Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SR3JZpolPo.exe

Overview

General Information

Sample name:SR3JZpolPo.exe
renamed because original name is a hash value
Original sample name:8c798159c3a931358b6893cf0ac112a99f4723c8.exe
Analysis ID:1542942
MD5:1df7578e410bb0e6415443f4ad5889cd
SHA1:8c798159c3a931358b6893cf0ac112a99f4723c8
SHA256:d388566fa25f7f0c4ede9eede268b3b027daba62d2319c315d39374358037c24
Tags:dllexeJohnWalkerTexasLoaderJWTLJWTLoaderReversingLabsuser-NDA0E
Infos:

Detection

JohnWalkerTexasLoader
Score:76
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Yara detected JohnWalkerTexasLoader
AI detected suspicious sample
Queries memory information (via WMI often done to detect virtual machines)
Queries sensitive physical memory information (via WMI, Win32_PhysicalMemory, often done to detect virtual machines)
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Detected potential crypto function
Enables debug privileges
HTTP GET or POST without a user agent
IP address seen in connection with other malware
PE file does not import any functions
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • SR3JZpolPo.exe (PID: 3632 cmdline: "C:\Users\user\Desktop\SR3JZpolPo.exe" MD5: 1DF7578E410BB0E6415443F4AD5889CD)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
SR3JZpolPo.exeJoeSecurity_JohnWalkerTexasLoaderYara detected JohnWalkerTexasLoaderJoe Security
    SourceRuleDescriptionAuthorStrings
    00000002.00000000.1280833003.000002741E902000.00000002.00000001.01000000.00000004.sdmpJoeSecurity_JohnWalkerTexasLoaderYara detected JohnWalkerTexasLoaderJoe Security
      00000002.00000002.2535087346.0000027420531000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_JohnWalkerTexasLoaderYara detected JohnWalkerTexasLoaderJoe Security
        Process Memory Space: SR3JZpolPo.exe PID: 3632JoeSecurity_JohnWalkerTexasLoaderYara detected JohnWalkerTexasLoaderJoe Security
          SourceRuleDescriptionAuthorStrings
          2.0.SR3JZpolPo.exe.2741e900000.0.unpackJoeSecurity_JohnWalkerTexasLoaderYara detected JohnWalkerTexasLoaderJoe Security
            No Sigma rule has matched
            No Suricata rule has matched

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: SR3JZpolPo.exeAvira: detected
            Source: SR3JZpolPo.exeReversingLabs: Detection: 47%
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 97.4% probability
            Source: SR3JZpolPo.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: Binary string: C:\Users\Administrator\Pictures\DiffPatchWpf-main\obj\x64\Release\DiffPatchWpf.pdb source: SR3JZpolPo.exe
            Source: global trafficHTTP traffic detected: GET /api.php?status=1&wallets=0&av=1 HTTP/1.1Host: xilloolli.comConnection: Keep-Alive
            Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
            Source: Joe Sandbox ViewIP Address: 188.114.97.3 188.114.97.3
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: global trafficHTTP traffic detected: GET /api.php?status=1&wallets=0&av=1 HTTP/1.1Host: xilloolli.comConnection: Keep-Alive
            Source: global trafficDNS traffic detected: DNS query: xilloolli.com
            Source: SR3JZpolPo.exe, 00000002.00000002.2535087346.0000027420531000.00000004.00000800.00020000.00000000.sdmp, SR3JZpolPo.exe, 00000002.00000002.2535087346.00000274209B6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
            Source: SR3JZpolPo.exe, 00000002.00000002.2535087346.0000027420531000.00000004.00000800.00020000.00000000.sdmp, SR3JZpolPo.exe, 00000002.00000002.2535087346.00000274209B6000.00000004.00000800.00020000.00000000.sdmp, SR3JZpolPo.exe, 00000002.00000002.2535087346.00000274209C9000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://xilloolli.com
            Source: SR3JZpolPo.exe, 00000002.00000002.2535087346.0000027420531000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://xilloolli.com/api-debug.php
            Source: SR3JZpolPo.exe, 00000002.00000002.2535087346.0000027420531000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://xilloolli.com/api.php
            Source: SR3JZpolPo.exe, 00000002.00000002.2535087346.0000027420804000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://xilloolli.com/api.php?status=1&wa
            Source: SR3JZpolPo.exe, 00000002.00000002.2535087346.0000027420531000.00000004.00000800.00020000.00000000.sdmp, SR3JZpolPo.exe, 00000002.00000002.2535087346.0000027420804000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://xilloolli.com/api.php?status=1&wallets=0&av=1
            Source: SR3JZpolPo.exeString found in binary or memory: http://xilloolli.com/api.phpEhttp://xilloolli.com/api-debug.php
            Source: SR3JZpolPo.exeString found in binary or memory: https://github.com/reproteq/DiffPatchWpf3Copyright
            Source: SR3JZpolPo.exeString found in binary or memory: https://ipinfo.io/country
            Source: SR3JZpolPo.exeString found in binary or memory: https://ipinfo.io/ip
            Source: SR3JZpolPo.exeString found in binary or memory: https://oklibed.com
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeCode function: 2_2_00007FFAAC665DC62_2_00007FFAAC665DC6
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeCode function: 2_2_00007FFAAC666B722_2_00007FFAAC666B72
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeCode function: 2_2_00007FFAAC6658C92_2_00007FFAAC6658C9
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeCode function: 2_2_00007FFAAC6613202_2_00007FFAAC661320
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeCode function: 2_2_00007FFAAC6612FB2_2_00007FFAAC6612FB
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeCode function: 2_2_00007FFAAC6612D12_2_00007FFAAC6612D1
            Source: SR3JZpolPo.exeStatic PE information: No import functions for PE file found
            Source: SR3JZpolPo.exe, 00000002.00000000.1280871233.000002741E924000.00000002.00000001.01000000.00000004.sdmpBinary or memory string: OriginalFilenameDiffPatchWpf.exe2 vs SR3JZpolPo.exe
            Source: SR3JZpolPo.exeBinary or memory string: OriginalFilenameDiffPatchWpf.exe2 vs SR3JZpolPo.exe
            Source: classification engineClassification label: mal76.troj.evad.winEXE@1/0@1/1
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeMutant created: NULL
            Source: SR3JZpolPo.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: SR3JZpolPo.exeStatic file information: TRID: Win64 Executable GUI Net Framework (217006/5) 49.88%
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: SR3JZpolPo.exeReversingLabs: Detection: 47%
            Source: SR3JZpolPo.exeString found in binary or memory: EHH-ADD!IJJoEHH5JKK
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeSection loaded: dwrite.dllJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeSection loaded: msvcp140_clr0400.dllJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeSection loaded: dwmapi.dllJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeSection loaded: d3d9.dllJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeSection loaded: d3d10warp.dllJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeSection loaded: wtsapi32.dllJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeSection loaded: winsta.dllJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeSection loaded: powrprof.dllJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeSection loaded: umpdc.dllJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeSection loaded: dataexchange.dllJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeSection loaded: d3d11.dllJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeSection loaded: dcomp.dllJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeSection loaded: dxgi.dllJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeSection loaded: twinapi.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeSection loaded: resourcepolicyclient.dllJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeSection loaded: dxcore.dllJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeSection loaded: textshaping.dllJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeSection loaded: textinputframework.dllJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeSection loaded: coreuicomponents.dllJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeSection loaded: msctfui.dllJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeSection loaded: uiautomationcore.dllJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeSection loaded: rasapi32.dllJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeSection loaded: rasman.dllJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeSection loaded: rtutils.dllJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeSection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeSection loaded: d3dcompiler_47.dllJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
            Source: Window RecorderWindow detected: More than 3 window changes detected
