Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample name:file.exe
Analysis ID:1504333
MD5:f10161c3acde4b7dadcd1eeddcf937f1
SHA1:ebf47c2e0916fbc430ddc8a90cdd1fe98112f979
SHA256:445a933766bf381ebe8530e0795e22ab2bccace28291388aba99808e101e8230
Tags:exe
Infos:

Detection

PureLog Stealer, RedLine, zgRAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected PureLog Stealer
Yara detected RedLine Stealer
Yara detected zgRAT
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains very large array initializations
AI detected suspicious sample
Allocates memory in foreign processes
Contains functionality to inject code into remote processes
Injects a PE file into a foreign processes
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Writes to foreign memory regions
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Enables security privileges
Installs a raw input device (often for capturing keystrokes)
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • file.exe (PID: 368 cmdline: "C:\Users\user\Desktop\file.exe" MD5: F10161C3ACDE4B7DADCD1EEDDCF937F1)
    • conhost.exe (PID: 1008 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • RegAsm.exe (PID: 3708 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
    • RegAsm.exe (PID: 6880 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
      • conhost.exe (PID: 3604 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
RedLine StealerRedLine Stealer is a malware available on underground forums for sale apparently as a standalone ($100/$150 depending on the version) or also on a subscription basis ($100/month). This malware harvests information from browsers such as saved credentials, autocomplete data, and credit card information. A system inventory is also taken when running on a target machine, to include details such as the username, location data, hardware configuration, and information regarding installed security software. More recent versions of RedLine added the ability to steal cryptocurrency. FTP and IM clients are also apparently targeted by this family, and this malware has the ability to upload and download files, execute commands, and periodically send back information about the infected computer.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.redline_stealer
NameDescriptionAttributionBlogpost URLsLink
zgRATzgRAT is a Remote Access Trojan malware which sometimes drops other malware such as AgentTesla malware. zgRAT has an inforstealer use which targets browser information and cryptowallets.Usually spreads by USB or phishing emails with -zip/-lnk/.bat/.xlsx attachments and so on.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.zgrat
No configs have been found
SourceRuleDescriptionAuthorStrings
00000004.00000002.2159148981.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
    00000000.00000002.2153470757.0000000004245000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
      Process Memory Space: RegAsm.exe PID: 6880JoeSecurity_RedLineYara detected RedLine StealerJoe Security
        SourceRuleDescriptionAuthorStrings
        0.2.file.exe.4245570.0.raw.unpackJoeSecurity_zgRAT_1Yara detected zgRATJoe Security
          0.2.file.exe.4245570.0.raw.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
            0.2.file.exe.4245570.0.raw.unpackMALWARE_Win_zgRATDetects zgRATditekSHen
            • 0x458ad:$s1: file:///
            • 0x45809:$s2: {11111-22222-10009-11112}
            • 0x4583d:$s3: {11111-22222-50001-00000}
            • 0x4276b:$s4: get_Module
            • 0x3cf55:$s5: Reverse
            • 0x3dc05:$s6: BlockCopy
            • 0x3ced4:$s7: ReadByte
            • 0x458bf:$s8: 4C 00 6F 00 63 00 61 00 74 00 69 00 6F 00 6E 00 00 0B 46 00 69 00 6E 00 64 00 20 00 00 13 52 00 65 00 73 00 6F 00 75 00 72 00 63 00 65 00 41 00 00 11 56 00 69 00 72 00 74 00 75 00 61 00 6C 00 ...
            0.2.file.exe.4245570.0.unpackJoeSecurity_zgRAT_1Yara detected zgRATJoe Security
              0.2.file.exe.4245570.0.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                Click to see the 4 entries
                No Sigma rule has matched
                No Suricata rule has matched

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: file.exeReversingLabs: Detection: 34%
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: file.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: file.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: RegAsm.exe, 00000004.00000002.2168998227.00000000031DC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: IndexedDB\https_www.youtube.com_0.indexeddb.leveldb equals www.youtube.com (Youtube)
                Source: RegAsm.exe, 00000004.00000002.2168998227.00000000031DC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: IndexedDB\https_www.youtube.com_0.indexeddb.leveldb@\ equals www.youtube.com (Youtube)
                Source: RegAsm.exe, 00000004.00000002.2168998227.00000000031DC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: q#www.youtube.com_0.indexeddb.leveldb equals www.youtube.com (Youtube)
                Source: RegAsm.exe, 00000004.00000002.2168998227.00000000031DC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: q3IndexedDB\https_www.youtube.com_0.indexeddb.leveldb@\ equals www.youtube.com (Youtube)
                Source: RegAsm.exe, 00000004.00000002.2168998227.0000000003175000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ip.s
                Source: RegAsm.exe, 00000004.00000002.2168998227.0000000003175000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ip.sb/ip
                Source: RegAsm.exe, 00000004.00000002.2168998227.0000000003242000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://discord.com/api/v9/users/
                Source: RegAsm.exe, 00000004.00000002.2168998227.0000000003388000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: GetRawInputDatamemstr_2d6d67b3-8

                System Summary

                barindex
                Source: 0.2.file.exe.4245570.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                Source: 0.2.file.exe.4245570.0.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                Source: 4.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                Source: file.exe, MoveAngles.csLarge array initialization: MoveAngles: array initializer size 504320
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_014C745A4_2_014C745A
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_014C74684_2_014C7468
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess token adjusted: SecurityJump to behavior
                Source: file.exe, 00000000.00000002.2151319090.00000000013DE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs file.exe
                Source: file.exe, 00000000.00000002.2153470757.0000000004245000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCopita.exe" vs file.exe
                Source: file.exe, 00000000.00000000.2147605021.0000000000EC0000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamesecinitj% vs file.exe
                Source: file.exeBinary or memory string: OriginalFilenamesecinitj% vs file.exe
                Source: file.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: 0.2.file.exe.4245570.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                Source: 0.2.file.exe.4245570.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                Source: 4.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: 0.2.file.exe.4245570.0.raw.unpack, Strings.csCryptographic APIs: 'CreateDecryptor'
                Source: 0.2.file.exe.4245570.0.raw.unpack, TripleDes.csCryptographic APIs: 'CreateDecryptor'
                Source: 0.2.file.exe.4245570.0.raw.unpack, A2H1lUZ15GsIooGy4G.csCryptographic APIs: 'CreateDecryptor'
                Source: 0.2.file.exe.4245570.0.raw.unpack, A2H1lUZ15GsIooGy4G.csCryptographic APIs: 'CreateDecryptor'
                Source: classification engineClassification label: mal100.troj.evad.winEXE@7/2@0/0
                Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.logJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMutant created: NULL
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1008:120:WilError_03
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3604:120:WilError_03
                Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: file.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: file.exeReversingLabs: Detection: 34%
                Source: unknownProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"
                Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
                Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
                Source: C:\Users\user\Desktop\file.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\Desktop\file.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\file.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\file.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\file.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\file.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\file.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: aclayers.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dwrite.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: textshaping.dllJump to behavior
                Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: file.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG

