Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
JHGFDFG.exe

Overview

General Information

Sample name:JHGFDFG.exe
Analysis ID:1592444
MD5:c53a3df894a8a6460f1fbffa80b5a8f7
SHA1:3237b7ef9e4772cf3d0bba4353c601e03a02e830
SHA256:2549a53e3dfb35c7c62a864a4cb7443861301caa458f4653e43ac6ff6ae153c2
Tags:exeuser-threatcat_ch
Infos:

Detection

MassLogger RAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected MassLogger RAT
Yara detected Telegram RAT
AI detected suspicious sample
Allocates memory in foreign processes
Injects a PE file into a foreign processes
Machine Learning detection for sample
Tries to detect the country of the analysis system (by using the IP)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Found inlined nop instructions (likely shell or obfuscated code)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Suricata IDS alerts with low severity for network traffic
Uses a known web browser user agent for HTTP communication
Uses insecure TLS / SSL version for HTTPS connection
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • JHGFDFG.exe (PID: 5512 cmdline: "C:\Users\user\Desktop\JHGFDFG.exe" MD5: C53A3DF894A8A6460F1FBFFA80B5A8F7)
    • RegAsm.exe (PID: 4480 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
  • cleanup
{"EXfil Mode": "Telegram", "Telegram Token": "7410470116:AAHnBIMop-ci79oElVeTQe_sfzjuRKlAfHw", "Telegram Chatid": "7470423348"}
SourceRuleDescriptionAuthorStrings
00000001.00000002.3297654418.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_MassLoggerYara detected MassLogger RATJoe Security
    00000001.00000002.3297654418.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000001.00000002.3297654418.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
        00000001.00000002.3297654418.0000000000402000.00000040.00000400.00020000.00000000.sdmpWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
        • 0xffcd:$a1: get_encryptedPassword
        • 0x10309:$a2: get_encryptedUsername
        • 0xfd5a:$a3: get_timePasswordChanged
        • 0xfe7b:$a4: get_passwordField
        • 0xffe3:$a5: set_encryptedPassword
        • 0x119b3:$a7: get_logins
        • 0x11664:$a8: GetOutlookPasswords
        • 0x11442:$a9: StartKeylogger
        • 0x11903:$a10: KeyLoggerEventArgs
        • 0x1149f:$a11: KeyLoggerEventArgsEventHandler
        00000001.00000002.3298816359.0000000003486000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          Click to see the 12 entries
          SourceRuleDescriptionAuthorStrings
          0.2.JHGFDFG.exe.3c4d5d0.1.unpackJoeSecurity_MassLoggerYara detected MassLogger RATJoe Security
            0.2.JHGFDFG.exe.3c4d5d0.1.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              0.2.JHGFDFG.exe.3c4d5d0.1.unpackJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
                0.2.JHGFDFG.exe.3c4d5d0.1.unpackWindows_Trojan_SnakeKeylogger_af3faa65unknownunknown
                • 0xe3cd:$a1: get_encryptedPassword
                • 0xe709:$a2: get_encryptedUsername
                • 0xe15a:$a3: get_timePasswordChanged
                • 0xe27b:$a4: get_passwordField
                • 0xe3e3:$a5: set_encryptedPassword
                • 0xfdb3:$a7: get_logins
                • 0xfa64:$a8: GetOutlookPasswords
                • 0xf842:$a9: StartKeylogger
                • 0xfd03:$a10: KeyLoggerEventArgs
                • 0xf89f:$a11: KeyLoggerEventArgsEventHandler
                0.2.JHGFDFG.exe.3c4d5d0.1.unpackMAL_Envrial_Jan18_1Detects Encrial credential stealer malwareFlorian Roth
                • 0x135fb:$a2: \Comodo\Dragon\User Data\Default\Login Data
                • 0x12af9:$a3: \Google\Chrome\User Data\Default\Login Data
                • 0x12e07:$a4: \Orbitum\User Data\Default\Login Data
                • 0x13bff:$a5: \Kometa\User Data\Default\Login Data
                Click to see the 30 entries
                No Sigma rule has matched
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2025-01-16T06:31:58.775970+010028032742Potentially Bad Traffic192.168.2.549704193.122.6.16880TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: JHGFDFG.exeAvira: detected
                Source: 00000000.00000002.2055541765.0000000003BF5000.00000004.00000800.00020000.00000000.sdmpMalware Configuration Extractor: MassLogger {"EXfil Mode": "Telegram", "Telegram Token": "7410470116:AAHnBIMop-ci79oElVeTQe_sfzjuRKlAfHw", "Telegram Chatid": "7470423348"}
                Source: JHGFDFG.exeReversingLabs: Detection: 65%
                Source: JHGFDFG.exeVirustotal: Detection: 55%Perma Link
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: JHGFDFG.exeJoe Sandbox ML: detected

                Location Tracking

                barindex
                Source: unknownDNS query: name: reallyfreegeoip.org
                Source: unknownHTTPS traffic detected: 104.21.48.1:443 -> 192.168.2.5:49705 version: TLS 1.0
                Source: JHGFDFG.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: Binary string: C:\Users\Administrator\Source\Repos\ZIRKZEE\ZIRKZEE\obj\Debug\JHGFDFG.pdb source: JHGFDFG.exe
                Source: Binary string: C:\Users\Administrator\Source\Repos\ZIRKZEE\ZIRKZEE\obj\Debug\JHGFDFG.pdbFI source: JHGFDFG.exe
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp 015B9731h1_2_015B9480
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp 015B9E5Ah1_2_015B9A30
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4x nop then jmp 015B9E5Ah1_2_015B9D87
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: Joe Sandbox ViewIP Address: 104.21.48.1 104.21.48.1
                Source: Joe Sandbox ViewIP Address: 193.122.6.168 193.122.6.168
                Source: Joe Sandbox ViewJA3 fingerprint: 54328bd36c14bd82ddaa0c04b25ed9ad
                Source: unknownDNS query: name: checkip.dyndns.org
                Source: unknownDNS query: name: reallyfreegeoip.org
                Source: Network trafficSuricata IDS: 2803274 - Severity 2 - ETPRO MALWARE Common Downloader Header Pattern UH : 192.168.2.5:49704 -> 193.122.6.168:80
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: unknownHTTPS traffic detected: 104.21.48.1:443 -> 192.168.2.5:49705 version: TLS 1.0
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: global trafficHTTP traffic detected: GET /xml/8.46.123.189 HTTP/1.1Host: reallyfreegeoip.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.orgConnection: Keep-Alive
                Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)Host: checkip.dyndns.org
                Source: global trafficDNS traffic detected: DNS query: checkip.dyndns.org
                Source: global trafficDNS traffic detected: DNS query: reallyfreegeoip.org
                Source: RegAsm.exe, 00000001.00000002.3298816359.00000000033B0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.com
                Source: RegAsm.exe, 00000001.00000002.3298816359.00000000033B0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.comd
                Source: RegAsm.exe, 00000001.00000002.3298816359.000000000339E000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.3298816359.00000000033B0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org
                Source: RegAsm.exe, 00000001.00000002.3298816359.0000000003331000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/
                Source: RegAsm.exe, 00000001.00000002.3298816359.00000000033B0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/d
                Source: JHGFDFG.exe, 00000000.00000002.2055541765.0000000003BF5000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.3297654418.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.org/q
                Source: RegAsm.exe, 00000001.00000002.3298816359.00000000033B0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://checkip.dyndns.orgd
                Source: RegAsm.exe, 00000001.00000002.3298816359.00000000033CD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.org
                Source: RegAsm.exe, 00000001.00000002.3298816359.00000000033CD000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://reallyfreegeoip.orgd
                Source: RegAsm.exe, 00000001.00000002.3298816359.0000000003331000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: JHGFDFG.exe, 00000000.00000002.2055541765.0000000003BF5000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.3297654418.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot-/sendDocument?chat_id=
                Source: RegAsm.exe, 00000001.00000002.3298816359.00000000033B0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org
                Source: JHGFDFG.exe, 00000000.00000002.2055541765.0000000003BF5000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.3297654418.0000000000402000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.3298816359.00000000033B0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/
                Source: RegAsm.exe, 00000001.00000002.3298816359.00000000033B0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189d
                Source: RegAsm.exe, 00000001.00000002.3298816359.00000000033B0000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://reallyfreegeoip.org/xml/8.46.123.189l
                Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705

