Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
0I9GLRSiy0.exe

Overview

General Information

Sample name:0I9GLRSiy0.exe
renamed because original name is a hash value
Original sample name:d91d556c48fefc1f1884371fa4277298c37b78d2296a4cf10af7c1f7036f38b8.exe
Analysis ID:1588565
MD5:278a25d8b1beac144cd590ae592bf680
SHA1:d4b9110b6410fcb37e99ba258610a5f7d12fcfb5
SHA256:d91d556c48fefc1f1884371fa4277298c37b78d2296a4cf10af7c1f7036f38b8
Tags:AgentTeslaexeuser-adrian__luca
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
Yara detected AntiVM3
AI detected suspicious sample
Check if machine is in data center or colocation facility
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Machine Learning detection for sample
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Yara detected Generic Downloader
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if the current process is being debugged
Detected non-DNS traffic on DNS port
Detected potential crypto function
Enables debug privileges
HTTP GET or POST without a user agent
IP address seen in connection with other malware
May check the online IP address of the machine
PE / OLE file has an invalid certificate
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • 0I9GLRSiy0.exe (PID: 5696 cmdline: "C:\Users\user\Desktop\0I9GLRSiy0.exe" MD5: 278A25D8B1BEAC144CD590AE592BF680)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "FTP", "Host": "ftp://ftp.solucionesmexico.mx", "Username": "mynewfile@solucionesmexico.mx", "Password": "dGG^ZYIxX5!B"}
SourceRuleDescriptionAuthorStrings
00000000.00000002.3390551615.0000000002847000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000000.00000002.3393704064.0000000006CA0000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000000.00000002.3393704064.0000000006CA0000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
        00000000.00000002.3393704064.0000000006CA0000.00000004.08000000.00040000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          00000000.00000002.3393704064.0000000006CA0000.00000004.08000000.00040000.00000000.sdmpINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
          • 0x3454f:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
          • 0x345c1:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
          • 0x3464b:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
          • 0x346dd:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
          • 0x34747:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
          • 0x347b9:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
          • 0x3484f:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
          • 0x348df:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
          Click to see the 6 entries
          SourceRuleDescriptionAuthorStrings
          0.2.0I9GLRSiy0.exe.3809970.1.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            0.2.0I9GLRSiy0.exe.3809970.1.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              0.2.0I9GLRSiy0.exe.3809970.1.unpackINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
              • 0x3274f:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
              • 0x327c1:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
              • 0x3284b:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
              • 0x328dd:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
              • 0x32947:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
              • 0x329b9:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
              • 0x32a4f:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
              • 0x32adf:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
              0.2.0I9GLRSiy0.exe.3809970.1.unpackMALWARE_Win_AgentTeslaV2AgenetTesla Type 2 Keylogger payloadditekSHen
              • 0x2f939:$s2: GetPrivateProfileString
              • 0x2ef82:$s3: get_OSFullName
              • 0x30618:$s5: remove_Key
              • 0x307f2:$s5: remove_Key
              • 0x31764:$s6: FtpWebRequest
              • 0x32731:$s7: logins
              • 0x32ca3:$s7: logins
              • 0x359b4:$s7: logins
              • 0x35a66:$s7: logins
              • 0x373b9:$s7: logins
              • 0x36600:$s9: 1.85 (Hash, version 2, native byte-order)
              0.2.0I9GLRSiy0.exe.3845590.4.raw.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                Click to see the 22 entries
                No Sigma rule has matched
                No Suricata rule has matched

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: 0I9GLRSiy0.exeAvira: detected
                Source: 0.2.0I9GLRSiy0.exe.6ca0000.6.raw.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "FTP", "Host": "ftp://ftp.solucionesmexico.mx", "Username": "mynewfile@solucionesmexico.mx", "Password": "dGG^ZYIxX5!B"}
                Source: 0I9GLRSiy0.exeVirustotal: Detection: 75%Perma Link
                Source: 0I9GLRSiy0.exeReversingLabs: Detection: 71%
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: 0I9GLRSiy0.exeJoe Sandbox ML: detected
                Source: 0I9GLRSiy0.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: 0I9GLRSiy0.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                Networking

                barindex
                Source: Yara matchFile source: 0.2.0I9GLRSiy0.exe.3845590.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.0I9GLRSiy0.exe.6ca0000.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.0I9GLRSiy0.exe.3809970.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.3393704064.0000000006CA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: global trafficTCP traffic: 192.168.2.6:63153 -> 162.159.36.2:53
                Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                Source: Joe Sandbox ViewIP Address: 208.95.112.1 208.95.112.1
                Source: unknownDNS query: name: ip-api.com
                Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
                Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
                Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
                Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                Source: global trafficDNS traffic detected: DNS query: ip-api.com
                Source: global trafficDNS traffic detected: DNS query: 171.39.242.20.in-addr.arpa
                Source: global trafficDNS traffic detected: DNS query: 200.163.202.172.in-addr.arpa
                Source: 0I9GLRSiy0.exeString found in binary or memory: http://crl.comodoca.com/COMODORSACertificationAuthority.crl0q
                Source: 0I9GLRSiy0.exeString found in binary or memory: http://crl.comodoca.com/COMODORSACodeSigningCA.crl0t
                Source: 0I9GLRSiy0.exe, 00000000.00000002.3390551615.0000000002801000.00000004.00000800.00020000.00000000.sdmp, 0I9GLRSiy0.exe, 00000000.00000002.3390551615.00000000028D4000.00000004.00000800.00020000.00000000.sdmp, 0I9GLRSiy0.exe, 00000000.00000002.3390551615.00000000028B8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com
                Source: 0I9GLRSiy0.exe, 00000000.00000002.3390551615.0000000002801000.00000004.00000800.00020000.00000000.sdmp, 0I9GLRSiy0.exe, 00000000.00000002.3390551615.00000000028B8000.00000004.00000800.00020000.00000000.sdmp, 0I9GLRSiy0.exe, 00000000.00000002.3391526072.0000000003801000.00000004.00000800.00020000.00000000.sdmp, 0I9GLRSiy0.exe, 00000000.00000002.3393704064.0000000006CA0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: http://ip-api.com/line/?fields=hosting
                Source: 0I9GLRSiy0.exeString found in binary or memory: http://localhost/calculator_server/requests.php
                Source: 0I9GLRSiy0.exeString found in binary or memory: http://ocsp.comodoca.com0
                Source: 0I9GLRSiy0.exe, 00000000.00000002.3390551615.0000000002801000.00000004.00000800.00020000.00000000.sdmp, 0I9GLRSiy0.exe, 00000000.00000002.3390551615.00000000028B8000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                Source: 0I9GLRSiy0.exe, 00000000.00000002.3391526072.0000000003801000.00000004.00000800.00020000.00000000.sdmp, 0I9GLRSiy0.exe, 00000000.00000002.3393704064.0000000006CA0000.00000004.08000000.00040000.00000000.sdmpString found in binary or memory: https://account.dyn.com/
                Source: 0I9GLRSiy0.exeString found in binary or memory: https://www.chiark.greenend.org.uk/~sgtatham/putty/0

