% probability
            Source: DBUfLVzZhf.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: Binary string: C:\Users\Administrator\Pictures\DiffPatchWpf-main\obj\x64\Release\DiffPatchWpf.pdb source: DBUfLVzZhf.exe
            Source: global trafficHTTP traffic detected: GET /api.php?status=1&wallets=0&av=1 HTTP/1.1Host: xilloolli.comConnection: Keep-Alive
            Source: Joe Sandbox ViewIP Address: 188.114.96.3 188.114.96.3
            Source: Joe Sandbox ViewIP Address: 188.114.96.3 188.114.96.3
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: global trafficHTTP traffic detected: GET /api.php?status=1&wallets=0&av=1 HTTP/1.1Host: xilloolli.comConnection: Keep-Alive
            Source: global trafficDNS traffic detected: DNS query: xilloolli.com
            Source: DBUfLVzZhf.exe, 00000000.00000002.3358819159.00000176D45F3000.00000004.00000800.00020000.00000000.sdmp, DBUfLVzZhf.exe, 00000000.00000002.3358819159.00000176D4171000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
            Source: DBUfLVzZhf.exe, 00000000.00000002.3358819159.00000176D4609000.00000004.00000800.00020000.00000000.sdmp, DBUfLVzZhf.exe, 00000000.00000002.3358819159.00000176D45F3000.00000004.00000800.00020000.00000000.sdmp, DBUfLVzZhf.exe, 00000000.00000002.3358819159.00000176D4171000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://xilloolli.com
            Source: DBUfLVzZhf.exe, 00000000.00000002.3358819159.00000176D4171000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://xilloolli.com/api-debug.php
            Source: DBUfLVzZhf.exe, 00000000.00000002.3358819159.00000176D4171000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://xilloolli.com/api.php
            Source: DBUfLVzZhf.exe, 00000000.00000002.3358819159.00000176D45C6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://xilloolli.com/api.php?status=1&wa
            Source: DBUfLVzZhf.exe, 00000000.00000002.3358819159.00000176D45C6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://xilloolli.com/api.php?status=1&wallets=0&av=1
            Source: DBUfLVzZhf.exe, 00000000.00000002.3358819159.00000176D4171000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://xilloolli.com/api.php?status=1&wallets=0&av=10v
            Source: DBUfLVzZhf.exeString found in binary or memory: http://xilloolli.com/api.phpEhttp://xilloolli.com/api-debug.php
            Source: DBUfLVzZhf.exeString found in binary or memory: https://github.com/reproteq/DiffPatchWpf3Copyright
            Source: DBUfLVzZhf.exeString found in binary or memory: https://ipinfo.io/country
            Source: DBUfLVzZhf.exeString found in binary or memory: https://ipinfo.io/ip
            Source: DBUfLVzZhf.exeString found in binary or memory: https://oklibed.com
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeCode function: 0_2_00007FFD342D5DD60_2_00007FFD342D5DD6
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeCode function: 0_2_00007FFD342D6B820_2_00007FFD342D6B82
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeCode function: 0_2_00007FFD342DFF7C0_2_00007FFD342DFF7C
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeCode function: 0_2_00007FFD342D11800_2_00007FFD342D1180
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeCode function: 0_2_00007FFD342D11FA0_2_00007FFD342D11FA
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeCode function: 0_2_00007FFD342D225D0_2_00007FFD342D225D
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeCode function: 0_2_00007FFD342D12D30_2_00007FFD342D12D3
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeCode function: 0_2_00007FFD342D13000_2_00007FFD342D1300
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeCode function: 0_2_00007FFD342D12FA0_2_00007FFD342D12FA
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeCode function: 0_2_00007FFD342D12F80_2_00007FFD342D12F8
            Source: DBUfLVzZhf.exeStatic PE information: No import functions for PE file found
            Source: DBUfLVzZhf.exe, 00000000.00000000.2117086095.00000176D2364000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameDiffPatchWpf.exe2 vs DBUfLVzZhf.exe
            Source: DBUfLVzZhf.exeBinary or memory string: OriginalFilenameDiffPatchWpf.exe2 vs DBUfLVzZhf.exe
            Source: classification engineClassification label: mal68.troj.evad.winEXE@1/0@1/1
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeMutant created: NULL
            Source: DBUfLVzZhf.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: DBUfLVzZhf.exeStatic file information: TRID: Win64 Executable GUI Net Framework (217006/5) 49.88%
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: DBUfLVzZhf.exeReversingLabs: Detection: 28%
            Source: DBUfLVzZhf.exeString found in binary or memory: EHH-ADD!IJJoEHH5JKK
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeSection loaded: dwrite.dllJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeSection loaded: msvcp140_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeSection loaded: dwmapi.dllJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeSection loaded: d3d9.dllJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeSection loaded: d3d10warp.dllJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeSection loaded: wtsapi32.dllJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeSection loaded: winsta.dllJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeSection loaded: powrprof.dllJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeSection loaded: umpdc.dllJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeSection loaded: dataexchange.dllJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeSection loaded: d3d11.dllJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeSection loaded: dcomp.dllJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeSection loaded: dxgi.dllJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeSection loaded: twinapi.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeSection loaded: resourcepolicyclient.dllJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeSection loaded: dxcore.dllJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeSection loaded: textshaping.dllJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeSection loaded: textinputframework.dllJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeSection loaded: coreuicomponents.dllJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeSection loaded: msctfui.dllJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeSection loaded: uiautomationcore.dllJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeSection loaded: rasapi32.dllJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeSection loaded: rasman.dllJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeSection loaded: rtutils.dllJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeSection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeSection loaded: d3dcompiler_47.dllJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
            Source: Window RecorderWindow detected: More than 3 window changes detected
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
            Source: DBUfLVzZhf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
            Source: DBUfLVzZhf.exeStatic PE information: Image base 0x140000000 > 0x60000000
            Source: DBUfLVzZhf.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: DBUfLVzZhf.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
            Source: Binary string: C:\Users\Administrator\Pictures\DiffPatchWpf-main\obj\x64\Release\DiffPatchWpf.pdb source: DBUfLVzZhf.exe
            Source: DBUfLVzZhf.exeStatic PE information: 0xEC2CE5FA [Sun Jul 24 17:03:54 2095 UTC]
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeCode function: 0_2_00007FFD341BD2A5 pushad ; iretd 0_2_00007FFD341BD2A6
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeCode function: 0_2_00007FFD342D815A push ebx; ret 0_2_00007FFD342D816A
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PhysicalMemory
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PhysicalMemory
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeMemory allocated: 176D26A0000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeMemory allocated: 176EC170000 memory reserve | memory write watchJump to behavior
            Source: DBUfLVzZhf.exe, 00000000.00000002.3361169877.00000176F0C56000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll^^+
            Source: DBUfLVzZhf.exe, 00000000.00000002.3360170138.00000176EC863000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMware Virtual RAM
            Source: DBUfLVzZhf.exe, 00000000.00000002.3360170138.00000176EC863000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Win32_PhysicalMemoryPhysical Memory 0Win32_PhysicalMemoryPhysical MemoryPhysical MemoryPhysical MemoryRAM slot #0RAM slot #0VMware Virtual RAM00000001VMW-4096MB