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
            Source: SR3JZpolPo.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
            Source: SR3JZpolPo.exeStatic PE information: Image base 0x140000000 > 0x60000000
            Source: SR3JZpolPo.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: SR3JZpolPo.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
            Source: Binary string: C:\Users\Administrator\Pictures\DiffPatchWpf-main\obj\x64\Release\DiffPatchWpf.pdb source: SR3JZpolPo.exe
            Source: SR3JZpolPo.exeStatic PE information: 0x8D227D3E [Thu Jan 12 15:29:02 2045 UTC]
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeCode function: 2_2_00007FFAAC54D2A5 pushad ; iretd 2_2_00007FFAAC54D2A6
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeCode function: 2_2_00007FFAAC66849B push E95BE9CAh; ret 2_2_00007FFAAC6684A9
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PhysicalMemory
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PhysicalMemory
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeMemory allocated: 2741EC70000 memory reserve | memory write watchJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeMemory allocated: 27438530000 memory reserve | memory write watchJump to behavior
            Source: SR3JZpolPo.exe, 00000002.00000002.2536795766.0000027438E0F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: VMware Virtual RAM
            Source: SR3JZpolPo.exe, 00000002.00000002.2536795766.0000027438E0F000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: calMemoryPhysical Memory 0Win32_PhysicalMemoryPhysical MemoryPhysical MemoryPhysical MemoryRAM slot #0RAM slot #0VMware Virtual RAM00000001VMW-4096MBLMEM
            Source: SR3JZpolPo.exe, 00000002.00000002.2536795766.0000027438DE8000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Win32_PhysicalMemoryPhysical Memory 0Win32_PhysicalMemoryPhysical MemoryPhysical MemoryPhysical MemoryRAM slot #0RAM slot #0VMware Virtual RAM00000001VMW-4096MBo
            Source: SR3JZpolPo.exe, 00000002.00000002.2538132368.000002743D2C7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeMemory allocated: page read and write | page guardJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeQueries volume information: C:\Users\user\Desktop\SR3JZpolPo.exe VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\PresentationFramework-SystemXml\v4.0_4.0.0.0__b77a5c561934e089\PresentationFramework-SystemXml.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeQueries volume information: C:\Windows\Fonts\segoeuib.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeQueries volume information: C:\Windows\Fonts\segoeuib.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeQueries volume information: C:\Windows\Fonts\segoeui.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeQueries volume information: C:\Windows\Fonts\segoeuib.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeQueries volume information: C:\Windows\Fonts\segoeui.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\UIAutomationTypes\v4.0_4.0.0.0__31bf3856ad364e35\UIAutomationTypes.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\UIAutomationProvider\v4.0_4.0.0.0__31bf3856ad364e35\UIAutomationProvider.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeQueries volume information: C:\Windows\Fonts\segoeuib.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeQueries volume information: C:\Windows\Fonts\segoeuib.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeQueries volume information: C:\Windows\Fonts\segoeuib.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
            Source: SR3JZpolPo.exe, 00000002.00000002.2538132368.000002743D2C7000.00000004.00000020.00020000.00000000.sdmp, SR3JZpolPo.exe, 00000002.00000002.2534257717.000002741EB82000.00000004.00000020.00020000.00000000.sdmp, SR3JZpolPo.exe, 00000002.00000002.2537637555.000002743B40D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
            Source: C:\Users\user\Desktop\SR3JZpolPo.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: SR3JZpolPo.exe, type: SAMPLE
            Source: Yara matchFile source: 2.0.SR3JZpolPo.exe.2741e900000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000002.00000000.1280833003.000002741E902000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.2535087346.0000027420531000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: SR3JZpolPo.exe PID: 3632, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: SR3JZpolPo.exe, type: SAMPLE
            Source: Yara matchFile source: 2.0.SR3JZpolPo.exe.2741e900000.0.unpack, type: UNPACKEDPE
            Source: Yara matchFile source: 00000002.00000000.1280833003.000002741E902000.00000002.00000001.01000000.00000004.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000002.00000002.2535087346.0000027420531000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: SR3JZpolPo.exe PID: 3632, type: MEMORYSTR
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts21
            Windows Management Instrumentation
            1
            DLL Side-Loading
            1
            DLL Side-Loading
            11
            Virtualization/Sandbox Evasion
            OS Credential Dumping221
            Security Software Discovery
            Remote Services1
            Archive Collected Data
            1
            Encrypted Channel
            Exfiltration Over Other Network MediumAbuse Accessibility Features
            CredentialsDomainsDefault Accounts2
            Command and Scripting Interpreter
            Boot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
            Disable or Modify Tools
            LSASS Memory11
            Virtualization/Sandbox Evasion
            Remote Desktop ProtocolData from Removable Media1
            Ingress Tool Transfer
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
            Obfuscated Files or Information
            Security Account Manager12
            System Information Discovery
            SMB/Windows Admin SharesData from Network Shared Drive2
            Non-Application Layer Protocol
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
            Timestomp
            NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture2
            Application Layer Protocol
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
            DLL Side-Loading
            LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            SR3JZpolPo.exe47%ReversingLabsByteCode-MSIL.Trojan.Walgentz
            SR3JZpolPo.exe100%AviraTR/Agent.pkavf
            No Antivirus matches
            No Antivirus matches
            No Antivirus matches
            SourceDetectionScannerLabelLink
            http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
            NameIPActiveMaliciousAntivirus DetectionReputation
            xilloolli.com
            188.114.97.3
            truefalse
              unknown
              NameMaliciousAntivirus DetectionReputation
              http://xilloolli.com/api.php?status=1&wallets=0&av=1false
                unknown
                NameSourceMaliciousAntivirus DetectionReputation
                http://xilloolli.com/api.php?status=1&waSR3JZpolPo.exe, 00000002.00000002.2535087346.0000027420804000.00000004.00000800.00020000.00000000.sdmpfalse
                  unknown
                  https://ipinfo.io/countrySR3JZpolPo.exefalse
                    unknown
                    http://xilloolli.com/api.phpEhttp://xilloolli.com/api-debug.phpSR3JZpolPo.exefalse
                      unknown
                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameSR3JZpolPo.exe, 00000002.00000002.2535087346.0000027420531000.00000004.00000800.00020000.00000000.sdmp, SR3JZpolPo.exe, 00000002.00000002.2535087346.00000274209B6000.00000004.00000800.00020000.00000000.sdmpfalse
                      • URL Reputation: safe
                      unknown
                      http://xilloolli.com/api-debug.phpSR3JZpolPo.exe, 00000002.00000002.2535087346.0000027420531000.00000004.00000800.00020000.00000000.sdmpfalse
                        unknown
                        http://xilloolli.comSR3JZpolPo.exe, 00000002.00000002.2535087346.0000027420531000.00000004.00000800.00020000.00000000.sdmp, SR3JZpolPo.exe, 00000002.00000002.2535087346.00000274209B6000.00000004.00000800.00020000.00000000.sdmp, SR3JZpolPo.exe, 00000002.00000002.2535087346.00000274209C9000.00000004.00000800.00020000.00000000.sdmpfalse
                          unknown
                          http://xilloolli.com/api.phpSR3JZpolPo.exe, 00000002.00000002.2535087346.0000027420531000.00000004.00000800.00020000.00000000.sdmpfalse
                            unknown
                            https://oklibed.comSR3JZpolPo.exefalse
                              unknown
                              https://github.com/reproteq/DiffPatchWpf3CopyrightSR3JZpolPo.exefalse
                                unknown
