Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
PHHOjspjmp.exe

Overview

General Information

Sample name:PHHOjspjmp.exe
renamed because original name is a hash value
Original sample name:46d004a90bfc51d6447a0661f440e7a5.exe
Analysis ID:1432016
MD5:46d004a90bfc51d6447a0661f440e7a5
SHA1:fe33bb099ec660d4cc2607a34bcf55c92c5dc0f8
SHA256:a50139923127672a8083b6d24b45e102e358aa0fcb8b558a85386cf9892605aa
Tags:32exe
Infos:

Detection

CMSBrute
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected CMSBrute
Contains functionality to inject code into remote processes
Drops PE files with benign system names
Found Tor onion address
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
May use the Tor software to hide its network traffic
Sigma detected: Files With System Process Name In Unsuspected Locations
Sigma detected: Suspicious Process Parents
Sigma detected: System File Execution Location Anomaly
Connects to several IPs in different countries
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain (may stop execution after checking a module file name)
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Sigma detected: Wow6432Node CurrentVersion Autorun Keys Modification
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • PHHOjspjmp.exe (PID: 6576 cmdline: "C:\Users\user\Desktop\PHHOjspjmp.exe" MD5: 46D004A90BFC51D6447A0661F440E7A5)
    • PHHOjspjmp.exe (PID: 6512 cmdline: "C:\Users\user\Desktop\PHHOjspjmp.exe" MD5: 46D004A90BFC51D6447A0661F440E7A5)
  • csrss.exe (PID: 2624 cmdline: "C:\ProgramData\Drivers\csrss.exe" MD5: 46D004A90BFC51D6447A0661F440E7A5)
    • csrss.exe (PID: 2792 cmdline: "C:\ProgramData\Drivers\csrss.exe" MD5: 46D004A90BFC51D6447A0661F440E7A5)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000000.00000002.2010418377.00000000044BF000.00000040.00000020.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
  • 0x798:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
00000003.00000002.2113415020.0000000004700000.00000040.00000020.00020000.00000000.sdmpWindows_Trojan_RedLineStealer_ed346e4cunknownunknown
  • 0x778:$a: 55 8B EC 8B 45 14 56 57 8B 7D 08 33 F6 89 47 0C 39 75 10 76 15 8B
Process Memory Space: PHHOjspjmp.exe PID: 6512JoeSecurity_CMSBruteYara detected CMSBruteJoe Security
    Process Memory Space: csrss.exe PID: 2792JoeSecurity_CMSBruteYara detected CMSBruteJoe Security
      SourceRuleDescriptionAuthorStrings
      4.2.csrss.exe.400000.0.unpackJoeSecurity_CMSBruteYara detected CMSBruteJoe Security
        1.2.PHHOjspjmp.exe.400000.0.unpackJoeSecurity_CMSBruteYara detected CMSBruteJoe Security

          System Summary

          barindex
          Source: File createdAuthor: Sander Wiebing, Tim Shelton, Nasreddine Bencherchali (Nextron Systems): Data: EventID: 11, Image: C:\Users\user\Desktop\PHHOjspjmp.exe, ProcessId: 6512, TargetFilename: C:\ProgramData\Drivers\csrss.exe
          Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\ProgramData\Drivers\csrss.exe" , CommandLine: "C:\ProgramData\Drivers\csrss.exe" , CommandLine|base64offset|contains: , Image: C:\ProgramData\Drivers\csrss.exe, NewProcessName: C:\ProgramData\Drivers\csrss.exe, OriginalFileName: C:\ProgramData\Drivers\csrss.exe, ParentCommandLine: "C:\ProgramData\Drivers\csrss.exe" , ParentImage: C:\ProgramData\Drivers\csrss.exe, ParentProcessId: 2624, ParentProcessName: csrss.exe, ProcessCommandLine: "C:\ProgramData\Drivers\csrss.exe" , ProcessId: 2792, ProcessName: csrss.exe
          Source: Process startedAuthor: Florian Roth (Nextron Systems), Patrick Bareiss, Anton Kutepov, oscd.community, Nasreddine Bencherchali: Data: Command: "C:\ProgramData\Drivers\csrss.exe" , CommandLine: "C:\ProgramData\Drivers\csrss.exe" , CommandLine|base64offset|contains: , Image: C:\ProgramData\Drivers\csrss.exe, NewProcessName: C:\ProgramData\Drivers\csrss.exe, OriginalFileName: C:\ProgramData\Drivers\csrss.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1028, ProcessCommandLine: "C:\ProgramData\Drivers\csrss.exe" , ProcessId: 2624, ProcessName: csrss.exe
          Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: "C:\ProgramData\Drivers\csrss.exe", EventID: 13, EventType: SetValue, Image: C:\Users\user\Desktop\PHHOjspjmp.exe, ProcessId: 6512, TargetObject: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\CSRSS
          Source: Process startedAuthor: vburov: Data: Command: "C:\ProgramData\Drivers\csrss.exe" , CommandLine: "C:\ProgramData\Drivers\csrss.exe" , CommandLine|base64offset|contains: , Image: C:\ProgramData\Drivers\csrss.exe, NewProcessName: C:\ProgramData\Drivers\csrss.exe, OriginalFileName: C:\ProgramData\Drivers\csrss.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 1028, ProcessCommandLine: "C:\ProgramData\Drivers\csrss.exe" , ProcessId: 2624, ProcessName: csrss.exe
          No Snort rule has matched

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: PHHOjspjmp.exeAvira: detected
          Source: C:\ProgramData\Drivers\csrss.exeAvira: detection malicious, Label: HEUR/AGEN.1312652
          Source: C:\ProgramData\Drivers\csrss.exeReversingLabs: Detection: 50%
          Source: C:\ProgramData\Drivers\csrss.exeVirustotal: Detection: 50%Perma Link
          Source: PHHOjspjmp.exeReversingLabs: Detection: 50%
          Source: PHHOjspjmp.exeVirustotal: Detection: 50%Perma Link
          Source: C:\ProgramData\Drivers\csrss.exeJoe Sandbox ML: detected
          Source: PHHOjspjmp.exeJoe Sandbox ML: detected
          Source: PHHOjspjmp.exe, 00000001.00000002.4474538963.0000000000400000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_5f442bbf-0
          Source: PHHOjspjmp.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
          Source: unknownHTTPS traffic detected: 204.13.164.118:443 -> 192.168.2.5:49720 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 51.15.246.170:443 -> 192.168.2.5:49719 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 195.201.94.113:443 -> 192.168.2.5:49728 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 199.58.81.140:443 -> 192.168.2.5:49735 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 199.58.81.140:443 -> 192.168.2.5:49738 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 85.10.240.250:443 -> 192.168.2.5:49750 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 195.154.106.60:443 -> 192.168.2.5:49752 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 131.188.40.189:443 -> 192.168.2.5:49753 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 130.225.244.90:443 -> 192.168.2.5:49759 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 51.158.147.25:443 -> 192.168.2.5:49760 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 209.58.180.90:443 -> 192.168.2.5:49769 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 199.58.81.140:443 -> 192.168.2.5:49774 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 185.65.205.10:443 -> 192.168.2.5:49773 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 204.13.164.118:443 -> 192.168.2.5:49775 version: TLS 1.2
          Source: Binary string: C:\mova-vur\fina_cusayuk\nusami.pdb source: PHHOjspjmp.exe, csrss.exe.1.dr
          Source: Binary string: w>C:\mova-vur\fina_cusayuk\nusami.pdb source: PHHOjspjmp.exe, csrss.exe.1.dr

          Networking

          barindex
          Source: PHHOjspjmp.exe, 00000001.00000002.4474538963.0000000000824000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: Referer: X-Requested-With: XMLHttpRequest Content-Type: application/json;127.0.0.1:--ignore-missing-torrcect[] = --SOCKSPort--DataDirectory--bridgehttp://x5outc76j5k4qrzaqdj2m6eq4amkkpndbqyvmvaz6yl4mmfco6oqxsqd.onionT/reg.php?upd.php?/task.php?/rep.phperr.php?&n=v=b=p=repsf=e=nocache=SEH exceptionSEHSTD: C++.dll4kPv6aJG8e\!update!sleep !regcheckcreateObjectwp-login.phpwp-admin/name="loginform"ionW[] = id="loginform"name="log"id="user_login"name="pwd"id="user_pass"administrator/administrator/index.php ] = id="form-login"action="/administrator= = id="mod-login-username"nd[] = name="username"id="mod-login-password" name="passwd"admin.phpDataLifesubactionusernamepasswordOK{
          Source: csrss.exe, 00000004.00000002.4474695059.0000000000824000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: Referer: X-Requested-With: XMLHttpRequest Content-Type: application/json;127.0.0.1:--ignore-missing-torrcect[] = --SOCKSPort--DataDirectory--bridgehttp://x5outc76j5k4qrzaqdj2m6eq4amkkpndbqyvmvaz6yl4mmfco6oqxsqd.onionT/reg.php?upd.php?/task.php?/rep.phperr.php?&n=v=b=p=repsf=e=nocache=SEH exceptionSEHSTD: C++.dll4kPv6aJG8e\!update!sleep !regcheckcreateObjectwp-login.phpwp-admin/name="loginform"ionW[] = id="loginform"name="log"id="user_login"name="pwd"id="user_pass"administrator/administrator/index.php ] = id="form-login"action="/administrator= = id="mod-login-username"nd[] = name="username"id="mod-login-password" name="passwd"admin.phpDataLifesubactionusernamepasswordOK{
          Source: unknownNetwork traffic detected: IP country count 19
          Source: global trafficTCP traffic: 192.168.2.5:49707 -> 31.127.34.9:9001
          Source: global trafficTCP traffic: 192.168.2.5:49708 -> 75.176.45.87:9001
          Source: global trafficTCP traffic: 192.168.2.5:49722 -> 51.91.121.255:9001
          Source: global trafficTCP traffic: 192.168.2.5:49726 -> 95.216.154.139:9001
          Source: global trafficTCP traffic: 192.168.2.5:49729 -> 128.31.0.39:9101
          Source: global trafficTCP traffic: 192.168.2.5:49731 -> 185.220.101.20:10020
          Source: global trafficTCP traffic: 192.168.2.5:49732 -> 193.218.118.100:9001
          Source: global trafficTCP traffic: 192.168.2.5:49736 -> 143.107.229.120:40233
          Source: global trafficTCP traffic: 192.168.2.5:49740 -> 151.197.240.154:9001
          Source: global trafficTCP traffic: 192.168.2.5:49741 -> 46.188.6.64:9001
          Source: global trafficTCP traffic: 192.168.2.5:49742 -> 173.249.63.227:9001
          Source: global trafficTCP traffic: 192.168.2.5:49743 -> 47.56.94.99:9001
          Source: global trafficTCP traffic: 192.168.2.5:49744 -> 80.66.135.13:9001
          Source: global trafficTCP traffic: 192.168.2.5:49746 -> 8.209.79.125:9001
          Source: global trafficTCP traffic: 192.168.2.5:49748 -> 167.86.94.107:9001
          Source: global trafficTCP traffic: 192.168.2.5:49751 -> 93.186.202.32:9001
          Source: global trafficTCP traffic: 192.168.2.5:49754 -> 62.78.194.4:9001
          Source: global trafficTCP traffic: 192.168.2.5:49755 -> 51.38.65.160:9001
          Source: global trafficTCP traffic: 192.168.2.5:49756 -> 212.8.243.229:9001
          Source: global trafficTCP traffic: 192.168.2.5:49761 -> 45.153.160.131:9001
          Source: global trafficTCP traffic: 192.168.2.5:49763 -> 185.220.101.205:10205
          Source: global trafficTCP traffic: 192.168.2.5:49764 -> 212.47.227.71:9001
          Source: global trafficTCP traffic: 192.168.2.5:49766 -> 149.56.98.216:9001
          Source: global trafficTCP traffic: 192.168.2.5:49767 -> 134.249.185.176:9001
          Source: global trafficTCP traffic: 192.168.2.5:49768 -> 188.195.109.45:9001
          Source: global trafficTCP traffic: 192.168.2.5:49771 -> 91.121.160.6:9001
          Source: Joe Sandbox ViewIP Address: 171.25.193.9 171.25.193.9
          Source: Joe Sandbox ViewIP Address: 171.25.193.9 171.25.193.9
          Source: Joe Sandbox ViewIP Address: 45.66.33.45 45.66.33.45
          Source: Joe Sandbox ViewJA3 fingerprint: 83d60721ecc423892660e275acc4dffd
          Source: unknownTCP traffic detected without corresponding DNS query: 46.105.227.109
          Source: unknownTCP traffic detected without corresponding DNS query: 46.105.227.109
          Source: unknownTCP traffic detected without corresponding DNS query: 46.105.227.109
          Source: unknownTCP traffic detected without corresponding DNS query: 31.127.34.9
          Source: unknownTCP traffic detected without corresponding DNS query: 31.127.34.9
          Source: unknownTCP traffic detected without corresponding DNS query: 75.176.45.87
          Source: unknownTCP traffic detected without corresponding DNS query: 75.176.45.87
          Source: unknownTCP traffic detected without corresponding DNS query: 31.127.34.9
          Source: unknownTCP traffic detected without corresponding DNS query: 75.176.45.87
          Source: unknownTCP traffic detected without corresponding DNS query: 31.127.34.9
          Source: unknownTCP traffic detected without corresponding DNS query: 75.176.45.87
          Source: unknownTCP traffic detected without corresponding DNS query: 31.127.34.9
          Source: unknownTCP traffic detected without corresponding DNS query: 75.176.45.87
          Source: unknownTCP traffic detected without corresponding DNS query: 51.15.246.170
          Source: unknownTCP traffic detected without corresponding DNS query: 204.13.164.118
          Source: unknownTCP traffic detected without corresponding DNS query: 51.15.246.170
          Source: unknownTCP traffic detected without corresponding DNS query: 204.13.164.118
          Source: unknownTCP traffic detected without corresponding DNS query: 51.15.246.170
          Source: unknownTCP traffic detected without corresponding DNS query: 204.13.164.118
          Source: unknownTCP traffic detected without corresponding DNS query: 204.13.164.118
          Source: unknownTCP traffic detected without corresponding DNS query: 204.13.164.118
          Source: unknownTCP traffic detected without corresponding DNS query: 204.13.164.118
          Source: unknownTCP traffic detected without corresponding DNS query: 51.15.246.170
          Source: unknownTCP traffic detected without corresponding DNS query: 51.15.246.170
          Source: unknownTCP traffic detected without corresponding DNS query: 51.15.246.170
          Source: unknownTCP traffic detected without corresponding DNS query: 51.91.121.255
          Source: unknownTCP traffic detected without corresponding DNS query: 51.91.121.255
          Source: unknownTCP traffic detected without corresponding DNS query: 198.245.49.18
          Source: unknownTCP traffic detected without corresponding DNS query: 198.245.49.18
          Source: unknownTCP traffic detected without corresponding DNS query: 154.35.175.225
          Source: unknownTCP traffic detected without corresponding DNS query: 154.35.175.225
          Source: unknownTCP traffic detected without corresponding DNS query: 198.245.49.18
          Source: unknownTCP traffic detected without corresponding DNS query: 154.35.175.225
          Source: unknownTCP traffic detected without corresponding DNS query: 51.91.121.255
          Source: unknownTCP traffic detected without corresponding DNS query: 51.91.121.255
          Source: unknownTCP traffic detected without corresponding DNS query: 154.35.175.225
          Source: unknownTCP traffic detected without corresponding DNS query: 198.245.49.18
          Source: unknownTCP traffic detected without corresponding DNS query: 51.15.246.170
          Source: unknownTCP traffic detected without corresponding DNS query: 204.13.164.118
          Source: unknownTCP traffic detected without corresponding DNS query: 51.15.246.170
          Source: unknownTCP traffic detected without corresponding DNS query: 204.13.164.118
          Source: unknownTCP traffic detected without corresponding DNS query: 46.105.227.109
          Source: unknownTCP traffic detected without corresponding DNS query: 95.216.154.139
          Source: unknownTCP traffic detected without corresponding DNS query: 171.25.193.9
          Source: unknownTCP traffic detected without corresponding DNS query: 195.201.94.113
          Source: unknownTCP traffic detected without corresponding DNS query: 195.201.94.113
          Source: unknownTCP traffic detected without corresponding DNS query: 195.201.94.113
          Source: unknownTCP traffic detected without corresponding DNS query: 171.25.193.9
          Source: unknownTCP traffic detected without corresponding DNS query: 171.25.193.9
          Source: unknownTCP traffic detected without corresponding DNS query: 195.201.94.113
          Source: PHHOjspjmp.exe, 00000001.00000002.4474538963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, csrss.exe, 00000004.00000002.4474695059.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: www.google.com,www.mit.edu,www.yahoo.com,www.slashdot.org equals www.yahoo.com (Yahoo)
          Source: PHHOjspjmp.exe, 00000001.00000002.4475450110.0000000000B45000.00000004.00000020.00020000.00000000.sdmp, csrss.exe, 00000004.00000002.4475777311.0000000002812000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: www.yahoo.com equals www.yahoo.com (Yahoo)
          Source: csrss.exe, 00000004.00000002.4475777311.0000000002812000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: }www.yahoo.com equals www.yahoo.com (Yahoo)
          Source: PHHOjspjmp.exe, 00000001.00000002.4474538963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, csrss.exe, 00000004.00000002.4474695059.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://www.openssl.org/support/faq.html
          Source: PHHOjspjmp.exe, 00000001.00000002.4474538963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, csrss.exe, 00000004.00000002.4474695059.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://www.openssl.org/support/faq.htmlTYPE=2OpenSSL
          Source: PHHOjspjmp.exe, 00000001.00000002.4474538963.0000000000824000.00000040.00000400.00020000.00000000.sdmp, csrss.exe, 00000004.00000002.4474695059.0000000000824000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: http://x5outc76j5k4qrzaqdj2m6eq4amkkpndbqyvmvaz6yl4mmfco6oqxsqd.onionT/reg.php?upd.php?/task.php?/re
          Source: PHHOjspjmp.exe, 00000001.00000002.4474538963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, csrss.exe, 00000004.00000002.4474695059.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https:///phpMyAdmin//PhpMyAdmin//pma/rootmysqlimapssmtpspop3sscp://your_IP_is_greylisted_README.txt2
          Source: PHHOjspjmp.exe, 00000001.00000002.4474538963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, csrss.exe, 00000004.00000002.4474695059.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://curl.se/docs/alt-svc.html
          Source: csrss.exe, 00000004.00000002.4474695059.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://curl.se/docs/hsts.html
          Source: PHHOjspjmp.exe, 00000001.00000002.4474538963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, csrss.exe, 00000004.00000002.4474695059.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://curl.se/docs/http-cookies.html
          Source: PHHOjspjmp.exe, 00000001.00000002.4474538963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, csrss.exe, 00000004.00000002.4474695059.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://trac.torproject.org/projects/tor/ticket/14917.
          Source: PHHOjspjmp.exe, 00000001.00000002.4474538963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, csrss.exe, 00000004.00000002.4474695059.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://www.torproject.org/
          Source: csrss.exe, 00000004.00000002.4474695059.0000000000400000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://www.torproject.org/documentation.html
          Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49762 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49769 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49720 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49739
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49738
          Source: unknownNetwork traffic detected: HTTP traffic on port 49759 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49753 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49735
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49775
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49774
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49773
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49770
          Source: unknownNetwork traffic detected: HTTP traffic on port 49724 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49728 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49749 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49752 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49728
          Source: unknownNetwork traffic detected: HTTP traffic on port 49773 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49735 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49769
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49724
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49723
          Source: unknownNetwork traffic detected: HTTP traffic on port 49739 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49758 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49720
          Source: unknownNetwork traffic detected: HTTP traffic on port 49706 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49762
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49760
          Source: unknownNetwork traffic detected: HTTP traffic on port 49760 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49770 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49719 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49719
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49759
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49758
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49757
          Source: unknownNetwork traffic detected: HTTP traffic on port 49774 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49738 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49757 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49753
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49752
          Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49750
          Source: unknownNetwork traffic detected: HTTP traffic on port 49747 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49723 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 49775 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49706
          Source: unknownNetwork traffic detected: HTTP traffic on port 49750 -> 443
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49749
          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49747
          Source: unknownHTTPS traffic detected: 204.13.164.118:443 -> 192.168.2.5:49720 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 51.15.246.170:443 -> 192.168.2.5:49719 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 195.201.94.113:443 -> 192.168.2.5:49728 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 199.58.81.140:443 -> 192.168.2.5:49735 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 199.58.81.140:443 -> 192.168.2.5:49738 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 85.10.240.250:443 -> 192.168.2.5:49750 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 195.154.106.60:443 -> 192.168.2.5:49752 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 131.188.40.189:443 -> 192.168.2.5:49753 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 130.225.244.90:443 -> 192.168.2.5:49759 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 51.158.147.25:443 -> 192.168.2.5:49760 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 209.58.180.90:443 -> 192.168.2.5:49769 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 199.58.81.140:443 -> 192.168.2.5:49774 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 185.65.205.10:443 -> 192.168.2.5:49773 version: TLS 1.2
          Source: unknownHTTPS traffic detected: 204.13.164.118:443 -> 192.168.2.5:49775 version: TLS 1.2

          E-Banking Fraud

          barindex
          Source: Yara matchFile source: 4.2.csrss.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 1.2.PHHOjspjmp.exe.400000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: Process Memory Space: PHHOjspjmp.exe PID: 6512, type: MEMORYSTR
          Source: Yara matchFile source: Process Memory Space: csrss.exe PID: 2792, type: MEMORYSTR

