Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
tb4B9ni6vl.exe

Overview

General Information

Sample name:tb4B9ni6vl.exe
renamed because original name is a hash value
Original sample name:d41dac29dbd4d480221a0598ef8a784fcc856f2cca2dae9c8dd38adc01d7ebb8.exe
Analysis ID:1588913
MD5:2be05e23b58f0391fa6ff8f4fd3e4cf2
SHA1:6016c4770545b024784d39359aa1476b468ff127
SHA256:d41dac29dbd4d480221a0598ef8a784fcc856f2cca2dae9c8dd38adc01d7ebb8
Tags:AgentTeslaexeuser-adrian__luca
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
AI detected suspicious sample
Check if machine is in data center or colocation facility
Contains functionality to check if a debugger is running (CheckRemoteDebuggerPresent)
Maps a DLL or memory area into another process
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Queries sensitive video device information (via WMI, Win32_VideoController, often done to detect virtual machines)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Mail credentials (via file / registry access)
Writes to foreign memory regions
Yara detected Generic Downloader
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Checks if the current process is being debugged
Contains functionality to call native functions
Contains functionality to read the PEB
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
May check the online IP address of the machine
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
PE file contains an invalid checksum
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive Operating System Information (via WMI, Win32_ComputerSystem, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • tb4B9ni6vl.exe (PID: 7712 cmdline: "C:\Users\user\Desktop\tb4B9ni6vl.exe" MD5: 2BE05E23B58F0391FA6FF8F4FD3E4CF2)
    • RegAsm.exe (PID: 7844 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"Exfil Mode": "FTP", "Host": "ftp://ftp.horeca-bucuresti.ro", "Username": "biggiemma@horeca-bucuresti.ro", "Password": "e)rWKbKP8~mO"}
SourceRuleDescriptionAuthorStrings
00000002.00000002.3763860907.0000000002445000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    00000002.00000002.3762739371.0000000000402000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      00000002.00000002.3762739371.0000000000402000.00000040.80000000.00040000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000000.00000003.1373711464.0000000000A4E000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          00000000.00000003.1373711464.0000000000A4E000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 10 entries
            SourceRuleDescriptionAuthorStrings
            0.3.tb4B9ni6vl.exe.a4ea58.1.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
              0.3.tb4B9ni6vl.exe.a4ea58.1.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                0.3.tb4B9ni6vl.exe.a4ea58.1.unpackINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
                • 0x3261f:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
                • 0x32691:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
                • 0x3271b:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
                • 0x327ad:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
                • 0x32817:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
                • 0x32889:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
                • 0x3291f:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
                • 0x329af:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
                0.3.tb4B9ni6vl.exe.a4ea58.1.unpackMALWARE_Win_AgentTeslaV2AgenetTesla Type 2 Keylogger payloadditekSHen
                • 0x2f819:$s2: GetPrivateProfileString
                • 0x2eedd:$s3: get_OSFullName
                • 0x30562:$s5: remove_Key
                • 0x30703:$s5: remove_Key
                • 0x315f0:$s6: FtpWebRequest
                • 0x32601:$s7: logins
                • 0x32b73:$s7: logins
                • 0x35884:$s7: logins
                • 0x35936:$s7: logins
                • 0x37289:$s7: logins
                • 0x364d0:$s9: 1.85 (Hash, version 2, native byte-order)
                2.2.RegAsm.exe.400000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                  Click to see the 23 entries
                  No Sigma rule has matched
                  No Suricata rule has matched

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: tb4B9ni6vl.exeAvira: detected
                  Source: 2.2.RegAsm.exe.400000.0.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "FTP", "Host": "ftp://ftp.horeca-bucuresti.ro", "Username": "biggiemma@horeca-bucuresti.ro", "Password": "e)rWKbKP8~mO"}
                  Source: tb4B9ni6vl.exeReversingLabs: Detection: 71%
                  Source: tb4B9ni6vl.exeVirustotal: Detection: 68%Perma Link
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                  Source: tb4B9ni6vl.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE

                  Networking

                  barindex
                  Source: Yara matchFile source: 2.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.3.tb4B9ni6vl.exe.a4ea58.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.3.tb4B9ni6vl.exe.a4ea58.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.tb4B9ni6vl.exe.2d00000.1.unpack, type: UNPACKEDPE
                  Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                  Source: Joe Sandbox ViewIP Address: 208.95.112.1 208.95.112.1
                  Source: unknownDNS query: name: ip-api.com
                  Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                  Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                  Source: global trafficDNS traffic detected: DNS query: ip-api.com
                  Source: tb4B9ni6vl.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
                  Source: tb4B9ni6vl.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crt0
                  Source: tb4B9ni6vl.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
                  Source: tb4B9ni6vl.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
                  Source: tb4B9ni6vl.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
                  Source: tb4B9ni6vl.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0S
                  Source: tb4B9ni6vl.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
                  Source: tb4B9ni6vl.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
                  Source: tb4B9ni6vl.exeString found in binary or memory: http://crl4.digicert.com/DigiCertTrustedG4CodeSigningRSA4096SHA3842021CA1.crl0
                  Source: RegAsm.exe, 00000002.00000002.3763860907.00000000024F2000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3763860907.00000000024EA000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3763860907.0000000002411000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com
                  Source: tb4B9ni6vl.exe, 00000000.00000003.1373711464.0000000000A4E000.00000004.00000020.00020000.00000000.sdmp, tb4B9ni6vl.exe, 00000000.00000002.1378261499.0000000002D02000.00000040.10000000.00040000.00000000.sdmp, tb4B9ni6vl.exe, 00000000.00000003.1373552995.0000000004041000.00000004.00000020.00020000.00000000.sdmp, tb4B9ni6vl.exe, 00000000.00000003.1373443509.0000000000A4E000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3763860907.00000000024D8000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3762739371.0000000000402000.00000040.80000000.00040000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3763860907.0000000002411000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ip-api.com/line/?fields=hosting
                  Source: tb4B9ni6vl.exeString found in binary or memory: http://ocsp.digicert.com0
                  Source: tb4B9ni6vl.exeString found in binary or memory: http://ocsp.digicert.com0A
                  Source: tb4B9ni6vl.exeString found in binary or memory: http://ocsp.digicert.com0C
                  Source: tb4B9ni6vl.exeString found in binary or memory: http://ocsp.digicert.com0X
                  Source: RegAsm.exe, 00000002.00000002.3763860907.00000000024D8000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3763860907.0000000002411000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                  Source: tb4B9ni6vl.exeString found in binary or memory: http://www.digicert.com/CPS0
                  Source: tb4B9ni6vl.exe, 00000000.00000003.1373711464.0000000000A4E000.00000004.00000020.00020000.00000000.sdmp, tb4B9ni6vl.exe, 00000000.00000002.1378261499.0000000002D02000.00000040.10000000.00040000.00000000.sdmp, tb4B9ni6vl.exe, 00000000.00000003.1373552995.0000000004041000.00000004.00000020.00020000.00000000.sdmp, tb4B9ni6vl.exe, 00000000.00000003.1373443509.0000000000A4E000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3762739371.0000000000402000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://account.dyn.com/
                  Source: tb4B9ni6vl.exeString found in binary or memory: https://mozilla.org0/

                  System Summary

                  barindex
                  Source: 0.3.tb4B9ni6vl.exe.a4ea58.1.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 0.3.tb4B9ni6vl.exe.a4ea58.1.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 2.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 2.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 0.3.tb4B9ni6vl.exe.a4ea58.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 0.3.tb4B9ni6vl.exe.a4ea58.0.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 0.3.tb4B9ni6vl.exe.a4ea58.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 0.3.tb4B9ni6vl.exe.a4ea58.1.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 0.3.tb4B9ni6vl.exe.a4ea58.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 0.3.tb4B9ni6vl.exe.a4ea58.0.raw.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: 0.2.tb4B9ni6vl.exe.2d00000.1.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                  Source: 0.2.tb4B9ni6vl.exe.2d00000.1.unpack, type: UNPACKEDPEMatched rule: AgenetTesla Type 2 Keylogger payload Author: ditekSHen
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess Stats: CPU usage > 49%
                  Source: C:\Users\user\Desktop\tb4B9ni6vl.exeCode function: 0_2_0026C1F0 __vbaFreeVar,NtSetInformationProcess,0_2_0026C1F0
                  Source: C:\Users\user\Desktop\tb4B9ni6vl.exeCode function: 0_2_002058FB NtAllocateVirtualMemory,NtProtectVirtualMemory,NtProtectVirtualMemory,0_2_002058FB
                  Source: C:\Users\user\Desktop\tb4B9ni6vl.exeCode function: 0_2_009B28EC NtCreateSection,NtMapViewOfSection,RpcServerRegisterIf3,CreateProcessW,NtGetContextThread,NtReadVirtualMemory,NtWriteVirtualMemory,NtUnmapViewOfSection,NtMapViewOfSection,NtSetContextThread,NtResumeThread,0_2_009B28EC
                  Source: C:\Users\user\Desktop\tb4B9ni6vl.exeCode function: 0_2_009B28B2 NtCreateSection,NtMapViewOfSection,RpcServerRegisterIf3,CreateProcessW,NtGetContextThread,NtReadVirtualMemory,NtWriteVirtualMemory,NtUnmapViewOfSection,NtMapViewOfSection,NtSetContextThread,NtResumeThread,0_2_009B28B2
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004460CF NtAllocateVirtualMemory,2_2_004460CF
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00446194 NtProtectVirtualMemory,2_2_00446194
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00443A0A NtDelayExecution,2_2_00443A0A
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00446298 NtProtectVirtualMemory,2_2_00446298
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00445B79 NtAllocateVirtualMemory,2_2_00445B79
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00444394 NtClose,2_2_00444394
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00443BAA NtCreateThreadEx,NtClose,2_2_00443BAA
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004441C8 NtClose,2_2_004441C8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00443A2E NtDelayExecution,2_2_00443A2E
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0044423B NtDelayExecution,2_2_0044423B
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00444310 NtCreateThreadEx,NtClose,2_2_00444310
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00444338 NtCreateThreadEx,NtClose,2_2_00444338
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0220A6BD2_2_0220A6BD
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_02204A882_2_02204A88
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0220D8902_2_0220D890
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_02203E702_2_02203E70
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_022041B82_2_022041B8
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_05C811302_2_05C81130
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_05C83A882_2_05C83A88
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_05C833A02_2_05C833A0
                  Source: tb4B9ni6vl.exeStatic PE information: invalid certificate
                  Source: tb4B9ni6vl.exe, 00000000.00000002.1378261499.0000000002D3E000.00000040.10000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenamefc288b27-c6cf-4c74-9578-1c1adc1c204c.exe4 vs tb4B9ni6vl.exe
                  Source: tb4B9ni6vl.exe, 00000000.00000002.1376574614.0000000000273000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameacvm7qw909e.exe vs tb4B9ni6vl.exe
                  Source: tb4B9ni6vl.exe, 00000000.00000003.1373711464.0000000000A4E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamefc288b27-c6cf-4c74-9578-1c1adc1c204c.exe4 vs tb4B9ni6vl.exe
                  Source: tb4B9ni6vl.exe, 00000000.00000003.1373552995.0000000004041000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamefc288b27-c6cf-4c74-9578-1c1adc1c204c.exe4 vs tb4B9ni6vl.exe
                  Source: tb4B9ni6vl.exe, 00000000.00000003.1373443509.0000000000A4E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamefc288b27-c6cf-4c74-9578-1c1adc1c204c.exe4 vs tb4B9ni6vl.exe
                  Source: tb4B9ni6vl.exeBinary or memory string: OriginalFilenameacvm7qw909e.exe vs tb4B9ni6vl.exe
                  Source: tb4B9ni6vl.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                  Source: 0.3.tb4B9ni6vl.exe.a4ea58.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 0.3.tb4B9ni6vl.exe.a4ea58.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 2.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 2.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 0.3.tb4B9ni6vl.exe.a4ea58.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 0.3.tb4B9ni6vl.exe.a4ea58.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 0.3.tb4B9ni6vl.exe.a4ea58.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 0.3.tb4B9ni6vl.exe.a4ea58.1.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 0.3.tb4B9ni6vl.exe.a4ea58.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 0.3.tb4B9ni6vl.exe.a4ea58.0.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: 0.2.tb4B9ni6vl.exe.2d00000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                  Source: 0.2.tb4B9ni6vl.exe.2d00000.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV2 author = ditekSHen, description = AgenetTesla Type 2 Keylogger payload
                  Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/1@1/1
                  Source: C:\Users\user\Desktop\tb4B9ni6vl.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1003\bb7e5d0cf2dfb2b59be71d56e848e059_9e146be9-c76a-4720-bcdb-53011b87bd06Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMutant created: NULL
                  Source: tb4B9ni6vl.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                  Source: C:\Users\user\Desktop\tb4B9ni6vl.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: RegAsm.exe, 00000002.00000002.3763860907.000000000250F000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3763860907.0000000002522000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                  Source: tb4B9ni6vl.exeReversingLabs: Detection: 71%
                  Source: tb4B9ni6vl.exeVirustotal: Detection: 68%
                  Source: unknownProcess created: C:\Users\user\Desktop\tb4B9ni6vl.exe "C:\Users\user\Desktop\tb4B9ni6vl.exe"
                  Source: C:\Users\user\Desktop\tb4B9ni6vl.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"
                  Source: C:\Users\user\Desktop\tb4B9ni6vl.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"Jump to behavior
                  Source: C:\Users\user\Desktop\tb4B9ni6vl.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\Desktop\tb4B9ni6vl.exeSection loaded: msvbvm60.dllJump to behavior
                  Source: C:\Users\user\Desktop\tb4B9ni6vl.exeSection loaded: vb6zz.dllJump to behavior
                  Source: C:\Users\user\Desktop\tb4B9ni6vl.exeSection loaded: vb6de.dllJump to behavior
                  Source: C:\Users\user\Desktop\tb4B9ni6vl.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\tb4B9ni6vl.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\tb4B9ni6vl.exeSection loaded: sxs.dllJump to behavior
                  Source: C:\Users\user\Desktop\tb4B9ni6vl.exeSection loaded: vb6de.dllJump to behavior
                  Source: C:\Users\user\Desktop\tb4B9ni6vl.exeSection loaded: textshaping.dllJump to behavior
                  Source: C:\Users\user\Desktop\tb4B9ni6vl.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\Desktop\tb4B9ni6vl.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\Desktop\tb4B9ni6vl.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Users\user\Desktop\tb4B9ni6vl.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Users\user\Desktop\tb4B9ni6vl.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\tb4B9ni6vl.exeSection loaded: dpapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\tb4B9ni6vl.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: aclayers.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: version.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wbemcomn.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: amsi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: userenv.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sspicli.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rasapi32.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rasman.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rtutils.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mswsock.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winhttp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: iphlpapi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dhcpcsvc6.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dhcpcsvc.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dnsapi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winnsi.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rasadhlp.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: fwpuclnt.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: vaultcli.dllJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\Desktop\tb4B9ni6vl.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0BE35204-8F91-11CE-9DE3-00AA004BB851}\InprocServer32Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                  Source: tb4B9ni6vl.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
                  Source: tb4B9ni6vl.exeStatic PE information: Image base 0x7fff0000 > 0x60000000
                  Source: tb4B9ni6vl.exeStatic file information: File size 2524496 > 1048576
                  Source: tb4B9ni6vl.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x25d000
                  Source: tb4B9ni6vl.exeStatic PE information: real checksum: 0x26f10e should be: 0x26b4d4
                  Source: C:\Users\user\Desktop\tb4B9ni6vl.exeCode function: 0_2_009B4092 push ss; retf 0_2_009B409D
                  Source: C:\Users\user\Desktop\tb4B9ni6vl.exeCode function: 0_2_009B140F push ds; retf 0_2_009B1420
                  Source: C:\Users\user\Desktop\tb4B9ni6vl.exeCode function: 0_2_009B5C62 push ss; retf 0_2_009B5C7A
                  Source: C:\Users\user\Desktop\tb4B9ni6vl.exeCode function: 0_2_009B4D97 push edx; iretd 0_2_009B4D98
                  Source: C:\Users\user\Desktop\tb4B9ni6vl.exeCode function: 0_2_009B3E9C pushfd ; iretd 0_2_009B3EC7
                  Source: C:\Users\user\Desktop\tb4B9ni6vl.exeCode function: 0_2_009B5213 push ebp; retf 0_2_009B5214
                  Source: C:\Users\user\Desktop\tb4B9ni6vl.exeCode function: 0_2_009B0FAF push esi; ret 0_2_009B0FB0
                  Source: C:\Users\user\Desktop\tb4B9ni6vl.exeCode function: 0_2_009B4704 pushad ; ret 0_2_009B470C
                  Source: C:\Users\user\Desktop\tb4B9ni6vl.exeCode function: 0_2_009FA979 push esp; iretd 0_2_009FA97B
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00444D5D push ss; retf 2_2_00444D75
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0044550A push 395F3F06h; iretd 2_2_00445516
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0044318D push ss; retf 2_2_00443198
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00443E92 push edx; iretd 2_2_00443E93
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_0044430E push ebp; retf 2_2_0044430F
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004437FF pushad ; ret 2_2_00443807
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00442F97 pushfd ; iretd 2_2_00442FC2
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_05C88D8E push esp; ret 2_2_05C88D8F
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_05C895F0 push ebp; ret 2_2_05C895FE
                  Source: C:\Users\user\Desktop\tb4B9ni6vl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\tb4B9ni6vl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\tb4B9ni6vl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\tb4B9ni6vl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\tb4B9ni6vl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\tb4B9ni6vl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\tb4B9ni6vl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\tb4B9ni6vl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\tb4B9ni6vl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\tb4B9ni6vl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\tb4B9ni6vl.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                  Malware Analysis System Evasion