                System Summary

                barindex
                Source: 0.2.0I9GLRSiy0.exe.3809970.1.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 0.2.0I9GLRSiy0.exe.3809970.1.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                Source: 0.2.0I9GLRSiy0.exe.3845590.4.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 0.2.0I9GLRSiy0.exe.3845590.4.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                Source: 0.2.0I9GLRSiy0.exe.3845590.4.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 0.2.0I9GLRSiy0.exe.3845590.4.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                Source: 0.2.0I9GLRSiy0.exe.6ca0000.6.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 0.2.0I9GLRSiy0.exe.6ca0000.6.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                Source: 0.2.0I9GLRSiy0.exe.6ca0000.6.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 0.2.0I9GLRSiy0.exe.6ca0000.6.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                Source: 0.2.0I9GLRSiy0.exe.3809970.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 0.2.0I9GLRSiy0.exe.3809970.1.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                Source: 00000000.00000002.3393704064.0000000006CA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                Source: 00000000.00000002.3393704064.0000000006CA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeCode function: 0_2_02673E280_2_02673E28
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeCode function: 0_2_02676F900_2_02676F90
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeCode function: 0_2_0267DFB40_2_0267DFB4
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeCode function: 0_2_06FDAC880_2_06FDAC88
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeCode function: 0_2_06FDB8A00_2_06FDB8A0
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeCode function: 0_2_06FDAFD00_2_06FDAFD0
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeCode function: 0_2_06FD5FA80_2_06FD5FA8
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeCode function: 0_2_06FD5FA70_2_06FD5FA7
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeCode function: 0_2_06FD3F500_2_06FD3F50
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeCode function: 0_2_06FD65900_2_06FD6590
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeCode function: 0_2_06FD43880_2_06FD4388
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeCode function: 0_2_06FD43790_2_06FD4379
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeCode function: 0_2_06FD3B180_2_06FD3B18
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeCode function: 0_2_076508A40_2_076508A4
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeCode function: 0_2_076525180_2_07652518
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeCode function: 0_2_076508680_2_07650868
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeCode function: 0_2_076508100_2_07650810
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeCode function: 0_2_076508950_2_07650895
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeCode function: 0_2_0A916AD00_2_0A916AD0
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeCode function: 0_2_0A9132C80_2_0A9132C8
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeCode function: 0_2_0A9190180_2_0A919018
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeCode function: 0_2_0A9100400_2_0A910040
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeCode function: 0_2_0A9178780_2_0A917878
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeCode function: 0_2_0A91DF000_2_0A91DF00
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeCode function: 0_2_0A9100060_2_0A910006
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeCode function: 0_2_0A9189300_2_0A918930
                Source: 0I9GLRSiy0.exeStatic PE information: invalid certificate
                Source: 0I9GLRSiy0.exe, 00000000.00000002.3391526072.00000000038E0000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs 0I9GLRSiy0.exe
                Source: 0I9GLRSiy0.exe, 00000000.00000002.3391526072.0000000003801000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename1d2b2f51-e841-4af2-8893-cf0c11544dea.exe0 vs 0I9GLRSiy0.exe
                Source: 0I9GLRSiy0.exe, 00000000.00000002.3393704064.0000000006CA0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilename1d2b2f51-e841-4af2-8893-cf0c11544dea.exe0 vs 0I9GLRSiy0.exe
                Source: 0I9GLRSiy0.exe, 00000000.00000000.2130680253.000000000044A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameazmse.exe" vs 0I9GLRSiy0.exe
                Source: 0I9GLRSiy0.exe, 00000000.00000002.3388981720.000000000085E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs 0I9GLRSiy0.exe
                Source: 0I9GLRSiy0.exe, 00000000.00000002.3393157835.00000000058A0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameArthur.dll" vs 0I9GLRSiy0.exe
                Source: 0I9GLRSiy0.exe, 00000000.00000002.3394008794.0000000006F30000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameMontero.dll8 vs 0I9GLRSiy0.exe
                Source: 0I9GLRSiy0.exe, 00000000.00000002.3390551615.0000000002911000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameArthur.dll" vs 0I9GLRSiy0.exe
                Source: 0I9GLRSiy0.exeBinary or memory string: OriginalFilenameazmse.exe" vs 0I9GLRSiy0.exe
                Source: 0I9GLRSiy0.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: 0.2.0I9GLRSiy0.exe.3809970.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 0.2.0I9GLRSiy0.exe.3809970.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                Source: 0.2.0I9GLRSiy0.exe.3845590.4.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 0.2.0I9GLRSiy0.exe.3845590.4.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                Source: 0.2.0I9GLRSiy0.exe.3845590.4.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 0.2.0I9GLRSiy0.exe.3845590.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                Source: 0.2.0I9GLRSiy0.exe.6ca0000.6.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 0.2.0I9GLRSiy0.exe.6ca0000.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                Source: 0.2.0I9GLRSiy0.exe.6ca0000.6.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 0.2.0I9GLRSiy0.exe.6ca0000.6.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                Source: 0.2.0I9GLRSiy0.exe.3809970.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 0.2.0I9GLRSiy0.exe.3809970.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                Source: 00000000.00000002.3393704064.0000000006CA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                Source: 00000000.00000002.3393704064.0000000006CA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                Source: 0I9GLRSiy0.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@1/0@3/1
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeMutant created: NULL
                Source: 0I9GLRSiy0.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: 0I9GLRSiy0.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.98%
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: 0I9GLRSiy0.exe, 00000000.00000002.3390551615.0000000002902000.00000004.00000800.00020000.00000000.sdmp, 0I9GLRSiy0.exe, 00000000.00000002.3390551615.00000000028EF000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: 0I9GLRSiy0.exeVirustotal: Detection: 75%
                Source: 0I9GLRSiy0.exeReversingLabs: Detection: 71%
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeSection loaded: windowscodecs.dllJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeSection loaded: gpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeSection loaded: dwrite.dllJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeSection loaded: iconcodecservice.dllJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeSection loaded: wbemcomn.dllJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeSection loaded: rasapi32.dllJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeSection loaded: rasman.dllJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeSection loaded: rtutils.dllJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeSection loaded: dhcpcsvc6.dllJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeSection loaded: dhcpcsvc.dllJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeSection loaded: vaultcli.dllJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                Source: 0I9GLRSiy0.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: 0I9GLRSiy0.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeCode function: 0_2_02675E00 push eax; iretd 0_2_02675E09
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeCode function: 0_2_06FD3656 push ecx; iretd 0_2_06FD3658
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeCode function: 0_2_06FD6FD5 push eax; iretd 0_2_06FD6FD6
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeCode function: 0_2_06FD6F93 push ecx; iretd 0_2_06FD6F94
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeCode function: 0_2_06FD1F89 push 1FB806FBh; iretd 0_2_06FD1F96
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeCode function: 0_2_06FD3788 push ecx; iretd 0_2_06FD378A
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeCode function: 0_2_06FD9F68 pushad ; iretd 0_2_06FD9F71
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeCode function: 0_2_06FD34E5 push ecx; iretd 0_2_06FD34E7
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeCode function: 0_2_06FD3466 push ecx; iretd 0_2_06FD3468
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeCode function: 0_2_06FD343F push ecx; iretd 0_2_06FD3441
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeCode function: 0_2_06FD7429 push edx; iretd 0_2_06FD7436
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeCode function: 0_2_06FD5DC2 push eax; iretd 0_2_06FD5DC6
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeCode function: 0_2_06FD3581 push ecx; iretd 0_2_06FD3583
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeCode function: 0_2_06FD5D6A push eax; iretd 0_2_06FD5D76
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeCode function: 0_2_06FD3557 push ecx; iretd 0_2_06FD3559
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeCode function: 0_2_06FD3512 push ecx; iretd 0_2_06FD3514
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeCode function: 0_2_06FD72A9 push edx; iretd 0_2_06FD72B4
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeCode function: 0_2_06FD5228 push ecx; iretd 0_2_06FD5446
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeCode function: 0_2_06FD7B80 push ecx; iretd 0_2_06FD7B8E
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeCode function: 0_2_06FD735A push edx; iretd 0_2_06FD735C
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeCode function: 0_2_06FD38A7 push ecx; iretd 0_2_06FD38A9
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeCode function: 0_2_06FDC885 pushfd ; iretd 0_2_06FDC88A
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeCode function: 0_2_06FD2049 push 24F806FBh; iretd 0_2_06FD2056
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeCode function: 0_2_06FD3812 push ecx; iretd 0_2_06FD3814
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeCode function: 0_2_06FD71EA push ecx; iretd 0_2_06FD71EB
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeCode function: 0_2_06FD39C1 push ecx; iretd 0_2_06FD39C3
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeCode function: 0_2_06FD7164 push ecx; iretd 0_2_06FD7165
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeCode function: 0_2_06FD7919 pushfd ; iretd 0_2_06FD7925
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeCode function: 0_2_0A91D061 push es; ret 0_2_0A91D070
                Source: 0I9GLRSiy0.exeStatic PE information: section name: .text entropy: 7.788640730466507
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: Yara matchFile source: Process Memory Space: 0I9GLRSiy0.exe PID: 5696, type: MEMORYSTR
                Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                Source: 0I9GLRSiy0.exe, 00000000.00000002.3390551615.00000000028D4000.00000004.00000800.00020000.00000000.sdmp, 0I9GLRSiy0.exe, 00000000.00000002.3390551615.0000000002847000.00000004.00000800.00020000.00000000.sdmp, 0I9GLRSiy0.exe, 00000000.00000002.3391526072.0000000003801000.00000004.00000800.00020000.00000000.sdmp, 0I9GLRSiy0.exe, 00000000.00000002.3393704064.0000000006CA0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeMemory allocated: 2560000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeMemory allocated: 2800000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeMemory allocated: 2560000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeMemory allocated: 7710000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeMemory allocated: 8710000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeMemory allocated: 88C0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeMemory allocated: 98C0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_ComputerSystem
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                Source: 0I9GLRSiy0.exe, 00000000.00000002.3390551615.0000000002847000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware
                Source: 0I9GLRSiy0.exe, 00000000.00000002.3393704064.0000000006CA0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: vmware
                Source: 0I9GLRSiy0.exe, 00000000.00000002.3393704064.0000000006CA0000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: VMwareVBox
                Source: 0I9GLRSiy0.exe, 00000000.00000002.3393283957.0000000005957000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeProcess information queried: ProcessInformationJump to behavior

                Anti Debugging

                barindex
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeCode function: 0_2_06FDC610 CheckRemoteDebuggerPresent,0_2_06FDC610
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeProcess queried: DebugPortJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeMemory allocated: page read and write | page guardJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeQueries volume information: C:\Users\user\Desktop\0I9GLRSiy0.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 0.2.0I9GLRSiy0.exe.3809970.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.0I9GLRSiy0.exe.3845590.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.0I9GLRSiy0.exe.3845590.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.0I9GLRSiy0.exe.6ca0000.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.0I9GLRSiy0.exe.6ca0000.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.0I9GLRSiy0.exe.3809970.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.3393704064.0000000006CA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.3391526072.0000000003801000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: 0I9GLRSiy0.exe PID: 5696, type: MEMORYSTR
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                Source: C:\Users\user\Desktop\0I9GLRSiy0.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                Source: Yara matchFile source: 0.2.0I9GLRSiy0.exe.3809970.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.0I9GLRSiy0.exe.3845590.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.0I9GLRSiy0.exe.3845590.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.0I9GLRSiy0.exe.6ca0000.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.0I9GLRSiy0.exe.6ca0000.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.0I9GLRSiy0.exe.3809970.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.3390551615.0000000002847000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.3393704064.0000000006CA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.3391526072.0000000003801000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: 0I9GLRSiy0.exe PID: 5696, type: MEMORYSTR