          System Summary

          barindex
          Source: 00000000.00000002.2010418377.00000000044BF000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
          Source: 00000003.00000002.2113415020.0000000004700000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c Author: unknown
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeCode function: 0_2_06020110 VirtualAlloc,GetModuleFileNameA,CreateProcessA,VirtualFree,VirtualAlloc,Wow64GetThreadContext,ReadProcessMemory,NtUnmapViewOfSection,VirtualAllocEx,NtWriteVirtualMemory,NtWriteVirtualMemory,WriteProcessMemory,Wow64SetThreadContext,ResumeThread,ExitProcess,0_2_06020110
          Source: C:\ProgramData\Drivers\csrss.exeCode function: 3_2_061E0110 VirtualAlloc,GetModuleFileNameA,CreateProcessA,VirtualFree,VirtualAlloc,Wow64GetThreadContext,ReadProcessMemory,NtUnmapViewOfSection,VirtualAllocEx,NtWriteVirtualMemory,NtWriteVirtualMemory,WriteProcessMemory,Wow64SetThreadContext,ResumeThread,ExitProcess,3_2_061E0110
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeCode function: 0_2_004065150_2_00406515
          Source: C:\ProgramData\Drivers\csrss.exeCode function: 3_2_004065153_2_00406515
          Source: PHHOjspjmp.exeBinary or memory string: OriginalFilename vs PHHOjspjmp.exe
          Source: PHHOjspjmp.exe, 00000000.00000002.2010184740.00000000041C6000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameFirezer( vs PHHOjspjmp.exe
          Source: PHHOjspjmp.exe, 00000001.00000002.4474538963.0000000000843000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCSRSS.Exej% vs PHHOjspjmp.exe
          Source: PHHOjspjmp.exe, 00000001.00000000.2007772196.00000000041C6000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameFirezer( vs PHHOjspjmp.exe
          Source: PHHOjspjmp.exeBinary or memory string: OriginalFilenameFirezer( vs PHHOjspjmp.exe
          Source: PHHOjspjmp.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
          Source: 00000000.00000002.2010418377.00000000044BF000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
          Source: 00000003.00000002.2113415020.0000000004700000.00000040.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_RedLineStealer_ed346e4c reference_sample = a91c1d3965f11509d1c1125210166b824a79650f29ea203983fffb5f8900858c, os = windows, severity = x86, creation_date = 2022-02-17, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.RedLineStealer, fingerprint = 834c13b2e0497787e552bb1318664496d286e7cf57b4661e5e07bf1cffe61b82, id = ed346e4c-7890-41ee-8648-f512682fe20e, last_modified = 2022-04-12
          Source: classification engineClassification label: mal100.troj.evad.winEXE@6/3@0/53
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeCode function: 0_2_044BF7C6 CreateToolhelp32Snapshot,Module32First,0_2_044BF7C6
          Source: C:\ProgramData\Drivers\csrss.exeMutant created: NULL
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeFile created: C:\Users\user\AppData\Local\Temp\4kPv6aJG8e\Jump to behavior
          Source: PHHOjspjmp.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeFile read: C:\Users\desktop.iniJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: PHHOjspjmp.exeReversingLabs: Detection: 50%
          Source: PHHOjspjmp.exeVirustotal: Detection: 50%
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeFile read: C:\Users\user\Desktop\PHHOjspjmp.exeJump to behavior
          Source: unknownProcess created: C:\Users\user\Desktop\PHHOjspjmp.exe "C:\Users\user\Desktop\PHHOjspjmp.exe"
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeProcess created: C:\Users\user\Desktop\PHHOjspjmp.exe "C:\Users\user\Desktop\PHHOjspjmp.exe"
          Source: unknownProcess created: C:\ProgramData\Drivers\csrss.exe "C:\ProgramData\Drivers\csrss.exe"
          Source: C:\ProgramData\Drivers\csrss.exeProcess created: C:\ProgramData\Drivers\csrss.exe "C:\ProgramData\Drivers\csrss.exe"
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeProcess created: C:\Users\user\Desktop\PHHOjspjmp.exe "C:\Users\user\Desktop\PHHOjspjmp.exe"Jump to behavior
          Source: C:\ProgramData\Drivers\csrss.exeProcess created: C:\ProgramData\Drivers\csrss.exe "C:\ProgramData\Drivers\csrss.exe" Jump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: msimg32.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: iphlpapi.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: dnsapi.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: csunsapi.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: swift.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: nfhwcrhk.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: surewarehook.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: propsys.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: mswsock.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: csunsapi.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: aep.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: atasi.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: swift.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: nfhwcrhk.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: nuronssl.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: surewarehook.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: ubsec.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: aep.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: atasi.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: swift.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: nfhwcrhk.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: nuronssl.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: surewarehook.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: ubsec.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: dhcpcsvc6.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: dhcpcsvc.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: netutils.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: wkscli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeSection loaded: srvcli.dllJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
          Source: PHHOjspjmp.exeStatic file information: File size 1984000 > 1048576
          Source: PHHOjspjmp.exeStatic PE information: Raw size of .data is bigger than: 0x100000 < 0x1be800
          Source: PHHOjspjmp.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
          Source: PHHOjspjmp.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
          Source: PHHOjspjmp.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
          Source: PHHOjspjmp.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
          Source: PHHOjspjmp.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
          Source: PHHOjspjmp.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
          Source: PHHOjspjmp.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
          Source: Binary string: C:\mova-vur\fina_cusayuk\nusami.pdb source: PHHOjspjmp.exe, csrss.exe.1.dr
          Source: Binary string: w>C:\mova-vur\fina_cusayuk\nusami.pdb source: PHHOjspjmp.exe, csrss.exe.1.dr
          Source: PHHOjspjmp.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
          Source: PHHOjspjmp.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
          Source: PHHOjspjmp.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
          Source: PHHOjspjmp.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
          Source: PHHOjspjmp.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeCode function: 1_2_0069D030 LoadLibraryA,GetProcAddress,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,1_2_0069D030
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeCode function: 0_2_00407725 push ecx; ret 0_2_00407738
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeCode function: 0_2_04619A51 push eax; retf 0_2_04619A53
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeCode function: 0_2_04566A35 push ds; ret 0_2_04566A36
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeCode function: 0_2_0460DAE0 push esi; iretd 0_2_0460DAEB
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeCode function: 0_2_045322C0 push eax; iretd 0_2_045322C9
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeCode function: 0_2_04619AB0 push A7EF5AB4h; ret 0_2_04619AB7
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeCode function: 0_2_0454A3F1 push edx; ret 0_2_0454A3F3
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeCode function: 1_2_00696299 push ecx; ret 1_2_006962AC
          Source: C:\ProgramData\Drivers\csrss.exeCode function: 3_2_00407725 push ecx; ret 3_2_00407738
          Source: C:\ProgramData\Drivers\csrss.exeCode function: 3_2_0485AA90 push A7EF5AB4h; ret 3_2_0485AA97
          Source: C:\ProgramData\Drivers\csrss.exeCode function: 3_2_0484EAC0 push esi; iretd 3_2_0484EACB
          Source: C:\ProgramData\Drivers\csrss.exeCode function: 3_2_047A7A15 push ds; ret 3_2_047A7A16
          Source: C:\ProgramData\Drivers\csrss.exeCode function: 3_2_0485AA31 push eax; retf 3_2_0485AA33
          Source: C:\ProgramData\Drivers\csrss.exeCode function: 3_2_047732A0 push eax; iretd 3_2_047732A9
          Source: C:\ProgramData\Drivers\csrss.exeCode function: 3_2_0478B3D1 push edx; ret 3_2_0478B3D3
          Source: C:\ProgramData\Drivers\csrss.exeCode function: 4_2_00696299 push ecx; ret 4_2_006962AC

          Persistence and Installation Behavior

          barindex
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeFile created: C:\ProgramData\Drivers\csrss.exeJump to dropped file
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeFile created: C:\ProgramData\Drivers\csrss.exeJump to dropped file
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeFile created: C:\ProgramData\Drivers\csrss.exeJump to dropped file
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run CSRSSJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeRegistry value created or modified: HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run CSRSSJump to behavior

          Hooking and other Techniques for Hiding and Protection

          barindex
          Source: PHHOjspjmp.exe, 00000001.00000002.4474538963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, csrss.exe, 00000004.00000002.4474695059.0000000000400000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: onion-port
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeCode function: 0_2_00406515 EncodePointer,__initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00406515
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\ProgramData\Drivers\csrss.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\ProgramData\Drivers\csrss.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\ProgramData\Drivers\csrss.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\ProgramData\Drivers\csrss.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeWindow / User API: threadDelayed 1758Jump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeWindow / User API: threadDelayed 8140Jump to behavior
          Source: C:\ProgramData\Drivers\csrss.exeWindow / User API: threadDelayed 8410Jump to behavior
          Source: C:\ProgramData\Drivers\csrss.exeWindow / User API: threadDelayed 1582Jump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcessgraph_0-1360
          Source: C:\ProgramData\Drivers\csrss.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcessgraph_3-1365
          Source: C:\Users\user\Desktop\PHHOjspjmp.exe TID: 6644Thread sleep count: 1758 > 30Jump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exe TID: 6644Thread sleep time: -175800s >= -30000sJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exe TID: 6644Thread sleep count: 8140 > 30Jump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exe TID: 6644Thread sleep time: -814000s >= -30000sJump to behavior
          Source: C:\ProgramData\Drivers\csrss.exe TID: 3424Thread sleep count: 8410 > 30Jump to behavior
          Source: C:\ProgramData\Drivers\csrss.exe TID: 3424Thread sleep time: -841000s >= -30000sJump to behavior
          Source: C:\ProgramData\Drivers\csrss.exe TID: 3424Thread sleep count: 1582 > 30Jump to behavior
          Source: C:\ProgramData\Drivers\csrss.exe TID: 3424Thread sleep time: -158200s >= -30000sJump to behavior
          Source: C:\ProgramData\Drivers\csrss.exeLast function: Thread delayed
          Source: C:\ProgramData\Drivers\csrss.exeLast function: Thread delayed
          Source: PHHOjspjmp.exe, 00000001.00000002.4475518026.0000000000B78000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll;
          Source: csrss.exe, 00000004.00000002.4475366301.0000000000C00000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeAPI call chain: ExitProcess graph end nodegraph_0-1362
          Source: C:\ProgramData\Drivers\csrss.exeAPI call chain: ExitProcess graph end nodegraph_3-1367
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeProcess information queried: ProcessInformationJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeCode function: 0_2_0040A882 IsDebuggerPresent,0_2_0040A882
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeCode function: 1_2_0069D030 LoadLibraryA,GetProcAddress,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,GetProcAddress,__encode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,__decode_pointer,1_2_0069D030
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeCode function: 0_2_044BF0A3 push dword ptr fs:[00000030h]0_2_044BF0A3
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeCode function: 0_2_06020042 push dword ptr fs:[00000030h]0_2_06020042
          Source: C:\ProgramData\Drivers\csrss.exeCode function: 3_2_04700083 push dword ptr fs:[00000030h]3_2_04700083
          Source: C:\ProgramData\Drivers\csrss.exeCode function: 3_2_061E0042 push dword ptr fs:[00000030h]3_2_061E0042
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeCode function: 0_2_00406914 GetProcessHeap,0_2_00406914
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeCode function: 0_2_0040A80D SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_0040A80D
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeCode function: 1_2_006943E0 _memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,1_2_006943E0
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeCode function: 1_2_00694A78 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,1_2_00694A78
          Source: C:\ProgramData\Drivers\csrss.exeCode function: 3_2_0040A80D SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_0040A80D