                System Summary

                barindex
                Source: 0.2.JHGFDFG.exe.3c4d5d0.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.JHGFDFG.exe.3c4d5d0.1.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 0.2.JHGFDFG.exe.3c655f8.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.JHGFDFG.exe.3c655f8.2.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 0.2.JHGFDFG.exe.3c7d618.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.JHGFDFG.exe.3c7d618.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 1.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 1.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 0.2.JHGFDFG.exe.3c7d618.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.JHGFDFG.exe.3c7d618.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 0.2.JHGFDFG.exe.3c655f8.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.JHGFDFG.exe.3c655f8.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 0.2.JHGFDFG.exe.3c4d5d0.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 0.2.JHGFDFG.exe.3c4d5d0.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Encrial credential stealer malware Author: Florian Roth
                Source: 00000001.00000002.3297654418.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: 00000000.00000002.2055541765.0000000003BF5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: Process Memory Space: JHGFDFG.exe PID: 5512, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: Process Memory Space: RegAsm.exe PID: 4480, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 Author: unknown
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_015BC5301_2_015BC530
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_015B2DD11_2_015B2DD1
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_015B94801_2_015B9480
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_015B19B81_2_015B19B8
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_015BC5211_2_015BC521
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 1_2_015B946F1_2_015B946F
                Source: JHGFDFG.exe, 00000000.00000002.2055541765.0000000003BF5000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCloudServices.exe< vs JHGFDFG.exe
                Source: JHGFDFG.exe, 00000000.00000002.2055410904.0000000002BF1000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCloudServices.exe< vs JHGFDFG.exe
                Source: JHGFDFG.exe, 00000000.00000002.2054630780.0000000000FEE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs JHGFDFG.exe
                Source: 0.2.JHGFDFG.exe.3c4d5d0.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.JHGFDFG.exe.3c4d5d0.1.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 0.2.JHGFDFG.exe.3c655f8.2.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.JHGFDFG.exe.3c655f8.2.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 0.2.JHGFDFG.exe.3c7d618.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.JHGFDFG.exe.3c7d618.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 1.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 1.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 0.2.JHGFDFG.exe.3c7d618.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.JHGFDFG.exe.3c7d618.0.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 0.2.JHGFDFG.exe.3c655f8.2.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.JHGFDFG.exe.3c655f8.2.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 0.2.JHGFDFG.exe.3c4d5d0.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 0.2.JHGFDFG.exe.3c4d5d0.1.raw.unpack, type: UNPACKEDPEMatched rule: MAL_Envrial_Jan18_1 date = 2018-01-21, hash2 = 9edd8f0e22340ecc45c5f09e449aa85d196f3f506ff3f44275367df924b95c5d, hash1 = 9ae3aa2c61f7895ba6b1a3f85fbe36c8697287dc7477c5a03d32cf994fdbce85, author = Florian Roth, description = Detects Encrial credential stealer malware, reference = https://twitter.com/malwrhunterteam/status/953313514629853184, license = https://creativecommons.org/licenses/by-nc/4.0/
                Source: 00000001.00000002.3297654418.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: 00000000.00000002.2055541765.0000000003BF5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: Process Memory Space: JHGFDFG.exe PID: 5512, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: Process Memory Space: RegAsm.exe PID: 4480, type: MEMORYSTRMatched rule: Windows_Trojan_SnakeKeylogger_af3faa65 os = windows, severity = x86, creation_date = 2021-04-06, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.SnakeKeylogger, fingerprint = 15f4ef2a03c6f5c6284ea6a9013007e4ea7dc90a1ba9c81a53a1c7407d85890d, id = af3faa65-b19d-4267-ac02-1a3b50cdc700, last_modified = 2021-08-23
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/1@2/2
                Source: C:\Users\user\Desktop\JHGFDFG.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\JHGFDFG.exe.logJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMutant created: NULL
                Source: JHGFDFG.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: JHGFDFG.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                Source: C:\Users\user\Desktop\JHGFDFG.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: RegAsm.exe, 00000001.00000002.3298816359.0000000003411000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.3298816359.000000000344F000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.3298816359.0000000003420000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.3298816359.0000000003443000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.3298816359.000000000342F000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.3299674539.000000000435D000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: JHGFDFG.exeReversingLabs: Detection: 65%
                Source: JHGFDFG.exeVirustotal: Detection: 55%
                Source: unknownProcess created: C:\Users\user\Desktop\JHGFDFG.exe "C:\Users\user\Desktop\JHGFDFG.exe"
                Source: C:\Users\user\Desktop\JHGFDFG.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                Source: C:\Users\user\Desktop\JHGFDFG.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
                Source: C:\Users\user\Desktop\JHGFDFG.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\Desktop\JHGFDFG.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\JHGFDFG.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\JHGFDFG.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\JHGFDFG.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\JHGFDFG.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\JHGFDFG.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\JHGFDFG.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\JHGFDFG.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\JHGFDFG.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\JHGFDFG.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\JHGFDFG.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\JHGFDFG.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: aclayers.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rasapi32.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rasman.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rtutils.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dhcpcsvc6.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: secur32.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: schannel.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mskeyprotect.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ntasn1.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ncrypt.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ncryptsslp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: JHGFDFG.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: JHGFDFG.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: JHGFDFG.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Binary string: C:\Users\Administrator\Source\Repos\ZIRKZEE\ZIRKZEE\obj\Debug\JHGFDFG.pdb source: JHGFDFG.exe
                Source: Binary string: C:\Users\Administrator\Source\Repos\ZIRKZEE\ZIRKZEE\obj\Debug\JHGFDFG.pdbFI source: JHGFDFG.exe
                Source: JHGFDFG.exeStatic PE information: 0xE7D56015 [Thu Apr 2 14:24:21 2093 UTC]
                Source: C:\Users\user\Desktop\JHGFDFG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\JHGFDFG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\JHGFDFG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\JHGFDFG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\JHGFDFG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\JHGFDFG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\JHGFDFG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\JHGFDFG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\JHGFDFG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\JHGFDFG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\JHGFDFG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\JHGFDFG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\JHGFDFG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\JHGFDFG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\JHGFDFG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\JHGFDFG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\JHGFDFG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\JHGFDFG.exeMemory allocated: 2980000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\JHGFDFG.exeMemory allocated: 2BF0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\JHGFDFG.exeMemory allocated: 29F0000 memory reserve | memory write watchJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 15B0000 memory reserve | memory write watchJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 3330000 memory reserve | memory write watchJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 3160000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\JHGFDFG.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\JHGFDFG.exe TID: 1124Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\JHGFDFG.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: RegAsm.exe, 00000001.00000002.3298217056.0000000001677000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\JHGFDFG.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Users\user\Desktop\JHGFDFG.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 protect: page execute and read and writeJump to behavior
                Source: C:\Users\user\Desktop\JHGFDFG.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 value starts with: 4D5AJump to behavior
                Source: C:\Users\user\Desktop\JHGFDFG.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 402000Jump to behavior
                Source: C:\Users\user\Desktop\JHGFDFG.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 41A000Jump to behavior
                Source: C:\Users\user\Desktop\JHGFDFG.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 41C000Jump to behavior
                Source: C:\Users\user\Desktop\JHGFDFG.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000Jump to behavior
                Source: C:\Users\user\Desktop\JHGFDFG.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 11A5008Jump to behavior
                Source: C:\Users\user\Desktop\JHGFDFG.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
                Source: C:\Users\user\Desktop\JHGFDFG.exeQueries volume information: C:\Users\user\Desktop\JHGFDFG.exe VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\JHGFDFG.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 0.2.JHGFDFG.exe.3c4d5d0.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.JHGFDFG.exe.3c655f8.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.JHGFDFG.exe.3c7d618.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.JHGFDFG.exe.3c7d618.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.JHGFDFG.exe.3c655f8.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.JHGFDFG.exe.3c4d5d0.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000001.00000002.3297654418.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.2055541765.0000000003BF5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: JHGFDFG.exe PID: 5512, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 4480, type: MEMORYSTR
                Source: Yara matchFile source: 0.2.JHGFDFG.exe.3c4d5d0.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.JHGFDFG.exe.3c655f8.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.JHGFDFG.exe.3c7d618.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.JHGFDFG.exe.3c7d618.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.JHGFDFG.exe.3c655f8.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.JHGFDFG.exe.3c4d5d0.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000001.00000002.3297654418.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.2055541765.0000000003BF5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: JHGFDFG.exe PID: 5512, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 4480, type: MEMORYSTR
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                Source: Yara matchFile source: 0.2.JHGFDFG.exe.3c4d5d0.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.JHGFDFG.exe.3c655f8.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.JHGFDFG.exe.3c7d618.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.JHGFDFG.exe.3c7d618.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.JHGFDFG.exe.3c655f8.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.JHGFDFG.exe.3c4d5d0.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000001.00000002.3297654418.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.3298816359.0000000003486000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.2055541765.0000000003BF5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: JHGFDFG.exe PID: 5512, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 4480, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 0.2.JHGFDFG.exe.3c4d5d0.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.JHGFDFG.exe.3c655f8.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.JHGFDFG.exe.3c7d618.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.JHGFDFG.exe.3c7d618.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.JHGFDFG.exe.3c655f8.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.JHGFDFG.exe.3c4d5d0.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000001.00000002.3297654418.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.2055541765.0000000003BF5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: JHGFDFG.exe PID: 5512, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 4480, type: MEMORYSTR
                Source: Yara matchFile source: 0.2.JHGFDFG.exe.3c4d5d0.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.JHGFDFG.exe.3c655f8.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.JHGFDFG.exe.3c7d618.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 1.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.JHGFDFG.exe.3c7d618.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.JHGFDFG.exe.3c655f8.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.JHGFDFG.exe.3c4d5d0.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000001.00000002.3297654418.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.2055541765.0000000003BF5000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: JHGFDFG.exe PID: 5512, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 4480, type: MEMORYSTR
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
                DLL Side-Loading
                311
                Process Injection
                1
                Masquerading
                1
                OS Credential Dumping
                1
                Security Software Discovery
                Remote Services1
                Email Collection
                11
                Encrypted Channel
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                DLL Side-Loading
                1
                Disable or Modify Tools
                LSASS Memory1
                Process Discovery
                Remote Desktop Protocol1
                Archive Collected Data
                1
                Ingress Tool Transfer
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)31
                Virtualization/Sandbox Evasion
                Security Account Manager31
                Virtualization/Sandbox Evasion
                SMB/Windows Admin Shares1
                Data from Local System
                2
                Non-Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook311
                Process Injection
                NTDS1
                System Network Configuration Discovery
                Distributed Component Object ModelInput Capture13
                Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                Obfuscated Files or Information
                LSA Secrets13
                System Information Discovery
                SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                Timestomp
                Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
                DLL Side-Loading
                DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                JHGFDFG.exe66%ReversingLabsByteCode-MSIL.Trojan.Jalapeno
                JHGFDFG.exe56%VirustotalBrowse
                JHGFDFG.exe100%AviraTR/Dropper.Gen
                JHGFDFG.exe100%Joe Sandbox ML
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                http://reallyfreegeoip.orgd0%Avira URL Cloudsafe
                http://checkip.dyndns.comd0%Avira URL Cloudsafe
                http://checkip.dyndns.orgd0%Avira URL Cloudsafe
                NameIPActiveMaliciousAntivirus DetectionReputation
                reallyfreegeoip.org
                104.21.48.1
                truefalse
                  high
                  checkip.dyndns.com
                  193.122.6.168
                  truefalse
                    high
                    checkip.dyndns.org
                    unknown
                    unknownfalse
                      high
                      NameMaliciousAntivirus DetectionReputation
                      http://checkip.dyndns.org/false
                        high
                        https://reallyfreegeoip.org/xml/8.46.123.189false
                          high
                          NameSourceMaliciousAntivirus DetectionReputation
                          https://reallyfreegeoip.org/xml/8.46.123.189lRegAsm.exe, 00000001.00000002.3298816359.00000000033B0000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://checkip.dyndns.comdRegAsm.exe, 00000001.00000002.3298816359.00000000033B0000.00000004.00000800.00020000.00000000.sdmpfalse
                            • Avira URL Cloud: safe
                            unknown
                            http://checkip.dyndns.org/qJHGFDFG.exe, 00000000.00000002.2055541765.0000000003BF5000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.3297654418.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                              high
                              http://reallyfreegeoip.orgdRegAsm.exe, 00000001.00000002.3298816359.00000000033CD000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              https://reallyfreegeoip.org/xml/8.46.123.189dRegAsm.exe, 00000001.00000002.3298816359.00000000033B0000.00000004.00000800.00020000.00000000.sdmpfalse
                                high
                                http://reallyfreegeoip.orgRegAsm.exe, 00000001.00000002.3298816359.00000000033CD000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  http://checkip.dyndns.orgdRegAsm.exe, 00000001.00000002.3298816359.00000000033B0000.00000004.00000800.00020000.00000000.sdmpfalse
                                  • Avira URL Cloud: safe
                                  unknown
                                  https://reallyfreegeoip.orgRegAsm.exe, 00000001.00000002.3298816359.00000000033B0000.00000004.00000800.00020000.00000000.sdmpfalse
                                    high
                                    http://checkip.dyndns.orgRegAsm.exe, 00000001.00000002.3298816359.000000000339E000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.3298816359.00000000033B0000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://checkip.dyndns.comRegAsm.exe, 00000001.00000002.3298816359.00000000033B0000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        http://checkip.dyndns.org/dRegAsm.exe, 00000001.00000002.3298816359.00000000033B0000.00000004.00000800.00020000.00000000.sdmpfalse
                                          high
                                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegAsm.exe, 00000001.00000002.3298816359.0000000003331000.00000004.00000800.00020000.00000000.sdmpfalse
                                            high
                                            https://api.telegram.org/bot-/sendDocument?chat_id=JHGFDFG.exe, 00000000.00000002.2055541765.0000000003BF5000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.3297654418.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                                              high
                                              https://reallyfreegeoip.org/xml/JHGFDFG.exe, 00000000.00000002.2055541765.0000000003BF5000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.3297654418.0000000000402000.00000040.00000400.00020000.00000000.sdmp, RegAsm.exe, 00000001.00000002.3298816359.00000000033B0000.00000004.00000800.00020000.00000000.sdmpfalse
                                                high
                                                • No. of IPs < 25%
                                                • 25% < No. of IPs < 50%
                                                • 50% < No. of IPs < 75%
                                                • 75% < No. of IPs
                                                IPDomainCountryFlagASNASN NameMalicious
                                                104.21.48.1
                                                reallyfreegeoip.orgUnited States
                                                13335CLOUDFLARENETUSfalse
                                                193.122.6.168
                                                checkip.dyndns.comUnited States
                                                31898ORACLE-BMC-31898USfalse
                                                Joe Sandbox version:42.0.0 Malachite
                                                Analysis ID:1592444
                                                Start date and time:2025-01-16 06:31:05 +01:00
                                                Joe Sandbox product:CloudBasic
                                                Overall analysis duration:0h 4m 37s
                                                Hypervisor based Inspection enabled:false
                                                Report type:full
                                                Cookbook file name:default.jbs
                                                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                                Number of analysed new started processes analysed:5
                                                Number of new started drivers analysed:0
                                                Number of existing processes analysed:0
                                                Number of existing drivers analysed:0
                                                Number of injected processes analysed:0
                                                Technologies:
                                                • HCA enabled
                                                • EGA enabled
                                                • AMSI enabled
                                                Analysis Mode:default
                                                Analysis stop reason:Timeout
                                                Sample name:JHGFDFG.exe
                                                Detection:MAL
                                                Classification:mal100.troj.spyw.evad.winEXE@3/1@2/2
                                                EGA Information:
                                                • Successful, ratio: 50%
                                                HCA Information:
                                                • Successful, ratio: 100%
                                                • Number of executed functions: 64
                                                • Number of non-executed functions: 1
                                                Cookbook Comments:
                                                • Found application associated with file extension: .exe
                                                • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                                                • Excluded IPs from analysis (whitelisted): 13.107.246.45, 52.149.20.212
                                                • Excluded domains from analysis (whitelisted): ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                                • Execution Graph export aborted for target RegAsm.exe, PID 4480 because it is empty
                                                • Report size getting too big, too many NtOpenKeyEx calls found.
                                                • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                                • Report size getting too big, too many NtQueryValueKey calls found.
                                                • Report size getting too big, too many NtReadVirtualMemory calls found.
                                                No simulations
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                104.21.48.1ydJaT4b5N8.exeGet hashmaliciousFormBookBrowse
                                                • www.vilakodsiy.sbs/vq3j/
                                                NWPZbNcRxL.exeGet hashmaliciousFormBookBrowse
                                                • www.axis138ae.shop/j2vs/
                                                SH8ZyOWNi2.exeGet hashmaliciousCMSBruteBrowse
                                                • twirpx.org/administrator/index.php
                                                SN500, SN150 Spec.exeGet hashmaliciousFormBookBrowse
