Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
lustsorelfar.exe

Overview

General Information

Sample name:lustsorelfar.exe
Analysis ID:1431560
MD5:837a823641bc5ba36bc3f49f4e9e8f2d
SHA1:386b3cbf6be3512ee05638cf79225650dd9361a4
SHA256:aba8b59281faa8c1c43a4ca7af075edd3e3516d3cef058a1f43b093177b8f83c
Infos:

Detection

Score:68
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Uses dynamic DNS services
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Contains long sleeps (>= 3 min)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Uses 32bit PE files

Classification

  • System is w10x64
  • lustsorelfar.exe (PID: 6000 cmdline: "C:\Users\user\Desktop\lustsorelfar.exe" MD5: 837A823641BC5BA36BC3F49F4E9E8F2D)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
Timestamp:04/25/24-12:51:58.068344
SID:2035903
Source Port:5861
Destination Port:49716
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:04/25/24-12:54:11.546095
SID:2035903
Source Port:5861
Destination Port:49733
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:04/25/24-12:55:07.738908
SID:2035903
Source Port:5861
Destination Port:49741
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:04/25/24-12:54:10.363246
SID:2035903
Source Port:5861
Destination Port:49732
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:04/25/24-12:55:11.971760
SID:2035903
Source Port:5861
Destination Port:49742
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:04/25/24-12:52:52.824852
SID:2035904
Source Port:5861
Destination Port:49716
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:04/25/24-12:54:02.943081
SID:2035903
Source Port:5861
Destination Port:49731
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:04/25/24-12:54:52.772701
SID:2035904
Source Port:5861
Destination Port:49740
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:04/25/24-12:54:14.629046
SID:2035903
Source Port:5861
Destination Port:49734
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:04/25/24-12:54:26.801836
SID:2035903
Source Port:5861
Destination Port:49735
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:04/25/24-12:54:39.237898
SID:2035903
Source Port:5861
Destination Port:49740
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:04/25/24-12:54:29.347705
SID:2035903
Source Port:5861
Destination Port:49738
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:04/25/24-12:54:37.859965
SID:2035903
Source Port:5861
Destination Port:49739
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:04/25/24-12:53:49.098065
SID:2035903
Source Port:5861
Destination Port:49728
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:04/25/24-12:53:52.757541
SID:2035904
Source Port:5861
Destination Port:49728
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:04/25/24-12:54:28.488451
SID:2035903
Source Port:5861
Destination Port:49736
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:04/25/24-12:54:29.223505
SID:2035903
Source Port:5861
Destination Port:49737
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:04/25/24-12:54:00.004127
SID:2035903
Source Port:5861
Destination Port:49730
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:04/25/24-12:52:55.692622
SID:2035903
Source Port:5861
Destination Port:49720
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:04/25/24-12:53:48.187424
SID:2035903
Source Port:5861
Destination Port:49727
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:04/25/24-12:53:56.818212
SID:2035903
Source Port:5861
Destination Port:49729
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:04/25/24-12:53:19.048838
SID:2035903
Source Port:5861
Destination Port:49721
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:04/25/24-12:53:19.052139
SID:2035903
Source Port:5861
Destination Port:49722
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:04/25/24-12:53:30.859129
SID:2035903
Source Port:5861
Destination Port:49723
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:04/25/24-12:53:31.285645
SID:2035903
Source Port:5861
Destination Port:49724
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:04/25/24-12:53:40.568129
SID:2035903
Source Port:5861
Destination Port:49725
Protocol:TCP
Classtype:A Network Trojan was detected
Timestamp:04/25/24-12:53:41.755618
SID:2035903
Source Port:5861
Destination Port:49726
Protocol:TCP
Classtype:A Network Trojan was detected

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: lustsorelfar.exeAvira: detected
Source: lustsorelfar.exeReversingLabs: Detection: 42%
Source: lustsorelfar.exeVirustotal: Detection: 56%Perma Link
Source: lustsorelfar.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: lustsorelfar.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Binary string: e:\lustsorelfar\lustsorelfar\obj\Debug\lustsorelfar.pdb source: lustsorelfar.exe
Source: Binary string: e:\lustsorelfar\lustsorelfar\obj\Debug\lustsorelfar.pdb< source: lustsorelfar.exe

