Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
VG0x1LZCFb.exe

Overview

General Information

Sample name:VG0x1LZCFb.exe
renamed because original name is a hash value
Original sample name:906c1863777e91ff508ccb1758ee2f7bdec9cb59f0c251e0a1ddd64d9cc82548.exe
Analysis ID:1466893
MD5:f0584ec3946ed12facabaae4789235b7
SHA1:f58a9f4ea1fb7aa409e029fcb0c976dc680ac034
SHA256:906c1863777e91ff508ccb1758ee2f7bdec9cb59f0c251e0a1ddd64d9cc82548
Tags:exe
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
AI detected suspicious sample
Contains functionality to log keystrokes (.Net Source)
Installs a global keyboard hook
Machine Learning detection for sample
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Contains long sleeps (>= 3 min)
Creates a window with clipboard capturing capabilities
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Sigma detected: Suspicious Outbound SMTP Connections
Uses 32bit PE files
Uses SMTP (mail sending)
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • VG0x1LZCFb.exe (PID: 3212 cmdline: "C:\Users\user\Desktop\VG0x1LZCFb.exe" MD5: F0584EC3946ED12FACABAAE4789235B7)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.expresscargoes.net", "Username": "noreply@expresscargoes.net", "Password": "QAZ1234P0#WA"}
SourceRuleDescriptionAuthorStrings
VG0x1LZCFb.exeJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    VG0x1LZCFb.exeJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      VG0x1LZCFb.exeINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
      • 0x3533d:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
      • 0x353af:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
      • 0x35439:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
      • 0x354cb:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
      • 0x35535:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
      • 0x355a7:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
      • 0x3563d:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
      • 0x356cd:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
      SourceRuleDescriptionAuthorStrings
      00000000.00000002.4562988090.00000000027C4000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000000.00000000.2120961167.0000000000352000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          00000000.00000000.2120961167.0000000000352000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            00000000.00000002.4562988090.00000000027A1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              00000000.00000002.4562988090.00000000027A1000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                Click to see the 2 entries
                SourceRuleDescriptionAuthorStrings
                0.0.VG0x1LZCFb.exe.350000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                  0.0.VG0x1LZCFb.exe.350000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                    0.0.VG0x1LZCFb.exe.350000.0.unpackINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
                    • 0x3533d:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
                    • 0x353af:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
                    • 0x35439:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
                    • 0x354cb:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
                    • 0x35535:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
                    • 0x355a7:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
                    • 0x3563d:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
                    • 0x356cd:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548

                    System Summary

                    barindex
                    Source: Network ConnectionAuthor: frack113: Data: DestinationIp: 51.255.149.48, DestinationIsIpv6: false, DestinationPort: 587, EventID: 3, Image: C:\Users\user\Desktop\VG0x1LZCFb.exe, Initiated: true, ProcessId: 3212, Protocol: tcp, SourceIp: 192.168.2.6, SourceIsIpv6: false, SourcePort: 49711
                    No Snort rule has matched

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: VG0x1LZCFb.exeAvira: detected
                    Source: VG0x1LZCFb.exeMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "Port": "587", "Host": "mail.expresscargoes.net", "Username": "noreply@expresscargoes.net", "Password": "QAZ1234P0#WA"}
                    Source: VG0x1LZCFb.exeReversingLabs: Detection: 91%
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                    Source: VG0x1LZCFb.exeJoe Sandbox ML: detected
                    Source: VG0x1LZCFb.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: unknownHTTPS traffic detected: 104.26.13.205:443 -> 192.168.2.6:49710 version: TLS 1.2
                    Source: VG0x1LZCFb.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: global trafficTCP traffic: 192.168.2.6:49711 -> 51.255.149.48:587
                    Source: Joe Sandbox ViewIP Address: 104.26.13.205 104.26.13.205
                    Source: Joe Sandbox ViewIP Address: 104.26.13.205 104.26.13.205
                    Source: Joe Sandbox ViewASN Name: OVHFR OVHFR
                    Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                    Source: unknownDNS query: name: api.ipify.org
                    Source: unknownDNS query: name: api.ipify.org
                    Source: unknownDNS query: name: api.ipify.org
                    Source: global trafficTCP traffic: 192.168.2.6:49711 -> 51.255.149.48:587
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                    Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
                    Source: global trafficDNS traffic detected: DNS query: api.ipify.org
                    Source: global trafficDNS traffic detected: DNS query: mail.expresscargoes.net
                    Source: VG0x1LZCFb.exe, 00000000.00000002.4562988090.00000000027C4000.00000004.00000800.00020000.00000000.sdmp, VG0x1LZCFb.exe, 00000000.00000002.4562988090.000000000283A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://expresscargoes.net
                    Source: VG0x1LZCFb.exe, 00000000.00000002.4562988090.00000000027C4000.00000004.00000800.00020000.00000000.sdmp, VG0x1LZCFb.exe, 00000000.00000002.4562988090.000000000283A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.expresscargoes.net
                    Source: VG0x1LZCFb.exe, 00000000.00000002.4562988090.0000000002751000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                    Source: VG0x1LZCFb.exeString found in binary or memory: https://account.dyn.com/
                    Source: VG0x1LZCFb.exeString found in binary or memory: https://api.ipify.org
                    Source: VG0x1LZCFb.exe, 00000000.00000002.4562988090.0000000002751000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
                    Source: VG0x1LZCFb.exe, 00000000.00000002.4562988090.0000000002751000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/t
                    Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 443
                    Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49710
                    Source: unknownHTTPS traffic detected: 104.26.13.205:443 -> 192.168.2.6:49710 version: TLS 1.2

                    Key, Mouse, Clipboard, Microphone and Screen Capturing

                    barindex
                    Source: VG0x1LZCFb.exe, R1W.cs.Net Code: PRQ3eCEJ
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeWindows user hook set: 0 keyboard low level C:\Users\user\Desktop\VG0x1LZCFb.exeJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeWindow created: window name: CLIPBRDWNDCLASSJump to behavior