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 0.2.0I9GLRSiy0.exe.3809970.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.0I9GLRSiy0.exe.3845590.4.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.0I9GLRSiy0.exe.3845590.4.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.0I9GLRSiy0.exe.6ca0000.6.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.0I9GLRSiy0.exe.6ca0000.6.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.0I9GLRSiy0.exe.3809970.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.3393704064.0000000006CA0000.00000004.08000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.3391526072.0000000003801000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: 0I9GLRSiy0.exe PID: 5696, type: MEMORYSTR
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid Accounts231
                Windows Management Instrumentation
                1
                DLL Side-Loading
                1
                DLL Side-Loading
                24
                Virtualization/Sandbox Evasion
                1
                OS Credential Dumping
                531
                Security Software Discovery
                Remote Services1
                Email Collection
                1
                Encrypted Channel
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
                Disable or Modify Tools
                LSASS Memory24
                Virtualization/Sandbox Evasion
                Remote Desktop Protocol1
                Archive Collected Data
                1
                Ingress Tool Transfer
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)2
                Obfuscated Files or Information
                Security Account Manager1
                Process Discovery
                SMB/Windows Admin Shares1
                Data from Local System
                2
                Non-Application Layer Protocol
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook2
                Software Packing
                NTDS1
                System Network Configuration Discovery
                Distributed Component Object ModelInput Capture2
                Application Layer Protocol
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                DLL Side-Loading
                LSA Secrets1
                File and Directory Discovery
                SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials34
                System Information Discovery
                VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                0I9GLRSiy0.exe75%VirustotalBrowse
                0I9GLRSiy0.exe71%ReversingLabsByteCode-MSIL.Backdoor.FormBook
                0I9GLRSiy0.exe100%AviraHEUR/AGEN.1357257
                0I9GLRSiy0.exe100%Joe Sandbox ML
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                NameIPActiveMaliciousAntivirus DetectionReputation
                ip-api.com
                208.95.112.1
                truefalse
                  high
                  171.39.242.20.in-addr.arpa
                  unknown
                  unknownfalse
                    high
                    200.163.202.172.in-addr.arpa
                    unknown
                    unknownfalse
                      unknown
                      NameMaliciousAntivirus DetectionReputation
                      http://ip-api.com/line/?fields=hostingfalse
                        high
                        NameSourceMaliciousAntivirus DetectionReputation
                        https://account.dyn.com/0I9GLRSiy0.exe, 00000000.00000002.3391526072.0000000003801000.00000004.00000800.00020000.00000000.sdmp, 0I9GLRSiy0.exe, 00000000.00000002.3393704064.0000000006CA0000.00000004.08000000.00040000.00000000.sdmpfalse
                          high
                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0I9GLRSiy0.exe, 00000000.00000002.3390551615.0000000002801000.00000004.00000800.00020000.00000000.sdmp, 0I9GLRSiy0.exe, 00000000.00000002.3390551615.00000000028B8000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            https://www.chiark.greenend.org.uk/~sgtatham/putty/00I9GLRSiy0.exefalse
                              high
                              http://localhost/calculator_server/requests.php0I9GLRSiy0.exefalse
                                high
                                http://ip-api.com0I9GLRSiy0.exe, 00000000.00000002.3390551615.0000000002801000.00000004.00000800.00020000.00000000.sdmp, 0I9GLRSiy0.exe, 00000000.00000002.3390551615.00000000028D4000.00000004.00000800.00020000.00000000.sdmp, 0I9GLRSiy0.exe, 00000000.00000002.3390551615.00000000028B8000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  • No. of IPs < 25%
                                  • 25% < No. of IPs < 50%
                                  • 50% < No. of IPs < 75%
                                  • 75% < No. of IPs
                                  IPDomainCountryFlagASNASN NameMalicious
                                  208.95.112.1
                                  ip-api.comUnited States
                                  53334TUT-ASUSfalse
                                  Joe Sandbox version:42.0.0 Malachite
                                  Analysis ID:1588565
                                  Start date and time:2025-01-11 02:26:09 +01:00
                                  Joe Sandbox product:CloudBasic
                                  Overall analysis duration:0h 4m 39s
                                  Hypervisor based Inspection enabled:false
                                  Report type:full
                                  Cookbook file name:default.jbs
                                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                  Number of analysed new started processes analysed:6
                                  Number of new started drivers analysed:0
                                  Number of existing processes analysed:0
                                  Number of existing drivers analysed:0
                                  Number of injected processes analysed:0
                                  Technologies:
                                  • HCA enabled
                                  • EGA enabled
                                  • AMSI enabled
                                  Analysis Mode:default
                                  Analysis stop reason:Timeout
                                  Sample name:0I9GLRSiy0.exe
                                  renamed because original name is a hash value
                                  Original Sample Name:d91d556c48fefc1f1884371fa4277298c37b78d2296a4cf10af7c1f7036f38b8.exe
                                  Detection:MAL
                                  Classification:mal100.troj.spyw.evad.winEXE@1/0@3/1
                                  EGA Information:
                                  • Successful, ratio: 100%
                                  HCA Information:
                                  • Successful, ratio: 99%
                                  • Number of executed functions: 39
                                  • Number of non-executed functions: 10
                                  Cookbook Comments:
                                  • Found application associated with file extension: .exe
                                  • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                                  • Excluded IPs from analysis (whitelisted): 2.23.242.162, 13.107.246.45, 172.202.163.200, 20.242.39.171, 4.245.163.56
                                  • Excluded domains from analysis (whitelisted): client.wns.windows.com, fs.microsoft.com, ocsp.digicert.com, otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                                  • Report size getting too big, too many NtQueryValueKey calls found.
                                  • Report size getting too big, too many NtReadVirtualMemory calls found.
                                  TimeTypeDescription
                                  20:27:01API Interceptor2x Sleep call for process: 0I9GLRSiy0.exe modified
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  208.95.112.1NUGMrDcg4v.exeGet hashmaliciousAgentTeslaBrowse
                                  • ip-api.com/line/?fields=hosting
                                  LMxd0gpIxe.exeGet hashmaliciousAgentTeslaBrowse
                                  • ip-api.com/line/?fields=hosting
                                  rComprobante_swift_8676534657698632.exeGet hashmaliciousAgentTeslaBrowse
                                  • ip-api.com/line/?fields=hosting
                                  28uMwHvbTD.exeGet hashmaliciousAgentTeslaBrowse
                                  • ip-api.com/line/?fields=hosting
                                  e4Iw3lwFJ5.exeGet hashmaliciousAgentTeslaBrowse
                                  • ip-api.com/line/?fields=hosting
                                  uOCavrYu1y.exeGet hashmaliciousAgentTeslaBrowse
                                  • ip-api.com/line/?fields=hosting
                                  XoRPyi5s1i.exeGet hashmaliciousAgentTeslaBrowse
                                  • ip-api.com/line/?fields=hosting
                                  NX8j2O83Wu.exeGet hashmaliciousAgentTeslaBrowse
                                  • ip-api.com/line/?fields=hosting
                                  7569qiv4L2.exeGet hashmaliciousAgentTeslaBrowse
                                  • ip-api.com/line/?fields=hosting
                                  hCkkM0lH0P.exeGet hashmaliciousAgentTeslaBrowse
                                  • ip-api.com/line/?fields=hosting
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  ip-api.comNUGMrDcg4v.exeGet hashmaliciousAgentTeslaBrowse
                                  • 208.95.112.1
                                  LMxd0gpIxe.exeGet hashmaliciousAgentTeslaBrowse
                                  • 208.95.112.1
                                  rComprobante_swift_8676534657698632.exeGet hashmaliciousAgentTeslaBrowse
                                  • 208.95.112.1
                                  28uMwHvbTD.exeGet hashmaliciousAgentTeslaBrowse
                                  • 208.95.112.1
                                  e4Iw3lwFJ5.exeGet hashmaliciousAgentTeslaBrowse
                                  • 208.95.112.1
                                  uOCavrYu1y.exeGet hashmaliciousAgentTeslaBrowse
                                  • 208.95.112.1
                                  XoRPyi5s1i.exeGet hashmaliciousAgentTeslaBrowse
                                  • 208.95.112.1
                                  NX8j2O83Wu.exeGet hashmaliciousAgentTeslaBrowse
                                  • 208.95.112.1
                                  7569qiv4L2.exeGet hashmaliciousAgentTeslaBrowse
                                  • 208.95.112.1
                                  hCkkM0lH0P.exeGet hashmaliciousAgentTeslaBrowse
                                  • 208.95.112.1
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  TUT-ASUSNUGMrDcg4v.exeGet hashmaliciousAgentTeslaBrowse
                                  • 208.95.112.1
                                  LMxd0gpIxe.exeGet hashmaliciousAgentTeslaBrowse
                                  • 208.95.112.1
                                  rComprobante_swift_8676534657698632.exeGet hashmaliciousAgentTeslaBrowse
                                  • 208.95.112.1
                                  28uMwHvbTD.exeGet hashmaliciousAgentTeslaBrowse
                                  • 208.95.112.1
                                  e4Iw3lwFJ5.exeGet hashmaliciousAgentTeslaBrowse
                                  • 208.95.112.1
                                  uOCavrYu1y.exeGet hashmaliciousAgentTeslaBrowse
                                  • 208.95.112.1
                                  XoRPyi5s1i.exeGet hashmaliciousAgentTeslaBrowse
                                  • 208.95.112.1
                                  NX8j2O83Wu.exeGet hashmaliciousAgentTeslaBrowse
                                  • 208.95.112.1
                                  7569qiv4L2.exeGet hashmaliciousAgentTeslaBrowse
                                  • 208.95.112.1
                                  hCkkM0lH0P.exeGet hashmaliciousAgentTeslaBrowse
                                  • 208.95.112.1
                                  No context
                                  No context
                                  No created / dropped files found
                                  File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                  Entropy (8bit):7.784800031747238
                                  TrID:
                                  • Win32 Executable (generic) Net Framework (10011505/4) 49.98%
                                  • Win32 Executable (generic) a (10002005/4) 49.93%
                                  • Windows Screen Saver (13104/52) 0.07%
                                  • Generic Win/DOS Executable (2004/3) 0.01%
                                  • DOS Executable Generic (2002/1) 0.01%
                                  File name:0I9GLRSiy0.exe
                                  File size:704'520 bytes
                                  MD5:278a25d8b1beac144cd590ae592bf680
                                  SHA1:d4b9110b6410fcb37e99ba258610a5f7d12fcfb5
                                  SHA256:d91d556c48fefc1f1884371fa4277298c37b78d2296a4cf10af7c1f7036f38b8
                                  SHA512:92624e7713d5f58051b4668d969152bc6c56672ea40bd6d797a5097fcade3876b4cf085c25b52dc4ab8ebf39a30aa0284cf44b18993aeec77bd22d0d250bd4ec
                                  SSDEEP:12288:PPGzrfXc/HjdgsKG1E4LxdFqNFimnv04/njlcZdkR:uzXuHpgsKG+4LTSz04/jlT
                                  TLSH:2BE402AD5655E507DB6157340BB1F2B12BBC6FDEA400E2038FEDADEBB866E141C48181
                                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....Rg..............0..r............... ........@.. ....................................@................................
                                  Icon Hash:04852062591b5659
                                  Entrypoint:0x4a9006
                                  Entrypoint Section:.text
                                  Digitally signed:true
                                  Imagebase:0x400000
                                  Subsystem:windows gui
                                  Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                  DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                  Time Stamp:0x6752E9BA [Fri Dec 6 12:10:34 2024 UTC]
                                  TLS Callbacks:
                                  CLR (.Net) Version:
                                  OS Version Major:4
                                  OS Version Minor:0
                                  File Version Major:4
                                  File Version Minor:0
                                  Subsystem Version Major:4
                                  Subsystem Version Minor:0
                                  Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                  Signature Valid:false
                                  Signature Issuer:CN=COMODO RSA Code Signing CA, O=COMODO CA Limited, L=Salford, S=Greater Manchester, C=GB
                                  Signature Validation Error:The digital signature of the object did not verify
                                  Error Number:-2146869232
                                  Not Before, Not After
                                  • 13/11/2018 01:00:00 09/11/2021 00:59:59
                                  Subject Chain
                                  • CN=Simon Tatham, O=Simon Tatham, L=Cambridge, S=Cambridgeshire, C=GB
                                  Version:3
                                  Thumbprint MD5:DABD77E44EF6B3BB91740FA46696B779
                                  Thumbprint SHA-1:5B9E273CF11941FD8C6BE3F038C4797BBE884268
                                  Thumbprint SHA-256:4CD3325617EBB63319BA6E8F2A74B0B8CCA58920B48D8026EBCA2C756630D570
                                  Serial:7C1118CBBADC95DA3752C46E47A27438
                                  Instruction
                                  jmp dword ptr [00402000h]
                                  push ebx
                                  add byte ptr [ecx+00h], bh
                                  jnc 00007F04F8906772h
                                  je 00007F04F8906772h
                                  add byte ptr [ebp+00h], ch
                                  add byte ptr [ecx+00h], al
                                  arpl word ptr [eax], ax
                                  je 00007F04F8906772h
                                  imul eax, dword ptr [eax], 00610076h
                                  je 00007F04F8906772h
                                  outsd
                                  add byte ptr [edx+00h], dh
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  add byte ptr [eax], al
                                  NameVirtual AddressVirtual Size Is in Section
                                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IMPORT0xa8fb40x4f.text
                                  IMAGE_DIRECTORY_ENTRY_RESOURCE0xaa0000x13bc.rsrc
                                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                  IMAGE_DIRECTORY_ENTRY_SECURITY0xa8a000x3608
                                  IMAGE_DIRECTORY_ENTRY_BASERELOC0xac0000xc.reloc
                                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                  .text0x20000xa702c0xa72005e1f14b3e43b90d434751a34059be37dFalse0.9315208372288706data7.788640730466507IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                  .rsrc0xaa0000x13bc0x1400afc1e845a61883e26f13681f0cd62db1False0.732421875data6.941914302483971IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                  .reloc0xac0000xc0x2007f6b60b9f625567038ba9d9b88557187False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                  NameRVASizeTypeLanguageCountryZLIB Complexity
                                  RT_ICON0xaa1000xd91PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.8692772818888569
                                  RT_GROUP_ICON0xaaea40x14data1.05
                                  RT_VERSION0xaaec80x2f4data0.4312169312169312
                                  RT_MANIFEST0xab1cc0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                                  DLLImport
                                  mscoree.dll_CorExeMain
                                  TimestampSource PortDest PortSource IPDest IP
                                  Jan 11, 2025 02:27:03.736670971 CET4971380192.168.2.6208.95.112.1
                                  Jan 11, 2025 02:27:03.741579056 CET8049713208.95.112.1192.168.2.6
                                  Jan 11, 2025 02:27:03.741657972 CET4971380192.168.2.6208.95.112.1
                                  Jan 11, 2025 02:27:03.742264986 CET4971380192.168.2.6208.95.112.1
                                  Jan 11, 2025 02:27:03.747108936 CET8049713208.95.112.1192.168.2.6
                                  Jan 11, 2025 02:27:04.202045918 CET8049713208.95.112.1192.168.2.6
                                  Jan 11, 2025 02:27:04.247417927 CET4971380192.168.2.6208.95.112.1
                                  Jan 11, 2025 02:27:31.491354942 CET6315353192.168.2.6162.159.36.2
                                  Jan 11, 2025 02:27:31.496227980 CET5363153162.159.36.2192.168.2.6
                                  Jan 11, 2025 02:27:31.496298075 CET6315353192.168.2.6162.159.36.2
                                  Jan 11, 2025 02:27:31.501099110 CET5363153162.159.36.2192.168.2.6
                                  Jan 11, 2025 02:27:31.960498095 CET6315353192.168.2.6162.159.36.2
                                  Jan 11, 2025 02:27:31.965495110 CET5363153162.159.36.2192.168.2.6
                                  Jan 11, 2025 02:27:31.965550900 CET6315353192.168.2.6162.159.36.2
                                  Jan 11, 2025 02:28:07.834326982 CET8049713208.95.112.1192.168.2.6
                                  Jan 11, 2025 02:28:07.834435940 CET4971380192.168.2.6208.95.112.1
                                  Jan 11, 2025 02:28:44.222383022 CET4971380192.168.2.6208.95.112.1
                                  Jan 11, 2025 02:28:44.227386951 CET8049713208.95.112.1192.168.2.6
                                  TimestampSource PortDest PortSource IPDest IP
                                  Jan 11, 2025 02:27:03.723712921 CET5488453192.168.2.61.1.1.1
                                  Jan 11, 2025 02:27:03.730907917 CET53548841.1.1.1192.168.2.6
                                  Jan 11, 2025 02:27:31.490823984 CET5364888162.159.36.2192.168.2.6
                                  Jan 11, 2025 02:27:31.979604959 CET6362853192.168.2.61.1.1.1
                                  Jan 11, 2025 02:27:31.995345116 CET53636281.1.1.1192.168.2.6
                                  Jan 11, 2025 02:27:33.159954071 CET5971053192.168.2.61.1.1.1
                                  Jan 11, 2025 02:27:33.191242933 CET53597101.1.1.1192.168.2.6
                                  TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                  Jan 11, 2025 02:27:03.723712921 CET192.168.2.61.1.1.10x5eafStandard query (0)ip-api.comA (IP address)IN (0x0001)false
                                  Jan 11, 2025 02:27:31.979604959 CET192.168.2.61.1.1.10x484dStandard query (0)171.39.242.20.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                  Jan 11, 2025 02:27:33.159954071 CET192.168.2.61.1.1.10xed84Standard query (0)200.163.202.172.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                                  TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                  Jan 11, 2025 02:27:03.730907917 CET1.1.1.1192.168.2.60x5eafNo error (0)ip-api.com208.95.112.1A (IP address)IN (0x0001)false
                                  Jan 11, 2025 02:27:31.995345116 CET1.1.1.1192.168.2.60x484dName error (3)171.39.242.20.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false
                                  Jan 11, 2025 02:27:33.191242933 CET1.1.1.1192.168.2.60xed84Name error (3)200.163.202.172.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false
                                  • ip-api.com
                                  Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                  0192.168.2.649713208.95.112.1805696C:\Users\user\Desktop\0I9GLRSiy0.exe
                                  TimestampBytes transferredDirectionData
                                  Jan 11, 2025 02:27:03.742264986 CET80OUTGET /line/?fields=hosting HTTP/1.1
                                  Host: ip-api.com
                                  Connection: Keep-Alive
                                  Jan 11, 2025 02:27:04.202045918 CET175INHTTP/1.1 200 OK
                                  Date: Sat, 11 Jan 2025 01:27:03 GMT
                                  Content-Type: text/plain; charset=utf-8
                                  Content-Length: 6
                                  Access-Control-Allow-Origin: *
                                  X-Ttl: 60
                                  X-Rl: 44
                                  Data Raw: 66 61 6c 73 65 0a
                                  Data Ascii: false