Networking

barindex
Source: TrafficSnort IDS: 2035903 ET TROJAN MSIL/Crimson CnC Server Command (info) M1 45.14.194.253:5861 -> 192.168.2.5:49716
Source: TrafficSnort IDS: 2035904 ET TROJAN MSIL/Crimson Receiving Command (ping) M1 45.14.194.253:5861 -> 192.168.2.5:49716
Source: TrafficSnort IDS: 2035903 ET TROJAN MSIL/Crimson CnC Server Command (info) M1 45.14.194.253:5861 -> 192.168.2.5:49720
Source: TrafficSnort IDS: 2035903 ET TROJAN MSIL/Crimson CnC Server Command (info) M1 45.14.194.253:5861 -> 192.168.2.5:49721
Source: TrafficSnort IDS: 2035903 ET TROJAN MSIL/Crimson CnC Server Command (info) M1 45.14.194.253:5861 -> 192.168.2.5:49722
Source: TrafficSnort IDS: 2035903 ET TROJAN MSIL/Crimson CnC Server Command (info) M1 45.14.194.253:5861 -> 192.168.2.5:49723
Source: TrafficSnort IDS: 2035903 ET TROJAN MSIL/Crimson CnC Server Command (info) M1 45.14.194.253:5861 -> 192.168.2.5:49724
Source: TrafficSnort IDS: 2035903 ET TROJAN MSIL/Crimson CnC Server Command (info) M1 45.14.194.253:5861 -> 192.168.2.5:49725
Source: TrafficSnort IDS: 2035903 ET TROJAN MSIL/Crimson CnC Server Command (info) M1 45.14.194.253:5861 -> 192.168.2.5:49726
Source: TrafficSnort IDS: 2035903 ET TROJAN MSIL/Crimson CnC Server Command (info) M1 45.14.194.253:5861 -> 192.168.2.5:49727
Source: TrafficSnort IDS: 2035903 ET TROJAN MSIL/Crimson CnC Server Command (info) M1 45.14.194.253:5861 -> 192.168.2.5:49728
Source: TrafficSnort IDS: 2035904 ET TROJAN MSIL/Crimson Receiving Command (ping) M1 45.14.194.253:5861 -> 192.168.2.5:49728
Source: TrafficSnort IDS: 2035903 ET TROJAN MSIL/Crimson CnC Server Command (info) M1 45.14.194.253:5861 -> 192.168.2.5:49729
Source: TrafficSnort IDS: 2035903 ET TROJAN MSIL/Crimson CnC Server Command (info) M1 45.14.194.253:5861 -> 192.168.2.5:49730
Source: TrafficSnort IDS: 2035903 ET TROJAN MSIL/Crimson CnC Server Command (info) M1 45.14.194.253:5861 -> 192.168.2.5:49731
Source: TrafficSnort IDS: 2035903 ET TROJAN MSIL/Crimson CnC Server Command (info) M1 45.14.194.253:5861 -> 192.168.2.5:49732
Source: TrafficSnort IDS: 2035903 ET TROJAN MSIL/Crimson CnC Server Command (info) M1 45.14.194.253:5861 -> 192.168.2.5:49733
Source: TrafficSnort IDS: 2035903 ET TROJAN MSIL/Crimson CnC Server Command (info) M1 45.14.194.253:5861 -> 192.168.2.5:49734
Source: TrafficSnort IDS: 2035903 ET TROJAN MSIL/Crimson CnC Server Command (info) M1 45.14.194.253:5861 -> 192.168.2.5:49735
Source: TrafficSnort IDS: 2035903 ET TROJAN MSIL/Crimson CnC Server Command (info) M1 45.14.194.253:5861 -> 192.168.2.5:49736
Source: TrafficSnort IDS: 2035903 ET TROJAN MSIL/Crimson CnC Server Command (info) M1 45.14.194.253:5861 -> 192.168.2.5:49737
Source: TrafficSnort IDS: 2035903 ET TROJAN MSIL/Crimson CnC Server Command (info) M1 45.14.194.253:5861 -> 192.168.2.5:49738
Source: TrafficSnort IDS: 2035903 ET TROJAN MSIL/Crimson CnC Server Command (info) M1 45.14.194.253:5861 -> 192.168.2.5:49739
Source: TrafficSnort IDS: 2035903 ET TROJAN MSIL/Crimson CnC Server Command (info) M1 45.14.194.253:5861 -> 192.168.2.5:49740
Source: TrafficSnort IDS: 2035904 ET TROJAN MSIL/Crimson Receiving Command (ping) M1 45.14.194.253:5861 -> 192.168.2.5:49740
Source: TrafficSnort IDS: 2035903 ET TROJAN MSIL/Crimson CnC Server Command (info) M1 45.14.194.253:5861 -> 192.168.2.5:49741
Source: TrafficSnort IDS: 2035903 ET TROJAN MSIL/Crimson CnC Server Command (info) M1 45.14.194.253:5861 -> 192.168.2.5:49742
Source: unknownDNS query: name: ur253.duckdns.org
Source: global trafficTCP traffic: 192.168.2.5:49716 -> 45.14.194.253:5861
Source: Joe Sandbox ViewASN Name: DEDIPATH-LLCUS DEDIPATH-LLCUS
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: ur253.duckdns.org
Source: C:\Users\user\Desktop\lustsorelfar.exeProcess Stats: CPU usage > 49%
Source: C:\Users\user\Desktop\lustsorelfar.exeCode function: 0_2_00007FF848F150660_2_00007FF848F15066
Source: C:\Users\user\Desktop\lustsorelfar.exeCode function: 0_2_00007FF848F12E1C0_2_00007FF848F12E1C
Source: lustsorelfar.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: mal68.troj.winEXE@1/0@3/1
Source: C:\Users\user\Desktop\lustsorelfar.exeMutant created: NULL
Source: lustsorelfar.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: lustsorelfar.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
Source: C:\Users\user\Desktop\lustsorelfar.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: lustsorelfar.exeReversingLabs: Detection: 42%
Source: lustsorelfar.exeVirustotal: Detection: 56%
Source: C:\Users\user\Desktop\lustsorelfar.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeSection loaded: dwrite.dllJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeSection loaded: fwpuclnt.dllJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: lustsorelfar.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: lustsorelfar.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: lustsorelfar.exeStatic file information: File size 20822528 > 1048576
Source: lustsorelfar.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x13b7800
Source: lustsorelfar.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: lustsorelfar.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: e:\lustsorelfar\lustsorelfar\obj\Debug\lustsorelfar.pdb source: lustsorelfar.exe
Source: Binary string: e:\lustsorelfar\lustsorelfar\obj\Debug\lustsorelfar.pdb< source: lustsorelfar.exe
Source: C:\Users\user\Desktop\lustsorelfar.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeMemory allocated: 1B6A8620000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeMemory allocated: 1B6C2110000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeWindow / User API: threadDelayed 8233Jump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeWindow / User API: threadDelayed 1620Jump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exe TID: 4672Thread sleep time: -27670116110564310s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exe TID: 4672Thread sleep time: -45000s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exe TID: 4672Thread sleep time: -44891s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exe TID: 4672Thread sleep time: -44781s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exe TID: 4672Thread sleep time: -44672s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exe TID: 4672Thread sleep time: -44562s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exe TID: 4672Thread sleep time: -44453s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exe TID: 4672Thread sleep time: -44344s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exe TID: 4672Thread sleep time: -44219s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exe TID: 4672Thread sleep time: -44109s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exe TID: 4672Thread sleep time: -44000s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exe TID: 4672Thread sleep time: -43891s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exe TID: 4672Thread sleep time: -43781s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exe TID: 4672Thread sleep time: -43672s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exe TID: 4672Thread sleep time: -43562s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exe TID: 4672Thread sleep time: -43453s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exe TID: 4672Thread sleep time: -43344s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exe TID: 4672Thread sleep time: -43219s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exe TID: 4672Thread sleep time: -43108s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exe TID: 4672Thread sleep time: -43000s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exe TID: 4672Thread sleep time: -42891s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exe TID: 4672Thread sleep time: -42781s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exe TID: 4672Thread sleep time: -42672s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exe TID: 4672Thread sleep time: -42563s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exe TID: 4672Thread sleep time: -42438s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exe TID: 4672Thread sleep time: -42313s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exe