                    System Summary

                    barindex
                    Source: VG0x1LZCFb.exe, type: SAMPLEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: 0.0.VG0x1LZCFb.exe.350000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeProcess Stats: CPU usage > 49%
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeCode function: 0_2_00D7A1A00_2_00D7A1A0
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeCode function: 0_2_00D7D4F80_2_00D7D4F8
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeCode function: 0_2_00D799D00_2_00D799D0
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeCode function: 0_2_00D74A980_2_00D74A98
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeCode function: 0_2_00D73E800_2_00D73E80
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeCode function: 0_2_00D741C80_2_00D741C8
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeCode function: 0_2_063004480_2_06300448
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeCode function: 0_2_06308A480_2_06308A48
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeCode function: 0_2_0630BB580_2_0630BB58
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeCode function: 0_2_063033A00_2_063033A0
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeCode function: 0_2_063043E00_2_063043E0
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeCode function: 0_2_06303AE80_2_06303AE8
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeCode function: 0_2_063058710_2_06305871
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeCode function: 0_2_063051A00_2_063051A0
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeCode function: 0_2_06A137A00_2_06A137A0
                    Source: VG0x1LZCFb.exe, 00000000.00000000.2120994361.0000000000390000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamef3f7789a-01a3-4aaf-bdda-c44b7356b92c.exe4 vs VG0x1LZCFb.exe
                    Source: VG0x1LZCFb.exe, 00000000.00000002.4562329246.0000000000ACE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs VG0x1LZCFb.exe
                    Source: VG0x1LZCFb.exe, 00000000.00000002.4561810776.0000000000738000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs VG0x1LZCFb.exe
                    Source: VG0x1LZCFb.exeBinary or memory string: OriginalFilenamef3f7789a-01a3-4aaf-bdda-c44b7356b92c.exe4 vs VG0x1LZCFb.exe
                    Source: VG0x1LZCFb.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                    Source: VG0x1LZCFb.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: 0.0.VG0x1LZCFb.exe.350000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                    Source: VG0x1LZCFb.exe, KLhJmaON.csCryptographic APIs: 'TransformFinalBlock'
                    Source: VG0x1LZCFb.exe, KLhJmaON.csCryptographic APIs: 'TransformFinalBlock'
                    Source: VG0x1LZCFb.exe, 7hO8luD.csCryptographic APIs: 'TransformFinalBlock'
                    Source: VG0x1LZCFb.exe, 7hO8luD.csCryptographic APIs: 'TransformFinalBlock'
                    Source: VG0x1LZCFb.exe, 7hO8luD.csCryptographic APIs: 'TransformFinalBlock'
                    Source: VG0x1LZCFb.exe, 7hO8luD.csCryptographic APIs: 'TransformFinalBlock'
                    Source: VG0x1LZCFb.exe, 9HIFdl.csCryptographic APIs: 'TransformFinalBlock'
                    Source: VG0x1LZCFb.exe, 9HIFdl.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: VG0x1LZCFb.exeBinary string: ID: 0x{0:X}qSize of the SerializedPropertyStore is less than 8 ({0})/StoreSize: {0} (0x{0X})3\Device\LanmanRedirector\[Failed to retrieve system handle information.V!
                    Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@1/0@2/2
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeMutant created: NULL
                    Source: VG0x1LZCFb.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: VG0x1LZCFb.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: VG0x1LZCFb.exeReversingLabs: Detection: 91%
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeSection loaded: mscoree.dllJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeSection loaded: kernel.appcore.dllJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeSection loaded: version.dllJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeSection loaded: uxtheme.dllJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeSection loaded: windows.storage.dllJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeSection loaded: wldp.dllJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeSection loaded: profapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeSection loaded: cryptsp.dllJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeSection loaded: rsaenh.dllJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeSection loaded: cryptbase.dllJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeSection loaded: wbemcomn.dllJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeSection loaded: amsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeSection loaded: userenv.dllJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeSection loaded: sspicli.dllJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeSection loaded: rasapi32.dllJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeSection loaded: rasman.dllJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeSection loaded: rtutils.dllJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeSection loaded: mswsock.dllJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeSection loaded: winhttp.dllJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeSection loaded: iphlpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeSection loaded: dhcpcsvc6.dllJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeSection loaded: dhcpcsvc.dllJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeSection loaded: dnsapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeSection loaded: winnsi.dllJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeSection loaded: rasadhlp.dllJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeSection loaded: fwpuclnt.dllJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeSection loaded: secur32.dllJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeSection loaded: schannel.dllJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeSection loaded: mskeyprotect.dllJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeSection loaded: ntasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeSection loaded: ncrypt.dllJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeSection loaded: ncryptsslp.dllJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeSection loaded: msasn1.dllJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeSection loaded: gpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeSection loaded: vaultcli.dllJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeSection loaded: wintypes.dllJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeSection loaded: dpapi.dllJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeSection loaded: edputil.dllJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                    Source: VG0x1LZCFb.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                    Source: VG0x1LZCFb.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeCode function: 0_2_00D7A190 push eax; ret 0_2_00D7A191
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeCode function: 0_2_00D70CCC push edi; retf 0_2_00D70C7A
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeCode function: 0_2_00D70C45 push ebx; retf 0_2_00D70C52
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeMemory allocated: CC0000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeMemory allocated: 2750000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeMemory allocated: 2550000 memory reserve | memory write watchJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeWindow / User API: threadDelayed 1805Jump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeWindow / User API: threadDelayed 8024Jump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exe TID: 2612Thread sleep time: -24903104499507879s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exe TID: 2612Thread sleep time: -200000s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exe TID: 6060Thread sleep count: 1805 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exe TID: 2612Thread sleep time: -99890s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exe TID: 6060Thread sleep count: 8024 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exe TID: 2612Thread sleep time: -99781s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exe TID: 2612Thread sleep time: -99671s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exe TID: 2612Thread sleep time: -99562s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exe TID: 2612Thread sleep time: -99453s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exe TID: 2612Thread sleep time: -99343s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exe TID: 2612Thread sleep time: -99234s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exe TID: 2612Thread sleep time: -99125s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exe TID: 2612Thread sleep time: -99015s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exe TID: 2612Thread sleep time: -98906s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exe TID: 2612Thread sleep time: -98796s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exe TID: 2612Thread sleep time: -98687s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exe TID: 2612Thread sleep time: -98578s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exe TID: 2612Thread sleep time: -98468s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exe TID: 2612Thread sleep time: -98359s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exe TID: 2612Thread sleep time: -98246s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exe TID: 2612Thread sleep time: -98078s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exe TID: 2612Thread sleep time: -97968s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exe TID: 2612Thread sleep time: -97859s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exe TID: 2612Thread sleep time: -97750s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exe TID: 2612Thread sleep time: -97640s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exe TID: 2612Thread sleep time: -97531s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exe TID: 2612Thread sleep time: -97421s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exe TID: 2612Thread sleep time: -97312s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exe TID: 2612Thread sleep time: -97202s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exe TID: 2612Thread sleep time: -97093s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exe TID: 2612Thread sleep time: -96984s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exe TID: 2612Thread sleep time: -96875s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exe TID: 2612Thread sleep time: -96765s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exe TID: 2612Thread sleep time: -99876s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exe TID: 2612Thread sleep time: -99751s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exe TID: 2612Thread sleep time: -99626s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exe TID: 2612Thread sleep time: -99501s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exe TID: 2612Thread sleep time: -99376s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exe TID: 2612Thread sleep time: -99251s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exe TID: 2612Thread sleep time: -99110s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exe TID: 2612Thread sleep time: -98918s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exe TID: 2612Thread sleep time: -98813s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exe TID: 2612Thread sleep time: -98704s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exe TID: 2612Thread sleep time: -98579s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exe TID: 2612Thread sleep time: -98454s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exe TID: 2612Thread sleep time: -98329s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exe TID: 2612Thread sleep time: -98204s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exe TID: 2612Thread sleep time: -98079s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exe TID: 2612Thread sleep time: -97954s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exe TID: 2612Thread sleep time: -97829s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exe TID: 2612Thread sleep time: -97704s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exe TID: 2612Thread sleep time: -97579s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeThread delayed: delay time: 100000Jump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeThread delayed: delay time: 99890Jump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeThread delayed: delay time: 99781Jump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeThread delayed: delay time: 99671Jump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeThread delayed: delay time: 99562Jump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeThread delayed: delay time: 99453Jump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeThread delayed: delay time: 99343Jump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeThread delayed: delay time: 99234Jump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeThread delayed: delay time: 99125Jump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeThread delayed: delay time: 99015Jump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeThread delayed: delay time: 98906Jump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeThread delayed: delay time: 98796Jump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeThread delayed: delay time: 98687Jump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeThread delayed: delay time: 98578Jump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeThread delayed: delay time: 98468Jump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeThread delayed: delay time: 98359Jump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeThread delayed: delay time: 98246Jump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeThread delayed: delay time: 98078Jump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeThread delayed: delay time: 97968Jump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeThread delayed: delay time: 97859Jump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeThread delayed: delay time: 97750Jump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeThread delayed: delay time: 97640Jump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeThread delayed: delay time: 97531Jump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeThread delayed: delay time: 97421Jump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeThread delayed: delay time: 97312Jump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeThread delayed: delay time: 97202Jump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeThread delayed: delay time: 97093Jump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeThread delayed: delay time: 96984Jump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeThread delayed: delay time: 96875Jump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeThread delayed: delay time: 96765Jump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeThread delayed: delay time: 99876Jump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeThread delayed: delay time: 99751Jump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeThread delayed: delay time: 99626Jump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeThread delayed: delay time: 99501Jump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeThread delayed: delay time: 99376Jump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeThread delayed: delay time: 99251Jump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeThread delayed: delay time: 99110Jump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeThread delayed: delay time: 98918Jump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeThread delayed: delay time: 98813Jump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeThread delayed: delay time: 98704Jump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeThread delayed: delay time: 98579Jump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeThread delayed: delay time: 98454Jump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeThread delayed: delay time: 98329Jump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeThread delayed: delay time: 98204Jump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeThread delayed: delay time: 98079Jump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeThread delayed: delay time: 97954Jump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeThread delayed: delay time: 97829Jump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeThread delayed: delay time: 97704Jump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeThread delayed: delay time: 97579Jump to behavior
                    Source: VG0x1LZCFb.exeBinary or memory string: hgfsZrw6
                    Source: VG0x1LZCFb.exe, 00000000.00000002.4564517320.0000000005AA0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeProcess information queried: ProcessInformationJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeMemory allocated: page read and write | page guardJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeQueries volume information: C:\Users\user\Desktop\VG0x1LZCFb.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: VG0x1LZCFb.exe, type: SAMPLE
                    Source: Yara matchFile source: 0.0.VG0x1LZCFb.exe.350000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000002.4562988090.00000000027C4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000000.2120961167.0000000000352000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.4562988090.00000000027A1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: VG0x1LZCFb.exe PID: 3212, type: MEMORYSTR
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\2o7hffxt.default-release\cookies.sqliteJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                    Source: C:\Users\user\Desktop\VG0x1LZCFb.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                    Source: Yara matchFile source: VG0x1LZCFb.exe, type: SAMPLE
                    Source: Yara matchFile source: 0.0.VG0x1LZCFb.exe.350000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000000.2120961167.0000000000352000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.4562988090.00000000027A1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: VG0x1LZCFb.exe PID: 3212, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: VG0x1LZCFb.exe, type: SAMPLE
                    Source: Yara matchFile source: 0.0.VG0x1LZCFb.exe.350000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000002.4562988090.00000000027C4000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000000.2120961167.0000000000352000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.4562988090.00000000027A1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: VG0x1LZCFb.exe PID: 3212, type: MEMORYSTR
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid Accounts121
                    Windows Management Instrumentation
                    1
                    DLL Side-Loading
                    1
                    DLL Side-Loading
                    1
                    Disable or Modify Tools
                    1
                    OS Credential Dumping
                    1
                    Query Registry
                    Remote Services1
                    Email Collection
                    11
                    Encrypted Channel
                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts141
                    Virtualization/Sandbox Evasion
                    21
                    Input Capture
                    111
                    Security Software Discovery
                    Remote Desktop Protocol21
                    Input Capture
                    1
                    Non-Standard Port
                    Exfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
                    Deobfuscate/Decode Files or Information
                    Security Account Manager1
                    Process Discovery
                    SMB/Windows Admin Shares11
                    Archive Collected Data
                    1
                    Ingress Tool Transfer
                    Automated ExfiltrationData Encrypted for Impact
                    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                    Obfuscated Files or Information
                    NTDS141
                    Virtualization/Sandbox Evasion
                    Distributed Component Object Model1
                    Data from Local System
                    2
                    Non-Application Layer Protocol
                    Traffic DuplicationData Destruction
                    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                    DLL Side-Loading
                    LSA Secrets1
                    Application Window Discovery
                    SSH1
                    Clipboard Data
                    23
                    Application Layer Protocol
                    Scheduled TransferData Encrypted for Impact
                    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials1
                    System Network Configuration Discovery
                    VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                    DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync1
                    File and Directory Discovery
                    Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                    Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem24
                    System Information Discovery
                    Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    VG0x1LZCFb.exe92%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
                    VG0x1LZCFb.exe100%AviraTR/Spy.Gen8
                    VG0x1LZCFb.exe100%Joe Sandbox ML
                    No Antivirus matches
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    https://api.ipify.org/0%URL Reputationsafe
                    https://api.ipify.org0%URL Reputationsafe
                    https://account.dyn.com/0%URL Reputationsafe
                    https://api.ipify.org/t0%URL Reputationsafe
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    expresscargoes.net
                    51.255.149.48
                    truetrue
                      unknown
                      api.ipify.org
                      104.26.13.205
                      truefalse
                        unknown
                        mail.expresscargoes.net
                        unknown
                        unknowntrue
                          unknown
                          NameMaliciousAntivirus DetectionReputation
                          https://api.ipify.org/false
                          • URL Reputation: safe
                          unknown
                          NameSourceMaliciousAntivirus DetectionReputation
                          https://api.ipify.orgVG0x1LZCFb.exefalse
                          • URL Reputation: safe
                          unknown
                          https://account.dyn.com/VG0x1LZCFb.exefalse
                          • URL Reputation: safe
                          unknown
                          https://api.ipify.org/tVG0x1LZCFb.exe, 00000000.00000002.4562988090.0000000002751000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameVG0x1LZCFb.exe, 00000000.00000002.4562988090.0000000002751000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          • No. of IPs < 25%
                          • 25% < No. of IPs < 50%
                          • 50% < No. of IPs < 75%
                          • 75% < No. of IPs
                          IPDomainCountryFlagASNASN NameMalicious
                          51.255.149.48
                          expresscargoes.netFrance
                          16276OVHFRtrue
                          104.26.13.205