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeMemory allocated: page read and write | page guardJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeQueries volume information: C:\Users\user\Desktop\DBUfLVzZhf.exe VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\PresentationFramework-SystemXml\v4.0_4.0.0.0__b77a5c561934e089\PresentationFramework-SystemXml.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeQueries volume information: C:\Windows\Fonts\segoeuib.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeQueries volume information: C:\Windows\Fonts\segoeuib.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeQueries volume information: C:\Windows\Fonts\segoeui.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeQueries volume information: C:\Windows\Fonts\seguisb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeQueries volume information: C:\Windows\Fonts\segoeuib.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeQueries volume information: C:\Windows\Fonts\segoeui.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeQueries volume information: C:\Windows\Fonts\seguisb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\UIAutomationTypes\v4.0_4.0.0.0__31bf3856ad364e35\UIAutomationTypes.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\UIAutomationProvider\v4.0_4.0.0.0__31bf3856ad364e35\UIAutomationProvider.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeQueries volume information: C:\Windows\Fonts\segoeuib.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeQueries volume information: C:\Windows\Fonts\segoeui.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeQueries volume information: C:\Windows\Fonts\segoeuib.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeQueries volume information: C:\Windows\Fonts\segoeuib.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
            Source: DBUfLVzZhf.exe, 00000000.00000002.3361169877.00000176F0C56000.00000004.00000020.00020000.00000000.sdmp, DBUfLVzZhf.exe, 00000000.00000002.3358342702.00000176D2618000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
            Source: C:\Users\user\Desktop\DBUfLVzZhf.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: DBUfLVzZhf.exe, type: SAMPLE
            Source: Yara matchFile source: 0.0.DBUfLVzZhf.exe.176d2340000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000000.2117061251.00000176D2342000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.3358819159.00000176D4171000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: DBUfLVzZhf.exe PID: 6084, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: DBUfLVzZhf.exe, type: SAMPLE
            Source: Yara matchFile source: 0.0.DBUfLVzZhf.exe.176d2340000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000000.00000000.2117061251.00000176D2342000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000000.00000002.3358819159.00000176D4171000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: DBUfLVzZhf.exe PID: 6084, type: MEMORYSTR
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts21
            Windows Management Instrumentation
            1
            DLL Side-Loading
            1
            DLL Side-Loading
            11
            Virtualization/Sandbox Evasion
            OS Credential Dumping221
            Security Software Discovery
            Remote Services1
            Archive Collected Data
            1
            Encrypted Channel
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault Accounts2
            Command and Scripting Interpreter
            Boot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
            Disable or Modify Tools
            LSASS Memory11
            Virtualization/Sandbox Evasion
            Remote Desktop ProtocolData from Removable Media1
            Ingress Tool Transfer
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
            Obfuscated Files or Information
            Security Account Manager12
            System Information Discovery
            SMB/Windows Admin SharesData from Network Shared Drive2
            Non-Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
            Timestomp
            NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture2
            Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
            DLL Side-Loading
            LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            DBUfLVzZhf.exe29%ReversingLabsByteCode-MSIL.Trojan.Walgentz
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
            NameIPActiveMaliciousAntivirus DetectionReputation
            xilloolli.com
            188.114.96.3
            truefalse
              unknown
              NameMaliciousAntivirus DetectionReputation
              http://xilloolli.com/api.php?status=1&wallets=0&av=1false
                unknown
                NameSourceMaliciousAntivirus DetectionReputation
                http://xilloolli.com/api.php?status=1&waDBUfLVzZhf.exe, 00000000.00000002.3358819159.00000176D45C6000.00000004.00000800.00020000.00000000.sdmpfalse
                  unknown
                  https://ipinfo.io/countryDBUfLVzZhf.exefalse
                    unknown
                    http://xilloolli.com/api.phpEhttp://xilloolli.com/api-debug.phpDBUfLVzZhf.exefalse
                      unknown
                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameDBUfLVzZhf.exe, 00000000.00000002.3358819159.00000176D45F3000.00000004.00000800.00020000.00000000.sdmp, DBUfLVzZhf.exe, 00000000.00000002.3358819159.00000176D4171000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://xilloolli.com/api-debug.phpDBUfLVzZhf.exe, 00000000.00000002.3358819159.00000176D4171000.00000004.00000800.00020000.00000000.sdmpfalse
                        unknown
                        http://xilloolli.comDBUfLVzZhf.exe, 00000000.00000002.3358819159.00000176D4609000.00000004.00000800.00020000.00000000.sdmp, DBUfLVzZhf.exe, 00000000.00000002.3358819159.00000176D45F3000.00000004.00000800.00020000.00000000.sdmp, DBUfLVzZhf.exe, 00000000.00000002.3358819159.00000176D4171000.00000004.00000800.00020000.00000000.sdmpfalse
                          unknown
                          http://xilloolli.com/api.phpDBUfLVzZhf.exe, 00000000.00000002.3358819159.00000176D4171000.00000004.00000800.00020000.00000000.sdmpfalse
                            unknown
                            http://xilloolli.com/api.php?status=1&wallets=0&av=10vDBUfLVzZhf.exe, 00000000.00000002.3358819159.00000176D4171000.00000004.00000800.00020000.00000000.sdmpfalse
                              unknown
                              https://oklibed.comDBUfLVzZhf.exefalse
                                unknown
                                https://github.com/reproteq/DiffPatchWpf3CopyrightDBUfLVzZhf.exefalse
                                  unknown
                                  https://ipinfo.io/ipDBUfLVzZhf.exefalse
                                    unknown
                                    • No. of IPs < 25%
                                    • 25% < No. of IPs < 50%
                                    • 50% < No. of IPs < 75%
                                    • 75% < No. of IPs
                                    IPDomainCountryFlagASNASN NameMalicious
                                    188.114.96.3
                                    xilloolli.comEuropean Union
                                    13335CLOUDFLARENETUSfalse
                                    Joe Sandbox version:41.0.0 Charoite
                                    Analysis ID:1542940
                                    Start date and time:2024-10-26 22:45:53 +02:00
                                    Joe Sandbox product:CloudBasic
                                    Overall analysis duration:0h 4m 2s
                                    Hypervisor based Inspection enabled:false
                                    Report type:full
                                    Cookbook file name:default.jbs
                                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                    Number of analysed new started processes analysed:8
                                    Number of new started drivers analysed:0
                                    Number of existing processes analysed:0
                                    Number of existing drivers analysed:0
                                    Number of injected processes analysed:0
                                    Technologies:
                                    • HCA enabled
                                    • EGA enabled
                                    • AMSI enabled
                                    Analysis Mode:default
                                    Analysis stop reason:Timeout
                                    Sample name:DBUfLVzZhf.exe
                                    renamed because original name is a hash value
                                    Original Sample Name:ac52bcde75a75288f6cedfe766870179ceb2f18b.exe
                                    Detection:MAL
                                    Classification:mal68.troj.evad.winEXE@1/0@1/1
                                    EGA Information:Failed
                                    HCA Information:
                                    • Successful, ratio: 95%
                                    • Number of executed functions: 25
                                    • Number of non-executed functions: 14
                                    Cookbook Comments:
                                    • Found application associated with file extension: .exe
                                    • Exclude process from analysis (whitelisted): dllhost.exe, RuntimeBroker.exe, WMIADAP.exe, SIHClient.exe, backgroundTaskHost.exe, svchost.exe
                                    • Excluded domains from analysis (whitelisted): client.wns.windows.com, fs.microsoft.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                    • Execution Graph export aborted for target DBUfLVzZhf.exe, PID 6084 because it is empty
                                    • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                    • Report size getting too big, too many NtQueryValueKey calls found.