                                https://ipinfo.io/ipSR3JZpolPo.exefalse
                                  unknown
                                  • No. of IPs < 25%
                                  • 25% < No. of IPs < 50%
                                  • 50% < No. of IPs < 75%
                                  • 75% < No. of IPs
                                  IPDomainCountryFlagASNASN NameMalicious
                                  188.114.97.3
                                  xilloolli.comEuropean Union
                                  13335CLOUDFLARENETUSfalse
                                  Joe Sandbox version:41.0.0 Charoite
                                  Analysis ID:1542942
                                  Start date and time:2024-10-26 22:46:50 +02:00
                                  Joe Sandbox product:CloudBasic
                                  Overall analysis duration:0h 4m 13s
                                  Hypervisor based Inspection enabled:false
                                  Report type:full
                                  Cookbook file name:default.jbs
                                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                  Number of analysed new started processes analysed:11
                                  Number of new started drivers analysed:0
                                  Number of existing processes analysed:0
                                  Number of existing drivers analysed:0
                                  Number of injected processes analysed:0
                                  Technologies:
                                  • HCA enabled
                                  • EGA enabled
                                  • AMSI enabled
                                  Analysis Mode:default
                                  Analysis stop reason:Timeout
                                  Sample name:SR3JZpolPo.exe
                                  renamed because original name is a hash value
                                  Original Sample Name:8c798159c3a931358b6893cf0ac112a99f4723c8.exe
                                  Detection:MAL
                                  Classification:mal76.troj.evad.winEXE@1/0@1/1
                                  EGA Information:Failed
                                  HCA Information:
                                  • Successful, ratio: 100%
                                  • Number of executed functions: 30
                                  • Number of non-executed functions: 8
                                  Cookbook Comments:
                                  • Found application associated with file extension: .exe
                                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                                  • Excluded domains from analysis (whitelisted): fs.microsoft.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
                                  • Execution Graph export aborted for target SR3JZpolPo.exe, PID 3632 because it is empty
                                  • Not all processes where analyzed, report is missing behavior information
                                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                  • Report size getting too big, too many NtQueryValueKey calls found.
                                  • Report size getting too big, too many NtReadVirtualMemory calls found.
                                  • VT rate limit hit for: SR3JZpolPo.exe
                                  No simulations
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  188.114.97.35Z1WFRMTOXRH6X21Z8NU8.exeGet hashmaliciousUnknownBrowse
                                  • artvisions-autoinsider.com/8bkjdSdfjCe/index.php
                                  PO 4800040256.exeGet hashmaliciousFormBookBrowse
                                  • www.cc101.pro/4hfb/
                                  QUOTATION_OCTQTRA071244#U00b7PDF.scr.exeGet hashmaliciousSnake KeyloggerBrowse
                                  • filetransfer.io/data-package/cDXpxO66/download
                                  Instruction_1928.pdf.lnk.download.lnkGet hashmaliciousLummaCBrowse
                                  • tech-tribune.shop/pLQvfD4d5/index.php
                                  WBCDZ4Z3M2667YBDZ5K4.bin.exeGet hashmaliciousUnknownBrowse
                                  • tech-tribune.shop/pLQvfD4d5/index.php
                                  yGktPvplJn.exeGet hashmaliciousPushdoBrowse
                                  • www.rs-ag.com/
                                  https://is.gd/6NgVrQGet hashmaliciousHTMLPhisherBrowse
                                  • aa.opencompanies.co.uk/vEXJm/
                                  Comprobante de pago.xlam.xlsxGet hashmaliciousUnknownBrowse
                                  • paste.ee/d/KXy1F
                                  01YP9Lwum8.exeGet hashmaliciousDCRatBrowse
                                  • 77777cm.nyashtyan.in/externalpipejsprocessAuthapiDbtrackWordpressCdn.php
                                  PO-000041522.exeGet hashmaliciousFormBookBrowse
                                  • www.freedietbuilder.online/nnla/
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  xilloolli.comDBUfLVzZhf.exeGet hashmaliciousJohnWalkerTexasLoaderBrowse
                                  • 188.114.96.3
                                  R5AREmpD4S.exeGet hashmaliciousJohnWalkerTexasLoaderBrowse
                                  • 188.114.96.3
                                  MHQMJCOxjl.exeGet hashmaliciousJohnWalkerTexasLoaderBrowse
                                  • 188.114.97.3
                                  73OPQbICEW.exeGet hashmaliciousJohnWalkerTexasLoaderBrowse
                                  • 188.114.96.3
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  CLOUDFLARENETUSDBUfLVzZhf.exeGet hashmaliciousJohnWalkerTexasLoaderBrowse
                                  • 188.114.96.3
                                  R5AREmpD4S.exeGet hashmaliciousJohnWalkerTexasLoaderBrowse
                                  • 188.114.96.3
                                  MHQMJCOxjl.exeGet hashmaliciousJohnWalkerTexasLoaderBrowse
                                  • 188.114.97.3
                                  73OPQbICEW.exeGet hashmaliciousJohnWalkerTexasLoaderBrowse
                                  • 188.114.96.3
                                  file.exeGet hashmaliciousLummaC, Amadey, Credential Flusher, LummaC Stealer, StealcBrowse
                                  • 104.21.95.91
                                  file.exeGet hashmaliciousLummaC, Amadey, LummaC Stealer, StealcBrowse
                                  • 172.67.170.64
                                  7950COPY.exeGet hashmaliciousFormBookBrowse
                                  • 188.114.96.3
                                  file.exeGet hashmaliciousLummaCBrowse
                                  • 188.114.96.3
                                  GK059kPZ5B.exeGet hashmaliciousStealcBrowse
                                  • 172.67.179.207
                                  TP77MvSzt2.exeGet hashmaliciousStealcBrowse
                                  • 104.21.56.70
                                  No context
                                  No context
                                  No created / dropped files found
                                  File type:PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
                                  Entropy (8bit):3.839856571614485
                                  TrID:
                                  • Win64 Executable GUI Net Framework (217006/5) 49.88%
                                  • Win64 Executable GUI (202006/5) 46.43%
                                  • Win64 Executable (generic) (12005/4) 2.76%
                                  • Generic Win/DOS Executable (2004/3) 0.46%
                                  • DOS Executable Generic (2002/1) 0.46%
                                  File name:SR3JZpolPo.exe
                                  File size:235'008 bytes
                                  MD5:1df7578e410bb0e6415443f4ad5889cd
                                  SHA1:8c798159c3a931358b6893cf0ac112a99f4723c8
                                  SHA256:d388566fa25f7f0c4ede9eede268b3b027daba62d2319c315d39374358037c24
                                  SHA512:ee0d841c72a87be578b105e73b6dccbaedd470368c46d3a9a584e4cb647331f21deacb519b49f31d6e8d6c4b88c905afb9d2a83161b5660fe888bc530285527a
                                  SSDEEP:768:s/KcA8cwAfZR6jTcyU6GIm6q/ugg0Apk/OIaEyEb3GOd53BRnW2i38SmFhgzgg0X:fwSXU1BBjzApoeP9zhpmy
                                  TLSH:8E34C5ABE32F6809CD2A32F1C8E443B45E605F116E10D6F964BDF2D5123499BFD189AC
                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d...>}"..........."...0.................. .....@..... ....................................`...@......@............... .....