                          api.ipify.orgUnited States
                          13335CLOUDFLARENETUSfalse
                          Joe Sandbox version:40.0.0 Tourmaline
                          Analysis ID:1466893
                          Start date and time:2024-07-03 14:50:04 +02:00
                          Joe Sandbox product:CloudBasic
                          Overall analysis duration:0h 6m 32s
                          Hypervisor based Inspection enabled:false
                          Report type:full
                          Cookbook file name:default.jbs
                          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                          Number of analysed new started processes analysed:7
                          Number of new started drivers analysed:0
                          Number of existing processes analysed:0
                          Number of existing drivers analysed:0
                          Number of injected processes analysed:0
                          Technologies:
                          • HCA enabled
                          • EGA enabled
                          • AMSI enabled
                          Analysis Mode:default
                          Analysis stop reason:Timeout
                          Sample name:VG0x1LZCFb.exe
                          renamed because original name is a hash value
                          Original Sample Name:906c1863777e91ff508ccb1758ee2f7bdec9cb59f0c251e0a1ddd64d9cc82548.exe
                          Detection:MAL
                          Classification:mal100.troj.spyw.evad.winEXE@1/0@2/2
                          EGA Information:
                          • Successful, ratio: 100%
                          HCA Information:
                          • Successful, ratio: 99%
                          • Number of executed functions: 64
                          • Number of non-executed functions: 4
                          Cookbook Comments:
                          • Found application associated with file extension: .exe
                          • Override analysis time to 240000 for current running targets taking high CPU consumption
                          • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                          • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                          • Report size getting too big, too many NtOpenKeyEx calls found.
                          • Report size getting too big, too many NtProtectVirtualMemory calls found.
                          • Report size getting too big, too many NtQueryValueKey calls found.
                          • Report size getting too big, too many NtReadVirtualMemory calls found.
                          • VT rate limit hit for: VG0x1LZCFb.exe
                          TimeTypeDescription
                          08:50:55API Interceptor11649211x Sleep call for process: VG0x1LZCFb.exe modified
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          51.255.149.48file.exeGet hashmaliciousUnknownBrowse
                            104.26.13.205242764.exeGet hashmaliciousFicker Stealer, Rusty StealerBrowse
                            • api.ipify.org/?format=wef
                            Ransom.exeGet hashmaliciousTargeted Ransomware, TrojanRansomBrowse
                            • api.ipify.org/
                            ld.exeGet hashmaliciousTargeted Ransomware, TrojanRansomBrowse
                            • api.ipify.org/
                            ReturnLegend.exeGet hashmaliciousStealitBrowse
                            • api.ipify.org/?format=json
                            SecuriteInfo.com.Trojan.DownLoaderNET.960.9931.28151.exeGet hashmaliciousPureLog Stealer, Targeted RansomwareBrowse
                            • api.ipify.org/
                            Sky-Beta-Setup.exeGet hashmaliciousStealitBrowse
                            • api.ipify.org/?format=json
                            ArenaWarSetup.exeGet hashmaliciousStealitBrowse
                            • api.ipify.org/?format=json
                            Sky-Beta Setup 1.0.0.exeGet hashmaliciousUnknownBrowse
                            • api.ipify.org/?format=json
                            E4sbo4F6Sz.exeGet hashmaliciousUnknownBrowse
                            • api.ipify.org/
                            E4sbo4F6Sz.exeGet hashmaliciousUnknownBrowse
                            • api.ipify.org/
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            api.ipify.orgq7r87KTHbc.exeGet hashmaliciousAgentTeslaBrowse
                            • 104.26.13.205
                            New Orders 116403.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                            • 172.67.74.152
                            TRANEXAMIC ACID & CAMPHANEDIOL SPECIFICATIONS.exeGet hashmaliciousAgentTeslaBrowse
                            • 104.26.12.205
                            Project_ref_03072024_pdf.exeGet hashmaliciousAgentTeslaBrowse
                            • 104.26.13.205
                            PI and payment confirmed pdf.exeGet hashmaliciousAgentTeslaBrowse
                            • 104.26.12.205
                            _Account Receipt.PDF.exeGet hashmaliciousAgentTeslaBrowse
                            • 104.26.13.205
                            2024.scr.exeGet hashmaliciousAgentTeslaBrowse
                            • 104.26.13.205
                            DHL AWB COMMERCAIL INVOICE AND TRACKING DETAILS.exeGet hashmaliciousAgentTeslaBrowse
                            • 104.26.13.205
                            B24E33 ENQUIRY.vbeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                            • 172.67.74.152
                            AWB 3609 961.pdf.scr.exeGet hashmaliciousAgentTeslaBrowse
                            • 172.67.74.152
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            CLOUDFLARENETUShttps://lnkd.in/exwPeXjcGet hashmaliciousHTMLPhisherBrowse
                            • 188.114.96.3
                            https://www-bbc-co-uk.cdn.ampproject.org/c/s/ANToniopneus.com.br/dayo/laits/captcha/ZGUud2l0dGUuYm9ub0BkZW1lLWdyb3VwLmNvbQ==$%C3%A3%E2%82%AC%E2%80%9AGet hashmaliciousHTMLPhisherBrowse
                            • 1.1.1.1
                            https://netorg40617-my.sharepoint.com/:o:/g/personal/negin_eeeasc_com/EkVB7FirdotMvG978qS6ihUB3Y22hA6ZH5YE34JME34-Pg?e=5%3aGZ1JUi&at=9Get hashmaliciousHTMLPhisherBrowse
                            • 1.1.1.1
                            https://hr.economictimes.indiatimes.com/etl.php?url=https:**Ahr.economictimes.indiatimes.com*etl.php*url=**Ayrtdtrdtyuikmmoix.pages.dev**Aemail=bWphY2tzb25AdHFsLmNvbQ==__;Ly8vPy8vIz8!!HkjQSg!xM0xOkWiB4abX6VJj84K1M3pVXJBP_GNPKTGuCBQdGUHkKmAbpL4OU1gL4uMAa_niGNzFWaU4aO2SbOw3s8pm3wmWgo$Get hashmaliciousUnknownBrowse
                            • 104.19.178.52
                            https://inpzk.useringimportdulcimer.ink/?=vxkncwole9Get hashmaliciousHTMLPhisherBrowse
                            • 104.17.3.184
                            https://netorg7716231-my.sharepoint.com/:f:/g/personal/schamness_jessenmfg_com/EpvvFD967V1ApGKFME3zg84BIzVZPMLc9RCaE7D0w7YFPA?e=hGdbPgGet hashmaliciousHTMLPhisherBrowse
                            • 104.17.2.184
                            https://u6071375.ct.sendgrid.net/ls/click?upn=u001.jNebCYco-2BJgBMGJDj1kJWP39IKixFvDeSBij1PLovvXT0hkMSWjEhuIEgwQ-2F309CwGFmoY6-2Bl45VLW7K9Sd8-2Fg-3D-3Dm1D8_bgsmQmhs-2BDkrnAcljUiGIti1-2F3303-2FliL2Lyr586-2FN9rAlBFKILfRyjObk6Iz5-2FtMSxC-2FhiWOZXbqnmzeZXBiy3CSpPIYxz2-2BTcFMtFX6z-2FFKaL9cuMNNsd9H8Soth9M-2BiGwIhw5kRyphke6a8RYyV0rtdDONsX7lNk6Cr796v-2FIJZ8nzBJ39o6b-2FDySakEM-2B9nvScrgUWzDogJp7LxfPQ-3D-3DGet hashmaliciousHTMLPhisherBrowse
                            • 104.18.10.212
                            http://www.cajamar-soporte.comGet hashmaliciousUnknownBrowse
                            • 188.114.96.3
                            1mXbuDDPbF.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                            • 188.114.97.3
                            k8TljgjfDl.exeGet hashmaliciousSnake KeyloggerBrowse
                            • 188.114.96.3
                            OVHFRhttps://us-east-2.protection.sophos.com/?d=beehiiv.com&u=aHR0cHM6Ly9saW5rLm1haWwuYmVlaGlpdi5jb20vbHMvY2xpY2s_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&i=NWNiNGNiOGY1NWZlOGIxMTAwZmUxN2Uy&t=YUVvbWN0aDQzMW4yV29uam9nK2tUNmU1dStvM2VicUNJeENiWDR5Zk1nTT0=&h=ddfea45e1610491898abc824d1dabad5&s=AVNPUEhUT0NFTkNSWVBUSVaKXvCVdmaYUeJ4sMCGgh9xhnT0RF3qCfPvI6ciaUbnMgGet hashmaliciousUnknownBrowse
                            • 66.70.176.204
                            https://hr.economictimes.indiatimes.com/etl.php?url=https://hr.economictimes.indiatimes.com/etl.php?url=//bgvhdjcbjfdhjkbgfddgfghgfd.pages.dev/#?email=dGVzdEB0ZXN0by5jb20=Get hashmaliciousUnknownBrowse
                            • 149.202.238.104
                            watchdog.elfGet hashmaliciousMiraiBrowse
                            • 142.44.221.54
                            spc.elfGet hashmaliciousMiraiBrowse
                            • 51.71.23.37
                            https://supp-review9482.eu/Get hashmaliciousUnknownBrowse
                            • 94.23.17.185
                            http://multichaindappsx.pages.dev/Get hashmaliciousUnknownBrowse
                            • 51.255.68.171
                            44zg1cvu.msgGet hashmaliciousHTMLPhisherBrowse
                            • 51.38.145.13
                            https://scanner.topsec.com/?d=3744&r=auto&u=https%3A%2F%2Fmaknastudio.com%2Fpkyos&t=a4fe2e96fe6815a71cc8a7f1ae1196e6fbcf1f08Get hashmaliciousHTMLPhisherBrowse
                            • 51.178.195.216
                            s.exeGet hashmaliciousScreenConnect ToolBrowse
                            • 51.77.100.220
                            s.exeGet hashmaliciousScreenConnect ToolBrowse
                            • 51.77.100.220
                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                            3b5074b1b5d032e5620f69f9f700ff0e1C769A32-2CBF-4738-9013-480E0434BAEF_06182024030338389.exeGet hashmaliciousScreenConnect ToolBrowse
                            • 104.26.13.205
                            https://lnkd.in/exwPeXjcGet hashmaliciousHTMLPhisherBrowse
                            • 104.26.13.205
                            https://inpzk.useringimportdulcimer.ink/?=vxkncwole9Get hashmaliciousHTMLPhisherBrowse
                            • 104.26.13.205
                            1C769A32-2CBF-4738-9013-480E0434BAEF_06182024030338389.exeGet hashmaliciousScreenConnect ToolBrowse
                            • 104.26.13.205
                            http://www.cajamar-soporte.comGet hashmaliciousUnknownBrowse
                            • 104.26.13.205
                            1mXbuDDPbF.exeGet hashmaliciousPureLog Stealer, Snake KeyloggerBrowse
                            • 104.26.13.205
                            k8TljgjfDl.exeGet hashmaliciousSnake KeyloggerBrowse
                            • 104.26.13.205
                            https://clickme.thryv.com/ls/click?upn=u001.Als7cfHaJU2yMdsJgpsIFhSZp6GshBFVdVLEzBsru52fhlDAZ8Q3OfCA-2F-2Bk2qB9l25yp_OEO3HRIZ3eedLymwLhvJt9sqs3j4T3CqpVCO9A0ZKplqH1W1Ad1lCPdQBrRfbSauZPLLCLTYBsXDRt8yGG5FOZ7NK342oFTufTBA9n-2F9XZM3qYZS8WARR8FVyg-2FqvoINWytiD-2FheyMDzu6v-2BoRt5KWyPoztbWkeGPmxB3DyZYTb9a0dAMPLFunr2Ay3ayAFAAvKLYcNXJh5TbSbsyQLthHxBhJhxiFX8keWC7AD3Hw3SgmU-2Be6lkIQuq7tgnHL9CbCr8GEaIyKgtaL1D3uFR7kdAbCakzZIHLBzzIP6uu3b9lr3L70N6m-2FPL5vz2WpJ-2B4Z2WkXjdKV6CAWTeZlidHHDlZecGQIcrIqiWGF6jpeY-3D#Dsonya.buzzard@aggregate.comGet hashmaliciousUnknownBrowse
                            • 104.26.13.205
                            q7r87KTHbc.exeGet hashmaliciousAgentTeslaBrowse
                            • 104.26.13.205
                            fKSLpv8s1v.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                            • 104.26.13.205
                            No context
                            No created / dropped files found
                            File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                            Entropy (8bit):5.0093666190893025
                            TrID:
                            • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                            • Win32 Executable (generic) a (10002005/4) 49.75%
                            • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                            • Windows Screen Saver (13104/52) 0.07%
                            • Generic Win/DOS Executable (2004/3) 0.01%
                            File name:VG0x1LZCFb.exe
                            File size:248'832 bytes
                            MD5:f0584ec3946ed12facabaae4789235b7
                            SHA1:f58a9f4ea1fb7aa409e029fcb0c976dc680ac034
                            SHA256:906c1863777e91ff508ccb1758ee2f7bdec9cb59f0c251e0a1ddd64d9cc82548
                            SHA512:ba3c56dcbf49102b7293f6e1e2543668ffc700a352208be48a388cdf03a09f85b7b7366a4e58f6d0f629d76b812822fa5a0efe8ffdb9c2010252e14d94515f19
                            SSDEEP:3072:rfznzvDu7CYtOsaPDUGAaVIPhVBrP2xtezLAf5spKS6hc:rfznzvDu7zOsu1IwLefAUKdh
                            TLSH:6334FE037E88EB15E5A87E3782EF6C2413F2B0C71633C60B6F49AE6518516426D7E72D
                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....Of................................. ........@.. .......................@............@................................
                            Icon Hash:00928e8e8686b000
                            Entrypoint:0x43e0fe
                            Entrypoint Section:.text
                            Digitally signed:false
                            Imagebase:0x400000
                            Subsystem:windows gui
                            Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                            Time Stamp:0x664F00EA [Thu May 23 08:40:10 2024 UTC]
                            TLS Callbacks:
                            CLR (.Net) Version:
                            OS Version Major:4
                            OS Version Minor:0
                            File Version Major:4
                            File Version Minor:0
                            Subsystem Version Major:4
                            Subsystem Version Minor:0
                            Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                            Instruction
                            jmp dword ptr [00402000h]
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            add byte ptr [eax], al
                            NameVirtual AddressVirtual Size Is in Section
                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IMPORT0x3e0a80x53.text
                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x400000x546.rsrc
                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x420000xc.reloc
                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                            .text0x20000x3c1040x3c2001662ff8de3986c2ef093b32386749986False0.3580512603950104data5.020659103859821IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                            .rsrc0x400000x5460x600c9aac46056b95e6c552f0c78f7a87f9cFalse0.3990885416666667data3.9922933899819766IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                            .reloc0x420000xc0x20007132586ab33dc2b707c51e01c65522aFalse0.041015625data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                            NameRVASizeTypeLanguageCountryZLIB Complexity
                            RT_VERSION0x400a00x2bcdata0.44142857142857145
                            RT_MANIFEST0x4035c0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5469387755102041
                            DLLImport
                            mscoree.dll_CorExeMain
                            TimestampSource PortDest PortSource IPDest IP
                            Jul 3, 2024 14:50:55.727543116 CEST49710443192.168.2.6104.26.13.205
                            Jul 3, 2024 14:50:55.727572918 CEST44349710104.26.13.205192.168.2.6
                            Jul 3, 2024 14:50:55.727660894 CEST49710443192.168.2.6104.26.13.205
                            Jul 3, 2024 14:50:55.735373020 CEST49710443192.168.2.6104.26.13.205
                            Jul 3, 2024 14:50:55.735388994 CEST44349710104.26.13.205192.168.2.6
                            Jul 3, 2024 14:50:56.222157001 CEST44349710104.26.13.205192.168.2.6
                            Jul 3, 2024 14:50:56.222270966 CEST49710443192.168.2.6104.26.13.205
                            Jul 3, 2024 14:50:56.225907087 CEST49710443192.168.2.6104.26.13.205
                            Jul 3, 2024 14:50:56.225914955 CEST44349710104.26.13.205192.168.2.6
                            Jul 3, 2024 14:50:56.226151943 CEST44349710104.26.13.205192.168.2.6
                            Jul 3, 2024 14:50:56.268258095 CEST49710443192.168.2.6104.26.13.205
                            Jul 3, 2024 14:50:56.296401024 CEST49710443192.168.2.6104.26.13.205
                            Jul 3, 2024 14:50:56.340507984 CEST44349710104.26.13.205192.168.2.6
                            Jul 3, 2024 14:50:56.409030914 CEST44349710104.26.13.205192.168.2.6
                            Jul 3, 2024 14:50:56.409082890 CEST44349710104.26.13.205192.168.2.6
                            Jul 3, 2024 14:50:56.409133911 CEST49710443192.168.2.6104.26.13.205
                            Jul 3, 2024 14:50:56.429538965 CEST49710443192.168.2.6104.26.13.205
                            Jul 3, 2024 14:50:57.054249048 CEST49711587192.168.2.651.255.149.48
                            Jul 3, 2024 14:50:57.059155941 CEST5874971151.255.149.48192.168.2.6
                            Jul 3, 2024 14:50:57.059228897 CEST49711587192.168.2.651.255.149.48
                            Jul 3, 2024 14:50:57.973027945 CEST5874971151.255.149.48192.168.2.6
                            Jul 3, 2024 14:50:57.974553108 CEST49711587192.168.2.651.255.149.48
                            Jul 3, 2024 14:50:57.979518890 CEST5874971151.255.149.48192.168.2.6
                            Jul 3, 2024 14:50:58.154546976 CEST5874971151.255.149.48192.168.2.6
                            Jul 3, 2024 14:50:58.156016111 CEST49711587192.168.2.651.255.149.48
                            Jul 3, 2024 14:50:58.160872936 CEST5874971151.255.149.48192.168.2.6
                            Jul 3, 2024 14:50:58.331581116 CEST5874971151.255.149.48192.168.2.6
                            Jul 3, 2024 14:50:58.332674980 CEST49711587192.168.2.651.255.149.48
                            Jul 3, 2024 14:50:58.338809967 CEST5874971151.255.149.48192.168.2.6
                            Jul 3, 2024 14:51:00.142119884 CEST5874971151.255.149.48192.168.2.6
                            Jul 3, 2024 14:51:00.142524958 CEST49711587192.168.2.651.255.149.48
                            Jul 3, 2024 14:51:00.147452116 CEST5874971151.255.149.48192.168.2.6
                            Jul 3, 2024 14:51:00.317382097 CEST5874971151.255.149.48192.168.2.6
                            Jul 3, 2024 14:51:00.317859888 CEST5874971151.255.149.48192.168.2.6
                            Jul 3, 2024 14:51:00.317930937 CEST49711587192.168.2.651.255.149.48
                            Jul 3, 2024 14:51:00.323214054 CEST49711587192.168.2.651.255.149.48
                            Jul 3, 2024 14:51:00.328083992 CEST5874971151.255.149.48192.168.2.6
                            Jul 3, 2024 14:51:00.374967098 CEST49713587192.168.2.651.255.149.48
                            Jul 3, 2024 14:51:00.380074978 CEST5874971351.255.149.48192.168.2.6
                            Jul 3, 2024 14:51:00.380163908 CEST49713587192.168.2.651.255.149.48
                            Jul 3, 2024 14:51:01.554433107 CEST5874971351.255.149.48192.168.2.6
                            Jul 3, 2024 14:51:01.554586887 CEST49713587192.168.2.651.255.149.48
                            Jul 3, 2024 14:51:01.560247898 CEST5874971351.255.149.48192.168.2.6
                            Jul 3, 2024 14:51:01.736784935 CEST5874971351.255.149.48192.168.2.6
                            Jul 3, 2024 14:51:01.737015963 CEST49713587192.168.2.651.255.149.48
                            Jul 3, 2024 14:51:01.742324114 CEST5874971351.255.149.48192.168.2.6
                            Jul 3, 2024 14:51:05.944520950 CEST5874971351.255.149.48192.168.2.6
                            Jul 3, 2024 14:51:05.944825888 CEST49713587192.168.2.651.255.149.48
                            Jul 3, 2024 14:51:05.952310085 CEST5874971351.255.149.48192.168.2.6
                            Jul 3, 2024 14:51:08.499800920 CEST5874971351.255.149.48192.168.2.6
                            Jul 3, 2024 14:51:08.502593040 CEST49713587192.168.2.651.255.149.48
                            Jul 3, 2024 14:51:08.507616997 CEST5874971351.255.149.48192.168.2.6
                            Jul 3, 2024 14:51:08.693523884 CEST5874971351.255.149.48192.168.2.6
                            Jul 3, 2024 14:51:08.693852901 CEST49713587192.168.2.651.255.149.48
                            Jul 3, 2024 14:51:08.694345951 CEST5874971351.255.149.48192.168.2.6
                            Jul 3, 2024 14:51:08.694422007 CEST49713587192.168.2.651.255.149.48
                            Jul 3, 2024 14:51:08.698677063 CEST5874971351.255.149.48192.168.2.6
                            TimestampSource PortDest PortSource IPDest IP
                            Jul 3, 2024 14:50:55.715183973 CEST5420653192.168.2.61.1.1.1
                            Jul 3, 2024 14:50:55.722693920 CEST53542061.1.1.1192.168.2.6
                            Jul 3, 2024 14:50:57.022212982 CEST6427853192.168.2.61.1.1.1
                            Jul 3, 2024 14:50:57.053117990 CEST53642781.1.1.1192.168.2.6
                            Jul 3, 2024 14:51:16.807754040 CEST53602401.1.1.1192.168.2.6
                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                            Jul 3, 2024 14:50:55.715183973 CEST192.168.2.61.1.1.10xc37dStandard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                            Jul 3, 2024 14:50:57.022212982 CEST192.168.2.61.1.1.10x1b41Standard query (0)mail.expresscargoes.netA (IP address)IN (0x0001)false
                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                            Jul 3, 2024 14:50:55.722693920 CEST1.1.1.1192.168.2.60xc37dNo error (0)api.ipify.org104.26.13.205A (IP address)IN (0x0001)false
                            Jul 3, 2024 14:50:55.722693920 CEST1.1.1.1192.168.2.60xc37dNo error (0)api.ipify.org104.26.12.205A (IP address)IN (0x0001)false
                            Jul 3, 2024 14:50:55.722693920 CEST1.1.1.1192.168.2.60xc37dNo error (0)api.ipify.org172.67.74.152A (IP address)IN (0x0001)false
                            Jul 3, 2024 14:50:57.053117990 CEST1.1.1.1192.168.2.60x1b41No error (0)mail.expresscargoes.netexpresscargoes.netCNAME (Canonical name)IN (0x0001)false
                            Jul 3, 2024 14:50:57.053117990 CEST1.1.1.1192.168.2.60x1b41No error (0)expresscargoes.net51.255.149.48A (IP address)IN (0x0001)false
                            • api.ipify.org
                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                            0192.168.2.649710104.26.13.2054433212C:\Users\user\Desktop\VG0x1LZCFb.exe
                            TimestampBytes transferredDirectionData
                            2024-07-03 12:50:56 UTC155OUTGET / HTTP/1.1
                            User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                            Host: api.ipify.org
                            Connection: Keep-Alive
                            2024-07-03 12:50:56 UTC211INHTTP/1.1 200 OK
                            Date: Wed, 03 Jul 2024 12:50:56 GMT
                            Content-Type: text/plain
                            Content-Length: 11
                            Connection: close
                            Vary: Origin
                            CF-Cache-Status: DYNAMIC
                            Server: cloudflare
                            CF-RAY: 89d7010e28594326-EWR
                            2024-07-03 12:50:56 UTC11INData Raw: 38 2e 34 36 2e 31 32 33 2e 33 33
                            Data Ascii: 8.46.123.33