                                    • Report size getting too big, too many NtReadVirtualMemory calls found.
                                    • VT rate limit hit for: DBUfLVzZhf.exe
                                    No simulations
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    188.114.96.3R5AREmpD4S.exeGet hashmaliciousJohnWalkerTexasLoaderBrowse
                                    • xilloolli.com/api.php?status=1&wallets=0&av=1
                                    7950COPY.exeGet hashmaliciousFormBookBrowse
                                    • www.globaltrend.xyz/b2h2/
                                    transferencia interbancaria_667553466579.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
                                    • paste.ee/d/Gitmx
                                    19387759999PO-RFQ-INVOICE-doc.exeGet hashmaliciousFormBookBrowse
                                    • www.zonguldakescortg.xyz/483l/
                                    PO 4800040256.exeGet hashmaliciousFormBookBrowse
                                    • www.rtpngk.xyz/876i/
                                    yGktPvplJn.exeGet hashmaliciousPushdoBrowse
                                    • www.fnsds.org/
                                    rPedidodecompra__PO20441__ARIMComponentes.exeGet hashmaliciousLokibot, PureLog Stealer, zgRATBrowse
                                    • dddotx.shop/Mine/PWS/fre.php
                                    Orden de Compra No. 78986756565344657.xlam.xlsxGet hashmaliciousAgentTeslaBrowse
                                    • paste.ee/d/nwtkd
                                    Doc 784-01965670.exeGet hashmaliciousFormBookBrowse
                                    • www.launchdreamidea.xyz/bd77/
                                    PO1268931024 - Bank Slip.exeGet hashmaliciousPureLog StealerBrowse
                                    • www.timizoasisey.shop/3p0l/
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    xilloolli.comR5AREmpD4S.exeGet hashmaliciousJohnWalkerTexasLoaderBrowse
                                    • 188.114.96.3
                                    MHQMJCOxjl.exeGet hashmaliciousJohnWalkerTexasLoaderBrowse
                                    • 188.114.97.3
                                    73OPQbICEW.exeGet hashmaliciousJohnWalkerTexasLoaderBrowse
                                    • 188.114.96.3
                                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                    CLOUDFLARENETUSR5AREmpD4S.exeGet hashmaliciousJohnWalkerTexasLoaderBrowse
                                    • 188.114.96.3
                                    MHQMJCOxjl.exeGet hashmaliciousJohnWalkerTexasLoaderBrowse
                                    • 188.114.97.3
                                    73OPQbICEW.exeGet hashmaliciousJohnWalkerTexasLoaderBrowse
                                    • 188.114.96.3
                                    file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                    • 104.21.95.91
                                    file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, StealcBrowse
                                    • 172.67.170.64
                                    7950COPY.exeGet hashmaliciousFormBookBrowse
                                    • 188.114.96.3
                                    file.exeGet hashmaliciousLummaCBrowse
                                    • 188.114.96.3
                                    GK059kPZ5B.exeGet hashmaliciousStealcBrowse
                                    • 172.67.179.207
                                    TP77MvSzt2.exeGet hashmaliciousStealcBrowse
                                    • 104.21.56.70
                                    ZnPyVAOUBc.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, StealcBrowse
                                    • 188.114.96.3
                                    No context
                                    No context
                                    No created / dropped files found
                                    File type:PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
                                    Entropy (8bit):3.851169000689334
                                    TrID:
                                    • Win64 Executable GUI Net Framework (217006/5) 49.88%
                                    • Win64 Executable GUI (202006/5) 46.43%
                                    • Win64 Executable (generic) (12005/4) 2.76%
                                    • Generic Win/DOS Executable (2004/3) 0.46%
                                    • DOS Executable Generic (2002/1) 0.46%
                                    File name:DBUfLVzZhf.exe
                                    File size:235'520 bytes
                                    MD5:ac775ce03263340619836c9d01e8b2c3
                                    SHA1:ac52bcde75a75288f6cedfe766870179ceb2f18b
                                    SHA256:b966428056fbf13e8c0684e477c0ed6fd3b742762eac490b3beca8224e342927
                                    SHA512:fe66593cc1c500144eacde42746596683ae5776de9547a57d8b9b2ab0f2bf71ad48472fd903f39d70d120979aa7ba3d30b02e21ed6416e3860df27941b883083
                                    SSDEEP:768:x5SMwiB8FR+dNeDFXmqcyU6GRZkIKugg0Apk/OIaEyEb3GOd53BRnW2i38SmFhme:TH8qoxTYW4zApoePnzhpmy
                                    TLSH:1934D5ABE32F6809CD2A32F5C8E443B45E605F116E10D6F964BDF2C5123499BFD189AC
                                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d.....,..........."...0.................. .....@..... ....................................`...@......@............... .....