                                  Icon Hash:1761174505056997
                                  Entrypoint:0x140000000
                                  Entrypoint Section:
                                  Digitally signed:false
                                  Imagebase:0x140000000
                                  Subsystem:windows gui
                                  Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                  DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                  Time Stamp:0x8D227D3E [Thu Jan 12 15:29:02 2045 UTC]
                                  TLS Callbacks:
                                  CLR (.Net) Version:
                                  OS Version Major:4
                                  OS Version Minor:0
                                  File Version Major:4
                                  File Version Minor:0
                                  Subsystem Version Major:4
                                  Subsystem Version Minor:0
                                  Import Hash:
                                  Instruction
                                  dec ebp
                                  pop edx
                                  nop
                                  add byte ptr [ebx], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax+eax], al
                                  add byte ptr [eax], al
                                  NameVirtual AddressVirtual Size Is in Section
                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x240000x18ca8.rsrc
                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x2243c0x38.text
                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20000x48.text
                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                  .text0x20000x204df0x206006aec3c9709d18c4c34d1726f3c85bb63False0.17729699565637067data4.265481202089609IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                  .rsrc0x240000x18ca80x18e00d46f216a7dfee89a5dd1ba2c032f2ffeFalse0.10476209170854271data3.1344838579936667IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                  RT_ICON0x241800x468Device independent bitmap graphic, 16 x 32 x 32, image size 10880.3962765957446808
                                  RT_ICON0x245f80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 42240.23381801125703564
                                  RT_ICON0x256b00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 96000.23278008298755187
                                  RT_ICON0x27c680x4228Device independent bitmap graphic, 64 x 128 x 32, image size 168960.12133915918752952
                                  RT_ICON0x2bea00x10828Device independent bitmap graphic, 128 x 256 x 32, image size 675840.06113214243463859
                                  RT_GROUP_ICON0x3c6d80x4cdata0.75
                                  RT_VERSION0x3c7340x374data0.416289592760181
                                  RT_MANIFEST0x3cab80x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                  TimestampSource PortDest PortSource IPDest IP
                                  Oct 26, 2024 22:47:50.043335915 CEST4969980192.168.2.7188.114.97.3
                                  Oct 26, 2024 22:47:50.048825026 CEST8049699188.114.97.3192.168.2.7
                                  Oct 26, 2024 22:47:50.048964024 CEST4969980192.168.2.7188.114.97.3
                                  Oct 26, 2024 22:47:50.050508022 CEST4969980192.168.2.7188.114.97.3
                                  Oct 26, 2024 22:47:50.055932045 CEST8049699188.114.97.3192.168.2.7
                                  Oct 26, 2024 22:47:51.117850065 CEST8049699188.114.97.3192.168.2.7
                                  Oct 26, 2024 22:47:51.165055990 CEST4969980192.168.2.7188.114.97.3
                                  Oct 26, 2024 22:49:31.139292002 CEST4969980192.168.2.7188.114.97.3
                                  Oct 26, 2024 22:49:31.377965927 CEST8049699188.114.97.3192.168.2.7
                                  Oct 26, 2024 22:49:31.378154993 CEST4969980192.168.2.7188.114.97.3
                                  TimestampSource PortDest PortSource IPDest IP
                                  Oct 26, 2024 22:47:49.972908974 CEST6130053192.168.2.71.1.1.1
                                  Oct 26, 2024 22:47:50.030539989 CEST53613001.1.1.1192.168.2.7
                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                  Oct 26, 2024 22:47:49.972908974 CEST192.168.2.71.1.1.10x1d3fStandard query (0)xilloolli.comA (IP address)IN (0x0001)false
                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                  Oct 26, 2024 22:47:50.030539989 CEST1.1.1.1192.168.2.70x1d3fNo error (0)xilloolli.com188.114.97.3A (IP address)IN (0x0001)false
                                  Oct 26, 2024 22:47:50.030539989 CEST1.1.1.1192.168.2.70x1d3fNo error (0)xilloolli.com188.114.96.3A (IP address)IN (0x0001)false
                                  • xilloolli.com
                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  0192.168.2.749699188.114.97.3803632C:\Users\user\Desktop\SR3JZpolPo.exe
                                  TimestampBytes transferredDirectionData
                                  Oct 26, 2024 22:47:50.050508022 CEST94OUTGET /api.php?status=1&wallets=0&av=1 HTTP/1.1
                                  Host: xilloolli.com
                                  Connection: Keep-Alive
                                  Oct 26, 2024 22:47:51.117850065 CEST752INHTTP/1.1 200 OK
                                  Date: Sat, 26 Oct 2024 20:47:51 GMT
                                  Content-Type: text/html; charset=UTF-8
                                  Transfer-Encoding: chunked
                                  Connection: keep-alive
                                  cf-cache-status: DYNAMIC
                                  Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=RtGE2M5zrzhxIGPXpA2ucgbZNMZ3Dt3NO4ebcCWmufxSe7qcN4GvyFPOaaGwSRwJWd%2F1aq4vQJD4eV6HuaTNoHUlsOGNlYUjRagWSS72GgRfro18PIt2BCe5%2BxoDnK3f"}],"group":"cf-nel","max_age":604800}
                                  NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                  Server: cloudflare
                                  CF-RAY: 8d8d4dc52c424635-DFW
                                  alt-svc: h3=":443"; ma=86400
                                  server-timing: cfL4;desc="?proto=TCP&rtt=1222&sent=1&recv=3&lost=0&retrans=0&sent_bytes=0&recv_bytes=94&delivery_rate=0&cwnd=246&unsent_bytes=0&cid=0000000000000000&ts=0&x=0"
                                  Data Raw: 30 0d 0a 0d 0a
                                  Data Ascii: 0


                                  Click to jump to process

                                  Click to jump to process

                                  Click to dive into process behavior distribution

                                  Target ID:2
                                  Start time:16:47:47
                                  Start date:26/10/2024
                                  Path:C:\Users\user\Desktop\SR3JZpolPo.exe
                                  Wow64 process (32bit):false
                                  Commandline:"C:\Users\user\Desktop\SR3JZpolPo.exe"
                                  Imagebase:0x2741e900000