                            TimestampSource PortDest PortSource IPDest IPCommands
                            Jul 3, 2024 14:50:57.973027945 CEST5874971151.255.149.48192.168.2.6220-gra109.truehost.cloud ESMTP Exim 4.96.2 #2 Wed, 03 Jul 2024 15:50:57 +0300
                            220-We do not authorize the use of this system to transport unsolicited,
                            220 and/or bulk e-mail.
                            Jul 3, 2024 14:50:57.974553108 CEST49711587192.168.2.651.255.149.48EHLO 992547
                            Jul 3, 2024 14:50:58.154546976 CEST5874971151.255.149.48192.168.2.6250-gra109.truehost.cloud Hello 992547 [8.46.123.33]
                            250-SIZE 52428800
                            250-8BITMIME
                            250-PIPELINING
                            250-PIPECONNECT
                            250-AUTH PLAIN LOGIN
                            250-STARTTLS
                            250 HELP
                            Jul 3, 2024 14:50:58.156016111 CEST49711587192.168.2.651.255.149.48AUTH login bm9yZXBseUBleHByZXNzY2FyZ29lcy5uZXQ=
                            Jul 3, 2024 14:50:58.331581116 CEST5874971151.255.149.48192.168.2.6334 UGFzc3dvcmQ6
                            Jul 3, 2024 14:51:00.142119884 CEST5874971151.255.149.48192.168.2.6535 Incorrect authentication data
                            Jul 3, 2024 14:51:00.142524958 CEST49711587192.168.2.651.255.149.48MAIL FROM:<noreply@expresscargoes.net>
                            Jul 3, 2024 14:51:00.317382097 CEST5874971151.255.149.48192.168.2.6550 Access denied - Invalid HELO name (See RFC2821 4.1.1.1)
                            Jul 3, 2024 14:51:01.554433107 CEST5874971351.255.149.48192.168.2.6220-gra109.truehost.cloud ESMTP Exim 4.96.2 #2 Wed, 03 Jul 2024 15:51:01 +0300
                            220-We do not authorize the use of this system to transport unsolicited,
                            220 and/or bulk e-mail.
                            Jul 3, 2024 14:51:01.554586887 CEST49713587192.168.2.651.255.149.48EHLO 992547
                            Jul 3, 2024 14:51:01.736784935 CEST5874971351.255.149.48192.168.2.6250-gra109.truehost.cloud Hello 992547 [8.46.123.33]
                            250-SIZE 52428800
                            250-8BITMIME
                            250-PIPELINING
                            250-PIPECONNECT
                            250-AUTH PLAIN LOGIN
                            250-STARTTLS
                            250 HELP
                            Jul 3, 2024 14:51:01.737015963 CEST49713587192.168.2.651.255.149.48AUTH login bm9yZXBseUBleHByZXNzY2FyZ29lcy5uZXQ=
                            Jul 3, 2024 14:51:05.944520950 CEST5874971351.255.149.48192.168.2.6334 UGFzc3dvcmQ6
                            Jul 3, 2024 14:51:08.499800920 CEST5874971351.255.149.48192.168.2.6535 Incorrect authentication data
                            Jul 3, 2024 14:51:08.502593040 CEST49713587192.168.2.651.255.149.48MAIL FROM:<noreply@expresscargoes.net>
                            Jul 3, 2024 14:51:08.693523884 CEST5874971351.255.149.48192.168.2.6550 Access denied - Invalid HELO name (See RFC2821 4.1.1.1)