                  barindex
                  Source: global trafficHTTP traffic detected: GET /line/?fields=hosting HTTP/1.1Host: ip-api.comConnection: Keep-Alive
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT * FROM Win32_VideoController
                  Source: tb4B9ni6vl.exe, 00000000.00000003.1373711464.0000000000A4E000.00000004.00000020.00020000.00000000.sdmp, tb4B9ni6vl.exe, 00000000.00000002.1378261499.0000000002D02000.00000040.10000000.00040000.00000000.sdmp, tb4B9ni6vl.exe, 00000000.00000003.1373552995.0000000004041000.00000004.00000020.00020000.00000000.sdmp, tb4B9ni6vl.exe, 00000000.00000003.1373443509.0000000000A4E000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3763860907.0000000002445000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3763860907.00000000024F2000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3762739371.0000000000402000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 21C0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 2410000 memory reserve | memory write watchJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: 2220000 memory reserve | memory write watchJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWindow / User API: threadDelayed 1559Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWindow / User API: threadDelayed 8434Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7852Thread sleep count: 1559 > 30Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7852Thread sleep time: -1559000s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7852Thread sleep count: 8434 > 30Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7852Thread sleep time: -8434000s >= -30000sJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : Select * from Win32_ComputerSystem
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeLast function: Thread delayed
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeLast function: Thread delayed
                  Source: RegAsm.exe, 00000002.00000002.3763860907.00000000024F2000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware
                  Source: RegAsm.exe, 00000002.00000002.3762739371.0000000000402000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: vmware
                  Source: RegAsm.exe, 00000002.00000002.3762739371.0000000000402000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: VMwareVBoxESelect * from Win32_ComputerSystem
                  Source: RegAsm.exe, 00000002.00000002.3765422285.0000000005794000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess information queried: ProcessInformationJump to behavior

                  Anti Debugging

                  barindex
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_02207070 CheckRemoteDebuggerPresent,2_2_02207070
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess queried: DebugPortJump to behavior
                  Source: C:\Users\user\Desktop\tb4B9ni6vl.exeCode function: 0_2_00205EB1 mov eax, dword ptr fs:[00000030h]0_2_00205EB1
                  Source: C:\Users\user\Desktop\tb4B9ni6vl.exeCode function: 0_2_009B28EC mov eax, dword ptr fs:[00000030h]0_2_009B28EC
                  Source: C:\Users\user\Desktop\tb4B9ni6vl.exeCode function: 0_2_009B6817 mov eax, dword ptr fs:[00000030h]0_2_009B6817
                  Source: C:\Users\user\Desktop\tb4B9ni6vl.exeCode function: 0_2_009B687E mov eax, dword ptr fs:[00000030h]0_2_009B687E
                  Source: C:\Users\user\Desktop\tb4B9ni6vl.exeCode function: 0_2_009B6D27 mov eax, dword ptr fs:[00000030h]0_2_009B6D27
                  Source: C:\Users\user\Desktop\tb4B9ni6vl.exeCode function: 0_2_009B2EBD mov eax, dword ptr fs:[00000030h]0_2_009B2EBD
                  Source: C:\Users\user\Desktop\tb4B9ni6vl.exeCode function: 0_2_009B6AD3 mov eax, dword ptr fs:[00000030h]0_2_009B6AD3
                  Source: C:\Users\user\Desktop\tb4B9ni6vl.exeCode function: 0_2_009B6FBF mov ecx, dword ptr fs:[00000030h]0_2_009B6FBF
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004460CF mov edx, dword ptr fs:[00000030h]2_2_004460CF
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004458E3 mov eax, dword ptr fs:[00000030h]2_2_004458E3
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004460BA mov ecx, dword ptr fs:[00000030h]2_2_004460BA
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00445979 mov eax, dword ptr fs:[00000030h]2_2_00445979
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00445D10 mov eax, dword ptr fs:[00000030h]2_2_00445D10
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00445912 mov eax, dword ptr fs:[00000030h]2_2_00445912
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004459E2 mov eax, dword ptr fs:[00000030h]2_2_004459E2
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004459EF mov eax, dword ptr fs:[00000030h]2_2_004459EF
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00445E22 mov eax, dword ptr fs:[00000030h]2_2_00445E22
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00445A2D mov eax, dword ptr fs:[00000030h]2_2_00445A2D
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00445A8A mov eax, dword ptr fs:[00000030h]2_2_00445A8A
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_004442A0 mov ecx, dword ptr fs:[00000030h]2_2_004442A0
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00445B13 mov eax, dword ptr fs:[00000030h]2_2_00445B13
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 2_2_00445BCE mov eax, dword ptr fs:[00000030h]2_2_00445BCE
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeMemory allocated: page read and write | page guardJump to behavior