                                    Icon Hash:1761174505056997
                                    Entrypoint:0x140000000
                                    Entrypoint Section:
                                    Digitally signed:false
                                    Imagebase:0x140000000
                                    Subsystem:windows gui
                                    Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                    DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                    Time Stamp:0xEC2CE5FA [Sun Jul 24 17:03:54 2095 UTC]
                                    TLS Callbacks:
                                    CLR (.Net) Version:
                                    OS Version Major:4
                                    OS Version Minor:0
                                    File Version Major:4
                                    File Version Minor:0
                                    Subsystem Version Major:4
                                    Subsystem Version Minor:0
                                    Import Hash:
                                    Instruction
                                    dec ebp
                                    pop edx
                                    nop
                                    add byte ptr [ebx], al
                                    add byte ptr [eax], al
                                    add byte ptr [eax+eax], al
                                    add byte ptr [eax], al
                                    NameVirtual AddressVirtual Size Is in Section
                                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x240000x18ca8.rsrc
                                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                    IMAGE_DIRECTORY_ENTRY_DEBUG0x2270c0x38.text
                                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20000x48.text
                                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                    .text0x20000x207af0x208000cd721aba87545a089a9b9ea9134933cFalse0.1777869591346154data4.281764200834581IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                    .rsrc0x240000x18ca80x18e00d46f216a7dfee89a5dd1ba2c032f2ffeFalse0.10476209170854271data3.1344838579936667IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                    NameRVASizeTypeLanguageCountryZLIB Complexity
                                    RT_ICON0x241800x468Device independent bitmap graphic, 16 x 32 x 32, image size 10880.3962765957446808
                                    RT_ICON0x245f80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 42240.23381801125703564
                                    RT_ICON0x256b00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 96000.23278008298755187
                                    RT_ICON0x27c680x4228Device independent bitmap graphic, 64 x 128 x 32, image size 168960.12133915918752952
                                    RT_ICON0x2bea00x10828Device independent bitmap graphic, 128 x 256 x 32, image size 675840.06113214243463859
                                    RT_GROUP_ICON0x3c6d80x4cdata0.75
                                    RT_VERSION0x3c7340x374data0.416289592760181
                                    RT_MANIFEST0x3cab80x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                    TimestampSource PortDest PortSource IPDest IP
                                    Oct 26, 2024 22:46:48.181339025 CEST4971180192.168.2.6188.114.96.3
                                    Oct 26, 2024 22:46:48.186698914 CEST8049711188.114.96.3192.168.2.6
                                    Oct 26, 2024 22:46:48.186806917 CEST4971180192.168.2.6188.114.96.3
                                    Oct 26, 2024 22:46:48.206006050 CEST4971180192.168.2.6188.114.96.3
                                    Oct 26, 2024 22:46:48.211397886 CEST8049711188.114.96.3192.168.2.6
                                    Oct 26, 2024 22:46:49.235842943 CEST8049711188.114.96.3192.168.2.6
                                    Oct 26, 2024 22:46:49.281084061 CEST4971180192.168.2.6188.114.96.3
                                    Oct 26, 2024 22:48:29.260927916 CEST4971180192.168.2.6188.114.96.3
                                    Oct 26, 2024 22:48:29.266916037 CEST8049711188.114.96.3192.168.2.6
                                    Oct 26, 2024 22:48:29.266972065 CEST4971180192.168.2.6188.114.96.3
                                    TimestampSource PortDest PortSource IPDest IP
                                    Oct 26, 2024 22:46:48.147811890 CEST6376753192.168.2.61.1.1.1
                                    Oct 26, 2024 22:46:48.171421051 CEST53637671.1.1.1192.168.2.6
                                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                    Oct 26, 2024 22:46:48.147811890 CEST192.168.2.61.1.1.10xaa5cStandard query (0)xilloolli.comA (IP address)IN (0x0001)false
                                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                    Oct 26, 2024 22:46:48.171421051 CEST1.1.1.1192.168.2.60xaa5cNo error (0)xilloolli.com188.114.96.3A (IP address)IN (0x0001)false
                                    Oct 26, 2024 22:46:48.171421051 CEST1.1.1.1192.168.2.60xaa5cNo error (0)xilloolli.com188.114.97.3A (IP address)IN (0x0001)false
                                    • xilloolli.com
                                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                    0192.168.2.649711188.114.96.3806084C:\Users\user\Desktop\DBUfLVzZhf.exe
                                    TimestampBytes transferredDirectionData
                                    Oct 26, 2024 22:46:48.206006050 CEST94OUTGET /api.php?status=1&wallets=0&av=1 HTTP/1.1
                                    Host: xilloolli.com
                                    Connection: Keep-Alive
                                    Oct 26, 2024 22:46:49.235842943 CEST750INHTTP/1.1 200 OK
                                    Date: Sat, 26 Oct 2024 20:46:49 GMT
                                    Content-Type: text/html; charset=UTF-8
                                    Transfer-Encoding: chunked
                                    Connection: keep-alive
                                    cf-cache-status: DYNAMIC
                                    Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=beCPlKIQLWiX4WDq%2F2AIt6sFiJrBg4psAYf7ea6V3E6XjolPZFRiP86gvLqnNwvOKFRagzVkdenVpigIp80KMTDr47RpWFtiZRT6VyBBl7oIfAqYCCRPfalAYsCuqsWo"}],"group":"cf-nel","max_age":604800}
                                    NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                    Server: cloudflare
                                    CF-RAY: 8d8d4c429a813ab9-DFW
                                    alt-svc: h3=":443"; ma=86400
                                    server-timing: cfL4;desc="?proto=TCP&rtt=1197&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=94&delivery_rate=0&cwnd=249&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                    Data Raw: 30 0d 0a 0d 0a
                                    Data Ascii: 0


                                    Click to jump to process

                                    Click to jump to process

                                    Click to dive into process behavior distribution

                                    Target ID:0
                                    Start time:16:46:45
                                    Start date:26/10/2024
                                    Path:C:\Users\user\Desktop\DBUfLVzZhf.exe
                                    Wow64 process (32bit):false
                                    Commandline:"C:\Users\user\Desktop\DBUfLVzZhf.exe"
                                    Imagebase:0x176d2340000