                            Click to jump to process

                            Click to jump to process

                            Click to dive into process behavior distribution

                            Target ID:0
                            Start time:08:50:53
                            Start date:03/07/2024
                            Path:C:\Users\user\Desktop\VG0x1LZCFb.exe
                            Wow64 process (32bit):true
                            Commandline:"C:\Users\user\Desktop\VG0x1LZCFb.exe"
                            Imagebase:0x350000
                            File size:248'832 bytes
                            MD5 hash:F0584EC3946ED12FACABAAE4789235B7
                            Has elevated privileges:true
                            Has administrator privileges:true
                            Programmed in:C, C++ or other language
                            Yara matches:
                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.4562988090.00000000027C4000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000000.2120961167.0000000000352000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000000.2120961167.0000000000352000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.4562988090.00000000027A1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.4562988090.00000000027A1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                            Reputation:low
                            Has exited:false

                            Reset < >

                              Execution Graph

                              Execution Coverage:15.4%
                              Dynamic/Decrypted Code Coverage:100%
                              Signature Coverage:5.6%
                              Total number of Nodes:71
                              Total number of Limit Nodes:6
                              execution_graph 27070 6a137a0 27071 6a13805 27070->27071 27072 6a13c68 WaitMessage 27071->27072 27073 6a13852 27071->27073 27072->27071 27074 630f84a 27075 630f892 27074->27075 27076 630f898 GetModuleHandleW 27074->27076 27075->27076 27077 630f8c5 27076->27077 27078 d70848 27079 d7084e 27078->27079 27080 d7091b 27079->27080 27083 d71380 27079->27083 27092 d7148a 27079->27092 27085 d71396 27083->27085 27084 d71480 27084->27079 27085->27084 27091 d7148a 4 API calls 27085->27091 27102 630d860 27085->27102 27106 630d850 27085->27106 27110 d77d2c 27085->27110 27114 d77d98 27085->27114 27118 d77eb0 27085->27118 27091->27085 27094 d71396 27092->27094 27095 d71493 27092->27095 27093 d71480 27093->27079 27094->27093 27096 d7148a 4 API calls 27094->27096 27097 630d860 GetModuleHandleW 27094->27097 27098 630d850 GetModuleHandleW 27094->27098 27099 d77eb0 3 API calls 27094->27099 27100 d77d2c 3 API calls 27094->27100 27101 d77d98 3 API calls 27094->27101 27095->27079 27096->27094 27097->27094 27098->27094 27099->27094 27100->27094 27101->27094 27103 630d872 27102->27103 27105 630d8e9 27103->27105 27125 630d05c 27103->27125 27105->27085 27107 630d860 27106->27107 27108 630d05c GetModuleHandleW 27107->27108 27109 630d8e9 27107->27109 27108->27109 27109->27085 27112 d77dae 27110->27112 27111 d77f1a 27111->27085 27112->27111 27142 6309b8f 27112->27142 27116 d77dae 27114->27116 27115 d77f1a 27115->27085 27116->27115 27117 6309b8f 3 API calls 27116->27117 27117->27115 27119 d77eba 27118->27119 27121 d77ed4 27119->27121 27123 63080c8 3 API calls 27119->27123 27151 63080b7 27119->27151 27120 d77f1a 27120->27085 27121->27120 27124 6309b8f 3 API calls 27121->27124 27123->27121 27124->27120 27126 630d067 27125->27126 27130 630ea13 27126->27130 27134 630ea28 27126->27134 27127 630daca 27127->27105 27131 630ea28 27130->27131 27133 630eb02 27131->27133 27138 630de4c 27131->27138 27135 630ea53 27134->27135 27136 630de4c GetModuleHandleW 27135->27136 27137 630eb02 27135->27137 27136->27137 27139 630f850 GetModuleHandleW 27138->27139 27141 630f8c5 27139->27141 27141->27133 27143 6309b9a 27142->27143 27146 63080c8 27143->27146 27145 6309ba1 27145->27111 27147 63080dd 27146->27147 27148 63082f2 27147->27148 27149 6308720 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 27147->27149 27150 6308710 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 27147->27150 27148->27145 27149->27147 27150->27147 27153 63080dd 27151->27153 27152 63082f2 27152->27121 27153->27152 27154 6308710 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 27153->27154 27155 6308720 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 27153->27155 27154->27153 27155->27153
                              Memory Dump Source
                              • Source File: 00000000.00000002.4562677539.0000000000D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D70000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d70000_VG0x1LZCFb.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: a8a4d47c00a2da28318af1a733dc25182b33059dbe1212521702f73fe6257b7f
                              • Instruction ID: 17a0aadf5a095c4f2dc4873cb1d54737600371e693c474e2beb237b6c3b9eedb
                              • Opcode Fuzzy Hash: a8a4d47c00a2da28318af1a733dc25182b33059dbe1212521702f73fe6257b7f
                              • Instruction Fuzzy Hash: 1B630931D10B1A8ADB11EF68C8806A9F7B1FF99300F55D79AE45877121FB70AAC5CB81
                              Memory Dump Source
                              • Source File: 00000000.00000002.4562677539.0000000000D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D70000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d70000_VG0x1LZCFb.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: c79be92f785d5b375fd0889ff6b5a00d92097bd98e92af406099c5906db572ed
                              • Instruction ID: 7280df9eb0a08f9e985b268f87ce3f8ab0129cc82aad159860760523c3f7e026
                              • Opcode Fuzzy Hash: c79be92f785d5b375fd0889ff6b5a00d92097bd98e92af406099c5906db572ed
                              • Instruction Fuzzy Hash: 31331C31D107198ADB11EF68C8806ADF7B1FF99300F15C79AE459A7221FB70AAC5CB91

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1052 6a137a0-6a13803 1053 6a13832-6a13850 1052->1053 1054 6a13805-6a1382f 1052->1054 1059 6a13852-6a13854 1053->1059 1060 6a13859-6a13890 1053->1060 1054->1053 1062 6a13d12-6a13d27 1059->1062 1064 6a13cc1 1060->1064 1065 6a13896-6a138aa 1060->1065 1068 6a13cc6-6a13cdc 1064->1068 1066 6a138d9-6a138f8 1065->1066 1067 6a138ac-6a138d6 1065->1067 1074 6a13910-6a13912 1066->1074 1075 6a138fa-6a13900 1066->1075 1067->1066 1068->1062 1079 6a13931-6a1393a 1074->1079 1080 6a13914-6a1392c 1074->1080 1077 6a13902 1075->1077 1078 6a13904-6a13906 1075->1078 1077->1074 1078->1074 1081 6a13942-6a13949 1079->1081 1080->1068 1082 6a13953-6a1395a 1081->1082 1083 6a1394b-6a13951 1081->1083 1085 6a13964 1082->1085 1086 6a1395c-6a13962 1082->1086 1084 6a13967-6a13984 call 6a124d8 1083->1084 1089 6a13ad9-6a13add 1084->1089 1090 6a1398a-6a13991 1084->1090 1085->1084 1086->1084 1092 6a13ae3-6a13ae7 1089->1092 1093 6a13cac-6a13cbf 1089->1093 1090->1064 1091 6a13997-6a139d4 1090->1091 1101 6a13ca2-6a13ca6 1091->1101 1102 6a139da-6a139df 1091->1102 1094 6a13b01-6a13b0a 1092->1094 1095 6a13ae9-6a13afc 1092->1095 1093->1068 1096 6a13b39-6a13b40 1094->1096 1097 6a13b0c-6a13b36 1094->1097 1095->1068 1099 6a13b46-6a13b4d 1096->1099 1100 6a13bdf-6a13be6 1096->1100 1097->1096 1104 6a13b7c-6a13b9e 1099->1104 1105 6a13b4f-6a13b79 1099->1105 1109 6a13bef-6a13bf4 1100->1109 1101->1081 1101->1093 1106 6a13a11-6a13a26 call 6a13398 1102->1106 1107 6a139e1-6a139e8 call 6a124e4 1102->1107 1104->1100 1142 6a13ba0-6a13baa 1104->1142 1105->1104 1112 6a13a2b-6a13a2f 1106->1112 1116 6a139ed-6a139ef 1107->1116 1109->1101 1114 6a13bfa-6a13bfc 1109->1114 1117 6a13a31-6a13a43 call 6a133a4 1112->1117 1118 6a13aa0-6a13aad 1112->1118 1119 6a13c49-6a13c66 call 6a124d8 1114->1119 1120 6a13bfe-6a13c37 1114->1120 1116->1106 1121 6a139f1-6a13a0f call 6a1338c 1116->1121 1145 6a13a83-6a13a9b 1117->1145 1146 6a13a45-6a13a75 1117->1146 1118->1101 1134 6a13ab3-6a13abd call 6a133b4 1118->1134 1119->1101 1133 6a13c68-6a13c94 WaitMessage 1119->1133 1137 6a13c40-6a13c47 1120->1137 1138 6a13c39-6a13c3f 1120->1138 1121->1112 1139 6a13c96 1133->1139 1140 6a13c9b 1133->1140 1148 6a13acc-6a13ad4 call 6a133cc 1134->1148 1149 6a13abf-6a13ac7 call 6a133c0 1134->1149 1137->1101 1138->1137 1139->1140 1140->1101 1153 6a13bc2-6a13bdd 1142->1153 1154 6a13bac-6a13bb2 1142->1154 1145->1068 1160 6a13a77 1146->1160 1161 6a13a7c 1146->1161 1148->1101 1149->1101 1153->1100 1153->1142 1158 6a13bb4 1154->1158 1159 6a13bb6-6a13bb8 1154->1159 1158->1153 1159->1153 1160->1161 1161->1145
                              Memory Dump Source
                              • Source File: 00000000.00000002.4565343740.0000000006A10000.00000040.00000800.00020000.00000000.sdmp, Offset: 06A10000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6a10000_VG0x1LZCFb.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 304418a7dff9cae8b9b867b01de90e70b6b5f1f1f85c0e86d2a715d80ba44049
                              • Instruction ID: af41ae4f6d12a14b067cdbcb29213b025eadd064a1a034f7db2d1c4098e17b58
                              • Opcode Fuzzy Hash: 304418a7dff9cae8b9b867b01de90e70b6b5f1f1f85c0e86d2a715d80ba44049
                              • Instruction Fuzzy Hash: D3F11830E00219CFEF54EFA9C948B9DBBB2BF48314F158559E405AF265DB71E949CB80