                  HIPS / PFW / Operating System Protection Evasion

                  barindex
                  Source: C:\Users\user\Desktop\tb4B9ni6vl.exeSection loaded: NULL target: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe protection: execute and read and writeJump to behavior
                  Source: C:\Users\user\Desktop\tb4B9ni6vl.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 37D008Jump to behavior
                  Source: C:\Users\user\Desktop\tb4B9ni6vl.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"Jump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\tb4B9ni6vl.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: 0.3.tb4B9ni6vl.exe.a4ea58.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.3.tb4B9ni6vl.exe.a4ea58.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.3.tb4B9ni6vl.exe.a4ea58.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.3.tb4B9ni6vl.exe.a4ea58.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.tb4B9ni6vl.exe.2d00000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000002.00000002.3762739371.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000003.1373711464.0000000000A4E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1378261499.0000000002D02000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000003.1373552995.0000000004041000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000003.1373443509.0000000000A4E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: tb4B9ni6vl.exe PID: 7712, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 7844, type: MEMORYSTR
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                  Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                  Source: Yara matchFile source: 0.3.tb4B9ni6vl.exe.a4ea58.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.3.tb4B9ni6vl.exe.a4ea58.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.3.tb4B9ni6vl.exe.a4ea58.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.3.tb4B9ni6vl.exe.a4ea58.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.tb4B9ni6vl.exe.2d00000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000002.00000002.3763860907.0000000002445000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.3762739371.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000003.1373711464.0000000000A4E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1378261499.0000000002D02000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000003.1373552995.0000000004041000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000003.1373443509.0000000000A4E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: tb4B9ni6vl.exe PID: 7712, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 7844, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: 0.3.tb4B9ni6vl.exe.a4ea58.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 2.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.3.tb4B9ni6vl.exe.a4ea58.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.3.tb4B9ni6vl.exe.a4ea58.1.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.3.tb4B9ni6vl.exe.a4ea58.0.raw.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.tb4B9ni6vl.exe.2d00000.1.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000002.00000002.3762739371.0000000000402000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000003.1373711464.0000000000A4E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.1378261499.0000000002D02000.00000040.10000000.00040000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000003.1373552995.0000000004041000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000003.1373443509.0000000000A4E000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: tb4B9ni6vl.exe PID: 7712, type: MEMORYSTR
                  Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 7844, type: MEMORYSTR
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire InfrastructureValid Accounts231
                  Windows Management Instrumentation
                  1
                  DLL Side-Loading
                  211
                  Process Injection
                  1
                  Masquerading
                  1
                  OS Credential Dumping
                  531
                  Security Software Discovery
                  Remote Services1
                  Email Collection
                  1
                  Encrypted Channel
                  Exfiltration Over Other Network MediumAbuse Accessibility Features
                  CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                  DLL Side-Loading
                  25
                  Virtualization/Sandbox Evasion
                  LSASS Memory25
                  Virtualization/Sandbox Evasion
                  Remote Desktop Protocol1
                  Archive Collected Data
                  1
                  Ingress Tool Transfer
                  Exfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
                  Disable or Modify Tools
                  Security Account Manager1
                  Process Discovery
                  SMB/Windows Admin Shares1
                  Data from Local System
                  2
                  Non-Application Layer Protocol
                  Automated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook211
                  Process Injection
                  NTDS1
                  Application Window Discovery
                  Distributed Component Object ModelInput Capture2
                  Application Layer Protocol
                  Traffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                  Obfuscated Files or Information
                  LSA Secrets1
                  System Network Configuration Discovery
                  SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                  Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
                  DLL Side-Loading
                  Cached Domain Credentials1
                  File and Directory Discovery
                  VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                  DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup ItemsCompile After DeliveryDCSync34
                  System Information Discovery
                  Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  tb4B9ni6vl.exe71%ReversingLabsWin32.Trojan.AgentTesla
                  tb4B9ni6vl.exe68%VirustotalBrowse
                  tb4B9ni6vl.exe100%AviraTR/Dropper.Gen
                  No Antivirus matches
                  No Antivirus matches
                  No Antivirus matches
                  No Antivirus matches
                  NameIPActiveMaliciousAntivirus DetectionReputation
                  ip-api.com
                  208.95.112.1
                  truefalse
                    high
                    NameMaliciousAntivirus DetectionReputation
                    http://ip-api.com/line/?fields=hostingfalse
                      high
                      NameSourceMaliciousAntivirus DetectionReputation
                      https://mozilla.org0/tb4B9ni6vl.exefalse
                        high
                        https://account.dyn.com/tb4B9ni6vl.exe, 00000000.00000003.1373711464.0000000000A4E000.00000004.00000020.00020000.00000000.sdmp, tb4B9ni6vl.exe, 00000000.00000002.1378261499.0000000002D02000.00000040.10000000.00040000.00000000.sdmp, tb4B9ni6vl.exe, 00000000.00000003.1373552995.0000000004041000.00000004.00000020.00020000.00000000.sdmp, tb4B9ni6vl.exe, 00000000.00000003.1373443509.0000000000A4E000.00000004.00000020.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3762739371.0000000000402000.00000040.80000000.00040000.00000000.sdmpfalse
                          high
                          http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameRegAsm.exe, 00000002.00000002.3763860907.00000000024D8000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3763860907.0000000002411000.00000004.00000800.00020000.00000000.sdmpfalse
                            high
                            http://ip-api.comRegAsm.exe, 00000002.00000002.3763860907.00000000024F2000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3763860907.00000000024EA000.00000004.00000800.00020000.00000000.sdmp, RegAsm.exe, 00000002.00000002.3763860907.0000000002411000.00000004.00000800.00020000.00000000.sdmpfalse
                              high
                              • No. of IPs < 25%
                              • 25% < No. of IPs < 50%
                              • 50% < No. of IPs < 75%
                              • 75% < No. of IPs
                              IPDomainCountryFlagASNASN NameMalicious
                              208.95.112.1
                              ip-api.comUnited States
                              53334TUT-ASUSfalse
                              Joe Sandbox version:42.0.0 Malachite
                              Analysis ID:1588913
                              Start date and time:2025-01-11 07:04:04 +01:00
                              Joe Sandbox product:CloudBasic
                              Overall analysis duration:0h 7m 27s
                              Hypervisor based Inspection enabled:false
                              Report type:full
                              Cookbook file name:default.jbs
                              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                              Number of analysed new started processes analysed:7
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Sample name:tb4B9ni6vl.exe
                              renamed because original name is a hash value
                              Original Sample Name:d41dac29dbd4d480221a0598ef8a784fcc856f2cca2dae9c8dd38adc01d7ebb8.exe
                              Detection:MAL
                              Classification:mal100.troj.spyw.evad.winEXE@3/1@1/1
                              EGA Information:
                              • Successful, ratio: 100%
                              HCA Information:
                              • Successful, ratio: 85%
                              • Number of executed functions: 21
                              • Number of non-executed functions: 13
                              Cookbook Comments:
                              • Found application associated with file extension: .exe
                              • Override analysis time to 240000 for current running targets taking high CPU consumption
                              • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                              • Excluded IPs from analysis (whitelisted): 13.107.246.45, 20.12.23.50
                              • Excluded domains from analysis (whitelisted): otelrules.azureedge.net, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                              • Not all processes where analyzed, report is missing behavior information
                              • Report size getting too big, too many NtProtectVirtualMemory calls found.
                              • Report size getting too big, too many NtQueryValueKey calls found.
                              • Report size getting too big, too many NtReadVirtualMemory calls found.
                              TimeTypeDescription
                              01:05:37API Interceptor1105765x Sleep call for process: RegAsm.exe modified
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              208.95.112.1juE8dtqPkx.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                              • ip-api.com/line/?fields=hosting
                              YY3k9rjxpY.exeGet hashmaliciousAgentTeslaBrowse
                              • ip-api.com/line/?fields=hosting
                              4LbgdNQgna.exeGet hashmaliciousAgentTeslaBrowse
                              • ip-api.com/line/?fields=hosting
                              toIuQILmr1.exeGet hashmaliciousAgentTeslaBrowse
                              • ip-api.com/line/?fields=hosting
                              LfZAz7DQzo.exeGet hashmaliciousAgentTeslaBrowse
                              • ip-api.com/line/?fields=hosting
                              Q5QrxfKnFA.exeGet hashmaliciousAgentTeslaBrowse
                              • ip-api.com/line/?fields=hosting
                              RHOqJ5BrHW.exeGet hashmaliciousAgentTeslaBrowse
                              • ip-api.com/line/?fields=hosting
                              J8V6dFanEo.exeGet hashmaliciousAgentTeslaBrowse
                              • ip-api.com/line/?fields=hosting
                              3FjrbCZgDN.exeGet hashmaliciousAgentTeslaBrowse
                              • ip-api.com/line/?fields=hosting
                              ewYjhndHg2.exeGet hashmaliciousAgentTeslaBrowse
                              • ip-api.com/line/?fields=hosting
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              ip-api.comjuE8dtqPkx.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                              • 208.95.112.1
                              YY3k9rjxpY.exeGet hashmaliciousAgentTeslaBrowse
                              • 208.95.112.1
                              4LbgdNQgna.exeGet hashmaliciousAgentTeslaBrowse
                              • 208.95.112.1
                              toIuQILmr1.exeGet hashmaliciousAgentTeslaBrowse
                              • 208.95.112.1
                              LfZAz7DQzo.exeGet hashmaliciousAgentTeslaBrowse
                              • 208.95.112.1
                              Q5QrxfKnFA.exeGet hashmaliciousAgentTeslaBrowse
                              • 208.95.112.1
                              RHOqJ5BrHW.exeGet hashmaliciousAgentTeslaBrowse
                              • 208.95.112.1
                              J8V6dFanEo.exeGet hashmaliciousAgentTeslaBrowse
                              • 208.95.112.1
                              3FjrbCZgDN.exeGet hashmaliciousAgentTeslaBrowse
                              • 208.95.112.1
                              ewYjhndHg2.exeGet hashmaliciousAgentTeslaBrowse
                              • 208.95.112.1
                              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                              TUT-ASUSjuE8dtqPkx.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                              • 208.95.112.1
                              YY3k9rjxpY.exeGet hashmaliciousAgentTeslaBrowse
                              • 208.95.112.1
                              4LbgdNQgna.exeGet hashmaliciousAgentTeslaBrowse
                              • 208.95.112.1
                              toIuQILmr1.exeGet hashmaliciousAgentTeslaBrowse
                              • 208.95.112.1
                              LfZAz7DQzo.exeGet hashmaliciousAgentTeslaBrowse
                              • 208.95.112.1
                              Q5QrxfKnFA.exeGet hashmaliciousAgentTeslaBrowse
                              • 208.95.112.1
                              RHOqJ5BrHW.exeGet hashmaliciousAgentTeslaBrowse
                              • 208.95.112.1
                              J8V6dFanEo.exeGet hashmaliciousAgentTeslaBrowse
                              • 208.95.112.1
                              3FjrbCZgDN.exeGet hashmaliciousAgentTeslaBrowse
                              • 208.95.112.1
                              ewYjhndHg2.exeGet hashmaliciousAgentTeslaBrowse
                              • 208.95.112.1
                              No context
                              No context
                              Process:C:\Users\user\Desktop\tb4B9ni6vl.exe
                              File Type:data
                              Category:dropped
                              Size (bytes):45
                              Entropy (8bit):0.9111711733157262
                              Encrypted:false
                              SSDEEP:3:/lwltAOl:WKK
                              MD5:1249116D570D2994CF7B4CD674646796
                              SHA1:13E7AF8AC4636DBAED0C23C14B17ACEA00F87214
                              SHA-256:487DC40611285BD6566DD58CD32B8FFF1C56CCB9924EC2DCB74C76F421C8F9AD
                              SHA-512:849529569C30BDAE95C6B2609A75E9B7C263E370BFB03680BF648FCE4CF9FEF9AB4AB25C4738CCC3642727B18DB68E94D97CB0D0D833E19795076FB7FDB5269B
                              Malicious:false
                              Reputation:moderate, very likely benign file
                              Preview:........................................user.
                              File type:PE32 executable (GUI) Intel 80386, for MS Windows
                              Entropy (8bit):7.263738519315181
                              TrID:
                              • Win32 Executable (generic) a (10002005/4) 99.94%
                              • Win16/32 Executable Delphi generic (2074/23) 0.02%
                              • Generic Win/DOS Executable (2004/3) 0.02%
                              • DOS Executable Generic (2002/1) 0.02%
                              • VXD Driver (31/22) 0.00%
                              File name:tb4B9ni6vl.exe
                              File size:2'524'496 bytes
                              MD5:2be05e23b58f0391fa6ff8f4fd3e4cf2
                              SHA1:6016c4770545b024784d39359aa1476b468ff127
                              SHA256:d41dac29dbd4d480221a0598ef8a784fcc856f2cca2dae9c8dd38adc01d7ebb8
                              SHA512:6753dbc9b858ccbc08c402b21da4b3d43785097f5cfd8e02cb894c4d55735e34e907403737b5a7d183c5fe94bc6a034613cf434c582408ab3ebb22c1067a42de
                              SSDEEP:49152:w3ASbdYAm4zEbdYAm4zWbdYAm4z23Ag3AWbdYAm4zSbdYAm4zO3AKBGmhesZjzQ:iA4drWdr0drkASA0dr4dr8AVHsBzQ
                              TLSH:0FC5D00322208F6FED4ADF39B7BA80E443153C5903155A42329F7720DB779BE9D29A5B
                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....ag..................%..p......e.#.......%...............................&.......&....................................
                              Icon Hash:a3a3939a92b3929a
                              Entrypoint:0x8022c165
                              Entrypoint Section:.text
                              Digitally signed:true
                              Imagebase:0x7fff0000
                              Subsystem:windows gui
                              Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                              DLL Characteristics:
                              Time Stamp:0x67618BED [Tue Dec 17 14:34:21 2024 UTC]
                              TLS Callbacks:
                              CLR (.Net) Version:
                              OS Version Major:4
                              OS Version Minor:0
                              File Version Major:4
                              File Version Minor:0
                              Subsystem Version Major:4
                              Subsystem Version Minor:0
                              Import Hash:42a4e0f64241075ea237a4cf00d0db9f
                              Signature Valid:false
                              Signature Issuer:CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1, O="DigiCert, Inc.", C=US
                              Signature Validation Error:The digital signature of the object did not verify
                              Error Number:-2146869232
                              Not Before, Not After
                              • 02/04/2024 02:00:00 19/06/2027 01:59:59
                              Subject Chain
                              • CN=Mozilla Corporation, OU=Firefox Engineering Operations, O=Mozilla Corporation, L=San Francisco, S=California, C=US
                              Version:3
                              Thumbprint MD5:C7D85E7FB216697F9E1CDEEABDF1D6A3
                              Thumbprint SHA-1:40890F2FE1ACAE18072FA7F3C0AE456AACC8570D
                              Thumbprint SHA-256:BB8FFB6AB921F253B7D24AA68E449286E17DA713C38142EDA6D909E9892EE179
                              Serial:0737B0D0DCDCAB8D78D2F40CB122F93F
                              Instruction
                              jmp 00007F0070665F6Fh
                              add byte ptr [eax+6149B581h], ch
                              ror byte ptr [ebx], 0000004Eh
                              into
                              les esi, fword ptr [ebx-13DBE9EBh]
                              sbb eax, EF04DE58h
                              loop 00007F00708A0A34h
                              lahf
                              push esp
                              jl 00007F00708A0A63h
                              call far A2B7h : D409199Fh
                              add eax, 590D6517h
                              mov esi, A80AEEC0h
                              xchg eax, ecx
                              NameVirtual AddressVirtual Size Is in Section
                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IMPORT0x25cc240x3c.text
                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x2630000x2894.rsrc
                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                              IMAGE_DIRECTORY_ENTRY_SECURITY0x2650000x3550
                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x2660000x1434.reloc
                              IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IAT0x10000x180.text
                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                              .text0x10000x25c34c0x25d0003788dfd120423459f40db665022ecd50unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                              .data0x25e0000x4bac0x1000620f0b67a91f7f74151bc5be745b7110False0.00634765625data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                              .rsrc0x2630000x28940x30002861c851f2d23123af116585c3b24974False0.19539388020833334data4.245051604246246IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              .reloc0x2660000x2c9a0x3000afa18b8e558400cc726c45d74db1dae7False0.344970703125data3.721147362799404IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                              NameRVASizeTypeLanguageCountryZLIB Complexity
                              RT_ICON0x2630e80x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 96000.21047717842323652
                              RT_GROUP_ICON0x2656900x14data1.15
                              RT_VERSION0x2656a40x1f0MS Windows COFF PowerPC object fileGermanGermany0.49798387096774194
                              DLLImport
                              KERNEL32.DLLGetProcAddress, GetModuleHandleW
                              MSVBVM60.DLL__vbaVarSub, _CIcos, _adj_fptan, __vbaVarMove, __vbaVarVargNofree, __vbaFreeVar, __vbaAryMove, __vbaStrVarMove, __vbaLenBstr, __vbaFreeVarList, _adj_fdiv_m64, __vbaNextEachVar, __vbaFreeObjList, _adj_fprem1, __vbaStrCat, __vbaBoolErrVar, __vbaSetSystemError, __vbaHresultCheckObj, __vbaLenVar, _adj_fdiv_m32, __vbaAryDestruct, __vbaObjSet, _adj_fdiv_m16i, __vbaObjSetAddref, _adj_fdivr_m16i, __vbaRefVarAry, __vbaBoolVarNull, _CIsin, __vbaVargVarMove, __vbaVarZero, __vbaVarCmpGt, __vbaChkstk, EVENT_SINK_AddRef, __vbaVarTstEq, DllFunctionCall, __vbaVarOr, __vbaRedimPreserve, _adj_fpatan, __vbaRedim, EVENT_SINK_Release, __vbaNew, _CIsqrt, EVENT_SINK_QueryInterface, __vbaExceptHandler, __vbaStrToUnicode, _adj_fprem, _adj_fdivr_m64, __vbaFPException, __vbaInStrVar, __vbaStrVarVal, __vbaUbound, __vbaVarCat, _CIlog, __vbaVar2Vec, __vbaNew2, _adj_fdiv_m32i, _adj_fdivr_m32i, __vbaStrCopy, __vbaI4Str, __vbaFreeStrList, _adj_fdivr_m32, _adj_fdiv_r, __vbaI4Var, __vbaAryLock, __vbaVarAdd, __vbaVarDup, __vbaStrToAnsi, __vbaVarCopy, __vbaVarLateMemCallLd, _CIatan, __vbaStrMove, __vbaCastObj, __vbaStrVarCopy, __vbaForEachVar, _allmul, _CItan, __vbaAryUnlock, _CIexp, __vbaFreeObj, __vbaFreeStr
                              Language of compilation systemCountry where language is spokenMap
                              GermanGermany
                              TimestampSource PortDest PortSource IPDest IP
                              Jan 11, 2025 07:05:05.982884884 CET4975380192.168.2.10208.95.112.1
                              Jan 11, 2025 07:05:05.987890005 CET8049753208.95.112.1192.168.2.10
                              Jan 11, 2025 07:05:05.987982988 CET4975380192.168.2.10208.95.112.1
                              Jan 11, 2025 07:05:05.989252090 CET4975380192.168.2.10208.95.112.1
                              Jan 11, 2025 07:05:05.994097948 CET8049753208.95.112.1192.168.2.10
                              Jan 11, 2025 07:05:06.443876028 CET8049753208.95.112.1192.168.2.10
                              Jan 11, 2025 07:05:06.487710953 CET4975380192.168.2.10208.95.112.1
                              Jan 11, 2025 07:05:56.760061026 CET8049753208.95.112.1192.168.2.10
                              Jan 11, 2025 07:05:56.760157108 CET4975380192.168.2.10208.95.112.1
                              Jan 11, 2025 07:06:46.458125114 CET4975380192.168.2.10208.95.112.1
                              Jan 11, 2025 07:06:46.463113070 CET8049753208.95.112.1192.168.2.10
                              TimestampSource PortDest PortSource IPDest IP
                              Jan 11, 2025 07:05:05.955554962 CET5349953192.168.2.101.1.1.1
                              Jan 11, 2025 07:05:05.962693930 CET53534991.1.1.1192.168.2.10
                              TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                              Jan 11, 2025 07:05:05.955554962 CET192.168.2.101.1.1.10x8b7eStandard query (0)ip-api.comA (IP address)IN (0x0001)false
                              TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                              Jan 11, 2025 07:05:05.962693930 CET1.1.1.1192.168.2.100x8b7eNo error (0)ip-api.com208.95.112.1A (IP address)IN (0x0001)false
                              • ip-api.com
                              Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                              0192.168.2.1049753208.95.112.1807844C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                              TimestampBytes transferredDirectionData
                              Jan 11, 2025 07:05:05.989252090 CET80OUTGET /line/?fields=hosting HTTP/1.1
                              Host: ip-api.com
                              Connection: Keep-Alive
                              Jan 11, 2025 07:05:06.443876028 CET175INHTTP/1.1 200 OK
                              Date: Sat, 11 Jan 2025 06:05:05 GMT
                              Content-Type: text/plain; charset=utf-8
                              Content-Length: 6
                              Access-Control-Allow-Origin: *
                              X-Ttl: 60
                              X-Rl: 44
                              Data Raw: 66 61 6c 73 65 0a
                              Data Ascii: false