                                    File size:235'520 bytes
                                    MD5 hash:AC775CE03263340619836C9D01E8B2C3
                                    Has elevated privileges:true
                                    Has administrator privileges:true
                                    Programmed in:C, C++ or other language
                                    Yara matches:
                                    • Rule: JoeSecurity_JohnWalkerTexasLoader, Description: Yara detected JohnWalkerTexasLoader, Source: 00000000.00000000.2117061251.00000176D2342000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                    • Rule: JoeSecurity_JohnWalkerTexasLoader, Description: Yara detected JohnWalkerTexasLoader, Source: 00000000.00000002.3358819159.00000176D4171000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                    Reputation:low
                                    Has exited:false

                                    Reset < >
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3362641704.00007FFD342D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD342D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ffd342d0000_DBUfLVzZhf.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 99be723ea0c26c456e6339451b6573316b2ed18281e94f25d8e00981b039a80b
                                      • Instruction ID: 99196af93f34a16923584b1f7528cc3433f3c91a79e3f74f4d599e8d64fe8746
                                      • Opcode Fuzzy Hash: 99be723ea0c26c456e6339451b6573316b2ed18281e94f25d8e00981b039a80b
                                      • Instruction Fuzzy Hash: B1F1C630609A8D8FEBA8EF28C8557E977D1FF56310F04426EE85DC7291DF7998418B81
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3362641704.00007FFD342D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD342D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ffd342d0000_DBUfLVzZhf.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 5fbd4cc2d8745d80b79291781bc13d1b57f98f9ade3b5b84a881c6e2fec525e4
                                      • Instruction ID: 3e00d80145ef5935f0c943cafb492f206d785f46c7da406b54c6fcc361909199
                                      • Opcode Fuzzy Hash: 5fbd4cc2d8745d80b79291781bc13d1b57f98f9ade3b5b84a881c6e2fec525e4
                                      • Instruction Fuzzy Hash: 97E1C730A09A8E8FEBA8EF28D8657E977D1FF56310F04426ED85DC7291CF79A4448781
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3362641704.00007FFD342D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD342D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ffd342d0000_DBUfLVzZhf.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 3L_H
                                      • API String ID: 0-4286477518
                                      • Opcode ID: 5ee3bb736e18b6e9106626fa288ccd6020cc65b1e8689664f4e20bb9ef8541db
                                      • Instruction ID: 20690528385f9b1452fb1c9c858d270ccbc38b427f4d9dab0a701c42ccab2022
                                      • Opcode Fuzzy Hash: 5ee3bb736e18b6e9106626fa288ccd6020cc65b1e8689664f4e20bb9ef8541db
                                      • Instruction Fuzzy Hash: 97B1C520F0E9894FD755E76884B16AA7BE1EF4B304F0405BAD14DEB2D3CD2DAC829351
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3362641704.00007FFD342D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD342D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ffd342d0000_DBUfLVzZhf.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: L_h
                                      • API String ID: 0-554164850
                                      • Opcode ID: b5c8092bc028b95dcdc1e23db96e57775a2abdea561b6523b3a6e7fdb06accce
                                      • Instruction ID: 50aa0ea5b94b8751336e85bcf0e5e055b10531ea0d0fb2c5b1b2344ef4974c31
                                      • Opcode Fuzzy Hash: b5c8092bc028b95dcdc1e23db96e57775a2abdea561b6523b3a6e7fdb06accce
                                      • Instruction Fuzzy Hash: AC810215E0F6C64FE796A66844B55B97FE09F53214B0900F7C5ACFB1A3DC6E6C0A8321
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3362641704.00007FFD342D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD342D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ffd342d0000_DBUfLVzZhf.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: X64
                                      • API String ID: 0-3684969848
                                      • Opcode ID: 3993980fb89de647912745e8ab91ae069529875880ae264cfb9370a609888d21
                                      • Instruction ID: aa5be4b892aa1264f4431e83023bcbd97ca25833820a3b3ad8bf79e61863313a
                                      • Opcode Fuzzy Hash: 3993980fb89de647912745e8ab91ae069529875880ae264cfb9370a609888d21
                                      • Instruction Fuzzy Hash: 7D514B72F0E9894FF794EB6C94A55B97BD0EF5B310B0001BBD01DE7292DE29AC018740
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3362641704.00007FFD342D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD342D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ffd342d0000_DBUfLVzZhf.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: X64
                                      • API String ID: 0-3684969848
                                      • Opcode ID: 45f4ead09d32cce4d49ddc3179ea2c2afcefa89f617bf0b1cb7347ce86511995
                                      • Instruction ID: a788ab0fb83f079fbe9ce45815d8fb2295b0e7455acb2c1f5c0729a43d25ef08
                                      • Opcode Fuzzy Hash: 45f4ead09d32cce4d49ddc3179ea2c2afcefa89f617bf0b1cb7347ce86511995
                                      • Instruction Fuzzy Hash: 6E21F517B1E5960AE23072BE78611FA7B95DF83330B084177D38DDA183CD1E648A82D5
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3362641704.00007FFD342D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD342D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ffd342d0000_DBUfLVzZhf.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: p:4
                                      • API String ID: 0-1139921050
                                      • Opcode ID: fae33d808fee7a25db6a9dd5af78fec8dd8d7033d2c9b080fd48fec4e73673d0
                                      • Instruction ID: d4a94b3ad15c13a5749e3ff12c4a34b602e0220eec82869c0d6f0e88fdd9c683
                                      • Opcode Fuzzy Hash: fae33d808fee7a25db6a9dd5af78fec8dd8d7033d2c9b080fd48fec4e73673d0
                                      • Instruction Fuzzy Hash: CC213722B1FE890FE396AA7C486A2757BD1DF97161B4802FBC09DD71E3DC1D98068381
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3362641704.00007FFD342D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD342D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ffd342d0000_DBUfLVzZhf.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: X64
                                      • API String ID: 0-3684969848
                                      • Opcode ID: aa2b7dd81add6542cfc3895477ff7f9d941fe2959c8642a35e9180d437c23be1
                                      • Instruction ID: 1a6861844cfa1fe97d129e1a3e2a392c059a66bf9063fe17a5639edcd18960a7
                                      • Opcode Fuzzy Hash: aa2b7dd81add6542cfc3895477ff7f9d941fe2959c8642a35e9180d437c23be1
                                      • Instruction Fuzzy Hash: 98014772F0E9584FEB54DA1CA4A15F873D1EB9B710B00017AE11EE3396DE1AEC0147C1
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3362641704.00007FFD342D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD342D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ffd342d0000_DBUfLVzZhf.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: X64
                                      • API String ID: 0-3684969848
                                      • Opcode ID: e1c364808fab0d322bdda70ab8d7c69762c5334ecf92f0b43c4e0723cedc65d5