                                                • www.antipromil.site/7ykh/
                                                193.122.6.168MV Nicos Tomasos Vessel Parts.exeGet hashmaliciousSnake KeyloggerBrowse
                                                • checkip.dyndns.org/
                                                Order Details.exeGet hashmaliciousSnake KeyloggerBrowse
                                                • checkip.dyndns.org/
                                                Contrarre.exeGet hashmaliciousMassLogger RATBrowse
                                                • checkip.dyndns.org/
                                                Company introduction.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                • checkip.dyndns.org/
                                                rDEKONT-1_15_2025__75kb__pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                • checkip.dyndns.org/
                                                mnXS9meqtB.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                • checkip.dyndns.org/
                                                gGI2gVBI0f.exeGet hashmaliciousMassLogger RATBrowse
                                                • checkip.dyndns.org/
                                                ZpYFG94D4C.exeGet hashmaliciousSnake KeyloggerBrowse
                                                • checkip.dyndns.org/
                                                ZaRP7yvL1J.exeGet hashmaliciousMassLogger RATBrowse
                                                • checkip.dyndns.org/
                                                grrezORe7h.exeGet hashmaliciousGuLoader, MassLogger RATBrowse
                                                • checkip.dyndns.org/
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                checkip.dyndns.comMV. ASL ROSE - VESSEL'S DESC.pdf.scr.exeGet hashmaliciousMassLogger RATBrowse
                                                • 193.122.130.0
                                                New PO.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                • 158.101.44.242
                                                WOOYANG VENUS_VESSEL_PARTICULARS.doc.scr.exeGet hashmaliciousMassLogger RATBrowse
                                                • 132.226.8.169
                                                MV Nicos Tomasos Vessel Parts.exeGet hashmaliciousSnake KeyloggerBrowse
                                                • 193.122.6.168
                                                order6566546663.exeGet hashmaliciousSnake KeyloggerBrowse
                                                • 132.226.247.73
                                                Order Details.exeGet hashmaliciousSnake KeyloggerBrowse
                                                • 193.122.6.168
                                                BNXCXCJSD.jseGet hashmaliciousMassLogger RATBrowse
                                                • 132.226.247.73
                                                NEWORDER.exeGet hashmaliciousMassLogger RATBrowse
                                                • 132.226.247.73
                                                Invoice No 1122207 pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                • 158.101.44.242
                                                PDF6UU0CVUO2W-YGVUIO.scr.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                • 193.122.130.0
                                                reallyfreegeoip.orgMV. ASL ROSE - VESSEL'S DESC.pdf.scr.exeGet hashmaliciousMassLogger RATBrowse
                                                • 104.21.48.1
                                                New PO.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                • 104.21.32.1
                                                WOOYANG VENUS_VESSEL_PARTICULARS.doc.scr.exeGet hashmaliciousMassLogger RATBrowse
                                                • 104.21.64.1
                                                order6566546663.exeGet hashmaliciousSnake KeyloggerBrowse
                                                • 104.21.48.1
                                                Order Details.exeGet hashmaliciousSnake KeyloggerBrowse
                                                • 104.21.32.1
                                                BNXCXCJSD.jseGet hashmaliciousMassLogger RATBrowse
                                                • 104.21.16.1
                                                NEWORDER.exeGet hashmaliciousMassLogger RATBrowse
                                                • 104.21.96.1
                                                Invoice No 1122207 pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                • 104.21.112.1
                                                PDF6UU0CVUO2W-YGVUIO.scr.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                • 104.21.96.1
                                                PO#_1100015533.scrGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                • 104.21.80.1
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                ORACLE-BMC-31898USMV. ASL ROSE - VESSEL'S DESC.pdf.scr.exeGet hashmaliciousMassLogger RATBrowse
                                                • 193.122.130.0
                                                New PO.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                • 158.101.44.242
                                                MV Nicos Tomasos Vessel Parts.exeGet hashmaliciousSnake KeyloggerBrowse
                                                • 193.122.6.168
                                                Order Details.exeGet hashmaliciousSnake KeyloggerBrowse
                                                • 193.122.6.168
                                                Execute.ps1Get hashmaliciousMetasploitBrowse
                                                • 158.101.196.44
                                                Invoice No 1122207 pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                • 158.101.44.242
                                                PDF6UU0CVUO2W-YGVUIO.scr.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                • 193.122.130.0
                                                PO#_1100015533.scrGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                • 193.122.130.0
                                                1nl3hc.ps1Get hashmaliciousMassLogger RATBrowse
                                                • 193.122.130.0
                                                Contrarre.exeGet hashmaliciousMassLogger RATBrowse
                                                • 193.122.6.168
                                                CLOUDFLARENETUShttps://guf1.xemirax.ru/Get hashmaliciousUnknownBrowse
                                                • 104.21.85.129
                                                MV. ASL ROSE - VESSEL'S DESC.pdf.scr.exeGet hashmaliciousMassLogger RATBrowse
                                                • 104.21.48.1
                                                https://guf1.xemirax.ru/6XAVE/#S#ZWRtb25kLmxlZUBpbm5vY2FwLmNvbQ==Get hashmaliciousUnknownBrowse
                                                • 104.17.25.14
                                                https://yt1s.com/en115Get hashmaliciousUnknownBrowse
                                                • 104.21.11.245
                                                New PO.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                • 104.21.32.1
                                                Pedang @ P#U00ecsau.exeGet hashmaliciousBrontokBrowse
                                                • 104.21.48.1
                                                WOOYANG VENUS_VESSEL_PARTICULARS.doc.scr.exeGet hashmaliciousMassLogger RATBrowse
                                                • 104.21.64.1
                                                order6566546663.exeGet hashmaliciousSnake KeyloggerBrowse
                                                • 104.21.16.1
                                                Order Details.exeGet hashmaliciousSnake KeyloggerBrowse
                                                • 104.21.32.1
                                                Subscription_Renewal_Invoice_2025_FGHDCS.htmlGet hashmaliciousHTMLPhisherBrowse
                                                • 104.17.25.14
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                54328bd36c14bd82ddaa0c04b25ed9adMV. ASL ROSE - VESSEL'S DESC.pdf.scr.exeGet hashmaliciousMassLogger RATBrowse
                                                • 104.21.48.1
                                                New PO.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                • 104.21.48.1
                                                WOOYANG VENUS_VESSEL_PARTICULARS.doc.scr.exeGet hashmaliciousMassLogger RATBrowse
                                                • 104.21.48.1
                                                order6566546663.exeGet hashmaliciousSnake KeyloggerBrowse
                                                • 104.21.48.1
                                                Order Details.exeGet hashmaliciousSnake KeyloggerBrowse
                                                • 104.21.48.1
                                                BNXCXCJSD.jseGet hashmaliciousMassLogger RATBrowse
                                                • 104.21.48.1
                                                NEWORDER.exeGet hashmaliciousMassLogger RATBrowse
                                                • 104.21.48.1
                                                Invoice No 1122207 pdf.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
                                                • 104.21.48.1
                                                PDF6UU0CVUO2W-YGVUIO.scr.exeGet hashmaliciousMassLogger RAT, PureLog StealerBrowse
                                                • 104.21.48.1
                                                1nl3hc.ps1Get hashmaliciousMassLogger RATBrowse
                                                • 104.21.48.1
                                                No context
                                                Process:C:\Users\user\Desktop\JHGFDFG.exe
                                                File Type:CSV text
                                                Category:dropped
                                                Size (bytes):226
                                                Entropy (8bit):5.360398796477698
                                                Encrypted:false
                                                SSDEEP:6:Q3La/xw5DLIP12MUAvvR+uTL2ql2ABgTv:Q3La/KDLI4MWuPTAv
                                                MD5:3A8957C6382192B71471BD14359D0B12
                                                SHA1:71B96C965B65A051E7E7D10F61BEBD8CCBB88587
                                                SHA-256:282FBEFDDCFAA0A9DBDEE6E123791FC4B8CB870AE9D450E6394D2ACDA3D8F56D
                                                SHA-512:76C108641F682F785A97017728ED51565C4F74B61B24E190468E3A2843FCC43615C6C8ABE298750AF238D7A44E97C001E3BE427B49900432F905A7CE114AA9AD
                                                Malicious:true
                                                Reputation:high, very likely benign file
                                                Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..
                                                File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                Entropy (8bit):4.828586347753447
                                                TrID:
                                                • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                • Win32 Executable (generic) a (10002005/4) 49.78%
                                                • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                • Generic Win/DOS Executable (2004/3) 0.01%
                                                • DOS Executable Generic (2002/1) 0.01%
                                                File name:JHGFDFG.exe
                                                File size:343'552 bytes
                                                MD5:c53a3df894a8a6460f1fbffa80b5a8f7
                                                SHA1:3237b7ef9e4772cf3d0bba4353c601e03a02e830
                                                SHA256:2549a53e3dfb35c7c62a864a4cb7443861301caa458f4653e43ac6ff6ae153c2
                                                SHA512:b2682e0e5854f745359dcad21f3d903e7a0d204d544271fcd4300c97d99b9ace9d93adac3285a70ab3c5896228955804b9f4bade702c5d4058736ab132b2cab1
                                                SSDEEP:6144:/fDuSxhHV/AG4tZTjABMgcn5/lX82O3Fu5JARlWnz:/ruqh1/AG4jTjvgc5dX82O1u5J2lWnz
                                                TLSH:7A744FA038EB9229F073AE7A5AD275D6DD2FBE732F06603D1091334646B2D41DDD213A
                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....`............"...0..*..........rI... ...`....@.. ....................................`................................
                                                Icon Hash:457131250f454580
                                                Entrypoint:0x444972
                                                Entrypoint Section:.text
                                                Digitally signed:false
                                                Imagebase:0x400000
                                                Subsystem:windows gui
                                                Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                                DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                Time Stamp:0xE7D56015 [Thu Apr 2 14:24:21 2093 UTC]
                                                TLS Callbacks:
                                                CLR (.Net) Version:
                                                OS Version Major:4
                                                OS Version Minor:0
                                                File Version Major:4
                                                File Version Minor:0
                                                Subsystem Version Major:4
                                                Subsystem Version Minor:0
                                                Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                Instruction
                                                jmp dword ptr [00402000h]
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                add byte ptr [eax], al
                                                NameVirtual AddressVirtual Size Is in Section
                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IMPORT0x4491e0x4f.text
                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x460000x10e68.rsrc
                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x580000xc.reloc
                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x448840x38.text
                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                .text0x20000x429780x42a003d9bea4a79e41eba2d204be4f5239772False0.4880613860225141data4.143234654239205IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                .rsrc0x460000x10e680x11000f35f4c04e8a7e3fba5eb3ee3310b2c1cFalse0.04706169577205882data4.7004617503029875IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                .reloc0x580000xc0x2002066321c62197875842fd9eb9a386f4eFalse0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                                RT_ICON0x461000x10828Device independent bitmap graphic, 128 x 256 x 32, image size 675840.036510706258133206
                                                RT_GROUP_ICON0x569380x14data1.15
                                                RT_VERSION0x5695c0x30cdata0.43333333333333335
                                                RT_MANIFEST0x56c780x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                                DLLImport
                                                mscoree.dll_CorExeMain
                                                TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                                                2025-01-16T06:31:58.775970+01002803274ETPRO MALWARE Common Downloader Header Pattern UH2192.168.2.549704193.122.6.16880TCP
                                                TimestampSource PortDest PortSource IPDest IP
                                                Jan 16, 2025 06:31:57.910634995 CET4970480192.168.2.5193.122.6.168
                                                Jan 16, 2025 06:31:57.915611029 CET8049704193.122.6.168192.168.2.5
                                                Jan 16, 2025 06:31:57.915734053 CET4970480192.168.2.5193.122.6.168
                                                Jan 16, 2025 06:31:57.916148901 CET4970480192.168.2.5193.122.6.168
                                                Jan 16, 2025 06:31:57.921009064 CET8049704193.122.6.168192.168.2.5
                                                Jan 16, 2025 06:31:58.543250084 CET8049704193.122.6.168192.168.2.5
                                                Jan 16, 2025 06:31:58.547563076 CET4970480192.168.2.5193.122.6.168
                                                Jan 16, 2025 06:31:58.552406073 CET8049704193.122.6.168192.168.2.5
                                                Jan 16, 2025 06:31:58.733879089 CET8049704193.122.6.168192.168.2.5
                                                Jan 16, 2025 06:31:58.747708082 CET49705443192.168.2.5104.21.48.1
                                                Jan 16, 2025 06:31:58.747751951 CET44349705104.21.48.1192.168.2.5
                                                Jan 16, 2025 06:31:58.747818947 CET49705443192.168.2.5104.21.48.1
                                                Jan 16, 2025 06:31:58.754214048 CET49705443192.168.2.5104.21.48.1
                                                Jan 16, 2025 06:31:58.754255056 CET44349705104.21.48.1192.168.2.5
                                                Jan 16, 2025 06:31:58.775969982 CET4970480192.168.2.5193.122.6.168
                                                Jan 16, 2025 06:31:59.234781027 CET44349705104.21.48.1192.168.2.5
                                                Jan 16, 2025 06:31:59.234870911 CET49705443192.168.2.5104.21.48.1
                                                Jan 16, 2025 06:31:59.240398884 CET49705443192.168.2.5104.21.48.1
                                                Jan 16, 2025 06:31:59.240423918 CET44349705104.21.48.1192.168.2.5
                                                Jan 16, 2025 06:31:59.240756989 CET44349705104.21.48.1192.168.2.5
                                                Jan 16, 2025 06:31:59.285670042 CET49705443192.168.2.5104.21.48.1
                                                Jan 16, 2025 06:31:59.331357002 CET44349705104.21.48.1192.168.2.5
                                                Jan 16, 2025 06:31:59.399806023 CET44349705104.21.48.1192.168.2.5
                                                Jan 16, 2025 06:31:59.399892092 CET44349705104.21.48.1192.168.2.5
                                                Jan 16, 2025 06:31:59.400295019 CET49705443192.168.2.5104.21.48.1
                                                Jan 16, 2025 06:31:59.414356947 CET49705443192.168.2.5104.21.48.1
                                                Jan 16, 2025 06:33:03.733377934 CET8049704193.122.6.168192.168.2.5
                                                Jan 16, 2025 06:33:03.733470917 CET4970480192.168.2.5193.122.6.168
                                                Jan 16, 2025 06:33:38.796982050 CET4970480192.168.2.5193.122.6.168
                                                Jan 16, 2025 06:33:38.801898956 CET8049704193.122.6.168192.168.2.5
                                                TimestampSource PortDest PortSource IPDest IP
                                                Jan 16, 2025 06:31:57.893768072 CET5184153192.168.2.51.1.1.1
                                                Jan 16, 2025 06:31:57.900975943 CET53518411.1.1.1192.168.2.5
                                                Jan 16, 2025 06:31:58.736542940 CET6422853192.168.2.51.1.1.1
                                                Jan 16, 2025 06:31:58.744448900 CET53642281.1.1.1192.168.2.5
                                                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                Jan 16, 2025 06:31:57.893768072 CET192.168.2.51.1.1.10xd501Standard query (0)checkip.dyndns.orgA (IP address)IN (0x0001)false
                                                Jan 16, 2025 06:31:58.736542940 CET192.168.2.51.1.1.10x8eaaStandard query (0)reallyfreegeoip.orgA (IP address)IN (0x0001)false
                                                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                Jan 16, 2025 06:31:57.900975943 CET1.1.1.1192.168.2.50xd501No error (0)checkip.dyndns.orgcheckip.dyndns.comCNAME (Canonical name)IN (0x0001)false
                                                Jan 16, 2025 06:31:57.900975943 CET1.1.1.1192.168.2.50xd501No error (0)checkip.dyndns.com193.122.6.168A (IP address)IN (0x0001)false
                                                Jan 16, 2025 06:31:57.900975943 CET1.1.1.1192.168.2.50xd501No error (0)checkip.dyndns.com193.122.130.0A (IP address)IN (0x0001)false
                                                Jan 16, 2025 06:31:57.900975943 CET1.1.1.1192.168.2.50xd501No error (0)checkip.dyndns.com132.226.8.169A (IP address)IN (0x0001)false
                                                Jan 16, 2025 06:31:57.900975943 CET1.1.1.1192.168.2.50xd501No error (0)checkip.dyndns.com132.226.247.73A (IP address)IN (0x0001)false
                                                Jan 16, 2025 06:31:57.900975943 CET1.1.1.1192.168.2.50xd501No error (0)checkip.dyndns.com158.101.44.242A (IP address)IN (0x0001)false
                                                Jan 16, 2025 06:31:58.744448900 CET1.1.1.1192.168.2.50x8eaaNo error (0)reallyfreegeoip.org104.21.48.1A (IP address)IN (0x0001)false
                                                Jan 16, 2025 06:31:58.744448900 CET1.1.1.1192.168.2.50x8eaaNo error (0)reallyfreegeoip.org104.21.96.1A (IP address)IN (0x0001)false
                                                Jan 16, 2025 06:31:58.744448900 CET1.1.1.1192.168.2.50x8eaaNo error (0)reallyfreegeoip.org104.21.112.1A (IP address)IN (0x0001)false
                                                Jan 16, 2025 06:31:58.744448900 CET1.1.1.1192.168.2.50x8eaaNo error (0)reallyfreegeoip.org104.21.80.1A (IP address)IN (0x0001)false
                                                Jan 16, 2025 06:31:58.744448900 CET1.1.1.1192.168.2.50x8eaaNo error (0)reallyfreegeoip.org104.21.16.1A (IP address)IN (0x0001)false
                                                Jan 16, 2025 06:31:58.744448900 CET1.1.1.1192.168.2.50x8eaaNo error (0)reallyfreegeoip.org104.21.64.1A (IP address)IN (0x0001)false
                                                Jan 16, 2025 06:31:58.744448900 CET1.1.1.1192.168.2.50x8eaaNo error (0)reallyfreegeoip.org104.21.32.1A (IP address)IN (0x0001)false
                                                • reallyfreegeoip.org
                                                • checkip.dyndns.org
                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                0192.168.2.549704193.122.6.168804480C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                TimestampBytes transferredDirectionData
                                                Jan 16, 2025 06:31:57.916148901 CET151OUTGET / HTTP/1.1
                                                User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                Host: checkip.dyndns.org
                                                Connection: Keep-Alive
                                                Jan 16, 2025 06:31:58.543250084 CET273INHTTP/1.1 200 OK
                                                Date: Thu, 16 Jan 2025 05:31:58 GMT
                                                Content-Type: text/html
                                                Content-Length: 104
                                                Connection: keep-alive
                                                Cache-Control: no-cache
                                                Pragma: no-cache
                                                Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>
                                                Jan 16, 2025 06:31:58.547563076 CET127OUTGET / HTTP/1.1
                                                User-Agent: Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.2; .NET CLR1.0.3705;)
                                                Host: checkip.dyndns.org
                                                Jan 16, 2025 06:31:58.733879089 CET273INHTTP/1.1 200 OK
                                                Date: Thu, 16 Jan 2025 05:31:58 GMT
                                                Content-Type: text/html
                                                Content-Length: 104
                                                Connection: keep-alive
                                                Cache-Control: no-cache
                                                Pragma: no-cache
                                                Data Raw: 3c 68 74 6d 6c 3e 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 43 75 72 72 65 6e 74 20 49 50 20 43 68 65 63 6b 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 3c 62 6f 64 79 3e 43 75 72 72 65 6e 74 20 49 50 20 41 64 64 72 65 73 73 3a 20 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 62 6f 64 79 3e 3c 2f 68 74 6d 6c 3e 0d 0a
                                                Data Ascii: <html><head><title>Current IP Check</title></head><body>Current IP Address: 8.46.123.189</body></html>