                                  Click to jump to process

                                  Click to jump to process

                                  Click to dive into process behavior distribution

                                  Target ID:0
                                  Start time:20:27:00
                                  Start date:10/01/2025
                                  Path:C:\Users\user\Desktop\0I9GLRSiy0.exe
                                  Wow64 process (32bit):true
                                  Commandline:"C:\Users\user\Desktop\0I9GLRSiy0.exe"
                                  Imagebase:0x3a0000
                                  File size:704'520 bytes
                                  MD5 hash:278A25D8B1BEAC144CD590AE592BF680
                                  Has elevated privileges:true
                                  Has administrator privileges:true
                                  Programmed in:C, C++ or other language
                                  Yara matches:
                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.3390551615.0000000002847000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.3393704064.0000000006CA0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_GenericDownloader_1, Description: Yara detected Generic Downloader, Source: 00000000.00000002.3393704064.0000000006CA0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.3393704064.0000000006CA0000.00000004.08000000.00040000.00000000.sdmp, Author: Joe Security
                                  • Rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID, Description: Detects executables referencing Windows vault credential objects. Observed in infostealers, Source: 00000000.00000002.3393704064.0000000006CA0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                  • Rule: MALWARE_Win_AgentTeslaV2, Description: AgenetTesla Type 2 Keylogger payload, Source: 00000000.00000002.3393704064.0000000006CA0000.00000004.08000000.00040000.00000000.sdmp, Author: ditekSHen
                                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.3391526072.0000000003801000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.3391526072.0000000003801000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                  Reputation:low
                                  Has exited:false

                                  Reset < >

                                    Execution Graph

                                    Execution Coverage:10%
                                    Dynamic/Decrypted Code Coverage:100%
                                    Signature Coverage:6.4%
                                    Total number of Nodes:94
                                    Total number of Limit Nodes:15
                                    execution_graph 47912 7652430 47913 765246a 47912->47913 47914 76524e6 47913->47914 47915 76524fb 47913->47915 47920 76508a4 47914->47920 47917 76508a4 CreateIconFromResourceEx 47915->47917 47919 765250a 47917->47919 47921 76508af 47920->47921 47922 76524f1 47921->47922 47925 7652e50 47921->47925 47929 7652e42 47921->47929 47927 7652e6a 47925->47927 47926 7652e77 47926->47922 47927->47926 47933 7652ed1 CreateIconFromResourceEx 47927->47933 47931 7652e6a 47929->47931 47930 7652e77 47930->47922 47931->47930 47932 7652ed1 CreateIconFromResourceEx 47931->47932 47934 7652f1e 47933->47934 47879 267d460 47880 267d4a6 GetCurrentProcess 47879->47880 47882 267d4f1 47880->47882 47883 267d4f8 GetCurrentThread 47880->47883 47882->47883 47884 267d535 GetCurrentProcess 47883->47884 47885 267d52e 47883->47885 47886 267d56b 47884->47886 47885->47884 47887 267d593 GetCurrentThreadId 47886->47887 47888 267d5c4 47887->47888 47983 267b0d0 47987 267b1c8 47983->47987 47992 267b1b8 47983->47992 47984 267b0df 47988 267b1fc 47987->47988 47989 267b1d9 47987->47989 47988->47984 47989->47988 47990 267b400 GetModuleHandleW 47989->47990 47991 267b42d 47990->47991 47991->47984 47993 267b1fc 47992->47993 47995 267b1d9 47992->47995 47993->47984 47994 267b400 GetModuleHandleW 47996 267b42d 47994->47996 47995->47993 47995->47994 47996->47984 47935 6fd7be0 47937 6fd7be6 47935->47937 47936 6fd7cb3 47937->47936 47940 a91c258 47937->47940 47944 a91c268 47937->47944 47941 a91c277 47940->47941 47948 a916924 47941->47948 47945 a91c277 47944->47945 47946 a916924 3 API calls 47945->47946 47947 a91c297 47946->47947 47947->47937 47950 a91692f 47948->47950 47952 a916964 47950->47952 47951 a91c35c 47957 a91696f 47952->47957 47953 a91c9e0 47958 a91ca0b 47953->47958 47961 a91c4c0 47953->47961 47955 a91c4c0 OleInitialize 47955->47953 47956 a91c9f8 47956->47958 47965 a91df00 47956->47965 47969 a91def1 47956->47969 47957->47953 47957->47955 47957->47958 47958->47951 47962 a91c4cb 47961->47962 47964 a91d999 47962->47964 47973 a91c66c 47962->47973 47964->47956 47966 a91df65 47965->47966 47967 a91e3c8 WaitMessage 47966->47967 47968 a91dfb2 47966->47968 47967->47966 47968->47958 47970 a91df00 47969->47970 47971 a91e3c8 WaitMessage 47970->47971 47972 a91dfb2 47970->47972 47971->47970 47972->47958 47974 a91c677 47973->47974 47976 a91dcb3 47974->47976 47977 a91c688 47974->47977 47976->47964 47978 a91dce8 OleInitialize 47977->47978 47979 a91dd4c 47978->47979 47979->47976 47980 6fdc610 47981 6fdc654 CheckRemoteDebuggerPresent 47980->47981 47982 6fdc696 47981->47982 47889 2674668 47890 267467a 47889->47890 47891 2674686 47890->47891 47893 2674778 47890->47893 47894 267479d 47893->47894 47898 2674878 47894->47898 47902 2674888 47894->47902 47900 26748af 47898->47900 47899 267498c 47899->47899 47900->47899 47906 26744b0 47900->47906 47903 26748af 47902->47903 47904 26744b0 CreateActCtxA 47903->47904 47905 267498c 47903->47905 47904->47905 47907 2675918 CreateActCtxA 47906->47907 47909 26759db 47907->47909 47910 267d6a8 DuplicateHandle 47911 267d73e 47910->47911
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3394949411.000000000A910000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A910000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_a910000_0I9GLRSiy0.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: dccac0ac8910063fb8510cc87ae09ee39aa51268e835b3e2b95d2eabc8f35d79
                                    • Instruction ID: 6aad1ea763eb068981afe66ee2e821193acc125d2895c6aa3f0a2158b3b68233
                                    • Opcode Fuzzy Hash: dccac0ac8910063fb8510cc87ae09ee39aa51268e835b3e2b95d2eabc8f35d79
                                    • Instruction Fuzzy Hash: 6E53E531D10B1A8ACB51EF68C984599F7B1EF99300F11D79AE4587B221FB70AAD4CF81
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3394949411.000000000A910000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A910000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_a910000_0I9GLRSiy0.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: f7871c00d66ee3b709b69e057a2aa12922dfe33bf174b9750f7152b8af769b7b
                                    • Instruction ID: cbbb0a5025e27fec6388fca544e6812d0c6fad9a26ed1b2a4d016bd7a9609f99
                                    • Opcode Fuzzy Hash: f7871c00d66ee3b709b69e057a2aa12922dfe33bf174b9750f7152b8af769b7b
                                    • Instruction Fuzzy Hash: 5D231E31D1071A8EDB11EF68C88459DF7B1FF89300F55D79AE449AB221EB70AAC5CB81