                              Click to jump to process

                              Click to jump to process

                              Click to dive into process behavior distribution

                              Click to jump to process

                              Target ID:0
                              Start time:01:04:56
                              Start date:11/01/2025
                              Path:C:\Users\user\Desktop\tb4B9ni6vl.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Users\user\Desktop\tb4B9ni6vl.exe"
                              Imagebase:0x10000
                              File size:2'524'496 bytes
                              MD5 hash:2BE05E23B58F0391FA6FF8F4FD3E4CF2
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000003.1373711464.0000000000A4E000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000003.1373711464.0000000000A4E000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.1378261499.0000000002D02000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.1378261499.0000000002D02000.00000040.10000000.00040000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000003.1373552995.0000000004041000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000003.1373552995.0000000004041000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000003.1373443509.0000000000A4E000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000003.1373443509.0000000000A4E000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                              Reputation:low
                              Has exited:true

                              Target ID:2
                              Start time:01:05:04
                              Start date:11/01/2025
                              Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
                              Wow64 process (32bit):true
                              Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\regasm.exe"
                              Imagebase:0x10000
                              File size:65'440 bytes
                              MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.3763860907.0000000002445000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.3762739371.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                              • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.3762739371.0000000000402000.00000040.80000000.00040000.00000000.sdmp, Author: Joe Security
                              Reputation:high
                              Has exited:false

                              Reset < >

                                Execution Graph

                                Execution Coverage:19.9%
                                Dynamic/Decrypted Code Coverage:100%
                                Signature Coverage:27.5%
                                Total number of Nodes:193
                                Total number of Limit Nodes:13
                                execution_graph 1356 1b120 1357 1b12e 1356->1357 1360 1b309 1357->1360 1358 26bc69 1361 26bca0 1360->1361 1369 26c170 1361->1369 1365 26bce9 1416 26c1f0 1365->1416 1368 26bd08 1368->1358 1420 2058fb 1369->1420 1372 2062f0 9 API calls 1431 20a0e0 __vbaVarDup #653 __vbaI4Var 1372->1431 1375 20a0e0 8 API calls 1376 20646e __vbaStrMove #644 GetModuleHandleW __vbaFreeStrList 1375->1376 1377 2064a4 40 API calls 1376->1377 1380 20666c 1377->1380 1378 206684 __vbaAryLock #644 __vbaAryUnlock 1378->1380 1379 2066e5 __vbaObjSetAddref #644 __vbaFreeObj #644 1435 205fcb 1379->1435 1380->1378 1380->1379 1382 20672b __vbaAryLock #644 __vbaAryUnlock #644 1436 205fae 1382->1436 1384 206781 __vbaRedim #644 1437 205fae 1384->1437 1386 2067cf #644 1438 205fae 1386->1438 1388 2067fc __vbaAryLock __vbaStrCat __vbaStrMove __vbaI4Str VirtualProtect 1389 206882 __vbaAryUnlock __vbaFreeStr #644 1388->1389 1390 20686b __vbaHresultCheckObj 1388->1390 1393 2068b7 1389->1393 1390->1389 1391 206926 #644 1439 205fae 1391->1439 1392 2068cf __vbaAryLock #644 __vbaAryUnlock 1392->1393 1393->1391 1393->1392 1395 20694c #644 1440 205fae 1395->1440 1397 206972 #644 1441 205fae 1397->1441 1399 206998 #644 1442 205fae 1399->1442 1401 2069be #644 1443 205fae 1401->1443 1403 2069e4 VirtualProtect 1404 206a2f __vbaHresultCheckObj 1403->1404 1408 206a46 1403->1408 1404->1408 1405 206a62 __vbaAryLock #644 __vbaAryUnlock 1405->1408 1406 206ab3 #644 1444 205fae 1406->1444 1408->1405 1408->1406 1409 206ace #644 1445 205fae 1409->1445 1411 206ae3 #644 1412 206aff 1411->1412 1446 206db0 1412->1446 1414 206b08 __vbaAryDestruct 1414->1365 1457 1e544 1416->1457 1418 26c236 NtSetInformationProcess 1419 26bcf2 __vbaFreeVar 1418->1419 1419->1368 1421 20591d 1420->1421 1429 205eb1 GetPEB 1421->1429 1423 205927 1424 20597c NtAllocateVirtualMemory 1423->1424 1425 20599f NtProtectVirtualMemory 1423->1425 1424->1425 1426 20599a __vbaFreeVar 1424->1426 1425->1426 1428 2059ca 1425->1428 1426->1372 1427 205a63 NtProtectVirtualMemory 1427->1426 1428->1427 1430 205ec3 1429->1430 1430->1423 1432 20a15a 1431->1432 1433 2063f5 7 API calls 1432->1433 1434 20a168 #632 __vbaVarCat __vbaStrVarMove __vbaStrMove __vbaFreeVarList 1432->1434 1433->1375 1434->1432 1435->1382 1436->1384 1437->1386 1438->1388 1439->1395 1440->1397 1441->1399 1442->1401 1443->1403 1444->1409 1445->1411 1454 2074d0 1446->1454 1448 206deb #644 #644 1455 205fae 1448->1455 1450 206e1b #644 1456 205fcb 1450->1456 1452 206e38 #644 1453 206e57 1452->1453 1453->1414 1454->1448 1455->1450 1456->1452 1458 1e54d 1457->1458 1513 9b490f 1519 9b687e GetPEB 1513->1519 1459 9b28ec 1460 9b28fd 1459->1460 1478 9b2ebd GetPEB 1460->1478 1462 9b292c 1463 9b2db1 1462->1463 1464 9b2ebd GetPEB 1462->1464 1465 9b2943 1464->1465 1465->1463 1466 9b2ab3 NtCreateSection 1465->1466 1466->1463 1467 9b2aea NtMapViewOfSection 1466->1467 1467->1463 1468 9b2b12 1467->1468 1469 9b2bb0 CreateProcessW 1468->1469 1470 9b2c75 GetPEB 1468->1470 1469->1463 1472 9b2cbb NtGetContextThread 1469->1472 1470->1469 1472->1469 1473 9b2cdc NtReadVirtualMemory 1472->1473 1473->1469 1474 9b2d02 NtWriteVirtualMemory 1473->1474 1474->1469 1475 9b2d28 NtUnmapViewOfSection NtMapViewOfSection 1474->1475 1475->1469 1476 9b2d5c NtSetContextThread 1475->1476 1476->1469 1477 9b2d8d NtResumeThread 1476->1477 1477->1463 1477->1469 1479 9b2ed2 1478->1479 1479->1462 1520 1ab96 1521 26a4e0 __vbaVarVargNofree __vbaVarCopy __vbaVarTstEq 1520->1521 1523 26a67b __vbaVarTstEq 1521->1523 1524 26a5d8 __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat 1521->1524 1525 26a6f3 __vbaVarTstEq 1523->1525 1526 26a6a0 1523->1526 1527 206070 1524->1527 1528 26a7e5 __vbaVarTstEq 1525->1528 1529 26a71c 9 API calls 1525->1529 1531 26a6de __vbaVargVarMove 1526->1531 1530 26a647 __vbaVargVarMove __vbaFreeStrList 1527->1530 1533 26a80e 13 API calls 1528->1533 1536 26a676 __vbaVarVargNofree __vbaVarCopy __vbaVarTstEq 1528->1536 1532 206070 1529->1532 1530->1536 1531->1536 1534 26a7a9 __vbaVargVarMove __vbaFreeStrList 1532->1534 1535 206070 1533->1535 1534->1536 1538 26a8b9 __vbaVargVarMove __vbaFreeStrList 1535->1538 1539 26a960 __vbaVarTstEq 1536->1539 1562 26a956 1536->1562 1538->1536 1540 26a991 19 API calls 1539->1540 1541 26aaa8 __vbaVarTstEq 1539->1541 1542 206070 1540->1542 1543 26ac9b __vbaVarTstEq 1541->1543 1544 26aad9 37 API calls 1541->1544 1547 26aa5d __vbaVargVarMove __vbaFreeStrList 1542->1547 1545 26acd2 __vbaVarTstEq 1543->1545 1543->1562 1548 206070 1544->1548 1549 26ad03 19 API calls 1545->1549 1550 26ae1a __vbaVarTstEq 1545->1550 1546 26bb1e __vbaVargVarMove 1563 26aaa3 __vbaFreeVarList 1546->1563 1547->1563 1551 26ac2c __vbaVargVarMove __vbaFreeStrList 1548->1551 1552 206070 1549->1552 1554 26aef0 __vbaVarTstEq 1550->1554 1555 26ae4b 7 API calls 1550->1555 1551->1563 1556 26adcf __vbaVargVarMove __vbaFreeStrList 1552->1556 1558 26af27 __vbaVarTstEq 1554->1558 1554->1562 1557 206070 1555->1557 1556->1563 1560 26aebd __vbaVargVarMove __vbaFreeStrList 1557->1560 1559 26af5e __vbaVarTstEq 1558->1559 1558->1562 1561 26af95 __vbaVarTstEq 1559->1561 1559->1562 1560->1563 1564 26afc6 19 API calls 1561->1564 1565 26b0dd __vbaVarTstEq 1561->1565 1562->1546 1566 206070 1564->1566 1567 26b10e 21 API calls 1565->1567 1568 26b238 __vbaVarTstEq 1565->1568 1571 26b092 __vbaVargVarMove __vbaFreeStrList 1566->1571 1572 206070 1567->1572 1569 26b464 __vbaVarTstEq 1568->1569 1570 26b269 43 API calls 1568->1570 1574 26b495 41 API calls 1569->1574 1575 26b67d __vbaVarTstEq 1569->1575 1573 206070 1570->1573 1571->1563 1576 26b1e9 __vbaVargVarMove __vbaFreeStrList 1572->1576 1577 26b3e9 __vbaVargVarMove __vbaFreeStrList 1573->1577 1578 206070 1574->1578 1579 26b6ae 47 API calls 1575->1579 1580 26b8cf __vbaVarTstEq 1575->1580 1576->1563 1577->1563 1583 26b606 __vbaVargVarMove __vbaFreeStrList 1578->1583 1584 206070 1579->1584 1581 26b900 11 API calls 1580->1581 1582 26b9cb __vbaVarTstEq 1580->1582 1585 206070 1581->1585 1582->1562 1586 26ba05 __vbaVarTstEq 1582->1586 1583->1563 1587 26b84c __vbaVargVarMove __vbaFreeStrList 1584->1587 1588 26b990 __vbaVargVarMove __vbaFreeStrList 1585->1588 1586->1562 1589 26ba34 __vbaVarTstEq 1586->1589 1587->1563 1588->1563 1589->1562 1590 26ba63 __vbaVarTstEq 1589->1590 1590->1562 1591 26ba8f __vbaVarTstEq 1590->1591 1591->1562 1592 26babb __vbaVarTstEq 1591->1592 1592->1562 1592->1563 1497 9b6ad3 GetPEB 1498 9b69eb 1497->1498 1593 9b4933 1594 9b492a 1593->1594 1597 9b6817 GetPEB 1594->1597 1480 9b28b2 1481 9b28da 1480->1481 1482 9b2db1 1481->1482 1483 9b2ebd GetPEB 1481->1483 1484 9b2943 1481->1484 1483->1484 1484->1482 1485 9b2ab3 NtCreateSection 1484->1485 1485->1482 1486 9b2aea NtMapViewOfSection 1485->1486 1486->1482 1487 9b2b12 1486->1487 1488 9b2c75 GetPEB 1487->1488 1491 9b2bb0 CreateProcessW 1487->1491 1488->1491 1490 9b2cbb NtGetContextThread 1490->1491 1492 9b2cdc NtReadVirtualMemory 1490->1492 1491->1482 1491->1490 1492->1491 1493 9b2d02 NtWriteVirtualMemory 1492->1493 1493->1491 1494 9b2d28 NtUnmapViewOfSection NtMapViewOfSection 1493->1494 1494->1491 1495 9b2d5c NtSetContextThread 1494->1495 1495->1491 1496 9b2d8d NtResumeThread 1495->1496 1496->1482 1496->1491 1598 9b6d27 GetPEB 1501 1ab7c 1502 26a120 19 API calls 1501->1502 1504 20a0e0 8 API calls 1502->1504 1505 26a242 __vbaStrMove __vbaFreeStrList 1504->1505 1506 26a281 1505->1506