                Data Obfuscation

                barindex
                Source: 0.2.file.exe.4245570.0.raw.unpack, A2H1lUZ15GsIooGy4G.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 4_2_014CE390 push eax; ret 4_2_014CE391
                Source: file.exeStatic PE information: section name: .text entropy: 7.998016375889197
                Source: 0.2.file.exe.4245570.0.raw.unpack, Form1.csHigh entropy of concatenated method names: '_003CReadLine_003Eb__2_0', 'u6YPlGEI8QVmr8I8RpM', 'Wvju4xEDuYOca4808Qu', 'T7d5G9E2aug3mHaOPxY', 'Form1_Load', 'ReadLine', 'Dispose', 'InitializeComponent', 'YtIaI8j3rSiRyGAl2JW', 'N5mOPLjYAuiZjHAvqIA'
                Source: 0.2.file.exe.4245570.0.raw.unpack, FieldRoot20.csHigh entropy of concatenated method names: 'Field1', 'Field5', 'Field2', 'Field3', 'Field4', 'Key4Database', 'Key3Database', 'aGErA5sQtlXYtkc27h2', 'cIYEf8sLrL3CSuxF0Lm', 'oJJkSAsqX9jsWvIh64r'
                Source: 0.2.file.exe.4245570.0.raw.unpack, SystemInfoHelper.csHigh entropy of concatenated method names: '_003CCloseBrowser_003Eb__1', 'rpm1MhNS33bBfOCj94m', 'zygwd6NQQdNu9pEPE3K', 'ShowMessage', 'CloseBrowser', 'Add', 'GetProcessors', 'GetGraphicCards', 'GetBrowsers', 'GetSerialNumber'
                Source: 0.2.file.exe.4245570.0.raw.unpack, IPv4Helper.csHigh entropy of concatenated method names: '_003CGetDefaultIPv4Address_003Eb__1_0', '_003CGetDefaultIPv4Address_003Eb__1_1', 'sgfAjAEx0k9JoJfOBfT', 'oyrplTEnPeopkIp2NiN', 'C5MLWAEiqwHRZWOnJ4O', 'rnZAVrEtS20OgKUWM6v', 'Vhrg5vEzFa2NnOewMim', 'gYSU1JN9DcPZRYRkGeG', 'dTpFQlN56548JKyxPdP', 'IsLocalIp'
                Source: 0.2.file.exe.4245570.0.raw.unpack, FieldRoot19.csHigh entropy of concatenated method names: 'Field1', 'Field2', 'Field3', 'QjCcD1Zn4tcfsZA9sIa', 'OhbwbhZi0NFOPuNkb38', 'a1EK4mZt4GAltSMBmyJ', 'BIl3VvZzcrbGuVWGMlc', 'Eklam2s9hBVdbjZgWBe', 'D84VyLZJsBycBUGd6e9', 'w0w9LXZxRRyNDew5Euq'
                Source: 0.2.file.exe.4245570.0.raw.unpack, CryptoHelper.csHigh entropy of concatenated method names: 'GetDecoded', 'DecryptBlob', 'cryptUnprotectData', 'GetMd5Hash', 'GetHexString', 'hLQIITji4QpCkh9wjkg', 'wdjLWYjtOQnfZ401LjT', 'EtO0u7jx2SiMcqvvLE4', 'p6thTQjn3OEOCvQTBp0', 'GEAFaojzqOQRdZvRHAf'
                Source: 0.2.file.exe.4245570.0.raw.unpack, BerkeleyDB.csHigh entropy of concatenated method names: 'Extract', 'J1WSUBjDJSFisHixHI4', 'n0c3pAj2Rif647RIqXE', 'Sbl46hjKU2auxmj19VJ', 'VcI3PRjfLlC21DCR0ND', 'N9WNDCjgExGI7YSuU2Y', 'Fvt0YIjIqtoE0sLpZBG', 'NQ3M7jjPh1Z8gNyFIOT'
                Source: 0.2.file.exe.4245570.0.raw.unpack, TripleDes.csHigh entropy of concatenated method names: 'ComputeVoid', 'Compute', 'DecryptStringDesCbc', 'DecryptByteDesCbc', 'MmcFqZRL0qST7eLXOlf', 'eSgwX8Rl91afUQv4O9G', 'ge8AaBR8JGoTTKek3MA', 'qbE6jpRaW5pXB5Uqhrd', 'gul6CnRVV47QPE300pE', 'AEaPMTRpnoUEGMV5my8'
                Source: 0.2.file.exe.4245570.0.raw.unpack, A2H1lUZ15GsIooGy4G.csHigh entropy of concatenated method names: 'NA10JdHu1v0HlJWFF9p', 'TR4sHkH1BFUKOVlIA2P', 'LtQPyoxJn7', 'P8Gh1PHTowh3fy8qlLk', 'g38PJ8K3c0', 'AZCPHbxqQi', 'kjCPpoa2Hi', 'zssPO0JXVk', 'wmTPVkxu9Y', 'fZOeODHb8Jam9ngiXRS'
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: RegAsm.exe, 00000004.00000002.2168998227.0000000003242000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: \QEMU-GA.EXE`,
                Source: RegAsm.exe, 00000004.00000002.2168998227.0000000003242000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: \QEMU-GA.EXE
                Source: RegAsm.exe, 00000004.00000002.2168998227.0000000003242000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: \QEMU-GA.EXE@\
                Source: C:\Users\user\Desktop\file.exeMemory allocated: 15F0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\file.exeMemory allocated: 3240000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\file.exeMemory allocated: 3050000 memory reserve | memory write watchJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 14C0000 memory reserve | memory write watchJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 3110000 memory reserve | memory write watchJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 5110000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\file.exe TID: 2056Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6432Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: RegAsm.exe, 00000004.00000002.2168998227.0000000003242000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: \qemu-ga.exe
                Source: RegAsm.exe, 00000004.00000002.2168998227.0000000003242000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: \qemu-ga.exe`,
                Source: RegAsm.exe, 00000004.00000002.2168998227.0000000003242000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: \qemu-ga.exe@\
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\file.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Users\user\Desktop\file.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 protect: page execute and read and writeJump to behavior
                Source: C:\Users\user\Desktop\file.exeCode function: 0_2_03242139 GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,CreateProcessA,CreateProcessA,VirtualAlloc,VirtualAlloc,GetThreadContext,Wow64GetThreadContext,ReadProcessMemory,ReadProcessMemory,VirtualAllocEx,VirtualAllocEx,GetProcAddress,TerminateProcess,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,SetThreadContext,Wow64SetThreadContext,ResumeThread,ResumeThread,0_2_03242139
                Source: C:\Users\user\Desktop\file.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 value starts with: 4D5AJump to behavior
                Source: C:\Users\user\Desktop\file.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000Jump to behavior
                Source: C:\Users\user\Desktop\file.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 402000Jump to behavior
                Source: C:\Users\user\Desktop\file.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 456000Jump to behavior
                Source: C:\Users\user\Desktop\file.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 47E000Jump to behavior
                Source: C:\Users\user\Desktop\file.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 11CD008Jump to behavior
                Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
                Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
                Source: RegAsm.exe, 00000004.00000002.2168998227.0000000003388000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: GetProgmanWindow
                Source: RegAsm.exe, 00000004.00000002.2168998227.0000000003388000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SetProgmanWindow
                Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
                Source: file.exe, 00000000.00000002.2151319090.000000000141D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: avp.exe
                Source: file.exe, 00000000.00000002.2151319090.000000000141D000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: AVP.exe