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 978 a91df00-a91df63 979 a91df92-a91dfb0 978->979 980 a91df65-a91df8f 978->980 985 a91dfb2-a91dfb4 979->985 986 a91dfb9-a91dff0 979->986 980->979 988 a91e472-a91e487 985->988 990 a91e421 986->990 991 a91dff6-a91e00a 986->991 994 a91e426-a91e43c 990->994 992 a91e039-a91e058 991->992 993 a91e00c-a91e036 991->993 1000 a91e070-a91e072 992->1000 1001 a91e05a-a91e060 992->1001 993->992 994->988 1005 a91e091-a91e09a 1000->1005 1006 a91e074-a91e08c 1000->1006 1003 a91e062 1001->1003 1004 a91e064-a91e066 1001->1004 1003->1000 1004->1000 1007 a91e0a2-a91e0a9 1005->1007 1006->994 1008 a91e0b3-a91e0ba 1007->1008 1009 a91e0ab-a91e0b1 1007->1009 1011 a91e0c4 1008->1011 1012 a91e0bc-a91e0c2 1008->1012 1010 a91e0c7-a91e0e4 call a91c6e8 1009->1010 1015 a91e239-a91e23d 1010->1015 1016 a91e0ea-a91e0f1 1010->1016 1011->1010 1012->1010 1018 a91e243-a91e247 1015->1018 1019 a91e40c-a91e41f 1015->1019 1016->990 1017 a91e0f7-a91e134 1016->1017 1027 a91e402-a91e406 1017->1027 1028 a91e13a-a91e13f 1017->1028 1020 a91e261-a91e26a 1018->1020 1021 a91e249-a91e25c 1018->1021 1019->994 1022 a91e299-a91e2a0 1020->1022 1023 a91e26c-a91e296 1020->1023 1021->994 1025 a91e2a6-a91e2ad 1022->1025 1026 a91e33f-a91e354 1022->1026 1023->1022 1030 a91e2dc-a91e2fe 1025->1030 1031 a91e2af-a91e2d9 1025->1031 1026->1027 1040 a91e35a-a91e35c 1026->1040 1027->1007 1027->1019 1032 a91e171-a91e186 call a91c70c 1028->1032 1033 a91e141-a91e14f call a91c6f4 1028->1033 1030->1026 1068 a91e300-a91e30a 1030->1068 1031->1030 1038 a91e18b-a91e18f 1032->1038 1033->1032 1047 a91e151-a91e16f call a91c700 1033->1047 1043 a91e191-a91e1a3 call a91c718 1038->1043 1044 a91e200-a91e20d 1038->1044 1045 a91e3a9-a91e3c6 call a91c6e8 1040->1045 1046 a91e35e-a91e397 1040->1046 1071 a91e1e3-a91e1fb 1043->1071 1072 a91e1a5-a91e1d5 1043->1072 1044->1027 1060 a91e213-a91e216 call a91c728 1044->1060 1045->1027 1059 a91e3c8-a91e3f4 WaitMessage 1045->1059 1063 a91e3a0-a91e3a7 1046->1063 1064 a91e399-a91e39f 1046->1064 1047->1038 1065 a91e3f6 1059->1065 1066 a91e3fb 1059->1066 1070 a91e21b-a91e21d 1060->1070 1063->1027 1064->1063 1065->1066 1066->1027 1079 a91e322-a91e33d 1068->1079 1080 a91e30c-a91e312 1068->1080 1074 a91e22c-a91e234 call a91c740 1070->1074 1075 a91e21f-a91e227 call a91c734 1070->1075 1071->994 1086 a91e1d7 1072->1086 1087 a91e1dc 1072->1087 1074->1027 1075->1027 1079->1026 1079->1068 1084 a91e314 1080->1084 1085 a91e316-a91e318 1080->1085 1084->1079 1085->1079 1086->1087 1087->1071
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3394949411.000000000A910000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A910000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_a910000_0I9GLRSiy0.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 52bd14d49c9c15198d279ea8543704d295a9ee620d2d350c32c6ef7ffa464be7
                                    • Instruction ID: 2861ad9e40aa4678ee31965f1f67289aea9f8d93d795aa94c4887b8c66bc54b0
                                    • Opcode Fuzzy Hash: 52bd14d49c9c15198d279ea8543704d295a9ee620d2d350c32c6ef7ffa464be7
                                    • Instruction Fuzzy Hash: B0F14B30B00209CFDB14DFA9C988BADBBF2BF88314F158569D815AF2A1DB74A945CF40

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1187 6fdc610-6fdc694 CheckRemoteDebuggerPresent 1189 6fdc69d-6fdc6d8 1187->1189 1190 6fdc696-6fdc69c 1187->1190 1190->1189
                                    APIs
                                    • CheckRemoteDebuggerPresent.KERNEL32(?,?), ref: 06FDC687
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3394246450.0000000006FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FD0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6fd0000_0I9GLRSiy0.jbxd
                                    Similarity
                                    • API ID: CheckDebuggerPresentRemote
                                    • String ID:
                                    • API String ID: 3662101638-0
                                    • Opcode ID: 8b49583f4745f5c9b83bfa7c417955671af27a867eaba8ad14822f4b857093b3
                                    • Instruction ID: d93e45f5fd5f26cd8be2a0cdb8ce27791176eb30d65a6bd6e31ac5e92cceb558
                                    • Opcode Fuzzy Hash: 8b49583f4745f5c9b83bfa7c417955671af27a867eaba8ad14822f4b857093b3
                                    • Instruction Fuzzy Hash: 72215971C00259CFDB10DF9AD884BEEFBF4AF49310F14841AE459A7240D778A944CF61
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3394246450.0000000006FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FD0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6fd0000_0I9GLRSiy0.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: \Vrm
                                    • API String ID: 0-3869522837
                                    • Opcode ID: 79e9c55c3ed344ba98050df923e7d1f2386e1e5b4f846410744185efbcd592f3
                                    • Instruction ID: bc23b721398c31aed3bd26ee73860dad60a987afd5d0e4e0a38c2b96913428bc
                                    • Opcode Fuzzy Hash: 79e9c55c3ed344ba98050df923e7d1f2386e1e5b4f846410744185efbcd592f3
                                    • Instruction Fuzzy Hash: 03917FB0E00209CFDF50DFA9D9857DDBBF3AF88714F188529E404AB294EB74A845CB95
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3394949411.000000000A910000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A910000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_a910000_0I9GLRSiy0.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 46e65fb09f7e98016f4863b3591390ab980127e9465319cc65a4c85c4a3504f2
                                    • Instruction ID: b3409633d3d22ce7e0d2f2fe4cd2c8ffd6570f1f970688b4f208cb1c93980141
                                    • Opcode Fuzzy Hash: 46e65fb09f7e98016f4863b3591390ab980127e9465319cc65a4c85c4a3504f2
                                    • Instruction Fuzzy Hash: 59D2E531D10B5A8ACB51EB68C8845A9F7B1EF99300F11D79AE45877221FB70AAD4CF81
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3394949411.000000000A910000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A910000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_a910000_0I9GLRSiy0.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: b02bbb727e4531a34a65aa0bed294de3c4a00e4859a525e70f840578dc43b241
                                    • Instruction ID: 061eb91ca80abe9a2a639501a88bf5cbf8ba438359ada8d3a2a252a551a3ef65
                                    • Opcode Fuzzy Hash: b02bbb727e4531a34a65aa0bed294de3c4a00e4859a525e70f840578dc43b241
                                    • Instruction Fuzzy Hash: 2C629C35B0020A8FDB54DBA8D594AADB7F6EF84314F248869E416DB390DB35ED42CF90
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3394476113.0000000007650000.00000040.00000800.00020000.00000000.sdmp, Offset: 07650000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7650000_0I9GLRSiy0.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: b436a9923a518d85d61753fae947c07bd90e2067ce3615b6417f04662cfb61c1
                                    • Instruction ID: 989f607486ce19d792dee3f26eb25b5c4cf4686a8d6c3a354294e133fe982bf3
                                    • Opcode Fuzzy Hash: b436a9923a518d85d61753fae947c07bd90e2067ce3615b6417f04662cfb61c1
                                    • Instruction Fuzzy Hash: EB324CB0E00219CFDB54DFA9C86079EBBB2BF84300F24856AD40AAB395DE349D45DF95
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3394949411.000000000A910000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A910000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_a910000_0I9GLRSiy0.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 0df5d0df3a56a6651c1085e9a28ef6634d61a86967962d6853a633428e75f243
                                    • Instruction ID: 01347031d999cefe7ec355bb2c67781d67b0871e957df365c03034b0393fe5f0
                                    • Opcode Fuzzy Hash: 0df5d0df3a56a6651c1085e9a28ef6634d61a86967962d6853a633428e75f243
                                    • Instruction Fuzzy Hash: 0E322231E1061ACBCB14EFB5C89059DB7B6FFC9300F148AA9D449AB214EB719A85CF90
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3394949411.000000000A910000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A910000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_a910000_0I9GLRSiy0.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 3df5b7bd65aee61b000625f25bd91b8b1d658ff7c01477dbee0b43b66bf6ff3e
                                    • Instruction ID: 1afb1ff3945c66746fccdb4d0a33d577d7ef246140fc9a8a5b4a917d46563c5a
                                    • Opcode Fuzzy Hash: 3df5b7bd65aee61b000625f25bd91b8b1d658ff7c01477dbee0b43b66bf6ff3e
                                    • Instruction Fuzzy Hash: BF02B134B00609DFDB14DF69D4A0AAEB7A2FF84314F248969D815EB395DB36DC42CB90
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3394476113.0000000007650000.00000040.00000800.00020000.00000000.sdmp, Offset: 07650000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7650000_0I9GLRSiy0.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 688d8dcd958a38026f6975d6af4becf5b6bc5f298f004cb205ae563aa333032d
                                    • Instruction ID: 6eddf6464ffd0619b383bb5b5e8abc9e7bb2526124b07459e7aa505c7b75d689
                                    • Opcode Fuzzy Hash: 688d8dcd958a38026f6975d6af4becf5b6bc5f298f004cb205ae563aa333032d
                                    • Instruction Fuzzy Hash: 88E14CB1E002158FDF14DF69C89079EBBB2FF85310F18856AD80AAB255EB30D985DB91
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3394476113.0000000007650000.00000040.00000800.00020000.00000000.sdmp, Offset: 07650000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7650000_0I9GLRSiy0.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 6eb392d9f49f15987196138350bf4023f2db317290122e7f91252c8e1b0ce2f0
                                    • Instruction ID: 8423b0e44cbf8c5f0ef183262a4b1184b5b15723cb0ef1c4e4618497c72f5cd8
                                    • Opcode Fuzzy Hash: 6eb392d9f49f15987196138350bf4023f2db317290122e7f91252c8e1b0ce2f0
                                    • Instruction Fuzzy Hash: D4D17BB1D002158FDF15CF65C890B9DBBB2BF85300F18D5AAD84AAB255EB30D985DF90
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3394476113.0000000007650000.00000040.00000800.00020000.00000000.sdmp, Offset: 07650000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7650000_0I9GLRSiy0.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 69e3d67448cd0d5307e2a8b58789a6deafc6ec439d1715418eadc68e7dfc5465
                                    • Instruction ID: 2da38e4b9cb10b7a68049817165b0e9ddfa9278d071f1639779a4bea08e2207a
                                    • Opcode Fuzzy Hash: 69e3d67448cd0d5307e2a8b58789a6deafc6ec439d1715418eadc68e7dfc5465
                                    • Instruction Fuzzy Hash: 1AC14BB1D002198FDF14CF65C89079DBBB1BF88310F14D5AAD80AAB255DB31D985DF91
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3394476113.0000000007650000.00000040.00000800.00020000.00000000.sdmp, Offset: 07650000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7650000_0I9GLRSiy0.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 3b2fb6d3d58cdf3a227fb251a273145f7e1aadefcea92ef2c7ce1afda10ad4b3
                                    • Instruction ID: 8a486b5d05b5cf564663960964bab71ba67a3d87ea6a8154b0edf2af73118683
                                    • Opcode Fuzzy Hash: 3b2fb6d3d58cdf3a227fb251a273145f7e1aadefcea92ef2c7ce1afda10ad4b3
                                    • Instruction Fuzzy Hash: A3C14AB1E002198FDF14CFA5C890799BBB2BF88310F14D5AAD80AAB355DB31D985DF90
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3394246450.0000000006FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FD0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6fd0000_0I9GLRSiy0.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: b872674a58b7b616b1c5512784a90142635f5c53987912f1bc923bd5642b99ff
                                    • Instruction ID: 9738cbf9a5dbdcb6abccc8c7c0ed4de703c30a052968984bff48ab2ad6fc6a76
                                    • Opcode Fuzzy Hash: b872674a58b7b616b1c5512784a90142635f5c53987912f1bc923bd5642b99ff
                                    • Instruction Fuzzy Hash: CBB152B1E00209CFDB50CFA9D88579DBBF2AF48714F198529D815E7298EB74A845CB81
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3390200713.0000000002670000.00000040.00000800.00020000.00000000.sdmp, Offset: 02670000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_2670000_0I9GLRSiy0.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 89715134ea3a0f3c4608b2b385864b2eabcd265e25b04b93250fa89f8ca5ce53
                                    • Instruction ID: 5aa00a008c0ad5f8f303430ea5175b32ba357dabc05ea32e992ee1d2fb583bb2
                                    • Opcode Fuzzy Hash: 89715134ea3a0f3c4608b2b385864b2eabcd265e25b04b93250fa89f8ca5ce53
                                    • Instruction Fuzzy Hash: 6581D274E01219DFDB09DFA9D894AEEBBB2FF88300F248569D405AB365DB345942CF90
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3390200713.0000000002670000.00000040.00000800.00020000.00000000.sdmp, Offset: 02670000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_2670000_0I9GLRSiy0.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: a4ca9a857ebccb9a830f0399c482f2fdf3796be01bbe8d60538848d0c921504c
                                    • Instruction ID: 7d1e2da2541263e60a2b722986e5e019c97ba82896d450b2c9b8382a9d8b2e99
                                    • Opcode Fuzzy Hash: a4ca9a857ebccb9a830f0399c482f2fdf3796be01bbe8d60538848d0c921504c
                                    • Instruction Fuzzy Hash: 3B81D070E01219DFDB08DFA9D894AEEBBB2FF88300F248569D405AB364DB345941CF90