          HIPS / PFW / Operating System Protection Evasion

          barindex
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeCode function: 0_2_06020110 VirtualAlloc,GetModuleFileNameA,CreateProcessA,VirtualFree,VirtualAlloc,Wow64GetThreadContext,ReadProcessMemory,NtUnmapViewOfSection,VirtualAllocEx,NtWriteVirtualMemory,NtWriteVirtualMemory,WriteProcessMemory,Wow64SetThreadContext,ResumeThread,ExitProcess,0_2_06020110
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeMemory written: C:\Users\user\Desktop\PHHOjspjmp.exe base: 400000 value starts with: 4D5AJump to behavior
          Source: C:\ProgramData\Drivers\csrss.exeMemory written: C:\ProgramData\Drivers\csrss.exe base: 400000 value starts with: 4D5AJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeProcess created: C:\Users\user\Desktop\PHHOjspjmp.exe "C:\Users\user\Desktop\PHHOjspjmp.exe"Jump to behavior
          Source: C:\ProgramData\Drivers\csrss.exeProcess created: C:\ProgramData\Drivers\csrss.exe "C:\ProgramData\Drivers\csrss.exe" Jump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeQueries volume information: C:\ VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeCode function: 0_2_0040A2D9 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_0040A2D9
          Source: C:\Users\user\Desktop\PHHOjspjmp.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
          Native API
          1
          Registry Run Keys / Startup Folder
          211
          Process Injection
          1
          Masquerading
          OS Credential Dumping1
          System Time Discovery
          Remote Services11
          Archive Collected Data
          12
          Encrypted Channel
          Exfiltration Over Other Network MediumAbuse Accessibility Features
          CredentialsDomainsDefault AccountsScheduled Task/Job1
          DLL Side-Loading
          1
          Registry Run Keys / Startup Folder
          1
          Virtualization/Sandbox Evasion
          LSASS Memory121
          Security Software Discovery
          Remote Desktop ProtocolData from Removable Media1
          Non-Standard Port
          Exfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
          DLL Side-Loading
          211
          Process Injection
          Security Account Manager1
          Virtualization/Sandbox Evasion
          SMB/Windows Admin SharesData from Network Shared Drive1
          Multi-hop Proxy
          Automated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
          Obfuscated Files or Information
          NTDS2
          Process Discovery
          Distributed Component Object ModelInput Capture1
          Application Layer Protocol
          Traffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
          DLL Side-Loading
          LSA Secrets1
          Application Window Discovery
          SSHKeylogging2
          Proxy
          Scheduled TransferData Encrypted for Impact
          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials1
          File and Directory Discovery
          VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
          DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync13
          System Information Discovery
          Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          PHHOjspjmp.exe50%ReversingLabsWin32.Trojan.Generic
          PHHOjspjmp.exe50%VirustotalBrowse
          PHHOjspjmp.exe100%AviraHEUR/AGEN.1312652
          PHHOjspjmp.exe100%Joe Sandbox ML
          SourceDetectionScannerLabelLink
          C:\ProgramData\Drivers\csrss.exe100%AviraHEUR/AGEN.1312652
          C:\ProgramData\Drivers\csrss.exe100%Joe Sandbox ML
          C:\ProgramData\Drivers\csrss.exe50%ReversingLabsWin32.Trojan.Generic
          C:\ProgramData\Drivers\csrss.exe50%VirustotalBrowse
          No Antivirus matches
          No Antivirus matches
          SourceDetectionScannerLabelLink
          https://curl.se/docs/http-cookies.html0%Avira URL Cloudsafe
          https://curl.se/docs/alt-svc.html0%Avira URL Cloudsafe
          https://curl.se/docs/hsts.html0%Avira URL Cloudsafe
          https:///phpMyAdmin//PhpMyAdmin//pma/rootmysqlimapssmtpspop3sscp://your_IP_is_greylisted_README.txt20%Avira URL Cloudsafe
          http://x5outc76j5k4qrzaqdj2m6eq4amkkpndbqyvmvaz6yl4mmfco6oqxsqd.onionT/reg.php?upd.php?/task.php?/re0%Avira URL Cloudsafe
          https://curl.se/docs/alt-svc.html0%VirustotalBrowse
          https://curl.se/docs/hsts.html0%VirustotalBrowse
          https://curl.se/docs/http-cookies.html0%VirustotalBrowse
          No contacted domains info
          NameSourceMaliciousAntivirus DetectionReputation
          https://curl.se/docs/hsts.htmlcsrss.exe, 00000004.00000002.4474695059.0000000000400000.00000040.00000400.00020000.00000000.sdmpfalse
          • 0%, Virustotal, Browse
          • Avira URL Cloud: safe
          unknown
          http://www.openssl.org/support/faq.htmlTYPE=2OpenSSLPHHOjspjmp.exe, 00000001.00000002.4474538963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, csrss.exe, 00000004.00000002.4474695059.0000000000400000.00000040.00000400.00020000.00000000.sdmpfalse
            high
            https://www.torproject.org/PHHOjspjmp.exe, 00000001.00000002.4474538963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, csrss.exe, 00000004.00000002.4474695059.0000000000400000.00000040.00000400.00020000.00000000.sdmpfalse
              high
              https://curl.se/docs/alt-svc.htmlPHHOjspjmp.exe, 00000001.00000002.4474538963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, csrss.exe, 00000004.00000002.4474695059.0000000000400000.00000040.00000400.00020000.00000000.sdmpfalse
              • 0%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              https:///phpMyAdmin//PhpMyAdmin//pma/rootmysqlimapssmtpspop3sscp://your_IP_is_greylisted_README.txt2PHHOjspjmp.exe, 00000001.00000002.4474538963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, csrss.exe, 00000004.00000002.4474695059.0000000000400000.00000040.00000400.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              low
              https://curl.se/docs/http-cookies.htmlPHHOjspjmp.exe, 00000001.00000002.4474538963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, csrss.exe, 00000004.00000002.4474695059.0000000000400000.00000040.00000400.00020000.00000000.sdmpfalse
              • 0%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              http://x5outc76j5k4qrzaqdj2m6eq4amkkpndbqyvmvaz6yl4mmfco6oqxsqd.onionT/reg.php?upd.php?/task.php?/rePHHOjspjmp.exe, 00000001.00000002.4474538963.0000000000824000.00000040.00000400.00020000.00000000.sdmp, csrss.exe, 00000004.00000002.4474695059.0000000000824000.00000040.00000400.00020000.00000000.sdmptrue
              • Avira URL Cloud: safe
              unknown
              https://www.torproject.org/documentation.htmlcsrss.exe, 00000004.00000002.4474695059.0000000000400000.00000040.00000400.00020000.00000000.sdmpfalse
                high
                http://www.openssl.org/support/faq.htmlPHHOjspjmp.exe, 00000001.00000002.4474538963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, csrss.exe, 00000004.00000002.4474695059.0000000000400000.00000040.00000400.00020000.00000000.sdmpfalse
                  high
                  https://trac.torproject.org/projects/tor/ticket/14917.PHHOjspjmp.exe, 00000001.00000002.4474538963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, csrss.exe, 00000004.00000002.4474695059.0000000000400000.00000040.00000400.00020000.00000000.sdmpfalse
                    high
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    171.25.193.9
                    unknownSweden
                    198093DFRI-ASForeningenfordigitalafri-ochrattigheterSEfalse
                    85.10.240.250
                    unknownGermany
                    24940HETZNER-ASDEfalse
                    45.66.33.45
                    unknownNetherlands
                    47482SPECTRENLfalse
                    195.201.94.113
                    unknownGermany
                    24940HETZNER-ASDEfalse
                    8.209.79.125
                    unknownSingapore
                    45102CNNIC-ALIBABA-US-NET-APAlibabaUSTechnologyCoLtdCfalse
                    143.107.229.120
                    unknownBrazil
                    28571UNIVERSIDADEDESAOPAULOBRfalse
                    51.158.147.25
                    unknownFrance
                    12876OnlineSASFRfalse
                    95.216.154.139
                    unknownGermany
                    24940HETZNER-ASDEfalse
                    86.59.21.38
                    unknownAustria
                    8437UTA-ASATfalse
                    93.186.202.32
                    unknownGermany
                    24961MYLOC-ASIPBackboneofmyLocmanagedITAGDEfalse
                    154.35.175.225
                    unknownUnited States
                    14987RETHEMHOSTINGUSfalse
                    128.31.0.39
                    unknownUnited States
                    3MIT-GATEWAYSUSfalse
                    62.78.194.4
                    unknownFinland
                    16086DNAFIfalse
                    51.91.121.255
                    unknownFrance
                    16276OVHFRfalse
                    195.154.106.60
                    unknownFrance
                    12876OnlineSASFRfalse
                    47.56.94.99
                    unknownUnited States
                    45102CNNIC-ALIBABA-US-NET-APAlibabaUSTechnologyCoLtdCfalse
                    185.220.101.205
                    unknownGermany
                    208294ASMKNLfalse
                    204.13.164.118
                    unknownUnited States
                    2570025700USfalse
                    109.70.100.14
                    unknownAustria
                    208323APPLIEDPRIVACY-ASATfalse
                    188.195.109.45
                    unknownGermany
                    31334KABELDEUTSCHLAND-ASDEfalse
                    46.105.227.109
                    unknownFrance
                    16276OVHFRfalse
                    151.197.240.154
                    unknownUnited States
                    701UUNETUSfalse
                    23.129.64.239
                    unknownUnited States
                    396507EMERALD-ONIONUSfalse
                    185.65.205.10
                    unknownTurkey
                    59895CITYNETHOST-ASTRfalse
                    104.149.129.210
                    unknownUnited States
                    40676AS40676USfalse
                    37.187.23.232
                    unknownFrance
                    16276OVHFRfalse
                    167.86.94.107
                    unknownGermany
                    51167CONTABODEfalse
                    217.160.255.217
                    unknownGermany
                    8560ONEANDONE-ASBrauerstrasse48DEfalse
                    149.56.98.216
                    unknownCanada
                    16276OVHFRfalse
                    88.88.79.90
                    unknownNorway
                    2119TELENOR-NEXTELTelenorNorgeASNOfalse
                    198.245.49.18
                    unknownCanada
                    16276OVHFRfalse
                    31.127.34.9
                    unknownUnited Kingdom
                    12576EELtdGBfalse
                    193.218.118.100
                    unknownUkraine
                    207656EPINATURAUAfalse
                    212.8.243.229
                    unknownNetherlands
                    49981WORLDSTREAMNLfalse
                    80.66.135.13
                    unknownBelgium
                    1239SPRINTLINKUSfalse
                    131.188.40.189
                    unknownGermany
                    680DFNVereinzurFoerderungeinesDeutschenForschungsnetzesefalse
                    188.68.53.92
                    unknownGermany
                    197540NETCUP-ASnetcupGmbHDEfalse
                    185.220.101.20
                    unknownGermany
                    208294ASMKNLfalse
                    46.188.6.64
                    unknownRussian Federation
                    8334CO-2COM-ASMoscowRUfalse
                    45.153.160.131
                    unknownCzech Republic
                    55933CLOUDIE-AS-APCloudieLimitedHKfalse
                    134.249.185.176
                    unknownUkraine
                    15895KSNET-ASUAfalse
                    130.225.244.90
                    unknownDenmark
                    1835FSKNET-DKForskningsnettet-DanishnetworkforResearchandfalse
                    199.58.81.140
                    unknownCanada
                    7765KOUMBITCAfalse
                    212.47.227.71
                    unknownFrance
                    12876OnlineSASFRfalse
                    192.0.128.86
                    unknownCanada
                    5645TEKSAVVYCAfalse
                    91.121.160.6
                    unknownFrance
                    16276OVHFRfalse
                    75.176.45.87
                    unknownUnited States
                    11426TWC-11426-CAROLINASUSfalse
                    209.58.180.90
                    unknownSingapore
                    59253LEASEWEB-APAC-SIN-11LeasewebAsiaPacificpteltdSGfalse
                    50.7.8.141
                    unknownUnited States
                    174COGENT-174USfalse
                    51.15.246.170
                    unknownFrance
                    12876OnlineSASFRfalse
                    51.38.65.160
                    unknownFrance
                    16276OVHFRfalse
                    173.249.63.227
                    unknownGermany
                    51167CONTABODEfalse
                    IP
                    127.0.0.1
                    Joe Sandbox version:40.0.0 Tourmaline
                    Analysis ID:1432016
                    Start date and time:2024-04-26 09:40:06 +02:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:0h 9m 22s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Number of analysed new started processes analysed:7
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample name:PHHOjspjmp.exe
                    renamed because original name is a hash value
                    Original Sample Name:46d004a90bfc51d6447a0661f440e7a5.exe
                    Detection:MAL
                    Classification:mal100.troj.evad.winEXE@6/3@0/53
                    EGA Information:
                    • Successful, ratio: 75%
                    HCA Information:Failed
                    Cookbook Comments:
                    • Found application associated with file extension: .exe
                    • Override analysis time to 240000 for current running targets taking high CPU consumption
                    • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
                    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                    • Execution Graph export aborted for target csrss.exe, PID 2792 because there are no executed function
                    • Report size getting too big, too many NtOpenKeyEx calls found.
                    • Report size getting too big, too many NtQueryValueKey calls found.
                    TimeTypeDescription
                    09:40:56AutostartRun: HKLM\Software\Microsoft\Windows\CurrentVersion\Run CSRSS "C:\ProgramData\Drivers\csrss.exe"
                    09:41:31API Interceptor7953494x Sleep call for process: PHHOjspjmp.exe modified
                    09:41:41API Interceptor7228734x Sleep call for process: csrss.exe modified
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    171.25.193.9R53a3ZJHBQ.exeGet hashmaliciousSystemBCBrowse
                    • 171.25.193.9/tor/status-vote/current/consensus
                    x3WX1kHqcx.exeGet hashmaliciousSystemBCBrowse
                    • 171.25.193.9/tor/status-vote/current/consensus
                    oGO7Hy4YCH.exeGet hashmaliciousSystemBCBrowse
                    • 171.25.193.9/tor/status-vote/current/consensus
                    SPXp2YHDFz.exeGet hashmaliciousUnknownBrowse
                    • 171.25.193.9/tor/status-vote/current/consensus
                    ILI1MGzcig.exeGet hashmaliciousUnknownBrowse
                    • 171.25.193.9/tor/status-vote/current/consensus
                    lwRhzjuYIg.exeGet hashmaliciousUnknownBrowse
                    • 171.25.193.9/tor/status-vote/current/consensus
                    OVrJ9mtD6Y.exeGet hashmaliciousTinyNukeBrowse
                    • 171.25.193.9/tor/status-vote/current/consensus
                    F75rJPKdGb.exeGet hashmaliciousKronosBrowse
                    • 171.25.193.9/tor/status-vote/current/consensus
                    ozJy5Zf5cf.exeGet hashmaliciousKronosBrowse
                    • 171.25.193.9/tor/status-vote/current/consensus
                    zfpLjnr5P9.exeGet hashmaliciousKronosBrowse
                    • 171.25.193.9/tor/status-vote/current/consensus
                    85.10.240.250Mcb5K3TOWT.exeGet hashmaliciousUnknownBrowse
                      file.exeGet hashmaliciousGlupteba, SmokeLoader, Socks5Systemz, Stealc, VidarBrowse
                        SaLY22oLht.exeGet hashmaliciousUnknownBrowse
                          file.exeGet hashmaliciousUnknownBrowse
                            45.66.33.45Mcb5K3TOWT.exeGet hashmaliciousUnknownBrowse
                              906o5yr1NE.exeGet hashmaliciousLummaC, Glupteba, LummaC Stealer, SmokeLoader, Stealc, XmrigBrowse
                                KWwpSm0Cec.exeGet hashmaliciousLummaC, Glupteba, LummaC Stealer, Mars Stealer, SmokeLoader, Stealc, VidarBrowse
                                  SKHOtnHl7J.exeGet hashmaliciousLummaC, Glupteba, LummaC Stealer, SmokeLoader, Socks5Systemz, StealcBrowse
                                    1AIemYSAZy.exeGet hashmaliciousGlupteba, LummaC Stealer, SmokeLoader, StealcBrowse
                                      ENEDGCErLu.exeGet hashmaliciousLummaC, Glupteba, LummaC Stealer, SmokeLoader, Stealc, SystemBCBrowse
                                        OShRqF6jNV.exeGet hashmaliciousGlupteba, LummaC Stealer, SmokeLoader, Stealc, SystemBC, XmrigBrowse
                                          MCYq2AqNU0.exeGet hashmaliciousGlupteba, LummaC Stealer, SmokeLoader, Stealc, XmrigBrowse
                                            e6sLDuysz9.exeGet hashmaliciousGlupteba, LummaC Stealer, SmokeLoader, StealcBrowse
                                              ccQGH1mKws.exeGet hashmaliciousGlupteba, SmokeLoader, StealcBrowse
                                                No context
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                HETZNER-ASDEhttps://m7qfa5ng4lp7.blob.core.windows.net/m7qfa5ng4lp7/1.html?4rKpnF7821CfLO43wsacrvmomp962ETPJQJTKIDNZNNV65316UFUY14332V14#14/43-7821/962-65316-14332Get hashmaliciousPhisherBrowse
                                                • 88.198.55.100
                                                https://url.us.m.mimecastprotect.com/s/qkT5Cv2pWyUOjZODty9fnF?domain=google.comGet hashmaliciousUnknownBrowse
                                                • 168.119.146.39
                                                https://colunroad.info/?utm_campaign=y0rsMyowMImIDv9DTSX69oig88PrjKrJ9agQ3DpV-9I1&t=backGet hashmaliciousGRQ ScamBrowse
                                                • 136.243.216.235
                                                http://www.mh3solaroh.com/Get hashmaliciousHTMLPhisherBrowse
                                                • 5.161.181.124
                                                https://starmicronics.com/support/download/starprnt-intelligence-software-setup-exe-file-v3-6-0a/#unlockGet hashmaliciousUnknownBrowse
                                                • 188.40.94.206
                                                16770075581.zipGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                • 148.251.133.229
                                                lzShU2RYJa.exeGet hashmaliciousBabuk, Clipboard Hijacker, Djvu, VidarBrowse
                                                • 95.217.9.149
                                                https://btcpike.topGet hashmaliciousUnknownBrowse
                                                • 213.239.209.209
                                                n8XBpFdVFU.exeGet hashmaliciousBabuk, Djvu, VidarBrowse
                                                • 95.217.9.149
                                                R5391762lf.exeGet hashmaliciousClipboard Hijacker, Djvu, VidarBrowse
                                                • 95.217.9.149
                                                SPECTRENLMcb5K3TOWT.exeGet hashmaliciousUnknownBrowse
                                                • 45.66.33.45
                                                7VzdKNO227.exeGet hashmaliciousUnknownBrowse
                                                • 45.66.35.11
                                                906o5yr1NE.exeGet hashmaliciousLummaC, Glupteba, LummaC Stealer, SmokeLoader, Stealc, XmrigBrowse
                                                • 45.66.33.45
                                                KWwpSm0Cec.exeGet hashmaliciousLummaC, Glupteba, LummaC Stealer, Mars Stealer, SmokeLoader, Stealc, VidarBrowse
                                                • 45.66.33.45
                                                SKHOtnHl7J.exeGet hashmaliciousLummaC, Glupteba, LummaC Stealer, SmokeLoader, Socks5Systemz, StealcBrowse
                                                • 45.66.33.45
                                                1AIemYSAZy.exeGet hashmaliciousGlupteba, LummaC Stealer, SmokeLoader, StealcBrowse
                                                • 45.66.33.45
                                                ENEDGCErLu.exeGet hashmaliciousLummaC, Glupteba, LummaC Stealer, SmokeLoader, Stealc, SystemBCBrowse
                                                • 45.66.33.45
                                                OShRqF6jNV.exeGet hashmaliciousGlupteba, LummaC Stealer, SmokeLoader, Stealc, SystemBC, XmrigBrowse
                                                • 45.66.33.45
                                                MCYq2AqNU0.exeGet hashmaliciousGlupteba, LummaC Stealer, SmokeLoader, Stealc, XmrigBrowse
                                                • 45.66.33.45
                                                e6sLDuysz9.exeGet hashmaliciousGlupteba, LummaC Stealer, SmokeLoader, StealcBrowse
                                                • 45.66.33.45
                                                DFRI-ASForeningenfordigitalafri-ochrattigheterSE77system.vbsGet hashmaliciousXmrigBrowse
                                                • 171.25.193.20
                                                Mcb5K3TOWT.exeGet hashmaliciousUnknownBrowse
                                                • 171.25.193.9
                                                7VzdKNO227.exeGet hashmaliciousUnknownBrowse
                                                • 171.25.193.9
                                                LIRR4A0xzv.exeGet hashmaliciousAmadey, Glupteba, LummaC Stealer, Mars Stealer, SmokeLoader, Socks5Systemz, StealcBrowse
                                                • 171.25.193.9
                                                m5EyzJ7S8S.exeGet hashmaliciousAmadey, Glupteba, LummaC Stealer, Mars Stealer, SmokeLoader, Stealc, VidarBrowse
                                                • 171.25.193.9
                                                906o5yr1NE.exeGet hashmaliciousLummaC, Glupteba, LummaC Stealer, SmokeLoader, Stealc, XmrigBrowse
                                                • 171.25.193.9
                                                PjgTyZiVh0.exeGet hashmaliciousLummaC, Glupteba, LummaC Stealer, SmokeLoader, Socks5Systemz, Stealc, XmrigBrowse
                                                • 171.25.193.9
                                                xZnG1FFx7L.exeGet hashmaliciousLummaC, Glupteba, LummaC Stealer, Mars Stealer, SmokeLoader, Socks5Systemz, StealcBrowse
                                                • 171.25.193.9
                                                KWwpSm0Cec.exeGet hashmaliciousLummaC, Glupteba, LummaC Stealer, Mars Stealer, SmokeLoader, Stealc, VidarBrowse
                                                • 171.25.193.9
                                                y9o3Fy6gL2.exeGet hashmaliciousGlupteba, LummaC Stealer, SmokeLoader, StealcBrowse
                                                • 171.25.193.9
                                                HETZNER-ASDEhttps://m7qfa5ng4lp7.blob.core.windows.net/m7qfa5ng4lp7/1.html?4rKpnF7821CfLO43wsacrvmomp962ETPJQJTKIDNZNNV65316UFUY14332V14#14/43-7821/962-65316-14332Get hashmaliciousPhisherBrowse
                                                • 88.198.55.100
                                                https://url.us.m.mimecastprotect.com/s/qkT5Cv2pWyUOjZODty9fnF?domain=google.comGet hashmaliciousUnknownBrowse
                                                • 168.119.146.39
                                                https://colunroad.info/?utm_campaign=y0rsMyowMImIDv9DTSX69oig88PrjKrJ9agQ3DpV-9I1&t=backGet hashmaliciousGRQ ScamBrowse
                                                • 136.243.216.235
                                                http://www.mh3solaroh.com/Get hashmaliciousHTMLPhisherBrowse
                                                • 5.161.181.124
                                                https://starmicronics.com/support/download/starprnt-intelligence-software-setup-exe-file-v3-6-0a/#unlockGet hashmaliciousUnknownBrowse
                                                • 188.40.94.206
                                                16770075581.zipGet hashmaliciousAgentTesla, PureLog StealerBrowse
                                                • 148.251.133.229
                                                lzShU2RYJa.exeGet hashmaliciousBabuk, Clipboard Hijacker, Djvu, VidarBrowse
                                                • 95.217.9.149
                                                https://btcpike.topGet hashmaliciousUnknownBrowse
                                                • 213.239.209.209
                                                n8XBpFdVFU.exeGet hashmaliciousBabuk, Djvu, VidarBrowse
                                                • 95.217.9.149
                                                R5391762lf.exeGet hashmaliciousClipboard Hijacker, Djvu, VidarBrowse
                                                • 95.217.9.149
                                                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                83d60721ecc423892660e275acc4dffdMcb5K3TOWT.exeGet hashmaliciousUnknownBrowse
                                                • 85.10.240.250
                                                • 185.65.205.10
                                                • 51.15.246.170
                                                • 130.225.244.90
                                                • 204.13.164.118
                                                • 199.58.81.140
                                                • 195.201.94.113
                                                • 131.188.40.189
                                                • 209.58.180.90
                                                • 51.158.147.25
                                                • 195.154.106.60
                                                7VzdKNO227.exeGet hashmaliciousUnknownBrowse
                                                • 85.10.240.250
                                                • 185.65.205.10
                                                • 51.15.246.170
                                                • 130.225.244.90
                                                • 204.13.164.118
                                                • 199.58.81.140
                                                • 195.201.94.113
                                                • 131.188.40.189
                                                • 209.58.180.90
                                                • 51.158.147.25
                                                • 195.154.106.60
                                                fonts-utilGet hashmaliciousUnknownBrowse
                                                • 85.10.240.250
                                                • 185.65.205.10
                                                • 51.15.246.170
                                                • 130.225.244.90
                                                • 204.13.164.118
                                                • 199.58.81.140
                                                • 195.201.94.113
                                                • 131.188.40.189
                                                • 209.58.180.90
                                                • 51.158.147.25
                                                • 195.154.106.60
                                                cups-utils-helperGet hashmaliciousUnknownBrowse
                                                • 85.10.240.250
                                                • 185.65.205.10
                                                • 51.15.246.170
                                                • 130.225.244.90
                                                • 204.13.164.118
                                                • 199.58.81.140
                                                • 195.201.94.113
                                                • 131.188.40.189
                                                • 209.58.180.90
                                                • 51.158.147.25
                                                • 195.154.106.60
                                                LIRR4A0xzv.exeGet hashmaliciousAmadey, Glupteba, LummaC Stealer, Mars Stealer, SmokeLoader, Socks5Systemz, StealcBrowse
                                                • 85.10.240.250
                                                • 185.65.205.10
                                                • 51.15.246.170
                                                • 130.225.244.90
                                                • 204.13.164.118
                                                • 199.58.81.140
                                                • 195.201.94.113
                                                • 131.188.40.189
                                                • 209.58.180.90
                                                • 51.158.147.25
                                                • 195.154.106.60
                                                SecuriteInfo.com.Win32.RansomX-gen.4067.126.exeGet hashmaliciousLummaC, Amadey, Glupteba, LummaC Stealer, Mars Stealer, RedLine, SmokeLoaderBrowse
                                                • 85.10.240.250
                                                • 185.65.205.10
                                                • 51.15.246.170
                                                • 130.225.244.90
                                                • 204.13.164.118
                                                • 199.58.81.140
                                                • 195.201.94.113
                                                • 131.188.40.189
                                                • 209.58.180.90
                                                • 51.158.147.25
                                                • 195.154.106.60
                                                m5EyzJ7S8S.exeGet hashmaliciousAmadey, Glupteba, LummaC Stealer, Mars Stealer, SmokeLoader, Stealc, VidarBrowse
                                                • 85.10.240.250
                                                • 185.65.205.10
                                                • 51.15.246.170
                                                • 130.225.244.90
                                                • 204.13.164.118
                                                • 199.58.81.140
                                                • 195.201.94.113
                                                • 131.188.40.189
                                                • 209.58.180.90
                                                • 51.158.147.25
                                                • 195.154.106.60
                                                7vMi37TpMO.exeGet hashmaliciousLummaC, Glupteba, LummaC Stealer, Mars Stealer, SmokeLoader, Socks5Systemz, StealcBrowse
                                                • 85.10.240.250
                                                • 185.65.205.10
                                                • 51.15.246.170
                                                • 130.225.244.90
                                                • 204.13.164.118
                                                • 199.58.81.140
                                                • 195.201.94.113
                                                • 131.188.40.189
                                                • 209.58.180.90
                                                • 51.158.147.25
                                                • 195.154.106.60
                                                906o5yr1NE.exeGet hashmaliciousLummaC, Glupteba, LummaC Stealer, SmokeLoader, Stealc, XmrigBrowse
                                                • 85.10.240.250
                                                • 185.65.205.10
                                                • 51.15.246.170
                                                • 130.225.244.90
                                                • 204.13.164.118
                                                • 199.58.81.140
                                                • 195.201.94.113
                                                • 131.188.40.189
                                                • 209.58.180.90
                                                • 51.158.147.25
                                                • 195.154.106.60
                                                lxGAurRKvR.exeGet hashmaliciousGlupteba, LummaC Stealer, SmokeLoader, Stealc, XmrigBrowse
                                                • 85.10.240.250
                                                • 185.65.205.10
                                                • 51.15.246.170
                                                • 130.225.244.90
                                                • 204.13.164.118
                                                • 199.58.81.140
                                                • 195.201.94.113
                                                • 131.188.40.189
                                                • 209.58.180.90
                                                • 51.158.147.25
                                                • 195.154.106.60
                                                No context
                                                Process:C:\Users\user\Desktop\PHHOjspjmp.exe
                                                File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                Category:dropped
                                                Size (bytes):1984000
                                                Entropy (8bit):7.929315097580162
                                                Encrypted:false
                                                SSDEEP:49152:nLxAcJhTYQsED8CC4C7xgFXlS/Gd5cRGrbnnSr:n1A89sIrC7xqSOd1Pn
                                                MD5:46D004A90BFC51D6447A0661F440E7A5
                                                SHA1:FE33BB099EC660D4CC2607A34BCF55C92C5DC0F8
                                                SHA-256:A50139923127672A8083B6D24B45E102E358AA0FCB8B558A85386CF9892605AA
                                                SHA-512:D3D98C10323BB70867899D710333D06A0B47FC289D13E755FEA5C411E11AF236D066F8F44635F8D38BD71CE9173A56C9D3FC5E9FC5A624D2D3835119C962D355
                                                Malicious:true
                                                Antivirus:
                                                • Antivirus: Avira, Detection: 100%
                                                • Antivirus: Joe Sandbox ML, Detection: 100%
                                                • Antivirus: ReversingLabs, Detection: 50%
                                                • Antivirus: Virustotal, Detection: 50%, Browse
                                                Reputation:low
                                                Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...................q.....N.......O......=.........X/K.....u...X/p...Rich..................PE..L...n/.d............................WD....... ....@..........................`.......r......................................T...(....`.......................@..|....!..8...........................py..@............ ..|............................text...5........................... ..`.rdata...l... ...n..................@..@.data................t..............@....rsrc........`.......\..............@..@.reloc..|....@.......2..............@..B................................................................................................................................................................................................................................................................................................................................
                                                Process:C:\Users\user\Desktop\PHHOjspjmp.exe
                                                File Type:ASCII text, with CRLF line terminators
                                                Category:dropped
                                                Size (bytes):209
                                                Entropy (8bit):4.751493858603209
                                                Encrypted:false
                                                SSDEEP:6:SbdWwxXrMdznXr87+QVe2vwR/Ep5fM8VFYQz:bwxXAdzXr87HVBvwNCdJz
                                                MD5:DBFFD796E5DECCE9AFF4EF0376EB6DEF
                                                SHA1:FCF1870EEBA15B82D512DF94DB94803DF0A5E449
                                                SHA-256:6C8D917EA7563003A742C8D654D57DEB9408426A131B16FADCDFF33DF5D8F57E
                                                SHA-512:7DBA51EB1DB344F780A1BBB85C7C7EE46101D5A46A0BE57F7B4E23778C28E68930EFA37FA99868FCBA1FF1CED456B57D695B3BE292C9B696DA89D1D335C9C2F4
                                                Malicious:false
                                                Reputation:low
                                                Preview:# Tor state file last generated on 2024-04-26 09:40:55 local time..# Other times below are in UTC..# You *do not* need to edit this file.....Dormant 0..LastWritten 2024-04-26 07:40:55..TorVersion Tor 0.4.4.9..
                                                Process:C:\Users\user\Desktop\PHHOjspjmp.exe
                                                File Type:ASCII text, with CRLF line terminators
                                                Category:modified
                                                Size (bytes):209
                                                Entropy (8bit):4.751493858603209
                                                Encrypted:false
                                                SSDEEP:6:SbdWwxXrMdznXr87+QVe2vwR/Ep5fM8VFYQz:bwxXAdzXr87HVBvwNCdJz
                                                MD5:DBFFD796E5DECCE9AFF4EF0376EB6DEF
                                                SHA1:FCF1870EEBA15B82D512DF94DB94803DF0A5E449
                                                SHA-256:6C8D917EA7563003A742C8D654D57DEB9408426A131B16FADCDFF33DF5D8F57E
                                                SHA-512:7DBA51EB1DB344F780A1BBB85C7C7EE46101D5A46A0BE57F7B4E23778C28E68930EFA37FA99868FCBA1FF1CED456B57D695B3BE292C9B696DA89D1D335C9C2F4
                                                Malicious:false
                                                Reputation:low
                                                Preview:# Tor state file last generated on 2024-04-26 09:40:55 local time..# Other times below are in UTC..# You *do not* need to edit this file.....Dormant 0..LastWritten 2024-04-26 07:40:55..TorVersion Tor 0.4.4.9..
                                                File type:PE32 executable (GUI) Intel 80386, for MS Windows
                                                Entropy (8bit):7.929315097580162
                                                TrID:
                                                • Win32 Executable (generic) a (10002005/4) 99.96%
                                                • Generic Win/DOS Executable (2004/3) 0.02%
                                                • DOS Executable Generic (2002/1) 0.02%
                                                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                File name:PHHOjspjmp.exe
                                                File size:1'984'000 bytes
                                                MD5:46d004a90bfc51d6447a0661f440e7a5
                                                SHA1:fe33bb099ec660d4cc2607a34bcf55c92c5dc0f8
                                                SHA256:a50139923127672a8083b6d24b45e102e358aa0fcb8b558a85386cf9892605aa
                                                SHA512:d3d98c10323bb70867899d710333d06a0b47fc289d13e755fea5c411e11af236d066f8f44635f8d38bd71ce9173a56c9d3fc5e9fc5a624d2d3835119c962d355
                                                SSDEEP:49152:nLxAcJhTYQsED8CC4C7xgFXlS/Gd5cRGrbnnSr:n1A89sIrC7xqSOd1Pn
                                                TLSH:04953302FEE6D0A0E1A7577A18907F21463DFD619E21B66B638C3F6D6D74A409312733
                                                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.........................q.......N.......O.......=.............X/K.......u.....X/p.....Rich....................PE..L...n/.d...........
                                                Icon Hash:411145554545410d
                                                Entrypoint:0x404457
                                                Entrypoint Section:.text
                                                Digitally signed:false
                                                Imagebase:0x400000
                                                Subsystem:windows gui
                                                Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                DLL Characteristics:TERMINAL_SERVER_AWARE
                                                Time Stamp:0x64C72F6E [Mon Jul 31 03:50:06 2023 UTC]
                                                TLS Callbacks:
                                                CLR (.Net) Version:
                                                OS Version Major:5
                                                OS Version Minor:1
                                                File Version Major:5
                                                File Version Minor:1
                                                Subsystem Version Major:5
                                                Subsystem Version Minor:1
                                                Import Hash:35d2f187a446fa7dcfd6bfdfd63133ca
                                                Instruction
                                                call 00007FBD9CD763D2h
                                                jmp 00007FBD9CD70555h
                                                push 00000014h
                                                push 00418048h
                                                call 00007FBD9CD737C8h
                                                call 00007FBD9CD765A3h
                                                movzx esi, ax
                                                push 00000002h
                                                call 00007FBD9CD76365h
                                                pop ecx
                                                mov eax, 00005A4Dh
                                                cmp word ptr [00400000h], ax
                                                je 00007FBD9CD70556h
                                                xor ebx, ebx
                                                jmp 00007FBD9CD70585h
                                                mov eax, dword ptr [0040003Ch]
                                                cmp dword ptr [eax+00400000h], 00004550h
                                                jne 00007FBD9CD7053Dh
                                                mov ecx, 0000010Bh
                                                cmp word ptr [eax+00400018h], cx
                                                jne 00007FBD9CD7052Fh
                                                xor ebx, ebx
                                                cmp dword ptr [eax+00400074h], 0Eh
                                                jbe 00007FBD9CD7055Bh
                                                cmp dword ptr [eax+004000E8h], ebx
                                                setne bl
                                                mov dword ptr [ebp-1Ch], ebx
                                                call 00007FBD9CD7299Fh
                                                test eax, eax
                                                jne 00007FBD9CD7055Ah
                                                push 0000001Ch
                                                call 00007FBD9CD70631h
                                                pop ecx
                                                call 00007FBD9CD71F52h
                                                test eax, eax
                                                jne 00007FBD9CD7055Ah
                                                push 00000010h
                                                call 00007FBD9CD70620h
                                                pop ecx
                                                call 00007FBD9CD763DEh
                                                and dword ptr [ebp-04h], 00000000h
                                                call 00007FBD9CD74781h
                                                test eax, eax
                                                jns 00007FBD9CD7055Ah
                                                push 0000001Bh
                                                call 00007FBD9CD70606h
                                                pop ecx
                                                call dword ptr [004120B0h]
                                                mov dword ptr [041C52A4h], eax
                                                call 00007FBD9CD763F9h
                                                mov dword ptr [005D780Ch], eax
                                                call 00007FBD9CD75FB6h
                                                test eax, eax
                                                jns 00007FBD9CD7055Ah
                                                Programming Language:
                                                • [ASM] VS2013 build 21005
                                                • [ C ] VS2013 build 21005
                                                • [C++] VS2013 build 21005
                                                • [IMP] VS2008 SP1 build 30729
                                                • [RES] VS2013 build 21005
                                                • [LNK] VS2013 UPD5 build 40629
                                                NameVirtual AddressVirtual Size Is in Section
                                                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IMPORT0x184540x28.rdata
                                                IMAGE_DIRECTORY_ENTRY_RESOURCE0x3dc60000xd5f8.rsrc
                                                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                IMAGE_DIRECTORY_ENTRY_BASERELOC0x3dd40000x137c.reloc
                                                IMAGE_DIRECTORY_ENTRY_DEBUG0x121f00x38.rdata
                                                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x179700x40.rdata
                                                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_IAT0x120000x17c.rdata
                                                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                .text0x10000x100350x10200dffe2d8fb38e0d1593fe6fc268529a8aFalse0.6009114583333334data6.6896002971759545IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                .rdata0x120000x6ce40x6e005a414d0b57c53fcf7a644ec6d167da94False0.39147727272727273data4.729783722836041IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                .data0x190000x3dac2a80x1be800c05b89c9fa7c65518e2e5e63f9ebdc90unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                                .rsrc0x3dc60000xd5f80xd600b6f07f7386462f0049219f160416f5aeFalse0.5152234228971962data5.491653671420701IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                .reloc0x3dd40000x137c0x1400a2aace44608a5bb5aa85da63c5cc59deFalse0.74765625data6.462085016602893IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                NameRVASizeTypeLanguageCountryZLIB Complexity
                                                AFX_DIALOG_LAYOUT0x3dd2e380xedata1.5714285714285714
                                                RT_ICON0x3dc64a00xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0RomanianRomania0.5671641791044776
                                                RT_ICON0x3dc73480x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0RomanianRomania0.5496389891696751
                                                RT_ICON0x3dc7bf00x568Device independent bitmap graphic, 16 x 32 x 8, image size 0RomanianRomania0.6170520231213873
                                                RT_ICON0x3dc81580x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0RomanianRomania0.4631742738589212
                                                RT_ICON0x3dca7000x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0RomanianRomania0.4873358348968105