                                  File size:235'008 bytes
                                  MD5 hash:1DF7578E410BB0E6415443F4AD5889CD
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_JohnWalkerTexasLoader, Description: Yara detected JohnWalkerTexasLoader, Source: 00000002.00000000.1280833003.000002741E902000.00000002.00000001.01000000.00000004.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_JohnWalkerTexasLoader, Description: Yara detected JohnWalkerTexasLoader, Source: 00000002.00000002.2535087346.0000027420531000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  Reputation:low
                                  Has exited:false

                                  Reset < >
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2540347376.00007FFAAC660000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC660000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7ffaac660000_SR3JZpolPo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 6db33cff9880f4fbf456409f66d080ea6d9ea8e184de1fe382c8e9370ba95a4e
                                    • Instruction ID: 27908fe5a9129bc1f61276fe6ab146a5a449913fabf267f2132070a3733869df
                                    • Opcode Fuzzy Hash: 6db33cff9880f4fbf456409f66d080ea6d9ea8e184de1fe382c8e9370ba95a4e
                                    • Instruction Fuzzy Hash: 26F1A370908A8D8FEBA9DF28D8567E977D1FF55300F04926EE84DC7291CB34E9458B81
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2540347376.00007FFAAC660000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC660000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7ffaac660000_SR3JZpolPo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 96fe847307314f06c9151ed1fdac1ddc450362c3555925608975c8178a7666f8
                                    • Instruction ID: b87036ad3e7e28059b925e54ab6fb22cc01b0622e1a08d0f10731e455d4872e5
                                    • Opcode Fuzzy Hash: 96fe847307314f06c9151ed1fdac1ddc450362c3555925608975c8178a7666f8
                                    • Instruction Fuzzy Hash: F6E1C030909A8D8FEBA9DF28D8567E977E1EF55310F04826EE84DC7291CE74E8458BC1
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2540347376.00007FFAAC660000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC660000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7ffaac660000_SR3JZpolPo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: +U0$ +U0$(+U0$(+U0$0+U0$0+U0$8+U0$8+U0$@+U0$@+U0$H+U0$H+U0$P+U0$P+U0$X+U0$X+U0$`+U0$`+U0$h+U0$h+U0$p+U0$p+U0$x"U0$x+U0$x+U0
                                    • API String ID: 0-183780905
                                    • Opcode ID: 96dd8f7f259d857d006e758254d958d77ff0b310960af5dcee71dd30e284a5c3
                                    • Instruction ID: 703687a8769603ef229ba38ff78ae61a0f220f4e136d44c3667f6f67c4da6253
                                    • Opcode Fuzzy Hash: 96dd8f7f259d857d006e758254d958d77ff0b310960af5dcee71dd30e284a5c3
                                    • Instruction Fuzzy Hash: C6127C51A0D5498FF74D9B6C9060B75BAC2EF9B380F1895BAE04EC72E7CC18EC4A4365
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2540347376.00007FFAAC660000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC660000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7ffaac660000_SR3JZpolPo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: x"U0$+U0$+U0
                                    • API String ID: 0-2357848508
                                    • Opcode ID: 683bfd748492e4421ee10039f26b56d5aed38a1aab8bf5b9db3330d2c2b5c298
                                    • Instruction ID: f59b2307536e19f9670fd54e5621709c8133c74ad41ce2cffc9d5ea3300b2a0e
                                    • Opcode Fuzzy Hash: 683bfd748492e4421ee10039f26b56d5aed38a1aab8bf5b9db3330d2c2b5c298
                                    • Instruction Fuzzy Hash: 0F91A061A0D9598FFB8AD72CD4516B8B7D2EF9A340F0465BAD00DC72D3CD29EC4A8391
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2540347376.00007FFAAC660000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC660000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7ffaac660000_SR3JZpolPo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: [S0$ZS0$ZS0
                                    • API String ID: 0-815626831
                                    • Opcode ID: 0e0dbb8770a8e2ec960293dcd0880d0ee15f8948d6c4ca584debc4bb32e51ba7
                                    • Instruction ID: 0cf3bf0ae6dc86e6b9a4171c1cdf16c306181760d78427398f20047548e72a8e
                                    • Opcode Fuzzy Hash: 0e0dbb8770a8e2ec960293dcd0880d0ee15f8948d6c4ca584debc4bb32e51ba7
                                    • Instruction Fuzzy Hash: C9518F55D0E68A8FF78EDB3884645A5AFE1AF57340B09A4F3C44DCA1E7DE28AC4C8354
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2540347376.00007FFAAC660000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC660000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7ffaac660000_SR3JZpolPo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: ZS0
                                    • API String ID: 0-4248540203
                                    • Opcode ID: d59cb4a09e0452bbf1f019af07392f3676bc35ccb68fd45e17cb6c5b3a1b8244
                                    • Instruction ID: bb459f0f1b06dfbbc4c4d8795c36c8448743bd38c77e7353025ae2a4b11a5ed9
                                    • Opcode Fuzzy Hash: d59cb4a09e0452bbf1f019af07392f3676bc35ccb68fd45e17cb6c5b3a1b8244
                                    • Instruction Fuzzy Hash: 38411861E0DA5A8FF78AE76884166B9BBD1FF56300F4466B7E00DC72D3DD18AC084391
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2540347376.00007FFAAC660000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC660000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7ffaac660000_SR3JZpolPo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: ^
                                    • API String ID: 0-1590793086
                                    • Opcode ID: 1e04dacc8ee32b44c85d691e7ac3a6eba725c436158bd139104821ba2db824fb
                                    • Instruction ID: 5f06bfa7c96d7cf3b92cdae69ee1d66058204228d0c5fbbcc9e28d4ff9fa62a4
                                    • Opcode Fuzzy Hash: 1e04dacc8ee32b44c85d691e7ac3a6eba725c436158bd139104821ba2db824fb
                                    • Instruction Fuzzy Hash: 4D01F53190855887EB29BFBCA8095FB7FD4EF46325F04517AE54DC6153DF28941682C8
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2540347376.00007FFAAC660000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC660000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7ffaac660000_SR3JZpolPo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: \M_L
                                    • API String ID: 0-2593406389
                                    • Opcode ID: 99eebc18349f74a3e79f7b744c59f6892d9365d60ff217b7a5ac28fe22defba9
                                    • Instruction ID: 6c87b5031e035b276ae9a6625224a12c8b76bed5ee2cd5532d1f86336aeeae24
                                    • Opcode Fuzzy Hash: 99eebc18349f74a3e79f7b744c59f6892d9365d60ff217b7a5ac28fe22defba9
                                    • Instruction Fuzzy Hash: 6201D471B0CD189FEB59DB5CA8115B8B7E1EB9A740B04616BD00EC7392DD10EC0583C1