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 0.2.file.exe.4245570.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.file.exe.4245570.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000004.00000002.2159148981.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.2153470757.0000000004245000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 6880, type: MEMORYSTR
                Source: Yara matchFile source: 0.2.file.exe.4245570.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.file.exe.4245570.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 0.2.file.exe.4245570.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.file.exe.4245570.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000004.00000002.2159148981.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.2153470757.0000000004245000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 6880, type: MEMORYSTR
                Source: Yara matchFile source: 0.2.file.exe.4245570.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.file.exe.4245570.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 4.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
                DLL Side-Loading
                412
                Process Injection
                1
                Masquerading
                11
                Input Capture
                111
                Security Software Discovery
                Remote Services11
                Input Capture
                1
                Encrypted Channel
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                DLL Side-Loading
                1
                Disable or Modify Tools
                LSASS Memory1
                Process Discovery
                Remote Desktop Protocol11
                Archive Collected Data
                Junk DataExfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)31
                Virtualization/Sandbox Evasion
                Security Account Manager31
                Virtualization/Sandbox Evasion
                SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook412
                Process Injection
                NTDS12
                System Information Discovery
                Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                Deobfuscate/Decode Files or Information
                LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts2
                Obfuscated Files or Information
                Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items12
                Software Packing
                DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                DLL Side-Loading
                Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                file.exe34%ReversingLabsWin32.Trojan.Generic
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                SourceDetectionScannerLabelLink
                https://api.ip.sb/ip0%URL Reputationsafe
                https://api.ip.s0%URL Reputationsafe
                https://discord.com/api/v9/users/0%Avira URL Cloudsafe
                No contacted domains info
                NameSourceMaliciousAntivirus DetectionReputation
                https://api.ip.sb/ipRegAsm.exe, 00000004.00000002.2168998227.0000000003175000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://api.ip.sRegAsm.exe, 00000004.00000002.2168998227.0000000003175000.00000004.00000800.00020000.00000000.sdmpfalse
                • URL Reputation: safe
                unknown
                https://discord.com/api/v9/users/RegAsm.exe, 00000004.00000002.2168998227.0000000003242000.00000004.00000800.00020000.00000000.sdmpfalse
                • Avira URL Cloud: safe
                unknown
                No contacted IP infos
                Joe Sandbox version:40.0.0 Tourmaline
                Analysis ID:1504333
                Start date and time:2024-09-04 19:27:06 +02:00
                Joe Sandbox product:CloudBasic
                Overall analysis duration:0h 4m 45s
                Hypervisor based Inspection enabled:false
                Report type:full
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                Number of analysed new started processes analysed:11
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Sample name:file.exe
                Detection:MAL
                Classification:mal100.troj.evad.winEXE@7/2@0/0
                EGA Information:
                • Successful, ratio: 100%
                HCA Information:
                • Successful, ratio: 100%
                • Number of executed functions: 23
                • Number of non-executed functions: 2
                Cookbook Comments:
                • Found application associated with file extension: .exe
                • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                • Excluded domains from analysis (whitelisted): client.wns.windows.com, fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                • Not all processes where analyzed, report is missing behavior information
                • Report size getting too big, too many NtOpenKeyEx calls found.
                • Report size getting too big, too many NtQueryValueKey calls found.
                • VT rate limit hit for: file.exe
                No simulations
                No context
                No context
                No context
                No context
                No context
                Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                File Type:ASCII text, with CRLF line terminators
                Category:dropped
                Size (bytes):1119
                Entropy (8bit):5.345080863654519
                Encrypted:false
                SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0Hj
                MD5:88593431AEF401417595E7A00FE86E5F
                SHA1:1714B8F6F6DCAAB3F3853EDABA7687F16DD331F4
                SHA-256:ED5E60336FB00579E0867B9615CBD0C560BB667FE3CEE0674F690766579F1032
                SHA-512:1D442441F96E69D8A6D5FB7E8CF01F13AF88CA2C2D0960120151B15505DD1CADC607EF9983373BA8E422C65FADAB04A615968F335A875B5C075BB9A6D0F346C9
                Malicious:false
                Reputation:moderate, very likely benign file
                Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                Process:C:\Users\user\Desktop\file.exe
                File Type:ASCII text, with CRLF line terminators
                Category:dropped
                Size (bytes):42
                Entropy (8bit):4.0050635535766075
                Encrypted:false
                SSDEEP:3:QHXMKa/xwwUy:Q3La/xwQ
                MD5:84CFDB4B995B1DBF543B26B86C863ADC
                SHA1:D2F47764908BF30036CF8248B9FF5541E2711FA2
                SHA-256:D8988D672D6915B46946B28C06AD8066C50041F6152A91D37FFA5CF129CC146B
                SHA-512:485F0ED45E13F00A93762CBF15B4B8F996553BAA021152FAE5ABA051E3736BCD3CA8F4328F0E6D9E3E1F910C96C4A9AE055331123EE08E3C2CE3A99AC2E177CE
                Malicious:true
                Reputation:high, very likely benign file
                Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..
                File type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                Entropy (8bit):7.993353372834414
                TrID:
                • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                • Win32 Executable (generic) a (10002005/4) 49.78%
                • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                • Generic Win/DOS Executable (2004/3) 0.01%
                • DOS Executable Generic (2002/1) 0.01%
                File name:file.exe
                File size:513'536 bytes
                MD5:f10161c3acde4b7dadcd1eeddcf937f1
                SHA1:ebf47c2e0916fbc430ddc8a90cdd1fe98112f979
                SHA256:445a933766bf381ebe8530e0795e22ab2bccace28291388aba99808e101e8230
                SHA512:5024f57f0bff356120598e7faa472c956d843d36a6d83d953c9a7345aee36a14d216f1bde61524a62a0dba4cb4fae4a67dcefaa0b2e8fa5526dfc9a218e985d9
                SSDEEP:12288:1/WRdaNJO5iDHXpuTa86H0SWJfVMPJOqGYou7BBqCi7W1P:1/WRdH52q6HUBOkaDi7W1P
                TLSH:DDB423468A206224DF2FEEB815BE00EB5775F01607E76BF117BD560E7A97E440082ED3
                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....V.f................................. ........@.. .......................@............`................................
                Icon Hash:00928e8e8686b000
                Entrypoint:0x47e8de
                Entrypoint Section:.text
                Digitally signed:false
                Imagebase:0x400000
                Subsystem:windows cui
                Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Time Stamp:0x66D8569E [Wed Sep 4 12:46:22 2024 UTC]
                TLS Callbacks:
                CLR (.Net) Version:
                OS Version Major:4
                OS Version Minor:0
                File Version Major:4
                File Version Minor:0
                Subsystem Version Major:4
                Subsystem Version Minor:0
                Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                Instruction
                jmp dword ptr [00402000h]
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                NameVirtual AddressVirtual Size Is in Section
                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IMPORT0x7e8900x4b.text
                IMAGE_DIRECTORY_ENTRY_RESOURCE0x800000x602.rsrc
                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                IMAGE_DIRECTORY_ENTRY_BASERELOC0x820000xc.reloc
                IMAGE_DIRECTORY_ENTRY_DEBUG0x7e7580x1c.text
                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                .text0x20000x7c8e40x7ca001bc9cd94710c335ab68719efa950e198False0.9968910638164493data7.998016375889197IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                .rsrc0x800000x6020x80044bf719e1ae4c4c948b65e2d708ee3edFalse0.345703125data3.467063412160503IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                .reloc0x820000xc0x200f1bc35b35bfe6e37da484eb87b9be317False0.044921875data0.09800417566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                NameRVASizeTypeLanguageCountryZLIB Complexity
                RT_VERSION0x800a00x378dataEnglishUnited States0.4560810810810811
                RT_MANIFEST0x804180x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5469387755102041
                DLLImport
                mscoree.dll_CorExeMain
                Language of compilation systemCountry where language is spokenMap
                EnglishUnited States
                No network behavior found