                                                RT_ICON0x3dcb7a80x988Device independent bitmap graphic, 24 x 48 x 32, image size 0RomanianRomania0.49631147540983606
                                                RT_ICON0x3dcc1300x468Device independent bitmap graphic, 16 x 32 x 32, image size 0RomanianRomania0.4530141843971631
                                                RT_ICON0x3dcc6000xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0RomanianRomania0.4240405117270789
                                                RT_ICON0x3dcd4a80x8a8Device independent bitmap graphic, 32 x 64 x 8, image size 0RomanianRomania0.4833032490974729
                                                RT_ICON0x3dcdd500x6c8Device independent bitmap graphic, 24 x 48 x 8, image size 0RomanianRomania0.5835253456221198
                                                RT_ICON0x3dce4180x568Device independent bitmap graphic, 16 x 32 x 8, image size 0RomanianRomania0.4913294797687861
                                                RT_ICON0x3dce9800x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0RomanianRomania0.4701244813278008
                                                RT_ICON0x3dd0f280x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0RomanianRomania0.4878048780487805
                                                RT_ICON0x3dd1fd00x988Device independent bitmap graphic, 24 x 48 x 32, image size 0RomanianRomania0.5032786885245901
                                                RT_ICON0x3dd29580x468Device independent bitmap graphic, 16 x 32 x 32, image size 0RomanianRomania0.5514184397163121
                                                RT_STRING0x3dd30880x2bcdataRomanianRomania0.49142857142857144
                                                RT_STRING0x3dd33480x2acdataRomanianRomania0.48830409356725146
                                                RT_GROUP_ICON0x3dcc5980x68dataRomanianRomania0.6923076923076923
                                                RT_GROUP_ICON0x3dd2dc00x76dataRomanianRomania0.6779661016949152
                                                RT_VERSION0x3dd2e480x23cdata0.5314685314685315
                                                DLLImport
                                                KERNEL32.dllGlobalMemoryStatus, GetLocaleInfoA, FindResourceExW, LocalCompact, InterlockedDecrement, GetComputerNameW, CreateHardLinkA, GetSystemDefaultLCID, BackupSeek, GetTickCount, GetConsoleAliasesA, GetWindowsDirectoryA, EnumTimeFormatsW, GetUserDefaultLangID, SetCommState, GlobalAlloc, LoadLibraryW, ReadConsoleInputA, WriteConsoleW, GetModuleFileNameW, MultiByteToWideChar, GetLastError, ChangeTimerQueueTimer, SetLastError, GetThreadLocale, GetProcAddress, RemoveDirectoryA, SetFileAttributesA, BuildCommDCBW, LoadLibraryA, SetCalendarInfoW, GetExitCodeThread, AddAtomW, GlobalFindAtomW, GetOEMCP, LoadLibraryExA, VirtualProtect, GetConsoleProcessList, GetTempPathA, GetVolumeInformationW, HeapAlloc, EncodePointer, DecodePointer, IsProcessorFeaturePresent, GetCommandLineA, RaiseException, RtlUnwind, IsDebuggerPresent, IsValidCodePage, GetACP, GetCPInfo, GetCurrentThreadId, HeapFree, ExitProcess, GetModuleHandleExW, WideCharToMultiByte, GetStdHandle, WriteFile, GetProcessHeap, EnterCriticalSection, LeaveCriticalSection, FlushFileBuffers, GetConsoleCP, GetConsoleMode, DeleteCriticalSection, HeapSize, GetFileType, GetStartupInfoW, CloseHandle, GetModuleFileNameA, QueryPerformanceCounter, GetCurrentProcessId, GetSystemTimeAsFileTime, GetEnvironmentStringsW, FreeEnvironmentStringsW, UnhandledExceptionFilter, SetUnhandledExceptionFilter, InitializeCriticalSectionAndSpinCount, Sleep, GetCurrentProcess, TerminateProcess, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetModuleHandleW, GetStringTypeW, LoadLibraryExW, OutputDebugStringW, LCMapStringW, SetStdHandle, SetFilePointerEx, HeapReAlloc, CreateFileW
                                                Language of compilation systemCountry where language is spokenMap
                                                RomanianRomania
                                                TimestampSource PortDest PortSource IPDest IP
                                                Apr 26, 2024 09:40:58.116678953 CEST49706443192.168.2.546.105.227.109
                                                Apr 26, 2024 09:40:58.116717100 CEST4434970646.105.227.109192.168.2.5
                                                Apr 26, 2024 09:40:58.116802931 CEST49706443192.168.2.546.105.227.109
                                                Apr 26, 2024 09:40:58.121822119 CEST49706443192.168.2.546.105.227.109
                                                Apr 26, 2024 09:40:58.121850014 CEST4434970646.105.227.109192.168.2.5
                                                Apr 26, 2024 09:40:58.956267118 CEST497079001192.168.2.531.127.34.9
                                                Apr 26, 2024 09:40:59.971399069 CEST497079001192.168.2.531.127.34.9
                                                Apr 26, 2024 09:41:00.956336975 CEST497089001192.168.2.575.176.45.87
                                                Apr 26, 2024 09:41:01.971421003 CEST497089001192.168.2.575.176.45.87
                                                Apr 26, 2024 09:41:01.971555948 CEST497079001192.168.2.531.127.34.9
                                                Apr 26, 2024 09:41:03.971407890 CEST497089001192.168.2.575.176.45.87
                                                Apr 26, 2024 09:41:05.971374035 CEST497079001192.168.2.531.127.34.9
                                                Apr 26, 2024 09:41:07.971452951 CEST497089001192.168.2.575.176.45.87
                                                Apr 26, 2024 09:41:13.971407890 CEST497079001192.168.2.531.127.34.9
                                                Apr 26, 2024 09:41:15.971388102 CEST497089001192.168.2.575.176.45.87
                                                Apr 26, 2024 09:41:19.972317934 CEST49719443192.168.2.551.15.246.170
                                                Apr 26, 2024 09:41:19.972397089 CEST49720443192.168.2.5204.13.164.118
                                                Apr 26, 2024 09:41:19.972410917 CEST4434971951.15.246.170192.168.2.5
                                                Apr 26, 2024 09:41:19.972435951 CEST44349720204.13.164.118192.168.2.5
                                                Apr 26, 2024 09:41:19.972543955 CEST49719443192.168.2.551.15.246.170
                                                Apr 26, 2024 09:41:19.972744942 CEST49720443192.168.2.5204.13.164.118
                                                Apr 26, 2024 09:41:19.972754002 CEST49719443192.168.2.551.15.246.170
                                                Apr 26, 2024 09:41:19.972793102 CEST4434971951.15.246.170192.168.2.5
                                                Apr 26, 2024 09:41:19.972863913 CEST49720443192.168.2.5204.13.164.118
                                                Apr 26, 2024 09:41:19.972872019 CEST44349720204.13.164.118192.168.2.5
                                                Apr 26, 2024 09:41:20.611978054 CEST44349720204.13.164.118192.168.2.5
                                                Apr 26, 2024 09:41:20.612072945 CEST49720443192.168.2.5204.13.164.118
                                                Apr 26, 2024 09:41:20.615999937 CEST49720443192.168.2.5204.13.164.118
                                                Apr 26, 2024 09:41:20.616008043 CEST44349720204.13.164.118192.168.2.5
                                                Apr 26, 2024 09:41:20.616447926 CEST44349720204.13.164.118192.168.2.5
                                                Apr 26, 2024 09:41:20.620009899 CEST49720443192.168.2.5204.13.164.118
                                                Apr 26, 2024 09:41:20.664119959 CEST44349720204.13.164.118192.168.2.5
                                                Apr 26, 2024 09:41:21.035801888 CEST4434971951.15.246.170192.168.2.5
                                                Apr 26, 2024 09:41:21.035986900 CEST49719443192.168.2.551.15.246.170
                                                Apr 26, 2024 09:41:21.039870024 CEST49719443192.168.2.551.15.246.170
                                                Apr 26, 2024 09:41:21.039901018 CEST4434971951.15.246.170192.168.2.5
                                                Apr 26, 2024 09:41:21.040144920 CEST4434971951.15.246.170192.168.2.5
                                                Apr 26, 2024 09:41:21.040462017 CEST49719443192.168.2.551.15.246.170
                                                Apr 26, 2024 09:41:21.088124990 CEST4434971951.15.246.170192.168.2.5
                                                Apr 26, 2024 09:42:10.206613064 CEST497229001192.168.2.551.91.121.255
                                                Apr 26, 2024 09:42:11.221463919 CEST497229001192.168.2.551.91.121.255
                                                Apr 26, 2024 09:42:13.128273010 CEST49723443192.168.2.5198.245.49.18
                                                Apr 26, 2024 09:42:13.128371954 CEST44349723198.245.49.18192.168.2.5
                                                Apr 26, 2024 09:42:13.128446102 CEST49723443192.168.2.5198.245.49.18
                                                Apr 26, 2024 09:42:13.128524065 CEST49724443192.168.2.5154.35.175.225
                                                Apr 26, 2024 09:42:13.128554106 CEST44349724154.35.175.225192.168.2.5
                                                Apr 26, 2024 09:42:13.128597975 CEST49724443192.168.2.5154.35.175.225
                                                Apr 26, 2024 09:42:13.128750086 CEST49723443192.168.2.5198.245.49.18
                                                Apr 26, 2024 09:42:13.128768921 CEST44349723198.245.49.18192.168.2.5
                                                Apr 26, 2024 09:42:13.128933907 CEST49724443192.168.2.5154.35.175.225
                                                Apr 26, 2024 09:42:13.128940105 CEST44349724154.35.175.225192.168.2.5
                                                Apr 26, 2024 09:42:13.221426964 CEST497229001192.168.2.551.91.121.255
                                                Apr 26, 2024 09:42:17.221338034 CEST497229001192.168.2.551.91.121.255
                                                Apr 26, 2024 09:42:24.064701080 CEST49724443192.168.2.5154.35.175.225
                                                Apr 26, 2024 09:42:24.064785957 CEST49723443192.168.2.5198.245.49.18
                                                Apr 26, 2024 09:42:24.064918041 CEST49719443192.168.2.551.15.246.170
                                                Apr 26, 2024 09:42:24.064990997 CEST49720443192.168.2.5204.13.164.118
                                                Apr 26, 2024 09:42:24.065062046 CEST4434971951.15.246.170192.168.2.5
                                                Apr 26, 2024 09:42:24.065120935 CEST49719443192.168.2.551.15.246.170
                                                Apr 26, 2024 09:42:24.065190077 CEST44349720204.13.164.118192.168.2.5
                                                Apr 26, 2024 09:42:24.065257072 CEST49720443192.168.2.5204.13.164.118
                                                Apr 26, 2024 09:42:24.065289974 CEST49706443192.168.2.546.105.227.109
                                                Apr 26, 2024 09:42:24.082918882 CEST497269001192.168.2.595.216.154.139
                                                Apr 26, 2024 09:42:24.083142042 CEST4972780192.168.2.5171.25.193.9
                                                Apr 26, 2024 09:42:24.096352100 CEST49728443192.168.2.5195.201.94.113
                                                Apr 26, 2024 09:42:24.096385002 CEST44349728195.201.94.113192.168.2.5
                                                Apr 26, 2024 09:42:24.096435070 CEST49728443192.168.2.5195.201.94.113
                                                Apr 26, 2024 09:42:24.096654892 CEST49728443192.168.2.5195.201.94.113
                                                Apr 26, 2024 09:42:24.096669912 CEST44349728195.201.94.113192.168.2.5
                                                Apr 26, 2024 09:42:24.108119011 CEST44349723198.245.49.18192.168.2.5
                                                Apr 26, 2024 09:42:24.108124971 CEST44349724154.35.175.225192.168.2.5
                                                Apr 26, 2024 09:42:24.108149052 CEST4434970646.105.227.109192.168.2.5
                                                Apr 26, 2024 09:42:24.339060068 CEST8049727171.25.193.9192.168.2.5
                                                Apr 26, 2024 09:42:24.340010881 CEST4972780192.168.2.5171.25.193.9
                                                Apr 26, 2024 09:42:24.340612888 CEST4972780192.168.2.5171.25.193.9
                                                Apr 26, 2024 09:42:24.341690063 CEST49728443192.168.2.5195.201.94.113
                                                Apr 26, 2024 09:42:24.342390060 CEST497299101192.168.2.5128.31.0.39
                                                Apr 26, 2024 09:42:24.342879057 CEST49730443192.168.2.523.129.64.239
                                                Apr 26, 2024 09:42:24.342926979 CEST4434973023.129.64.239192.168.2.5
                                                Apr 26, 2024 09:42:24.343086004 CEST49730443192.168.2.523.129.64.239
                                                Apr 26, 2024 09:42:24.343794107 CEST49730443192.168.2.523.129.64.239
                                                Apr 26, 2024 09:42:24.343821049 CEST4434973023.129.64.239192.168.2.5
                                                Apr 26, 2024 09:42:24.344485998 CEST4973110020192.168.2.5185.220.101.20
                                                Apr 26, 2024 09:42:24.347357035 CEST90014972695.216.154.139192.168.2.5
                                                Apr 26, 2024 09:42:24.388113976 CEST44349728195.201.94.113192.168.2.5
                                                Apr 26, 2024 09:42:24.506947994 CEST910149729128.31.0.39192.168.2.5
                                                Apr 26, 2024 09:42:24.589322090 CEST1002049731185.220.101.20192.168.2.5
                                                Apr 26, 2024 09:42:24.598270893 CEST8049727171.25.193.9192.168.2.5
                                                Apr 26, 2024 09:42:24.602351904 CEST4972780192.168.2.5171.25.193.9
                                                Apr 26, 2024 09:42:24.617652893 CEST49730443192.168.2.523.129.64.239
                                                Apr 26, 2024 09:42:24.617892027 CEST4972780192.168.2.5171.25.193.9
                                                Apr 26, 2024 09:42:24.637928009 CEST4434973023.129.64.239192.168.2.5
                                                Apr 26, 2024 09:42:24.649780989 CEST497329001192.168.2.5193.218.118.100
                                                Apr 26, 2024 09:42:24.650038958 CEST49733443192.168.2.545.66.33.45
                                                Apr 26, 2024 09:42:24.650078058 CEST4434973345.66.33.45192.168.2.5
                                                Apr 26, 2024 09:42:24.650160074 CEST49733443192.168.2.545.66.33.45
                                                Apr 26, 2024 09:42:24.658953905 CEST49733443192.168.2.545.66.33.45
                                                Apr 26, 2024 09:42:24.658982992 CEST4434973345.66.33.45192.168.2.5
                                                Apr 26, 2024 09:42:24.847742081 CEST44349728195.201.94.113192.168.2.5
                                                Apr 26, 2024 09:42:24.847817898 CEST49728443192.168.2.5195.201.94.113
                                                Apr 26, 2024 09:42:24.847817898 CEST49728443192.168.2.5195.201.94.113
                                                Apr 26, 2024 09:42:24.858779907 CEST8049727171.25.193.9192.168.2.5
                                                Apr 26, 2024 09:42:24.859889030 CEST4972780192.168.2.5171.25.193.9
                                                Apr 26, 2024 09:42:24.862214088 CEST49733443192.168.2.545.66.33.45
                                                Apr 26, 2024 09:42:24.873933077 CEST8049727171.25.193.9192.168.2.5
                                                Apr 26, 2024 09:42:24.873969078 CEST8049727171.25.193.9192.168.2.5
                                                Apr 26, 2024 09:42:24.873985052 CEST4972780192.168.2.5171.25.193.9
                                                Apr 26, 2024 09:42:24.874021053 CEST4972780192.168.2.5171.25.193.9
                                                Apr 26, 2024 09:42:24.874927998 CEST49734443192.168.2.5217.160.255.217
                                                Apr 26, 2024 09:42:24.875003099 CEST44349734217.160.255.217192.168.2.5
                                                Apr 26, 2024 09:42:24.875093937 CEST49734443192.168.2.5217.160.255.217
                                                Apr 26, 2024 09:42:24.875194073 CEST49735443192.168.2.5199.58.81.140
                                                Apr 26, 2024 09:42:24.875228882 CEST44349735199.58.81.140192.168.2.5
                                                Apr 26, 2024 09:42:24.875376940 CEST49734443192.168.2.5217.160.255.217
                                                Apr 26, 2024 09:42:24.875396013 CEST49735443192.168.2.5199.58.81.140
                                                Apr 26, 2024 09:42:24.875423908 CEST44349734217.160.255.217192.168.2.5
                                                Apr 26, 2024 09:42:24.875528097 CEST49735443192.168.2.5199.58.81.140
                                                Apr 26, 2024 09:42:24.875569105 CEST44349735199.58.81.140192.168.2.5
                                                Apr 26, 2024 09:42:24.904115915 CEST4434973345.66.33.45192.168.2.5
                                                Apr 26, 2024 09:42:24.918163061 CEST900149732193.218.118.100192.168.2.5
                                                Apr 26, 2024 09:42:25.443141937 CEST44349735199.58.81.140192.168.2.5
                                                Apr 26, 2024 09:42:25.443238974 CEST49735443192.168.2.5199.58.81.140
                                                Apr 26, 2024 09:42:25.446548939 CEST49735443192.168.2.5199.58.81.140
                                                Apr 26, 2024 09:42:25.446566105 CEST44349735199.58.81.140192.168.2.5
                                                Apr 26, 2024 09:42:25.446966887 CEST44349735199.58.81.140192.168.2.5
                                                Apr 26, 2024 09:42:25.486932993 CEST49735443192.168.2.5199.58.81.140
                                                Apr 26, 2024 09:42:25.487994909 CEST49735443192.168.2.5199.58.81.140
                                                Apr 26, 2024 09:42:25.503854990 CEST49734443192.168.2.5217.160.255.217
                                                Apr 26, 2024 09:42:25.544116974 CEST44349734217.160.255.217192.168.2.5
                                                Apr 26, 2024 09:42:25.552944899 CEST4973640233192.168.2.5143.107.229.120
                                                Apr 26, 2024 09:42:25.800277948 CEST4023349736143.107.229.120192.168.2.5
                                                Apr 26, 2024 09:42:26.326419115 CEST497379001192.168.2.5192.0.128.86
                                                Apr 26, 2024 09:42:26.326582909 CEST49738443192.168.2.5199.58.81.140
                                                Apr 26, 2024 09:42:26.326634884 CEST44349738199.58.81.140192.168.2.5
                                                Apr 26, 2024 09:42:26.326692104 CEST49738443192.168.2.5199.58.81.140
                                                Apr 26, 2024 09:42:26.327111006 CEST49738443192.168.2.5199.58.81.140
                                                Apr 26, 2024 09:42:26.327126980 CEST44349738199.58.81.140192.168.2.5
                                                Apr 26, 2024 09:42:26.855554104 CEST44349738199.58.81.140192.168.2.5
                                                Apr 26, 2024 09:42:26.855660915 CEST49738443192.168.2.5199.58.81.140
                                                Apr 26, 2024 09:42:26.861443043 CEST49738443192.168.2.5199.58.81.140
                                                Apr 26, 2024 09:42:26.861479998 CEST44349738199.58.81.140192.168.2.5
                                                Apr 26, 2024 09:42:26.861989021 CEST44349738199.58.81.140192.168.2.5
                                                Apr 26, 2024 09:42:26.883654118 CEST49738443192.168.2.5199.58.81.140
                                                Apr 26, 2024 09:42:26.887180090 CEST49739443192.168.2.5154.35.175.225
                                                Apr 26, 2024 09:42:26.887227058 CEST44349739154.35.175.225192.168.2.5
                                                Apr 26, 2024 09:42:26.887283087 CEST49739443192.168.2.5154.35.175.225
                                                Apr 26, 2024 09:42:26.887367964 CEST497409001192.168.2.5151.197.240.154
                                                Apr 26, 2024 09:42:26.887495041 CEST49739443192.168.2.5154.35.175.225
                                                Apr 26, 2024 09:42:26.887514114 CEST44349739154.35.175.225192.168.2.5
                                                Apr 26, 2024 09:42:27.879890919 CEST497409001192.168.2.5151.197.240.154
                                                Apr 26, 2024 09:42:27.935189009 CEST49739443192.168.2.5154.35.175.225
                                                Apr 26, 2024 09:42:27.976124048 CEST44349739154.35.175.225192.168.2.5
                                                Apr 26, 2024 09:42:29.060456991 CEST497419001192.168.2.546.188.6.64
                                                Apr 26, 2024 09:42:32.474675894 CEST497429001192.168.2.5173.249.63.227
                                                Apr 26, 2024 09:42:32.720665932 CEST900149742173.249.63.227192.168.2.5
                                                Apr 26, 2024 09:42:34.392432928 CEST497439001192.168.2.547.56.94.99
                                                Apr 26, 2024 09:42:35.393187046 CEST497439001192.168.2.547.56.94.99
                                                Apr 26, 2024 09:42:35.430202961 CEST497449001192.168.2.580.66.135.13
                                                Apr 26, 2024 09:42:36.468961954 CEST4974580192.168.2.588.88.79.90
                                                Apr 26, 2024 09:42:36.469266891 CEST497469001192.168.2.58.209.79.125
                                                Apr 26, 2024 09:42:37.471318960 CEST497469001192.168.2.58.209.79.125
                                                Apr 26, 2024 09:42:37.471329927 CEST4974580192.168.2.588.88.79.90
                                                Apr 26, 2024 09:42:37.542545080 CEST49747443192.168.2.5104.149.129.210
                                                Apr 26, 2024 09:42:37.542591095 CEST44349747104.149.129.210192.168.2.5
                                                Apr 26, 2024 09:42:37.542710066 CEST49747443192.168.2.5104.149.129.210
                                                Apr 26, 2024 09:42:37.542901993 CEST49747443192.168.2.5104.149.129.210
                                                Apr 26, 2024 09:42:37.542916059 CEST44349747104.149.129.210192.168.2.5
                                                Apr 26, 2024 09:42:38.179908991 CEST49747443192.168.2.5104.149.129.210
                                                Apr 26, 2024 09:42:38.184957981 CEST497489001192.168.2.5167.86.94.107
                                                Apr 26, 2024 09:42:38.224118948 CEST44349747104.149.129.210192.168.2.5
                                                Apr 26, 2024 09:42:39.279866934 CEST49749443192.168.2.550.7.8.141
                                                Apr 26, 2024 09:42:39.279917955 CEST4434974950.7.8.141192.168.2.5
                                                Apr 26, 2024 09:42:39.279993057 CEST49749443192.168.2.550.7.8.141
                                                Apr 26, 2024 09:42:39.280205011 CEST49749443192.168.2.550.7.8.141
                                                Apr 26, 2024 09:42:39.280220032 CEST4434974950.7.8.141192.168.2.5
                                                Apr 26, 2024 09:42:40.293611050 CEST49749443192.168.2.550.7.8.141
                                                Apr 26, 2024 09:42:40.298737049 CEST49750443192.168.2.585.10.240.250
                                                Apr 26, 2024 09:42:40.298787117 CEST4434975085.10.240.250192.168.2.5
                                                Apr 26, 2024 09:42:40.298841000 CEST49750443192.168.2.585.10.240.250
                                                Apr 26, 2024 09:42:40.299113989 CEST49750443192.168.2.585.10.240.250
                                                Apr 26, 2024 09:42:40.299129009 CEST4434975085.10.240.250192.168.2.5
                                                Apr 26, 2024 09:42:40.336159945 CEST4434974950.7.8.141192.168.2.5
                                                Apr 26, 2024 09:42:41.065591097 CEST4434975085.10.240.250192.168.2.5
                                                Apr 26, 2024 09:42:41.065680027 CEST49750443192.168.2.585.10.240.250
                                                Apr 26, 2024 09:42:41.071650982 CEST49750443192.168.2.585.10.240.250
                                                Apr 26, 2024 09:42:41.071676970 CEST4434975085.10.240.250192.168.2.5
                                                Apr 26, 2024 09:42:41.072024107 CEST4434975085.10.240.250192.168.2.5
                                                Apr 26, 2024 09:42:41.072160959 CEST49750443192.168.2.585.10.240.250
                                                Apr 26, 2024 09:42:41.079564095 CEST497519001192.168.2.593.186.202.32
                                                Apr 26, 2024 09:42:41.327071905 CEST90014975193.186.202.32192.168.2.5
                                                Apr 26, 2024 09:42:41.986932993 CEST497519001192.168.2.593.186.202.32
                                                Apr 26, 2024 09:42:42.233513117 CEST90014975193.186.202.32192.168.2.5
                                                Apr 26, 2024 09:42:43.168162107 CEST49752443192.168.2.5195.154.106.60
                                                Apr 26, 2024 09:42:43.168241024 CEST44349752195.154.106.60192.168.2.5
                                                Apr 26, 2024 09:42:43.168307066 CEST49752443192.168.2.5195.154.106.60
                                                Apr 26, 2024 09:42:43.168463945 CEST49753443192.168.2.5131.188.40.189
                                                Apr 26, 2024 09:42:43.168513060 CEST44349753131.188.40.189192.168.2.5
                                                Apr 26, 2024 09:42:43.168559074 CEST49753443192.168.2.5131.188.40.189
                                                Apr 26, 2024 09:42:43.168705940 CEST49752443192.168.2.5195.154.106.60
                                                Apr 26, 2024 09:42:43.168732882 CEST44349752195.154.106.60192.168.2.5
                                                Apr 26, 2024 09:42:43.168891907 CEST49753443192.168.2.5131.188.40.189
                                                Apr 26, 2024 09:42:43.168908119 CEST44349753131.188.40.189192.168.2.5
                                                Apr 26, 2024 09:42:43.648991108 CEST44349752195.154.106.60192.168.2.5
                                                Apr 26, 2024 09:42:43.649101973 CEST49752443192.168.2.5195.154.106.60
                                                Apr 26, 2024 09:42:43.653047085 CEST49752443192.168.2.5195.154.106.60
                                                Apr 26, 2024 09:42:43.653070927 CEST44349752195.154.106.60192.168.2.5
                                                Apr 26, 2024 09:42:43.653332949 CEST44349752195.154.106.60192.168.2.5
                                                Apr 26, 2024 09:42:43.653371096 CEST49753443192.168.2.5131.188.40.189
                                                Apr 26, 2024 09:42:43.681530952 CEST49752443192.168.2.5195.154.106.60
                                                Apr 26, 2024 09:42:43.690329075 CEST497549001192.168.2.562.78.194.4
                                                Apr 26, 2024 09:42:43.700118065 CEST44349753131.188.40.189192.168.2.5
                                                Apr 26, 2024 09:42:43.940874100 CEST44349753131.188.40.189192.168.2.5
                                                Apr 26, 2024 09:42:43.940968037 CEST49753443192.168.2.5131.188.40.189
                                                Apr 26, 2024 09:42:43.940968037 CEST49753443192.168.2.5131.188.40.189
                                                Apr 26, 2024 09:42:44.545993090 CEST497559001192.168.2.551.38.65.160
                                                Apr 26, 2024 09:42:44.797739029 CEST90014975551.38.65.160192.168.2.5
                                                Apr 26, 2024 09:42:44.797832012 CEST497559001192.168.2.551.38.65.160
                                                Apr 26, 2024 09:42:44.798155069 CEST497559001192.168.2.551.38.65.160
                                                Apr 26, 2024 09:42:44.798691034 CEST497569001192.168.2.5212.8.243.229
                                                Apr 26, 2024 09:42:45.032668114 CEST900149756212.8.243.229192.168.2.5
                                                Apr 26, 2024 09:42:45.058219910 CEST90014975551.38.65.160192.168.2.5
                                                Apr 26, 2024 09:42:45.063555956 CEST90014975551.38.65.160192.168.2.5
                                                Apr 26, 2024 09:42:45.068481922 CEST497559001192.168.2.551.38.65.160
                                                Apr 26, 2024 09:42:45.068869114 CEST497559001192.168.2.551.38.65.160
                                                Apr 26, 2024 09:42:45.073894024 CEST49757443192.168.2.5188.68.53.92
                                                Apr 26, 2024 09:42:45.073980093 CEST44349757188.68.53.92192.168.2.5
                                                Apr 26, 2024 09:42:45.074059010 CEST49757443192.168.2.5188.68.53.92
                                                Apr 26, 2024 09:42:45.081006050 CEST49757443192.168.2.5188.68.53.92
                                                Apr 26, 2024 09:42:45.081036091 CEST44349757188.68.53.92192.168.2.5
                                                Apr 26, 2024 09:42:45.326925993 CEST90014975551.38.65.160192.168.2.5
                                                Apr 26, 2024 09:42:45.326971054 CEST90014975551.38.65.160192.168.2.5
                                                Apr 26, 2024 09:42:45.327927113 CEST497559001192.168.2.551.38.65.160
                                                Apr 26, 2024 09:42:45.327927113 CEST497559001192.168.2.551.38.65.160
                                                Apr 26, 2024 09:42:45.960643053 CEST49757443192.168.2.5188.68.53.92
                                                Apr 26, 2024 09:42:45.970371962 CEST49758443192.168.2.5109.70.100.14
                                                Apr 26, 2024 09:42:45.970426083 CEST44349758109.70.100.14192.168.2.5
                                                Apr 26, 2024 09:42:45.973994970 CEST49758443192.168.2.5109.70.100.14
                                                Apr 26, 2024 09:42:45.994496107 CEST49758443192.168.2.5109.70.100.14
                                                Apr 26, 2024 09:42:45.994513988 CEST44349758109.70.100.14192.168.2.5
                                                Apr 26, 2024 09:42:46.008155107 CEST44349757188.68.53.92192.168.2.5
                                                Apr 26, 2024 09:42:46.096399069 CEST49758443192.168.2.5109.70.100.14
                                                Apr 26, 2024 09:42:46.140140057 CEST44349758109.70.100.14192.168.2.5
                                                Apr 26, 2024 09:42:46.261601925 CEST44349758109.70.100.14192.168.2.5
                                                Apr 26, 2024 09:42:47.138362885 CEST49759443192.168.2.5130.225.244.90
                                                Apr 26, 2024 09:42:47.138425112 CEST44349759130.225.244.90192.168.2.5
                                                Apr 26, 2024 09:42:47.138488054 CEST49759443192.168.2.5130.225.244.90
                                                Apr 26, 2024 09:42:47.138765097 CEST49759443192.168.2.5130.225.244.90
                                                Apr 26, 2024 09:42:47.138782978 CEST44349759130.225.244.90192.168.2.5
                                                Apr 26, 2024 09:42:47.954581976 CEST44349759130.225.244.90192.168.2.5
                                                Apr 26, 2024 09:42:47.954684019 CEST49759443192.168.2.5130.225.244.90
                                                Apr 26, 2024 09:42:47.963887930 CEST49759443192.168.2.5130.225.244.90
                                                Apr 26, 2024 09:42:47.963908911 CEST44349759130.225.244.90192.168.2.5
                                                Apr 26, 2024 09:42:47.964200020 CEST44349759130.225.244.90192.168.2.5
                                                Apr 26, 2024 09:42:48.053487062 CEST49759443192.168.2.5130.225.244.90
                                                Apr 26, 2024 09:42:50.928241968 CEST49760443192.168.2.551.158.147.25
                                                Apr 26, 2024 09:42:50.928287983 CEST4434976051.158.147.25192.168.2.5
                                                Apr 26, 2024 09:42:50.928344011 CEST49760443192.168.2.551.158.147.25
                                                Apr 26, 2024 09:42:50.928580046 CEST49760443192.168.2.551.158.147.25
                                                Apr 26, 2024 09:42:50.928597927 CEST4434976051.158.147.25192.168.2.5
                                                Apr 26, 2024 09:42:51.439898968 CEST4434976051.158.147.25192.168.2.5
                                                Apr 26, 2024 09:42:51.440036058 CEST49760443192.168.2.551.158.147.25
                                                Apr 26, 2024 09:42:51.447676897 CEST49760443192.168.2.551.158.147.25
                                                Apr 26, 2024 09:42:51.447702885 CEST4434976051.158.147.25192.168.2.5
                                                Apr 26, 2024 09:42:51.447858095 CEST49760443192.168.2.551.158.147.25
                                                Apr 26, 2024 09:42:51.448057890 CEST4434976051.158.147.25192.168.2.5
                                                Apr 26, 2024 09:42:51.448260069 CEST4434976051.158.147.25192.168.2.5
                                                Apr 26, 2024 09:42:51.448260069 CEST49760443192.168.2.551.158.147.25
                                                Apr 26, 2024 09:42:51.449481010 CEST49760443192.168.2.551.158.147.25
                                                Apr 26, 2024 09:42:52.374377012 CEST497619001192.168.2.545.153.160.131
                                                Apr 26, 2024 09:42:52.374460936 CEST49762443192.168.2.545.66.33.45
                                                Apr 26, 2024 09:42:52.374500990 CEST4434976245.66.33.45192.168.2.5
                                                Apr 26, 2024 09:42:52.374591112 CEST49762443192.168.2.545.66.33.45
                                                Apr 26, 2024 09:42:52.374768972 CEST49762443192.168.2.545.66.33.45
                                                Apr 26, 2024 09:42:52.374779940 CEST4434976245.66.33.45192.168.2.5
                                                Apr 26, 2024 09:42:52.541320086 CEST90014976145.153.160.131192.168.2.5
                                                Apr 26, 2024 09:42:52.674865007 CEST49762443192.168.2.545.66.33.45
                                                Apr 26, 2024 09:42:52.679996967 CEST4976310205192.168.2.5185.220.101.205
                                                Apr 26, 2024 09:42:52.720119953 CEST4434976245.66.33.45192.168.2.5
                                                Apr 26, 2024 09:42:52.929615021 CEST1020549763185.220.101.205192.168.2.5
                                                Apr 26, 2024 09:42:53.487874031 CEST4976310205192.168.2.5185.220.101.205
                                                Apr 26, 2024 09:42:53.735579014 CEST1020549763185.220.101.205192.168.2.5
                                                Apr 26, 2024 09:42:54.283799887 CEST4976310205192.168.2.5185.220.101.205
                                                Apr 26, 2024 09:42:54.529665947 CEST1020549763185.220.101.205192.168.2.5
                                                Apr 26, 2024 09:42:56.386188984 CEST497649001192.168.2.5212.47.227.71
                                                Apr 26, 2024 09:42:58.444003105 CEST4976580192.168.2.537.187.23.232
                                                Apr 26, 2024 09:42:58.677386999 CEST804976537.187.23.232192.168.2.5
                                                Apr 26, 2024 09:42:58.677475929 CEST4976580192.168.2.537.187.23.232
                                                Apr 26, 2024 09:42:58.677861929 CEST4976580192.168.2.537.187.23.232
                                                Apr 26, 2024 09:42:58.911151886 CEST804976537.187.23.232192.168.2.5
                                                Apr 26, 2024 09:42:58.927617073 CEST804976537.187.23.232192.168.2.5
                                                Apr 26, 2024 09:42:58.932523966 CEST4976580192.168.2.537.187.23.232
                                                Apr 26, 2024 09:42:59.170227051 CEST804976537.187.23.232192.168.2.5
                                                Apr 26, 2024 09:42:59.176306963 CEST4976580192.168.2.537.187.23.232
                                                Apr 26, 2024 09:42:59.409863949 CEST804976537.187.23.232192.168.2.5
                                                Apr 26, 2024 09:42:59.409929991 CEST804976537.187.23.232192.168.2.5
                                                Apr 26, 2024 09:42:59.414150000 CEST4976580192.168.2.537.187.23.232
                                                Apr 26, 2024 09:42:59.414150000 CEST4976580192.168.2.537.187.23.232
                                                Apr 26, 2024 09:43:02.321631908 CEST497669001192.168.2.5149.56.98.216
                                                Apr 26, 2024 09:43:05.131942987 CEST497679001192.168.2.5134.249.185.176
                                                Apr 26, 2024 09:43:07.944817066 CEST4434970646.105.227.109192.168.2.5
                                                Apr 26, 2024 09:43:10.448343039 CEST497689001192.168.2.5188.195.109.45
                                                Apr 26, 2024 09:43:11.471282005 CEST497689001192.168.2.5188.195.109.45
                                                Apr 26, 2024 09:43:26.352849007 CEST49769443192.168.2.5209.58.180.90
                                                Apr 26, 2024 09:43:26.352910995 CEST44349769209.58.180.90192.168.2.5
                                                Apr 26, 2024 09:43:26.352977991 CEST49769443192.168.2.5209.58.180.90
                                                Apr 26, 2024 09:43:26.353097916 CEST49770443192.168.2.586.59.21.38
                                                Apr 26, 2024 09:43:26.353136063 CEST4434977086.59.21.38192.168.2.5
                                                Apr 26, 2024 09:43:26.353240013 CEST49770443192.168.2.586.59.21.38
                                                Apr 26, 2024 09:43:26.353401899 CEST49769443192.168.2.5209.58.180.90
                                                Apr 26, 2024 09:43:26.353420019 CEST44349769209.58.180.90192.168.2.5
                                                Apr 26, 2024 09:43:26.353634119 CEST49770443192.168.2.586.59.21.38
                                                Apr 26, 2024 09:43:26.353646994 CEST4434977086.59.21.38192.168.2.5
                                                Apr 26, 2024 09:43:26.606384993 CEST4434977086.59.21.38192.168.2.5
                                                Apr 26, 2024 09:43:26.606770992 CEST49769443192.168.2.5209.58.180.90
                                                Apr 26, 2024 09:43:26.648159027 CEST44349769209.58.180.90192.168.2.5
                                                Apr 26, 2024 09:43:27.454508066 CEST44349769209.58.180.90192.168.2.5
                                                Apr 26, 2024 09:43:27.454719067 CEST44349769209.58.180.90192.168.2.5
                                                Apr 26, 2024 09:43:27.454734087 CEST49769443192.168.2.5209.58.180.90
                                                Apr 26, 2024 09:43:27.454735041 CEST49769443192.168.2.5209.58.180.90
                                                Apr 26, 2024 09:43:27.454843044 CEST49769443192.168.2.5209.58.180.90
                                                Apr 26, 2024 09:43:45.891865015 CEST497719001192.168.2.591.121.160.6
                                                Apr 26, 2024 09:43:45.892085075 CEST4977280192.168.2.5171.25.193.9
                                                Apr 26, 2024 09:43:46.126060963 CEST90014977191.121.160.6192.168.2.5
                                                Apr 26, 2024 09:43:46.154262066 CEST8049772171.25.193.9192.168.2.5
                                                Apr 26, 2024 09:43:46.154346943 CEST4977280192.168.2.5171.25.193.9
                                                Apr 26, 2024 09:43:46.154720068 CEST4977280192.168.2.5171.25.193.9
                                                Apr 26, 2024 09:43:46.418283939 CEST8049772171.25.193.9192.168.2.5
                                                Apr 26, 2024 09:43:46.422144890 CEST4977280192.168.2.5171.25.193.9
                                                Apr 26, 2024 09:43:46.422261000 CEST4977280192.168.2.5171.25.193.9
                                                Apr 26, 2024 09:43:46.684336901 CEST8049772171.25.193.9192.168.2.5
                                                Apr 26, 2024 09:43:46.684443951 CEST8049772171.25.193.9192.168.2.5
                                                Apr 26, 2024 09:43:46.684480906 CEST8049772171.25.193.9192.168.2.5
                                                Apr 26, 2024 09:43:46.684595108 CEST4977280192.168.2.5171.25.193.9
                                                Apr 26, 2024 09:43:46.684595108 CEST4977280192.168.2.5171.25.193.9
                                                Apr 26, 2024 09:44:06.165486097 CEST49773443192.168.2.5185.65.205.10
                                                Apr 26, 2024 09:44:06.165594101 CEST44349773185.65.205.10192.168.2.5
                                                Apr 26, 2024 09:44:06.165663004 CEST49773443192.168.2.5185.65.205.10
                                                Apr 26, 2024 09:44:06.165834904 CEST49774443192.168.2.5199.58.81.140
                                                Apr 26, 2024 09:44:06.165865898 CEST44349774199.58.81.140192.168.2.5
                                                Apr 26, 2024 09:44:06.165911913 CEST49774443192.168.2.5199.58.81.140
                                                Apr 26, 2024 09:44:06.166136026 CEST49773443192.168.2.5185.65.205.10
                                                Apr 26, 2024 09:44:06.166176081 CEST44349773185.65.205.10192.168.2.5
                                                Apr 26, 2024 09:44:06.166274071 CEST49774443192.168.2.5199.58.81.140
                                                Apr 26, 2024 09:44:06.166286945 CEST44349774199.58.81.140192.168.2.5
                                                Apr 26, 2024 09:44:06.694346905 CEST44349774199.58.81.140192.168.2.5
                                                Apr 26, 2024 09:44:06.694495916 CEST49774443192.168.2.5199.58.81.140
                                                Apr 26, 2024 09:44:06.698194981 CEST49774443192.168.2.5199.58.81.140
                                                Apr 26, 2024 09:44:06.698194981 CEST49774443192.168.2.5199.58.81.140
                                                Apr 26, 2024 09:44:06.698204041 CEST44349774199.58.81.140192.168.2.5
                                                Apr 26, 2024 09:44:06.698587894 CEST44349774199.58.81.140192.168.2.5
                                                Apr 26, 2024 09:44:06.698720932 CEST49774443192.168.2.5199.58.81.140
                                                Apr 26, 2024 09:44:06.752274036 CEST49773443192.168.2.5185.65.205.10
                                                Apr 26, 2024 09:44:06.800120115 CEST44349773185.65.205.10192.168.2.5
                                                Apr 26, 2024 09:44:06.902483940 CEST44349773185.65.205.10192.168.2.5
                                                Apr 26, 2024 09:44:06.902585030 CEST49773443192.168.2.5185.65.205.10
                                                Apr 26, 2024 09:44:06.902585030 CEST49773443192.168.2.5185.65.205.10
                                                Apr 26, 2024 09:44:24.174326897 CEST49724443192.168.2.5154.35.175.225
                                                Apr 26, 2024 09:44:24.174329042 CEST49723443192.168.2.5198.245.49.18
                                                Apr 26, 2024 09:44:24.971218109 CEST49733443192.168.2.545.66.33.45
                                                Apr 26, 2024 09:44:25.674331903 CEST49734443192.168.2.5217.160.255.217
                                                Apr 26, 2024 09:44:28.174326897 CEST49739443192.168.2.5154.35.175.225
                                                Apr 26, 2024 09:44:37.630269051 CEST49775443192.168.2.5204.13.164.118
                                                Apr 26, 2024 09:44:37.630302906 CEST44349775204.13.164.118192.168.2.5
                                                Apr 26, 2024 09:44:37.630358934 CEST49775443192.168.2.5204.13.164.118
                                                Apr 26, 2024 09:44:37.630604982 CEST49775443192.168.2.5204.13.164.118
                                                Apr 26, 2024 09:44:37.630614996 CEST44349775204.13.164.118192.168.2.5
                                                Apr 26, 2024 09:44:38.257878065 CEST44349775204.13.164.118192.168.2.5
                                                Apr 26, 2024 09:44:38.257951975 CEST49775443192.168.2.5204.13.164.118
                                                Apr 26, 2024 09:44:38.262583017 CEST49775443192.168.2.5204.13.164.118
                                                Apr 26, 2024 09:44:38.262593031 CEST44349775204.13.164.118192.168.2.5
                                                Apr 26, 2024 09:44:38.262727976 CEST49775443192.168.2.5204.13.164.118
                                                Apr 26, 2024 09:44:38.262989998 CEST44349775204.13.164.118192.168.2.5
                                                Apr 26, 2024 09:44:38.263046980 CEST49775443192.168.2.5204.13.164.118
                                                Apr 26, 2024 09:44:38.361804962 CEST49747443192.168.2.5104.149.129.210
                                                Apr 26, 2024 09:44:40.487895966 CEST49749443192.168.2.550.7.8.141
                                                Apr 26, 2024 09:44:46.080575943 CEST49757443192.168.2.5188.68.53.92
                                                Apr 26, 2024 09:44:52.783776045 CEST49762443192.168.2.545.66.33.45
                                                TimestampSource IPDest IPChecksumCodeType
                                                Apr 26, 2024 09:42:38.430630922 CEST167.86.94.107192.168.2.5c58b(Unknown)Destination Unreachable
                                                Apr 26, 2024 09:43:10.710418940 CEST188.195.109.45192.168.2.5d2e(Unknown)Destination Unreachable
                                                Apr 26, 2024 09:43:11.729929924 CEST188.195.109.45192.168.2.5d2e(Unknown)Destination Unreachable
                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                0192.168.2.549727171.25.193.9806512C:\Users\user\Desktop\PHHOjspjmp.exe
                                                TimestampBytes transferredDirectionData
                                                Apr 26, 2024 09:42:24.340612888 CEST201OUTData Raw: 16 03 01 00 c4 01 00 00 c0 03 03 3f 53 f1 fa 07 39 6f 4b e5 2b e9 8b 65 53 3b bb c3 57 d1 32 65 05 ae 7b 16 7d fa 70 d3 a8 b4 67 00 00 1c c0 2b c0 2f c0 2c c0 30 c0 0a c0 09 c0 13 c0 14 00 33 00 39 00 2f 00 35 00 0a 00 ff 01 00 00 7b 00 00 00 22
                                                Data Ascii: ?S9oK+eS;W2e{}pg+/,039/5{" www.7kgp6pywkddkrex4hwcdn.com#
                                                Apr 26, 2024 09:42:24.598270893 CEST1017INData Raw: 16 03 03 00 39 02 00 00 35 03 03 ef 4e 45 6a 6e d3 07 e1 81 11 72 42 28 35 e8 45 6c b6 f7 da c2 53 3e bd 44 4f 57 4e 47 52 44 01 00 c0 30 00 00 0d ff 01 00 01 00 00 0b 00 04 03 00 01 02 16 03 03 02 5b 0b 00 02 57 00 02 54 00 02 51 30 82 02 4d 30
                                                Data Ascii: 95NEjnrB(5ElS>DOWNGRD0[WTQ0M0i4k0*H0'1%0#Uwww.vphvlboc5ric63fnvjvm.com0240407000000Z240917235959Z0'1%0#Uwww.zjjvkjv3xj7ssrce323p.net0"0*H
                                                Apr 26, 2024 09:42:24.602351904 CEST126OUTData Raw: 16 03 03 00 46 10 00 00 42 41 04 e7 ed 8c 55 e1 86 53 d5 8a b2 19 93 0a bf 80 07 8e b2 79 df 4c 37 9b d2 d3 e7 eb 14 dc 91 4f ca fb 78 9d a5 44 bc 9f e5 35 c3 0e 1a 50 b0 ce 60 3d be 97 23 e3 d3 fa ac 20 32 00 75 16 cc 1a ad 14 03 03 00 01 01 16
                                                Data Ascii: FBAUSyL7OxD5P`=# 2u(8drIS[@B6t aDo
                                                Apr 26, 2024 09:42:24.858779907 CEST51INData Raw: 14 03 03 00 01 01 16 03 03 00 28 66 ca fb 75 c0 6d f3 cf e5 1d e3 fd a9 34 ea f3 77 ed 99 a0 cf 37 ae a9 6e 3d 09 17 7a a3 f0 3a 2b f2 57 78 b8 c4 1f cd
                                                Data Ascii: (fum4w7n=z:+Wx