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1164 63033a0-63033bd 1165 63033bf-63033c2 1164->1165 1166 63033c4-63033c5 1165->1166 1167 63033ca-63033cd 1165->1167 1166->1167 1168 6303408-630340b 1167->1168 1169 63033cf-63033d5 1167->1169 1172 6303411-6303414 1168->1172 1173 630349e-63034a4 1168->1173 1170 63033db-63033e6 1169->1170 1171 630357f-6303590 1169->1171 1170->1171 1175 63033ec-63033f9 1170->1175 1188 63035b0 1171->1188 1189 6303592-63035ab 1171->1189 1176 6303423-6303426 1172->1176 1177 6303416-630341c 1172->1177 1173->1169 1174 63034aa 1173->1174 1181 63034af-63034b2 1174->1181 1175->1171 1182 63033ff-6303403 1175->1182 1178 6303433-6303436 1176->1178 1179 6303428-630342e 1176->1179 1183 6303493-6303494 1177->1183 1184 630341e 1177->1184 1186 6303446-6303449 1178->1186 1187 6303438-630343b 1178->1187 1179->1178 1190 63034b4-63034c5 1181->1190 1191 63034ca-63034cd 1181->1191 1182->1168 1185 6303499-630349c 1183->1185 1184->1176 1185->1173 1185->1181 1194 6303453-6303456 1186->1194 1195 630344b-6303450 1186->1195 1192 6303441 1187->1192 1193 6303508-6303516 1187->1193 1199 63035b5-63035b8 1188->1199 1189->1188 1190->1191 1196 63034d4-63034d7 1191->1196 1197 63034cf-63034d1 1191->1197 1192->1186 1203 630351d-6303520 1193->1203 1194->1187 1198 6303458-630345b 1194->1198 1195->1194 1201 63034f3-63034f6 1196->1201 1202 63034d9-63034ee 1196->1202 1197->1196 1204 6303467-630346a 1198->1204 1205 630345d-6303466 1198->1205 1206 63035c2-63035c5 1199->1206 1207 63035ba-63035c1 1199->1207 1208 6303503-6303506 1201->1208 1209 63034f8-63034fc 1201->1209 1202->1201 1212 6303525-6303528 1203->1212 1213 630346c-6303489 1204->1213 1214 630348e-6303491 1204->1214 1215 63035e7-63035ea 1206->1215 1216 63035c7-63035cb 1206->1216 1208->1193 1208->1212 1210 6303571-630357e 1209->1210 1211 63034fe 1209->1211 1211->1208 1218 6303545-6303548 1212->1218 1219 630352a-6303540 1212->1219 1213->1214 1214->1183 1214->1185 1222 63035fb-63035fe 1215->1222 1223 63035ec-63035f6 1215->1223 1220 63035d1-63035d9 1216->1220 1221 63036a2-63036dc 1216->1221 1226 630354a-630355a 1218->1226 1227 630355f-6303561 1218->1227 1219->1218 1220->1221 1229 63035df-63035e2 1220->1229 1242 63036de-63036e1 1221->1242 1224 6303620-6303623 1222->1224 1225 6303600-6303604 1222->1225 1223->1222 1232 6303625-6303629 1224->1232 1233 630363d-6303640 1224->1233 1225->1221 1231 630360a-6303612 1225->1231 1226->1227 1236 6303563 1227->1236 1237 6303568-630356b 1227->1237 1229->1215 1231->1221 1238 6303618-630361b 1231->1238 1232->1221 1239 630362b-6303633 1232->1239 1240 6303642-6303646 1233->1240 1241 630365a-630365d 1233->1241 1236->1237 1237->1165 1237->1210 1238->1224 1239->1221 1245 6303635-6303638 1239->1245 1240->1221 1246 6303648-6303650 1240->1246 1249 6303675-6303678 1241->1249 1250 630365f-6303670 1241->1250 1247 63036e3-63036f4 1242->1247 1248 63036fb-63036fe 1242->1248 1245->1233 1246->1221 1255 6303652-6303655 1246->1255 1267 6303750-6303757 1247->1267 1268 63036f6 1247->1268 1251 6303700-6303711 1248->1251 1252 6303718-630371b 1248->1252 1253 6303688-630368a 1249->1253 1254 630367a-6303681 1249->1254 1250->1249 1269 6303761-6303774 1251->1269 1270 6303713 1251->1270 1261 6303729-630372c 1252->1261 1262 630371d-6303724 1252->1262 1259 6303691-6303694 1253->1259 1260 630368c 1253->1260 1257 6303683 1254->1257 1258 630369a-63036a1 1254->1258 1255->1241 1257->1253 1259->1199 1259->1258 1260->1259 1265 630379d-6303931 1261->1265 1266 630372e-6303731 1261->1266 1262->1261 1315 6303a67-6303a7a 1265->1315 1316 6303937-630393e 1265->1316 1271 6303733-6303744 1266->1271 1272 630374b-630374e 1266->1272 1273 630375c-630375f 1267->1273 1268->1248 1270->1252 1278 630377c-630378d 1271->1278 1281 6303746 1271->1281 1272->1267 1272->1273 1273->1269 1274 6303777-630377a 1273->1274 1277 6303794-6303797 1274->1277 1274->1278 1277->1265 1280 6303a7d-6303a80 1277->1280 1278->1267 1285 630378f 1278->1285 1280->1265 1284 6303a86-6303a89 1280->1284 1281->1272 1286 6303a93-6303a96 1284->1286 1287 6303a8b-6303a90 1284->1287 1285->1277 1289 6303ab4-6303ab6 1286->1289 1290 6303a98-6303aa9 1286->1290 1287->1286 1292 6303ab8 1289->1292 1293 6303abd-6303ac0 1289->1293 1290->1267 1297 6303aaf 1290->1297 1292->1293 1293->1242 1294 6303ac6-6303acf 1293->1294 1297->1289 1317 63039f2-63039f9 1316->1317 1318 6303944-6303967 1316->1318 1317->1315 1319 63039fb-6303a2e 1317->1319 1327 630396f-6303977 1318->1327 1331 6303a30 1319->1331 1332 6303a33-6303a60 1319->1332 1328 6303979 1327->1328 1329 630397c-63039bd 1327->1329 1328->1329 1340 63039d5-63039e6 1329->1340 1341 63039bf-63039d0 1329->1341 1331->1332 1332->1294 1340->1294 1341->1294
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4564808822.0000000006300000.00000040.00000800.00020000.00000000.sdmp, Offset: 06300000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6300000_VG0x1LZCFb.jbxd
                              Similarity
                              • API ID:
                              • String ID: $
                              • API String ID: 0-3993045852
                              • Opcode ID: 708b531eacbe1d4d4af5ec137db8f8d2bbb68758acf9bce56354e1a19d4725b6
                              • Instruction ID: cfcbfaf8fa12d39fef5dfc3a46a33382faac665e4e2e36077d2262bf0bf4e312
                              • Opcode Fuzzy Hash: 708b531eacbe1d4d4af5ec137db8f8d2bbb68758acf9bce56354e1a19d4725b6
                              • Instruction Fuzzy Hash: 1022BF35F0024A9FEF64DFA4C5A06AEBBB2EF85310F208469D455AB391DB35DC49CB90
                              Memory Dump Source
                              • Source File: 00000000.00000002.4564808822.0000000006300000.00000040.00000800.00020000.00000000.sdmp, Offset: 06300000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6300000_VG0x1LZCFb.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 845bb34c353c074c6a46d1f5d9fa7b612ce5ab7364dace44936c5b18c4f0a3a5
                              • Instruction ID: 2f416a4c8900ee40eb5aa0236cd9ac55c19ddc619ddd939e72f397037e73dbdf
                              • Opcode Fuzzy Hash: 845bb34c353c074c6a46d1f5d9fa7b612ce5ab7364dace44936c5b18c4f0a3a5
                              • Instruction Fuzzy Hash: B6E21934E00209CFEB64DB68C594B9DB7B2EF85300F5485A9D449AB391EB35ED89CF90

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1973 d73e80-d73ee6 1975 d73f30-d73f32 1973->1975 1976 d73ee8-d73ef3 1973->1976 1978 d73f34-d73f8c 1975->1978 1976->1975 1977 d73ef5-d73f01 1976->1977 1979 d73f24-d73f2e 1977->1979 1980 d73f03-d73f0d 1977->1980 1987 d73fd6-d73fd8 1978->1987 1988 d73f8e-d73f99 1978->1988 1979->1978 1981 d73f11-d73f20 1980->1981 1982 d73f0f 1980->1982 1981->1981 1984 d73f22 1981->1984 1982->1981 1984->1979 1990 d73fda-d73ff2 1987->1990 1988->1987 1989 d73f9b-d73fa7 1988->1989 1991 d73fca-d73fd4 1989->1991 1992 d73fa9-d73fb3 1989->1992 1997 d73ff4-d73fff 1990->1997 1998 d7403c-d7403e 1990->1998 1991->1990 1993 d73fb7-d73fc6 1992->1993 1994 d73fb5 1992->1994 1993->1993 1996 d73fc8 1993->1996 1994->1993 1996->1991 1997->1998 2000 d74001-d7400d 1997->2000 1999 d74040-d7408e 1998->1999 2008 d74094-d740a2 1999->2008 2001 d74030-d7403a 2000->2001 2002 d7400f-d74019 2000->2002 2001->1999 2003 d7401d-d7402c 2002->2003 2004 d7401b 2002->2004 2003->2003 2006 d7402e 2003->2006 2004->2003 2006->2001 2009 d740a4-d740aa 2008->2009 2010 d740ab-d7410b 2008->2010 2009->2010 2017 d7410d-d74111 2010->2017 2018 d7411b-d7411f 2010->2018 2017->2018 2021 d74113 2017->2021 2019 d74121-d74125 2018->2019 2020 d7412f-d74133 2018->2020 2019->2020 2022 d74127-d7412a call d70ab8 2019->2022 2023 d74135-d74139 2020->2023 2024 d74143-d74147 2020->2024 2021->2018 2022->2020 2023->2024 2026 d7413b-d7413e call d70ab8 2023->2026 2027 d74157-d7415b 2024->2027 2028 d74149-d7414d 2024->2028 2026->2024 2031 d7415d-d74161 2027->2031 2032 d7416b-d7416f 2027->2032 2028->2027 2030 d7414f-d74152 call d70ab8 2028->2030 2030->2027 2031->2032 2036 d74163 2031->2036 2033 d74171-d74175 2032->2033 2034 d7417f 2032->2034 2033->2034 2037 d74177 2033->2037 2038 d74180 2034->2038 2036->2032 2037->2034 2038->2038
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4562677539.0000000000D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D70000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d70000_VG0x1LZCFb.jbxd
                              Similarity
                              • API ID:
                              • String ID: \V(m
                              • API String ID: 0-2800782923
                              • Opcode ID: a2cbc4c64182aa7a4f3f48319898307934f2656f0d1622389844af005eeabcce
                              • Instruction ID: 67169fb1c87b8a16e6a6f6efef129c6bf78150710a68961a9a63f5f627b13144
                              • Opcode Fuzzy Hash: a2cbc4c64182aa7a4f3f48319898307934f2656f0d1622389844af005eeabcce
                              • Instruction Fuzzy Hash: 3C915E70E00309CFDF15DFA9C88579DBBF2AF88354F14C129E819A7294EB749985CBA1
                              Memory Dump Source
                              • Source File: 00000000.00000002.4564808822.0000000006300000.00000040.00000800.00020000.00000000.sdmp, Offset: 06300000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6300000_VG0x1LZCFb.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: e93896f455a6259d9c1923af371ca3f40205a1f11b8f451724c4f541a37bc95c
                              • Instruction ID: bbdf169342405e0d10dfb005c676aa5f7bea75c39f4bc821771dbe8454484bf1
                              • Opcode Fuzzy Hash: e93896f455a6259d9c1923af371ca3f40205a1f11b8f451724c4f541a37bc95c
                              • Instruction Fuzzy Hash: 86228D34A00205CFEB64DB68D594BADB7F2EF85310F148469E616DB392DB35ED4ACB80
                              Memory Dump Source
                              • Source File: 00000000.00000002.4562677539.0000000000D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D70000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d70000_VG0x1LZCFb.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: f65f342cdda2ffba45953ff9d48d696bf1bd88c957fd838404cc39de6cfad676
                              • Instruction ID: 70792d1019c6b8ed32bf06ced28219b499b9d1e1ca9dd2313000e50d02bf36d7
                              • Opcode Fuzzy Hash: f65f342cdda2ffba45953ff9d48d696bf1bd88c957fd838404cc39de6cfad676
                              • Instruction Fuzzy Hash: 34125C35A002058FDB14DF68D594AADFBB2EF89310F24C569E909DB355EB35DC42CBA0
                              Memory Dump Source
                              • Source File: 00000000.00000002.4564808822.0000000006300000.00000040.00000800.00020000.00000000.sdmp, Offset: 06300000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6300000_VG0x1LZCFb.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 9c589445ff9fe622a404fa39e9ebfb78abe3be975ab6764f04c0e02daf593a63
                              • Instruction ID: 6112ac462ac8df8a12839b438135fd16c5724e0e5e944214b2d87dd0e0fda719
                              • Opcode Fuzzy Hash: 9c589445ff9fe622a404fa39e9ebfb78abe3be975ab6764f04c0e02daf593a63
                              • Instruction Fuzzy Hash: CBB19530B04218CFEF58EB75A86467E7BB7AFC4610B19856ED506E7388DE348C0A87D1
                              Memory Dump Source
                              • Source File: 00000000.00000002.4564808822.0000000006300000.00000040.00000800.00020000.00000000.sdmp, Offset: 06300000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6300000_VG0x1LZCFb.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 557b66a20fd9d4990ec4294554e3866fece70838cd97378beec44a8226cd92a4
                              • Instruction ID: c8d2f867e6e1c4796dd2c64bb816fd7127f9a1bffaa71fbd1e4076128fa3eb3d
                              • Opcode Fuzzy Hash: 557b66a20fd9d4990ec4294554e3866fece70838cd97378beec44a8226cd92a4
                              • Instruction Fuzzy Hash: AEB1A171E002199FEB65DF69C8507AEFBB5FB89310F10852AE506EB390CB359909CBD1
                              Memory Dump Source
                              • Source File: 00000000.00000002.4562677539.0000000000D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D70000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d70000_VG0x1LZCFb.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 6f9ed639e1ba6114c8f9ab725fcb9c42c4c45fe4858b6a8763b5f75e197796e3
                              • Instruction ID: d89c3a9573e61173d8581453bd78091a1a80fc4fe11d91f913489109632a1e23
                              • Opcode Fuzzy Hash: 6f9ed639e1ba6114c8f9ab725fcb9c42c4c45fe4858b6a8763b5f75e197796e3
                              • Instruction Fuzzy Hash: 64B14E70E002198FDB12CFA9C88579DBBF2AF88714F18C129D859E7294FB749C45CB91

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 567 d74810-d7489c 570 d748e6-d748e8 567->570 571 d7489e-d748a9 567->571 572 d748ea-d74902 570->572 571->570 573 d748ab-d748b7 571->573 579 d74904-d7490f 572->579 580 d7494c-d7494e 572->580 574 d748da-d748e4 573->574 575 d748b9-d748c3 573->575 574->572 577 d748c7-d748d6 575->577 578 d748c5 575->578 577->577 581 d748d8 577->581 578->577 579->580 582 d74911-d7491d 579->582 583 d74950-d749a9 580->583 581->574 584 d74940-d7494a 582->584 585 d7491f-d74929 582->585 592 d749b2-d749d2 583->592 593 d749ab-d749b1 583->593 584->583 586 d7492d-d7493c 585->586 587 d7492b 585->587 586->586 589 d7493e 586->589 587->586 589->584 597 d749dc-d74a0f 592->597 593->592 600 d74a11-d74a15 597->600 601 d74a1f-d74a23 597->601 600->601 602 d74a17-d74a1a call d70ab8 600->602 603 d74a25-d74a29 601->603 604 d74a33-d74a37 601->604 602->601 603->604 606 d74a2b-d74a2e call d70ab8 603->606 607 d74a47-d74a4b 604->607 608 d74a39-d74a3d 604->608 606->604 611 d74a4d-d74a51 607->611 612 d74a5b 607->612 608->607 610 d74a3f 608->610 610->607 611->612 613 d74a53 611->613 614 d74a5c 612->614 613->612 614->614
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4562677539.0000000000D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D70000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d70000_VG0x1LZCFb.jbxd
                              Similarity
                              • API ID:
                              • String ID: \V(m$\V(m
                              • API String ID: 0-451669857
                              • Opcode ID: 37ee01560c57a741b6cb47a8275140f5df69c7f02cbbd2eba0f5bcdfaab4fd11
                              • Instruction ID: dff9ea17883e634428720453eea482d198815621ae429a98e75b14d9f76066a6
                              • Opcode Fuzzy Hash: 37ee01560c57a741b6cb47a8275140f5df69c7f02cbbd2eba0f5bcdfaab4fd11
                              • Instruction Fuzzy Hash: 7A715C70E00249CFDB15DFA9C88179EBBF2AF88714F18C129E419A7254EB749845CFA5