TID: 4672Thread sleep time: -42203s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exe TID: 4672Thread sleep time: -42094s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exe TID: 4672Thread sleep time: -41969s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exe TID: 4672Thread sleep time: -41831s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exe TID: 4672Thread sleep time: -41702s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exe TID: 4672Thread sleep time: -41594s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exe TID: 4672Thread sleep time: -41484s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exe TID: 4672Thread sleep time: -41375s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exe TID: 4672Thread sleep time: -41266s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exe TID: 4672Thread sleep time: -41156s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exe TID: 4672Thread sleep time: -41047s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exe TID: 4672Thread sleep time: -40937s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exe TID: 4672Thread sleep time: -40828s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exe TID: 4672Thread sleep time: -40719s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exe TID: 4672Thread sleep time: -40609s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exe TID: 4672Thread sleep time: -40500s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exe TID: 4672Thread sleep time: -40391s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exe TID: 4672Thread sleep time: -40266s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exe TID: 4672Thread sleep time: -40141s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exe TID: 4672Thread sleep time: -40031s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exe TID: 4672Thread sleep time: -39922s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exe TID: 4672Thread sleep time: -39812s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exe TID: 4672Thread sleep time: -39703s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exe TID: 4672Thread sleep time: -39594s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exe TID: 4672Thread sleep time: -39484s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeThread delayed: delay time: 45000Jump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeThread delayed: delay time: 44891Jump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeThread delayed: delay time: 44781Jump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeThread delayed: delay time: 44672Jump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeThread delayed: delay time: 44562Jump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeThread delayed: delay time: 44453Jump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeThread delayed: delay time: 44344Jump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeThread delayed: delay time: 44219Jump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeThread delayed: delay time: 44109Jump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeThread delayed: delay time: 44000Jump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeThread delayed: delay time: 43891Jump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeThread delayed: delay time: 43781Jump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeThread delayed: delay time: 43672Jump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeThread delayed: delay time: 43562Jump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeThread delayed: delay time: 43453Jump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeThread delayed: delay time: 43344Jump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeThread delayed: delay time: 43219Jump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeThread delayed: delay time: 43108Jump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeThread delayed: delay time: 43000Jump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeThread delayed: delay time: 42891Jump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeThread delayed: delay time: 42781Jump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeThread delayed: delay time: 42672Jump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeThread delayed: delay time: 42563Jump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeThread delayed: delay time: 42438Jump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeThread delayed: delay time: 42313Jump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeThread delayed: delay time: 42203Jump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeThread delayed: delay time: 42094Jump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeThread delayed: delay time: 41969Jump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeThread delayed: delay time: 41831Jump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeThread delayed: delay time: 41702Jump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeThread delayed: delay time: 41594Jump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeThread delayed: delay time: 41484Jump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeThread delayed: delay time: 41375Jump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeThread delayed: delay time: 41266Jump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeThread delayed: delay time: 41156Jump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeThread delayed: delay time: 41047Jump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeThread delayed: delay time: 40937Jump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeThread delayed: delay time: 40828Jump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeThread delayed: delay time: 40719Jump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeThread delayed: delay time: 40609Jump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeThread delayed: delay time: 40500Jump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeThread delayed: delay time: 40391Jump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeThread delayed: delay time: 40266Jump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeThread delayed: delay time: 40141Jump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeThread delayed: delay time: 40031Jump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeThread delayed: delay time: 39922Jump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeThread delayed: delay time: 39812Jump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeThread delayed: delay time: 39703Jump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeThread delayed: delay time: 39594Jump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeThread delayed: delay time: 39484Jump to behavior
Source: lustsorelfar.exe, 00000000.00000002.4488797219.000001B6C5820000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll'
Source: C:\Users\user\Desktop\lustsorelfar.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeMemory allocated: page read and write | page guardJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeQueries volume information: C:\Users\user\Desktop\lustsorelfar.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\lustsorelfar.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
DLL Side-Loading
1
Disable or Modify Tools
OS Credential Dumping1
Security Software Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts31
Virtualization/Sandbox Evasion
LSASS Memory1
Process Discovery
Remote Desktop ProtocolData from Removable Media1
Non-Standard Port
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager31
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared Drive1
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDS1
Application Window Discovery
Distributed Component Object ModelInput Capture11
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets12
System Information Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
lustsorelfar.exe42%ReversingLabsByteCode-MSIL.Trojan.Zilla
lustsorelfar.exe57%VirustotalBrowse
lustsorelfar.exe100%AviraTR/Spy.Gen
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