                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                1192.168.2.54976537.187.23.232806512C:\Users\user\Desktop\PHHOjspjmp.exe
                                                TimestampBytes transferredDirectionData
                                                Apr 26, 2024 09:42:58.677861929 CEST203OUTData Raw: 16 03 01 00 c6 01 00 00 c2 03 03 31 02 a0 35 22 d1 b0 c3 9f 18 dc b4 1d 02 e5 bf 47 42 e4 9f 77 b6 1f 4d df 01 8b c5 f2 d2 61 82 00 00 1c c0 2b c0 2f c0 2c c0 30 c0 0a c0 09 c0 13 c0 14 00 33 00 39 00 2f 00 35 00 0a 00 ff 01 00 00 7d 00 00 00 24
                                                Data Ascii: 15"GBwMa+/,039/5}$"www.2yyaqzla4rtbziovicjpjcm.com#
                                                Apr 26, 2024 09:42:58.927617073 CEST1005INData Raw: 16 03 03 00 39 02 00 00 35 03 03 c5 b3 c7 3b d8 30 41 8c bf c5 45 61 5e 90 dd 0a 88 5f a5 b7 91 f1 38 27 44 4f 57 4e 47 52 44 01 00 c0 30 00 00 0d ff 01 00 01 00 00 0b 00 04 03 00 01 02 16 03 03 02 4f 0b 00 02 4b 00 02 48 00 02 45 30 82 02 41 30
                                                Data Ascii: 95;0AEa^_8'DOWNGRD0OKHE0A0MSs>OJ0*H0"1 0Uwww.t2g4ke52s7rasbf.com0240415000000Z240428235959Z0 10Uwww.m6wadlatno7ss.net0"0*H0
                                                Apr 26, 2024 09:42:58.932523966 CEST126OUTData Raw: 16 03 03 00 46 10 00 00 42 41 04 58 64 5d eb bb 83 d8 75 e8 02 e8 c6 11 17 6f df 01 bc 37 90 96 7f 3b 26 e4 d5 34 d3 1e 65 5e d2 c8 37 c2 ce 55 72 3e 42 27 de 07 8e f7 ec 1e be a9 ef f0 67 4b d2 79 46 af cf 76 76 dd 6f ef fd 14 03 03 00 01 01 16
                                                Data Ascii: FBAXd]uo7;&4e^7Ur>B'gKyFvvo(; 4ia^Yvm1H'd
                                                Apr 26, 2024 09:42:59.170227051 CEST51INData Raw: 14 03 03 00 01 01 16 03 03 00 28 d3 00 1c 28 c8 c3 f0 6c 1b 97 e8 c4 ba a5 51 d0 98 ad c5 ae 0e 9a fe f0 e7 e4 8c a4 ea 12 c6 90 41 d3 92 8a 06 da d1 7d
                                                Data Ascii: ((lQA}
                                                Apr 26, 2024 09:42:59.409863949 CEST31INData Raw: 15 03 03 00 1a d3 00 1c 28 c8 c3 f0 6d 2c 48 00 ad cb ae 49 39 95 bb ee 58 b9 d7 68 9a 07 26
                                                Data Ascii: (m,HI9Xh&