                                      • Instruction ID: c27bf556025c0ba0e6cb0cd870ba0fcff678e58e0ee98f51e0bac46ac8c149e8
                                      • Opcode Fuzzy Hash: e1c364808fab0d322bdda70ab8d7c69762c5334ecf92f0b43c4e0723cedc65d5
                                      • Instruction Fuzzy Hash: 25F0A716B0F6C60FE756963E08F92642EC1AF57350F8901FEC659EB1D3D81ED8458341
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3362641704.00007FFD342D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD342D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ffd342d0000_DBUfLVzZhf.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 4b9b5eef77493dfcd9b60b772ee978cd559a2034fdb65502beb50287ca94ffd2
                                      • Instruction ID: 5a2f0e04535b9f3a2c860b40c8802946b031839a9802656a7c3dba2bd6f35c11
                                      • Opcode Fuzzy Hash: 4b9b5eef77493dfcd9b60b772ee978cd559a2034fdb65502beb50287ca94ffd2
                                      • Instruction Fuzzy Hash: 7D32F410B0E6890FE75AA7A85471A6A7BD1DF87304F1804FEE18EEB2D3CD5DAC459312
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3362641704.00007FFD342D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD342D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ffd342d0000_DBUfLVzZhf.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 2329ef79cff9c95dc8a76434cc0958784fea5bfc14cf27041744b6253b942229
                                      • Instruction ID: 827ab3b4cf5655b732b3f91e46b887efb5f1bb9a1344e4c6ff42007ee5098cd3
                                      • Opcode Fuzzy Hash: 2329ef79cff9c95dc8a76434cc0958784fea5bfc14cf27041744b6253b942229
                                      • Instruction Fuzzy Hash: 0FD12421E0E68A0FEB55EB6848B56B97BE0DF57300F0401FAD15DEB2E3DD2DA8458361
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3362641704.00007FFD342D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD342D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ffd342d0000_DBUfLVzZhf.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 71ec3a5fde4b8e558db97ca5452ebfb4bd3b69e1c3f12eb29991571f8451b3ab
                                      • Instruction ID: cebd7036302ff6a6c88b4aaa9bde8ca7cf0aa9f7487c0c014d4bb84947fce99d
                                      • Opcode Fuzzy Hash: 71ec3a5fde4b8e558db97ca5452ebfb4bd3b69e1c3f12eb29991571f8451b3ab
                                      • Instruction Fuzzy Hash: 7A713762B0FA8A4FF756E7A848B66B97BD1EF57200B0405FAD05DEB5D3CD1D68058301
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3362641704.00007FFD342D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD342D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ffd342d0000_DBUfLVzZhf.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 97ebb786bfdde1f97705ac6c41cdf14dfea3a4816ff73aaddec973341baf1449
                                      • Instruction ID: ff2882f0929eed3ae8a2bf5bc587b116e46d668f69e3d1e28c4259b686deede4
                                      • Opcode Fuzzy Hash: 97ebb786bfdde1f97705ac6c41cdf14dfea3a4816ff73aaddec973341baf1449
                                      • Instruction Fuzzy Hash: 81518331D08A1C8FDB68DF58D855BE9BBF1FB59310F0082AAD04DE3252DE35A9858F81
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3362641704.00007FFD342D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD342D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ffd342d0000_DBUfLVzZhf.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: bceb5d9e88580eb1935700f9edce6943d1301368d758c7f9530d3fc454112523
                                      • Instruction ID: d613e275861de0e4e34333ae28cc25fb97fc3d5d4bb32d831789509f08c7453b
                                      • Opcode Fuzzy Hash: bceb5d9e88580eb1935700f9edce6943d1301368d758c7f9530d3fc454112523
                                      • Instruction Fuzzy Hash: F8513E7090DB8C8FDB58DF58D889AE9BBE0FB69311F10412EE14DC3252C774A441CB91
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3362641704.00007FFD342D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD342D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ffd342d0000_DBUfLVzZhf.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: d8c09f4adcf8d3a94a4d127464d5912e0a00ec70f4ac03ca9be5590270f91375
                                      • Instruction ID: 06da91b04c00dbb0a37ae8d5ca930fdefdf681c7e3663461d0286fa375cc2794
                                      • Opcode Fuzzy Hash: d8c09f4adcf8d3a94a4d127464d5912e0a00ec70f4ac03ca9be5590270f91375
                                      • Instruction Fuzzy Hash: C541D731F1AD0E4FEB94EB6884A52BD77E1FF9A300B400076D51DE3292DE2DAC419760
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3362364471.00007FFD341BD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD341BD000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ffd341bd000_DBUfLVzZhf.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 5c531a725026500a1522fc3cc3c4247401114a356b9c3635cefc76d0a60b8ec5
                                      • Instruction ID: 34b190561f205c4ba18c487dbec5bfa7fee7ba8b68c876fc054b4cefc2fded2a
                                      • Opcode Fuzzy Hash: 5c531a725026500a1522fc3cc3c4247401114a356b9c3635cefc76d0a60b8ec5
                                      • Instruction Fuzzy Hash: 1641E43190DB844FE75A9B2898959523FF0EF57320B1501EFD08CCB1A3DA69A846C7A2
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3362641704.00007FFD342D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD342D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ffd342d0000_DBUfLVzZhf.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 7936a562153961c2ecce526cfdaa45fdeda7c370817cc813f52e447c7d970c3b
                                      • Instruction ID: a2881454d606e10c4ab9fc2bab702235608867a7b6a0bdd2f8bcd9cf2dbb1f23
                                      • Opcode Fuzzy Hash: 7936a562153961c2ecce526cfdaa45fdeda7c370817cc813f52e447c7d970c3b
                                      • Instruction Fuzzy Hash: 89413B70A0864C8FDB58EF98D455BEDBBB1FB59311F00816ED00EE7252DB75A486CB81
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3362641704.00007FFD342D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD342D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ffd342d0000_DBUfLVzZhf.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b9ae60b9bb52bd739c03b55616750231ff26239ca10c9a478266f5689fb7a2c1
                                      • Instruction ID: 4a4da5f24643c102ff9d54f8dbc54422113202adb769459bb1cea846217acae4
                                      • Opcode Fuzzy Hash: b9ae60b9bb52bd739c03b55616750231ff26239ca10c9a478266f5689fb7a2c1
                                      • Instruction Fuzzy Hash: E431D115F0EA990FE755A7A848766AABBE0EF5B200F4801FBE14CE76D3CD1D6C019352
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3362641704.00007FFD342D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD342D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ffd342d0000_DBUfLVzZhf.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 448a03da2478eb7c90a9097c4f5741dacceddc6139d0a740610a7f90ec264868
                                      • Instruction ID: 199f15379ee1783645f41c462dfa339adea28c021e6dbdb77c1cda62dad08052
                                      • Opcode Fuzzy Hash: 448a03da2478eb7c90a9097c4f5741dacceddc6139d0a740610a7f90ec264868
                                      • Instruction Fuzzy Hash: FA21B59CE5F0E621E90836A354F21FA25914F47642F80043AF3FEF91D38C1EB008B1AA
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3362641704.00007FFD342D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD342D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ffd342d0000_DBUfLVzZhf.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 31eef561e0db99db17399f219f1897a7dadfe8b7b038ed34f7b0f20f7afde0ef