ur253.duckdns.org
45.14.194.253
truetrue
    unknown
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    45.14.194.253
    ur253.duckdns.orgGermany
    35913DEDIPATH-LLCUStrue
    Joe Sandbox version:40.0.0 Tourmaline
    Analysis ID:1431560
    Start date and time:2024-04-25 12:50:18 +02:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 6m 59s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:5
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:lustsorelfar.exe
    Detection:MAL
    Classification:mal68.troj.winEXE@1/0@3/1
    EGA Information:Failed
    HCA Information:
    • Successful, ratio: 85%
    • Number of executed functions: 29
    • Number of non-executed functions: 1
    Cookbook Comments:
    • Found application associated with file extension: .exe
    • Override analysis time to 240000 for current running targets taking high CPU consumption
    • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
    • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
    • Execution Graph export aborted for target lustsorelfar.exe, PID 6000 because it is empty
    TimeTypeDescription
    12:51:10API Interceptor14828166x Sleep call for process: lustsorelfar.exe modified
    No context
    No context
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    DEDIPATH-LLCUSSecuriteInfo.com.Trojan.InstallCore.4086.15026.2213.exeGet hashmaliciousPrivateLoader, PureLog StealerBrowse
    • 185.228.19.37
    SecuriteInfo.com.Trojan.InstallCore.4086.15026.2213.exeGet hashmaliciousPrivateLoader, PureLog StealerBrowse
    • 185.228.19.54
    EXCEL_DOCUMENT_OPEN.jsGet hashmaliciousUnknownBrowse
    • 103.124.105.125
    EXCEL_DOCUMENT_OPEN.jsGet hashmaliciousUnknownBrowse
    • 103.124.105.125
    4_10_AC-7539.xlsxGet hashmaliciousDarkGate, MailPassViewBrowse
    • 103.124.105.125
    https://yesterwebring.neocities.orgGet hashmaliciousPhisherBrowse
    • 45.89.106.174
    statapril2024-5892.xlsxGet hashmaliciousDarkGate, MailPassViewBrowse
    • 103.124.106.237
    statapril2024-7320.xlsxGet hashmaliciousDarkGate, MailPassViewBrowse
    • 103.124.106.237
    MS_EXCEL_AZURE_CLOUD_OPEN_DOCUMENT.vbsGet hashmaliciousDarkGate, MailPassViewBrowse
    • 103.124.106.237
    30ab11853092ccfc7359bb9cf99fe27b2179a1dc11037515b9367b6c28395850.zipGet hashmaliciousDarkGate, MailPassViewBrowse
    • 103.124.106.237
    No context
    No context
    No created / dropped files found
    File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
    Entropy (8bit):7.889485833380952
    TrID:
    • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
    • Win32 Executable (generic) a (10002005/4) 49.97%
    • Generic Win/DOS Executable (2004/3) 0.01%
    • DOS Executable Generic (2002/1) 0.01%
    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
    File name:lustsorelfar.exe
    File size:20'822'528 bytes
    MD5:837a823641bc5ba36bc3f49f4e9e8f2d
    SHA1:386b3cbf6be3512ee05638cf79225650dd9361a4
    SHA256:aba8b59281faa8c1c43a4ca7af075edd3e3516d3cef058a1f43b093177b8f83c
    SHA512:b263b861b7362e10dd1adc6c4ee7acf2adabee72d7dfb61498bf2e9e72fc5a43d25327270d247635e075eb8b592def7565b81df4c2003c6b9484dbdac065f7ab
    SSDEEP:3072:0VIVsVWWw52dMi5snX65eHsUNBN8Jc2SUnKr9fE/C822c5:8vMrWJOBE/C8P
    TLSH:4D275D53689371AAB15A42A34734CCC96E4748C70C133E842CDCAB14B957EFE9DBF46A
    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...._>e.................x;..@......n.;.. ....;...@.. ........................>...........`................................
    Icon Hash:cf8d85454742661c
    Entrypoint:0x17b966e
    Entrypoint Section:.text
    Digitally signed:false
    Imagebase:0x400000
    Subsystem:windows gui
    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
    DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Time Stamp:0x653E5FF3 [Sun Oct 29 13:36:51 2023 UTC]
    TLS Callbacks:
    CLR (.Net) Version:v4.0.30319
    OS Version Major:4
    OS Version Minor:0
    File Version Major:4
    File Version Minor:0
    Subsystem Version Major:4
    Subsystem Version Minor:0
    Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
    Instruction
    jmp dword ptr [00402000h]
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IMPORT0x13b96140x57.text
    IMAGE_DIRECTORY_ENTRY_RESOURCE0x13ba0000x23cd0.rsrc
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
    IMAGE_DIRECTORY_ENTRY_BASERELOC0x13de0000xc.reloc
    IMAGE_DIRECTORY_ENTRY_DEBUG0x13b94dc0x1c.text
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
    .text0x20000x13b76740x13b7800ff0c47628543804e59f2932807e931eeunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    .rsrc0x13ba0000x23cd00x23e00a9f1e91da0039ae66fd10e061707a223False0.5207017639372822data5.823792470625165IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .reloc0x13de0000xc0x200a67dbdda6321d551c6b899fd36b7a06aFalse0.044921875data0.12227588125913882IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
    NameRVASizeTypeLanguageCountryZLIB Complexity
    RT_ICON0x13ba4600xaea9PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9950573658667502
    RT_ICON0x13c53100x161f8Device independent bitmap graphic, 148 x 296 x 32, image size 00.2922110885494835
    RT_ICON0x13db5080x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 00.4451244813278008
    RT_GROUP_ICON0x13ddab00x30data0.8958333333333334
    RT_VERSION0x13ba1900x2d0data0.4236111111111111
    RT_MANIFEST0x13ddae00x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5469387755102041
    DLLImport
    mscoree.dll_CorExeMain
    TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
    04/25/24-12:51:58.068344TCP2035903ET TROJAN MSIL/Crimson CnC Server Command (info) M158614971645.14.194.253192.168.2.5
    04/25/24-12:54:11.546095TCP2035903ET TROJAN MSIL/Crimson CnC Server Command (info) M158614973345.14.194.253192.168.2.5
    04/25/24-12:55:07.738908TCP2035903ET TROJAN MSIL/Crimson CnC Server Command (info) M158614974145.14.194.253192.168.2.5
    04/25/24-12:54:10.363246TCP2035903ET TROJAN MSIL/Crimson CnC Server Command (info) M158614973245.14.194.253192.168.2.5
    04/25/24-12:55:11.971760TCP2035903ET TROJAN MSIL/Crimson CnC Server Command (info) M158614974245.14.194.253192.168.2.5
    04/25/24-12:52:52.824852TCP2035904ET TROJAN MSIL/Crimson Receiving Command (ping) M158614971645.14.194.253192.168.2.5
    04/25/24-12:54:02.943081TCP2035903ET TROJAN MSIL/Crimson CnC Server Command (info) M158614973145.14.194.253192.168.2.5
    04/25/24-12:54:52.772701TCP2035904ET TROJAN MSIL/Crimson Receiving Command (ping) M158614974045.14.194.253192.168.2.5
    04/25/24-12:54:14.629046TCP2035903ET TROJAN MSIL/Crimson CnC Server Command (info) M158614973445.14.194.253192.168.2.5
    04/25/24-12:54:26.801836TCP2035903ET TROJAN MSIL/Crimson CnC Server Command (info) M158614973545.14.194.253192.168.2.5
    04/25/24-12:54:39.237898TCP2035903ET TROJAN MSIL/Crimson CnC Server Command (info) M158614974045.14.194.253192.168.2.5
    04/25/24-12:54:29.347705TCP2035903ET TROJAN MSIL/Crimson CnC Server Command (info) M158614973845.14.194.253192.168.2.5
    04/25/24-12:54:37.859965TCP2035903ET TROJAN MSIL/Crimson CnC Server Command (info) M158614973945.14.194.253192.168.2.5
    04/25/24-12:53:49.098065TCP2035903ET TROJAN MSIL/Crimson CnC Server Command (info) M158614972845.14.194.253192.168.2.5
    04/25/24-12:53:52.757541TCP2035904ET TROJAN MSIL/Crimson Receiving Command (ping) M158614972845.14.194.253192.168.2.5
    04/25/24-12:54:28.488451TCP2035903ET TROJAN MSIL/Crimson CnC Server Command (info) M158614973645.14.194.253192.168.2.5
    04/25/24-12:54:29.223505TCP2035903ET TROJAN MSIL/Crimson CnC Server Command (info) M158614973745.14.194.253192.168.2.5
    04/25/24-12:54:00.004127TCP2035903ET TROJAN MSIL/Crimson CnC Server Command (info) M158614973045.14.194.253192.168.2.5
    04/25/24-12:52:55.692622TCP2035903ET TROJAN MSIL/Crimson CnC Server Command (info) M158614972045.14.194.253192.168.2.5
    04/25/24-12:53:48.187424TCP2035903ET TROJAN MSIL/Crimson CnC Server Command (info) M158614972745.14.194.253192.168.2.5
    04/25/24-12:53:56.818212TCP2035903ET TROJAN MSIL/Crimson CnC Server Command (info) M158614972945.14.194.253192.168.2.5