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 63 9b28b2-9b28d8 64 9b28da 63->64 65 9b2922-9b2932 63->65 66 9b2958-9b2a41 call 9b2e0e * 12 64->66 67 9b28dc-9b28e8 64->67 68 9b2938 65->68 69 9b2db1-9b2db7 65->69 66->69 101 9b2a47-9b2a4a 66->101 71 9b28ea 67->71 72 9b293c-9b2943 call 9b2ebd 67->72 68->72 71->65 77 9b294a-9b294e 72->77 78 9b2945-9b2949 72->78 77->69 80 9b2954 77->80 78->77 80->66 101->69 102 9b2a50-9b2a53 101->102 102->69 103 9b2a59-9b2a5c 102->103 103->69 104 9b2a62-9b2a65 103->104 104->69 105 9b2a6b-9b2a6e 104->105 105->69 106 9b2a74-9b2a77 105->106 106->69 107 9b2a7d-9b2a80 106->107 107->69 108 9b2a86-9b2a89 107->108 108->69 109 9b2a8f-9b2a92 108->109 109->69 110 9b2a98-9b2a9a 109->110 110->69 111 9b2aa0-9b2aae 110->111 112 9b2ab3-9b2ae4 NtCreateSection 111->112 113 9b2ab0 111->113 112->69 114 9b2aea-9b2b0c NtMapViewOfSection 112->114 113->112 114->69 115 9b2b12-9b2b48 call 9b2e9e 114->115 118 9b2b4a-9b2b50 115->118 119 9b2b80-9b2baa call 9b2efb call 9b2e9e 115->119 121 9b2b55-9b2b59 118->121 130 9b2bb0-9b2c27 119->130 131 9b2c75-9b2c81 GetPEB 119->131 122 9b2b5b-9b2b6e call 9b2e9e 121->122 123 9b2b71-9b2b7e 121->123 122->123 123->119 126 9b2b52 123->126 126->121 135 9b2c29-9b2c39 130->135 132 9b2c84-9b2c8b 131->132 134 9b2c98-9b2cb5 CreateProcessW 132->134 134->69 136 9b2cbb-9b2cd6 NtGetContextThread 134->136 135->135 137 9b2c3b-9b2c3e 135->137 138 9b2d9d-9b2da0 136->138 139 9b2cdc-9b2cfc NtReadVirtualMemory 136->139 140 9b2c4c-9b2c50 137->140 142 9b2da9-9b2dac 138->142 143 9b2da2-9b2da3 138->143 139->138 141 9b2d02-9b2d26 NtWriteVirtualMemory 139->141 144 9b2c52 140->144 145 9b2c40-9b2c4b 140->145 141->138 147 9b2d28-9b2d5a NtUnmapViewOfSection NtMapViewOfSection 141->147 142->134 143->142 146 9b2c5f-9b2c64 144->146 145->140 148 9b2c66-9b2c73 146->148 149 9b2c54-9b2c5e 146->149 150 9b2d9a 147->150 151 9b2d5c-9b2d8b NtSetContextThread 147->151 148->132 149->146 150->138 151->150 152 9b2d8d-9b2d98 NtResumeThread 151->152 152->69 152->150
                                APIs
                                • NtCreateSection.NTDLL(?,000F001F,00000000,?,00000040,08000000,00000000), ref: 009B2AD8
                                • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 009B2B05
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1377833111.00000000009B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009B0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_9b0000_tb4B9ni6vl.jbxd
                                Similarity
                                • API ID: Section$CreateView
                                • String ID: D$\Microsoft.NET\Framework\$e$egas$m.ex$|'xX
                                • API String ID: 1585966358-1512431686
                                • Opcode ID: 0f230d55ef63ab1dd61552786c1438069c36ed1a152f540815d0e4e58c6b328e
                                • Instruction ID: bb94a9ce47278aeae137d8ede77db8b9ae86317b013cb701c054bf91620b52d3
                                • Opcode Fuzzy Hash: 0f230d55ef63ab1dd61552786c1438069c36ed1a152f540815d0e4e58c6b328e
                                • Instruction Fuzzy Hash: 82E16972D00259AFDF11DFA4CE85AEEBBB8FF44720F14446AE924AB241D7309A52CF50

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 153 9b28ec-9b2932 call 9b2dba call 9b2ebd 158 9b2938-9b2943 call 9b2ebd 153->158 159 9b2db1-9b2db7 153->159 163 9b294a-9b294e 158->163 164 9b2945-9b2949 158->164 163->159 165 9b2954-9b2a41 call 9b2e0e * 12 163->165 164->163 165->159 191 9b2a47-9b2a4a 165->191 191->159 192 9b2a50-9b2a53 191->192 192->159 193 9b2a59-9b2a5c 192->193 193->159 194 9b2a62-9b2a65 193->194 194->159 195 9b2a6b-9b2a6e 194->195 195->159 196 9b2a74-9b2a77 195->196 196->159 197 9b2a7d-9b2a80 196->197 197->159 198 9b2a86-9b2a89 197->198 198->159 199 9b2a8f-9b2a92 198->199 199->159 200 9b2a98-9b2a9a 199->200 200->159 201 9b2aa0-9b2aae 200->201 202 9b2ab3-9b2ae4 NtCreateSection 201->202 203 9b2ab0 201->203 202->159 204 9b2aea-9b2b0c NtMapViewOfSection 202->204 203->202 204->159 205 9b2b12-9b2b48 call 9b2e9e 204->205 208 9b2b4a-9b2b50 205->208 209 9b2b80-9b2baa call 9b2efb call 9b2e9e 205->209 211 9b2b55-9b2b59 208->211 220 9b2bb0-9b2c27 209->220 221 9b2c75-9b2c81 GetPEB 209->221 212 9b2b5b-9b2b6e call 9b2e9e 211->212 213 9b2b71-9b2b7e 211->213 212->213 213->209 216 9b2b52 213->216 216->211 225 9b2c29-9b2c39 220->225 222 9b2c84-9b2c8b 221->222 224 9b2c98-9b2cb5 CreateProcessW 222->224 224->159 226 9b2cbb-9b2cd6 NtGetContextThread 224->226 225->225 227 9b2c3b-9b2c3e 225->227 228 9b2d9d-9b2da0 226->228 229 9b2cdc-9b2cfc NtReadVirtualMemory 226->229 230 9b2c4c-9b2c50 227->230 232 9b2da9-9b2dac 228->232 233 9b2da2-9b2da3 228->233 229->228 231 9b2d02-9b2d26 NtWriteVirtualMemory 229->231 234 9b2c52 230->234 235 9b2c40-9b2c4b 230->235 231->228 237 9b2d28-9b2d5a NtUnmapViewOfSection NtMapViewOfSection 231->237 232->224 233->232 236 9b2c5f-9b2c64 234->236 235->230 238 9b2c66-9b2c73 236->238 239 9b2c54-9b2c5e 236->239 240 9b2d9a 237->240 241 9b2d5c-9b2d8b NtSetContextThread 237->241 238->222 239->236 240->228 241->240 242 9b2d8d-9b2d98 NtResumeThread 241->242 242->159 242->240
                                APIs
                                • NtCreateSection.NTDLL(?,000F001F,00000000,?,00000040,08000000,00000000), ref: 009B2AD8
                                • NtMapViewOfSection.NTDLL(?,000000FF,?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 009B2B05
                                • CreateProcessW.KERNELBASE(?,?,00000000,00000000,00000000,00000004,00000000,00000000,00000044,?), ref: 009B2CB0
                                • NtGetContextThread.NTDLL(?,?), ref: 009B2CCF
                                • NtReadVirtualMemory.NTDLL(?,?,?,000001D8,?), ref: 009B2CF5
                                • NtWriteVirtualMemory.NTDLL(?,?,?,00000004,?), ref: 009B2D1F
                                • NtUnmapViewOfSection.NTDLL(?,?), ref: 009B2D3A
                                • NtMapViewOfSection.NTDLL(?,?,?,00000000,00000000,00000000,?,00000001,00000000,00000040), ref: 009B2D53
                                • NtSetContextThread.NTDLL(?,00010003), ref: 009B2D84
                                • NtResumeThread.NTDLL(?,00000000), ref: 009B2D91
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1377833111.00000000009B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009B0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_9b0000_tb4B9ni6vl.jbxd
                                Similarity
                                • API ID: Section$ThreadView$ContextCreateMemoryVirtual$ProcessReadResumeUnmapWrite
                                • String ID: D$\Microsoft.NET\Framework\$e$egas$m.ex
                                • API String ID: 1951729442-1087957892
                                • Opcode ID: bdfd8c2c08da80d8aef1ac999a3557cfaab083761e6134d184dbc6d082490619
                                • Instruction ID: 03b78511efc4df4ec92e4266d0f3843172f08bb2c36fca3251eafd33b947e3c8
                                • Opcode Fuzzy Hash: bdfd8c2c08da80d8aef1ac999a3557cfaab083761e6134d184dbc6d082490619
                                • Instruction Fuzzy Hash: 1EE136B2D00259AFDF10DFA5CE85AEEBBB8FF44710F14446AE914AB241D7349A41CF94