                                                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                2192.168.2.549772171.25.193.9806512C:\Users\user\Desktop\PHHOjspjmp.exe
                                                TimestampBytes transferredDirectionData
                                                Apr 26, 2024 09:43:46.154720068 CEST190OUTData Raw: 16 03 01 00 b9 01 00 00 b5 03 03 f3 08 68 b6 52 2e 9b 5f b1 d9 d8 f5 44 8f 8a 6a 3d ec 5a 8f a7 8a f6 d1 56 4c 96 d7 5a 0a 19 cf 00 00 1c c0 2b c0 2f c0 2c c0 30 c0 0a c0 09 c0 13 c0 14 00 33 00 39 00 2f 00 35 00 0a 00 ff 01 00 00 70 00 00 00 17
                                                Data Ascii: hR._Dj=ZVLZ+/,039/5pwww.62g7g3fkln.com#
                                                Apr 26, 2024 09:43:46.418283939 CEST1017INData Raw: 16 03 03 00 39 02 00 00 35 03 03 46 7d 40 06 51 4a 1d f7 dc 4f 08 97 4d be 18 88 52 31 59 ba 0a b2 b2 5e 44 4f 57 4e 47 52 44 01 00 c0 30 00 00 0d ff 01 00 01 00 00 0b 00 04 03 00 01 02 16 03 03 02 5b 0b 00 02 57 00 02 54 00 02 51 30 82 02 4d 30
                                                Data Ascii: 95F}@QJOMR1Y^DOWNGRD0[WTQ0M0i4k0*H0'1%0#Uwww.vphvlboc5ric63fnvjvm.com0240407000000Z240917235959Z0'1%0#Uwww.zjjvkjv3xj7ssrce323p.net0"0*H
                                                Apr 26, 2024 09:43:46.422144890 CEST126OUTData Raw: 16 03 03 00 46 10 00 00 42 41 04 c4 8b 23 16 34 42 42 26 f8 b5 f7 8f b5 70 0c f9 69 ad 31 40 0b 2f a7 c6 51 aa 69 45 f7 ad a7 67 44 ba 1b b7 2c 88 3d cd e0 64 e7 80 14 5a 0e e8 68 2d 58 f1 da 27 49 cb 8f 81 06 19 f8 42 f0 eb 14 03 03 00 01 01 16
                                                Data Ascii: FBA#4BB&pi1@/QiEgD,=dZh-X'IB(wLc;1f%kT<k82!s`
                                                Apr 26, 2024 09:43:46.684443951 CEST51INData Raw: 14 03 03 00 01 01 16 03 03 00 28 74 7e 37 23 72 34 1e 8f 81 b0 05 5c a3 ae a2 ae 39 0c 8f 5f 2d 71 bb e7 ea c5 61 12 98 df ce 18 a3 c8 0d ff 64 29 f3 79
                                                Data Ascii: (t~7#r4\9_-qad)y


                                                Click to jump to process

                                                Click to jump to process

                                                Click to dive into process behavior distribution

                                                Click to jump to process

                                                Target ID:0
                                                Start time:09:40:54
                                                Start date:26/04/2024
                                                Path:C:\Users\user\Desktop\PHHOjspjmp.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Users\user\Desktop\PHHOjspjmp.exe"
                                                Imagebase:0x400000
                                                File size:1'984'000 bytes
                                                MD5 hash:46D004A90BFC51D6447A0661F440E7A5
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Yara matches:
                                                • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000000.00000002.2010418377.00000000044BF000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                                Reputation:low
                                                Has exited:true

                                                Target ID:1
                                                Start time:09:40:55
                                                Start date:26/04/2024
                                                Path:C:\Users\user\Desktop\PHHOjspjmp.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\Users\user\Desktop\PHHOjspjmp.exe"
                                                Imagebase:0x400000
                                                File size:1'984'000 bytes
                                                MD5 hash:46D004A90BFC51D6447A0661F440E7A5
                                                Has elevated privileges:true
                                                Has administrator privileges:true
                                                Programmed in:C, C++ or other language
                                                Reputation:low
                                                Has exited:false

                                                Target ID:3
                                                Start time:09:41:04
                                                Start date:26/04/2024
                                                Path:C:\ProgramData\Drivers\csrss.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\ProgramData\Drivers\csrss.exe"
                                                Imagebase:0x400000
                                                File size:1'984'000 bytes
                                                MD5 hash:46D004A90BFC51D6447A0661F440E7A5
                                                Has elevated privileges:false
                                                Has administrator privileges:false
                                                Programmed in:C, C++ or other language
                                                Yara matches:
                                                • Rule: Windows_Trojan_RedLineStealer_ed346e4c, Description: unknown, Source: 00000003.00000002.2113415020.0000000004700000.00000040.00000020.00020000.00000000.sdmp, Author: unknown
                                                Antivirus matches:
                                                • Detection: 100%, Avira
                                                • Detection: 100%, Joe Sandbox ML
                                                • Detection: 50%, ReversingLabs
                                                • Detection: 50%, Virustotal, Browse
                                                Reputation:low
                                                Has exited:true

                                                Target ID:4
                                                Start time:09:41:05
                                                Start date:26/04/2024
                                                Path:C:\ProgramData\Drivers\csrss.exe
                                                Wow64 process (32bit):true
                                                Commandline:"C:\ProgramData\Drivers\csrss.exe"
                                                Imagebase:0x400000
                                                File size:1'984'000 bytes
                                                MD5 hash:46D004A90BFC51D6447A0661F440E7A5
                                                Has elevated privileges:false
                                                Has administrator privileges:false
                                                Programmed in:C, C++ or other language
                                                Reputation:low
                                                Has exited:false

                                                Reset < >

                                                  Execution Graph

                                                  Execution Coverage:24.4%
                                                  Dynamic/Decrypted Code Coverage:16.4%
                                                  Signature Coverage:13.4%
                                                  Total number of Nodes:232
                                                  Total number of Limit Nodes:8
                                                  execution_graph 1410 407740 1411 407777 1410->1411 1412 40776a 1410->1412 1414 4045d8 __except_handler4 6 API calls 1411->1414 1413 4045d8 __except_handler4 6 API calls 1412->1413 1413->1411 1416 407787 __except_handler4 1414->1416 1415 40789f 1416->1415 1417 407854 __except_handler4 1416->1417 1421 4077de __IsNonwritableInCurrentImage 1416->1421 1417->1415 1418 40788f 1417->1418 1419 4045d8 __except_handler4 6 API calls 1417->1419 1420 4045d8 __except_handler4 6 API calls 1418->1420 1419->1418 1420->1415 1432 40dbe2 RtlUnwind 1421->1432 1423 4078b6 1425 4045d8 __except_handler4 6 API calls 1423->1425 1424 40781c __except_handler4 1424->1423 1426 4045d8 __except_handler4 6 API calls 1424->1426 1427 4078c6 __except_handler4 1425->1427 1426->1423 1428 4078f2 HeapSize 1427->1428 1429 4078dd 1427->1429 1430 4050f6 __except_handler4 4 API calls 1429->1430 1431 4078ed 1430->1431 1433 40dbf6 1432->1433 1433->1424 1434 40db50 1435 40db62 1434->1435 1437 40db70 @_EH4_CallFilterFunc@8 1434->1437 1436 4045d8 __except_handler4 6 API calls 1435->1436 1436->1437 1154 6020000 1157 6020630 1154->1157 1156 6020005 1158 602064c 1157->1158 1160 6021577 1158->1160 1163 60205b0 1160->1163 1166 60205dc 1163->1166 1164 60205e2 GetFileAttributesA 1164->1166 1165 602061e 1166->1164 1166->1165 1168 6020420 1166->1168 1169 60204f3 1168->1169 1170 60204fa 1169->1170 1171 60204ff CreateWindowExA 1169->1171 1170->1166 1171->1170 1172 6020540 PostMessageA 1171->1172 1173 602055f 1172->1173 1173->1170 1175 6020110 VirtualAlloc GetModuleFileNameA 1173->1175 1176 6020414 1175->1176 1177 602017d CreateProcessA 1175->1177 1176->1173 1177->1176 1179 602025f VirtualFree VirtualAlloc Wow64GetThreadContext 1177->1179 1179->1176 1180 60202a9 ReadProcessMemory 1179->1180 1181 60202e5 VirtualAllocEx NtWriteVirtualMemory 1180->1181 1182 60202d5 NtUnmapViewOfSection 1180->1182 1183 602033b 1181->1183 1182->1181 1184 6020350 NtWriteVirtualMemory 1183->1184 1185 602039d WriteProcessMemory Wow64SetThreadContext ResumeThread 1183->1185 1184->1183 1186 60203fb ExitProcess 1185->1186 1203 40a442 1204 40a452 1203->1204 1205 40a459 TlsAlloc 1203->1205 1406 407683 1407 40768f 1406->1407 1408 40a4e3 __mtinitlocks InitializeCriticalSectionAndSpinCount 1407->1408 1409 4076b6 1407->1409 1408->1407 1206 40aa44 1207 40aa50 _doexit 1206->1207 1207->1206 1209 405d9e 24 API calls _LocaleUpdate::_LocaleUpdate 1207->1209 1210 404094 1207->1210 1209->1207 1223 4089e2 DecodePointer 1210->1223 1212 404099 1213 4040ae IsProcessorFeaturePresent 1212->1213 1214 4040b9 1212->1214 1213->1214 1224 406501 1214->1224 1219 404100 MultiByteToWideChar 1220 4040f3 _strlen 1219->1220 1222 404128 1219->1222 1220->1207 1222->1220 1235 405c03 1222->1235 1223->1212 1238 4065b7 1224->1238 1226 4040d6 1227 402e24 1226->1227 1228 402e35 1227->1228 1234 402e82 1227->1234 1363 405d9e 1228->1363 1231 402e62 1231->1234 1378 4057ca 1231->1378 1234->1219 1234->1220 1236 402e24 _LocaleUpdate::_LocaleUpdate 24 API calls 1235->1236 1237 405c14 1236->1237 1237->1222 1239 4065c3 _doexit 1238->1239 1251 407552 1239->1251 1241 4065ca 1242 4065f8 DecodePointer 1241->1242 1244 406683 _doexit 1241->1244 1243 40660f DecodePointer 1242->1243 1242->1244 1246 40661f 1243->1246 1247 4066d1 _doexit 1244->1247 1258 40642d 1244->1258 1245 40662c EncodePointer 1245->1246 1246->1244 1246->1245 1249 40663c DecodePointer EncodePointer 1246->1249 1247->1226 1250 40664e DecodePointer DecodePointer 1249->1250 1250->1246 1252 407563 1251->1252 1253 407576 EnterCriticalSection 1251->1253 1261 4075da 1252->1261 1253->1241 1255 407569 1255->1253 1275 406443 1255->1275 1360 4063f9 GetModuleHandleExW 1258->1360 1262 4075e6 _doexit 1261->1262 1263 407605 1262->1263 1284 4066fa 1262->1284 1273 407623 _doexit __mtinitlocknum 1263->1273 1315 40794d 1263->1315 1270 407552 __lock 24 API calls 1272 407639 1270->1272 1271 40642d _doexit 3 API calls 1271->1263 1272->1273 1319 40a4e3 1272->1319 1273->1255 1276 4066fa __FF_MSGBANNER 11 API calls 1275->1276 1277 40644b 1276->1277 1278 406757 __NMSG_WRITE 11 API calls 1277->1278 1279 406453 1278->1279 1280 406501 _abort 24 API calls 1279->1280 1281 40645e 1280->1281 1282 4065b7 _doexit 24 API calls 1281->1282 1283 40646a 1282->1283 1283->1253 1322 40a299 1284->1322 1286 406701 1287 40670e 1286->1287 1288 40a299 __NMSG_WRITE 4 API calls 1286->1288 1289 406757 __NMSG_WRITE 11 API calls 1287->1289 1292 406730 1287->1292 1288->1287 1290 406726 1289->1290 1291 406757 __NMSG_WRITE 11 API calls 1290->1291 1291->1292 1293 406757 1292->1293 1294 406775 __NMSG_WRITE 1293->1294 1295 40a299 __NMSG_WRITE 4 API calls 1294->1295 1314 40688c 1294->1314 1297 406788 1295->1297 1299 4068a1 GetStdHandle 1297->1299 1300 40a299 __NMSG_WRITE 4 API calls 1297->1300 1298 406905 1298->1271 1303 4068af _strlen 1299->1303 1299->1314 1301 406799 1300->1301 1301->1299 1302 4067ab 1301->1302 1302->1314 1340 40d0ea 1302->1340 1305 4068e8 WriteFile 1303->1305 1303->1314 1305->1314 1307 4067d8 GetModuleFileNameW 1310 4067f8 1307->1310 1313 406808 __NMSG_WRITE 1307->1313 1308 406909 1309 405106 __invoke_watson 3 API calls 1308->1309 1312 406913 1309->1312 1311 40d0ea __NMSG_WRITE 4 API calls 1310->1311 1311->1313 1313->1308 1313->1314 1344 4045d8 1314->1344 1316 40795b 1315->1316 1317 40761c 1316->1317 1359 40a7ea Sleep 1316->1359 1317->1270 1317->1273 1320 40a500 InitializeCriticalSectionAndSpinCount 1319->1320 1321 40a4f3 1319->1321 1320->1273 1321->1273 1323 40a2a3 1322->1323 1324 40a2ad 1323->1324 1327 4050f6 1323->1327 1324->1286 1330 4050cb DecodePointer 1327->1330 1331 4050de 1330->1331 1336 405106 IsProcessorFeaturePresent 1331->1336 1334 4050cb __except_handler4 3 API calls 1335 405102 1334->1335 1335->1286 1337 405111 1336->1337 1338 40a7f8 __invoke_watson GetCurrentProcess TerminateProcess 1337->1338 1339 4050f5 1338->1339 1339->1334 1342 40d0f5 1340->1342 1341 4050f6 __except_handler4 4 API calls 1343 4067cb 1341->1343 1342->1341 1342->1343 1343->1307 1343->1308 1345 4045e0 1344->1345 1346 4045e2 IsProcessorFeaturePresent 1344->1346 1345->1298 1348 40a8d3 1346->1348 1351 40a882 IsDebuggerPresent 1348->1351 1352 40a897 ___raise_securityfailure 1351->1352 1357 40a80d SetUnhandledExceptionFilter UnhandledExceptionFilter 1352->1357 1354 40a89f ___raise_securityfailure 1358 40a7f8 GetCurrentProcess TerminateProcess 1354->1358 1356 40a8bc 1356->1298 1357->1354 1358->1356 1359->1316 1361 406412 GetProcAddress 1360->1361 1362 406424 ExitProcess 1360->1362 1361->1362 1364 405da4 1363->1364 1365 402e3b 1364->1365 1366 406443 __lock 24 API calls 1364->1366 1365->1231 1367 405448 1365->1367 1366->1365 1368 405454 _doexit 1367->1368 1369 405d9e _LocaleUpdate::_LocaleUpdate 24 API calls 1368->1369 1370 40545d 1369->1370 1371 40548c 1370->1371 1372 405470 1370->1372 1373 407552 __lock 24 API calls 1371->1373 1374 405d9e _LocaleUpdate::_LocaleUpdate 24 API calls 1372->1374 1375 405475 __updatetlocinfoEx_nolock _LocaleUpdate::_LocaleUpdate 1373->1375 1374->1375 1376 405483 _doexit 1375->1376 1377 406443 __lock 24 API calls 1375->1377 1376->1231 1377->1376 1379 4057d6 _doexit 1378->1379 1380 405d9e _LocaleUpdate::_LocaleUpdate 24 API calls 1379->1380 1381 4057e0 1380->1381 1382 407552 __lock 24 API calls 1381->1382 1385 4057f2 _LocaleUpdate::_LocaleUpdate 1381->1385 1382->1385 1383 405800 _doexit 1383->1234 1384 406443 __lock 24 API calls 1384->1383 1385->1383 1385->1384 1438 406515 EncodePointer 1439 406526 __init_pointers __initp_misc_winsig 1438->1439 1443 40aa8b EncodePointer 1439->1443 1441 40653e __init_pointers 1442 40a551 34 API calls 1441->1442 1443->1441 1386 404457 1393 40a2d9 1386->1393 1388 40445c _doexit 1397 40a4c0 GetStartupInfoW 1388->1397 1390 404472 1399 406914 GetProcessHeap 1390->1399 1392 4044ca 1394 40a309 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 1393->1394 1395 40a2fc 1393->1395 1396 40a300 1394->1396 1395->1394 1395->1396 1396->1388 1398 40a4d6 1397->1398 1398->1390 1399->1392 1400 405c69 1401 405c75 _doexit 1400->1401 1402 407552 __lock 24 API calls 1401->1402 1405 405d39 _doexit 1401->1405 1403 405d02 __freefls@4 1402->1403 1404 407552 __lock 24 API calls 1403->1404 1404->1405 1188 44bf026 1189 44bf035 1188->1189 1192 44bf7c6 1189->1192 1198 44bf7e1 1192->1198 1193 44bf7ea CreateToolhelp32Snapshot 1194 44bf806 Module32First 1193->1194 1193->1198 1195 44bf815 1194->1195 1197 44bf03e 1194->1197 1199 44bf485 1195->1199 1198->1193 1198->1194 1200 44bf4b0 1199->1200 1201 44bf4f9 1200->1201 1202 44bf4c1 VirtualAlloc 1200->1202 1201->1201 1202->1201