    04/25/24-12:53:19.048838TCP2035903ET TROJAN MSIL/Crimson CnC Server Command (info) M158614972145.14.194.253192.168.2.5
    04/25/24-12:53:19.052139TCP2035903ET TROJAN MSIL/Crimson CnC Server Command (info) M158614972245.14.194.253192.168.2.5
    04/25/24-12:53:30.859129TCP2035903ET TROJAN MSIL/Crimson CnC Server Command (info) M158614972345.14.194.253192.168.2.5
    04/25/24-12:53:31.285645TCP2035903ET TROJAN MSIL/Crimson CnC Server Command (info) M158614972445.14.194.253192.168.2.5
    04/25/24-12:53:40.568129TCP2035903ET TROJAN MSIL/Crimson CnC Server Command (info) M158614972545.14.194.253192.168.2.5
    04/25/24-12:53:41.755618TCP2035903ET TROJAN MSIL/Crimson CnC Server Command (info) M158614972645.14.194.253192.168.2.5
    TimestampSource PortDest PortSource IPDest IP
    Apr 25, 2024 12:51:57.306894064 CEST497165861192.168.2.545.14.194.253
    Apr 25, 2024 12:51:57.526997089 CEST58614971645.14.194.253192.168.2.5
    Apr 25, 2024 12:51:57.527096033 CEST497165861192.168.2.545.14.194.253
    Apr 25, 2024 12:51:58.068344116 CEST58614971645.14.194.253192.168.2.5
    Apr 25, 2024 12:51:58.076210976 CEST497165861192.168.2.545.14.194.253
    Apr 25, 2024 12:51:58.349601984 CEST58614971645.14.194.253192.168.2.5
    Apr 25, 2024 12:52:52.824851990 CEST58614971645.14.194.253192.168.2.5
    Apr 25, 2024 12:52:52.869781017 CEST497165861192.168.2.545.14.194.253
    Apr 25, 2024 12:52:54.856534004 CEST497205861192.168.2.545.14.194.253
    Apr 25, 2024 12:52:54.856537104 CEST497165861192.168.2.545.14.194.253
    Apr 25, 2024 12:52:55.075040102 CEST58614972045.14.194.253192.168.2.5
    Apr 25, 2024 12:52:55.075392962 CEST497205861192.168.2.545.14.194.253
    Apr 25, 2024 12:52:55.075676918 CEST58614971645.14.194.253192.168.2.5
    Apr 25, 2024 12:52:55.692621946 CEST58614972045.14.194.253192.168.2.5
    Apr 25, 2024 12:52:55.694269896 CEST497205861192.168.2.545.14.194.253
    Apr 25, 2024 12:52:55.980974913 CEST58614972045.14.194.253192.168.2.5
    Apr 25, 2024 12:53:18.135567904 CEST497205861192.168.2.545.14.194.253
    Apr 25, 2024 12:53:18.278744936 CEST497215861192.168.2.545.14.194.253
    Apr 25, 2024 12:53:18.278794050 CEST497225861192.168.2.545.14.194.253
    Apr 25, 2024 12:53:18.358083010 CEST58614972045.14.194.253192.168.2.5
    Apr 25, 2024 12:53:18.502536058 CEST58614972245.14.194.253192.168.2.5
    Apr 25, 2024 12:53:18.504743099 CEST58614972145.14.194.253192.168.2.5
    Apr 25, 2024 12:53:18.506128073 CEST497225861192.168.2.545.14.194.253
    Apr 25, 2024 12:53:18.506129980 CEST497215861192.168.2.545.14.194.253
    Apr 25, 2024 12:53:19.048837900 CEST58614972145.14.194.253192.168.2.5
    Apr 25, 2024 12:53:19.052139044 CEST58614972245.14.194.253192.168.2.5
    Apr 25, 2024 12:53:19.053366899 CEST497215861192.168.2.545.14.194.253
    Apr 25, 2024 12:53:19.182313919 CEST497225861192.168.2.545.14.194.253
    Apr 25, 2024 12:53:19.331012964 CEST58614972145.14.194.253192.168.2.5
    Apr 25, 2024 12:53:30.122132063 CEST497215861192.168.2.545.14.194.253
    Apr 25, 2024 12:53:30.122136116 CEST497235861192.168.2.545.14.194.253
    Apr 25, 2024 12:53:30.336172104 CEST58614972345.14.194.253192.168.2.5
    Apr 25, 2024 12:53:30.336249113 CEST497235861192.168.2.545.14.194.253
    Apr 25, 2024 12:53:30.337371111 CEST58614972145.14.194.253192.168.2.5
    Apr 25, 2024 12:53:30.542001963 CEST497235861192.168.2.545.14.194.253
    Apr 25, 2024 12:53:30.543135881 CEST497245861192.168.2.545.14.194.253
    Apr 25, 2024 12:53:30.755223036 CEST58614972345.14.194.253192.168.2.5
    Apr 25, 2024 12:53:30.761245012 CEST58614972445.14.194.253192.168.2.5
    Apr 25, 2024 12:53:30.761332989 CEST497245861192.168.2.545.14.194.253
    Apr 25, 2024 12:53:30.859128952 CEST58614972345.14.194.253192.168.2.5
    Apr 25, 2024 12:53:30.859196901 CEST497235861192.168.2.545.14.194.253
    Apr 25, 2024 12:53:31.285645008 CEST58614972445.14.194.253192.168.2.5
    Apr 25, 2024 12:53:31.287836075 CEST497245861192.168.2.545.14.194.253
    Apr 25, 2024 12:53:31.551101923 CEST58614972445.14.194.253192.168.2.5
    Apr 25, 2024 12:53:39.808391094 CEST497245861192.168.2.545.14.194.253
    Apr 25, 2024 12:53:39.808393002 CEST497255861192.168.2.545.14.194.253
    Apr 25, 2024 12:53:40.028251886 CEST58614972445.14.194.253192.168.2.5
    Apr 25, 2024 12:53:40.029268980 CEST58614972545.14.194.253192.168.2.5
    Apr 25, 2024 12:53:40.030318022 CEST497255861192.168.2.545.14.194.253
    Apr 25, 2024 12:53:40.568129063 CEST58614972545.14.194.253192.168.2.5
    Apr 25, 2024 12:53:40.569797993 CEST497255861192.168.2.545.14.194.253
    Apr 25, 2024 12:53:40.849201918 CEST58614972545.14.194.253192.168.2.5
    Apr 25, 2024 12:53:40.995206118 CEST497255861192.168.2.545.14.194.253
    Apr 25, 2024 12:53:40.996186018 CEST497265861192.168.2.545.14.194.253
    Apr 25, 2024 12:53:41.214524031 CEST58614972645.14.194.253192.168.2.5
    Apr 25, 2024 12:53:41.214783907 CEST58614972545.14.194.253192.168.2.5
    Apr 25, 2024 12:53:41.218235970 CEST497265861192.168.2.545.14.194.253
    Apr 25, 2024 12:53:41.755618095 CEST58614972645.14.194.253192.168.2.5
    Apr 25, 2024 12:53:41.761904955 CEST497265861192.168.2.545.14.194.253
    Apr 25, 2024 12:53:42.036506891 CEST58614972645.14.194.253192.168.2.5
    Apr 25, 2024 12:53:47.432873011 CEST497265861192.168.2.545.14.194.253
    Apr 25, 2024 12:53:47.436296940 CEST497275861192.168.2.545.14.194.253
    Apr 25, 2024 12:53:47.649928093 CEST58614972745.14.194.253192.168.2.5
    Apr 25, 2024 12:53:47.650089025 CEST497275861192.168.2.545.14.194.253
    Apr 25, 2024 12:53:47.652240038 CEST58614972645.14.194.253192.168.2.5
    Apr 25, 2024 12:53:48.187423944 CEST58614972745.14.194.253192.168.2.5
    Apr 25, 2024 12:53:48.190507889 CEST497275861192.168.2.545.14.194.253
    Apr 25, 2024 12:53:48.307683945 CEST497275861192.168.2.545.14.194.253
    Apr 25, 2024 12:53:48.308867931 CEST497285861192.168.2.545.14.194.253
    Apr 25, 2024 12:53:48.468061924 CEST58614972745.14.194.253192.168.2.5
    Apr 25, 2024 12:53:48.536154032 CEST58614972745.14.194.253192.168.2.5
    Apr 25, 2024 12:53:48.542524099 CEST58614972845.14.194.253192.168.2.5
    Apr 25, 2024 12:53:48.542628050 CEST497285861192.168.2.545.14.194.253
    Apr 25, 2024 12:53:49.098064899 CEST58614972845.14.194.253192.168.2.5
    Apr 25, 2024 12:53:49.099734068 CEST497285861192.168.2.545.14.194.253
    Apr 25, 2024 12:53:49.379252911 CEST58614972845.14.194.253192.168.2.5
    Apr 25, 2024 12:53:52.757540941 CEST58614972845.14.194.253192.168.2.5
    Apr 25, 2024 12:53:52.807642937 CEST497285861192.168.2.545.14.194.253
    Apr 25, 2024 12:53:56.042237043 CEST497285861192.168.2.545.14.194.253
    Apr 25, 2024 12:53:56.043149948 CEST497295861192.168.2.545.14.194.253
    Apr 25, 2024 12:53:56.260341883 CEST58614972845.14.194.253192.168.2.5
    Apr 25, 2024 12:53:56.262516975 CEST58614972945.14.194.253192.168.2.5
    Apr 25, 2024 12:53:56.262581110 CEST497295861192.168.2.545.14.194.253
    Apr 25, 2024 12:53:56.818212032 CEST58614972945.14.194.253192.168.2.5
    Apr 25, 2024 12:53:56.820050001 CEST497295861192.168.2.545.14.194.253
    Apr 25, 2024 12:53:57.118767023 CEST58614972945.14.194.253192.168.2.5
    Apr 25, 2024 12:53:59.245374918 CEST497295861192.168.2.545.14.194.253
    Apr 25, 2024 12:53:59.246522903 CEST497305861192.168.2.545.14.194.253
    Apr 25, 2024 12:53:59.464832067 CEST58614973045.14.194.253192.168.2.5
    Apr 25, 2024 12:53:59.464849949 CEST58614972945.14.194.253192.168.2.5
    Apr 25, 2024 12:53:59.466026068 CEST497305861192.168.2.545.14.194.253
    Apr 25, 2024 12:54:00.004127026 CEST58614973045.14.194.253192.168.2.5
    Apr 25, 2024 12:54:00.009490967 CEST497305861192.168.2.545.14.194.253
    Apr 25, 2024 12:54:00.301064968 CEST58614973045.14.194.253192.168.2.5
    Apr 25, 2024 12:54:02.183037996 CEST497305861192.168.2.545.14.194.253
    Apr 25, 2024 12:54:02.184964895 CEST497315861192.168.2.545.14.194.253
    Apr 25, 2024 12:54:02.401268005 CEST58614973045.14.194.253192.168.2.5
    Apr 25, 2024 12:54:02.404422998 CEST58614973145.14.194.253192.168.2.5
    Apr 25, 2024 12:54:02.404491901 CEST497315861192.168.2.545.14.194.253
    Apr 25, 2024 12:54:02.943080902 CEST58614973145.14.194.253192.168.2.5
    Apr 25, 2024 12:54:02.944766045 CEST497315861192.168.2.545.14.194.253