                Click to jump to process

                Click to jump to process

                Click to dive into process behavior distribution

                Click to jump to process

                Target ID:0
                Start time:13:27:58
                Start date:04/09/2024
                Path:C:\Users\user\Desktop\file.exe
                Wow64 process (32bit):true
                Commandline:"C:\Users\user\Desktop\file.exe"
                Imagebase:0xe40000
                File size:513'536 bytes
                MD5 hash:F10161C3ACDE4B7DADCD1EEDDCF937F1
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000002.2153470757.0000000004245000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                Reputation:low
                Has exited:true

                Target ID:1
                Start time:13:27:58
                Start date:04/09/2024
                Path:C:\Windows\System32\conhost.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Imagebase:0x7ff66e660000
                File size:862'208 bytes
                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:true

                Target ID:3
                Start time:13:27:59
                Start date:04/09/2024
                Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                Wow64 process (32bit):false
                Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                Imagebase:0x1e0000
                File size:65'440 bytes
                MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:true

                Target ID:4
                Start time:13:27:59
                Start date:04/09/2024
                Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                Wow64 process (32bit):true
                Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
                Imagebase:0xe00000
                File size:65'440 bytes
                MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000004.00000002.2159148981.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                Reputation:high
                Has exited:true

                Target ID:5
                Start time:13:27:59
                Start date:04/09/2024
                Path:C:\Windows\System32\conhost.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Imagebase:0x7ff66e660000
                File size:862'208 bytes
                MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:true

                Reset < >

                  Execution Graph

                  Execution Coverage:44.5%
                  Dynamic/Decrypted Code Coverage:100%
                  Signature Coverage:25%
                  Total number of Nodes:32
                  Total number of Limit Nodes:1
                  execution_graph 275 15f0979 282 15f04a4 275->282 278 15f09c9 280 15f09f2 278->280 291 15f04b0 278->291 283 15f0a50 FreeConsole 282->283 285 15f09a5 283->285 286 15f0ad7 285->286 290 15f0b05 286->290 287 15f0dab VirtualProtectEx 288 15f0deb 287->288 288->278 289 15f0d42 289->278 290->287 290->289 292 15f0d60 VirtualProtectEx 291->292 294 15f0deb 292->294 294->280 295 15f0988 296 15f09a5 295->296 297 15f04a4 FreeConsole 295->297 301 15f0ad7 VirtualProtectEx 296->301 297->296 298 15f09c9 299 15f04b0 VirtualProtectEx 298->299 300 15f09f2 298->300 299->300 301->298 302 3242139 303 3242171 302->303 303->303 304 324227f CreateProcessA VirtualAlloc Wow64GetThreadContext ReadProcessMemory VirtualAllocEx 303->304 307 324233e TerminateProcess 303->307 304->303 305 324234e WriteProcessMemory 304->305 306 3242393 305->306 308 32423d5 WriteProcessMemory Wow64SetThreadContext ResumeThread 306->308 309 3242398 WriteProcessMemory 306->309 307->304 309->306 310 15f0490 311 15f0495 FreeConsole 310->311 313 15f0abb 311->313

                  Callgraph

                  Control-flow Graph

                  APIs
                  • CreateProcessA.KERNELBASE(C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe,00000000,00000000,00000000,00000000,00000004,00000000,00000000,032420AB,0324209B), ref: 032422A8
                  • VirtualAlloc.KERNELBASE(00000000,00000004,00001000,00000004), ref: 032422BB
                  • Wow64GetThreadContext.KERNEL32(00000304,00000000), ref: 032422D9
                  • ReadProcessMemory.KERNELBASE(00000300,?,032420EF,00000004,00000000), ref: 032422FD
                  • VirtualAllocEx.KERNELBASE(00000300,?,?,00003000,00000040), ref: 03242328
                  • TerminateProcess.KERNELBASE(00000300,00000000), ref: 03242347
                  • WriteProcessMemory.KERNELBASE(00000300,00000000,?,?,00000000,?), ref: 03242380
                  • WriteProcessMemory.KERNELBASE(00000300,00400000,?,?,00000000,?,00000028), ref: 032423CB
                  • WriteProcessMemory.KERNELBASE(00000300,?,?,00000004,00000000), ref: 03242409
                  • Wow64SetThreadContext.KERNEL32(00000304,03120000), ref: 03242445
                  • ResumeThread.KERNELBASE(00000304), ref: 03242454
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2152327095.0000000003241000.00000040.00000800.00020000.00000000.sdmp, Offset: 03241000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_3241000_file.jbxd
                  Similarity
                  • API ID: Process$Memory$ThreadWrite$AllocContextVirtualWow64$CreateReadResumeTerminate
                  • String ID: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe$CreateProcessA$GetP$GetThreadContext$Load$ReadProcessMemory$ResumeThread$SetThreadContext$TerminateProcess$VirtualAlloc$VirtualAllocEx$WriteProcessMemory$aryA$ress
                  • API String ID: 2440066154-1257834847
                  • Opcode ID: 5830fdbf51cd66032c811c655c8f92b1c7674356d546a8de58cf9f8e9e68e0da
                  • Instruction ID: f129ef2bdc32d69c16653dd048be6f2eec7b1631b94bbfcc711d841428497bad
                  • Opcode Fuzzy Hash: 5830fdbf51cd66032c811c655c8f92b1c7674356d546a8de58cf9f8e9e68e0da
                  • Instruction Fuzzy Hash: 98B1E67660024AAFDB60CF69CC80BDA77A9FF88714F158564FA0CAB341D774FA418B94