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 519 d74804-d7489c 522 d748e6-d748e8 519->522 523 d7489e-d748a9 519->523 524 d748ea-d74902 522->524 523->522 525 d748ab-d748b7 523->525 531 d74904-d7490f 524->531 532 d7494c-d7494e 524->532 526 d748da-d748e4 525->526 527 d748b9-d748c3 525->527 526->524 529 d748c7-d748d6 527->529 530 d748c5 527->530 529->529 533 d748d8 529->533 530->529 531->532 534 d74911-d7491d 531->534 535 d74950-d74962 532->535 533->526 536 d74940-d7494a 534->536 537 d7491f-d74929 534->537 542 d74969-d74995 535->542 536->535 538 d7492d-d7493c 537->538 539 d7492b 537->539 538->538 541 d7493e 538->541 539->538 541->536 543 d7499b-d749a9 542->543 544 d749b2-d749c0 543->544 545 d749ab-d749b1 543->545 548 d749c8-d749d2 544->548 545->544 549 d749dc-d74a0f 548->549 552 d74a11-d74a15 549->552 553 d74a1f-d74a23 549->553 552->553 554 d74a17-d74a1a call d70ab8 552->554 555 d74a25-d74a29 553->555 556 d74a33-d74a37 553->556 554->553 555->556 558 d74a2b-d74a2e call d70ab8 555->558 559 d74a47-d74a4b 556->559 560 d74a39-d74a3d 556->560 558->556 563 d74a4d-d74a51 559->563 564 d74a5b 559->564 560->559 562 d74a3f 560->562 562->559 563->564 565 d74a53 563->565 566 d74a5c 564->566 565->564 566->566
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4562677539.0000000000D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D70000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d70000_VG0x1LZCFb.jbxd
                              Similarity
                              • API ID:
                              • String ID: \V(m$\V(m
                              • API String ID: 0-451669857
                              • Opcode ID: 80a2bbb29e30b84dd3073758115e62d6b0af6b011b34ed8e4ed22bca1f36d38e
                              • Instruction ID: 06eb126fbcae78a2d8b19a6c9755e90856f4d76fda57811bd74e4cbe20426955
                              • Opcode Fuzzy Hash: 80a2bbb29e30b84dd3073758115e62d6b0af6b011b34ed8e4ed22bca1f36d38e
                              • Instruction Fuzzy Hash: 48715C70E00249DFDB15CFA9C8817DEBBF1AF88714F18C129E419AB254EB749845CFA5

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1474 6308ee0-6308eeb 1475 6308f15-6308f34 call 63086a8 1474->1475 1476 6308eed-6308f14 call 630869c 1474->1476 1482 6308f36-6308f39 1475->1482 1483 6308f3a-6308f99 1475->1483 1490 6308f9b-6308f9e 1483->1490 1491 6308f9f-630902c GlobalMemoryStatusEx 1483->1491 1495 6309035-630905d 1491->1495 1496 630902e-6309034 1491->1496 1496->1495
                              Memory Dump Source
                              • Source File: 00000000.00000002.4564808822.0000000006300000.00000040.00000800.00020000.00000000.sdmp, Offset: 06300000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6300000_VG0x1LZCFb.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: eb9ed24972e4903c091abaf2d614b51bbed58f08aaf5490260f23abebbe03ae8
                              • Instruction ID: c2470050c8098e005ea43abb3f5ad0908a1cc5e014cc7deedad5cfd1364b761c
                              • Opcode Fuzzy Hash: eb9ed24972e4903c091abaf2d614b51bbed58f08aaf5490260f23abebbe03ae8
                              • Instruction Fuzzy Hash: 4A415532E043998FDB10DFB9D8102EEBBF5AFCA310F14856AD548A7281DB349849CBD0

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1499 63086a8-630902c GlobalMemoryStatusEx 1502 6309035-630905d 1499->1502 1503 630902e-6309034 1499->1503 1503->1502
                              APIs
                              • GlobalMemoryStatusEx.KERNEL32(?,?,?,?,?,?,?,?,?,06308F32), ref: 0630901F
                              Memory Dump Source
                              • Source File: 00000000.00000002.4564808822.0000000006300000.00000040.00000800.00020000.00000000.sdmp, Offset: 06300000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6300000_VG0x1LZCFb.jbxd
                              Similarity
                              • API ID: GlobalMemoryStatus
                              • String ID:
                              • API String ID: 1890195054-0
                              • Opcode ID: cde88b6f3c94058b75ef722a1344bfa09b387fa6a4942f5d5f96acd42e07cf81
                              • Instruction ID: e7228aeecdbc798698472415765e0d1369d6a096e36274f85589a087dc00e986
                              • Opcode Fuzzy Hash: cde88b6f3c94058b75ef722a1344bfa09b387fa6a4942f5d5f96acd42e07cf81
                              • Instruction Fuzzy Hash: 691136B1C046599BDB10DF9AC44479EFBF4AB48310F10812AE818A7241D378A944CFE5

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1506 6308fb1-6308ff6 1508 6308ffe-630902c GlobalMemoryStatusEx 1506->1508 1509 6309035-630905d 1508->1509 1510 630902e-6309034 1508->1510 1510->1509
                              APIs
                              • GlobalMemoryStatusEx.KERNEL32(?,?,?,?,?,?,?,?,?,06308F32), ref: 0630901F
                              Memory Dump Source
                              • Source File: 00000000.00000002.4564808822.0000000006300000.00000040.00000800.00020000.00000000.sdmp, Offset: 06300000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6300000_VG0x1LZCFb.jbxd
                              Similarity
                              • API ID: GlobalMemoryStatus
                              • String ID:
                              • API String ID: 1890195054-0
                              • Opcode ID: b6904dcdb6679faab0060538e1a55c75b782bfdf7109393c5123e2627dfa2f17
                              • Instruction ID: 1d6672fef733a9ad7692c8675edb32c9fd75d6dbb1789d0346c871a8758f202d
                              • Opcode Fuzzy Hash: b6904dcdb6679faab0060538e1a55c75b782bfdf7109393c5123e2627dfa2f17
                              • Instruction Fuzzy Hash: A81117B1C0465A9FDB10DF9AC4447DEFBF4AF48310F14816AD418A7241D378A944CFE5

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1513 630de4c-630f890 1515 630f892-630f895 1513->1515 1516 630f898-630f8c3 GetModuleHandleW 1513->1516 1515->1516 1517 630f8c5-630f8cb 1516->1517 1518 630f8cc-630f8e0 1516->1518 1517->1518
                              APIs
                              • GetModuleHandleW.KERNEL32(00000000), ref: 0630F8B6
                              Memory Dump Source
                              • Source File: 00000000.00000002.4564808822.0000000006300000.00000040.00000800.00020000.00000000.sdmp, Offset: 06300000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6300000_VG0x1LZCFb.jbxd
                              Similarity
                              • API ID: HandleModule
                              • String ID:
                              • API String ID: 4139908857-0
                              • Opcode ID: 24f1063298dcd582f597e6dadc5bb378fc22039a9e6fe97aa9399b880fbca914
                              • Instruction ID: 9ff51e8276e44f05305015b136a1ca54aa7b6b8868712b36cd5206f676de993f
                              • Opcode Fuzzy Hash: 24f1063298dcd582f597e6dadc5bb378fc22039a9e6fe97aa9399b880fbca914
                              • Instruction Fuzzy Hash: C8111FB6C006498BEB20CF9AC444ADEBBF4EB89210F10842AD829B7250C375A549CFA4

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 1520 630f84a-630f890 1521 630f892-630f895 1520->1521 1522 630f898-630f8c3 GetModuleHandleW 1520->1522 1521->1522 1523 630f8c5-630f8cb 1522->1523 1524 630f8cc-630f8e0 1522->1524 1523->1524
                              APIs
                              • GetModuleHandleW.KERNEL32(00000000), ref: 0630F8B6
                              Memory Dump Source
                              • Source File: 00000000.00000002.4564808822.0000000006300000.00000040.00000800.00020000.00000000.sdmp, Offset: 06300000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6300000_VG0x1LZCFb.jbxd
                              Similarity
                              • API ID: HandleModule
                              • String ID:
                              • API String ID: 4139908857-0
                              • Opcode ID: e7a95d0f580b07794128f29fb05bb82ef30f629cbecf18ad6f72b079a0669864
                              • Instruction ID: eb38db59c4d87294ca8ca472008ce7f18afbe86b9d217188a8074a4cc36eb714
                              • Opcode Fuzzy Hash: e7a95d0f580b07794128f29fb05bb82ef30f629cbecf18ad6f72b079a0669864
                              • Instruction Fuzzy Hash: 631102B6C006498FDB20DF9AD844ADEFBF8EB89314F10841AD869B7250C375A549CFA1