                                    Control-flow Graph

                                    APIs
                                    • GetCurrentProcess.KERNEL32 ref: 0267D4DE
                                    • GetCurrentThread.KERNEL32 ref: 0267D51B
                                    • GetCurrentProcess.KERNEL32 ref: 0267D558
                                    • GetCurrentThreadId.KERNEL32 ref: 0267D5B1
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3390200713.0000000002670000.00000040.00000800.00020000.00000000.sdmp, Offset: 02670000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_2670000_0I9GLRSiy0.jbxd
                                    Similarity
                                    • API ID: Current$ProcessThread
                                    • String ID:
                                    • API String ID: 2063062207-0
                                    • Opcode ID: 1408171f3c3165c2d0143b94976a170ea6544e25d9db3b3b15c5ab655a1a9481
                                    • Instruction ID: 75a9bb34ccf706710045ed44d817ca101e8c7fbcfa73d8b3f009f9c88d25ce57
                                    • Opcode Fuzzy Hash: 1408171f3c3165c2d0143b94976a170ea6544e25d9db3b3b15c5ab655a1a9481
                                    • Instruction Fuzzy Hash: 485169B0D013498FDB54DFA9E648B9EBFF1AF88304F248499D009A73A0D734A945CF61

                                    Control-flow Graph

                                    APIs
                                    • GetCurrentProcess.KERNEL32 ref: 0267D4DE
                                    • GetCurrentThread.KERNEL32 ref: 0267D51B
                                    • GetCurrentProcess.KERNEL32 ref: 0267D558
                                    • GetCurrentThreadId.KERNEL32 ref: 0267D5B1
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3390200713.0000000002670000.00000040.00000800.00020000.00000000.sdmp, Offset: 02670000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_2670000_0I9GLRSiy0.jbxd
                                    Similarity
                                    • API ID: Current$ProcessThread
                                    • String ID:
                                    • API String ID: 2063062207-0
                                    • Opcode ID: 876aa6c1de255d2330b88858d9c70831e92ee4f1fa76403c48b77d013212476e
                                    • Instruction ID: 649d7c6bd1de14ebf59a2cdfc61766e496642fcabc996d71f69b52f43aa90237
                                    • Opcode Fuzzy Hash: 876aa6c1de255d2330b88858d9c70831e92ee4f1fa76403c48b77d013212476e
                                    • Instruction Fuzzy Hash: C05158B0D013099FDB54DFAAE648B9EBBF1EF88314F248459D009A7390D734A945CFA5

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1090 267b1c8-267b1d7 1091 267b203-267b207 1090->1091 1092 267b1d9-267b1e6 call 2679c38 1090->1092 1094 267b21b-267b25c 1091->1094 1095 267b209-267b213 1091->1095 1098 267b1fc 1092->1098 1099 267b1e8 1092->1099 1101 267b25e-267b266 1094->1101 1102 267b269-267b277 1094->1102 1095->1094 1098->1091 1145 267b1ee call 267b460 1099->1145 1146 267b1ee call 267b450 1099->1146 1101->1102 1103 267b29b-267b29d 1102->1103 1104 267b279-267b27e 1102->1104 1109 267b2a0-267b2a7 1103->1109 1106 267b280-267b287 call 267ae80 1104->1106 1107 267b289 1104->1107 1105 267b1f4-267b1f6 1105->1098 1108 267b338-267b3f8 1105->1108 1111 267b28b-267b299 1106->1111 1107->1111 1140 267b400-267b42b GetModuleHandleW 1108->1140 1141 267b3fa-267b3fd 1108->1141 1112 267b2b4-267b2bb 1109->1112 1113 267b2a9-267b2b1 1109->1113 1111->1109 1116 267b2bd-267b2c5 1112->1116 1117 267b2c8-267b2d1 call 267ae90 1112->1117 1113->1112 1116->1117 1121 267b2d3-267b2db 1117->1121 1122 267b2de-267b2e3 1117->1122 1121->1122 1123 267b2e5-267b2ec 1122->1123 1124 267b301-267b30e 1122->1124 1123->1124 1126 267b2ee-267b2fe call 267aea0 call 267aeb0 1123->1126 1131 267b331-267b337 1124->1131 1132 267b310-267b32e 1124->1132 1126->1124 1132->1131 1142 267b434-267b448 1140->1142 1143 267b42d-267b433 1140->1143 1141->1140 1143->1142 1145->1105 1146->1105
                                    APIs
                                    • GetModuleHandleW.KERNEL32(00000000), ref: 0267B41E
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3390200713.0000000002670000.00000040.00000800.00020000.00000000.sdmp, Offset: 02670000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_2670000_0I9GLRSiy0.jbxd
                                    Similarity
                                    • API ID: HandleModule
                                    • String ID:
                                    • API String ID: 4139908857-0
                                    • Opcode ID: 28da86911fa3d61224e47f637b69966f8fc729a12f0fa34bf1f80acfac5261df
                                    • Instruction ID: c745ae4c91417c2d9094dabe0f0f1cc18616008b4d2e4278d4f0136e24fb6506
                                    • Opcode Fuzzy Hash: 28da86911fa3d61224e47f637b69966f8fc729a12f0fa34bf1f80acfac5261df
                                    • Instruction Fuzzy Hash: 90712470A01B058FD764DF6AE45476ABBF2BF88308F108A2DD496D7B50DB35E845CB90

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1147 26744b0-26759d9 CreateActCtxA 1150 26759e2-2675a3c 1147->1150 1151 26759db-26759e1 1147->1151 1158 2675a3e-2675a41 1150->1158 1159 2675a4b-2675a4f 1150->1159 1151->1150 1158->1159 1160 2675a51-2675a5d 1159->1160 1161 2675a60 1159->1161 1160->1161 1163 2675a61 1161->1163 1163->1163
                                    APIs
                                    • CreateActCtxA.KERNEL32(?), ref: 026759C9
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3390200713.0000000002670000.00000040.00000800.00020000.00000000.sdmp, Offset: 02670000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_2670000_0I9GLRSiy0.jbxd
                                    Similarity
                                    • API ID: Create
                                    • String ID:
                                    • API String ID: 2289755597-0
                                    • Opcode ID: 470d3c79c985c36f92baff8038cc4033a88a0d199c25f7f7d2a4e5d4461e12ea
                                    • Instruction ID: 7f360746a865b75e1e669208799bb46b7500c4a249ca0a486139efd59eebaf50
                                    • Opcode Fuzzy Hash: 470d3c79c985c36f92baff8038cc4033a88a0d199c25f7f7d2a4e5d4461e12ea
                                    • Instruction Fuzzy Hash: E0410270C0071DCBEB24DFA9D884B8EBBF5BF48704F6081AAD409AB251DB71A945CF90