                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                0192.168.2.549705104.21.48.14434480C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                TimestampBytes transferredDirectionData
                                                2025-01-16 05:31:59 UTC85OUTGET /xml/8.46.123.189 HTTP/1.1
                                                Host: reallyfreegeoip.org
                                                Connection: Keep-Alive
                                                2025-01-16 05:31:59 UTC855INHTTP/1.1 200 OK
                                                Date: Thu, 16 Jan 2025 05:31:59 GMT
                                                Content-Type: text/xml
                                                Content-Length: 362
                                                Connection: close
                                                Age: 2320308
                                                Cache-Control: max-age=31536000
                                                cf-cache-status: HIT
                                                last-modified: Fri, 20 Dec 2024 09:00:10 GMT
                                                Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=K%2BDnxx%2BsUaiIZwU9vguIJc6KW6O85deRMZFX5UPlrTuewtFwZKcEv2BVISRV6Tu4nfwSM7UDA09qnfIJaPbW216EtvVFViz6qazEQxQVkcuOWeB%2FHFgqM3jKh4aI5iC1g0jyIAEX"}],"group":"cf-nel","max_age":604800}
                                                NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
                                                Server: cloudflare
                                                CF-RAY: 902bb8efdeb58cda-EWR
                                                alt-svc: h3=":443"; ma=86400
                                                server-timing: cfL4;desc="?proto=TCP&rtt=1975&min_rtt=1969&rtt_var=750&sent=5&recv=7&lost=0&retrans=0&sent_bytes=2849&recv_bytes=699&delivery_rate=1446977&cwnd=244&unsent_bytes=0&cid=fea6f64cb26c960e&ts=176&x=0"
                                                2025-01-16 05:31:59 UTC362INData Raw: 3c 52 65 73 70 6f 6e 73 65 3e 0a 09 3c 49 50 3e 38 2e 34 36 2e 31 32 33 2e 31 38 39 3c 2f 49 50 3e 0a 09 3c 43 6f 75 6e 74 72 79 43 6f 64 65 3e 55 53 3c 2f 43 6f 75 6e 74 72 79 43 6f 64 65 3e 0a 09 3c 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 55 6e 69 74 65 64 20 53 74 61 74 65 73 3c 2f 43 6f 75 6e 74 72 79 4e 61 6d 65 3e 0a 09 3c 52 65 67 69 6f 6e 43 6f 64 65 3e 4e 59 3c 2f 52 65 67 69 6f 6e 43 6f 64 65 3e 0a 09 3c 52 65 67 69 6f 6e 4e 61 6d 65 3e 4e 65 77 20 59 6f 72 6b 3c 2f 52 65 67 69 6f 6e 4e 61 6d 65 3e 0a 09 3c 43 69 74 79 3e 4e 65 77 20 59 6f 72 6b 3c 2f 43 69 74 79 3e 0a 09 3c 5a 69 70 43 6f 64 65 3e 31 30 31 31 38 3c 2f 5a 69 70 43 6f 64 65 3e 0a 09 3c 54 69 6d 65 5a 6f 6e 65 3e 41 6d 65 72 69 63 61 2f 4e 65 77 5f 59 6f 72 6b 3c 2f 54 69 6d 65 5a 6f
                                                Data Ascii: <Response><IP>8.46.123.189</IP><CountryCode>US</CountryCode><CountryName>United States</CountryName><RegionCode>NY</RegionCode><RegionName>New York</RegionName><City>New York</City><ZipCode>10118</ZipCode><TimeZone>America/New_York</TimeZo