    Apr 25, 2024 12:54:03.225172043 CEST58614973145.14.194.253192.168.2.5
    Apr 25, 2024 12:54:09.605612993 CEST497325861192.168.2.545.14.194.253
    Apr 25, 2024 12:54:09.605614901 CEST497315861192.168.2.545.14.194.253
    Apr 25, 2024 12:54:09.825328112 CEST58614973145.14.194.253192.168.2.5
    Apr 25, 2024 12:54:09.827991962 CEST58614973245.14.194.253192.168.2.5
    Apr 25, 2024 12:54:09.830554962 CEST497325861192.168.2.545.14.194.253
    Apr 25, 2024 12:54:10.363245964 CEST58614973245.14.194.253192.168.2.5
    Apr 25, 2024 12:54:10.364811897 CEST497325861192.168.2.545.14.194.253
    Apr 25, 2024 12:54:10.628736019 CEST58614973245.14.194.253192.168.2.5
    Apr 25, 2024 12:54:10.792332888 CEST497325861192.168.2.545.14.194.253
    Apr 25, 2024 12:54:10.793463945 CEST497335861192.168.2.545.14.194.253
    Apr 25, 2024 12:54:11.010966063 CEST58614973345.14.194.253192.168.2.5
    Apr 25, 2024 12:54:11.011060953 CEST497335861192.168.2.545.14.194.253
    Apr 25, 2024 12:54:11.014652967 CEST58614973245.14.194.253192.168.2.5
    Apr 25, 2024 12:54:11.546094894 CEST58614973345.14.194.253192.168.2.5
    Apr 25, 2024 12:54:11.550518990 CEST497335861192.168.2.545.14.194.253
    Apr 25, 2024 12:54:11.828237057 CEST58614973345.14.194.253192.168.2.5
    Apr 25, 2024 12:54:13.872653961 CEST497335861192.168.2.545.14.194.253
    Apr 25, 2024 12:54:13.872657061 CEST497345861192.168.2.545.14.194.253
    Apr 25, 2024 12:54:14.086355925 CEST58614973345.14.194.253192.168.2.5
    Apr 25, 2024 12:54:14.091029882 CEST58614973445.14.194.253192.168.2.5
    Apr 25, 2024 12:54:14.096554041 CEST497345861192.168.2.545.14.194.253
    Apr 25, 2024 12:54:14.629045963 CEST58614973445.14.194.253192.168.2.5
    Apr 25, 2024 12:54:14.631149054 CEST497345861192.168.2.545.14.194.253
    Apr 25, 2024 12:54:14.910126925 CEST58614973445.14.194.253192.168.2.5
    Apr 25, 2024 12:54:25.886662960 CEST497345861192.168.2.545.14.194.253
    Apr 25, 2024 12:54:26.035281897 CEST497355861192.168.2.545.14.194.253
    Apr 25, 2024 12:54:26.120286942 CEST58614973445.14.194.253192.168.2.5
    Apr 25, 2024 12:54:26.255247116 CEST58614973545.14.194.253192.168.2.5
    Apr 25, 2024 12:54:26.262649059 CEST497355861192.168.2.545.14.194.253
    Apr 25, 2024 12:54:26.801836014 CEST58614973545.14.194.253192.168.2.5
    Apr 25, 2024 12:54:26.932903051 CEST497355861192.168.2.545.14.194.253
    Apr 25, 2024 12:54:27.471553087 CEST497355861192.168.2.545.14.194.253
    Apr 25, 2024 12:54:27.714226007 CEST497355861192.168.2.545.14.194.253
    Apr 25, 2024 12:54:27.714915991 CEST497365861192.168.2.545.14.194.253
    Apr 25, 2024 12:54:27.764187098 CEST58614973545.14.194.253192.168.2.5
    Apr 25, 2024 12:54:27.945048094 CEST58614973645.14.194.253192.168.2.5
    Apr 25, 2024 12:54:27.945132017 CEST497365861192.168.2.545.14.194.253
    Apr 25, 2024 12:54:27.945307016 CEST58614973545.14.194.253192.168.2.5
    Apr 25, 2024 12:54:28.449580908 CEST497375861192.168.2.545.14.194.253
    Apr 25, 2024 12:54:28.449582100 CEST497365861192.168.2.545.14.194.253
    Apr 25, 2024 12:54:28.488451004 CEST58614973645.14.194.253192.168.2.5
    Apr 25, 2024 12:54:28.488663912 CEST497365861192.168.2.545.14.194.253
    Apr 25, 2024 12:54:28.590691090 CEST497385861192.168.2.545.14.194.253
    Apr 25, 2024 12:54:28.680303097 CEST58614973645.14.194.253192.168.2.5
    Apr 25, 2024 12:54:28.680399895 CEST497365861192.168.2.545.14.194.253
    Apr 25, 2024 12:54:28.681015968 CEST58614973745.14.194.253192.168.2.5
    Apr 25, 2024 12:54:28.681102991 CEST497375861192.168.2.545.14.194.253
    Apr 25, 2024 12:54:28.816634893 CEST58614973845.14.194.253192.168.2.5
    Apr 25, 2024 12:54:28.816821098 CEST497385861192.168.2.545.14.194.253
    Apr 25, 2024 12:54:29.223505020 CEST58614973745.14.194.253192.168.2.5
    Apr 25, 2024 12:54:29.339148045 CEST497375861192.168.2.545.14.194.253
    Apr 25, 2024 12:54:29.347704887 CEST58614973845.14.194.253192.168.2.5
    Apr 25, 2024 12:54:29.349337101 CEST497385861192.168.2.545.14.194.253
    Apr 25, 2024 12:54:29.628787994 CEST58614973845.14.194.253192.168.2.5
    Apr 25, 2024 12:54:29.727446079 CEST58614973445.14.194.253192.168.2.5
    Apr 25, 2024 12:54:37.106051922 CEST497385861192.168.2.545.14.194.253
    Apr 25, 2024 12:54:37.106055975 CEST497395861192.168.2.545.14.194.253
    Apr 25, 2024 12:54:37.321532011 CEST58614973945.14.194.253192.168.2.5
    Apr 25, 2024 12:54:37.324700117 CEST58614973845.14.194.253192.168.2.5
    Apr 25, 2024 12:54:37.325092077 CEST497395861192.168.2.545.14.194.253
    Apr 25, 2024 12:54:37.859965086 CEST58614973945.14.194.253192.168.2.5
    Apr 25, 2024 12:54:37.861429930 CEST497395861192.168.2.545.14.194.253
    Apr 25, 2024 12:54:38.141011953 CEST58614973945.14.194.253192.168.2.5
    Apr 25, 2024 12:54:38.401844978 CEST497395861192.168.2.545.14.194.253
    Apr 25, 2024 12:54:38.405472040 CEST497405861192.168.2.545.14.194.253
    Apr 25, 2024 12:54:38.649308920 CEST58614973945.14.194.253192.168.2.5
    Apr 25, 2024 12:54:38.654870033 CEST58614974045.14.194.253192.168.2.5
    Apr 25, 2024 12:54:38.656213045 CEST497405861192.168.2.545.14.194.253
    Apr 25, 2024 12:54:39.237898111 CEST58614974045.14.194.253192.168.2.5
    Apr 25, 2024 12:54:39.242182016 CEST497405861192.168.2.545.14.194.253
    Apr 25, 2024 12:54:39.520539045 CEST58614974045.14.194.253192.168.2.5
    Apr 25, 2024 12:54:52.772701025 CEST58614974045.14.194.253192.168.2.5
    Apr 25, 2024 12:54:52.839387894 CEST497405861192.168.2.545.14.194.253
    Apr 25, 2024 12:54:55.138940096 CEST497165861192.168.2.545.14.194.253
    Apr 25, 2024 12:55:06.981019020 CEST497415861192.168.2.545.14.194.253
    Apr 25, 2024 12:55:06.981033087 CEST497405861192.168.2.545.14.194.253
    Apr 25, 2024 12:55:07.199717045 CEST58614974045.14.194.253192.168.2.5
    Apr 25, 2024 12:55:07.201059103 CEST58614974145.14.194.253192.168.2.5
    Apr 25, 2024 12:55:07.205214024 CEST497415861192.168.2.545.14.194.253
    Apr 25, 2024 12:55:07.738908052 CEST58614974145.14.194.253192.168.2.5
    Apr 25, 2024 12:55:07.740751982 CEST497415861192.168.2.545.14.194.253
    Apr 25, 2024 12:55:08.020076990 CEST58614974145.14.194.253192.168.2.5
    Apr 25, 2024 12:55:11.217045069 CEST497415861192.168.2.545.14.194.253
    Apr 25, 2024 12:55:11.217103958 CEST497425861192.168.2.545.14.194.253
    Apr 25, 2024 12:55:11.435386896 CEST58614974245.14.194.253192.168.2.5
    Apr 25, 2024 12:55:11.435472965 CEST497425861192.168.2.545.14.194.253
    Apr 25, 2024 12:55:11.436804056 CEST58614974145.14.194.253192.168.2.5
    Apr 25, 2024 12:55:11.971760035 CEST58614974245.14.194.253192.168.2.5
    Apr 25, 2024 12:55:11.973859072 CEST497425861192.168.2.545.14.194.253
    Apr 25, 2024 12:55:12.252947092 CEST58614974245.14.194.253192.168.2.5
    Apr 25, 2024 12:55:18.370781898 CEST497205861192.168.2.545.14.194.253
    TimestampSource PortDest PortSource IPDest IP
    Apr 25, 2024 12:51:57.158112049 CEST5569553192.168.2.51.1.1.1
    Apr 25, 2024 12:51:57.302524090 CEST53556951.1.1.1192.168.2.5
    Apr 25, 2024 12:53:18.136365891 CEST4916253192.168.2.51.1.1.1
    Apr 25, 2024 12:53:18.277934074 CEST53491621.1.1.1192.168.2.5
    Apr 25, 2024 12:54:25.886893988 CEST5320753192.168.2.51.1.1.1
    Apr 25, 2024 12:54:26.033302069 CEST53532071.1.1.1192.168.2.5
    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
    Apr 25, 2024 12:51:57.158112049 CEST192.168.2.51.1.1.10x9596Standard query (0)ur253.duckdns.orgA (IP address)IN (0x0001)false
    Apr 25, 2024 12:53:18.136365891 CEST192.168.2.51.1.1.10x3e8bStandard query (0)ur253.duckdns.orgA (IP address)IN (0x0001)false
    Apr 25, 2024 12:54:25.886893988 CEST192.168.2.51.1.1.10x6c46Standard query (0)ur253.duckdns.orgA (IP address)IN (0x0001)false
    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
    Apr 25, 2024 12:51:57.302524090 CEST1.1.1.1192.168.2.50x9596No error (0)ur253.duckdns.org45.14.194.253A (IP address)IN (0x0001)false
    Apr 25, 2024 12:53:18.277934074 CEST1.1.1.1192.168.2.50x3e8bNo error (0)ur253.duckdns.org45.14.194.253A (IP address)IN (0x0001)false
    Apr 25, 2024 12:54:26.033302069 CEST1.1.1.1192.168.2.50x6c46No error (0)ur253.duckdns.org45.14.194.253A (IP address)IN (0x0001)false