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1164 267590c-26759d9 CreateActCtxA 1166 26759e2-2675a3c 1164->1166 1167 26759db-26759e1 1164->1167 1174 2675a3e-2675a41 1166->1174 1175 2675a4b-2675a4f 1166->1175 1167->1166 1174->1175 1176 2675a51-2675a5d 1175->1176 1177 2675a60 1175->1177 1176->1177 1179 2675a61 1177->1179 1179->1179
                                    APIs
                                    • CreateActCtxA.KERNEL32(?), ref: 026759C9
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3390200713.0000000002670000.00000040.00000800.00020000.00000000.sdmp, Offset: 02670000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_2670000_0I9GLRSiy0.jbxd
                                    Similarity
                                    • API ID: Create
                                    • String ID:
                                    • API String ID: 2289755597-0
                                    • Opcode ID: 440cded35cc9284ea9943e3765ca6cf6fc7130b95f7b158939f16b54860cdb47
                                    • Instruction ID: 839370c914c88aabe152d1415a2e4af2eba09d6fcd4edbe737c42d3b2a96965a
                                    • Opcode Fuzzy Hash: 440cded35cc9284ea9943e3765ca6cf6fc7130b95f7b158939f16b54860cdb47
                                    • Instruction Fuzzy Hash: D241E371C0071DCBEB24DFA9D8847DDBBB5BF88704F24816AD409AB251DB715945CF90

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1180 6fdc60f-6fdc694 CheckRemoteDebuggerPresent 1183 6fdc69d-6fdc6d8 1180->1183 1184 6fdc696-6fdc69c 1180->1184 1184->1183
                                    APIs
                                    • CheckRemoteDebuggerPresent.KERNEL32(?,?), ref: 06FDC687
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3394246450.0000000006FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FD0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6fd0000_0I9GLRSiy0.jbxd
                                    Similarity
                                    • API ID: CheckDebuggerPresentRemote
                                    • String ID:
                                    • API String ID: 3662101638-0
                                    • Opcode ID: ee15576f9cb2d36911491f354446934a2c1c708016b1c54bd2ca99b9a22b15ed
                                    • Instruction ID: be9d98bc1a2495d6d452c390e38b372734279147d3037bf21b9946518085e0c2
                                    • Opcode Fuzzy Hash: ee15576f9cb2d36911491f354446934a2c1c708016b1c54bd2ca99b9a22b15ed
                                    • Instruction Fuzzy Hash: BA215971C00259CFDB10DFAAD884BEEFBF8AF49310F14841AE459A7240D778A944CFA1

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1193 267d6a1-267d73c DuplicateHandle 1194 267d745-267d762 1193->1194 1195 267d73e-267d744 1193->1195 1195->1194
                                    APIs
                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0267D72F
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3390200713.0000000002670000.00000040.00000800.00020000.00000000.sdmp, Offset: 02670000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_2670000_0I9GLRSiy0.jbxd
                                    Similarity
                                    • API ID: DuplicateHandle
                                    • String ID:
                                    • API String ID: 3793708945-0
                                    • Opcode ID: c9dcc74d6bf8a1781fb08bb3ea230060fb8440e1d5751258079f08e051eebc87
                                    • Instruction ID: b2949818146bc711b4b765a91c53a42fec4ddca33baed7a25d4b8e3136ba3eae
                                    • Opcode Fuzzy Hash: c9dcc74d6bf8a1781fb08bb3ea230060fb8440e1d5751258079f08e051eebc87
                                    • Instruction Fuzzy Hash: 1C21E4B5900248DFDB10DFA9E984AEEBFF5EB48310F24841AE914A7350D374A954CF60

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1198 267d6a8-267d73c DuplicateHandle 1199 267d745-267d762 1198->1199 1200 267d73e-267d744 1198->1200 1200->1199
                                    APIs
                                    • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0267D72F
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3390200713.0000000002670000.00000040.00000800.00020000.00000000.sdmp, Offset: 02670000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_2670000_0I9GLRSiy0.jbxd
                                    Similarity
                                    • API ID: DuplicateHandle
                                    • String ID:
                                    • API String ID: 3793708945-0
                                    • Opcode ID: b473daacf9bbafe0ff7651eaae2d76dc6c7aa16aa1181822c549eda71dda8bd8
                                    • Instruction ID: 86abb6f4437ee495656b3a3f07c8c04ffe776ec04901feae9b6ca6d1d292ba88
                                    • Opcode Fuzzy Hash: b473daacf9bbafe0ff7651eaae2d76dc6c7aa16aa1181822c549eda71dda8bd8
                                    • Instruction Fuzzy Hash: 7321E4B59002489FDB10CFAAD984ADEBBF8EB48310F14841AE914A7350D374A944CFA1

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1203 267b3b8-267b3f8 1204 267b400-267b42b GetModuleHandleW 1203->1204 1205 267b3fa-267b3fd 1203->1205 1206 267b434-267b448 1204->1206 1207 267b42d-267b433 1204->1207 1205->1204 1207->1206
                                    APIs
                                    • GetModuleHandleW.KERNEL32(00000000), ref: 0267B41E
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3390200713.0000000002670000.00000040.00000800.00020000.00000000.sdmp, Offset: 02670000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_2670000_0I9GLRSiy0.jbxd
                                    Similarity
                                    • API ID: HandleModule
                                    • String ID:
                                    • API String ID: 4139908857-0
                                    • Opcode ID: 0b3d5196592073a67c1a92817bf66039debe665b647ecba23440b5cda156233e
                                    • Instruction ID: 43aab5283128cab05568abe6718eda761b8b7b05f576f420976938bd232a7a65
                                    • Opcode Fuzzy Hash: 0b3d5196592073a67c1a92817bf66039debe665b647ecba23440b5cda156233e
                                    • Instruction Fuzzy Hash: 511110B5C006498FDB10DF9AD444ADEFBF4AB88328F14846AD418B7344D379A545CFA1

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1209 a91dce1-a91dce7 1210 a91dce8-a91dd4a OleInitialize 1209->1210 1211 a91dd53-a91dd70 1210->1211 1212 a91dd4c-a91dd52 1210->1212 1212->1211
                                    APIs
                                    • OleInitialize.OLE32(00000000), ref: 0A91DD3D
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3394949411.000000000A910000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A910000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_a910000_0I9GLRSiy0.jbxd
                                    Similarity
                                    • API ID: Initialize
                                    • String ID:
                                    • API String ID: 2538663250-0
                                    • Opcode ID: e2c15336120c9c917028251bcdbd1844cbc038e3f627d8dc7af8060866eb10fa
                                    • Instruction ID: 93520963ea9dfef190793cee19ec63995b76e99997e01116c41479e79b49e0da
                                    • Opcode Fuzzy Hash: e2c15336120c9c917028251bcdbd1844cbc038e3f627d8dc7af8060866eb10fa
                                    • Instruction Fuzzy Hash: 781115B5900348DFDB20DFAAD884BCEBFF8AB48320F24855AD518A7250D378A544CFA5