                                                Click to jump to process

                                                Click to jump to process

                                                Click to dive into process behavior distribution

                                                Click to jump to process

                                                Target ID:0
                                                Start time:00:31:56
                                                Start date:16/01/2025
                                                Path:C:\Users\user\Desktop\JHGFDFG.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Users\user\Desktop\JHGFDFG.exe"
                                                Imagebase:0x830000
                                                File size:343'552 bytes
                                                MD5 hash:C53A3DF894A8A6460F1FBFFA80B5A8F7
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Yara matches:
                                                • Rule: JoeSecurity_MassLogger, Description: Yara detected MassLogger RAT, Source: 00000000.00000002.2055541765.0000000003BF5000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.2055541765.0000000003BF5000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000000.00000002.2055541765.0000000003BF5000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000000.00000002.2055541765.0000000003BF5000.00000004.00000800.00020000.00000000.sdmp, Author: unknown
                                                Reputation:low
                                                Has exited:true

                                                Target ID:1
                                                Start time:00:31:56
                                                Start date:16/01/2025
                                                Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                                                Imagebase:0xf00000
                                                File size:65'440 bytes
                                                MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Yara matches:
                                                • Rule: JoeSecurity_MassLogger, Description: Yara detected MassLogger RAT, Source: 00000001.00000002.3297654418.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.3297654418.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000001.00000002.3297654418.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                • Rule: Windows_Trojan_SnakeKeylogger_af3faa65, Description: unknown, Source: 00000001.00000002.3297654418.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: unknown
                                                • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.3298816359.0000000003486000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                Reputation:high
                                                Has exited:false

                                                Reset < >

                                                  Execution Graph

                                                  Execution Coverage:42.1%
                                                  Dynamic/Decrypted Code Coverage:100%
                                                  Signature Coverage:0%
                                                  Total number of Nodes:114
                                                  Total number of Limit Nodes:3
                                                  execution_graph 1171 2980638 1172 298063d Wow64SetThreadContext 1171->1172 1174 29819fb 1172->1174 1141 29805b0 1142 29805b5 CreateProcessA 1141->1142 1144 2981660 1142->1144 1162 2980a10 1163 2980a44 1162->1163 1164 2980af6 1163->1164 1165 29810e8 7 API calls 1163->1165 1166 2980e59 7 API calls 1163->1166 1165->1164 1166->1164 1167 2980608 1168 298060d VirtualAllocEx 1167->1168 1170 2981d76 1168->1170 1187 298056b 1188 2980575 ReadProcessMemory 1187->1188 1190 2981b8e 1188->1190 1018 2980a20 1019 2980a44 1018->1019 1020 2980af6 1019->1020 1023 29810e8 1019->1023 1038 2980e59 1019->1038 1024 2980ee2 1023->1024 1025 2981136 1024->1025 1053 2981210 1024->1053 1057 2981220 1024->1057 1061 2981808 1024->1061 1065 29817f8 1024->1065 1069 2981a58 1024->1069 1073 2981a49 1024->1073 1077 2981bf8 1024->1077 1081 2981be9 1024->1081 1085 2981dc8 1024->1085 1091 2981dd8 1024->1091 1097 2982188 1024->1097 1105 2982198 1024->1105 1025->1020 1040 2980e95 1038->1040 1039 2981136 1039->1020 1040->1039 1041 2981a58 ReadProcessMemory 1040->1041 1042 2981a49 ReadProcessMemory 1040->1042 1043 29817f8 Wow64SetThreadContext 1040->1043 1044 2981808 Wow64SetThreadContext 1040->1044 1045 2981bf8 VirtualAllocEx 1040->1045 1046 2981be9 VirtualAllocEx 1040->1046 1047 2982198 3 API calls 1040->1047 1048 2982188 3 API calls 1040->1048 1049 2981210 CreateProcessA 1040->1049 1050 2981220 CreateProcessA 1040->1050 1051 2981dd8 WriteProcessMemory 1040->1051 1052 2981dc8 WriteProcessMemory 1040->1052 1041->1040 1042->1040 1043->1040 1044->1040 1045->1040 1046->1040 1047->1040 1048->1040 1049->1040 1050->1040 1051->1040 1052->1040 1054 2981215 1053->1054 1113 29805bc 1054->1113 1058 2981244 1057->1058 1059 29805bc CreateProcessA 1058->1059 1060 29812be 1059->1060 1060->1024 1062 2981824 1061->1062 1064 29818a0 1062->1064 1117 29805d4 1062->1117 1064->1024 1066 2981824 1065->1066 1067 29805d4 Wow64SetThreadContext 1066->1067 1068 29818a0 1066->1068 1067->1068 1068->1024 1070 2981a75 1069->1070 1121 29805fc 1070->1121 1074 2981a75 1073->1074 1075 29805fc ReadProcessMemory 1074->1075 1076 2981a9b 1075->1076 1076->1024 1078 2981c15 1077->1078 1125 2980614 1078->1125 1082 2981c15 1081->1082 1083 2980614 VirtualAllocEx 1082->1083 1084 2981c5d 1083->1084 1084->1024 1090 2981dff 1085->1090 1086 2981fa0 1087 298062c WriteProcessMemory 1086->1087 1088 2981fd8 1087->1088 1088->1024 1090->1086 1129 298062c 1090->1129 1096 2981dff 1091->1096 1092 2981fa0 1093 298062c WriteProcessMemory 1092->1093 1094 2981fd8 1093->1094 1094->1024 1095 298062c WriteProcessMemory 1095->1096 1096->1092 1096->1095 1098 29821bf 1097->1098 1099 298062c WriteProcessMemory 1098->1099 1100 298222b 1099->1100 1101 29822d7 1100->1101 1133 2980644 1100->1133 1137 298065c 1101->1137 1106 29821bf 1105->1106 1107 298062c WriteProcessMemory 1106->1107 1108 298222b 1107->1108 1109 2980644 Wow64SetThreadContext 1108->1109 1111 29822d7 1108->1111 1109->1111 1110 298065c ResumeThread 1112 2982360 1110->1112 1111->1110 1112->1024 1114 2981328 CreateProcessA 1113->1114 1116 2981660 1114->1116 1118 2981938 Wow64SetThreadContext 1117->1118 1120 29819fb 1118->1120 1120->1064 1122 2981ac8 ReadProcessMemory 1121->1122 1124 2981a9b 1122->1124 1124->1024 1126 2981cb8 VirtualAllocEx 1125->1126 1128 2981c5d 1126->1128 1128->1024 1130 2982040 WriteProcessMemory 1129->1130 1132 2982127 1130->1132 1132->1090 1134 2981938 Wow64SetThreadContext 1133->1134 1136 29819fb 1134->1136 1136->1101 1138 29823c8 ResumeThread 1137->1138 1140 2982360 1138->1140 1140->1024 1183 2980620 1184 2980625 WriteProcessMemory 1183->1184 1186 2982127 1184->1186 1151 29823c1 1152 298240d ResumeThread 1151->1152 1153 2982457 1152->1153