    Click to jump to process

    Click to jump to process

    Click to dive into process behavior distribution

    Target ID:0
    Start time:12:51:07
    Start date:25/04/2024
    Path:C:\Users\user\Desktop\lustsorelfar.exe
    Wow64 process (32bit):false
    Commandline:"C:\Users\user\Desktop\lustsorelfar.exe"
    Imagebase:0x1b6a6f20000
    File size:20'822'528 bytes
    MD5 hash:837A823641BC5BA36BC3F49F4E9E8F2D
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:low
    Has exited:false

    Reset < >
      Memory Dump Source
      • Source File: 00000000.00000002.4493951051.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff848f10000_lustsorelfar.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 72807be991e3fede41fb43e11fe98a032aee0f20460ec7c11e698eed928a39eb
      • Instruction ID: 3c6e93f8b5b3fc6ddbcc8c5c89ec39beda22935fc0668bc2895075255fb07eea
      • Opcode Fuzzy Hash: 72807be991e3fede41fb43e11fe98a032aee0f20460ec7c11e698eed928a39eb
      • Instruction Fuzzy Hash: 66334771D19A2D8FDB99EF14C890BA9B7B1FF58341F5041EAC00DA7285DB38AE81CB54
      Uniqueness

      Uniqueness Score: -1.00%

      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.4493951051.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff848f10000_lustsorelfar.jbxd
      Similarity
      • API ID:
      • String ID: O_H
      • API String ID: 0-1880849852
      • Opcode ID: 036765d02c1516ee662eccc93c485ed6a785ff54e42e27f0dd3fff9593579900
      • Instruction ID: 2ddd71e712af3ee460d492136e05bb51baac3424076905eaae3ba62cee322fc7
      • Opcode Fuzzy Hash: 036765d02c1516ee662eccc93c485ed6a785ff54e42e27f0dd3fff9593579900
      • Instruction Fuzzy Hash: 83C13D30919A4E8FEB88EF28C895AE9B7B1FF59340F5001B9D40DD7296CE35AD85CB50
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000000.00000002.4493951051.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff848f10000_lustsorelfar.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 649f66da43a955d5f027324ddb6fe05f09b03abd4a30baabe81eb52b19b37638
      • Instruction ID: d8e56d6eb9a2e54ca8743c37f8d2434c1dfb9c2124855c25c1d833da55e062ca
      • Opcode Fuzzy Hash: 649f66da43a955d5f027324ddb6fe05f09b03abd4a30baabe81eb52b19b37638
      • Instruction Fuzzy Hash: C7F16F70A0AA5D8FDB85EB68C450BADB7F1FF59340F5401AAD00CE7292EB39AD41CB15
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000000.00000002.4493951051.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff848f10000_lustsorelfar.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 320bd8ea3b0454ffb9b2d003fb8f481fcbde22653be2c09d518bbc128c09ab62
      • Instruction ID: 1eb65ec18d853d12bfca2fc6c5f8ece5605196c50a1f03f092cd6e225b820ecf
      • Opcode Fuzzy Hash: 320bd8ea3b0454ffb9b2d003fb8f481fcbde22653be2c09d518bbc128c09ab62
      • Instruction Fuzzy Hash: A5411871D0EA8D4FE786AB2888297997FF2EF56351F4600BAC488DB2D3DA291D448711
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000000.00000002.4493951051.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff848f10000_lustsorelfar.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 0fc9713096ae2df5539961e8d4211373492277ddad29f79aba0c6787876697bd
      • Instruction ID: aad02db92f9e37e2c239b59e4336ccc1d40dc39c24f9bf2e50885f733e826056
      • Opcode Fuzzy Hash: 0fc9713096ae2df5539961e8d4211373492277ddad29f79aba0c6787876697bd
      • Instruction Fuzzy Hash: FC213A7190EA4C4FD782EB28C45439DBFB2EF9A341F4100BAD488EB292EA295D448721
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000000.00000002.4493951051.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff848f10000_lustsorelfar.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: f3827b0115f921b6bc4d93975c8c30ea43605fff9d74752e5deffba92152c2a4
      • Instruction ID: 6ed4c6ecd058647333c7fc0bbbb10f33aa202e46955e7d5c401d8b0c974ca0f4
      • Opcode Fuzzy Hash: f3827b0115f921b6bc4d93975c8c30ea43605fff9d74752e5deffba92152c2a4
      • Instruction Fuzzy Hash: 9CB1C070E18A1D8FDB98EFA8D494AADBBF1FB59341F504069D40AE3281CB75A881CB54
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000000.00000002.4493951051.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff848f10000_lustsorelfar.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 44670938fa1d20abab32de126c75e8f254b91f7f332f4fc299af688a8dec01c5
      • Instruction ID: 7d43081b551405c88ec1e4c0f89089b12aa805ea6373deae968678db98af49f1
      • Opcode Fuzzy Hash: 44670938fa1d20abab32de126c75e8f254b91f7f332f4fc299af688a8dec01c5
      • Instruction Fuzzy Hash: 67A1AE70A09A1D8FDB98EF58C894BADBBF1FF58301F1041AAD40DE7295DB34A981CB54
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000000.00000002.4493951051.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff848f10000_lustsorelfar.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 9951c497b951e528e212b7b4cedc8093c64cd6659cfc2143884ae6bfb51966e6
      • Instruction ID: 6b8c0f7abda77627126018c8b7f655ffcfca6a44c5d049a38cb90d1fd2a2c32a
      • Opcode Fuzzy Hash: 9951c497b951e528e212b7b4cedc8093c64cd6659cfc2143884ae6bfb51966e6
      • Instruction Fuzzy Hash: 31712370E0995D8FDB98EB68C894BADBBF0FF58301F1441AAD00DE7292DB349985CB50
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000000.00000002.4493951051.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff848f10000_lustsorelfar.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: e50c8edf7225588e86d532a50a499064a551b3213c98b82a4a10ff069ba4e80c
      • Instruction ID: 333a667b5686a8bf965c18c05812e261e5cef83e957f4892004c87cec8d0ff11
      • Opcode Fuzzy Hash: e50c8edf7225588e86d532a50a499064a551b3213c98b82a4a10ff069ba4e80c
      • Instruction Fuzzy Hash: B8518F71A09A4E8FDB88EF68D454AA9B7F1FF69340F00057AD009D7296DF39EC418B80
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000000.00000002.4493951051.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff848f10000_lustsorelfar.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: f922732fd9e92aaf32071d115dd27474372337639dfa1696e86f08308f23c6d6
      • Instruction ID: 6676bc751deee08bf3de431e8ea761f15cd7087a38a0b162839aa94c4c68bdda
      • Opcode Fuzzy Hash: f922732fd9e92aaf32071d115dd27474372337639dfa1696e86f08308f23c6d6
      • Instruction Fuzzy Hash: F261D070E08A1D8FDB98EF68D894BADBBF1FB58301F1041AAD00DE7295DB349985CB50
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000000.00000002.4493951051.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff848f10000_lustsorelfar.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 6c1519553c9b41732088eb577be71c6fc28a23b437c7874efabb4b0dff91f1c6
      • Instruction ID: 8f11b8a33c877ff4a244c599a641ca0d90aa9f60189b9083990baf0b6c7a1b1d
      • Opcode Fuzzy Hash: 6c1519553c9b41732088eb577be71c6fc28a23b437c7874efabb4b0dff91f1c6
      • Instruction Fuzzy Hash: 1051D33090968D8FDB49EF68D4946E9BBB2FF59301F50007AE009D7282CB39EC81CB90
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000000.00000002.4493951051.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff848f10000_lustsorelfar.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: cc5dae07e61f9712f01fb91df06a10f5e9d2a54a2706531c25c20b6ce52445b4
      • Instruction ID: 585cd74d8a7fef2107f50f99903c53eebfb713a468f9433eea3f3cfe95bcdb3e
      • Opcode Fuzzy Hash: cc5dae07e61f9712f01fb91df06a10f5e9d2a54a2706531c25c20b6ce52445b4
      • Instruction Fuzzy Hash: 88519F71909A4C8FDB85EF68C4547ADBBF1FF5A381F4500BAD048EB2A2DA395E84C750
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000000.00000002.4493951051.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff848f10000_lustsorelfar.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 0183e085c61710ff6468028d62f674ffd7284e70e220756db090b3db660ac6ef
      • Instruction ID: 7c57baa099e2db6ce2452d0628f7914484fbcfe2df41eb8e1a3bb12ea972c99d
      • Opcode Fuzzy Hash: 0183e085c61710ff6468028d62f674ffd7284e70e220756db090b3db660ac6ef
      • Instruction Fuzzy Hash: C5519D70909A4C9FDB85EF68C4547ADBBF1FF5A341F4500AAD048EB292DB395E44CB50
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000000.00000002.4493951051.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff848f10000_lustsorelfar.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 28a70a7453a94f38bfe9fb3fae9fb705dd12d45f22b041edaa2df0fd77934b81
      • Instruction ID: f4980d2e19955871fee4470dbdf4abaf51d5712b0a81cb2757e348bd021bb750
      • Opcode Fuzzy Hash: 28a70a7453a94f38bfe9fb3fae9fb705dd12d45f22b041edaa2df0fd77934b81
      • Instruction Fuzzy Hash: A5517E70909A4C9FDB85EF68C4547ADBBF1FF5A341F85006AD048EB292DB355E84CB50
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000000.00000002.4493951051.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff848f10000_lustsorelfar.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 0bc9af5b07068fb5a091957de4c4b0ee15bc340e0860863229fef0d64aa2986e