                                      • Instruction ID: b6040f10a1ed2e20a408b54be7813d14fb00f7533cbf0e15d4e617226420017e
                                      • Opcode Fuzzy Hash: 31eef561e0db99db17399f219f1897a7dadfe8b7b038ed34f7b0f20f7afde0ef
                                      • Instruction Fuzzy Hash: D8119E31E0E2064FFBA4DA28C8E053637D0DF87380F0401B9E459E72D1FE29E8459252
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3362641704.00007FFD342D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD342D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ffd342d0000_DBUfLVzZhf.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 8e9ef476f4dd04139be9eb66a92f2faf1731e2443d6b848f2a5fe923ac566db3
                                      • Instruction ID: 29b4097a770451b0883787bae4849acd95dde7244fe42fbe27f787db708fefff
                                      • Opcode Fuzzy Hash: 8e9ef476f4dd04139be9eb66a92f2faf1731e2443d6b848f2a5fe923ac566db3
                                      • Instruction Fuzzy Hash: E3F0AF16F1F7CA4FE752A6A408721A43FA1AF87250B8605F3C46DEB0E3EC1D980D4322
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3362641704.00007FFD342D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD342D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ffd342d0000_DBUfLVzZhf.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: b1c86b84f26849c7546cb4bb1534dfb8e3b7253e6bddb415d8580d64186731bc
                                      • Instruction ID: e83e37de24b5bb6f33813a9a309bd15afb535ca2d9c4862e822c2256583fcb97
                                      • Opcode Fuzzy Hash: b1c86b84f26849c7546cb4bb1534dfb8e3b7253e6bddb415d8580d64186731bc
                                      • Instruction Fuzzy Hash: 4DF0346290E3E24FE72B5B7428751A03F705B13215B0A01EBC898EB0E7E40C5C88C3A3
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3362641704.00007FFD342D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD342D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ffd342d0000_DBUfLVzZhf.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: bf6881f28cbffac1ffb91674d0851af73ac6892a0ddbed6bf6837c09828c2294
                                      • Instruction ID: 309e81fb3d45ece694e9d802c3a5bf940a96f51683deaa9ff280a643bfd3f87d
                                      • Opcode Fuzzy Hash: bf6881f28cbffac1ffb91674d0851af73ac6892a0ddbed6bf6837c09828c2294
                                      • Instruction Fuzzy Hash: 15F08946F4F9D20BFB68A96E18A92F465809B43610F091176D9A8E71D2D84E6DC45381
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3362641704.00007FFD342D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD342D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ffd342d0000_DBUfLVzZhf.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 749ac9d3abb6b6e6c9789985c803d97fb56037c0c908af95c12151af0d0b32a6
                                      • Instruction ID: fea6d69d32380cd12bd872d1ba562f0aeef5cbb28d00447003cc63f6e7ee8a83
                                      • Opcode Fuzzy Hash: 749ac9d3abb6b6e6c9789985c803d97fb56037c0c908af95c12151af0d0b32a6
                                      • Instruction Fuzzy Hash: 87F0A03495E688AFCB02AB7088654ED7BB0EF06300F4100EBE408D70A2EA3869598B81
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3362641704.00007FFD342D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD342D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ffd342d0000_DBUfLVzZhf.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 2c760e7d21cc1a5dd626695a1b2691e64c10612d778dabd65ac809967e5d1110
                                      • Instruction ID: e94237d101a8f0202788242163f36cdff200e8edc037a4d46c8f2faba5f21336
                                      • Opcode Fuzzy Hash: 2c760e7d21cc1a5dd626695a1b2691e64c10612d778dabd65ac809967e5d1110
                                      • Instruction Fuzzy Hash: CBE0869694F7C11FD75252340C3A2947F90BF17210F4D02FBC584CB4D3D90E84499712
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3362641704.00007FFD342D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD342D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ffd342d0000_DBUfLVzZhf.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: =L_H
                                      • API String ID: 0-530646013
                                      • Opcode ID: 447223c06d7a94613435c84b129f74e95ed919ea28b9534df225c3ea6a01e1f7
                                      • Instruction ID: 2d8c5d53394601e9efb52747140ac6d907b0da820eb9caa69a8866582046efa8
                                      • Opcode Fuzzy Hash: 447223c06d7a94613435c84b129f74e95ed919ea28b9534df225c3ea6a01e1f7
                                      • Instruction Fuzzy Hash: CDE1C044F0E9C64FD352A77848759AA6FE18F8B208B5804FAC25DFF2C7DC5E68068352
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3362641704.00007FFD342D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD342D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ffd342d0000_DBUfLVzZhf.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 4
                                      • API String ID: 0-4088798008
                                      • Opcode ID: d0ba725a549fc170528694cf2f6a2751cf44fc81c7db1fca3384d135d2d5632d
                                      • Instruction ID: a8ca7f54c984ec206d2db67b9d28c5ba5b1428b5e8a40c1481121b69ae8ca154
                                      • Opcode Fuzzy Hash: d0ba725a549fc170528694cf2f6a2751cf44fc81c7db1fca3384d135d2d5632d
                                      • Instruction Fuzzy Hash: 16B1055BB0F7D20AE762962C18F60E57F90EF5322570902F7C6D4D6093AD0F640BA272
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3362641704.00007FFD342D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD342D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ffd342d0000_DBUfLVzZhf.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 1M_^
                                      • API String ID: 0-2690736931
                                      • Opcode ID: 8751565b550f18d6964cca6862b1b29668e571ce82f87d286b94a5f8e2dddb74
                                      • Instruction ID: e3d661042723dfcdd0001cb4c3164845c32eeadc9757e83480b37010e5852b9b
                                      • Opcode Fuzzy Hash: 8751565b550f18d6964cca6862b1b29668e571ce82f87d286b94a5f8e2dddb74
                                      • Instruction Fuzzy Hash: 8531063BA0F3D68FE712AB7C58A20E97FA0EF4332570902B7C184DA493D91A640AC751
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3362641704.00007FFD342D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD342D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ffd342d0000_DBUfLVzZhf.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: 1M_^
                                      • API String ID: 0-2690736931
                                      • Opcode ID: 978d3b9f43d8c2d3bff705c967d3019e395aebb8ab7aaaf236e7b5a501d4da13
                                      • Instruction ID: 4000ccb1afa5bf65f4c0e57c98c5d24f19506edf6270b079c59fe22dd48b74fe
                                      • Opcode Fuzzy Hash: 978d3b9f43d8c2d3bff705c967d3019e395aebb8ab7aaaf236e7b5a501d4da13
                                      • Instruction Fuzzy Hash: 3331E62BA0E7D68FE7526B7C58B20E97FA0DF4332570902B7C184DA493D91A640AC751
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3362641704.00007FFD342D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD342D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ffd342d0000_DBUfLVzZhf.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 03e755016dccd2233f308394146d9bd870a04995cf3a8651031b114c22886d3a
                                      • Instruction ID: 0ffb0b6662c54d4aed8f3d720140af67d1ae23794cf88ad36d1f0b1ee6a415a2
                                      • Opcode Fuzzy Hash: 03e755016dccd2233f308394146d9bd870a04995cf3a8651031b114c22886d3a