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 0 29805b0-29813cb 4 298142d-2981458 0->4 5 29813cd-29813fd 0->5 8 29814ba-2981513 4->8 9 298145a-298148a 4->9 5->4 13 29813ff-2981404 5->13 14 2981572-298165e CreateProcessA 8->14 15 2981515-2981542 8->15 9->8 24 298148c-2981491 9->24 16 2981406-2981410 13->16 17 2981427-298142a 13->17 40 2981660-2981666 14->40 41 2981667-2981741 14->41 15->14 31 2981544-2981549 15->31 19 2981412 16->19 20 2981414-2981423 16->20 17->4 19->20 20->20 21 2981425 20->21 21->17 25 2981493-298149d 24->25 26 29814b4-29814b7 24->26 29 298149f 25->29 30 29814a1-29814b0 25->30 26->8 29->30 30->30 32 29814b2 30->32 34 298154b-2981555 31->34 35 298156c-298156f 31->35 32->26 36 2981559-2981568 34->36 37 2981557 34->37 35->14 36->36 39 298156a 36->39 37->36 39->35 40->41 52 2981751-2981755 41->52 53 2981743-2981747 41->53 54 2981765-2981769 52->54 55 2981757-298175b 52->55 53->52 56 2981749 53->56 58 2981779-298177d 54->58 59 298176b-298176f 54->59 55->54 57 298175d 55->57 56->52 57->54 61 298177f-29817a8 58->61 62 29817b3-29817be 58->62 59->58 60 2981771 59->60 60->58 61->62 65 29817bf 62->65 65->65
                                                  APIs
                                                  • CreateProcessA.KERNELBASE(?,?,03BF3578,03BF357C,029812BE,?,?,?,?,?), ref: 0298164B
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2055130185.0000000002980000.00000040.00000800.00020000.00000000.sdmp, Offset: 02980000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_2980000_JHGFDFG.jbxd
                                                  Similarity
                                                  • API ID: CreateProcess
                                                  • String ID: Rb$Rb
                                                  • API String ID: 963392458-3448890300
                                                  • Opcode ID: 39fd8d7d8a39c1ac9ec9cc429d724503e77a6c963ee8632fcfb7e4113fc2e8cd
                                                  • Instruction ID: 39f772fb7c8515b9608a2d49913ad0663d44153081d5a71360b305d21e88af42
                                                  • Opcode Fuzzy Hash: 39fd8d7d8a39c1ac9ec9cc429d724503e77a6c963ee8632fcfb7e4113fc2e8cd
                                                  • Instruction Fuzzy Hash: 07D13570D002698FDB24DFA8C880BEDBBF5FF49304F0491AAD559A7250DB749A85CF91

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 67 29805bc-29813cb 70 298142d-2981458 67->70 71 29813cd-29813fd 67->71 74 29814ba-2981513 70->74 75 298145a-298148a 70->75 71->70 79 29813ff-2981404 71->79 80 2981572-298165e CreateProcessA 74->80 81 2981515-2981542 74->81 75->74 90 298148c-2981491 75->90 82 2981406-2981410 79->82 83 2981427-298142a 79->83 106 2981660-2981666 80->106 107 2981667-2981741 80->107 81->80 97 2981544-2981549 81->97 85 2981412 82->85 86 2981414-2981423 82->86 83->70 85->86 86->86 87 2981425 86->87 87->83 91 2981493-298149d 90->91 92 29814b4-29814b7 90->92 95 298149f 91->95 96 29814a1-29814b0 91->96 92->74 95->96 96->96 98 29814b2 96->98 100 298154b-2981555 97->100 101 298156c-298156f 97->101 98->92 102 2981559-2981568 100->102 103 2981557 100->103 101->80 102->102 105 298156a 102->105 103->102 105->101 106->107 118 2981751-2981755 107->118 119 2981743-2981747 107->119 120 2981765-2981769 118->120 121 2981757-298175b 118->121 119->118 122 2981749 119->122 124 2981779-298177d 120->124 125 298176b-298176f 120->125 121->120 123 298175d 121->123 122->118 123->120 127 298177f-29817a8 124->127 128 29817b3-29817be 124->128 125->124 126 2981771 125->126 126->124 127->128 131 29817bf 128->131 131->131
                                                  APIs
                                                  • CreateProcessA.KERNELBASE(?,?,03BF3578,03BF357C,029812BE,?,?,?,?,?), ref: 0298164B
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2055130185.0000000002980000.00000040.00000800.00020000.00000000.sdmp, Offset: 02980000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_2980000_JHGFDFG.jbxd
                                                  Similarity
                                                  • API ID: CreateProcess
                                                  • String ID: Rb$Rb
                                                  • API String ID: 963392458-3448890300
                                                  • Opcode ID: 917601cfa79d4333d8a9b37651e2eba484e2b9252426aeec8459ecaaedde6248
                                                  • Instruction ID: d3fbd4a835738f683b76fc3c6a4dc47040d1b2a1abd622aa949563d20dc05e74
                                                  • Opcode Fuzzy Hash: 917601cfa79d4333d8a9b37651e2eba484e2b9252426aeec8459ecaaedde6248
                                                  • Instruction Fuzzy Hash: CCD12570D002298FDB24DFA8C880BEDBBF5FF49304F0491AAD559A7250DB749A85CF95

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 133 298131d-29813cb 135 298142d-2981458 133->135 136 29813cd-29813fd 133->136 139 29814ba-2981513 135->139 140 298145a-298148a 135->140 136->135 144 29813ff-2981404 136->144 145 2981572-298165e CreateProcessA 139->145 146 2981515-2981542 139->146 140->139 155 298148c-2981491 140->155 147 2981406-2981410 144->147 148 2981427-298142a 144->148 171 2981660-2981666 145->171 172 2981667-2981741 145->172 146->145 162 2981544-2981549 146->162 150 2981412 147->150 151 2981414-2981423 147->151 148->135 150->151 151->151 152 2981425 151->152 152->148 156 2981493-298149d 155->156 157 29814b4-29814b7 155->157 160 298149f 156->160 161 29814a1-29814b0 156->161 157->139 160->161 161->161 163 29814b2 161->163 165 298154b-2981555 162->165 166 298156c-298156f 162->166 163->157 167 2981559-2981568 165->167 168 2981557 165->168 166->145 167->167 170 298156a 167->170 168->167 170->166 171->172 183 2981751-2981755 172->183 184 2981743-2981747 172->184 185 2981765-2981769 183->185 186 2981757-298175b 183->186 184->183 187 2981749 184->187 189 2981779-298177d 185->189 190 298176b-298176f 185->190 186->185 188 298175d 186->188 187->183 188->185 192 298177f-29817a8 189->192 193 29817b3-29817be 189->193 190->189 191 2981771 190->191 191->189 192->193 196 29817bf 193->196 196->196
                                                  APIs
                                                  • CreateProcessA.KERNELBASE(?,?,03BF3578,03BF357C,029812BE,?,?,?,?,?), ref: 0298164B
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2055130185.0000000002980000.00000040.00000800.00020000.00000000.sdmp, Offset: 02980000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_2980000_JHGFDFG.jbxd
                                                  Similarity
                                                  • API ID: CreateProcess
                                                  • String ID: Rb$Rb
                                                  • API String ID: 963392458-3448890300
                                                  • Opcode ID: a6bb4b82dfb46d961dab9041c310edc1b05861a85e32b5c82bf2b95cf1a7cfcf
                                                  • Instruction ID: e4e7ce3650514d5f0c4d4de2bd04fcbf9dacdb9f9958baf8ac89d9d5c339ef02
                                                  • Opcode Fuzzy Hash: a6bb4b82dfb46d961dab9041c310edc1b05861a85e32b5c82bf2b95cf1a7cfcf
                                                  • Instruction Fuzzy Hash: A0D12670D002298FDB24DFA8C881BEDBBF5BF49304F0491AAD459A7250DB749A86CF91

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 198 298056b-2980584 200 29805e4-2981b8c ReadProcessMemory 198->200 201 2980586-298059b 198->201 205 2981b8e-2981b94 200->205 206 2981b95-2981bdf 200->206 201->200 205->206
                                                  APIs
                                                  • ReadProcessMemory.KERNELBASE(00000004,?,02981A9B,?,?), ref: 02981B7C
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2055130185.0000000002980000.00000040.00000800.00020000.00000000.sdmp, Offset: 02980000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_2980000_JHGFDFG.jbxd
                                                  Similarity
                                                  • API ID: MemoryProcessRead
                                                  • String ID: Rb
                                                  • API String ID: 1726664587-1629373818
                                                  • Opcode ID: a3c5e2751368e5b0b5a93de81b29065ce37560a56d09b3e4af4c104d4aa7041e
                                                  • Instruction ID: 78f7a67fca60d6d53d0af95e87c8429653cd1341ad1396c5ea541b44b128d662
                                                  • Opcode Fuzzy Hash: a3c5e2751368e5b0b5a93de81b29065ce37560a56d09b3e4af4c104d4aa7041e
                                                  • Instruction Fuzzy Hash: 9951F475C092989FCB01CFA9D984ADDBFF0FF0A300F14909AE454BB251D375A946CB55

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 210 2980620-29820af 214 29820b1-29820c3 210->214 215 29820c6-2982125 WriteProcessMemory 210->215 214->215 216 298212e-2982178 215->216 217 2982127-298212d 215->217 217->216
                                                  APIs
                                                  • WriteProcessMemory.KERNELBASE(?,?,?,?,00000000), ref: 02982115
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2055130185.0000000002980000.00000040.00000800.00020000.00000000.sdmp, Offset: 02980000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_2980000_JHGFDFG.jbxd
                                                  Similarity
                                                  • API ID: MemoryProcessWrite
                                                  • String ID: Rb
                                                  • API String ID: 3559483778-1629373818
                                                  • Opcode ID: ea8d1eef21f1251e4f4294780b3b9a7c10d469baef25e408d54be85fc6b9eecc
                                                  • Instruction ID: d77358246ec225936c211974c2fbcde44e0f979da000930bde2cf4fc2717f4f9
                                                  • Opcode Fuzzy Hash: ea8d1eef21f1251e4f4294780b3b9a7c10d469baef25e408d54be85fc6b9eecc
                                                  • Instruction Fuzzy Hash: DF419AB4D002989FCB10DFA9D984AEEBBF1BF09310F24906AE818B7210D374A945CB64

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 221 298062c-29820af 224 29820b1-29820c3 221->224 225 29820c6-2982125 WriteProcessMemory 221->225 224->225 226 298212e-2982178 225->226 227 2982127-298212d 225->227 227->226
                                                  APIs
                                                  • WriteProcessMemory.KERNELBASE(?,?,?,?,00000000), ref: 02982115
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2055130185.0000000002980000.00000040.00000800.00020000.00000000.sdmp, Offset: 02980000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_2980000_JHGFDFG.jbxd
                                                  Similarity
                                                  • API ID: MemoryProcessWrite
                                                  • String ID: Rb
                                                  • API String ID: 3559483778-1629373818
                                                  • Opcode ID: 39b2881bc4ad1a26db7c35e1beeedcd6b406bcd16998bd0580affc12b9bc46cc
                                                  • Instruction ID: 8f7ad9375fdb69938b16a71dffc74fa8d90d066d79f4856dd93425569f40accb
                                                  • Opcode Fuzzy Hash: 39b2881bc4ad1a26db7c35e1beeedcd6b406bcd16998bd0580affc12b9bc46cc
                                                  • Instruction Fuzzy Hash: 354187B4D002589FCB10DFA9D984AEEFBF1FB09310F24902AE818B7210D379A945CF64

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 231 2982039-29820af 233 29820b1-29820c3 231->233 234 29820c6-2982125 WriteProcessMemory 231->234 233->234 235 298212e-2982178 234->235 236 2982127-298212d 234->236 236->235
                                                  APIs
                                                  • WriteProcessMemory.KERNELBASE(?,?,?,?,00000000), ref: 02982115
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2055130185.0000000002980000.00000040.00000800.00020000.00000000.sdmp, Offset: 02980000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_2980000_JHGFDFG.jbxd
                                                  Similarity
                                                  • API ID: MemoryProcessWrite
                                                  • String ID: Rb
                                                  • API String ID: 3559483778-1629373818
                                                  • Opcode ID: a428cc6cec39b92a94b62f05698090d3edf49640913a15c168602527a2765821
                                                  • Instruction ID: fd8cf4821dc02db58719b2f98c97da76a29fed982d19e707d6cfcf6029628398
                                                  • Opcode Fuzzy Hash: a428cc6cec39b92a94b62f05698090d3edf49640913a15c168602527a2765821
                                                  • Instruction Fuzzy Hash: CC416AB5D002589FCB10DFA9D984AEEFBF1BF49314F24902AE918B7210D375A945CF64

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 240 29805f0-2981b8c ReadProcessMemory 244 2981b8e-2981b94 240->244 245 2981b95-2981bdf 240->245 244->245
                                                  APIs
                                                  • ReadProcessMemory.KERNELBASE(00000004,?,02981A9B,?,?), ref: 02981B7C
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2055130185.0000000002980000.00000040.00000800.00020000.00000000.sdmp, Offset: 02980000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_2980000_JHGFDFG.jbxd
                                                  Similarity
                                                  • API ID: MemoryProcessRead
                                                  • String ID: Rb
                                                  • API String ID: 1726664587-1629373818
                                                  • Opcode ID: ce5e3592478fd3332ee2e12b3b9d0a81a1c9614b654b75c0f1e2c8699bf36af0
                                                  • Instruction ID: 2dd4670b7ca557d82b04612d1a20a4b0c82afa270b87df065ab783be83d66930
                                                  • Opcode Fuzzy Hash: ce5e3592478fd3332ee2e12b3b9d0a81a1c9614b654b75c0f1e2c8699bf36af0
                                                  • Instruction Fuzzy Hash: 7D41A9B5D042589FCB00DFA9D984AEEFBF0BF19310F14906AE818B7210D375A942CF64