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 22 15f0ad7-15f0b1a 25 15f0b1c-15f0b2d 22->25 27 15f0d4a-15f0de9 VirtualProtectEx 25->27 28 15f0b33-15f0b4d 25->28 35 15f0deb 27->35 36 15f0df0-15f0e09 27->36 28->27 29 15f0b53-15f0b5e 28->29 29->27 31 15f0b64-15f0b6f 29->31 31->25 32 15f0b71-15f0b79 31->32 34 15f0b7c-15f0b84 32->34 34->27 37 15f0b8a-15f0b97 34->37 35->36 37->27 38 15f0b9d-15f0ba9 37->38 39 15f0bab-15f0bb1 38->39 40 15f0bb2-15f0bbc 38->40 39->40 40->27 42 15f0bc2-15f0bcc 40->42 42->27 43 15f0bd2-15f0bde 42->43 43->27 44 15f0be4-15f0bf1 43->44 44->34 45 15f0bf3-15f0c02 44->45 46 15f0c08-15f0c0f 45->46 47 15f0d42-15f0d49 45->47 48 15f0c19-15f0c24 46->48 49 15f0c11-15f0c18 46->49 48->27 50 15f0c2a-15f0c36 48->50 49->48 51 15f0c3f-15f0c49 50->51 52 15f0c38-15f0c3e 50->52 51->27 53 15f0c4f-15f0c59 51->53 52->51 53->27 54 15f0c5f-15f0c6b 53->54 54->27 55 15f0c71-15f0c92 54->55 56 15f0c9c-15f0cb4 55->56 57 15f0c94-15f0c9b 55->57 60 15f0cbc-15f0cca 56->60 57->56 62 15f0ccc-15f0cd1 60->62 63 15f0cd9-15f0ce0 60->63 62->63 63->27 64 15f0ce2-15f0ceb 63->64 64->27 65 15f0ced-15f0d01 64->65 66 15f0d03-15f0d08 65->66 67 15f0d10-15f0d17 65->67 66->67 67->27 68 15f0d19-15f0d21 67->68 68->27 69 15f0d23-15f0d3c 68->69 69->46 69->47
                  APIs
                  • VirtualProtectEx.KERNELBASE(?,04243590,?,?,?), ref: 015F0DDC
                  Memory Dump Source
                  • Source File: 00000000.00000002.2151864067.00000000015F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_15f0000_file.jbxd
                  Similarity
                  • API ID: ProtectVirtual
                  • String ID:
                  • API String ID: 544645111-0
                  • Opcode ID: 7e3b1cfe3d200d61d7dd4e3ec25ceae667e190e24a158ef72bd2782c4f3b303b
                  • Instruction ID: 286c1ce25e7175ee481e3426265f192cccc1fe906c833d63c840fb00c388b492
                  • Opcode Fuzzy Hash: 7e3b1cfe3d200d61d7dd4e3ec25ceae667e190e24a158ef72bd2782c4f3b303b
                  • Instruction Fuzzy Hash: 2FB17071A0025A8FCB15CF99C4806ADFBF2FF49314F68855AE559EB292C334ED41CBA0

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 70 15f04b0-15f0de9 VirtualProtectEx 73 15f0deb 70->73 74 15f0df0-15f0e09 70->74 73->74
                  APIs
                  • VirtualProtectEx.KERNELBASE(?,04243590,?,?,?), ref: 015F0DDC
                  Memory Dump Source
                  • Source File: 00000000.00000002.2151864067.00000000015F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_15f0000_file.jbxd
                  Similarity
                  • API ID: ProtectVirtual
                  • String ID:
                  • API String ID: 544645111-0
                  • Opcode ID: 74d4f7483c984db868edd2c52973d945435d26f721964049aea6383b8f3718d6
                  • Instruction ID: 1f57a6aacd2f7afda675b867a0b6c2b8bb4989151da63485b530b164e9f1594d
                  • Opcode Fuzzy Hash: 74d4f7483c984db868edd2c52973d945435d26f721964049aea6383b8f3718d6
                  • Instruction Fuzzy Hash: 7C21E2B590125DEFCB10DF9AD884ADEFFB5FB48310F108119EA18A7240C3B4A954CBA1

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 76 15f0490-15f0a87 80 15f0a8f-15f0ab9 FreeConsole 76->80 81 15f0abb 80->81 82 15f0ac0-15f0ad4 80->82 81->82
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2151864067.00000000015F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_15f0000_file.jbxd
                  Similarity
                  • API ID: ConsoleFree
                  • String ID:
                  • API String ID: 771614528-0
                  • Opcode ID: 18125bdaecd4790f70af66bb03d12b4900999287a045814a4cbae90d1dbf77e4
                  • Instruction ID: f422dbad07eb334781264ff343309d5c31a598419281b575e048acdcf9920e4b
                  • Opcode Fuzzy Hash: 18125bdaecd4790f70af66bb03d12b4900999287a045814a4cbae90d1dbf77e4
                  • Instruction Fuzzy Hash: 221162718003588FDB10DF9AC484BDEBFF0EF48324F28845AD6996B251C7B8A448CFA4

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 83 15f0a49-15f0a87 84 15f0a8f-15f0ab9 FreeConsole 83->84 85 15f0abb 84->85 86 15f0ac0-15f0ad4 84->86 85->86
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2151864067.00000000015F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_15f0000_file.jbxd
                  Similarity
                  • API ID: ConsoleFree
                  • String ID:
                  • API String ID: 771614528-0
                  • Opcode ID: 026055ecdd71d0e1796860d7a9313e2fc22b82098cc6f31d7f71481f7d45923a
                  • Instruction ID: 9155756ce052bab7f2fe57ca36f718fad4099525784590cfa4e714ab34d137b0
                  • Opcode Fuzzy Hash: 026055ecdd71d0e1796860d7a9313e2fc22b82098cc6f31d7f71481f7d45923a
                  • Instruction Fuzzy Hash: DC112EB58003098FDB20DF99C545BDEBFF0FB88320F20851AD519A7650C3B9A944CFA0

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 87 15f04a4-15f0ab9 FreeConsole 90 15f0abb 87->90 91 15f0ac0-15f0ad4 87->91 90->91
                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2151864067.00000000015F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 015F0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_15f0000_file.jbxd
                  Similarity
                  • API ID: ConsoleFree
                  • String ID:
                  • API String ID: 771614528-0
                  • Opcode ID: b577d75ad2e0b87cfb7deed8e8fe0d54e9e5d86c736ba935036192fec92818cd
                  • Instruction ID: 3a3241ecbb83ed84d287824066e215d540a26434e7cb47d34648391712099565
                  • Opcode Fuzzy Hash: b577d75ad2e0b87cfb7deed8e8fe0d54e9e5d86c736ba935036192fec92818cd
                  • Instruction Fuzzy Hash: 561130B48007498FDB20DF8AC544B9EBBF0FB48320F248419D659A7240C3B4A944CFA1