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2540347376.00007FFAAC660000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC660000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7ffaac660000_SR3JZpolPo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: (U0
                                    • API String ID: 0-4229205907
                                    • Opcode ID: 518a8792fdd3dbc884d33081c5f9c9eccf9db87262addc0e7b71ffbed2ca8302
                                    • Instruction ID: be27f9cbe74c17e1f12bbd7c240bfa025aecfa75407c4078a4f05c7b6f5e6751
                                    • Opcode Fuzzy Hash: 518a8792fdd3dbc884d33081c5f9c9eccf9db87262addc0e7b71ffbed2ca8302
                                    • Instruction Fuzzy Hash: 0901A565D0E6899FE74AD72484155F8BFE0EF5A340F04A4B6D40DCB1A3DD28A9084392
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2540347376.00007FFAAC660000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC660000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7ffaac660000_SR3JZpolPo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: [S0
                                    • API String ID: 0-1456508744
                                    • Opcode ID: c970f17d20a036bf5d3036bd2c69daebfbda0e2ac84bcab8893b41d28c5c7d6d
                                    • Instruction ID: e77ca33b2e333b25e0880c5d14d2e6a674f3c87224fe750525a4e9acc9e14f6f
                                    • Opcode Fuzzy Hash: c970f17d20a036bf5d3036bd2c69daebfbda0e2ac84bcab8893b41d28c5c7d6d
                                    • Instruction Fuzzy Hash: D8018E56D0E7C68FE35B873888215A5BFE0AF57250B0D94F3C49CCA0D3DA1C98098392
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2540347376.00007FFAAC660000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC660000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7ffaac660000_SR3JZpolPo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 12ab48da5fc8a298f562444579da55383fb9823b1b3707aaf83c5d4c469a4a8a
                                    • Instruction ID: ca7a66d112decb2905ed511fb0b618cb3d01c5f42bda6a0a4e5f8d2f2df1253a
                                    • Opcode Fuzzy Hash: 12ab48da5fc8a298f562444579da55383fb9823b1b3707aaf83c5d4c469a4a8a
                                    • Instruction Fuzzy Hash: F3B1C570508A4D8FEB69DF28D8557E97BE1FF55310F04926EE84EC7292CA34E845CB82
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2540347376.00007FFAAC660000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC660000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7ffaac660000_SR3JZpolPo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: e6080bf4caadf7fd7dc432307ba6b4df40779bf62ef3a32c9b94d9efb0e1d730
                                    • Instruction ID: 6f0d95cbdcb82e80346df694051e10db5ae97c74288103e18a8377abc30f264c
                                    • Opcode Fuzzy Hash: e6080bf4caadf7fd7dc432307ba6b4df40779bf62ef3a32c9b94d9efb0e1d730
                                    • Instruction Fuzzy Hash: 1081287190E64A8FF79ADB288855579FFE1EF57340B0461BAD04DC72E2DE28DC4A8381
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2540347376.00007FFAAC660000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC660000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7ffaac660000_SR3JZpolPo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 7f1d1989e9deeda38dee5736478f0f97c2fae3f5522314c80d67b86d61510a2b
                                    • Instruction ID: 1456c3f3460917af516b40087d8ce1cc6e1dc155a9cc44ee209b33357a3db993
                                    • Opcode Fuzzy Hash: 7f1d1989e9deeda38dee5736478f0f97c2fae3f5522314c80d67b86d61510a2b
                                    • Instruction Fuzzy Hash: D1612927A0D9659BF31AEB7CB4511F9BF90EF86330B08A5B7D14DC7193CE18A44A42D0
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2540347376.00007FFAAC660000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC660000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7ffaac660000_SR3JZpolPo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 760d659f88338a8c3574d927aad9b1b2197ce476e3089e1a3262e1ea4fc87127
                                    • Instruction ID: 760680063c7f68741cd9dbe0cb59387c5804f8da2e305e4afce3809c0cf828f2
                                    • Opcode Fuzzy Hash: 760d659f88338a8c3574d927aad9b1b2197ce476e3089e1a3262e1ea4fc87127
                                    • Instruction Fuzzy Hash: 57518170908A5C8FEB59DF68D845BE9BBF1FB59310F1082AAD04DD3252DE34A9858FC1
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2540347376.00007FFAAC660000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC660000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7ffaac660000_SR3JZpolPo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 11dbba44ff7a587e8726ed13133c004bf5bb39eb2c8d05077d1f5e60315058bb
                                    • Instruction ID: 79276afc6e85d9bc13c69b2e8ba05360ed590c80a8e1816ebba5e184d37d4f1a
                                    • Opcode Fuzzy Hash: 11dbba44ff7a587e8726ed13133c004bf5bb39eb2c8d05077d1f5e60315058bb
                                    • Instruction Fuzzy Hash: 7C51A761A0DA898FF79ED76884656B9FBD1EF56300F1891BAD04DC72D3DD18EC098381
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2540347376.00007FFAAC660000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC660000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7ffaac660000_SR3JZpolPo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 08f45a37da4d0aabccc5a52f6d11df1142616aa31723e9856499c35f435c74af
                                    • Instruction ID: 54959c4cc71c5cf07381b175a1bb4a78423f9f9af18c02946bc1d83b5ee3263c
                                    • Opcode Fuzzy Hash: 08f45a37da4d0aabccc5a52f6d11df1142616aa31723e9856499c35f435c74af
                                    • Instruction Fuzzy Hash: 4951C261A0DA898FF78EE72884656B9FBD1EF56300F1890BAD04DC72D3DD18ED098391
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2540347376.00007FFAAC660000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC660000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7ffaac660000_SR3JZpolPo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 72e063939b854359e21f016759e2d9b99547a495ba1440213713260f17799887
                                    • Instruction ID: 1494d531ab7e34f94b7e33c4225cdc65151fd9fdf989544214f7391b9b232988
                                    • Opcode Fuzzy Hash: 72e063939b854359e21f016759e2d9b99547a495ba1440213713260f17799887
                                    • Instruction Fuzzy Hash: 6551D171E09E199FF7A9DF6C98455B9BBE1EF5A350B04627AD00DC32A2DE24AC0583D0
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2540347376.00007FFAAC660000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC660000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7ffaac660000_SR3JZpolPo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: e51485560f4ef71348917cac143abc4ec8452da71eda29909f3bc0f2176926d5
                                    • Instruction ID: 1b8d0c333530ba3cb7a84521cd55d501829f0e95c170928f64512d288ffeecc9
                                    • Opcode Fuzzy Hash: e51485560f4ef71348917cac143abc4ec8452da71eda29909f3bc0f2176926d5
                                    • Instruction Fuzzy Hash: F0512E7090DB8C8FDB58DF58D889AA9BBE0FBA9311F10412EE54DC3252CB71A445CB91
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2540347376.00007FFAAC660000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC660000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7ffaac660000_SR3JZpolPo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: b0cde54f81281496eb1f6e5e8f5bd8a2a6ec5cf2fdb9df4b4ed3895c5e612011