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 249 29805fc-2981b8c ReadProcessMemory 252 2981b8e-2981b94 249->252 253 2981b95-2981bdf 249->253 252->253
                                                  APIs
                                                  • ReadProcessMemory.KERNELBASE(00000004,?,02981A9B,?,?), ref: 02981B7C
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2055130185.0000000002980000.00000040.00000800.00020000.00000000.sdmp, Offset: 02980000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_2980000_JHGFDFG.jbxd
                                                  Similarity
                                                  • API ID: MemoryProcessRead
                                                  • String ID: Rb
                                                  • API String ID: 1726664587-1629373818
                                                  • Opcode ID: 0edb6fe50dffffcd951036e1fad95a1f64f38d0b402768ee71d41b603921fb6a
                                                  • Instruction ID: d958a10e0435afc3f714e870dd1625984982ed24a1a448fe6be7e2b901d5f6cf
                                                  • Opcode Fuzzy Hash: 0edb6fe50dffffcd951036e1fad95a1f64f38d0b402768ee71d41b603921fb6a
                                                  • Instruction Fuzzy Hash: 9C4198B9D002589FCB00DFA9D984AEEFBF1BB09310F14902AE818B7210D375A941CF64

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 257 2980608-2981cf8 260 2981d00-2981d74 VirtualAllocEx 257->260 261 2981d7d-2981dbf 260->261 262 2981d76-2981d7c 260->262 262->261
                                                  APIs
                                                  • VirtualAllocEx.KERNELBASE(?,?,?,00003000,00000040), ref: 02981D64
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2055130185.0000000002980000.00000040.00000800.00020000.00000000.sdmp, Offset: 02980000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_2980000_JHGFDFG.jbxd
                                                  Similarity
                                                  • API ID: AllocVirtual
                                                  • String ID: Rb
                                                  • API String ID: 4275171209-1629373818
                                                  • Opcode ID: f0a141fea03f4d7911535184da6d89ffd07092968b5712135507b87c72117f9a
                                                  • Instruction ID: 325647ac500b15e34cbed2029ae627a978b70b6fa416b4c6fb262a39d1d7052d
                                                  • Opcode Fuzzy Hash: f0a141fea03f4d7911535184da6d89ffd07092968b5712135507b87c72117f9a
                                                  • Instruction Fuzzy Hash: C84189B8D042589FCB10DFA9D984A9EFBF4FF09310F14906AE818BB210D375A941CFA4

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 266 2981ac1-2981b8c ReadProcessMemory 268 2981b8e-2981b94 266->268 269 2981b95-2981bdf 266->269 268->269
                                                  APIs
                                                  • ReadProcessMemory.KERNELBASE(00000004,?,02981A9B,?,?), ref: 02981B7C
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2055130185.0000000002980000.00000040.00000800.00020000.00000000.sdmp, Offset: 02980000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_2980000_JHGFDFG.jbxd
                                                  Similarity
                                                  • API ID: MemoryProcessRead
                                                  • String ID: Rb
                                                  • API String ID: 1726664587-1629373818
                                                  • Opcode ID: ffb57129c8cda90ac8a6bf42b769f9397939977fc8bdbee80c29c8f08a8054bc
                                                  • Instruction ID: 6377045fd7735a160ffddd982e8a07b10cd4f74e451f2bcd762cbe13d2bd0d31
                                                  • Opcode Fuzzy Hash: ffb57129c8cda90ac8a6bf42b769f9397939977fc8bdbee80c29c8f08a8054bc
                                                  • Instruction Fuzzy Hash: 954189B9D052589FCF00CFA9D984AEEFBB1BF09310F14946AE819B7210D375A945CF64

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 273 2981cb0-2981cf8 274 2981d00-2981d74 VirtualAllocEx 273->274 275 2981d7d-2981dbf 274->275 276 2981d76-2981d7c 274->276 276->275
                                                  APIs
                                                  • VirtualAllocEx.KERNELBASE(?,?,?,00003000,00000040), ref: 02981D64
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2055130185.0000000002980000.00000040.00000800.00020000.00000000.sdmp, Offset: 02980000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_2980000_JHGFDFG.jbxd
                                                  Similarity
                                                  • API ID: AllocVirtual
                                                  • String ID: Rb
                                                  • API String ID: 4275171209-1629373818
                                                  • Opcode ID: 6f75cc7da9f3220c96d5aaa4631f7a758573114cdc1bae4a3c2a0a91916b988b
                                                  • Instruction ID: f095e6e5780cc6c5df2dd4764b6f9a6b082b08c7725dffef24317a3145cca07c
                                                  • Opcode Fuzzy Hash: 6f75cc7da9f3220c96d5aaa4631f7a758573114cdc1bae4a3c2a0a91916b988b
                                                  • Instruction Fuzzy Hash: 464175B8D012589FCF10CFA9D984ADEFBB1BF49310F24902AE818B7210D375A942CF64

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 280 2980614-2981d74 VirtualAllocEx 283 2981d7d-2981dbf 280->283 284 2981d76-2981d7c 280->284 284->283
                                                  APIs
                                                  • VirtualAllocEx.KERNELBASE(?,?,?,00003000,00000040), ref: 02981D64
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2055130185.0000000002980000.00000040.00000800.00020000.00000000.sdmp, Offset: 02980000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_2980000_JHGFDFG.jbxd
                                                  Similarity
                                                  • API ID: AllocVirtual
                                                  • String ID: Rb
                                                  • API String ID: 4275171209-1629373818
                                                  • Opcode ID: 496ee930c950d889dfa2aaa45aeb85bb9833b14aad26341094c6a787c45eaec0
                                                  • Instruction ID: 7b724c5ad6156ce43f1607cc5e73201c64f79b116474ad4e413d530beb43e682
                                                  • Opcode Fuzzy Hash: 496ee930c950d889dfa2aaa45aeb85bb9833b14aad26341094c6a787c45eaec0
                                                  • Instruction Fuzzy Hash: EE4165B8D002589FCB10DFA9D984A9EFBB5FF09310F14942AE818B7210D375A942CBA4

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 288 2980638-298199c 292 298199e-29819b0 288->292 293 29819b3-29819f9 Wow64SetThreadContext 288->293 292->293 294 29819fb-2981a01 293->294 295 2981a02-2981a46 293->295 294->295
                                                  APIs
                                                  • Wow64SetThreadContext.KERNEL32(?,?), ref: 029819E9
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2055130185.0000000002980000.00000040.00000800.00020000.00000000.sdmp, Offset: 02980000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_2980000_JHGFDFG.jbxd
                                                  Similarity
                                                  • API ID: ContextThreadWow64
                                                  • String ID: Rb
                                                  • API String ID: 983334009-1629373818
                                                  • Opcode ID: 7e2287f065bf89e2d79d1a3088e9b7e94fe94b9016f17cc0d83fc28e73bd4f33
                                                  • Instruction ID: 0ff2a78d66a047497bafe31f0bf9e47ca0e196a4e45908b0e935f559ff9c88cc
                                                  • Opcode Fuzzy Hash: 7e2287f065bf89e2d79d1a3088e9b7e94fe94b9016f17cc0d83fc28e73bd4f33
                                                  • Instruction Fuzzy Hash: E741BCB4D012589FCB10DFA9D984ADEBBF0BF09310F14806AE418B7210D379A946CFA4