                  Execution Graph

                  Execution Coverage:8%
                  Dynamic/Decrypted Code Coverage:100%
                  Signature Coverage:0%
                  Total number of Nodes:85
                  Total number of Limit Nodes:6
                  execution_graph 14882 14cee08 DuplicateHandle 14883 14cee9e 14882->14883 14884 14c46c0 14885 14c46d2 14884->14885 14886 14c46de 14885->14886 14890 14c47f8 14885->14890 14895 14c425c 14886->14895 14891 14c481d 14890->14891 14899 14c4908 14891->14899 14903 14c48f8 14891->14903 14896 14c4267 14895->14896 14911 14c7150 14896->14911 14898 14c4703 14901 14c492f 14899->14901 14900 14c4a0c 14900->14900 14901->14900 14907 14c456c 14901->14907 14905 14c4908 14903->14905 14904 14c4a0c 14904->14904 14905->14904 14906 14c456c CreateActCtxA 14905->14906 14906->14904 14908 14c5998 CreateActCtxA 14907->14908 14910 14c5a5b 14908->14910 14912 14c715b 14911->14912 14915 14c7160 14912->14915 14914 14c8b8d 14914->14898 14916 14c716b 14915->14916 14919 14c7190 14916->14919 14918 14c8c62 14918->14914 14920 14c719b 14919->14920 14923 14c71c0 14920->14923 14922 14c8d65 14922->14918 14925 14c71cb 14923->14925 14924 14ca189 14924->14922 14925->14924 14927 14ce8e8 14925->14927 14928 14ce919 14927->14928 14929 14ce93d 14928->14929 14932 14ceaa8 14928->14932 14936 14ceaa2 14928->14936 14929->14924 14933 14ceab5 14932->14933 14934 14ceaef 14933->14934 14940 14ce688 14933->14940 14934->14929 14937 14ceaa8 14936->14937 14938 14ceaef 14937->14938 14939 14ce688 2 API calls 14937->14939 14938->14929 14939->14938 14941 14ce68d 14940->14941 14943 14cf400 14941->14943 14944 14ce7b4 14941->14944 14943->14943 14945 14ce7bf 14944->14945 14946 14c71c0 2 API calls 14945->14946 14947 14cf46f 14946->14947 14951 14cf8f0 14947->14951 14955 14cf8e0 14947->14955 14948 14cf47e 14948->14943 14952 14cf91e 14951->14952 14953 14cf9ea KiUserCallbackDispatcher 14952->14953 14954 14cf9ef 14952->14954 14953->14954 14954->14954 14956 14cf91e 14955->14956 14957 14cf9ea KiUserCallbackDispatcher 14956->14957 14958 14cf9ef 14956->14958 14957->14958 14959 14cebc0 14960 14cec06 GetCurrentProcess 14959->14960 14962 14cec58 GetCurrentThread 14960->14962 14963 14cec51 14960->14963 14964 14cec8e 14962->14964 14965 14cec95 GetCurrentProcess 14962->14965 14963->14962 14964->14965 14968 14ceccb 14965->14968 14966 14cecf3 GetCurrentThreadId 14967 14ced24 14966->14967 14968->14966 14969 14cc830 14972 14cc917 14969->14972 14970 14cc83f 14973 14cc939 14972->14973 14974 14cc95c 14972->14974 14973->14974 14980 14ccbc0 14973->14980 14984 14ccbb0 14973->14984 14974->14970 14975 14cc954 14975->14974 14976 14ccb60 GetModuleHandleW 14975->14976 14977 14ccb8d 14976->14977 14977->14970 14981 14ccbd4 14980->14981 14982 14ccbf9 14981->14982 14988 14cc328 14981->14988 14982->14975 14985 14ccbd4 14984->14985 14986 14ccbf9 14985->14986 14987 14cc328 LoadLibraryExW 14985->14987 14986->14975 14987->14986 14989 14ccda0 LoadLibraryExW 14988->14989 14991 14cce19 14989->14991 14991->14982

                  Control-flow Graph

                  APIs
                  • GetCurrentProcess.KERNEL32 ref: 014CEC3E
                  • GetCurrentThread.KERNEL32 ref: 014CEC7B
                  • GetCurrentProcess.KERNEL32 ref: 014CECB8
                  • GetCurrentThreadId.KERNEL32 ref: 014CED11
                  Memory Dump Source
                  • Source File: 00000004.00000002.2167947489.00000000014C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014C0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_14c0000_RegAsm.jbxd
                  Similarity
                  • API ID: Current$ProcessThread
                  • String ID:
                  • API String ID: 2063062207-0
                  • Opcode ID: 2701cdb78aa9b7c2ed13fba9b082d3a0630cfe16ea10c5426786d6ccb131a861
                  • Instruction ID: 9a59f73d46c04b6d8ac9e3e7b00964959e525bcfeb86c3f9fb99a20745f13d6c
                  • Opcode Fuzzy Hash: 2701cdb78aa9b7c2ed13fba9b082d3a0630cfe16ea10c5426786d6ccb131a861
                  • Instruction Fuzzy Hash: AC5155B090174A8FEB48CFA9D648B9EBFF1EF48314F24845EE109A73A0DB745944CB65

                  Control-flow Graph

                  APIs
                  • GetCurrentProcess.KERNEL32 ref: 014CEC3E
                  • GetCurrentThread.KERNEL32 ref: 014CEC7B
                  • GetCurrentProcess.KERNEL32 ref: 014CECB8
                  • GetCurrentThreadId.KERNEL32 ref: 014CED11
                  Memory Dump Source
                  • Source File: 00000004.00000002.2167947489.00000000014C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014C0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_14c0000_RegAsm.jbxd
                  Similarity
                  • API ID: Current$ProcessThread
                  • String ID:
                  • API String ID: 2063062207-0
                  • Opcode ID: a315b2b9c0a833d1f70288985bcf4afb176472e9b0a279a446c430936e6db4f6
                  • Instruction ID: ce253e327d86898221e64ae8ecdfee3ab209d47961432edf627fc74eaf3fb935
                  • Opcode Fuzzy Hash: a315b2b9c0a833d1f70288985bcf4afb176472e9b0a279a446c430936e6db4f6
                  • Instruction Fuzzy Hash: C85147B09013498FDB54CFAAD548B9EBFF1EF88714F20845EE109A73A0DB745944CB65

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 44 14cc917-14cc937 45 14cc939-14cc946 call 14c9e7c 44->45 46 14cc963-14cc967 44->46 51 14cc95c 45->51 52 14cc948 45->52 47 14cc969-14cc973 46->47 48 14cc97b-14cc9bc 46->48 47->48 55 14cc9be-14cc9c6 48->55 56 14cc9c9-14cc9d7 48->56 51->46 102 14cc94e call 14ccbc0 52->102 103 14cc94e call 14ccbb0 52->103 55->56 58 14cc9d9-14cc9de 56->58 59 14cc9fb-14cc9fd 56->59 57 14cc954-14cc956 57->51 60 14cca98-14ccb58 57->60 62 14cc9e9 58->62 63 14cc9e0-14cc9e7 call 14cc2cc 58->63 61 14cca00-14cca07 59->61 95 14ccb5a-14ccb5d 60->95 96 14ccb60-14ccb8b GetModuleHandleW 60->96 66 14cca09-14cca11 61->66 67 14cca14-14cca1b 61->67 65 14cc9eb-14cc9f9 62->65 63->65 65->61 66->67 69 14cca1d-14cca25 67->69 70 14cca28-14cca31 call 14cc2dc 67->70 69->70 75 14cca3e-14cca43 70->75 76 14cca33-14cca3b 70->76 77 14cca45-14cca4c 75->77 78 14cca61-14cca65 75->78 76->75 77->78 80 14cca4e-14cca5e call 14cc2ec call 14cc2fc 77->80 100 14cca68 call 14ccec0 78->100 101 14cca68 call 14cceb0 78->101 80->78 83 14cca6b-14cca6e 85 14cca70-14cca8e 83->85 86 14cca91-14cca97 83->86 85->86 95->96 97 14ccb8d-14ccb93 96->97 98 14ccb94-14ccba8 96->98 97->98 100->83 101->83 102->57 103->57
                  APIs
                  • GetModuleHandleW.KERNELBASE(00000000), ref: 014CCB7E
                  Memory Dump Source
                  • Source File: 00000004.00000002.2167947489.00000000014C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014C0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_14c0000_RegAsm.jbxd
                  Similarity
                  • API ID: HandleModule
                  • String ID:
                  • API String ID: 4139908857-0
                  • Opcode ID: 385698a2942b564cf481839ae7228c4c19dbbec25d37e614cc6edfe0529eb8ed
                  • Instruction ID: 7bd6f0a18b7797f5b6af55261829ccc8c92f80c54d771d031de0dae35381f17f
                  • Opcode Fuzzy Hash: 385698a2942b564cf481839ae7228c4c19dbbec25d37e614cc6edfe0529eb8ed
                  • Instruction Fuzzy Hash: 81814274A00B058FD764DF6AD49479ABBF1FB88A10F00892ED48AD7B60DB34E845CB91