                                      • Instruction Fuzzy Hash: 7F02276BB0F6DA4BE7126A6CA8B50F97B50DF9323570903B7C194DB493ED1B240BC291
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3362641704.00007FFD342D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD342D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ffd342d0000_DBUfLVzZhf.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 9866d9fd898acf53c8cf7b417f678526cbaf1bde9be2cc7f26b4318b82f3bebc
                                      • Instruction ID: 8e0d9e0f53cb3ce2b804f7da529a192920ba5d6edd6962f63f57c1f20bd99880
                                      • Opcode Fuzzy Hash: 9866d9fd898acf53c8cf7b417f678526cbaf1bde9be2cc7f26b4318b82f3bebc
                                      • Instruction Fuzzy Hash: 1461DA37B0E6AA8BD7117F7CA8A10E9BB64DF4333570903B7C588DA443D91A644AC791
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3362641704.00007FFD342D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD342D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ffd342d0000_DBUfLVzZhf.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: d7bce9bc0b3e5e48bf0849fa2aec39a1d53b63f6d80490ce5fdf9d3aad050523
                                      • Instruction ID: 9cb597e5214df37fb571741a5e71356d1251f72cc14c8b3390a0174314853d90
                                      • Opcode Fuzzy Hash: d7bce9bc0b3e5e48bf0849fa2aec39a1d53b63f6d80490ce5fdf9d3aad050523
                                      • Instruction Fuzzy Hash: 1941F92B70F7D64FE7126A6C68A10E9BF60DF8336570902B7C284DA493D91B640AC751
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3362641704.00007FFD342D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD342D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ffd342d0000_DBUfLVzZhf.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID:
                                      • API String ID:
                                      • Opcode ID: 93b60d23ac80196ee31c41ded4f4d0465be794756cd5d3a0f1f1ba876b2fc781
                                      • Instruction ID: f32fddeea4288a34779f8a841f9a79307d27f2f525cc9fe8dceaa7eeacb93255
                                      • Opcode Fuzzy Hash: 93b60d23ac80196ee31c41ded4f4d0465be794756cd5d3a0f1f1ba876b2fc781
                                      • Instruction Fuzzy Hash: A031C62BA0E7D68FE7526A7C58B20E97FA0DF4332570902B7C584DA493D91A640AC751
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3362641704.00007FFD342D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD342D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ffd342d0000_DBUfLVzZhf.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: L_^$L_^$L_^$L_^$L_^$L_^$L_^$L_^
                                      • API String ID: 0-1065219198
                                      • Opcode ID: a56fef3468f7bad6f7f50795858e6e13c088520d0c010711011e7a6848f30708
                                      • Instruction ID: 5af682d36447ced257b5e75bd9660733118aaf353c29a1ad0f4772bddf7b79af
                                      • Opcode Fuzzy Hash: a56fef3468f7bad6f7f50795858e6e13c088520d0c010711011e7a6848f30708
                                      • Instruction Fuzzy Hash: 835195E7A0FAC60AE752565548F50E42B60EF53344B4D00F6CAF4FB1A7AE1E640B521B
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3362641704.00007FFD342D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD342D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ffd342d0000_DBUfLVzZhf.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: L_^$L_^$L_^$L_^$L_^$L_^$L_^
                                      • API String ID: 0-358832956
                                      • Opcode ID: a6c2bc757736bb2af5c77a7fb7e752ebe140eefd4f682ae19bbe550e8807ad53
                                      • Instruction ID: 3e3bae642d4502b8a6acb8c1dd591561e044214266d48a85db7dae8725303017
                                      • Opcode Fuzzy Hash: a6c2bc757736bb2af5c77a7fb7e752ebe140eefd4f682ae19bbe550e8807ad53
                                      • Instruction Fuzzy Hash: 9B4176E7A0FAC60AE652561508F50E42B60EF63344B4D00F6CAF4BF1A7AD1E680B561B
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3362641704.00007FFD342D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD342D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ffd342d0000_DBUfLVzZhf.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: L_^$L_^$L_^$L_^$L_^
                                      • API String ID: 0-2264858084
                                      • Opcode ID: d740908d8f61a377d1bda29d461cdd4cbd3fec4c6d7c2590bf4cfcc9955ea769
                                      • Instruction ID: 29bcc615fd24d4e65ee503a9e9b245f333b797d21001dfd90ed5b71b76681c53
                                      • Opcode Fuzzy Hash: d740908d8f61a377d1bda29d461cdd4cbd3fec4c6d7c2590bf4cfcc9955ea769
                                      • Instruction Fuzzy Hash: 064198FBF0FAC206F151565908E91B42B91EF63359B4900F9C7B8EB0E3AD5F640B5219
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3362641704.00007FFD342D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD342D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ffd342d0000_DBUfLVzZhf.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: L_^$L_^$L_^$L_^$L_^
                                      • API String ID: 0-2264858084
                                      • Opcode ID: 19df141aaebeb12bc59d09487a829f0258b3269adde2120a04d2d1c4fbed19cc
                                      • Instruction ID: 337754d67aa98f499e34c140d4e3f4e187ce2d7a92711e7da4e08274f7ca1f6f
                                      • Opcode Fuzzy Hash: 19df141aaebeb12bc59d09487a829f0258b3269adde2120a04d2d1c4fbed19cc
                                      • Instruction Fuzzy Hash: 7141B9E7F0F9C307E256565908E90A86B90FF63354B4D01F6C6F8A70E3AD1F640B9256
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3362641704.00007FFD342D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD342D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ffd342d0000_DBUfLVzZhf.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: @:4$P:4$`:4$p:4
                                      • API String ID: 0-2620099308
                                      • Opcode ID: 278e8c19a9842a61dfc00ae8a7ff4d5e66d7e9d1e9c15dfeab3e091822274573
                                      • Instruction ID: f47eb5848831077073fe84cc0ab05446a64ce60b0014c9778998a61497c55949
                                      • Opcode Fuzzy Hash: 278e8c19a9842a61dfc00ae8a7ff4d5e66d7e9d1e9c15dfeab3e091822274573
                                      • Instruction Fuzzy Hash: F8518866A0FAC44FE3219E685C566E97FF0EF57320F0441BFD189D7193C929A84AC782
                                      Strings
                                      Memory Dump Source
                                      • Source File: 00000000.00000002.3362641704.00007FFD342D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFD342D0000, based on PE: false
                                      Joe Sandbox IDA Plugin
                                      • Snapshot File: hcaresult_0_2_7ffd342d0000_DBUfLVzZhf.jbxd
                                      Similarity
                                      • API ID:
                                      • String ID: L_^$L_^$L_^$L_^
                                      • API String ID: 0-2357752022
                                      • Opcode ID: 89e2b047fbf704c826f3eb7728c133a92af512ada5f80322df310ffd354c8f5d
                                      • Instruction ID: 1ba88b36c62f0170141ee49838bbe9c4714f86a9b8dd91115db95fa97a96b4e0
                                      • Opcode Fuzzy Hash: 89e2b047fbf704c826f3eb7728c133a92af512ada5f80322df310ffd354c8f5d
                                      • Instruction Fuzzy Hash: 963182F7B0BAC24EE257564908E91E43B91FF63344B4E00FAC6B4EB0A3AD2B540F5601