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 299 29805d4-298199c 302 298199e-29819b0 299->302 303 29819b3-29819f9 Wow64SetThreadContext 299->303 302->303 304 29819fb-2981a01 303->304 305 2981a02-2981a46 303->305 304->305
                                                  APIs
                                                  • Wow64SetThreadContext.KERNEL32(?,?), ref: 029819E9
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2055130185.0000000002980000.00000040.00000800.00020000.00000000.sdmp, Offset: 02980000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_2980000_JHGFDFG.jbxd
                                                  Similarity
                                                  • API ID: ContextThreadWow64
                                                  • String ID: Rb
                                                  • API String ID: 983334009-1629373818
                                                  • Opcode ID: 7d5e5b234725725f54f0eb1a292929fc6aa82111b22fbbeada807af00684e149
                                                  • Instruction ID: 08aae672e2b2647d0f8414ecde4e7a0744579fe9753d9238d642c2d276c9f057
                                                  • Opcode Fuzzy Hash: 7d5e5b234725725f54f0eb1a292929fc6aa82111b22fbbeada807af00684e149
                                                  • Instruction Fuzzy Hash: B2419BB4D012589FCB10DFAAD984ADEFBF5BB49310F14802AE418B7310D379A946CFA4
                                                  APIs
                                                  • Wow64SetThreadContext.KERNEL32(?,?), ref: 029819E9
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2055130185.0000000002980000.00000040.00000800.00020000.00000000.sdmp, Offset: 02980000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_2980000_JHGFDFG.jbxd
                                                  Similarity
                                                  • API ID: ContextThreadWow64
                                                  • String ID: Rb
                                                  • API String ID: 983334009-1629373818
                                                  • Opcode ID: a54fb1c4fa1e4ec1c6d5c9a87371e38bd18e535c27f824ebefc75c54d6198edd
                                                  • Instruction ID: 15616902f4fe12445b6330f1423d9a66f4f4cd2a018578d884fe66bf54ad42ba
                                                  • Opcode Fuzzy Hash: a54fb1c4fa1e4ec1c6d5c9a87371e38bd18e535c27f824ebefc75c54d6198edd
                                                  • Instruction Fuzzy Hash: 67419BB4D012589FCB10DFAAD984ADEFBF4BB49310F14802AE418B7310D379A946CFA4
                                                  APIs
                                                  • Wow64SetThreadContext.KERNEL32(?,?), ref: 029819E9
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2055130185.0000000002980000.00000040.00000800.00020000.00000000.sdmp, Offset: 02980000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_2980000_JHGFDFG.jbxd
                                                  Similarity
                                                  • API ID: ContextThreadWow64
                                                  • String ID: Rb
                                                  • API String ID: 983334009-1629373818
                                                  • Opcode ID: f4193e479ea9ca104b6636771895177a0c51ad64a44ff693b8cea9a5f25bf841
                                                  • Instruction ID: 38abbed191204f9b8c55877675f9e94a2aac7380cd0e637f38485ebe910dd996
                                                  • Opcode Fuzzy Hash: f4193e479ea9ca104b6636771895177a0c51ad64a44ff693b8cea9a5f25bf841
                                                  • Instruction Fuzzy Hash: 5E419CB4D012589FCB10CFA9D584ADEFBF1BB49310F14802AE458B7250D379A946CF65
                                                  APIs
                                                  • ResumeThread.KERNELBASE(00000000), ref: 02982445
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2055130185.0000000002980000.00000040.00000800.00020000.00000000.sdmp, Offset: 02980000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_2980000_JHGFDFG.jbxd
                                                  Similarity
                                                  • API ID: ResumeThread
                                                  • String ID: Rb
                                                  • API String ID: 947044025-1629373818
                                                  • Opcode ID: d5c2e90ac54a09429b7ffa40b79593912419ca7f6936eb5efd604ea67b1da531
                                                  • Instruction ID: af35b23e69145e9d7315a59b690bebd2d1586f02eaeda89ffab0d9cefc4569c9
                                                  • Opcode Fuzzy Hash: d5c2e90ac54a09429b7ffa40b79593912419ca7f6936eb5efd604ea67b1da531
                                                  • Instruction Fuzzy Hash: FC3188B4D012589FCB10DFA9E584A9EFBF4FB09310F14946AE918B7310D775A941CFA4
                                                  APIs
                                                  • ResumeThread.KERNELBASE(00000000), ref: 02982445
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2055130185.0000000002980000.00000040.00000800.00020000.00000000.sdmp, Offset: 02980000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_2980000_JHGFDFG.jbxd
                                                  Similarity
                                                  • API ID: ResumeThread
                                                  • String ID: Rb
                                                  • API String ID: 947044025-1629373818
                                                  • Opcode ID: 63eacaf1299ef7eccbc9466ce64facfb1204955bdd42efbcfd8525d248aee96e
                                                  • Instruction ID: e460cf34f14d6f5c5398408ad6349084ccac99fa0b019ade246dd18b7ddc679e
                                                  • Opcode Fuzzy Hash: 63eacaf1299ef7eccbc9466ce64facfb1204955bdd42efbcfd8525d248aee96e
                                                  • Instruction Fuzzy Hash: 703198B8D012589FCB10CFA9E584A9EFBF4BF09310F14906AE818B7310C775A945CF64
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3298129652.00000000015B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_15b0000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: Xaq$Xaq$Xaq$Xaq$Xaq$Xaq
                                                  • API String ID: 0-499371476
                                                  • Opcode ID: 3495cb1c83c6f8d29ca72b021982c38e551e4203a207ca6cf05e351a67982a49
                                                  • Instruction ID: a310a95e413316e6006e8c6cd44b86ea3530f9b1dfb5596721134faf98243a89
                                                  • Opcode Fuzzy Hash: 3495cb1c83c6f8d29ca72b021982c38e551e4203a207ca6cf05e351a67982a49
                                                  • Instruction Fuzzy Hash: BD7250366883558FC7918F25A4D01D4BBE1FF9123172884AECDC48E156D73E688EEB71
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3298129652.00000000015B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_15b0000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: N
                                                  • API String ID: 0-1130791706
                                                  • Opcode ID: 511eb2f7ff27fd0e49227cba75aa0cf5acc4cfa33a0d0c93f19e8087e8fee69c
                                                  • Instruction ID: 11408a4163904b16d7b25aaac910b95ae78c863f571eb58f07737cd58703e546
                                                  • Opcode Fuzzy Hash: 511eb2f7ff27fd0e49227cba75aa0cf5acc4cfa33a0d0c93f19e8087e8fee69c
                                                  • Instruction Fuzzy Hash: D873D731C1065A8EDB11EF68C854AEDFBB1FF95300F51D69AE4486B221EB70AAD4CF41
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3298129652.00000000015B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_15b0000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: Xaq$$]q
                                                  • API String ID: 0-1280934391
                                                  • Opcode ID: 7e19175260968e7dbbc0123cfed1aeac1776fc99da06784df31a52a8721dc997
                                                  • Instruction ID: da634c753bfb43d2fab8eb080c86a6aa46ebd7f7771abc6893d0c98013935b01
                                                  • Opcode Fuzzy Hash: 7e19175260968e7dbbc0123cfed1aeac1776fc99da06784df31a52a8721dc997
                                                  • Instruction Fuzzy Hash: DA91A631B002599BDF58DF78989427EBBB7BFC8710B15892DE406EB288DE35C806D791
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3298129652.00000000015B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_15b0000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 51ce9e64418d59c81124a3411f2abe4f827152a41e1839db41ab9f8a8e0657b5
                                                  • Instruction ID: 23f3920ca0193c12c33b2929903cd12ee0d03cd8d1c8064dbed49568c9da2cce
                                                  • Opcode Fuzzy Hash: 51ce9e64418d59c81124a3411f2abe4f827152a41e1839db41ab9f8a8e0657b5
                                                  • Instruction Fuzzy Hash: 2FC1AE74E00218CFDB14DFA5D984BADBBB2BF88305F1090A9D809AB355DB359A85CF11
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3298129652.00000000015B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_15b0000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: ee472356d2e3ed03b854cadd671fbfb3c399ba62a41260c2ccfc6d8b1eae5d33
                                                  • Instruction ID: abc2dd83d7f80d3554ce99d8fa3ad4bf88940204acda35dae33064a4be2a4dcd
                                                  • Opcode Fuzzy Hash: ee472356d2e3ed03b854cadd671fbfb3c399ba62a41260c2ccfc6d8b1eae5d33
                                                  • Instruction Fuzzy Hash: 9EA12A71D016198EDB15DFA9C8847EDFBB1FF89300F14C6AAE4186B261EB709A84CF41
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3298129652.00000000015B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_15b0000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 1459343ee59d942257d583fa2bf4820a886992ba156864427405aaa15db4bcb6
                                                  • Instruction ID: fc468a9edf4c71be0d8066d96c6c26d80cc3ddfbe06109da819541359169164c
                                                  • Opcode Fuzzy Hash: 1459343ee59d942257d583fa2bf4820a886992ba156864427405aaa15db4bcb6
                                                  • Instruction Fuzzy Hash: 0CA10570D00209CFEB14DFA9C598BDDBBB1FF88305F208269E519AB2A1DB749985CF51
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3298129652.00000000015B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_15b0000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: fa3d35260bf5fd3d9f59906b1136689fe88a86ab297904ae7fac78beb43d3e98
                                                  • Instruction ID: 17feababb96aa2e872c97ee639508abf367133a58fe284c253fa9574647dafd5
                                                  • Opcode Fuzzy Hash: fa3d35260bf5fd3d9f59906b1136689fe88a86ab297904ae7fac78beb43d3e98
                                                  • Instruction Fuzzy Hash: 9491F4B0D00208CFEB10DFA8C988BDDBBB1FF49315F209269E519AB291DB749985CF15
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3298129652.00000000015B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_15b0000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 7f23bf6f116b5d491dc6306afcddceb0af365c923001b60ce4952b8ce42f444f
                                                  • Instruction ID: 1147ccfbd518fa9f0f7b5f01f4b9f36c91f9dec7293309e5723d49e4d5b85919
                                                  • Opcode Fuzzy Hash: 7f23bf6f116b5d491dc6306afcddceb0af365c923001b60ce4952b8ce42f444f
                                                  • Instruction Fuzzy Hash: 5A41E5B4E01208CBDB18CFAAD8546EDBBF2BF88305F24D029D915AB255EB399945CF50
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3298129652.00000000015B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_15b0000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 8bq$Haq$Haq$Haq$TJbq
                                                  • API String ID: 0-1597716666
                                                  • Opcode ID: 75b470a614f8d1306489484559f6bc4559d82b00c3bde011e97e05b35d699a61
                                                  • Instruction ID: 30249f0ca449ba1951efb0133402e6f912687b043901be41a69579c7c82815c9
                                                  • Opcode Fuzzy Hash: 75b470a614f8d1306489484559f6bc4559d82b00c3bde011e97e05b35d699a61
                                                  • Instruction Fuzzy Hash: 5ED1BE30B042058FDB15DF6CC890AAE7BA6FF89320F244569E506EF3A1DA75DC42CB91
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3298129652.00000000015B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_15b0000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 0o@p$Lj@p$Lj@p$PH]q$PH]q
                                                  • API String ID: 0-1229222154
                                                  • Opcode ID: fde0e9b7405667a6ba1e6369f4fa7e33a918ff7db747d3b2a7bce1cef2a2d5a4
                                                  • Instruction ID: 2f002927d31c10796ff1ae31bd127135207621c510261eeed03b7b6477977db3
                                                  • Opcode Fuzzy Hash: fde0e9b7405667a6ba1e6369f4fa7e33a918ff7db747d3b2a7bce1cef2a2d5a4
                                                  • Instruction Fuzzy Hash: 5A51C274E002089FDB58DFA9D5849EDBBF2BF89310F108469E816AB364DB349846CF10
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3298129652.00000000015B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_15b0000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: $Haq$Haq$Haq
                                                  • API String ID: 0-432640594
                                                  • Opcode ID: 7b59029c7f87f9714e7710a9c0d10116d2954c3508ef1607b65cc4c23dd2ea50
                                                  • Instruction ID: 9afe28eebd36cf3803a3939ef097b5bfae4d74d8e0bc2683ad998563d613f84f
                                                  • Opcode Fuzzy Hash: 7b59029c7f87f9714e7710a9c0d10116d2954c3508ef1607b65cc4c23dd2ea50
                                                  • Instruction Fuzzy Hash: 65A19E307002199FDB269F7898986BE7FA2FF85320F14862AE9268B3D1DF759D01C751
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3298129652.00000000015B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_15b0000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 8bq$TJbq
                                                  • API String ID: 0-3440557903
                                                  • Opcode ID: dd76ef3ac834aca8586c9bdec14ade321e92161047b3a5dc56ad8b16f6e35cfe
                                                  • Instruction ID: 8c3feb10eb2bb7ff2ea764c010824628c704b4879d41f0f76d8657dcf390de7d
                                                  • Opcode Fuzzy Hash: dd76ef3ac834aca8586c9bdec14ade321e92161047b3a5dc56ad8b16f6e35cfe
                                                  • Instruction Fuzzy Hash: 1331F235B001098FCB45DBA8C591EDEBBB6FF88220F195454E505AF365CB71EC45CB90
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3298129652.00000000015B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_15b0000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: 8bq$TJbq
                                                  • API String ID: 0-3440557903
                                                  • Opcode ID: e08f660b54156381f235e6caa60789eff4e751089921c82dd3e47a29ffee9cbd
                                                  • Instruction ID: e883701238142569eab4807e2d0772dbab74afe4a9b786880a279e37ea131b2c
                                                  • Opcode Fuzzy Hash: e08f660b54156381f235e6caa60789eff4e751089921c82dd3e47a29ffee9cbd
                                                  • Instruction Fuzzy Hash: 0531F135B401098FCB45DBA8C590EDEBBB6FF88220F195454E505AF3A5CA71EC86CB90
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3298129652.00000000015B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_15b0000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: LR]q
                                                  • API String ID: 0-3081347316
                                                  • Opcode ID: 7802c56af5de01d778cd37881a5e31fe7fc541d41a57e57c076ae49b9b2a746c
                                                  • Instruction ID: 5a8f329685346e4c9dabd0d57d240c6fee9b746f6056f46261ee3a8444a08ad4
                                                  • Opcode Fuzzy Hash: 7802c56af5de01d778cd37881a5e31fe7fc541d41a57e57c076ae49b9b2a746c
                                                  • Instruction Fuzzy Hash: 3AA13170A0020ACFCB15DFA8E9949EEBBB9FF89306F109165D405AB365DB389D45CF81
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3298129652.00000000015B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_15b0000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: LR]q
                                                  • API String ID: 0-3081347316
                                                  • Opcode ID: 606e67ce5a9b68c41c43184fb627adcc48df3d045b4c8c316458bd7d12928a6d
                                                  • Instruction ID: 055be4cc58f0719030d29502e7cac894ddb557947187b471fd1530cb3ecdd4ef
                                                  • Opcode Fuzzy Hash: 606e67ce5a9b68c41c43184fb627adcc48df3d045b4c8c316458bd7d12928a6d
                                                  • Instruction Fuzzy Hash: DFA11174A0020ACFCB14DFA8E9949EEBBB9FF88302F109565D415AB365DB386D45CF81
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3298129652.00000000015B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_15b0000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: Haq
                                                  • API String ID: 0-725504367
                                                  • Opcode ID: 2343c70af9a06854c295c45cf01cee04d1ac34377567fcb957d800922c9d9bde
                                                  • Instruction ID: b702530b0a0f72cf1c3cde208ace166a322c0106bc93bb727cc062353dba24fd
                                                  • Opcode Fuzzy Hash: 2343c70af9a06854c295c45cf01cee04d1ac34377567fcb957d800922c9d9bde
                                                  • Instruction Fuzzy Hash: BE21A3306042099FC709DF68D995BAE7FB6FF95301F25806ED5058B3A5DE719D02CB90
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3298129652.00000000015B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_15b0000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: Haq
                                                  • API String ID: 0-725504367
                                                  • Opcode ID: 3af6a2e94a2d3c10a035e9502a816cd18417271447f426240a4394e49b4607c5
                                                  • Instruction ID: b1b18d4a8dd1ccf8448f8034e1891cb4c938264c79a8b52be8ebc7b101f6d16b
                                                  • Opcode Fuzzy Hash: 3af6a2e94a2d3c10a035e9502a816cd18417271447f426240a4394e49b4607c5
                                                  • Instruction Fuzzy Hash: F4214D71B001099FCB44EFB8D895ABE7BF6FF88300B104469E519DB295DE349E02CB90
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3298129652.00000000015B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_15b0000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 955737b43d9e611dfeb8e1cd5487437bf81c68aecd7970372109ca5afa5606d5
                                                  • Instruction ID: d34e8a79ab60d00c0d876ab937f2e961668971be8582af7a9a2d5d9a89775121
                                                  • Opcode Fuzzy Hash: 955737b43d9e611dfeb8e1cd5487437bf81c68aecd7970372109ca5afa5606d5
                                                  • Instruction Fuzzy Hash: 4C51C272B002099FCB149A7DD894AAEBBE9FBC9324F14853AE529DB750D631D80187A4
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3298129652.00000000015B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_15b0000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 3f145f06ae0be09863bd18726d9e1b67820f34bde40dd14a706a549531921203
                                                  • Instruction ID: 52534feaeaa9041642114595ab5337c74320f018532ac1de22c3b632674c11ee
                                                  • Opcode Fuzzy Hash: 3f145f06ae0be09863bd18726d9e1b67820f34bde40dd14a706a549531921203
                                                  • Instruction Fuzzy Hash: 2941B375E012099FCB48DFAAD8949DDBBB2FF89310F249429E405BB364DB349845CF10
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3298129652.00000000015B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_15b0000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: e6f6edf471a41024327caf78aec15500a3a8675aca9aeea0daed6a3dd59f9a27
                                                  • Instruction ID: 4e708bf0d709eaf733469d0027803f0176c571692fa5d59a9eb90dc4b7566d6f
                                                  • Opcode Fuzzy Hash: e6f6edf471a41024327caf78aec15500a3a8675aca9aeea0daed6a3dd59f9a27
                                                  • Instruction Fuzzy Hash: 0F41B174E012098FCB58DFAAD8949DEBBF2BF89310F249429E805BB364DB349845CF14
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3298129652.00000000015B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_15b0000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: ca394921fc47a57f1edf6a4bbced34a447acede451f6447cdf638ea5a3ebf21d
                                                  • Instruction ID: 4ae74ed5f2f56805854c33a8d3afb3eb0617d48f9244643465fc363942d5a574
                                                  • Opcode Fuzzy Hash: ca394921fc47a57f1edf6a4bbced34a447acede451f6447cdf638ea5a3ebf21d
                                                  • Instruction Fuzzy Hash: C231AC7053664E8FD2412F61A5EF27ABFA2FB4F3A7B046C11F92A81515BF30A4849B50
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3298129652.00000000015B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_15b0000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 2b814ddd21c51a57b02bfd1b0bec22704ccb5cbd5004422f33c9dfed57e2ae46
                                                  • Instruction ID: 8077f1de08068a955fb9e4958120a94eaf47a9bf5747df387c6a0496efacadb3
                                                  • Opcode Fuzzy Hash: 2b814ddd21c51a57b02bfd1b0bec22704ccb5cbd5004422f33c9dfed57e2ae46
                                                  • Instruction Fuzzy Hash: 5A21B031A006469FCB54CF68D4909FE37A5FB88264F14C419D80E9B240EB34EA0ACBC2
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3297902173.000000000151D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0151D000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_151d000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 3d9c26d6b1eceb7ab82a656433e32af096a57b13302f95c785a6111c8810a06b
                                                  • Instruction ID: 44cd03ef3f8f37f66eb83bb1820f3f2b7e19b289faeebff844f5936792a648ef
                                                  • Opcode Fuzzy Hash: 3d9c26d6b1eceb7ab82a656433e32af096a57b13302f95c785a6111c8810a06b
                                                  • Instruction Fuzzy Hash: FA214275504200DFEB12CF98C9C8B26BBB5FB84314F20CA6DD8090F25AD33AD846CA62
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3298129652.00000000015B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_15b0000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 761c10096aff1e77adf01d765452e4ceec818d3a69f7882f2a4c80c0e177fd91
                                                  • Instruction ID: 1f8a4bc1e3ad97e3e8ee4a364c7c4b4b47a9c2e991b67c727cb3fa3eab22eee1
                                                  • Opcode Fuzzy Hash: 761c10096aff1e77adf01d765452e4ceec818d3a69f7882f2a4c80c0e177fd91
                                                  • Instruction Fuzzy Hash: FE215E70E442099FEB0AEFB8C4546AEBBB6FF85304F10C4A994149F294DB784945CF51
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3297902173.000000000151D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0151D000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_151d000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 51dd8fbfc29929b13d724b353d81eb7a69b8d04149469fcb710cbb077971a281
                                                  • Instruction ID: 03f3390fba0c1da43752847da93f52f9b1507e185c3deece8a2787d7e108cf1d
                                                  • Opcode Fuzzy Hash: 51dd8fbfc29929b13d724b353d81eb7a69b8d04149469fcb710cbb077971a281
                                                  • Instruction Fuzzy Hash: C7216B755093C08FDB13CF64C994715BF71AB46214F29C5EBC8898F2A7C23A984ACB62
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3298129652.00000000015B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_15b0000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: b7ea1b6a6cd24cc39befff45251eeffaf7bab5b684e72aa32b83ef3018200ffd
                                                  • Instruction ID: 5eb35a93fe7e4ac3d8fc514258641605ac5f441082fc3e5dad28e605bd208217
                                                  • Opcode Fuzzy Hash: b7ea1b6a6cd24cc39befff45251eeffaf7bab5b684e72aa32b83ef3018200ffd
                                                  • Instruction Fuzzy Hash: F2117C767002008FD724DF69D998A9AB7E6FF88721B14846EE549CF365CA71DC05CB10
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3298129652.00000000015B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_15b0000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 767ee4e664160df9c5c6cc4ad29696d850a84fa606c3c1fa689d4f9be6c57acd
                                                  • Instruction ID: 0a6ea8d036d72d728be4b3c151711618afb75dc982c6155be480d702a78f2e2b
                                                  • Opcode Fuzzy Hash: 767ee4e664160df9c5c6cc4ad29696d850a84fa606c3c1fa689d4f9be6c57acd
                                                  • Instruction Fuzzy Hash: AA214570D0460A8FCB50DFA8D8805EEBFB0FF4A310F04516AD405BB215EB344A94CBA1
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3298129652.00000000015B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_15b0000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 56cebb87970f87fae88e3603d5fa5c6f03df2201e1200bbec183510833e0acd9
                                                  • Instruction ID: 4f8a13ad3e7a046fa4cd455407b44d7c08d058c3bc291b44bbfc9f8d8e2bc488
                                                  • Opcode Fuzzy Hash: 56cebb87970f87fae88e3603d5fa5c6f03df2201e1200bbec183510833e0acd9
                                                  • Instruction Fuzzy Hash: 52114C75E0021A8BCB50EFB884945EEBFF5BF88251B444539D509BB200DA31DC428BE5
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3298129652.00000000015B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_15b0000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: f7797761509d2ae451f898c7be13d07a089b2eab7c8eabe51a44666279c1c7d1
                                                  • Instruction ID: db5142f1e4f1737e7c1e3df3d61274d21d7588bcf88439c16589d255a2406591
                                                  • Opcode Fuzzy Hash: f7797761509d2ae451f898c7be13d07a089b2eab7c8eabe51a44666279c1c7d1
                                                  • Instruction Fuzzy Hash: 4101F532B003015FD7359F7D889466E77EAAF84659315447DD90ACB315FE31C802CB92
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3298129652.00000000015B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_15b0000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: f8be605583a1991fd4a1343a285aca8776b5cff427d65f1a7194809c2560221d
                                                  • Instruction ID: 9b7bd7bb9e5156e3ee12a01ca70e299f31fea985514ea2d8ba3f18cb5f2ca468
                                                  • Opcode Fuzzy Hash: f8be605583a1991fd4a1343a285aca8776b5cff427d65f1a7194809c2560221d
                                                  • Instruction Fuzzy Hash: 4E01A232B002114FD734AE7D889456E77EBAFC45653104539D90ACB315FE71C8028B92
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3298129652.00000000015B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_15b0000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: adaf8503e32927961e778e3076854d386f8f3495522f0023f91ea421e437177b
                                                  • Instruction ID: 44d155ee53c0785778f91f4968da7694761db6b82586c9a210bffb466cc089ea
                                                  • Opcode Fuzzy Hash: adaf8503e32927961e778e3076854d386f8f3495522f0023f91ea421e437177b
                                                  • Instruction Fuzzy Hash: A6012975A1021D9FCF549F69D8495EE7FB6FB88211F00442AED5A97281EF309E108BA1
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3298129652.00000000015B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_15b0000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: d58c7423e8fd0d489acc30a643ed49b0a47921facc3dbf27362664c1e3d9a736
                                                  • Instruction ID: afc1c3606bfefe2965c737f1c791239dea9cea33480117d8f9f879a5bddf0c74
                                                  • Opcode Fuzzy Hash: d58c7423e8fd0d489acc30a643ed49b0a47921facc3dbf27362664c1e3d9a736
                                                  • Instruction Fuzzy Hash: F6015A713002048FD725DB6AD994F5AB7F5FF88721F108469E1498F365CAB0EC04CB50
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3298129652.00000000015B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_15b0000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 58be78e3f2bcc84fc77e25dc9f7304bbf2546370824779d0862b7246640972a3
                                                  • Instruction ID: 7b8df962ba1dd32cb1f4c27b5ef19476b72134ad5769c43d0ef8cbc4ee03229b
                                                  • Opcode Fuzzy Hash: 58be78e3f2bcc84fc77e25dc9f7304bbf2546370824779d0862b7246640972a3
                                                  • Instruction Fuzzy Hash: F40121322002488BC7046F78985E6BE3F96EFCA311F14006EE90BCB282DE76C902CB44
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3298129652.00000000015B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_15b0000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 0b73ba88a19dc7b828bdd6842febb4b154b082e68f262655487609441321e066
                                                  • Instruction ID: 48cb476f2fa84cbfe75fb0458fe3f05d6482add08e1e866eb2a1384b2406427a
                                                  • Opcode Fuzzy Hash: 0b73ba88a19dc7b828bdd6842febb4b154b082e68f262655487609441321e066
                                                  • Instruction Fuzzy Hash: D2017171A1010A9FCF10DFA8D8489EE7FB6FB88310B00452AFD59D3240DB309A10CB91
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3298129652.00000000015B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_15b0000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 3aaf579dae41318a05131d6d5d5091b9b103afe2f5a226b1cce29f1b391411fa
                                                  • Instruction ID: f17f7088719e21a90fc303b4b006872f730b402d9758a0309e7786816f2b665e
                                                  • Opcode Fuzzy Hash: 3aaf579dae41318a05131d6d5d5091b9b103afe2f5a226b1cce29f1b391411fa
                                                  • Instruction Fuzzy Hash: 94F0B43130424607C716A778D4552EE3FA6EFD6219B1805FD995DCF342DC66C8078790
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3298129652.00000000015B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_15b0000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 856fce68e0f5e53701680d9213bbffbcd3f1d6d2330b976d7b01611036cdd750
                                                  • Instruction ID: 071b621bd12235c4d01c0fe1ed4d337c63ba6479b07336e8ea114b473c54d90c
                                                  • Opcode Fuzzy Hash: 856fce68e0f5e53701680d9213bbffbcd3f1d6d2330b976d7b01611036cdd750
                                                  • Instruction Fuzzy Hash: 1EF05476B005128FDB159B7DA4546AE77E5FBC4221B14407AE509DF350CF75D802C754
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3298129652.00000000015B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_15b0000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 60a6d45cc8648b8bc54d957a5ae0a18dce644277207ebf0ed661977ba3e069a1
                                                  • Instruction ID: e2a00e7190abd533ce5c3c3d4cda7086508743070982108c63126f85993261e4
                                                  • Opcode Fuzzy Hash: 60a6d45cc8648b8bc54d957a5ae0a18dce644277207ebf0ed661977ba3e069a1
                                                  • Instruction Fuzzy Hash: 08F04F72A00109AFCB40EFA9D8449FF7BF9FF88210B004069F519D7211DA34D9118BA1
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3298129652.00000000015B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_15b0000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 08e4d2fb8d117d32d0383b88d20dfd866ed8a13fe089768f9afb6561bf779b2d
                                                  • Instruction ID: 2524b8d5aea54264d4b3a9b37fb4f9d86e7f7c57e4161cd60206aa31e2fa1bce
                                                  • Opcode Fuzzy Hash: 08e4d2fb8d117d32d0383b88d20dfd866ed8a13fe089768f9afb6561bf779b2d
                                                  • Instruction Fuzzy Hash: B2F03A353005059FC700CF59D488D6ABBEAFF887207544069EA098B331CB71AC11CB80
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3298129652.00000000015B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_15b0000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: fc0e3b4809781d7cf4aa1278f2947ff1b669f96f0688a0e5fbec0ac79fc442ed
                                                  • Instruction ID: 27ae768c08944198f2b23bdc1338dd79fc2c727291db32ec937da799810e734f
                                                  • Opcode Fuzzy Hash: fc0e3b4809781d7cf4aa1278f2947ff1b669f96f0688a0e5fbec0ac79fc442ed
                                                  • Instruction Fuzzy Hash: 28F0B4B6E01205AFCB50DFA9D981ADFBBF5FF48250B14453AD509E3204D6309905CBE1
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3298129652.00000000015B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_15b0000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 4bc2d388d5a4bf0efe140d077e7badce8422eeade8ed80c54dd639eabc2570ec
                                                  • Instruction ID: a855f1d08f3c48a8caa63598cf6965d6f75c6cafb78b00ddad257fd5b859e351
                                                  • Opcode Fuzzy Hash: 4bc2d388d5a4bf0efe140d077e7badce8422eeade8ed80c54dd639eabc2570ec
                                                  • Instruction Fuzzy Hash: B1F0AC340753028FD3266F24E4AC27D7B71FF4B317B066D55E02AC901AEB710059DB54
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3298129652.00000000015B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_15b0000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: eacf0b83752a5440064c931a17280445f00cb275cf9f8318ed67bfb4a3167612
                                                  • Instruction ID: c60aaa58b78b7e34ad04c8ee29c6efd7399a636f94b1c7543c61ca51960b1b51
                                                  • Opcode Fuzzy Hash: eacf0b83752a5440064c931a17280445f00cb275cf9f8318ed67bfb4a3167612
                                                  • Instruction Fuzzy Hash: B2E002740727068FD3322F64B5AC27E7A65FB8B317B466D00E12EC9019EF754458EB54
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3298129652.00000000015B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_15b0000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: cdff9d96922b0a882e8290f8570ae1fd5de2c3de04f8b5b2c7f49ece88d73897
                                                  • Instruction ID: 1fbc60c8a15c14525a33cf63ebe35a0a990fc927a625a8fa0c5c024f490dfbdd
                                                  • Opcode Fuzzy Hash: cdff9d96922b0a882e8290f8570ae1fd5de2c3de04f8b5b2c7f49ece88d73897
                                                  • Instruction Fuzzy Hash: 39E092319113668ECB13ABB0D8044DEBB30EE8331475542A7D118AB050EB35154AC7A1
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3298129652.00000000015B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_15b0000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 680c89c74604eff8bd24e6c3d2c7a752d1692e71b0dd2956b43e9382118a8c4c
                                                  • Instruction ID: 2d6707e3fd42b7d1f3103e89c27e73df1d19edefd0e9b4ef59037cf632b731a8
                                                  • Opcode Fuzzy Hash: 680c89c74604eff8bd24e6c3d2c7a752d1692e71b0dd2956b43e9382118a8c4c
                                                  • Instruction Fuzzy Hash: 67D05B31D2022B97CB11E7A5DC044DFF738EED5265B504626D51837140FB703659C6E1
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3298129652.00000000015B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_15b0000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 2aa141572e90d33a1ae94d6cd75d415fef012a30ac7de0f8d24749e33df05adc
                                                  • Instruction ID: 4fda4af060fc35b5839c8567d11c47b554e7bdaf0fa0dfe250a0da90023a7032
                                                  • Opcode Fuzzy Hash: 2aa141572e90d33a1ae94d6cd75d415fef012a30ac7de0f8d24749e33df05adc
                                                  • Instruction Fuzzy Hash: D5D0C736311118A74B052A49A8098AE7F5EEBCD7717048026FD1583340CE719D1197E5
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3298129652.00000000015B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_15b0000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: ef62f54abc6e1867efb60763647b15336158bb4d1e312f9985b0b12f6d7b6913
                                                  • Instruction ID: 8608c635689c16348d6a0a2f72c68899b4bd94cf4c955f0f5e56522a177f90ac
                                                  • Opcode Fuzzy Hash: ef62f54abc6e1867efb60763647b15336158bb4d1e312f9985b0b12f6d7b6913
                                                  • Instruction Fuzzy Hash: BBC04C3244D3C05FCB2B8B7098661557BB0BA1731571514EEC051C6057EA695405C711
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.3298129652.00000000015B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015B0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_15b0000_RegAsm.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID: Xaq$Xaq$Xaq$Xaq
                                                  • API String ID: 0-4015495023
                                                  • Opcode ID: 04cd60e39588b63e5c8cd4ec6f3d8c873d0dbf3130774454a34afd0eaa06af6b
                                                  • Instruction ID: 5794e4aebd335204294b78331cc7b93ac97c6e7dd23b64db4d0f5f844537098f
                                                  • Opcode Fuzzy Hash: 04cd60e39588b63e5c8cd4ec6f3d8c873d0dbf3130774454a34afd0eaa06af6b
                                                  • Instruction Fuzzy Hash: 6E317330D0061A8BDFA58FAD95D03EEBAF6BF84310F1440A9C515AB255EF70C985CB92