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 104 14c598c-14c5993 105 14c5998-14c5a59 CreateActCtxA 104->105 107 14c5a5b-14c5a61 105->107 108 14c5a62-14c5abc 105->108 107->108 115 14c5abe-14c5ac1 108->115 116 14c5acb-14c5acf 108->116 115->116 117 14c5ae0 116->117 118 14c5ad1-14c5add 116->118 119 14c5ae1 117->119 118->117 119->119
                  APIs
                  • CreateActCtxA.KERNEL32(?), ref: 014C5A49
                  Memory Dump Source
                  • Source File: 00000004.00000002.2167947489.00000000014C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014C0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_14c0000_RegAsm.jbxd
                  Similarity
                  • API ID: Create
                  • String ID:
                  • API String ID: 2289755597-0
                  • Opcode ID: f9221fb9de8867ede7bb39b9d40b7c93168e84291e09fccc178908b83a4461ec
                  • Instruction ID: 6d7154e215f6648612c7c4a71747026dd4f37cb4699dd87baaafd7653deb186d
                  • Opcode Fuzzy Hash: f9221fb9de8867ede7bb39b9d40b7c93168e84291e09fccc178908b83a4461ec
                  • Instruction Fuzzy Hash: DE41E070D0071DCBDB24CFAAC984BCEBBB1BF88704F20806AD408AB251DB766946CF50

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 121 14c456c-14c5a59 CreateActCtxA 124 14c5a5b-14c5a61 121->124 125 14c5a62-14c5abc 121->125 124->125 132 14c5abe-14c5ac1 125->132 133 14c5acb-14c5acf 125->133 132->133 134 14c5ae0 133->134 135 14c5ad1-14c5add 133->135 136 14c5ae1 134->136 135->134 136->136
                  APIs
                  • CreateActCtxA.KERNEL32(?), ref: 014C5A49
                  Memory Dump Source
                  • Source File: 00000004.00000002.2167947489.00000000014C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014C0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_14c0000_RegAsm.jbxd
                  Similarity
                  • API ID: Create
                  • String ID:
                  • API String ID: 2289755597-0
                  • Opcode ID: b1eb48e210032061c86838755636e8a9669c300df302a28cf03edc98537cb0de
                  • Instruction ID: caf6be7ba5ca91e7e80e75bc681c5c36b917c22feacc7f8814fb87bf09cf89a0
                  • Opcode Fuzzy Hash: b1eb48e210032061c86838755636e8a9669c300df302a28cf03edc98537cb0de
                  • Instruction Fuzzy Hash: 2341E2B4D0071DCBDB24CFAAC984BDEBBB5BF48704F20806AD508AB251DB756946CF90

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 138 14cee00-14cee03 139 14cee08-14cee9c DuplicateHandle 138->139 140 14cee9e-14ceea4 139->140 141 14ceea5-14ceec2 139->141 140->141
                  APIs
                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 014CEE8F
                  Memory Dump Source
                  • Source File: 00000004.00000002.2167947489.00000000014C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014C0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_14c0000_RegAsm.jbxd
                  Similarity
                  • API ID: DuplicateHandle
                  • String ID:
                  • API String ID: 3793708945-0
                  • Opcode ID: 95447703fcaabd8c0dd2617b6a819899914fb5920db29e6db4ed3dafab14ac37
                  • Instruction ID: 8f5afb5827dbf9a2aebef5a5b791dcb36111c42a59c92aef8bddc3c963bdc38b
                  • Opcode Fuzzy Hash: 95447703fcaabd8c0dd2617b6a819899914fb5920db29e6db4ed3dafab14ac37
                  • Instruction Fuzzy Hash: 8621E4B69012499FDB10CFAAD984ADEFFF4EB48720F14841AE918B3310D374A954CF64

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 144 14cc310-14ccde0 147 14ccde8-14cce17 LoadLibraryExW 144->147 148 14ccde2-14ccde5 144->148 149 14cce19-14cce1f 147->149 150 14cce20-14cce3d 147->150 148->147 149->150
                  APIs
                  • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,014CCBF9,00000800,00000000,00000000), ref: 014CCE0A
                  Memory Dump Source
                  • Source File: 00000004.00000002.2167947489.00000000014C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014C0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_14c0000_RegAsm.jbxd
                  Similarity
                  • API ID: LibraryLoad
                  • String ID:
                  • API String ID: 1029625771-0
                  • Opcode ID: 0603901a238a4d520fb483071937f69211a4e90bd6feebf4097aba38465ef460
                  • Instruction ID: 87417c819947ea17fe8fff860198a7c026dacc3e614b09de9f1ba9b2e409b15c
                  • Opcode Fuzzy Hash: 0603901a238a4d520fb483071937f69211a4e90bd6feebf4097aba38465ef460
                  • Instruction Fuzzy Hash: 6A2139B68043498FDB10CF9AC884ADEBFF4AB49620F14846ED559A7210C3B4A545CFA5

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 153 14cee08-14cee9c DuplicateHandle 154 14cee9e-14ceea4 153->154 155 14ceea5-14ceec2 153->155 154->155
                  APIs
                  • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 014CEE8F
                  Memory Dump Source
                  • Source File: 00000004.00000002.2167947489.00000000014C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014C0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_14c0000_RegAsm.jbxd
                  Similarity
                  • API ID: DuplicateHandle
                  • String ID:
                  • API String ID: 3793708945-0
                  • Opcode ID: bbbacdd9976c3b8c3a66186c79a25d3c5096390b0b7aafc1523d3f6fbac445e1
                  • Instruction ID: d0451a956a8beb4e1b8eb9ea259784c13a594031adf67bb6a6d783ab82978a4e
                  • Opcode Fuzzy Hash: bbbacdd9976c3b8c3a66186c79a25d3c5096390b0b7aafc1523d3f6fbac445e1
                  • Instruction Fuzzy Hash: 4521C2B59002499FDB10CFAAD984ADEBFF4EB48720F14841AE918B3310D378A954CFA5

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 158 14cc328-14ccde0 160 14ccde8-14cce17 LoadLibraryExW 158->160 161 14ccde2-14ccde5 158->161 162 14cce19-14cce1f 160->162 163 14cce20-14cce3d 160->163 161->160 162->163
                  APIs
                  • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,014CCBF9,00000800,00000000,00000000), ref: 014CCE0A
                  Memory Dump Source
                  • Source File: 00000004.00000002.2167947489.00000000014C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014C0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_14c0000_RegAsm.jbxd
                  Similarity
                  • API ID: LibraryLoad
                  • String ID:
                  • API String ID: 1029625771-0
                  • Opcode ID: 4c305b68ac142353990844de10abf92e76a3d41942c1074833c506d44a220195
                  • Instruction ID: 6a05e2474386bdb38d32440193368822ab77f0b120c2504f0238c6744d03da03
                  • Opcode Fuzzy Hash: 4c305b68ac142353990844de10abf92e76a3d41942c1074833c506d44a220195
                  • Instruction Fuzzy Hash: 991103B68002499FDB10CF9AC884B9EFBF4EB88720F14842EE519A7210C374A545CFA5