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 243 2058fb-20597a call 205bee call 205eb1 call 205c10 call 205e52 call 205c10 call 205e52 call 205c10 call 205e52 260 20597c-205998 NtAllocateVirtualMemory 243->260 261 20599f-2059c3 NtProtectVirtualMemory 243->261 260->261 262 20599a 260->262 263 2059c5 261->263 264 2059ca-2059cf 261->264 265 205ac2-205ac7 262->265 263->265 266 2059d2-2059d5 264->266 267 205a63-205abc NtProtectVirtualMemory 266->267 268 2059db-2059f4 call 2044f6 266->268 267->265 271 2059f6-2059f9 268->271 272 2059fb-205a06 268->272 271->272 273 205a08-205a0b 271->273 274 205a5e 272->274 275 205a23-205a26 273->275 276 205a0d-205a21 273->276 274->266 277 205a44-205a47 275->277 278 205a28-205a2b 275->278 276->274 277->274 280 205a49-205a4c 277->280 278->277 279 205a2d-205a42 278->279 279->274 280->274 281 205a4e-205a51 280->281 281->274 282 205a53-205a5b 281->282 282->274
                                APIs
                                • NtAllocateVirtualMemory.NTDLL(000000FF,00000100,00000000,00000100,00003000,00000040,?,NtQueryInformationProcess,0020465F,?,NtQueryInformationProcess,00204679,?,NtQueryInformationProcess,00204648,NtQueryInformationProcess), ref: 00205992
                                • NtProtectVirtualMemory.NTDLL(000000FF,?,00000005,00000040,00000000,?,NtQueryInformationProcess,0020465F,?,NtQueryInformationProcess,00204679,?,NtQueryInformationProcess,00204648,NtQueryInformationProcess,002046EA), ref: 002059BD
                                • NtProtectVirtualMemory.NTDLL(000000FF,?,00000005,00000000,00000000,?,NtQueryInformationProcess,0020465F,?,NtQueryInformationProcess,00204679,?,NtQueryInformationProcess,00204648,NtQueryInformationProcess,002046EA), ref: 00205AB9
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1375656335.0000000000130000.00000020.00000001.01000000.00000003.sdmp, Offset: 00010000, based on PE: true
                                • Associated: 00000000.00000002.1375436874.0000000000010000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1375462713.0000000000011000.00000020.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1375530743.000000000001E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1375656335.000000000001F000.00000020.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1376345270.000000000026E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1376345270.0000000000272000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1376574614.0000000000273000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000_tb4B9ni6vl.jbxd
                                Similarity
                                • API ID: MemoryVirtual$Protect$Allocate
                                • String ID: NtQueryInformationProcess
                                • API String ID: 955180148-2781105232
                                • Opcode ID: 3115b2ad904579c2bbfeae84a3b2adedb6d27203cc52787e22d5cd13e10c7f28
                                • Instruction ID: 4c5b3417e9a63610fbd1e7b051f74e56d315712f6ed0e73b519e46051aef16bf
                                • Opcode Fuzzy Hash: 3115b2ad904579c2bbfeae84a3b2adedb6d27203cc52787e22d5cd13e10c7f28
                                • Instruction Fuzzy Hash: 5C51D67592071A9FDF00DFA8CC85BAFBBB9FB85320F148305E110A61D2E3B156648F61

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 292 26c1f0-26c24d call 1e544 NtSetInformationProcess
                                APIs
                                • NtSetInformationProcess.NTDLL ref: 0026C236
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1375656335.0000000000130000.00000020.00000001.01000000.00000003.sdmp, Offset: 00010000, based on PE: true
                                • Associated: 00000000.00000002.1375436874.0000000000010000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1375462713.0000000000011000.00000020.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1375530743.000000000001E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1375656335.000000000001F000.00000020.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1376345270.000000000026E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1376345270.0000000000272000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1376574614.0000000000273000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000_tb4B9ni6vl.jbxd
                                Similarity
                                • API ID: InformationProcess
                                • String ID: 0
                                • API String ID: 1801817001-4108050209
                                • Opcode ID: 4bfa53723ae4ba89d26cef7e1459302cc1de43613a8231c2dff16ebd31f6c04d
                                • Instruction ID: 8b84978950f63152012624381f8e06e1c5dca26392cace12ab4e1150ed4fe616
                                • Opcode Fuzzy Hash: 4bfa53723ae4ba89d26cef7e1459302cc1de43613a8231c2dff16ebd31f6c04d
                                • Instruction Fuzzy Hash: 3EE065B0940244BBD710EFD8CD06BDDBABCE708B14F604244FB00665C1D3B8194487A1