                                    • Instruction ID: 165849faa72906ab72ea63a1d22a110f3192a69616ec0025a43443d60b2b4fa6
                                    • Opcode Fuzzy Hash: b0cde54f81281496eb1f6e5e8f5bd8a2a6ec5cf2fdb9df4b4ed3895c5e612011
                                    • Instruction Fuzzy Hash: A741B571E1990E8FF799EB2884556B9F7E1FF99301B0491BAD40DD3291DE28DC4987C0
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2539892211.00007FFAAC54D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC54D000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7ffaac54d000_SR3JZpolPo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 6cef5eca2a3aecf1c5dd63ebc8a7905fae24c051e91912dddda93f8d315066eb
                                    • Instruction ID: 19eae39d132e20b6c4145d2e248f06e464a76b852e4dcc66f1cea8b6e415d139
                                    • Opcode Fuzzy Hash: 6cef5eca2a3aecf1c5dd63ebc8a7905fae24c051e91912dddda93f8d315066eb
                                    • Instruction Fuzzy Hash: D141F33144DBC48FE3568B29D8469627FF5EF43220B0501EFE08CCB1A3D665A84AC792
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2540347376.00007FFAAC660000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC660000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7ffaac660000_SR3JZpolPo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: ab4bd2aaa9ac3378e5fb18beb418701c3d136d5b6731f99a345058cf1c170495
                                    • Instruction ID: 26b899c5311f4ff1e1b286c6216bdb3394864e6e4c1cd55a6fb846c1eff13414
                                    • Opcode Fuzzy Hash: ab4bd2aaa9ac3378e5fb18beb418701c3d136d5b6731f99a345058cf1c170495
                                    • Instruction Fuzzy Hash: 4341AE6294E6D64EE31B837C98A40A47F90DF9326470A61FBC1D88F0A3ED18584B83D6
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2540347376.00007FFAAC660000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC660000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7ffaac660000_SR3JZpolPo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 2a28506755077f0280981c914c0f3d0d6b785e1629fae2505f55de6295d04d4f
                                    • Instruction ID: b60ab5d8710f256c6cff1457e5b859cb86b7ec4cd511a986a404a946a2865384
                                    • Opcode Fuzzy Hash: 2a28506755077f0280981c914c0f3d0d6b785e1629fae2505f55de6295d04d4f
                                    • Instruction Fuzzy Hash: 6931F57190CA4D8FEB59DB6CD849AE9BBE1FF56310F04826ED04DD7692CA24E40587C1
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2540347376.00007FFAAC660000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC660000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7ffaac660000_SR3JZpolPo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 5092b570ea42dd52a330300b4dc824fd63817582b519be543d98f8e0bdb7b041
                                    • Instruction ID: 75ba8d8302bb29174809e5fca6a5d587d7f26a9c9dfa1455f81791e927338932
                                    • Opcode Fuzzy Hash: 5092b570ea42dd52a330300b4dc824fd63817582b519be543d98f8e0bdb7b041
                                    • Instruction Fuzzy Hash: 45412B70A0864C8FDB58DF98D455BEDBBB1FB59310F00816ED00ED7252DB75A585CB81
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2540347376.00007FFAAC660000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC660000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7ffaac660000_SR3JZpolPo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 9c6db040fb3b0e3c700df7fb7246564322eee1bb7a9976f14ce8c5650d4cd9d1
                                    • Instruction ID: 67561222f0e82fe2dce4c6bce307a1bbdfc5c00722365a2cace14fa703b4197f
                                    • Opcode Fuzzy Hash: 9c6db040fb3b0e3c700df7fb7246564322eee1bb7a9976f14ce8c5650d4cd9d1
                                    • Instruction Fuzzy Hash: A0316261A0D5064BFB99F738C018BB8A7D1AF56341F15A0F6D40DCB1D3ED299C8A43A1
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2540347376.00007FFAAC660000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC660000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7ffaac660000_SR3JZpolPo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 170d07695bf7fe7be6cad8e1be728d8a37dd7ab3bbaf2f563e5379ee4cfa42e1
                                    • Instruction ID: 7e910c542c83e8ae794512b7887a7f7a8a21c9da0c22894ed6653a4094b0b05d
                                    • Opcode Fuzzy Hash: 170d07695bf7fe7be6cad8e1be728d8a37dd7ab3bbaf2f563e5379ee4cfa42e1
                                    • Instruction Fuzzy Hash: 8B31D452A0EA894FE39AD73C8859675BFD1DB96250B0891FBD44DCB2E3DC18DC4983C1
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2540347376.00007FFAAC660000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC660000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7ffaac660000_SR3JZpolPo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: c07b764195709c382bbc32069fcc21824d7174f109433fe9d01c1fe4f7f8d41f
                                    • Instruction ID: 4cbb443a565af752bd75f51094759639c407f9c08357c4d28dd8f29a650bcf3e
                                    • Opcode Fuzzy Hash: c07b764195709c382bbc32069fcc21824d7174f109433fe9d01c1fe4f7f8d41f
                                    • Instruction Fuzzy Hash: 1141CE91D0F9E6A6FA0FBBB654620B9B9919F53345F94B07AF09D090C3CC0CE40D92E6
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2540347376.00007FFAAC660000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC660000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7ffaac660000_SR3JZpolPo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: c2294b1c1c0d710ccdf9f6854c90f5bfed22a47fbd07c8efc4f5c3f468b12be7
                                    • Instruction ID: 7d0f9b030c72ff69f7f7a44b9668bcba7972f5e09ce8e503925e778f9af0bd52
                                    • Opcode Fuzzy Hash: c2294b1c1c0d710ccdf9f6854c90f5bfed22a47fbd07c8efc4f5c3f468b12be7
                                    • Instruction Fuzzy Hash: E0F0495280E7E18FE31B877418260A07F605B03240B0E60EBC488DB0E3D40CAC8883A3
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2540347376.00007FFAAC660000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC660000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7ffaac660000_SR3JZpolPo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 932edba2176ce70c24adaf82abbf358ef49acbbcb6ac82074a52b979e78a6fb7
                                    • Instruction ID: a5cf42f2df2608901e2d5a3a8dd13027048cdce94cbf04189628143e2135e4a6
                                    • Opcode Fuzzy Hash: 932edba2176ce70c24adaf82abbf358ef49acbbcb6ac82074a52b979e78a6fb7
                                    • Instruction Fuzzy Hash: DCF044B184E7C18FF3169B209C27191BFA0BB52210F0992ABD08C4B1D2D75D950D8741
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2540347376.00007FFAAC660000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC660000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7ffaac660000_SR3JZpolPo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 7d8098cfd9a951248ffe0f8f69610d01c4fb0b8c94a1db64f3ec505e420c7bec
                                    • Instruction ID: b3947a9c4cc3d1f52ce02125df93d36781c48fd70bd6766b598364b5bcced9ba