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 166 14ccd99-14ccde0 168 14ccde8-14cce17 LoadLibraryExW 166->168 169 14ccde2-14ccde5 166->169 170 14cce19-14cce1f 168->170 171 14cce20-14cce3d 168->171 169->168 170->171
                  APIs
                  • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,014CCBF9,00000800,00000000,00000000), ref: 014CCE0A
                  Memory Dump Source
                  • Source File: 00000004.00000002.2167947489.00000000014C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014C0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_14c0000_RegAsm.jbxd
                  Similarity
                  • API ID: LibraryLoad
                  • String ID:
                  • API String ID: 1029625771-0
                  • Opcode ID: e7a1aaf59312427e84b5eadfe29f8b22af0e9227a10f3922c4d744af59147249
                  • Instruction ID: fb2e3f0d65207e79892b0c5b85769b4241b511dfe9fb7118f3598a33fb3e26ae
                  • Opcode Fuzzy Hash: e7a1aaf59312427e84b5eadfe29f8b22af0e9227a10f3922c4d744af59147249
                  • Instruction Fuzzy Hash: 2E11FFB68002099FDB10CF9AC984A9EBBF4AB88620F14842EE519A7210C775A545CFA5

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 174 14ccb18-14ccb58 175 14ccb5a-14ccb5d 174->175 176 14ccb60-14ccb8b GetModuleHandleW 174->176 175->176 177 14ccb8d-14ccb93 176->177 178 14ccb94-14ccba8 176->178 177->178
                  APIs
                  • GetModuleHandleW.KERNELBASE(00000000), ref: 014CCB7E
                  Memory Dump Source
                  • Source File: 00000004.00000002.2167947489.00000000014C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014C0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_14c0000_RegAsm.jbxd
                  Similarity
                  • API ID: HandleModule
                  • String ID:
                  • API String ID: 4139908857-0
                  • Opcode ID: e6f25e4984e4c097a7c48245e153ed6875934bfda48c74acb17d607212348595
                  • Instruction ID: 6e781f7cc457ea9e8d20f554b105947647819117822074c04f5b2adb675838cc
                  • Opcode Fuzzy Hash: e6f25e4984e4c097a7c48245e153ed6875934bfda48c74acb17d607212348595
                  • Instruction Fuzzy Hash: 4E110FB6C007498FDB10CF9AD444B9EFBF4EB88A24F14842AD518A7210D378A545CFA5
                  Memory Dump Source
                  • Source File: 00000004.00000002.2160304931.000000000141D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0141D000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_141d000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 3be5b7dcbbc1771807890f5d7140fd2c0c2ca1307277eebb296bc79599734e56
                  • Instruction ID: bf0ef69e7f970c234d61162021030540326a43fbbc9547755ab4c4f662f42fdc
                  • Opcode Fuzzy Hash: 3be5b7dcbbc1771807890f5d7140fd2c0c2ca1307277eebb296bc79599734e56
                  • Instruction Fuzzy Hash: 152128B2904244DFDB05DF54D9C4B27BF65FB84318F24856ED9090B32AC336D456CBA1
                  Memory Dump Source
                  • Source File: 00000004.00000002.2161314938.000000000142D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0142D000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_142d000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 90ebfa618892debebec40309c5c60195754de2f76d14a8fda857c3c1ba27a509
                  • Instruction ID: 648dd7fe9c7b2b9f71ef99f5c64466b025c54b9291be3a65d1ad8fd80ea3c428
                  • Opcode Fuzzy Hash: 90ebfa618892debebec40309c5c60195754de2f76d14a8fda857c3c1ba27a509
                  • Instruction Fuzzy Hash: 58214671904300EFDB05DF94D9C0B26BBA1FB85324F60C5AED9094B362C776D486CA71
                  Memory Dump Source
                  • Source File: 00000004.00000002.2161314938.000000000142D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0142D000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_142d000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: e49198f8245c17addcea939873c6111500fb73c3b4a15f90617b0319c85e5d4f
                  • Instruction ID: 7a4620df1967ddcb5a21b5aea5d83f8c83430ff6ad599a6c6ae405772bf30ae9
                  • Opcode Fuzzy Hash: e49198f8245c17addcea939873c6111500fb73c3b4a15f90617b0319c85e5d4f
                  • Instruction Fuzzy Hash: 732142B1A04240EFCB14CF54D9C0B26BBA1EB84318F60C56ED90A4B372C77AC487CA61
                  Memory Dump Source
                  • Source File: 00000004.00000002.2161314938.000000000142D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0142D000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_142d000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: f457b931c09cf8e5d8cd6eea1c670eff30a319908c8801d90461117a341ec326
                  • Instruction ID: 6025c220d7145bf2ec9208730c8bca9d00fc0b72513015b336fd879e9616c4d5
                  • Opcode Fuzzy Hash: f457b931c09cf8e5d8cd6eea1c670eff30a319908c8801d90461117a341ec326
                  • Instruction Fuzzy Hash: D9218E755093808FCB12CF24D990716BF71EB46218F28C5EBD8498B667C33A984ACB62
                  Memory Dump Source
                  • Source File: 00000004.00000002.2160304931.000000000141D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0141D000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_141d000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 5a5504dfd99aeaae02a5904faf24bf7c180eb56da23d91347c8bcbb22ee6d9b3
                  • Instruction ID: bfa275fa30cc6e4966e7c071b23945c65d32959000bcc823f4ebfd0764e6829f
                  • Opcode Fuzzy Hash: 5a5504dfd99aeaae02a5904faf24bf7c180eb56da23d91347c8bcbb22ee6d9b3
                  • Instruction Fuzzy Hash: BC11B1B6904280CFCB16CF54D9C4B16BF71FB84318F2486AAD9094B72AC33AD456CBA1
                  Memory Dump Source
                  • Source File: 00000004.00000002.2161314938.000000000142D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0142D000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_142d000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 3adcda68119555c6f25b62d92a5950083e81dc615a2459920abefbb8922beed6
                  • Instruction ID: c8e44e8b983b9c85ce06d56521b3e8808642d3b8ff6a381982b356b7dcc38f23
                  • Opcode Fuzzy Hash: 3adcda68119555c6f25b62d92a5950083e81dc615a2459920abefbb8922beed6
                  • Instruction Fuzzy Hash: 3411BE75904280DFDB02CF54C5C0B16BB61FB85224F24C6AAD8494B766C33AD44ACB61
                  Memory Dump Source
                  • Source File: 00000004.00000002.2167947489.00000000014C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014C0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_14c0000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: ab2c70c9ad38e7da82f49810f6eabbff648f98e2c6d5552fd5fb6b4930829af8
                  • Instruction ID: dbed7251a4b786429c5336fded6e49ecc0cc14be88de35bdd0719282f752fe44
                  • Opcode Fuzzy Hash: ab2c70c9ad38e7da82f49810f6eabbff648f98e2c6d5552fd5fb6b4930829af8
                  • Instruction Fuzzy Hash: DC813F70A01249CFE758DF6BE950699BFF2FBC4300F54C06AC414AB279EB785886CB59
                  Memory Dump Source
                  • Source File: 00000004.00000002.2167947489.00000000014C0000.00000040.00000800.00020000.00000000.sdmp, Offset: 014C0000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_4_2_14c0000_RegAsm.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 7927acd8b12ef15b739ea9b06574fddd9691ac8094c9955d160c80fcce1c6c93
                  • Instruction ID: 2e0f81d5f9ace882f781935bbf873a4e6d56401c0ade994cb9cd024fb6f45088
                  • Opcode Fuzzy Hash: 7927acd8b12ef15b739ea9b06574fddd9691ac8094c9955d160c80fcce1c6c93
                  • Instruction Fuzzy Hash: AA61FA70A01609CFE758DF6BE950A9EBFF2FBC4300F54C16AC414AB278EB7858858B54