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 0 2062f0-206679 __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove #644 GetModuleHandleW __vbaFreeStrList call 20a0e0 __vbaStrMove __vbaStrToAnsi GetProcAddress __vbaFreeStrList __vbaStrCat __vbaStrMove __vbaStrCat call 20a0e0 __vbaStrMove #644 GetModuleHandleW __vbaFreeStrList __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrCat __vbaStrMove __vbaStrToAnsi GetProcAddress __vbaFreeStrList __vbaRedim __vbaNew __vbaObjSet __vbaCastObj __vbaObjSet __vbaObjSetAddref __vbaFreeObjList __vbaObjSetAddref #644 __vbaFreeObj #644 call 205fae call 205fbd 10 20667f-206682 0->10 11 206684-2066e3 __vbaAryLock #644 __vbaAryUnlock call 205fae 10->11 12 2066e5-206869 __vbaObjSetAddref #644 __vbaFreeObj #644 call 205fcb __vbaAryLock #644 __vbaAryUnlock #644 call 205fae __vbaRedim #644 call 205fae #644 call 205fae __vbaAryLock __vbaStrCat __vbaStrMove __vbaI4Str VirtualProtect 10->12 11->10 23 206882-2068c5 __vbaAryUnlock __vbaFreeStr #644 call 205fae call 205fbd 12->23 24 20686b-20687c __vbaHresultCheckObj 12->24 29 2068cb-2068cd 23->29 24->23 30 206926-206a2d #644 call 205fae #644 call 205fae #644 call 205fae #644 call 205fae #644 call 205fae VirtualProtect 29->30 31 2068cf-206924 __vbaAryLock #644 __vbaAryUnlock call 205fae 29->31 44 206a46-206a58 call 205fbd 30->44 45 206a2f-206a40 __vbaHresultCheckObj 30->45 31->29 48 206a5e-206a60 44->48 45->44 49 206a62-206ab1 __vbaAryLock #644 __vbaAryUnlock call 205fae 48->49 50 206ab3-206b8b #644 call 205fae #644 call 205fae #644 call 205fae call 206db0 __vbaAryDestruct 48->50 49->48
                                APIs
                                • __vbaStrCat.MSVBVM60(0001DDF8,0001DDF0,?,6D6260EF), ref: 0020637F
                                • __vbaStrMove.MSVBVM60(?,6D6260EF), ref: 0020638C
                                • __vbaStrCat.MSVBVM60(bvm,00000000,?,6D6260EF), ref: 00206394
                                • __vbaStrMove.MSVBVM60(?,6D6260EF), ref: 0020639B
                                • __vbaStrCat.MSVBVM60(0001DE10,00000000,?,6D6260EF), ref: 002063A3
                                • __vbaStrMove.MSVBVM60(?,6D6260EF), ref: 002063AA
                                • #644.MSVBVM60(00000000,?,6D6260EF), ref: 002063AD
                                • GetModuleHandleW.KERNEL32(00000000,?,6D6260EF), ref: 002063B4
                                • __vbaFreeStrList.MSVBVM60(00000003,?,?,?,?,6D6260EF), ref: 002063CD
                                  • Part of subcall function 0020A0E0: __vbaVarDup.MSVBVM60(6D53D8B1,6D52A323), ref: 0020A123
                                  • Part of subcall function 0020A0E0: #653.MSVBVM60(?,?), ref: 0020A131
                                  • Part of subcall function 0020A0E0: __vbaI4Var.MSVBVM60(?), ref: 0020A13B
                                  • Part of subcall function 0020A0E0: __vbaFreeVar.MSVBVM60 ref: 0020A154
                                  • Part of subcall function 0020A0E0: #632.MSVBVM60(?,?,?,?), ref: 0020A190
                                  • Part of subcall function 0020A0E0: __vbaVarCat.MSVBVM60(?,?,00000008), ref: 0020A1A2
                                  • Part of subcall function 0020A0E0: __vbaStrVarMove.MSVBVM60(00000000), ref: 0020A1A9
                                  • Part of subcall function 0020A0E0: __vbaStrMove.MSVBVM60 ref: 0020A1B4
                                  • Part of subcall function 0020A0E0: __vbaFreeVarList.MSVBVM60(00000003,00000002,?,?), ref: 0020A1C4
                                  • Part of subcall function 0020A0E0: __vbaFreeVar.MSVBVM60(0020A209), ref: 0020A202
                                • __vbaStrMove.MSVBVM60(?,6D6260EF), ref: 002063FA
                                • __vbaStrToAnsi.MSVBVM60(?,00000000,?,6D6260EF), ref: 00206401
                                • GetProcAddress.KERNEL32(00000000,00000000), ref: 0020640F
                                • __vbaFreeStrList.MSVBVM60(00000002,?,?,?,6D6260EF), ref: 00206424
                                • __vbaStrCat.MSVBVM60(0001DE6C,0001DE60), ref: 00206437
                                • __vbaStrMove.MSVBVM60 ref: 0020643E
                                • __vbaStrCat.MSVBVM60(0001DE80,00000000), ref: 00206446
                                • __vbaStrMove.MSVBVM60 ref: 00206473
                                • #644.MSVBVM60(00000000), ref: 00206476
                                • GetModuleHandleW.KERNEL32(00000000), ref: 0020647D
                                • __vbaFreeStrList.MSVBVM60(00000002,?,?), ref: 00206492
                                • __vbaFreeVar.MSVBVM60 ref: 0020649E
                                • __vbaStrCat.MSVBVM60(0001DCCC,0001DE98), ref: 002064AE
                                • __vbaStrMove.MSVBVM60 ref: 002064B5
                                • __vbaStrCat.MSVBVM60(0001DCD4,00000000), ref: 002064BD
                                • __vbaStrMove.MSVBVM60 ref: 002064C4
                                • __vbaStrCat.MSVBVM60(0001DEA0,00000000), ref: 002064CC
                                • __vbaStrMove.MSVBVM60 ref: 002064D3
                                • __vbaStrCat.MSVBVM60(0001DEA8,00000000), ref: 002064DB
                                • __vbaStrMove.MSVBVM60 ref: 002064E2
                                • __vbaStrCat.MSVBVM60(0001DEB0,00000000), ref: 002064EA
                                • __vbaStrMove.MSVBVM60 ref: 002064F1
                                • __vbaStrCat.MSVBVM60(0001DEB8,00000000), ref: 002064F9
                                • __vbaStrMove.MSVBVM60 ref: 00206500
                                • __vbaStrCat.MSVBVM60(0001DEC0,00000000), ref: 00206508
                                • __vbaStrMove.MSVBVM60 ref: 0020650F
                                • __vbaStrCat.MSVBVM60(0001DCD4,00000000), ref: 00206517
                                • __vbaStrMove.MSVBVM60 ref: 0020651E
                                • __vbaStrCat.MSVBVM60(0001DEC8,00000000), ref: 00206526
                                • __vbaStrMove.MSVBVM60 ref: 0020652D
                                • __vbaStrCat.MSVBVM60(0001DEA0,00000000), ref: 00206535
                                • __vbaStrMove.MSVBVM60 ref: 0020653C
                                • __vbaStrCat.MSVBVM60(0001DED0,00000000), ref: 00206544
                                • __vbaStrMove.MSVBVM60 ref: 0020654B
                                • __vbaStrCat.MSVBVM60(0001DED8,00000000), ref: 00206553
                                • __vbaStrMove.MSVBVM60 ref: 0020655A
                                • __vbaStrCat.MSVBVM60(0001DEA0,00000000), ref: 00206562
                                • __vbaStrMove.MSVBVM60 ref: 00206569
                                • __vbaStrToAnsi.MSVBVM60(?,00000000), ref: 00206570
                                • GetProcAddress.KERNEL32(00000000,00000000), ref: 0020657E
                                • __vbaFreeStrList.MSVBVM60(0000000E,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 002065C3
                                • __vbaRedim.MSVBVM60(00000080,00000004,?,00000003,00000001,0000000F,00000000), ref: 002065DB
                                • __vbaNew.MSVBVM60(0001DEFC,0001DF0C), ref: 002065EE
                                • __vbaObjSet.MSVBVM60(?,00000000), ref: 002065F9
                                • __vbaCastObj.MSVBVM60(00000000), ref: 00206600
                                • __vbaObjSet.MSVBVM60(?,00000000), ref: 0020660B
                                • __vbaObjSetAddref.MSVBVM60(0026E2D0,00000000), ref: 00206619
                                • __vbaFreeObjList.MSVBVM60(00000002,?,?), ref: 00206629
                                • __vbaObjSetAddref.MSVBVM60(?), ref: 0020663F
                                • #644.MSVBVM60(00000000), ref: 00206646
                                • __vbaFreeObj.MSVBVM60 ref: 00206652
                                • #644.MSVBVM60(?), ref: 0020665C
                                • __vbaAryLock.MSVBVM60(?,?,?,?,00000000), ref: 0020668C
                                • #644.MSVBVM60(?), ref: 002066A4
                                • __vbaAryUnlock.MSVBVM60(?), ref: 002066B4
                                • __vbaObjSetAddref.MSVBVM60(?,?,?,?,00000000), ref: 002066F1
                                • #644.MSVBVM60(00000000,?,?,?,00000000), ref: 002066F8
                                • __vbaFreeObj.MSVBVM60(?,?,?,00000000), ref: 00206704
                                • #644.MSVBVM60(0026E2CC,?,?,?,00000000), ref: 00206713
                                • __vbaAryLock.MSVBVM60(?,?,00000000,?,00000004,?,?,?,00000000), ref: 00206733
                                • #644.MSVBVM60(00011406,?,?,?,00000000), ref: 00206748
                                • __vbaAryUnlock.MSVBVM60(?,?,?,?,00000000), ref: 00206758
                                • #644.MSVBVM60(?,?,?,?,00000000), ref: 00206771
                                • __vbaRedim.MSVBVM60(00000080,00000004,0026E214,00000003,00000001,00000010,00000000,00000000,?,?,?,?,00000000), ref: 002067AD
                                • #644.MSVBVM60(?), ref: 002067BA
                                • #644.MSVBVM60(?,-0000000C,00000000), ref: 002067E0
                                • __vbaAryLock.MSVBVM60(?,00000000,00000000,-0000000C), ref: 0020680C
                                • __vbaStrCat.MSVBVM60(0001DF34,0001DF2C,00011406,00000040), ref: 00206842
                                • __vbaStrMove.MSVBVM60 ref: 00206849
                                • __vbaI4Str.MSVBVM60(00000000), ref: 0020684C
                                • VirtualProtect.KERNELBASE(?,00000000), ref: 00206862
                                • __vbaHresultCheckObj.MSVBVM60(00000000,?,0001DF0C,0000002C,?,00000000), ref: 0020687C
                                • __vbaAryUnlock.MSVBVM60(?,?,00000000), ref: 00206886
                                • __vbaFreeStr.MSVBVM60(?,00000000), ref: 0020688F
                                • #644.MSVBVM60(?,?,00000000), ref: 0020689F
                                • __vbaAryLock.MSVBVM60(?,00000000,00000000,00000000,-0000000C,?,00000000), ref: 002068DA
                                • #644.MSVBVM60(?,?,00000000), ref: 002068F1
                                • __vbaAryUnlock.MSVBVM60(?,?,00000000), ref: 002068FD
                                • #644.MSVBVM60(00000040,00000000,00000000,-0000000C,?,00000000), ref: 00206937
                                • #644.MSVBVM60(0424448B,00000000,?,?,00000000), ref: 0020695D
                                • #644.MSVBVM60(408B008B,00000000,?,?,00000000), ref: 00206983
                                • #644.MSVBVM60(20C4832C,00000000,?,?,00000000), ref: 002069A9
                                • #644.MSVBVM60(E02474FF,00000000,?,?,00000000), ref: 002069CF
                                • VirtualProtect.KERNELBASE(00011406,00000000,00000000,00000000,00000000,00000000,00000000,00000000,00000008,00000040,?,00000000,?,?,00000000), ref: 00206A26
                                • __vbaHresultCheckObj.MSVBVM60(00000000,?,0001DF0C,00000020,?,00000000), ref: 00206A40
                                • __vbaAryLock.MSVBVM60(?,00000000,00000000,?,00000000), ref: 00206A6C
                                • #644.MSVBVM60(?,?,00000000), ref: 00206A83
                                • __vbaAryUnlock.MSVBVM60(?,?,00000000), ref: 00206A8F
                                • #644.MSVBVM60(0026E2CC,00000000,?,00000000), ref: 00206ABC
                                • #644.MSVBVM60(00000000,00000000,?,?,00000000), ref: 00206AD5
                                • #644.MSVBVM60(-00000004,00000000,00000000,?,00000000), ref: 00206AED
                                • __vbaFreeVar.MSVBVM60(?,-00000004,00000000,?,00000000), ref: 00206B0B
                                • __vbaAryDestruct.MSVBVM60(00000000,?,00206B8C,?,00000000), ref: 00206B85
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1375656335.0000000000130000.00000020.00000001.01000000.00000003.sdmp, Offset: 00010000, based on PE: true
                                • Associated: 00000000.00000002.1375436874.0000000000010000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1375462713.0000000000011000.00000020.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1375530743.000000000001E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1375656335.000000000001F000.00000020.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1376345270.000000000026E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1376345270.0000000000272000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1376574614.0000000000273000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000_tb4B9ni6vl.jbxd
                                Similarity
                                • API ID: __vba$#644Move$Free$List$LockUnlock$Addref$AddressAnsiCheckHandleHresultModuleProcProtectRedimVirtual$#632#653CastDestruct
                                • String ID: @$DqlqlqFquqnqcqtqiqoqnqCqaqlqlq$bvm$`bm
                                • API String ID: 3776562771-2549648649
                                • Opcode ID: 7a9e4d65bfdd92c7488f8ccb75d4b4a92b9ff054ea4b26e007523afb9f89e578
                                • Instruction ID: ae19caf2b68bc1002114b2ef37aa5acfeaae8ccff0c77916ce1949befd43f84d
                                • Opcode Fuzzy Hash: 7a9e4d65bfdd92c7488f8ccb75d4b4a92b9ff054ea4b26e007523afb9f89e578
                                • Instruction Fuzzy Hash: D6423BB5D10219AFDB14DFA4DC89EEEBBB9FF48300F00C15AE605A7251DAB4A945CF60

                                Control-flow Graph

                                APIs
                                • __vbaFreeVar.MSVBVM60(?), ref: 0026BCE2
                                  • Part of subcall function 002062F0: __vbaStrCat.MSVBVM60(0001DDF8,0001DDF0,?,6D6260EF), ref: 0020637F
                                  • Part of subcall function 002062F0: __vbaStrMove.MSVBVM60(?,6D6260EF), ref: 0020638C
                                  • Part of subcall function 002062F0: __vbaStrCat.MSVBVM60(bvm,00000000,?,6D6260EF), ref: 00206394
                                  • Part of subcall function 002062F0: __vbaStrMove.MSVBVM60(?,6D6260EF), ref: 0020639B
                                  • Part of subcall function 002062F0: __vbaStrCat.MSVBVM60(0001DE10,00000000,?,6D6260EF), ref: 002063A3
                                  • Part of subcall function 002062F0: __vbaStrMove.MSVBVM60(?,6D6260EF), ref: 002063AA
                                  • Part of subcall function 002062F0: #644.MSVBVM60(00000000,?,6D6260EF), ref: 002063AD
                                  • Part of subcall function 002062F0: GetModuleHandleW.KERNEL32(00000000,?,6D6260EF), ref: 002063B4
                                  • Part of subcall function 002062F0: __vbaFreeStrList.MSVBVM60(00000003,?,?,?,?,6D6260EF), ref: 002063CD
                                  • Part of subcall function 002062F0: __vbaStrMove.MSVBVM60(?,6D6260EF), ref: 002063FA
                                  • Part of subcall function 002062F0: __vbaStrToAnsi.MSVBVM60(?,00000000,?,6D6260EF), ref: 00206401
                                  • Part of subcall function 002062F0: GetProcAddress.KERNEL32(00000000,00000000), ref: 0020640F
                                  • Part of subcall function 002062F0: __vbaFreeStrList.MSVBVM60(00000002,?,?,?,6D6260EF), ref: 00206424
                                  • Part of subcall function 0026C1F0: NtSetInformationProcess.NTDLL ref: 0026C236
                                • __vbaFreeVar.MSVBVM60(00000000), ref: 0026BCF5
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1375462713.0000000000011000.00000020.00000001.01000000.00000003.sdmp, Offset: 00010000, based on PE: true
                                • Associated: 00000000.00000002.1375436874.0000000000010000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1375530743.000000000001E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1375656335.000000000001F000.00000020.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1375656335.0000000000130000.00000020.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1376345270.000000000026E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1376345270.0000000000272000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1376574614.0000000000273000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000_tb4B9ni6vl.jbxd
                                Similarity
                                • API ID: __vba$FreeMove$List$#644AddressAnsiHandleInformationModuleProcProcess
                                • String ID: `bm
                                • API String ID: 20434910-121691798
                                • Opcode ID: c5f9aff612a662e1821663de9e104f57aa4a1cf06ec6fb6643546cd41318827b
                                • Instruction ID: e925c35102c71a51e76ce796693e1fa3fd52d61ae7bf32bd76a99c555d38f0d5
                                • Opcode Fuzzy Hash: c5f9aff612a662e1821663de9e104f57aa4a1cf06ec6fb6643546cd41318827b
                                • Instruction Fuzzy Hash: BCF06D70820258AACB15EB54CD05BEEBBB8BF09B00F500069E50173141D7B865948AA1
                                Memory Dump Source
                                • Source File: 00000000.00000002.1375656335.0000000000130000.00000020.00000001.01000000.00000003.sdmp, Offset: 00010000, based on PE: true
                                • Associated: 00000000.00000002.1375436874.0000000000010000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1375462713.0000000000011000.00000020.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1375530743.000000000001E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1375656335.000000000001F000.00000020.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1376345270.000000000026E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1376345270.0000000000272000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1376574614.0000000000273000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000_tb4B9ni6vl.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: ef41f23567e4e7422021a95af9bb6b13c8200b2295415d293bf1cf4d9d63b1a6
                                • Instruction ID: 84955960c7ad70a15c3235a4cdb2f8e3f7f75d2ecf7da0db890f14322f765e33
                                • Opcode Fuzzy Hash: ef41f23567e4e7422021a95af9bb6b13c8200b2295415d293bf1cf4d9d63b1a6
                                • Instruction Fuzzy Hash: 6A01D132630B278BCB20AF04C0449A7B7AAFB31760F950422E44447ED6E375EEA0CF11
                                Memory Dump Source
                                • Source File: 00000000.00000002.1377833111.00000000009B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009B0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_9b0000_tb4B9ni6vl.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 0b399b04e11d1ff954b26d47aa0a54e719ae22316263aa56bc50ae1b8ddb9bc6
                                • Instruction ID: 7e48da9f3224b8b550dcfa322cb9e4b46dc7ff869dd6703bf69743b530d5797f
                                • Opcode Fuzzy Hash: 0b399b04e11d1ff954b26d47aa0a54e719ae22316263aa56bc50ae1b8ddb9bc6
                                • Instruction Fuzzy Hash: D0F06D32210564DBC760EB5ACA409AAB3FCEB94770B254815E4499BA01D330FC4097A0
                                Memory Dump Source
                                • Source File: 00000000.00000002.1377833111.00000000009B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009B0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_9b0000_tb4B9ni6vl.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: a1a6dcdea3342a7a72876fe8a7b1589bfbaed65d9ce639e43120d4104721110e
                                • Instruction ID: 1ba02e7bde4193175a08c10590e63ddfb95ee7b79b621faa8083a029fae7805f
                                • Opcode Fuzzy Hash: a1a6dcdea3342a7a72876fe8a7b1589bfbaed65d9ce639e43120d4104721110e
                                • Instruction Fuzzy Hash: 86C04034159441CBC359DB95C155BE07331F7C0718F34456CF0071F54247AB6907D740
                                Memory Dump Source
                                • Source File: 00000000.00000002.1377833111.00000000009B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009B0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_9b0000_tb4B9ni6vl.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 8539da049063bef8adf3d94d59f1889e654f143c59e68d50339725345bc4b5e2
                                • Instruction ID: 91b114992dc0d88bc04664ba73b3b4691168c6be18669c64ee1c0e0eae6ea44a
                                • Opcode Fuzzy Hash: 8539da049063bef8adf3d94d59f1889e654f143c59e68d50339725345bc4b5e2
                                • Instruction Fuzzy Hash: D2B09234125440CFC2818A0AC250A903374FB00720F214891E4024BA51C23CF900DA00
                                Memory Dump Source
                                • Source File: 00000000.00000002.1377833111.00000000009B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009B0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_9b0000_tb4B9ni6vl.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 372415e9e8cffc2d3689bc32529b5c7e17dadaa47c7c50a124329dcd1fc7c9f1
                                • Instruction ID: b8388c6edc1952ace1886a8539f001e3d0be70d6261eb16f087367c3fafd50ed
                                • Opcode Fuzzy Hash: 372415e9e8cffc2d3689bc32529b5c7e17dadaa47c7c50a124329dcd1fc7c9f1
                                • Instruction Fuzzy Hash: 87B00135266980CFC296CB0AC294F5073B8FB04A41F4614F4E4058BA62C338AA00CA00
                                Memory Dump Source
                                • Source File: 00000000.00000002.1377833111.00000000009B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009B0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_9b0000_tb4B9ni6vl.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: b94a04b6e078c85674e19733439a7be174f4f8d4728e55fdea551be3ae466bff
                                • Instruction ID: ecefd92c7d1271b5953bc55f4c8d25ddccc960576a82d0cade32e7f73a10a9c6
                                • Opcode Fuzzy Hash: b94a04b6e078c85674e19733439a7be174f4f8d4728e55fdea551be3ae466bff
                                • Instruction Fuzzy Hash: 7FB00135266981CFD296CB4AC594F5077B8FB04A41F4614F1E4058BA62C338A900CA10
                                Memory Dump Source
                                • Source File: 00000000.00000002.1377833111.00000000009B0000.00000040.00001000.00020000.00000000.sdmp, Offset: 009B0000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_9b0000_tb4B9ni6vl.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: e8cf9f99ad5648ab98f4869b4ab0ce955a8baaa77e670ecf4975d02acf0258fb
                                • Instruction ID: caba6d26315296d23548974c7e7dec74316f6a19b57831a262f6e9655b8a9e6d
                                • Opcode Fuzzy Hash: e8cf9f99ad5648ab98f4869b4ab0ce955a8baaa77e670ecf4975d02acf0258fb
                                • Instruction Fuzzy Hash: 97B00175266A80CFC296CB0AC294F5173B8FB04A41F4618F0E4059BAA2C378AD00CA00