                                    Control-flow Graph

                                    • Executed
                                    • Not Executed
                                    control_flow_graph 1215 a91c688-a91dd4a OleInitialize 1217 a91dd53-a91dd70 1215->1217 1218 a91dd4c-a91dd52 1215->1218 1218->1217
                                    APIs
                                    • OleInitialize.OLE32(00000000), ref: 0A91DD3D
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3394949411.000000000A910000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A910000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_a910000_0I9GLRSiy0.jbxd
                                    Similarity
                                    • API ID: Initialize
                                    • String ID:
                                    • API String ID: 2538663250-0
                                    • Opcode ID: 100130f87dc6b8b9c5921d35cf3c9652b77d714295914304450f894a59d9d1f2
                                    • Instruction ID: c185ddafe417dabed99e7fa713e5ebe616704c73a4cc9e7b9ba9afdc261c8eee
                                    • Opcode Fuzzy Hash: 100130f87dc6b8b9c5921d35cf3c9652b77d714295914304450f894a59d9d1f2
                                    • Instruction Fuzzy Hash: 101103B590074C9FDB20DF9AD584B9EBBF8EB48220F20885AD519A7240D378A944CFA5
                                    APIs
                                    • CreateIconFromResourceEx.USER32(?,?,?,?,?,?,?,?,?,?,07652E6A,?,?,?,?,?), ref: 07652F0F
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3394476113.0000000007650000.00000040.00000800.00020000.00000000.sdmp, Offset: 07650000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_7650000_0I9GLRSiy0.jbxd
                                    Similarity
                                    • API ID: CreateFromIconResource
                                    • String ID:
                                    • API String ID: 3668623891-0
                                    • Opcode ID: a2abe63efe43538c4674f80550d4f7ff5dd2f351d90b0829330ed8c7d02d6ef1
                                    • Instruction ID: b9fafbb1828f77d5230caf4e02cb827994a40237cb9537b71874f480cf736646
                                    • Opcode Fuzzy Hash: a2abe63efe43538c4674f80550d4f7ff5dd2f351d90b0829330ed8c7d02d6ef1
                                    • Instruction Fuzzy Hash: FD0156B28002099FDB11CFA9D844BDEBBF4AF48320F18840AE915A7260C339D494DFA0
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3389702924.00000000024CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 024CD000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_24cd000_0I9GLRSiy0.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: e080c80c673b44530103b8810ddde1a4cf96f80f7ae3110e616bfe7a50caa039
                                    • Instruction ID: 8d57c0d148108a8286082a6fe6ea05b7e983245c2aa4aa2bffe7f39c08cea456
                                    • Opcode Fuzzy Hash: e080c80c673b44530103b8810ddde1a4cf96f80f7ae3110e616bfe7a50caa039
                                    • Instruction Fuzzy Hash: 0D21C17A904244EFDB45DF18D9C0B27BF65FB88318F34857EE90A0B256C336E456CAA1
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3389702924.00000000024CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 024CD000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_24cd000_0I9GLRSiy0.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 0e126cd80f6a2af39c2f9b897dadadb9696734944c4d0997974953a8501a6eaa
                                    • Instruction ID: b8b50790069be6ca5fa8394ab2e9a589a33af87095023ad629f2c222dde6c787
                                    • Opcode Fuzzy Hash: 0e126cd80f6a2af39c2f9b897dadadb9696734944c4d0997974953a8501a6eaa
                                    • Instruction Fuzzy Hash: 79210679900204DFDB48DF18D9C0B27BB65FB88314F34C17EEA0A0B256C336E456CAA5
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3389783656.00000000024DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 024DD000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_24dd000_0I9GLRSiy0.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: e38455fe018567c86a6c796d23cc5fc69d173467c2d18441c637412d5249d314
                                    • Instruction ID: 99fc5224e193a48fedf00e4ed35ab705d0f1892b64a29a834248fb21cbdc8b91
                                    • Opcode Fuzzy Hash: e38455fe018567c86a6c796d23cc5fc69d173467c2d18441c637412d5249d314
                                    • Instruction Fuzzy Hash: 79212572904204DFDB15DF14D990B16BB65FBC8318F64C56EE90A0B346C336D447CE61
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3389783656.00000000024DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 024DD000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_24dd000_0I9GLRSiy0.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 125287971dd82b61092c94c1bece42411734ce22e0e021fca7d04647ce2cba06
                                    • Instruction ID: 2a087c5b7cfc45aecffbea732cd7526ce3ee4796d61b3241ce63011b9d4b1667
                                    • Opcode Fuzzy Hash: 125287971dd82b61092c94c1bece42411734ce22e0e021fca7d04647ce2cba06
                                    • Instruction Fuzzy Hash: 20212672A04204EFDB05DF54D9E0F26BBA5FB88314F24C6AEE90A4F352C376D446CA61
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3389783656.00000000024DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 024DD000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_24dd000_0I9GLRSiy0.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: deb5fbbaf6b289d92faaaa52ae3f2b976b6d6271bcca42a6dbcb6e92ef67ebc5
                                    • Instruction ID: 4fee2f64df259a415ea027fa7cceeffaa55526af51585b5bdb85048a16d461da
                                    • Opcode Fuzzy Hash: deb5fbbaf6b289d92faaaa52ae3f2b976b6d6271bcca42a6dbcb6e92ef67ebc5
                                    • Instruction Fuzzy Hash: 75217175508384DFCB06CF24D994712BF71EB86214F29C5DAD8498F2A7C33A980ACB62
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3389702924.00000000024CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 024CD000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_24cd000_0I9GLRSiy0.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: a9b31bad3e5d6eb0f96c4d965fb2c37b7b820b0d943b1868179f970c6fb30aa6
                                    • Instruction ID: 519854dca237699dc4aa4361662327bceaada75b784f585442ef6d1d603344e2
                                    • Opcode Fuzzy Hash: a9b31bad3e5d6eb0f96c4d965fb2c37b7b820b0d943b1868179f970c6fb30aa6
                                    • Instruction Fuzzy Hash: 6E11AF76904244DFCB15CF14D9C4B16BF71FB84324F24C6AED9094B656C33AE45ACBA1
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3389702924.00000000024CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 024CD000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_24cd000_0I9GLRSiy0.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: a9b31bad3e5d6eb0f96c4d965fb2c37b7b820b0d943b1868179f970c6fb30aa6
                                    • Instruction ID: 5173334b189a6df7ac66796f8328abdd2d8660ce928bc10a278899f43df733c7
                                    • Opcode Fuzzy Hash: a9b31bad3e5d6eb0f96c4d965fb2c37b7b820b0d943b1868179f970c6fb30aa6
                                    • Instruction Fuzzy Hash: 3011AF76904284CFCB15CF14D9C4B16BF71FB84318F24C6AED8490B656C33AD45ACBA1
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3389783656.00000000024DD000.00000040.00000800.00020000.00000000.sdmp, Offset: 024DD000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_24dd000_0I9GLRSiy0.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: c21f20f9b933fcfff6280cc061701e95e78f5f46405777b46ba0931fd6c09a03
                                    • Instruction ID: 426d894168bf313130593e68d9f3044f761c1137ac36a69e24ae4cacb00cb69e
                                    • Opcode Fuzzy Hash: c21f20f9b933fcfff6280cc061701e95e78f5f46405777b46ba0931fd6c09a03
                                    • Instruction Fuzzy Hash: 3311BB76904284DFCB01CF10C5D0B16BBB1FB84214F24C6AAD8494F796C33AD40ACB61
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3389702924.00000000024CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 024CD000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_24cd000_0I9GLRSiy0.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 2bebe6cac254f440ea2cedd6dff0d4a519aff8c79b7f5f59bc0b403e374bec73
                                    • Instruction ID: b8899baa290bb50a4462aae35dd7d5ddf591a4af60d79674be979a5b468a5821
                                    • Opcode Fuzzy Hash: 2bebe6cac254f440ea2cedd6dff0d4a519aff8c79b7f5f59bc0b403e374bec73
                                    • Instruction Fuzzy Hash: 3901F739806B44DAE7605F19CD84B27BF98DF41324F28853FED080A286D3399841CA71
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3389702924.00000000024CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 024CD000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_24cd000_0I9GLRSiy0.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: dafcb772d3b0241249f49ac21baf0a4ac550cd61ee59037afd2c3a58eb54836b
                                    • Instruction ID: 96dc50ee50bb2b1b4bdb72328a2b6f65cae2dc93c3fd087108b6ef663fe3d5ad
                                    • Opcode Fuzzy Hash: dafcb772d3b0241249f49ac21baf0a4ac550cd61ee59037afd2c3a58eb54836b
                                    • Instruction Fuzzy Hash: 82F0C275405744AAE7208F1ACC84B63FFA8EB81634F28C46BED080B286D3799844CAB1
                                    Strings
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3394246450.0000000006FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FD0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6fd0000_0I9GLRSiy0.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID: \Vrm
                                    • API String ID: 0-3869522837
                                    • Opcode ID: c6b44e721f17701e459ba19d38b548e670dbe87e5daa6744e9ed2a0ea2cf1f8d
                                    • Instruction ID: 199e9d3b79b2f0d3b07e926a56bd1617c07d359b81e8bd75a0a0011da8f1deff
                                    • Opcode Fuzzy Hash: c6b44e721f17701e459ba19d38b548e670dbe87e5daa6744e9ed2a0ea2cf1f8d
                                    • Instruction Fuzzy Hash: 4FB18EB1E00209CFDB50CFA9D9857EEBBF3BF88744F198129D415A7294EB75A841CB81
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3394949411.000000000A910000.00000040.00000800.00020000.00000000.sdmp, Offset: 0A910000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_a910000_0I9GLRSiy0.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: f6749dde3679710fc2f962fb9e54c84dc9f27218ed719449628f0b483a36a9ee
                                    • Instruction ID: ed01d5f5c3c6f8b1ac5c6c1304168b2ebc0a51661765acc078d1f24d4da53112
                                    • Opcode Fuzzy Hash: f6749dde3679710fc2f962fb9e54c84dc9f27218ed719449628f0b483a36a9ee
                                    • Instruction Fuzzy Hash: D6122B30B00219CFDB28DF65D994A9EB7B6BF88304F2489A9D50AAB355DB319D41DF80
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3394246450.0000000006FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FD0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6fd0000_0I9GLRSiy0.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: b9c28ba0c4eeaee535fe3c086d7569c840fa5fa84c5252c9ce9c3c58b7999e07
                                    • Instruction ID: df7e5389b54aaf4fa7ae7d2ca03e7a03ab76e13403f73ec9f31042c3d344199a
                                    • Opcode Fuzzy Hash: b9c28ba0c4eeaee535fe3c086d7569c840fa5fa84c5252c9ce9c3c58b7999e07
                                    • Instruction Fuzzy Hash: 33E11D74E002198FDB54DFA9C5809AEFBF2FF89305F248169E415A7359D730A942CFA0
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3394246450.0000000006FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FD0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6fd0000_0I9GLRSiy0.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 33c7284b8b23eb94f8cf95360f886e015a91c6012e7cc6f63b48b33f61c1267b
                                    • Instruction ID: ba852398a3d2fda275eb577242f3f2266d161a7d56087c8297a876150623ce88
                                    • Opcode Fuzzy Hash: 33c7284b8b23eb94f8cf95360f886e015a91c6012e7cc6f63b48b33f61c1267b
                                    • Instruction Fuzzy Hash: C0E12C74E002198FDB54DFA9C5809AEFBF2FF89305F288169E415AB359D730A942CF60
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3394246450.0000000006FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FD0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6fd0000_0I9GLRSiy0.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 18686adfa6647864573e8c64cfc1694131e4d71aa3c78f2d01fc201cb9463b0a
                                    • Instruction ID: ea77ffc4bbec529c65c6e5381e7f03ef1eb31f4de294d21e893753037330201f
                                    • Opcode Fuzzy Hash: 18686adfa6647864573e8c64cfc1694131e4d71aa3c78f2d01fc201cb9463b0a
                                    • Instruction Fuzzy Hash: 87E10D74E002198FDB54DFA9C5809AEFBF2FF89305F288169E415AB359D730A942CF61
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3394246450.0000000006FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FD0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6fd0000_0I9GLRSiy0.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 7831233b510b4d90921d73445606d4f6d6087276095381b882dc5256e40378b3
                                    • Instruction ID: 6aaf3bdb7d4d82f8365ecc6a32a90e1996ae94043a81c4e9c56bc95cd0484a3f
                                    • Opcode Fuzzy Hash: 7831233b510b4d90921d73445606d4f6d6087276095381b882dc5256e40378b3
                                    • Instruction Fuzzy Hash: 4AE1FC74E002198FDB54DFA9C580AAEFBF2FF89305F288169E415AB359D731A941CF60
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3394246450.0000000006FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FD0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6fd0000_0I9GLRSiy0.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: fd6936c5c1776ee2908f4243c13a8472b9065814b6313c90c72d2d442a16236a
                                    • Instruction ID: eaff64b78283532b40e5a31fafc6b304917345aa62ccc58cfff8920e3c40c719
                                    • Opcode Fuzzy Hash: fd6936c5c1776ee2908f4243c13a8472b9065814b6313c90c72d2d442a16236a
                                    • Instruction Fuzzy Hash: 5EE11975E002198FDB54DFA9C5809AEFBF2FF89304F288169E505AB359C730A942CF61
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3390200713.0000000002670000.00000040.00000800.00020000.00000000.sdmp, Offset: 02670000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_2670000_0I9GLRSiy0.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: a4deee1760405051dbe9c74401645204c68b44496997a13ee08b1c8004d9c5cc
                                    • Instruction ID: 4492bc34193f29f37db95d13d185b796cd85a433f209ac93ae9550c44c99ef03
                                    • Opcode Fuzzy Hash: a4deee1760405051dbe9c74401645204c68b44496997a13ee08b1c8004d9c5cc
                                    • Instruction Fuzzy Hash: 06A14D36E002158FCF05DFB4E84499EB7B2FF85304B2545AEE905AB265DB32E956CB80
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3394246450.0000000006FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FD0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6fd0000_0I9GLRSiy0.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 886fa59aefff1b6b3f1a636f50cfb6e64de20b7c10883ae6f5755560aca6d518
                                    • Instruction ID: 89e09638460572f806042a5297c21cd4401e1477e3451652906d2bf037039c14
                                    • Opcode Fuzzy Hash: 886fa59aefff1b6b3f1a636f50cfb6e64de20b7c10883ae6f5755560aca6d518
                                    • Instruction Fuzzy Hash: 71512C75E002198FDB54CFA9C581AAEFBF2FF89304F248169D418A7355D731A942CFA1
                                    Memory Dump Source
                                    • Source File: 00000000.00000002.3394246450.0000000006FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 06FD0000, based on PE: false
                                    Joe Sandbox IDA Plugin
                                    • Snapshot File: hcaresult_0_2_6fd0000_0I9GLRSiy0.jbxd
                                    Similarity
                                    • API ID:
                                    • String ID:
                                    • API String ID:
                                    • Opcode ID: 8d9d611d6bfec3a61add3bac719860904c7519636a9aa7e7376d2bc2fc87f7bf
                                    • Instruction ID: 1586a998fe33d257ce5630ebabfc326287b9dd8ea5d204c968ace4dd59c03597
                                    • Opcode Fuzzy Hash: 8d9d611d6bfec3a61add3bac719860904c7519636a9aa7e7376d2bc2fc87f7bf
                                    • Instruction Fuzzy Hash: B4512A74E002198FDB54DFA9C5809AEFBF2FF89344F248169D418AB355D731A942CFA1