                                                  Control-flow Graph

                                                  APIs
                                                  • VirtualAlloc.KERNELBASE(00000000,00002800,00001000,00000004), ref: 06020156
                                                  • GetModuleFileNameA.KERNELBASE(00000000,?,00002800), ref: 0602016C
                                                  • CreateProcessA.KERNELBASE(?,00000000), ref: 06020255
                                                  • VirtualFree.KERNELBASE(?,00000000,00008000), ref: 06020270
                                                  • VirtualAlloc.KERNELBASE(00000000,00000004,00001000,00000004), ref: 06020283
                                                  • Wow64GetThreadContext.KERNEL32(00000000,?), ref: 0602029F
                                                  • ReadProcessMemory.KERNELBASE(00000000,?,?,00000004,00000000), ref: 060202C8
                                                  • NtUnmapViewOfSection.NTDLL(00000000,?), ref: 060202E3
                                                  • VirtualAllocEx.KERNELBASE(00000000,?,?,00003000,00000040), ref: 06020304
                                                  • NtWriteVirtualMemory.NTDLL(00000000,?,?,00000000,00000000), ref: 0602032A
                                                  • NtWriteVirtualMemory.NTDLL(00000000,00000000,?,00000002,00000000), ref: 06020399
                                                  • WriteProcessMemory.KERNELBASE(00000000,?,?,00000004,00000000), ref: 060203BF
                                                  • Wow64SetThreadContext.KERNEL32(00000000,?), ref: 060203E1
                                                  • ResumeThread.KERNELBASE(00000000), ref: 060203ED
                                                  • ExitProcess.KERNEL32(00000000), ref: 06020412
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2011110408.0000000006020000.00000040.00001000.00020000.00000000.sdmp, Offset: 06020000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_6020000_PHHOjspjmp.jbxd
                                                  Similarity
                                                  • API ID: Virtual$MemoryProcess$AllocThreadWrite$ContextWow64$CreateExitFileFreeModuleNameReadResumeSectionUnmapView
                                                  • String ID:
                                                  • API String ID: 93872480-0
                                                  • Opcode ID: ec80134effe49fee59cfb16798ca45a1398515b3278bf894a8b0bf22fdce02bc
                                                  • Instruction ID: 29b8a0e1c295fa95b2557e0b82e7880cd3f6501dbc993db3bcc1a22fb4b864f2
                                                  • Opcode Fuzzy Hash: ec80134effe49fee59cfb16798ca45a1398515b3278bf894a8b0bf22fdce02bc
                                                  • Instruction Fuzzy Hash: 6AB1C874A00209AFDB44CF98C895F9EBBB5FF88314F248158E509AB391D771AE45CF94
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 41 44bf7c6-44bf7df 42 44bf7e1-44bf7e3 41->42 43 44bf7ea-44bf7f6 CreateToolhelp32Snapshot 42->43 44 44bf7e5 42->44 45 44bf7f8-44bf7fe 43->45 46 44bf806-44bf813 Module32First 43->46 44->43 45->46 53 44bf800-44bf804 45->53 47 44bf81c-44bf824 46->47 48 44bf815-44bf816 call 44bf485 46->48 51 44bf81b 48->51 51->47 53->42 53->46
                                                  APIs
                                                  • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 044BF7EE
                                                  • Module32First.KERNEL32(00000000,00000224), ref: 044BF80E
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2010418377.00000000044BF000.00000040.00000020.00020000.00000000.sdmp, Offset: 044BF000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_44bf000_PHHOjspjmp.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CreateFirstModule32SnapshotToolhelp32
                                                  • String ID:
                                                  • API String ID: 3833638111-0
                                                  • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                  • Instruction ID: 62b2aebeaf1dde2385687a16e35a57eba659ab8983d60c9ae67d6683986b86e6
                                                  • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                  • Instruction Fuzzy Hash: 12F068312007116BDB203BB5AC8DAABB6ECAF49725F50056AE5C6D11C0D770F84946B1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 15 6020420-60204f8 17 60204fa 15->17 18 60204ff-602053c CreateWindowExA 15->18 19 60205aa-60205ad 17->19 20 6020540-6020558 PostMessageA 18->20 21 602053e 18->21 22 602055f-6020563 20->22 21->19 22->19 23 6020565-6020579 22->23 23->19 25 602057b-6020582 23->25 26 6020584-6020588 25->26 27 60205a8 25->27 26->27 28 602058a-6020591 26->28 27->22 28->27 29 6020593-6020597 call 6020110 28->29 31 602059c-60205a5 29->31 31->27
                                                  APIs
                                                  • CreateWindowExA.USER32(00000200,saodkfnosa9uin,mfoaskdfnoa,00CF0000,80000000,80000000,000003E8,000003E8,00000000,00000000,00000000,00000000), ref: 06020533
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2011110408.0000000006020000.00000040.00001000.00020000.00000000.sdmp, Offset: 06020000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_6020000_PHHOjspjmp.jbxd
                                                  Similarity
                                                  • API ID: CreateWindow
                                                  • String ID: 0$d$mfoaskdfnoa$saodkfnosa9uin
                                                  • API String ID: 716092398-2341455598
                                                  • Opcode ID: bb9b397fb3b679a7694c33bc0dbf232ca5c2d59a4e09fc52e4db1d59d2773c33
                                                  • Instruction ID: 93fe351d8f85f8687b13905322eb3aaddda569c8b7f73fc3b1079c4e0e28d69f
                                                  • Opcode Fuzzy Hash: bb9b397fb3b679a7694c33bc0dbf232ca5c2d59a4e09fc52e4db1d59d2773c33
                                                  • Instruction Fuzzy Hash: 5C514B70D48399DEEB51CBD8C848BDEBFB2AF11708F144158E5453F286C3BA5658CBA2
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 32 60205b0-60205d5 33 60205dc-60205e0 32->33 34 60205e2-60205f5 GetFileAttributesA 33->34 35 602061e-6020621 33->35 36 6020613-602061c 34->36 37 60205f7-60205fe 34->37 36->33 37->36 38 6020600-602060b call 6020420 37->38 40 6020610 38->40 40->36
                                                  APIs
                                                  • GetFileAttributesA.KERNELBASE(apfHQ), ref: 060205EC
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2011110408.0000000006020000.00000040.00001000.00020000.00000000.sdmp, Offset: 06020000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_6020000_PHHOjspjmp.jbxd
                                                  Similarity
                                                  • API ID: AttributesFile
                                                  • String ID: apfHQ$o
                                                  • API String ID: 3188754299-2999369273
                                                  • Opcode ID: af0d3c0451304eea9a95bfbcf33a37b8699cda851cd8c30db079f59d0d7bd2d6
                                                  • Instruction ID: ccbeadc19d8a4aa41241b50476a32366b6a253fc8c617233490b3839a875deda
                                                  • Opcode Fuzzy Hash: af0d3c0451304eea9a95bfbcf33a37b8699cda851cd8c30db079f59d0d7bd2d6
                                                  • Instruction Fuzzy Hash: 81012170C0425DEEDF50DB98C5583AEBFB5AF41308F1480D9C4192B341D7B69B98CBA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 54 44bf485-44bf4bf call 44bf798 57 44bf50d 54->57 58 44bf4c1-44bf4f4 VirtualAlloc call 44bf512 54->58 57->57 60 44bf4f9-44bf50b 58->60 60->57
                                                  APIs
                                                  • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000040), ref: 044BF4D6
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2010418377.00000000044BF000.00000040.00000020.00020000.00000000.sdmp, Offset: 044BF000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_44bf000_PHHOjspjmp.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: AllocVirtual
                                                  • String ID:
                                                  • API String ID: 4275171209-0
                                                  • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                  • Instruction ID: 681181a19b8ff0ebd9517ed3182e4792aa2a7e3ca1261c26fe351decb78bb498
                                                  • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                  • Instruction Fuzzy Hash: 9B113C79A00208EFDB01DF98C985E99BBF5AF08350F05C095F9889B362D771EA90DF94
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • SetUnhandledExceptionFilter.KERNEL32(00000000,?,0040A89F,0041453C,00000001,?,0040A9B6,0041453C,00000017), ref: 0040A812
                                                  • UnhandledExceptionFilter.KERNEL32(0041453C,?,0040A89F,0041453C,00000001,?,0040A9B6,0041453C,00000017), ref: 0040A81B
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2008071265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2008051980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2008095345.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2008118695.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2008140753.000000000041A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2008140753.000000000041F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2008327699.00000000005D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2008327699.00000000041C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2010184740.00000000041C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_PHHOjspjmp.jbxd
                                                  Similarity
                                                  • API ID: ExceptionFilterUnhandled
                                                  • String ID:
                                                  • API String ID: 3192549508-0
                                                  • Opcode ID: f051e6612ab1e2970542baf73d236a84d43581588ecf47e2ad03c1c4fdacf624
                                                  • Instruction ID: ffb851713e054ed3acc51ab0128ad16671472168526bd190bf15d3c9225e88e8
                                                  • Opcode Fuzzy Hash: f051e6612ab1e2970542baf73d236a84d43581588ecf47e2ad03c1c4fdacf624
                                                  • Instruction Fuzzy Hash: 98B09231044208BBCB016BE1EE09B997F69EB09662F008020F74D84061CBB294208B99
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • GetProcessHeap.KERNEL32(004044CA,00418048,00000014), ref: 00406914
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2008071265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2008051980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2008095345.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2008118695.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2008140753.000000000041A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2008140753.000000000041F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2008327699.00000000005D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2008327699.00000000041C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2010184740.00000000041C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_PHHOjspjmp.jbxd
                                                  Similarity
                                                  • API ID: HeapProcess
                                                  • String ID:
                                                  • API String ID: 54951025-0
                                                  • Opcode ID: 09692e32e91fbfa5cabee97cf92b591c29b961fd1789202f275affe866550c08
                                                  • Instruction ID: dec142540b1153a0e615322c3459f83ae4025b57029d048cf741d18851434e70
                                                  • Opcode Fuzzy Hash: 09692e32e91fbfa5cabee97cf92b591c29b961fd1789202f275affe866550c08
                                                  • Instruction Fuzzy Hash: B7B012F030B1024787080B387D141493FD8970C20230081BF7007C1170EF70CCA8EA04
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2010418377.00000000044BF000.00000040.00000020.00020000.00000000.sdmp, Offset: 044BF000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_44bf000_PHHOjspjmp.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                                  • Instruction ID: 0ce8c41fb7ce5b6afc85d0493d62dd403195b44a679302066639b7a389d81d39
                                                  • Opcode Fuzzy Hash: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                                  • Instruction Fuzzy Hash: 7C1152723401019FDB54DF55DC81FE673EAEB89360B19806AED48CB316E675EC46C7A0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2011110408.0000000006020000.00000040.00001000.00020000.00000000.sdmp, Offset: 06020000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_6020000_PHHOjspjmp.jbxd
                                                  Similarity
                                                  • API ID:
                                                  • String ID:
                                                  • API String ID:
                                                  • Opcode ID: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                                  • Instruction ID: 098da692fc683d4149f5fdc106a5819ea6e118d3e3988cacb750a5716864bcff
                                                  • Opcode Fuzzy Hash: 80fd216e43a3e8e10aa1bc4256d449f15122fb9386c352c6ac78bfc1f060c30f
                                                  • Instruction Fuzzy Hash: 18117C72380211AFEB94DE65DCD0EA677EAEF88220B198165E909CB311D676E841C7A0
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 109 4050cb-4050dc DecodePointer 110 4050e1-405105 call 405106 call 4050cb 109->110 111 4050de 109->111 111->110
                                                  APIs
                                                  • DecodePointer.KERNEL32(?,00405102,00000000,00000000,00000000,00000000,00000000,004078ED), ref: 004050D4
                                                  • __invoke_watson.LIBCMT ref: 004050F0
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000000.00000002.2008071265.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000000.00000002.2008051980.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2008095345.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2008118695.0000000000419000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2008140753.000000000041A000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2008140753.000000000041F000.00000008.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2008327699.00000000005D8000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2008327699.00000000041C4000.00000004.00000001.01000000.00000003.sdmpDownload File
                                                  • Associated: 00000000.00000002.2010184740.00000000041C6000.00000002.00000001.01000000.00000003.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_0_2_400000_PHHOjspjmp.jbxd
                                                  Similarity
                                                  • API ID: DecodePointer__invoke_watson
                                                  • String ID: x@
                                                  • API String ID: 4034010525-1963665138
                                                  • Opcode ID: 2afc262a14c5059972e661fe3076fbffd5521ba1b67835919eda791c6d0b3204
                                                  • Instruction ID: fc486fa2f014cf8322d5f453c8970537dbf12cac644ff4ca1afcc222ce53f98b
                                                  • Opcode Fuzzy Hash: 2afc262a14c5059972e661fe3076fbffd5521ba1b67835919eda791c6d0b3204
                                                  • Instruction Fuzzy Hash: DFE0EC32410509BBCF012FA1DC059AB3F65EB08740B844425FE0494071D636C970EB94
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Execution Graph

                                                  Execution Coverage:15.6%
                                                  Dynamic/Decrypted Code Coverage:0%
                                                  Signature Coverage:0%
                                                  Total number of Nodes:27
                                                  Total number of Limit Nodes:0

                                                  Callgraph

                                                  • Executed
                                                  • Not Executed
                                                  • Opacity -> Relevance
                                                  • Disassembly available
                                                  callgraph 0 Function_006A1E69 1 Function_006949ED 2 Function_006970EC 36 Function_0069592F 2->36 3 Function_006957EE 62 Function_0069571F 3->62 4 Function_0069C2EE 5 Function_006943E0 8 Function_00694A78 5->8 14 Function_00696948 5->14 25 Function_00696950 5->25 6 Function_0069E662 7 Function_006C5FE7 7->2 30 Function_00696254 7->30 32 Function_006959A8 7->32 38 Function_006C5FAA 7->38 8->14 9 Function_00699BFC 12 Function_00695DF0 9->12 10 Function_0069C1FC 10->0 49 Function_006A1E88 10->49 11 Function_00695AF1 11->62 13 Function_00695848 27 Function_0069B255 13->27 13->30 41 Function_00695926 13->41 58 Function_00696299 13->58 61 Function_0069591D 13->61 64 Function_00696610 13->64 15 Function_0069CF4A 16 Function_00699BCC 17 Function_0069C34F 18 Function_0069C4C0 19 Function_00696640 34 Function_00696CAD 19->34 54 Function_00696B02 19->54 19->62 20 Function_0069D2C2 35 Function_00694A2F 20->35 37 Function_0069452F 20->37 21 Function_00694A42 21->36 22 Function_006951D9 23 Function_00694ADD 44 Function_00699ABF 23->44 24 Function_006950D0 39 Function_0069CFA1 25->39 26 Function_0069C550 26->18 53 Function_0069C500 26->53 28 Function_00696155 28->35 28->37 29 Function_00694A55 29->1 29->21 29->35 31 Function_0069C3D6 31->31 32->19 32->36 33 Function_006C6028 33->3 33->7 33->13 33->26 33->29 33->32 33->33 33->35 33->37 43 Function_006957BA 33->43 48 Function_006957B4 33->48 52 Function_00696481 33->52 56 Function_00694A87 33->56 60 Function_0069579A 33->60 34->20 34->54 35->36 36->13 36->43 36->52 36->56 36->62 37->14 37->62 38->2 38->11 38->26 38->30 38->32 38->36 38->38 39->39 40 Function_006956A4 40->64 41->44 42 Function_0069C338 42->10 43->62 45 Function_0069D030 45->40 45->62 65 Function_00695716 45->65 46 Function_006962B0 46->4 46->8 46->26 46->42 55 Function_0069C305 46->55 63 Function_0069C31E 46->63 47 Function_0069C333 50 Function_0069D20D 50->35 50->37 51 Function_0069C28C 51->8 51->10 54->5 54->20 54->24 54->28 54->45 54->50 59 Function_0069D199 54->59 55->0 56->1 56->9 56->16 56->23 56->30 56->35 56->58 57 Function_0069B707 57->22 57->30 57->58 59->35 59->37 61->44 62->64 65->40

                                                  Control-flow Graph

                                                  APIs
                                                  • ___sbh_find_block.LIBCMT ref: 00694AB0
                                                  • ___sbh_free_block.LIBCMT ref: 00694ABF
                                                  • RtlFreeHeap.NTDLL(00000000,?,0081B8C0,0000000C,00695999,00000000,?,?,006959B0,?,006C5FF8,0081C690,0000000C,006C60AA,?,00000000), ref: 00694AEF
                                                  • GetLastError.KERNEL32(?,?,006959B0,?,006C5FF8,0081C690,0000000C,006C60AA,?,00000000), ref: 00694B00
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.4474538963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.4474538963.0000000000824000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000001.00000002.4474538963.000000000083C000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000001.00000002.4474538963.0000000000843000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_PHHOjspjmp.jbxd
                                                  Similarity
                                                  • API ID: ErrorFreeHeapLast___sbh_find_block___sbh_free_block
                                                  • String ID:
                                                  • API String ID: 2661975262-0
                                                  • Opcode ID: 78909d6c4936e91804b8b1daa8b3149c3f077c8927f69aac5a87e0b9846f729e
                                                  • Instruction ID: d2f168f1c234fbc1eb0db84b56c896eb6ac808ee96d716f7e41c0537d1ba3495
                                                  • Opcode Fuzzy Hash: 78909d6c4936e91804b8b1daa8b3149c3f077c8927f69aac5a87e0b9846f729e
                                                  • Instruction Fuzzy Hash: E501A271945301AADF60BF74AC06F9F3B6EAF00765F10000DF510A6A99CE788A42DA68
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 26 6c5fe7-6c601b call 696254 call 6959a8 call 6c5faa call 6970ec
                                                  APIs
                                                  • __getptd.LIBCMT ref: 006C5FF3
                                                    • Part of subcall function 006959A8: __getptd_noexit.LIBCMT ref: 006959AB
                                                    • Part of subcall function 006959A8: __amsg_exit.LIBCMT ref: 006959B8
                                                  • __endthreadex.LIBCMT ref: 006C6003
                                                    • Part of subcall function 006C5FAA: __IsNonwritableInCurrentImage.LIBCMT ref: 006C5FBD
                                                    • Part of subcall function 006C5FAA: __getptd_noexit.LIBCMT ref: 006C5FCD
                                                    • Part of subcall function 006C5FAA: __freeptd.LIBCMT ref: 006C5FD7
                                                    • Part of subcall function 006C5FAA: RtlExitUserThread.NTDLL(?,?,006C6008,00000000), ref: 006C5FE0
                                                    • Part of subcall function 006C5FAA: __XcptFilter.LIBCMT ref: 006C6014
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.4474538963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.4474538963.0000000000824000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000001.00000002.4474538963.000000000083C000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000001.00000002.4474538963.0000000000843000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_PHHOjspjmp.jbxd
                                                  Similarity
                                                  • API ID: __getptd_noexit$CurrentExitFilterImageNonwritableThreadUserXcpt__amsg_exit__endthreadex__freeptd__getptd
                                                  • String ID:
                                                  • API String ID: 1003287236-0
                                                  • Opcode ID: a89283c4aba3c99d0b47ffbdad6a7f8d104b49c00d8e382c7f34c9978f4e5ab4
                                                  • Instruction ID: d5ace2e70bc2d3c52d8088d9385be9d0b72b17dae02ad738aec28fd26f28fbfb
                                                  • Opcode Fuzzy Hash: a89283c4aba3c99d0b47ffbdad6a7f8d104b49c00d8e382c7f34c9978f4e5ab4
                                                  • Instruction Fuzzy Hash: 65E0ECB5954605DFEB58ABA0C806E7E776AEF48311F20404CF1029B6A2CA75A984DF25
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  APIs
                                                  • IsDebuggerPresent.KERNEL32 ref: 006999D2
                                                  • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 006999E7
                                                  • UnhandledExceptionFilter.KERNEL32(006D9C6C), ref: 006999F2
                                                  • GetCurrentProcess.KERNEL32(C0000409), ref: 00699A0E
                                                  • TerminateProcess.KERNEL32(00000000), ref: 00699A15
                                                  Memory Dump Source
                                                  • Source File: 00000001.00000002.4474538963.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000001.00000002.4474538963.0000000000824000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000001.00000002.4474538963.000000000083C000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000001.00000002.4474538963.0000000000843000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_1_2_400000_PHHOjspjmp.jbxd
                                                  Similarity
                                                  • API ID: ExceptionFilterProcessUnhandled$CurrentDebuggerPresentTerminate
                                                  • String ID:
                                                  • API String ID: 2579439406-0
                                                  • Opcode ID: 5e4f057abdc76eb51c15de7ff52c5ade2ab544b117bf26ad20e1fd5a877e97fd
                                                  • Instruction ID: dcde4617195335d5d3c577808627ec0208f30a12f7e2c262b8b14ad4a69ab474
                                                  • Opcode Fuzzy Hash: 5e4f057abdc76eb51c15de7ff52c5ade2ab544b117bf26ad20e1fd5a877e97fd
                                                  • Instruction Fuzzy Hash: F021E0B4902305DFCB91DF69FD856447BA9FB88360F10681AF509833A0EFB059828F35
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Execution Graph