      • Instruction ID: eb63172b003602004e90eb6ed888c3c63274dd06fc98b6a10a632cb8719fa645
      • Opcode Fuzzy Hash: 0bc9af5b07068fb5a091957de4c4b0ee15bc340e0860863229fef0d64aa2986e
      • Instruction Fuzzy Hash: F4516D70909A4C9FDB85EF68C4547ADBBF2FF5A381F85007AD049EB292DA355E80CB50
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000000.00000002.4493951051.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff848f10000_lustsorelfar.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 5e6fb77d670a210e80fd53fcb5a56060263ede404a5e60666bc214e72471f47f
      • Instruction ID: 6e142763c46aeb7987f6d508c05f037a92bbd63e271586b9ea9885b55d4fc76a
      • Opcode Fuzzy Hash: 5e6fb77d670a210e80fd53fcb5a56060263ede404a5e60666bc214e72471f47f
      • Instruction Fuzzy Hash: 7741F531A1890D9FDF94EB5CD884AADBBF1FF69311F0401A5E009E72A1CB24AC42CB50
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000000.00000002.4493951051.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff848f10000_lustsorelfar.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: d3aa199f003b3e5196e8a181d8b4dba69756284f4a2f4967a0d672fe1016767c
      • Instruction ID: 1e61f91efd5f308ba80635ad5e9913f2b1b326f298d3a375105ccf56b4490b7a
      • Opcode Fuzzy Hash: d3aa199f003b3e5196e8a181d8b4dba69756284f4a2f4967a0d672fe1016767c
      • Instruction Fuzzy Hash: A631B235A1890D9FDF94EB5CD485AADBBF1FF69311F010166E009E7265CB70AC81CB90
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000000.00000002.4493951051.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff848f10000_lustsorelfar.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 1115e0a305976f18a9e1fe0ce3e195306492d5e91f3802479f9d9e9ec7e4e842
      • Instruction ID: 2233b87c131a847abd994b5f6f85189f221e4d6f3089dd7a1fb6fedb0079ed12
      • Opcode Fuzzy Hash: 1115e0a305976f18a9e1fe0ce3e195306492d5e91f3802479f9d9e9ec7e4e842
      • Instruction Fuzzy Hash: 4F31C131C0965D8FDB85EF64E8546EDBBB1FF5A301F00016AE009E7292CB799D42CB50
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000000.00000002.4493951051.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff848f10000_lustsorelfar.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 06004db58d9dff61a660810d96a9277d901290fdb24f36bb4e0b2a286778cdfd
      • Instruction ID: cbfd485c3ba665ac4d44b8bfaff0ebede4104448c4e72558ed5fc418abe01ff9
      • Opcode Fuzzy Hash: 06004db58d9dff61a660810d96a9277d901290fdb24f36bb4e0b2a286778cdfd
      • Instruction Fuzzy Hash: 9D31683090965D8FDB84EFA8E4446EDB7B1FF59301F10156AE009E7292CB39A881CB94
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000000.00000002.4493951051.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff848f10000_lustsorelfar.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 64e2f3867df087ea58415be058ba135c57554bdacf9e4d404c0d4d98947af0b3
      • Instruction ID: 101793f5d5bcea0968cec081b0000cc475c8f9795e750df9f50439b4b23970d6
      • Opcode Fuzzy Hash: 64e2f3867df087ea58415be058ba135c57554bdacf9e4d404c0d4d98947af0b3
      • Instruction Fuzzy Hash: AE214830D09A5D8FDB88EF98E4547EDB7B1FF99301F10156AE009E3291CB75A891CB80
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000000.00000002.4493951051.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff848f10000_lustsorelfar.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: bad069d71a5e4e2240d222d531ed0c07bd85d9d650ef707646e75a6c75732f0c
      • Instruction ID: f0450b97d49663a953fef1c2298c5b7abe71ac82955e7abc6bd5448e52f6068c
      • Opcode Fuzzy Hash: bad069d71a5e4e2240d222d531ed0c07bd85d9d650ef707646e75a6c75732f0c
      • Instruction Fuzzy Hash: 1D3130B091878D8FE788EF28C4987A97BE1FF98304F5404E9D819C7382DB359856CB50
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000000.00000002.4493951051.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff848f10000_lustsorelfar.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 81aa50457d22388e31358ec3f1c5961f44c30c03297277e00c5afdee2fd3f80b
      • Instruction ID: b511c58e67cc7bed5f7bef2f8cab02cf60bf947298b435e61639c709a8a7ca0b
      • Opcode Fuzzy Hash: 81aa50457d22388e31358ec3f1c5961f44c30c03297277e00c5afdee2fd3f80b
      • Instruction Fuzzy Hash: E2110562D0EAD69EF265773818590B42FD0FFA6790F2908BAC4498B0C3ED189C08C385
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000000.00000002.4493951051.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff848f10000_lustsorelfar.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: d8999fcb04ad958bff65e30a43401aa801ea5e9991f693196dbb31c1a5fee095
      • Instruction ID: d816e480487e3daf12af570e7b8e367c4414f589559f392aa2648e741c0a2b55
      • Opcode Fuzzy Hash: d8999fcb04ad958bff65e30a43401aa801ea5e9991f693196dbb31c1a5fee095
      • Instruction Fuzzy Hash: 3311B27094D6CD4FDB42ABA888156EA7FB1EF46310F0500B6D088D71D2CA2C594AC765
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000000.00000002.4493951051.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff848f10000_lustsorelfar.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: f359cf977f6a34782ff5f6ddd28dc6b9242705f07db2fced457ee0f767d5634e
      • Instruction ID: 3321033ffbe9a883ae54587449601d41c8f76a1c6c645a6b015f3af17acfcf1b
      • Opcode Fuzzy Hash: f359cf977f6a34782ff5f6ddd28dc6b9242705f07db2fced457ee0f767d5634e
      • Instruction Fuzzy Hash: 3F11E23184E6CD4FDB42EB6488156EA7FB1EF96351F0500F6D448E71D3DA2C5946C325
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000000.00000002.4493951051.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff848f10000_lustsorelfar.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 2a04420df832b56a3bb82d1d29e27686630890da8d4bde30e676da24fd78e11f
      • Instruction ID: f17cdac99dd5f202527142c96dd7b12f8a013781f16dd8d243735d95e62f8bdf
      • Opcode Fuzzy Hash: 2a04420df832b56a3bb82d1d29e27686630890da8d4bde30e676da24fd78e11f
      • Instruction Fuzzy Hash: 66114C30A19A8E8FEB84EF18C840BAEB7B1FF59340F5045A5D409D3292CA35AD55CB50
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000000.00000002.4493951051.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff848f10000_lustsorelfar.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 338d75d55dbac6c1f61cc3b4fa60832fbd1fbf3e0068f8da405dc63c92e0ebb2
      • Instruction ID: a1e993e7e6bc5f896ec4ecef516d233801d414b404192b057f7d784fa0eba5c3
      • Opcode Fuzzy Hash: 338d75d55dbac6c1f61cc3b4fa60832fbd1fbf3e0068f8da405dc63c92e0ebb2
      • Instruction Fuzzy Hash: 1D115E31D18A4E9FEB44FF28C8996E97BA0FF99340F4405BAE808D71D2DF3499558740
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000000.00000002.4493951051.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff848f10000_lustsorelfar.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: a2db586fd19558ce6da032227c00ab8b430a0c40bc29f63c4b103893ae3a24a6
      • Instruction ID: 93e443e5b44f1d8865ff15130da7de1757d2121a5d8db658927cfaf68b29e0f0
      • Opcode Fuzzy Hash: a2db586fd19558ce6da032227c00ab8b430a0c40bc29f63c4b103893ae3a24a6
      • Instruction Fuzzy Hash: 7E016D31A0DA4D8FDB84EF58D891AE973A2FF99340F4514A8E41DD32C2CE36AC52C704
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000000.00000002.4493951051.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff848f10000_lustsorelfar.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 070f709b466dc51a20df05ce0853f1275e9a6d8c4d024f9439e8724b0bc04713
      • Instruction ID: c172a24f0a84bbcbc6ddbf77cf2433d5fac9bcfee9fa347885767f2ab0bf0619
      • Opcode Fuzzy Hash: 070f709b466dc51a20df05ce0853f1275e9a6d8c4d024f9439e8724b0bc04713
      • Instruction Fuzzy Hash: 7201693090990D8FEB41EF68C8046EEB7B2FBA9341F000176D108E3281DA3869508B54
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000000.00000002.4493951051.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff848f10000_lustsorelfar.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 47d60ed63380434d8751e8bb9fcb9fa2a2164d79d36f9302d328dc81b1609e95
      • Instruction ID: 2b68984fb0e7b21e5654ae835390d13b3f1d54746bb72a4b98da74a42e6fbb73
      • Opcode Fuzzy Hash: 47d60ed63380434d8751e8bb9fcb9fa2a2164d79d36f9302d328dc81b1609e95
      • Instruction Fuzzy Hash: 73D0C971D0940CAEDB40EB58E8915ECB775FF89214F0012B6E40DD3192DF702AA18640
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000000.00000002.4493951051.00007FF848F10000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F10000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff848f10000_lustsorelfar.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: d926a611efe885d738a9cb573cfe6493e2f040d629b15eafc89df42af19b6e66
      • Instruction ID: 4c9120f8d305ed7da4972b24dcf048143960377cc7af4dd73f11f9f4bcd7a52e
      • Opcode Fuzzy Hash: d926a611efe885d738a9cb573cfe6493e2f040d629b15eafc89df42af19b6e66
      • Instruction Fuzzy Hash: B1429170D09A5D8FDB86EB28C4547A8BBB2FF59341F5401BAC00EE7296DF396980CB54
      Uniqueness

      Uniqueness Score: -1.00%