                              Control-flow Graph

                              • Executed
                              • Not Executed
                              control_flow_graph 2039 d73e76-d73ee6 2041 d73f30-d73f32 2039->2041 2042 d73ee8-d73ef3 2039->2042 2044 d73f34-d73f8c 2041->2044 2042->2041 2043 d73ef5-d73f01 2042->2043 2045 d73f24-d73f2e 2043->2045 2046 d73f03-d73f0d 2043->2046 2053 d73fd6-d73fd8 2044->2053 2054 d73f8e-d73f99 2044->2054 2045->2044 2047 d73f11-d73f20 2046->2047 2048 d73f0f 2046->2048 2047->2047 2050 d73f22 2047->2050 2048->2047 2050->2045 2056 d73fda-d73ff2 2053->2056 2054->2053 2055 d73f9b-d73fa7 2054->2055 2057 d73fca-d73fd4 2055->2057 2058 d73fa9-d73fb3 2055->2058 2063 d73ff4-d73fff 2056->2063 2064 d7403c-d7403e 2056->2064 2057->2056 2059 d73fb7-d73fc6 2058->2059 2060 d73fb5 2058->2060 2059->2059 2062 d73fc8 2059->2062 2060->2059 2062->2057 2063->2064 2066 d74001-d7400d 2063->2066 2065 d74040-d74052 2064->2065 2073 d74059-d7408e 2065->2073 2067 d74030-d7403a 2066->2067 2068 d7400f-d74019 2066->2068 2067->2065 2069 d7401d-d7402c 2068->2069 2070 d7401b 2068->2070 2069->2069 2072 d7402e 2069->2072 2070->2069 2072->2067 2074 d74094-d740a2 2073->2074 2075 d740a4-d740aa 2074->2075 2076 d740ab-d7410b 2074->2076 2075->2076 2083 d7410d-d74111 2076->2083 2084 d7411b-d7411f 2076->2084 2083->2084 2087 d74113 2083->2087 2085 d74121-d74125 2084->2085 2086 d7412f-d74133 2084->2086 2085->2086 2088 d74127-d7412a call d70ab8 2085->2088 2089 d74135-d74139 2086->2089 2090 d74143-d74147 2086->2090 2087->2084 2088->2086 2089->2090 2092 d7413b-d7413e call d70ab8 2089->2092 2093 d74157-d7415b 2090->2093 2094 d74149-d7414d 2090->2094 2092->2090 2097 d7415d-d74161 2093->2097 2098 d7416b-d7416f 2093->2098 2094->2093 2096 d7414f-d74152 call d70ab8 2094->2096 2096->2093 2097->2098 2102 d74163 2097->2102 2099 d74171-d74175 2098->2099 2100 d7417f 2098->2100 2099->2100 2103 d74177 2099->2103 2104 d74180 2100->2104 2102->2098 2103->2100 2104->2104
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4562677539.0000000000D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D70000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d70000_VG0x1LZCFb.jbxd
                              Similarity
                              • API ID:
                              • String ID: \V(m
                              • API String ID: 0-2800782923
                              • Opcode ID: db686167af62d6560643ad1be09dcc113f58d7f0ac94ec7f42ac2710faf177af
                              • Instruction ID: b2a42b10aecd382bba775faf1f39ae2c253ef34a6a20827cbc989628d53cd55d
                              • Opcode Fuzzy Hash: db686167af62d6560643ad1be09dcc113f58d7f0ac94ec7f42ac2710faf177af
                              • Instruction Fuzzy Hash: BB915C70E00309CFDB11DFA8C8857DDFBF1AF88354F188129E819A7294EB749985CBA1
                              Memory Dump Source
                              • Source File: 00000000.00000002.4562677539.0000000000D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D70000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d70000_VG0x1LZCFb.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 8c97bed49b7773080c4806bfe4f02e846aa0185aea1bcd85ca3792c9ae8345c5
                              • Instruction ID: 1f356a6dcd47b392988d7edfaeac92ef3c718b250e7f03dc6935b74988c19637
                              • Opcode Fuzzy Hash: 8c97bed49b7773080c4806bfe4f02e846aa0185aea1bcd85ca3792c9ae8345c5
                              • Instruction Fuzzy Hash: FFA19371700202CBFF1AAB68E45421D73B2EBCA345F14892DE60ACB345DE79ED879791
                              Memory Dump Source
                              • Source File: 00000000.00000002.4562677539.0000000000D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D70000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d70000_VG0x1LZCFb.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: f38f72d0d367e8667103d4925c60b39b4e1c78c1546bcc121a889ca20563a4a7
                              • Instruction ID: 610d93f7fd5354db174c6e669b265d56b63fead5361322e9be80112605c8b973
                              • Opcode Fuzzy Hash: f38f72d0d367e8667103d4925c60b39b4e1c78c1546bcc121a889ca20563a4a7
                              • Instruction Fuzzy Hash: 3CA19470700206CBFF19AB78E45421D73A2EBCA345F14892DE60ACB345DE79ED879791
                              Memory Dump Source
                              • Source File: 00000000.00000002.4562677539.0000000000D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D70000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d70000_VG0x1LZCFb.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: f6b214642bf701cb8321f8b95c78f2ce78ac8f8a0febcd3f61f6e62478f211cf
                              • Instruction ID: dfe96fb3e4029dc3ad78c99141b3a35a2fe1bc922e655824815175bb2bb1d675
                              • Opcode Fuzzy Hash: f6b214642bf701cb8321f8b95c78f2ce78ac8f8a0febcd3f61f6e62478f211cf
                              • Instruction Fuzzy Hash: 7AA13E70E002198FDB22CFA8D8857DDBBF1AF48754F18C129D459E7294FB749845CBA1
                              Memory Dump Source
                              • Source File: 00000000.00000002.4562677539.0000000000D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D70000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d70000_VG0x1LZCFb.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 9cdf4d1a0825157b57807a939c984c0fbdf6d066783a4ff35577d60ee0498d6d
                              • Instruction ID: 390aaea99e46592e1f203fe2aa0212ef8cebc753b983bae0171cc4a4d963fd03
                              • Opcode Fuzzy Hash: 9cdf4d1a0825157b57807a939c984c0fbdf6d066783a4ff35577d60ee0498d6d
                              • Instruction Fuzzy Hash: 65915D35A001049FDF15DF68D5A4AADBBF2EF88310F248569E90AE7355EB34ED42CB50
                              Memory Dump Source
                              • Source File: 00000000.00000002.4562677539.0000000000D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D70000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d70000_VG0x1LZCFb.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 530e6c9db7032d2be671c1c6139228e9e74d68df24f434783d2e553e16b1827c
                              • Instruction ID: 80f7ed0b5718fa617686d61fe3e282c009718fcdd73e7fe27afa223c8b2db605
                              • Opcode Fuzzy Hash: 530e6c9db7032d2be671c1c6139228e9e74d68df24f434783d2e553e16b1827c
                              • Instruction Fuzzy Hash: 5D516E34704614CFDB15EB68D454AAD7BB2EF89700F248469E40AEB3A1EB75DC41CBA1
                              Memory Dump Source
                              • Source File: 00000000.00000002.4562677539.0000000000D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D70000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d70000_VG0x1LZCFb.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 7e0158913a57347dc138725f45c313530befdbba2e2ee0ae78f3fc4e2bf52f79
                              • Instruction ID: ff50b516b626f8d2d6450b2d5f9a57de752f5debda43f49970422625e1c388c1
                              • Opcode Fuzzy Hash: 7e0158913a57347dc138725f45c313530befdbba2e2ee0ae78f3fc4e2bf52f79
                              • Instruction Fuzzy Hash: 98316270E1424A9BEB15CF64C9547AEB7B2EF96700F258869F406EB350EB749C42CB60
                              Memory Dump Source
                              • Source File: 00000000.00000002.4562677539.0000000000D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D70000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d70000_VG0x1LZCFb.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 0b13e7e734f03b8cf792bc3df7259de9c765bb82a7ead7f5c4f23aa95ccf2e40
                              • Instruction ID: 05bf3b1fc733bc2fd8afeed9961ef7285e1a2f0a1b3b7577768a9a9a85dacab5
                              • Opcode Fuzzy Hash: 0b13e7e734f03b8cf792bc3df7259de9c765bb82a7ead7f5c4f23aa95ccf2e40
                              • Instruction Fuzzy Hash: 6C51F375E106588FDB24CFA9C894BADBBB1BF48310F18C129E819BB391E7749844CF65
                              Memory Dump Source
                              • Source File: 00000000.00000002.4562677539.0000000000D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D70000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d70000_VG0x1LZCFb.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 988b05397ce1cd5fc5cc7d70fa2914df79ad013e01347410e17800c524743183
                              • Instruction ID: 60e538631ed1decee5d0802fca0749afe3d715d857517d5c6c2379195635a5dc
                              • Opcode Fuzzy Hash: 988b05397ce1cd5fc5cc7d70fa2914df79ad013e01347410e17800c524743183
                              • Instruction Fuzzy Hash: BB510575E106198FDB14CFA9C884B9DBBB1BF48310F18C519E819BB351E774A844CFA5
                              Memory Dump Source
                              • Source File: 00000000.00000002.4562677539.0000000000D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D70000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d70000_VG0x1LZCFb.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: c5be9e54c1e9c59ce9245e8c4538d1241929eb669d1d3653ebb8c5ff9d6766ce
                              • Instruction ID: 3254615801fd428e6f66e9ed147a9b1ba469ce3f867298527ba8f1a9a2e66f4d
                              • Opcode Fuzzy Hash: c5be9e54c1e9c59ce9245e8c4538d1241929eb669d1d3653ebb8c5ff9d6766ce
                              • Instruction Fuzzy Hash: BF51EB31211386CFE70EFF68FC90A557FA1F7A9304304D969D2144B27ADBE86986CB90
                              Memory Dump Source
                              • Source File: 00000000.00000002.4562677539.0000000000D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D70000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d70000_VG0x1LZCFb.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: d62df7ffc833e20d69675483ea79d3be719055429985da28caad29c54a56931f
                              • Instruction ID: dfc0dd14bde4f5eb82b183437f119604392cc277f42bc425ac425c559393284e
                              • Opcode Fuzzy Hash: d62df7ffc833e20d69675483ea79d3be719055429985da28caad29c54a56931f
                              • Instruction Fuzzy Hash: 0631AE317002058FDB15AB74D564A6E7BB3AF89700F248479D40ADB385EE35DC06C7A0
                              Memory Dump Source
                              • Source File: 00000000.00000002.4562677539.0000000000D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D70000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d70000_VG0x1LZCFb.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 18297f294f5f6f29cb6e9d652dc6975989f58aae7a8ce69ca2553a45c0af36c8
                              • Instruction ID: 1295e4cf90c87b2c15eb527d4dad5cbfa75fc894d51d24c1d3e9c233e9a21c4b
                              • Opcode Fuzzy Hash: 18297f294f5f6f29cb6e9d652dc6975989f58aae7a8ce69ca2553a45c0af36c8
                              • Instruction Fuzzy Hash: 4B316D317002068FDB64AB74D564A6F7BB3AB89700B248478D50ADB395EE35DC46CBA1
                              Memory Dump Source
                              • Source File: 00000000.00000002.4562677539.0000000000D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D70000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d70000_VG0x1LZCFb.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: e523f7a60714b4a4a73a5a3c830e12c10110b8d76372b738532cde708fe03184
                              • Instruction ID: e16f82e19df32264f6184e15362fc64eceb1f5e2347506379c15519054c59dda
                              • Opcode Fuzzy Hash: e523f7a60714b4a4a73a5a3c830e12c10110b8d76372b738532cde708fe03184
                              • Instruction Fuzzy Hash: 8D315031E14209DBEB15DFA4D9547AEB7B1EF85310F248865F509E7250E7709C81CBA1
                              Memory Dump Source
                              • Source File: 00000000.00000002.4562677539.0000000000D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D70000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d70000_VG0x1LZCFb.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: c6bcb3db2bcc1723f4d25dba6a775760e97fd7635c63fa4c65e6a311563c9466
                              • Instruction ID: 7cee502c2ec3b4e525a29f444be05858b39d543488c12475add7d07c59ee100a
                              • Opcode Fuzzy Hash: c6bcb3db2bcc1723f4d25dba6a775760e97fd7635c63fa4c65e6a311563c9466
                              • Instruction Fuzzy Hash: 6F313D35B002469BDB25DF68D89469EB7F2EF89310F14C529E90AE7350EB74EC468B50
                              Memory Dump Source
                              • Source File: 00000000.00000002.4562677539.0000000000D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D70000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d70000_VG0x1LZCFb.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 678dc4ceecb31be0deac2507fb5cbf030dbed3b9cbd2d084ed0ff2e6e39bbe0b
                              • Instruction ID: e6a86e8abc8a20355e1fea4d47b5935cee15b7eb53c3e0ac592e54d4d87588fb
                              • Opcode Fuzzy Hash: 678dc4ceecb31be0deac2507fb5cbf030dbed3b9cbd2d084ed0ff2e6e39bbe0b
                              • Instruction Fuzzy Hash: 7041D1B1D00349DFEB14DFA9C584AAEBBF5FF48314F248029E419AB250DB759945CF90
                              Memory Dump Source
                              • Source File: 00000000.00000002.4562677539.0000000000D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D70000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d70000_VG0x1LZCFb.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 1edaeab0cfe903c944a46b7c7b8d6d511fc42be05a6bce310929506065f3eaf4
                              • Instruction ID: 8f579c23ba5d1ce53ea909eb612e0ef2453935470ff8af1fd772be6b7779d243
                              • Opcode Fuzzy Hash: 1edaeab0cfe903c944a46b7c7b8d6d511fc42be05a6bce310929506065f3eaf4
                              • Instruction Fuzzy Hash: D4314E35F002059BDB29CF69D85469EB7B2EF89300F14C529E94AE7350EB70EC46CB60
                              Memory Dump Source
                              • Source File: 00000000.00000002.4562677539.0000000000D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D70000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d70000_VG0x1LZCFb.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: ebd5402af19b804fe075901e30dc69715969ddab70c459837cce017a1d2c0a15
                              • Instruction ID: ed119be9d558bc397b78a764d2b9218b8c626129178c80686c5c3059b35a795c
                              • Opcode Fuzzy Hash: ebd5402af19b804fe075901e30dc69715969ddab70c459837cce017a1d2c0a15
                              • Instruction Fuzzy Hash: 6E319E34A00704CFCB18EB34D9547AD77B2AF48345F1084A8D805AB399EBBACC42CBA1
                              Memory Dump Source
                              • Source File: 00000000.00000002.4562677539.0000000000D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D70000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d70000_VG0x1LZCFb.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 103d5d282a0f0157dcc20e4807da54d4ad0ec8ecfbc4029edd7423c5c5d80997
                              • Instruction ID: c9a9d8b459caedd5d3cb3ee70fb7b2af45252a8666d8b16fc7c0c0711eefb795
                              • Opcode Fuzzy Hash: 103d5d282a0f0157dcc20e4807da54d4ad0ec8ecfbc4029edd7423c5c5d80997
                              • Instruction Fuzzy Hash: 2741E1B0D00349DFDB14DFA9C580ADEBBF5FF48710F248029E419AB250EB759945CB90
                              Memory Dump Source
                              • Source File: 00000000.00000002.4562677539.0000000000D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D70000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d70000_VG0x1LZCFb.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 06265b1a56addf2c5e718ff5ccb125308604e33190d0d35a5efdadd8244ce0ec
                              • Instruction ID: 8c1a0eb3484b31c5772a92c52070b8b125b7181949576e2a05af8bda39ab7e17
                              • Opcode Fuzzy Hash: 06265b1a56addf2c5e718ff5ccb125308604e33190d0d35a5efdadd8244ce0ec
                              • Instruction Fuzzy Hash: 10317C34A00715CFDB18EB34D9146AD77F2AF48301F5084A8D809AB399EF7ADC41CBA2
                              Memory Dump Source
                              • Source File: 00000000.00000002.4562677539.0000000000D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D70000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d70000_VG0x1LZCFb.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 87d5e2874eb2525d32fa49f4f3102deb36095e37a512ad038a97cdb8b3fe31c3
                              • Instruction ID: 660c779998867cd9a904f7651f453763d22dc7efd81112c651bdd7c09b3fa93b
                              • Opcode Fuzzy Hash: 87d5e2874eb2525d32fa49f4f3102deb36095e37a512ad038a97cdb8b3fe31c3
                              • Instruction Fuzzy Hash: 8B31BF76E002468BEB15CF64C8A06DEF7B2EF89300F14C619E919AB340EB71DC46CB90
                              Memory Dump Source
                              • Source File: 00000000.00000002.4562677539.0000000000D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D70000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d70000_VG0x1LZCFb.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 010d62079d6ff1ddc853ace1de1d9b3cab3c305b1a78ff92c07311de7b7ea9fb
                              • Instruction ID: 475800fa43244b39dd911b6a489313f7d6a8b791f0adc32694b30f2e858d873b
                              • Opcode Fuzzy Hash: 010d62079d6ff1ddc853ace1de1d9b3cab3c305b1a78ff92c07311de7b7ea9fb
                              • Instruction Fuzzy Hash: 10312B386002428FEF16EB3CE84876D7B55E755340F18DB69D00ACB366E6A4CC86CBA1
                              Memory Dump Source
                              • Source File: 00000000.00000002.4562677539.0000000000D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D70000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d70000_VG0x1LZCFb.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 38ff5f34da575a2a2b607911651d15e36d1d103a74f5a1348626edb2a9afdbd2
                              • Instruction ID: 08902c39b9efe90e070290f0b18cd8a9633211f50cc00e95e4cb4303fd81eb84
                              • Opcode Fuzzy Hash: 38ff5f34da575a2a2b607911651d15e36d1d103a74f5a1348626edb2a9afdbd2
                              • Instruction Fuzzy Hash: 8421F975F012129FDF14AB7C980476E77A5FB58361F148925E90AC7342FA74C8428BA1
                              Memory Dump Source
                              • Source File: 00000000.00000002.4562677539.0000000000D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D70000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d70000_VG0x1LZCFb.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: f5f4c4c03bbaa2bb6dd9acdc5ad0d6e50a9c0cd8c61d349a488dc1dfa2303fb8
                              • Instruction ID: fb48aff91ddd7161ba0531c7ff5204cd7313fe32cec9fe5675c2c523b5f17f2d
                              • Opcode Fuzzy Hash: f5f4c4c03bbaa2bb6dd9acdc5ad0d6e50a9c0cd8c61d349a488dc1dfa2303fb8
                              • Instruction Fuzzy Hash: A2216275E002469BEB15CF64C56069EF7B2EF89300F14C619E919EB340EB71DC46CB50
                              Memory Dump Source
                              • Source File: 00000000.00000002.4562677539.0000000000D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D70000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d70000_VG0x1LZCFb.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 1dcee0c12f2546e85886978edf794dff92132db997e986a99651398911a03494
                              • Instruction ID: 59295069e32c42f83a6c70a70806b93d7beb9ea01ccfd6cfaae5443ca24b5c63
                              • Opcode Fuzzy Hash: 1dcee0c12f2546e85886978edf794dff92132db997e986a99651398911a03494
                              • Instruction Fuzzy Hash: A421AE75A013158FDB25AF7C84402ADBBB5EB85314F28817AE80DDB241F635DC428BB1
                              Memory Dump Source
                              • Source File: 00000000.00000002.4562677539.0000000000D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D70000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d70000_VG0x1LZCFb.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: dd32da6326ea4c0741567a35a81093225aa5dda8295ae7e4fe4aea0cc0a6859d
                              • Instruction ID: 3f0bd20229483454da1b119af7ca95c76cbffe557b7b5bdb8f3f08b8e2da6478
                              • Opcode Fuzzy Hash: dd32da6326ea4c0741567a35a81093225aa5dda8295ae7e4fe4aea0cc0a6859d
                              • Instruction Fuzzy Hash: 76214436E002059BDB18CFA4D4506DEF7B2EF99710F24C529F815BB750EB709946CB61
                              Memory Dump Source
                              • Source File: 00000000.00000002.4562677539.0000000000D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D70000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d70000_VG0x1LZCFb.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 9ac18a088384d697ce2e5ca47bdba48496e959ffa3db1fb47d3d6513f16078f2
                              • Instruction ID: 3b6c6e3a484714e5c2a6a9a8d2dfa00d3eb1538b3da63256111fd65b141b211c
                              • Opcode Fuzzy Hash: 9ac18a088384d697ce2e5ca47bdba48496e959ffa3db1fb47d3d6513f16078f2
                              • Instruction Fuzzy Hash: A4218631B002148FEB14DB6CC955BAE7BF5EF88710F148165E909EB3A4EA71DC008BA1
                              Memory Dump Source
                              • Source File: 00000000.00000002.4562677539.0000000000D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D70000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d70000_VG0x1LZCFb.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: db930aa555c2d2b58559f48210250a9abc03b3a92165f47719952a5ed8a07499
                              • Instruction ID: a501ffd8c8ef6e2f6a7e572343f0baa7f60112a8879bfd8224470532c4cffa09
                              • Opcode Fuzzy Hash: db930aa555c2d2b58559f48210250a9abc03b3a92165f47719952a5ed8a07499
                              • Instruction Fuzzy Hash: F721D431B002148FEB14DB6CC855BAE7BF6FF88710F148065E509EB3A0EA71CD008BA1
                              Memory Dump Source
                              • Source File: 00000000.00000002.4562141926.0000000000A7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A7D000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a7d000_VG0x1LZCFb.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 50c7d183cca62c0dd13dc010c2b7fe699596017c699432e2d7ab4a25b6b61dcc
                              • Instruction ID: 82cf17af4b13996e034d57ec955dabdd2caa43aa0698d1e83da32fd34afa29f7
                              • Opcode Fuzzy Hash: 50c7d183cca62c0dd13dc010c2b7fe699596017c699432e2d7ab4a25b6b61dcc
                              • Instruction Fuzzy Hash: FC21DE71604204EFDB14DF14DD80B26BBB5FF84318F24CA6DE90E4A296C37AD847CA62
                              Memory Dump Source
                              • Source File: 00000000.00000002.4562677539.0000000000D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D70000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d70000_VG0x1LZCFb.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 806523f9a6a6acb4d71975f038fce4694cce9104703113338e3166fa1cff2795
                              • Instruction ID: 9fe2ae1185fe4482bd1d3f77fc1b18e3cd4e6bcf7d297c7525017b41399a8fc2
                              • Opcode Fuzzy Hash: 806523f9a6a6acb4d71975f038fce4694cce9104703113338e3166fa1cff2795
                              • Instruction Fuzzy Hash: B7214B34700204CFCB54DB78D558AAD77F1AF89304B2444A8E50AEB3A5EB769C05CBA1
                              Memory Dump Source
                              • Source File: 00000000.00000002.4562677539.0000000000D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D70000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d70000_VG0x1LZCFb.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: e635060c6f87b8b1d6300b011da059f112440645059a0f4bf66d04f2a4090bf5
                              • Instruction ID: 1bdb7d9eca9fead8b36bf7bd252b7c485b5b677e1191c5315de7cbb297b8c987
                              • Opcode Fuzzy Hash: e635060c6f87b8b1d6300b011da059f112440645059a0f4bf66d04f2a4090bf5
                              • Instruction Fuzzy Hash: 87218134B00205CFDB14EB68C5647AD77F5AB49305F248568D60AEB391EB358C45CBB1
                              Memory Dump Source
                              • Source File: 00000000.00000002.4562677539.0000000000D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D70000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d70000_VG0x1LZCFb.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: dd5b079846528e92a6ff73bf4272a8f701a28244f593b7430cee664fbb40abe0
                              • Instruction ID: d04e914b8e5072501a0d118eed557b4160e2ebf7b20d151087dd6fc8b737215f
                              • Opcode Fuzzy Hash: dd5b079846528e92a6ff73bf4272a8f701a28244f593b7430cee664fbb40abe0
                              • Instruction Fuzzy Hash: 1A21D378A012418FFF365B7CD44836C7B61EB12319F189A29E50EC7391EA69CCC5CB62
                              Memory Dump Source
                              • Source File: 00000000.00000002.4562677539.0000000000D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D70000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d70000_VG0x1LZCFb.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 0e5bac92764c3bf4bbd332d7eecd8d1cfa7b123b02d80c50436d1ab3b4dd4cf6
                              • Instruction ID: 2a7cb7d81d751959ad2a576505021e8c1a37cb58959c71819e4c405ee0a80613
                              • Opcode Fuzzy Hash: 0e5bac92764c3bf4bbd332d7eecd8d1cfa7b123b02d80c50436d1ab3b4dd4cf6
                              • Instruction Fuzzy Hash: 09212F31E106199BDB18CFA5C85069EF7B6AF89310F24C52AE819BB350EB70A845CB61
                              Memory Dump Source
                              • Source File: 00000000.00000002.4562677539.0000000000D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D70000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d70000_VG0x1LZCFb.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: b9f301d91928888601cfba306644b46418c1befca56972584eee4e932a87a1dd
                              • Instruction ID: e2fea2646eed9567d3a0a4fbfde468c1443eeedc33da358e332da018466ae1dc
                              • Opcode Fuzzy Hash: b9f301d91928888601cfba306644b46418c1befca56972584eee4e932a87a1dd
                              • Instruction Fuzzy Hash: BF216038B00209CFDB14EB68C5647AE77F6AF49305F248568D50AEB391EB358D41CBB1
                              Memory Dump Source
                              • Source File: 00000000.00000002.4562677539.0000000000D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D70000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d70000_VG0x1LZCFb.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: c0d38e6b6279e5d12fcdaacfe987005db50172f6cf602677b3280c4d378dcea2
                              • Instruction ID: cfd71e625078868eb2d95719e5fc0eeb7482968c5df6589ae38454d2d195c853
                              • Opcode Fuzzy Hash: c0d38e6b6279e5d12fcdaacfe987005db50172f6cf602677b3280c4d378dcea2
                              • Instruction Fuzzy Hash: 272105717041855FC71AAB7994603AE7BB2EFC6300F1485ADD149CB386EE758C46CB91
                              Memory Dump Source
                              • Source File: 00000000.00000002.4562677539.0000000000D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D70000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d70000_VG0x1LZCFb.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 7fa00ba905b75168ae536d530a7a09b437258599bb644340beec54d50b259250
                              • Instruction ID: 251b5df7a5ac72c3051090f5f0ce458739ab39dee5ee8fb7571222aa25184cd6
                              • Opcode Fuzzy Hash: 7fa00ba905b75168ae536d530a7a09b437258599bb644340beec54d50b259250
                              • Instruction Fuzzy Hash: 5F216338600202CFEF2AEB3CE88475D7756E745354F14EA25D10ACB365EAB8DC858BA1
                              Memory Dump Source
                              • Source File: 00000000.00000002.4562677539.0000000000D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D70000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d70000_VG0x1LZCFb.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 4476581b6a8ecb1104167a7cb83a0f6705a0b24da0892e5cd58f6a9fb31cb8e3
                              • Instruction ID: ddd0cf3df25a33054d688da40dceff62ebc79d8151be5a34a96b16b027079d2b
                              • Opcode Fuzzy Hash: 4476581b6a8ecb1104167a7cb83a0f6705a0b24da0892e5cd58f6a9fb31cb8e3
                              • Instruction Fuzzy Hash: D621E934700205CFCB54DB78D958AAD77F1EF8D304B208468E50AEB3A5EB769D05CBA1
                              Memory Dump Source
                              • Source File: 00000000.00000002.4562677539.0000000000D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D70000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d70000_VG0x1LZCFb.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 2615dcb2f9f6c3de94db374e1f7498bea29788ff49a98f3a650c5be7c36f3fb2
                              • Instruction ID: 81e876748c461a059e789032b0e5148bc3cb8fe50f8cae9de63164acfb798681
                              • Opcode Fuzzy Hash: 2615dcb2f9f6c3de94db374e1f7498bea29788ff49a98f3a650c5be7c36f3fb2
                              • Instruction Fuzzy Hash: 74114F30B00209CFEF15BB79D8147697A55EB45354F28CA3AD50ACB3D5EA25CC818BE2
                              Memory Dump Source
                              • Source File: 00000000.00000002.4562677539.0000000000D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D70000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d70000_VG0x1LZCFb.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: de72c1350244ce7d84108edd7d0bac5d448da8ff911589d0306b21ba0199075b
                              • Instruction ID: 6a36f1c89e4e06af2c85c4deeca5206a6dc5c6a9cfa98008a2eae4392681a123
                              • Opcode Fuzzy Hash: de72c1350244ce7d84108edd7d0bac5d448da8ff911589d0306b21ba0199075b
                              • Instruction Fuzzy Hash: 5C11E370B00209CFEF256B75D8107793A61E785354F28CA3ED54ACB2C1FA20CD824BE2
                              Memory Dump Source
                              • Source File: 00000000.00000002.4562141926.0000000000A7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A7D000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_a7d000_VG0x1LZCFb.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: f5dd070f47a673dda7babee824c8441981cc2d376d27ad6ac8e2bf7ef2f1688d
                              • Instruction ID: 11e2eb634e27dd3a0a2657522aa5709cc9163f6592ec6c81524b4e444815fd69
                              • Opcode Fuzzy Hash: f5dd070f47a673dda7babee824c8441981cc2d376d27ad6ac8e2bf7ef2f1688d
                              • Instruction Fuzzy Hash: B5118B75504284DFCB15CF14D9C4B15BBB1FB84318F28C6AAD84A4B656C33AD84BCB62
                              Memory Dump Source
                              • Source File: 00000000.00000002.4562677539.0000000000D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D70000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d70000_VG0x1LZCFb.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: badafbc1381a6e392d19af34593cdd2fdd18b668ba0acf5506d1e5e05e35451f
                              • Instruction ID: c1ea9cc70182f334693a4106def516bddbc3c85b6bd05452c0c02d758cf4cee7
                              • Opcode Fuzzy Hash: badafbc1381a6e392d19af34593cdd2fdd18b668ba0acf5506d1e5e05e35451f
                              • Instruction Fuzzy Hash: 9B016D35A002159FCF25EFB884411AEBBF9EF88310B288579E809E7241F635D9418BB5
                              Memory Dump Source
                              • Source File: 00000000.00000002.4562677539.0000000000D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D70000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d70000_VG0x1LZCFb.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: c7126f1d061cded30273955c581291e93490ca998455b77f3cfa8c39c0985d47
                              • Instruction ID: a276fa10bba9341ba317c43106063806e8ea1920dc86dc2da9d116ab177eb293
                              • Opcode Fuzzy Hash: c7126f1d061cded30273955c581291e93490ca998455b77f3cfa8c39c0985d47
                              • Instruction Fuzzy Hash: A0110431A002058FDB10EF69D954B8AFBA6EF91310F14C164D90C5F39AEB70ED06CBA1
                              Memory Dump Source
                              • Source File: 00000000.00000002.4562677539.0000000000D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D70000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d70000_VG0x1LZCFb.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 526b11b2b3784b554648d170cd76990812f01e40da94a42835212253ea8e74ba
                              • Instruction ID: 30f84ce09c46de90ec96ffea20ce668a5717c8854eca5c72719c05935bd58d66
                              • Opcode Fuzzy Hash: 526b11b2b3784b554648d170cd76990812f01e40da94a42835212253ea8e74ba
                              • Instruction Fuzzy Hash: 7801F131A002058FDF10EF69D980B8AFBA6EF80310F54C224D80C5B35AEB70ED46CBA0
                              Memory Dump Source
                              • Source File: 00000000.00000002.4562677539.0000000000D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D70000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d70000_VG0x1LZCFb.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 5fe74f52be5df0feddb953461c5709735f899c5da50491600b63fabf7f25a34f
                              • Instruction ID: 114641c9998e7c2e8c111a1a068ce33ff080ffe32edcb99a155ff11fb11bf1d1
                              • Opcode Fuzzy Hash: 5fe74f52be5df0feddb953461c5709735f899c5da50491600b63fabf7f25a34f
                              • Instruction Fuzzy Hash: 43014835A411448FD714DBB4D9ACBAC77B2EF89315F1488A8E50AAB3A0DB749C82CF51
                              Memory Dump Source
                              • Source File: 00000000.00000002.4562677539.0000000000D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D70000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d70000_VG0x1LZCFb.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: f67789c4b1215282b401a63863cb6d08270ff39c11ccef1b86b07554287ad4e5
                              • Instruction ID: edf6c9558a62f3821459a4370de934bf150cec95d0d5e0168295f114aca4ad3e
                              • Opcode Fuzzy Hash: f67789c4b1215282b401a63863cb6d08270ff39c11ccef1b86b07554287ad4e5
                              • Instruction Fuzzy Hash: 81016270A0120AEFEB09FFB4E94079CBBB1EB80304F1096ACC20567355EE759F469B80
                              Memory Dump Source
                              • Source File: 00000000.00000002.4562677539.0000000000D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D70000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d70000_VG0x1LZCFb.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: e404c74978b38d1245a630d6ce99dd916332ea12d21c690cd9e24ba5bdf8c8d8
                              • Instruction ID: b1dbac6e26acf83e64619f305d8efbebf4423ec483f34036874f4204427fe8da
                              • Opcode Fuzzy Hash: e404c74978b38d1245a630d6ce99dd916332ea12d21c690cd9e24ba5bdf8c8d8
                              • Instruction Fuzzy Hash: AAF03C34A0020AEFEB05FFB8E94069DBBB5EB80304F1096ACC10497355EA71AF469B81
                              Memory Dump Source
                              • Source File: 00000000.00000002.4562677539.0000000000D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D70000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d70000_VG0x1LZCFb.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: d1e33fb56c0f0d8fdae3f08854aaa2c2b7c095e36c4b07d91be4b3b8da85cbac
                              • Instruction ID: fbe46b777b5c8271cd9f13733f4dd732d50ec1411877f86ea4d65fe3094fab6a
                              • Opcode Fuzzy Hash: d1e33fb56c0f0d8fdae3f08854aaa2c2b7c095e36c4b07d91be4b3b8da85cbac
                              • Instruction Fuzzy Hash: 28C08C3590804886DB209698B9482ECBB20CBC1322F0444DAC24C9001093A000E5EAB2
                              Strings
                              Memory Dump Source
                              • Source File: 00000000.00000002.4562677539.0000000000D70000.00000040.00000800.00020000.00000000.sdmp, Offset: 00D70000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_d70000_VG0x1LZCFb.jbxd
                              Similarity
                              • API ID:
                              • String ID: \V(m
                              • API String ID: 0-2800782923
                              • Opcode ID: abbd9f6f4fa87a651c674e73e7ee99a29e0ac11b26a4690f7d93a0804b1bf4fa
                              • Instruction ID: d9b8aef215477b6d01d82dcbca5bbe385e1254b786cb720a864ff7e528bd4c47
                              • Opcode Fuzzy Hash: abbd9f6f4fa87a651c674e73e7ee99a29e0ac11b26a4690f7d93a0804b1bf4fa
                              • Instruction Fuzzy Hash: 7CB14F70E00219CFDF15CFA9C8857AEBBF2BF88714F18C129E419A7294EB749845CB65
                              Memory Dump Source
                              • Source File: 00000000.00000002.4564808822.0000000006300000.00000040.00000800.00020000.00000000.sdmp, Offset: 06300000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6300000_VG0x1LZCFb.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 5e8a33744ce8c237d253e29ca240e760efb5c042ec79d492456f8b4efa668cbe
                              • Instruction ID: 3fbbc87b7f5eefa4a0e72762222cf1e34ca1e0935c5fbea713e43715f178a4e4
                              • Opcode Fuzzy Hash: 5e8a33744ce8c237d253e29ca240e760efb5c042ec79d492456f8b4efa668cbe
                              • Instruction Fuzzy Hash: 36124E30E01219CFEB64DF65C954A9EB7B2BF88710F208569D50AAB395EB30DD85CF90
                              Memory Dump Source
                              • Source File: 00000000.00000002.4564808822.0000000006300000.00000040.00000800.00020000.00000000.sdmp, Offset: 06300000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6300000_VG0x1LZCFb.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 0ed5188bda2855dcdbee45dfdae90a2d00bc33fa59ca2bc9343d23a5c5d67f55
                              • Instruction ID: 73ce768866d5f5ddfec1b53e906338f5b73133c9184d619db5db5c89528ac6ed
                              • Opcode Fuzzy Hash: 0ed5188bda2855dcdbee45dfdae90a2d00bc33fa59ca2bc9343d23a5c5d67f55
                              • Instruction Fuzzy Hash: B5E1D231F101158FEB64DB68D4A4AAEBBF6EF89310F21846AE406DB391DA31DC49C7D1
                              Memory Dump Source
                              • Source File: 00000000.00000002.4564808822.0000000006300000.00000040.00000800.00020000.00000000.sdmp, Offset: 06300000, based on PE: false
                              Joe Sandbox IDA Plugin
                              • Snapshot File: hcaresult_0_2_6300000_VG0x1LZCFb.jbxd
                              Similarity
                              • API ID:
                              • String ID:
                              • API String ID:
                              • Opcode ID: 10c79239ead58b5d7bd4bfcad29b0afcca83c5ecafbbb8822d91683ce5d70b99
                              • Instruction ID: ac71af9d66809fdd7e9abaf0825ca2344bf115b2e415bf735c1393e5872c2ae9
                              • Opcode Fuzzy Hash: 10c79239ead58b5d7bd4bfcad29b0afcca83c5ecafbbb8822d91683ce5d70b99
                              • Instruction Fuzzy Hash: 57A13B30A11209CBEB64DF64D5A4AAEB7B6EF84310F24C529D406DB395DB74DC8ACB90