                                    • Opcode Fuzzy Hash: 7d8098cfd9a951248ffe0f8f69610d01c4fb0b8c94a1db64f3ec505e420c7bec
                                    • Instruction Fuzzy Hash: E9F0E941D1DE629BF76DEA5D14562B0B980E742350F4C7076D84CD75D7D84CACC803D2
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2540347376.00007FFAAC660000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC660000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7ffaac660000_SR3JZpolPo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: e4c2aaad873bdfc9f5d4d119500f8aad3854da4860cb90caa059a954990fca57
                                    • Instruction ID: 26792c489183d4ba504a79a3dadc9a7e08d436cf7901e29bb24884e565da06aa
                                    • Opcode Fuzzy Hash: e4c2aaad873bdfc9f5d4d119500f8aad3854da4860cb90caa059a954990fca57
                                    • Instruction Fuzzy Hash: 05E08600F5AD4657F74EEA6E0C59274BDC2DB9A750FD8B075D40DC62D1EC49DC9801C5
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2540347376.00007FFAAC660000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC660000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7ffaac660000_SR3JZpolPo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 1N_^
                                    • API String ID: 0-2720521594
                                    • Opcode ID: 110da0a23d24a01f14e2126e0722e934afa4edd74179c540b99dbc873dc38bf0
                                    • Instruction ID: 5443a7b6c21425ea603e50fbbd68009cda02462e146899c4f9d3eaf413135571
                                    • Opcode Fuzzy Hash: 110da0a23d24a01f14e2126e0722e934afa4edd74179c540b99dbc873dc38bf0
                                    • Instruction Fuzzy Hash: A651726790E7E28BE717973C98A51D1BFA0DF1327970951F7C2C9CF0A3D904A80A8392
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2540347376.00007FFAAC660000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC660000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7ffaac660000_SR3JZpolPo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 93a24644639dd89aebf0c11d36755076c24e996a418a890bb063d20fd89c539a
                                    • Instruction ID: 6e9e98e426569e86672f55b7a63750d682b091aab702df2b119b9f61ab86929e
                                    • Opcode Fuzzy Hash: 93a24644639dd89aebf0c11d36755076c24e996a418a890bb063d20fd89c539a
                                    • Instruction Fuzzy Hash: 18D1C370908A8D8FEFA9DF28C8567E977D1FF55310F04926EE84DC3291CB74A9458B82
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2540347376.00007FFAAC660000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC660000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7ffaac660000_SR3JZpolPo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: ffc9e60a889b34c58441aad2fa640e62e040c1c4d2218959e517cf9824eced42
                                    • Instruction ID: 7d8eaf10244e826ebd46f02e22169dc76506fdf8f5536ec5741ad9ffda82deee
                                    • Opcode Fuzzy Hash: ffc9e60a889b34c58441aad2fa640e62e040c1c4d2218959e517cf9824eced42
                                    • Instruction Fuzzy Hash: AF51626790E7E28BE717973C98A11D5BFA0DF5327570951F7C1C98F0A3D904A80A8391
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2540347376.00007FFAAC660000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC660000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7ffaac660000_SR3JZpolPo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: ab8764acae2a00dbb842835e2a9ea87bc6edc87416862882621146cf1fc99e31
                                    • Instruction ID: 0d5794405bb8fd0285ceec275d34701b4efbad092a3b7a9aeec640ba246e7a50
                                    • Opcode Fuzzy Hash: ab8764acae2a00dbb842835e2a9ea87bc6edc87416862882621146cf1fc99e31
                                    • Instruction Fuzzy Hash: D751626790E7E28FE717973C98A51D1BFA0DF1316570951F7C1C9CF4A3D908A80A8392
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2540347376.00007FFAAC660000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC660000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7ffaac660000_SR3JZpolPo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 8&U0$@&U0$H&U0$P&U0$X&U0$`&U0$h&U0$p&U0
                                    • API String ID: 0-3703584600
                                    • Opcode ID: b85d4f67a3d61e484a7f40d1c9ac31f2c5971a06d8816b2a2fac4e3ea0c53b95
                                    • Instruction ID: 7d0160538d6d8d41dbf85d7c6eab4ed4ddbe156c7532f00b0116c51e9b77aa2e
                                    • Opcode Fuzzy Hash: b85d4f67a3d61e484a7f40d1c9ac31f2c5971a06d8816b2a2fac4e3ea0c53b95
                                    • Instruction Fuzzy Hash: 45414164E0EA464FF38ED73885145B5EEE1EF87340B58A0B6E51DCB2E6ED2CAC094351
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2540347376.00007FFAAC660000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC660000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7ffaac660000_SR3JZpolPo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: 0'U0$8'U0$@'U0$H'U0$P'U0$X'U0$`'U0
                                    • API String ID: 0-2140147014
                                    • Opcode ID: e3f54ce7ca0fba2c13e611754203524be3273c89d95f0b411b94e5ccdb845eee
                                    • Instruction ID: b83d35d9fd244dd6484dd83d5fba2b86d4a99204f737a86206ca9d670d920c9d
                                    • Opcode Fuzzy Hash: e3f54ce7ca0fba2c13e611754203524be3273c89d95f0b411b94e5ccdb845eee
                                    • Instruction Fuzzy Hash: 6D417554E1E6868FF38ED72885145A1AED1FF9B340B19A0B7D41DCB1E6DD1CAC098351
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2540347376.00007FFAAC660000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC660000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7ffaac660000_SR3JZpolPo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: &U0$(&U0$0&U0$8&U0
                                    • API String ID: 0-2109215330
                                    • Opcode ID: d7426943509952f975b949febf396db1a8011b3331c6c59fa6937970bc952a7c
                                    • Instruction ID: 807fe10e7b63ebdb285ff62003e0048ec3f3cfa06a854f6e9e44c9f200b57a68
                                    • Opcode Fuzzy Hash: d7426943509952f975b949febf396db1a8011b3331c6c59fa6937970bc952a7c
                                    • Instruction Fuzzy Hash: AB417364E0E94A4FF78ED72884145A1EED2EF97340B14A0B6E51DCB2E6DD2CBC094391
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000002.00000002.2540347376.00007FFAAC660000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFAAC660000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_2_2_7ffaac660000_SR3JZpolPo.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: M_^$M_^$M_^$M_^
                                    • API String ID: 0-1397233021
                                    • Opcode ID: 2f4c5c8353846a1bb6ca204ecd2565196884358e087f6595ceb3ff3a73135692
                                    • Instruction ID: 26cc95a1950e2489b271a27c6344003809ebc6850e55ad56a0426e3bf0f4e1bd
                                    • Opcode Fuzzy Hash: 2f4c5c8353846a1bb6ca204ecd2565196884358e087f6595ceb3ff3a73135692
                                    • Instruction Fuzzy Hash: 3D4174D290E7C34EE31793399C58AA57FE0AF63218B4E52F6C4ED861E3EE0954068395