                                                  Execution Coverage:24.3%
                                                  Dynamic/Decrypted Code Coverage:16.7%
                                                  Signature Coverage:0%
                                                  Total number of Nodes:233
                                                  Total number of Limit Nodes:7
                                                  execution_graph 1156 4700000 1159 4700006 1156->1159 1160 4700015 1159->1160 1163 47007a6 1160->1163 1164 47007c1 1163->1164 1165 47007ca CreateToolhelp32Snapshot 1164->1165 1166 47007e6 Module32First 1164->1166 1165->1164 1165->1166 1167 47007f5 1166->1167 1168 4700005 1166->1168 1170 4700465 1167->1170 1171 4700490 1170->1171 1172 47004a1 VirtualAlloc 1171->1172 1173 47004d9 1171->1173 1172->1173 1173->1173 1415 407740 1416 407777 1415->1416 1417 40776a 1415->1417 1418 4045d8 __except_handler4 6 API calls 1416->1418 1419 4045d8 __except_handler4 6 API calls 1417->1419 1422 407787 __except_handler4 1418->1422 1419->1416 1420 40789f 1421 407854 __except_handler4 1421->1420 1423 40788f 1421->1423 1424 4045d8 __except_handler4 6 API calls 1421->1424 1422->1420 1422->1421 1427 4077de __IsNonwritableInCurrentImage 1422->1427 1425 4045d8 __except_handler4 6 API calls 1423->1425 1424->1423 1425->1420 1437 40dbe2 RtlUnwind 1427->1437 1428 4078b6 1430 4045d8 __except_handler4 6 API calls 1428->1430 1429 40781c __except_handler4 1429->1428 1431 4045d8 __except_handler4 6 API calls 1429->1431 1432 4078c6 __except_handler4 1430->1432 1431->1428 1433 4078f2 HeapSize 1432->1433 1434 4078dd 1432->1434 1435 4050f6 __except_handler4 4 API calls 1434->1435 1436 4078ed 1435->1436 1438 40dbf6 1437->1438 1438->1429 1439 40db50 1440 40db62 1439->1440 1441 40db70 @_EH4_CallFilterFunc@8 1439->1441 1442 4045d8 __except_handler4 6 API calls 1440->1442 1442->1441 1208 40a442 1209 40a452 1208->1209 1210 40a459 TlsAlloc 1208->1210 1411 407683 1412 40768f 1411->1412 1413 40a4e3 __mtinitlocknum InitializeCriticalSectionAndSpinCount 1412->1413 1414 4076b6 1412->1414 1413->1412 1211 40aa44 1213 40aa50 _doexit 1211->1213 1212 405d9e 24 API calls _LocaleUpdate::_LocaleUpdate 1212->1213 1213->1211 1213->1212 1215 404094 1213->1215 1228 4089e2 DecodePointer 1215->1228 1217 404099 1218 4040ae IsProcessorFeaturePresent 1217->1218 1219 4040b9 1217->1219 1218->1219 1229 406501 1219->1229 1224 404100 MultiByteToWideChar 1225 4040f3 _strlen 1224->1225 1227 404128 1224->1227 1225->1213 1227->1225 1240 405c03 1227->1240 1228->1217 1243 4065b7 1229->1243 1231 4040d6 1232 402e24 1231->1232 1233 402e35 1232->1233 1239 402e82 1232->1239 1368 405d9e 1233->1368 1236 402e62 1236->1239 1383 4057ca 1236->1383 1239->1224 1239->1225 1241 402e24 _LocaleUpdate::_LocaleUpdate 24 API calls 1240->1241 1242 405c14 1241->1242 1242->1227 1244 4065c3 _doexit 1243->1244 1256 407552 1244->1256 1246 4065ca 1247 4065f8 DecodePointer 1246->1247 1249 406683 _doexit 1246->1249 1248 40660f DecodePointer 1247->1248 1247->1249 1251 40661f 1248->1251 1252 4066d1 _doexit 1249->1252 1263 40642d 1249->1263 1250 40662c EncodePointer 1250->1251 1251->1249 1251->1250 1254 40663c DecodePointer EncodePointer 1251->1254 1252->1231 1255 40664e DecodePointer DecodePointer 1254->1255 1255->1251 1257 407563 1256->1257 1258 407576 EnterCriticalSection 1256->1258 1266 4075da 1257->1266 1258->1246 1260 407569 1260->1258 1280 406443 1260->1280 1365 4063f9 GetModuleHandleExW 1263->1365 1267 4075e6 _doexit 1266->1267 1268 407605 1267->1268 1289 4066fa 1267->1289 1278 407623 _doexit __mtinitlocknum 1268->1278 1320 40794d 1268->1320 1275 407552 __lock 24 API calls 1277 407639 1275->1277 1276 40642d _doexit 3 API calls 1276->1268 1277->1278 1324 40a4e3 1277->1324 1278->1260 1281 4066fa __FF_MSGBANNER 11 API calls 1280->1281 1282 40644b 1281->1282 1283 406757 __NMSG_WRITE 11 API calls 1282->1283 1284 406453 1283->1284 1285 406501 _abort 24 API calls 1284->1285 1286 40645e 1285->1286 1287 4065b7 _doexit 24 API calls 1286->1287 1288 40646a 1287->1288 1288->1258 1327 40a299 1289->1327 1291 406701 1292 40670e 1291->1292 1293 40a299 __FF_MSGBANNER 4 API calls 1291->1293 1294 406757 __NMSG_WRITE 11 API calls 1292->1294 1297 406730 1292->1297 1293->1292 1295 406726 1294->1295 1296 406757 __NMSG_WRITE 11 API calls 1295->1296 1296->1297 1298 406757 1297->1298 1299 406775 __NMSG_WRITE 1298->1299 1300 40a299 __FF_MSGBANNER 4 API calls 1299->1300 1319 40688c 1299->1319 1303 406788 1300->1303 1302 406905 1302->1276 1304 4068a1 GetStdHandle 1303->1304 1305 40a299 __FF_MSGBANNER 4 API calls 1303->1305 1308 4068af _strlen 1304->1308 1304->1319 1306 406799 1305->1306 1306->1304 1307 4067ab 1306->1307 1307->1319 1345 40d0ea 1307->1345 1310 4068e8 WriteFile 1308->1310 1308->1319 1310->1319 1312 4067d8 GetModuleFileNameW 1314 4067f8 1312->1314 1318 406808 __NMSG_WRITE 1312->1318 1313 406909 1315 405106 __invoke_watson 3 API calls 1313->1315 1316 40d0ea __NMSG_WRITE 4 API calls 1314->1316 1317 406913 1315->1317 1316->1318 1318->1313 1318->1319 1349 4045d8 1319->1349 1322 40795b 1320->1322 1321 40761c 1321->1275 1321->1278 1322->1321 1364 40a7ea Sleep 1322->1364 1325 40a500 InitializeCriticalSectionAndSpinCount 1324->1325 1326 40a4f3 1324->1326 1325->1278 1326->1278 1329 40a2a3 1327->1329 1328 40a2ad 1328->1291 1329->1328 1332 4050f6 1329->1332 1335 4050cb DecodePointer 1332->1335 1336 4050de 1335->1336 1341 405106 IsProcessorFeaturePresent 1336->1341 1339 4050cb __except_handler4 3 API calls 1340 405102 1339->1340 1340->1291 1342 405111 1341->1342 1343 40a7f8 __invoke_watson GetCurrentProcess TerminateProcess 1342->1343 1344 4050f5 1343->1344 1344->1339 1347 40d0f5 1345->1347 1346 4050f6 __except_handler4 4 API calls 1348 4067cb 1346->1348 1347->1346 1347->1348 1348->1312 1348->1313 1350 4045e0 1349->1350 1351 4045e2 IsProcessorFeaturePresent 1349->1351 1350->1302 1353 40a8d3 1351->1353 1356 40a882 IsDebuggerPresent 1353->1356 1357 40a897 ___raise_securityfailure 1356->1357 1362 40a80d SetUnhandledExceptionFilter UnhandledExceptionFilter 1357->1362 1359 40a89f ___raise_securityfailure 1363 40a7f8 GetCurrentProcess TerminateProcess 1359->1363 1361 40a8bc 1361->1302 1362->1359 1363->1361 1364->1322 1366 406412 GetProcAddress 1365->1366 1367 406424 ExitProcess 1365->1367 1366->1367 1369 405da4 1368->1369 1370 402e3b 1369->1370 1371 406443 __lock 24 API calls 1369->1371 1370->1236 1372 405448 1370->1372 1371->1370 1373 405454 _doexit 1372->1373 1374 405d9e _LocaleUpdate::_LocaleUpdate 24 API calls 1373->1374 1375 40545d 1374->1375 1376 40548c 1375->1376 1378 405470 1375->1378 1377 407552 __lock 24 API calls 1376->1377 1381 405475 __updatetlocinfoEx_nolock _LocaleUpdate::_LocaleUpdate 1377->1381 1379 405d9e _LocaleUpdate::_LocaleUpdate 24 API calls 1378->1379 1379->1381 1380 405483 _doexit 1380->1236 1381->1380 1382 406443 __lock 24 API calls 1381->1382 1382->1380 1384 4057d6 _doexit 1383->1384 1385 405d9e _LocaleUpdate::_LocaleUpdate 24 API calls 1384->1385 1386 4057e0 1385->1386 1387 407552 __lock 24 API calls 1386->1387 1390 4057f2 _LocaleUpdate::_LocaleUpdate 1386->1390 1387->1390 1388 405800 _doexit 1388->1239 1389 406443 __lock 24 API calls 1389->1388 1390->1388 1390->1389 1443 406515 EncodePointer 1444 406526 __init_pointers __initp_misc_winsig 1443->1444 1448 40aa8b EncodePointer 1444->1448 1446 40653e __init_pointers 1447 40a551 34 API calls 1446->1447 1448->1446 1391 404457 1398 40a2d9 1391->1398 1393 40445c _doexit 1402 40a4c0 GetStartupInfoW 1393->1402 1395 404472 1404 406914 GetProcessHeap 1395->1404 1397 4044ca 1399 40a309 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 1398->1399 1400 40a2fc 1398->1400 1401 40a300 1399->1401 1400->1399 1400->1401 1401->1393 1403 40a4d6 1402->1403 1403->1395 1404->1397 1405 405c69 1407 405c75 _doexit 1405->1407 1406 405d39 _doexit 1407->1406 1408 407552 __lock 24 API calls 1407->1408 1409 405d02 __freefls@4 1408->1409 1410 407552 __lock 24 API calls 1409->1410 1410->1406 1174 61e0000 1177 61e0630 1174->1177 1176 61e0005 1178 61e064c 1177->1178 1180 61e1577 1178->1180 1183 61e05b0 1180->1183 1186 61e05dc 1183->1186 1184 61e061e 1185 61e05e2 GetFileAttributesA 1185->1186 1186->1184 1186->1185 1188 61e0420 1186->1188 1189 61e04f3 1188->1189 1190 61e04ff CreateWindowExA 1189->1190 1191 61e04fa 1189->1191 1190->1191 1192 61e0540 PostMessageA 1190->1192 1191->1186 1193 61e055f 1192->1193 1193->1191 1195 61e0110 VirtualAlloc GetModuleFileNameA 1193->1195 1196 61e0414 1195->1196 1197 61e017d CreateProcessA 1195->1197 1196->1193 1197->1196 1199 61e025f VirtualFree VirtualAlloc Wow64GetThreadContext 1197->1199 1199->1196 1200 61e02a9 ReadProcessMemory 1199->1200 1201 61e02e5 VirtualAllocEx NtWriteVirtualMemory 1200->1201 1202 61e02d5 NtUnmapViewOfSection 1200->1202 1203 61e033b 1201->1203 1202->1201 1204 61e039d WriteProcessMemory Wow64SetThreadContext ResumeThread 1203->1204 1205 61e0350 NtWriteVirtualMemory 1203->1205 1206 61e03fb ExitProcess 1204->1206 1205->1203

                                                  Control-flow Graph

                                                  APIs
                                                  • VirtualAlloc.KERNELBASE(00000000,00002800,00001000,00000004), ref: 061E0156
                                                  • GetModuleFileNameA.KERNELBASE(00000000,?,00002800), ref: 061E016C
                                                  • CreateProcessA.KERNELBASE(?,00000000), ref: 061E0255
                                                  • VirtualFree.KERNELBASE(?,00000000,00008000), ref: 061E0270
                                                  • VirtualAlloc.KERNELBASE(00000000,00000004,00001000,00000004), ref: 061E0283
                                                  • Wow64GetThreadContext.KERNEL32(00000000,?), ref: 061E029F
                                                  • ReadProcessMemory.KERNELBASE(00000000,?,?,00000004,00000000), ref: 061E02C8
                                                  • NtUnmapViewOfSection.NTDLL(00000000,?), ref: 061E02E3
                                                  • VirtualAllocEx.KERNELBASE(00000000,?,?,00003000,00000040), ref: 061E0304
                                                  • NtWriteVirtualMemory.NTDLL(00000000,?,?,00000000,00000000), ref: 061E032A
                                                  • NtWriteVirtualMemory.NTDLL(00000000,00000000,?,00000002,00000000), ref: 061E0399
                                                  • WriteProcessMemory.KERNELBASE(00000000,?,?,00000004,00000000), ref: 061E03BF
                                                  • Wow64SetThreadContext.KERNEL32(00000000,?), ref: 061E03E1
                                                  • ResumeThread.KERNELBASE(00000000), ref: 061E03ED
                                                  • ExitProcess.KERNEL32(00000000), ref: 061E0412
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.2113629805.00000000061E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 061E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_61e0000_csrss.jbxd
                                                  Similarity
                                                  • API ID: Virtual$MemoryProcess$AllocThreadWrite$ContextWow64$CreateExitFileFreeModuleNameReadResumeSectionUnmapView
                                                  • String ID:
                                                  • API String ID: 93872480-0
                                                  • Opcode ID: ec80134effe49fee59cfb16798ca45a1398515b3278bf894a8b0bf22fdce02bc
                                                  • Instruction ID: e78e9ffcd893f3a5b60a772536956f94337698cbc57d5ab4bd15a8b54f959893
                                                  • Opcode Fuzzy Hash: ec80134effe49fee59cfb16798ca45a1398515b3278bf894a8b0bf22fdce02bc
                                                  • Instruction Fuzzy Hash: A6B1B574A00208AFDB44CF98C895F9EBBB5FF88314F248158E949AB395D771AE41CF94
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 15 61e0420-61e04f8 17 61e04ff-61e053c CreateWindowExA 15->17 18 61e04fa 15->18 20 61e053e 17->20 21 61e0540-61e0558 PostMessageA 17->21 19 61e05aa-61e05ad 18->19 20->19 22 61e055f-61e0563 21->22 22->19 23 61e0565-61e0579 22->23 23->19 25 61e057b-61e0582 23->25 26 61e05a8 25->26 27 61e0584-61e0588 25->27 26->22 27->26 28 61e058a-61e0591 27->28 28->26 29 61e0593-61e0597 call 61e0110 28->29 31 61e059c-61e05a5 29->31 31->26
                                                  APIs
                                                  • CreateWindowExA.USER32(00000200,saodkfnosa9uin,mfoaskdfnoa,00CF0000,80000000,80000000,000003E8,000003E8,00000000,00000000,00000000,00000000), ref: 061E0533
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.2113629805.00000000061E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 061E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_61e0000_csrss.jbxd
                                                  Similarity
                                                  • API ID: CreateWindow
                                                  • String ID: 0$d$mfoaskdfnoa$saodkfnosa9uin
                                                  • API String ID: 716092398-2341455598
                                                  • Opcode ID: bb9b397fb3b679a7694c33bc0dbf232ca5c2d59a4e09fc52e4db1d59d2773c33
                                                  • Instruction ID: b9217898abec56a2369d4746f6b29f4a8a5db221f77231c9be380851311fd77c
                                                  • Opcode Fuzzy Hash: bb9b397fb3b679a7694c33bc0dbf232ca5c2d59a4e09fc52e4db1d59d2773c33
                                                  • Instruction Fuzzy Hash: CA510670D08788DAEB11CBE8C849B9DBFB2AF15708F144058D5446F286C3FA9658CBA6
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 32 61e05b0-61e05d5 33 61e05dc-61e05e0 32->33 34 61e061e-61e0621 33->34 35 61e05e2-61e05f5 GetFileAttributesA 33->35 36 61e05f7-61e05fe 35->36 37 61e0613-61e061c 35->37 36->37 38 61e0600-61e060b call 61e0420 36->38 37->33 40 61e0610 38->40 40->37
                                                  APIs
                                                  • GetFileAttributesA.KERNELBASE(apfHQ), ref: 061E05EC
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.2113629805.00000000061E0000.00000040.00001000.00020000.00000000.sdmp, Offset: 061E0000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_61e0000_csrss.jbxd
                                                  Similarity
                                                  • API ID: AttributesFile
                                                  • String ID: apfHQ$o
                                                  • API String ID: 3188754299-2999369273
                                                  • Opcode ID: af0d3c0451304eea9a95bfbcf33a37b8699cda851cd8c30db079f59d0d7bd2d6
                                                  • Instruction ID: c74ee0254f205affca050280418afaa15d995a1462a3fe4b8da4aa4e519b7093
                                                  • Opcode Fuzzy Hash: af0d3c0451304eea9a95bfbcf33a37b8699cda851cd8c30db079f59d0d7bd2d6
                                                  • Instruction Fuzzy Hash: D7012170C0428CEEDF55DB98C5183AEBFB5AF45309F1480D9C4192B241D7B69BA9CBA1
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 41 47007a6-47007bf 42 47007c1-47007c3 41->42 43 47007c5 42->43 44 47007ca-47007d6 CreateToolhelp32Snapshot 42->44 43->44 45 47007e6-47007f3 Module32First 44->45 46 47007d8-47007de 44->46 47 47007f5-47007f6 call 4700465 45->47 48 47007fc-4700804 45->48 46->45 53 47007e0-47007e4 46->53 51 47007fb 47->51 51->48 53->42 53->45
                                                  APIs
                                                  • CreateToolhelp32Snapshot.KERNEL32(00000008,00000000), ref: 047007CE
                                                  • Module32First.KERNEL32(00000000,00000224), ref: 047007EE
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.2113415020.0000000004700000.00000040.00000020.00020000.00000000.sdmp, Offset: 04700000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_4700000_csrss.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: CreateFirstModule32SnapshotToolhelp32
                                                  • String ID:
                                                  • API String ID: 3833638111-0
                                                  • Opcode ID: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                  • Instruction ID: d402ce8afb7c66dc67403921d6c91028123f2f4791dd3268f4b328d7db5f28b6
                                                  • Opcode Fuzzy Hash: 3788706d20f5b898e185810e19a2e38a50b9b544ac306a9cd33eedd6d527d18a
                                                  • Instruction Fuzzy Hash: 8EF0F631102754AFEB203BF5B88CB6F76ECAF49735F105528E643911C0DB74F8054A61
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 54 4700465-470049f call 4700778 57 47004a1-47004d4 VirtualAlloc call 47004f2 54->57 58 47004ed 54->58 60 47004d9-47004eb 57->60 58->58 60->58
                                                  APIs
                                                  • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000040), ref: 047004B6
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.2113415020.0000000004700000.00000040.00000020.00020000.00000000.sdmp, Offset: 04700000, based on PE: false
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_4700000_csrss.jbxd
                                                  Yara matches
                                                  Similarity
                                                  • API ID: AllocVirtual
                                                  • String ID:
                                                  • API String ID: 4275171209-0
                                                  • Opcode ID: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                  • Instruction ID: 878f15119220dac36df46e50af9170b295b223756c0d26daaf53653d3d97bfa5
                                                  • Opcode Fuzzy Hash: 499270a49480bde3a93b1541ef130abcc6c407f96609cce36d97d57e1d2ec7bb
                                                  • Instruction Fuzzy Hash: C7113C79A40248EFDB01DF98C989E98BBF5AF08350F05C094F9489B362D775EA50DF80
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  Control-flow Graph

                                                  • Executed
                                                  • Not Executed
                                                  control_flow_graph 111 4050cb-4050dc DecodePointer 112 4050e1-405105 call 405106 call 4050cb 111->112 113 4050de 111->113 113->112
                                                  APIs
                                                  • DecodePointer.KERNEL32(?,00405102,00000000,00000000,00000000,00000000,00000000,004078ED), ref: 004050D4
                                                  • __invoke_watson.LIBCMT ref: 004050F0
                                                  Strings
                                                  Memory Dump Source
                                                  • Source File: 00000003.00000002.2110260805.0000000000401000.00000020.00000001.01000000.00000005.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000003.00000002.2110246224.0000000000400000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.2110279502.0000000000412000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.2110295679.0000000000419000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.2110312289.000000000041A000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.2110312289.000000000041F000.00000008.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.2110455864.00000000041C4000.00000004.00000001.01000000.00000005.sdmpDownload File
                                                  • Associated: 00000003.00000002.2112298284.00000000041C6000.00000002.00000001.01000000.00000005.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_3_2_400000_csrss.jbxd
                                                  Similarity
                                                  • API ID: DecodePointer__invoke_watson
                                                  • String ID: x@
                                                  • API String ID: 4034010525-1963665138
                                                  • Opcode ID: 2afc262a14c5059972e661fe3076fbffd5521ba1b67835919eda791c6d0b3204
                                                  • Instruction ID: fc486fa2f014cf8322d5f453c8970537dbf12cac644ff4ca1afcc222ce53f98b
                                                  • Opcode Fuzzy Hash: 2afc262a14c5059972e661fe3076fbffd5521ba1b67835919eda791c6d0b3204
                                                  • Instruction Fuzzy Hash: DFE0EC32410509BBCF012FA1DC059AB3F65EB08740B844425FE0494071D636C970EB94
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%

                                                  APIs
                                                  • __getptd.LIBCMT ref: 006C5FF3
                                                    • Part of subcall function 006959A8: __getptd_noexit.LIBCMT ref: 006959AB
                                                    • Part of subcall function 006959A8: __amsg_exit.LIBCMT ref: 006959B8
                                                  • __endthreadex.LIBCMT ref: 006C6003
                                                    • Part of subcall function 006C5FAA: __IsNonwritableInCurrentImage.LIBCMT ref: 006C5FBD
                                                    • Part of subcall function 006C5FAA: __getptd_noexit.LIBCMT ref: 006C5FCD
                                                    • Part of subcall function 006C5FAA: __freeptd.LIBCMT ref: 006C5FD7
                                                    • Part of subcall function 006C5FAA: RtlExitUserThread.NTDLL(?,?,006C6008,00000000), ref: 006C5FE0
                                                    • Part of subcall function 006C5FAA: __XcptFilter.LIBCMT ref: 006C6014
                                                  Memory Dump Source
                                                  • Source File: 00000004.00000002.4474695059.0000000000400000.00000040.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
                                                  • Associated: 00000004.00000002.4474695059.0000000000824000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000004.00000002.4474695059.000000000083D000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                  • Associated: 00000004.00000002.4474695059.0000000000843000.00000040.00000400.00020000.00000000.sdmpDownload File
                                                  Joe Sandbox IDA Plugin
                                                  • Snapshot File: hcaresult_4_2_400000_csrss.jbxd
                                                  Similarity
                                                  • API ID: __getptd_noexit$CurrentExitFilterImageNonwritableThreadUserXcpt__amsg_exit__endthreadex__freeptd__getptd
                                                  • String ID:
                                                  • API String ID: 1003287236-0
                                                  • Opcode ID: a89283c4aba3c99d0b47ffbdad6a7f8d104b49c00d8e382c7f34c9978f4e5ab4
                                                  • Instruction ID: d5ace2e70bc2d3c52d8088d9385be9d0b72b17dae02ad738aec28fd26f28fbfb
                                                  • Opcode Fuzzy Hash: a89283c4aba3c99d0b47ffbdad6a7f8d104b49c00d8e382c7f34c9978f4e5ab4
                                                  • Instruction Fuzzy Hash: 65E0ECB5954605DFEB58ABA0C806E7E776AEF48311F20404CF1029B6A2CA75A984DF25
                                                  Uniqueness

                                                  Uniqueness Score: -1.00%