                                Control-flow Graph

                                APIs
                                • __vbaStrCat.MSVBVM60(@o@s@o@f,M@i@c@r), ref: 0026A18D
                                • __vbaStrMove.MSVBVM60 ref: 0026A19A
                                • __vbaStrCat.MSVBVM60(@t@ @E@n@h@a@n,00000000), ref: 0026A1A2
                                • __vbaStrMove.MSVBVM60 ref: 0026A1A9
                                • __vbaStrCat.MSVBVM60(@c@e@d@ @R@S@,00000000), ref: 0026A1B1
                                • __vbaStrMove.MSVBVM60 ref: 0026A1B8
                                • __vbaStrCat.MSVBVM60(A@ @a@n,00000000), ref: 0026A1C0
                                • __vbaStrMove.MSVBVM60 ref: 0026A1C7
                                • __vbaStrCat.MSVBVM60(@d@ @A@E@S@ ,00000000), ref: 0026A1CF
                                • __vbaStrMove.MSVBVM60 ref: 0026A1D6
                                • __vbaStrCat.MSVBVM60(@C@r@y@,00000000), ref: 0026A1DE
                                • __vbaStrMove.MSVBVM60 ref: 0026A1E5
                                • __vbaStrCat.MSVBVM60(p@t@o@g@r@a@,00000000), ref: 0026A1ED
                                • __vbaStrMove.MSVBVM60 ref: 0026A1F4
                                • __vbaStrCat.MSVBVM60(p@h@i@c@ @P@r,00000000), ref: 0026A1FC
                                • __vbaStrMove.MSVBVM60 ref: 0026A203
                                • __vbaStrCat.MSVBVM60(@o@v@i@d,00000000), ref: 0026A20B
                                • __vbaStrMove.MSVBVM60 ref: 0026A212
                                • __vbaStrCat.MSVBVM60(@e@r@,00000000), ref: 0026A21A
                                  • Part of subcall function 0020A0E0: __vbaVarDup.MSVBVM60(6D53D8B1,6D52A323), ref: 0020A123
                                  • Part of subcall function 0020A0E0: #653.MSVBVM60(?,?), ref: 0020A131
                                  • Part of subcall function 0020A0E0: __vbaI4Var.MSVBVM60(?), ref: 0020A13B
                                  • Part of subcall function 0020A0E0: __vbaFreeVar.MSVBVM60 ref: 0020A154
                                  • Part of subcall function 0020A0E0: #632.MSVBVM60(?,?,?,?), ref: 0020A190
                                  • Part of subcall function 0020A0E0: __vbaVarCat.MSVBVM60(?,?,00000008), ref: 0020A1A2
                                  • Part of subcall function 0020A0E0: __vbaStrVarMove.MSVBVM60(00000000), ref: 0020A1A9
                                  • Part of subcall function 0020A0E0: __vbaStrMove.MSVBVM60 ref: 0020A1B4
                                  • Part of subcall function 0020A0E0: __vbaFreeVarList.MSVBVM60(00000003,00000002,?,?), ref: 0020A1C4
                                  • Part of subcall function 0020A0E0: __vbaFreeVar.MSVBVM60(0020A209), ref: 0020A202
                                • __vbaStrMove.MSVBVM60 ref: 0026A247
                                • __vbaFreeStrList.MSVBVM60(00000009,?,?,?,?,?,?,?,?,?), ref: 0026A26F
                                • __vbaFreeVar.MSVBVM60 ref: 0026A27B
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1375462713.0000000000011000.00000020.00000001.01000000.00000003.sdmp, Offset: 00010000, based on PE: true
                                • Associated: 00000000.00000002.1375436874.0000000000010000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1375530743.000000000001E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1375656335.000000000001F000.00000020.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1375656335.0000000000130000.00000020.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1376345270.000000000026E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1376345270.0000000000272000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1376574614.0000000000273000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000_tb4B9ni6vl.jbxd
                                Similarity
                                • API ID: __vba$Move$Free$List$#632#653
                                • String ID: @C@r@y@$@c@e@d@ @R@S@$@d@ @A@E@S@ $@e@r@$@o@s@o@f$@o@v@i@d$@t@ @E@n@h@a@n$A@ @a@n$M@i@c@r$p@h@i@c@ @P@r$p@t@o@g@r@a@$`bm
                                • API String ID: 193477259-691305777
                                • Opcode ID: f786c52a1339f58cdd21da43902cb27a19ec31006359a1ea0e469d71ee8cfdfb
                                • Instruction ID: 07b93dfa31a2ff5a4d6414a2696d75562bb5d81752ef7f359bc2c0aca4f87109
                                • Opcode Fuzzy Hash: f786c52a1339f58cdd21da43902cb27a19ec31006359a1ea0e469d71ee8cfdfb
                                • Instruction Fuzzy Hash: 0641CCB1D10258ABDB05EFA9DC45DEEBBB9EF88700F10811BF502A7290DAB45945CFA1
                                APIs
                                • __vbaStrCat.MSVBVM60(0001EB98,0001ED60), ref: 0026A36D
                                • __vbaStrMove.MSVBVM60 ref: 0026A37A
                                • __vbaStrCat.MSVBVM60(0001EA08,00000000), ref: 0026A382
                                • __vbaStrMove.MSVBVM60 ref: 0026A389
                                • __vbaStrCat.MSVBVM60(0001E928,00000000), ref: 0026A391
                                • __vbaStrMove.MSVBVM60 ref: 0026A398
                                • __vbaStrCat.MSVBVM60(0001EB08,00000000), ref: 0026A3A0
                                • __vbaStrMove.MSVBVM60 ref: 0026A3A7
                                • __vbaStrCat.MSVBVM60(0001EF0C,00000000), ref: 0026A3AF
                                • __vbaStrMove.MSVBVM60 ref: 0026A3B6
                                • __vbaStrCat.MSVBVM60(0001EF38,00000000), ref: 0026A3BE
                                • __vbaStrMove.MSVBVM60 ref: 0026A3C5
                                • __vbaStrCat.MSVBVM60(0001EF54,00000000), ref: 0026A3CD
                                • __vbaStrMove.MSVBVM60 ref: 0026A3D4
                                • __vbaStrCat.MSVBVM60(0001EF80,00000000), ref: 0026A3DC
                                • __vbaStrMove.MSVBVM60 ref: 0026A3E3
                                • __vbaStrCat.MSVBVM60(0001EFA4,00000000), ref: 0026A3EB
                                • __vbaStrMove.MSVBVM60 ref: 0026A3F2
                                • __vbaStrCat.MSVBVM60(0001EFBC,00000000), ref: 0026A3FA
                                  • Part of subcall function 0020A0E0: __vbaVarDup.MSVBVM60(6D53D8B1,6D52A323), ref: 0020A123
                                  • Part of subcall function 0020A0E0: #653.MSVBVM60(?,?), ref: 0020A131
                                  • Part of subcall function 0020A0E0: __vbaI4Var.MSVBVM60(?), ref: 0020A13B
                                  • Part of subcall function 0020A0E0: __vbaFreeVar.MSVBVM60 ref: 0020A154
                                  • Part of subcall function 0020A0E0: #632.MSVBVM60(?,?,?,?), ref: 0020A190
                                  • Part of subcall function 0020A0E0: __vbaVarCat.MSVBVM60(?,?,00000008), ref: 0020A1A2
                                  • Part of subcall function 0020A0E0: __vbaStrVarMove.MSVBVM60(00000000), ref: 0020A1A9
                                  • Part of subcall function 0020A0E0: __vbaStrMove.MSVBVM60 ref: 0020A1B4
                                  • Part of subcall function 0020A0E0: __vbaFreeVarList.MSVBVM60(00000003,00000002,?,?), ref: 0020A1C4
                                  • Part of subcall function 0020A0E0: __vbaFreeVar.MSVBVM60(0020A209), ref: 0020A202
                                • __vbaStrMove.MSVBVM60 ref: 0026A427
                                • __vbaFreeStrList.MSVBVM60(00000009,?,?,?,?,?,?,?,?,?), ref: 0026A44F
                                • __vbaFreeVar.MSVBVM60 ref: 0026A45B
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1375462713.0000000000011000.00000020.00000001.01000000.00000003.sdmp, Offset: 00010000, based on PE: true
                                • Associated: 00000000.00000002.1375436874.0000000000010000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1375530743.000000000001E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1375656335.000000000001F000.00000020.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1375656335.0000000000130000.00000020.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1376345270.000000000026E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1376345270.0000000000272000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1376574614.0000000000273000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000_tb4B9ni6vl.jbxd
                                Similarity
                                • API ID: __vba$Move$Free$List$#632#653
                                • String ID: `bm
                                • API String ID: 193477259-121691798
                                • Opcode ID: 51408199163d271c01831ae2f675d8e370d5bf7c60ca3d02734a7cdcba120f5b
                                • Instruction ID: 028db7edefae56df10169fe0903c10b3e845c3bde4d0f46cfbffc34e09037422
                                • Opcode Fuzzy Hash: 51408199163d271c01831ae2f675d8e370d5bf7c60ca3d02734a7cdcba120f5b
                                • Instruction Fuzzy Hash: CA41DEB1D10258ABDB15EFA9DC45DEEBBB9EF88700F10811BF502A7240DAB45945CFA1
                                APIs
                                • __vbaVarDup.MSVBVM60(6D53D8B1,6D52A323), ref: 0020A123
                                • #653.MSVBVM60(?,?), ref: 0020A131
                                • __vbaI4Var.MSVBVM60(?), ref: 0020A13B
                                • __vbaFreeVar.MSVBVM60 ref: 0020A154
                                • #632.MSVBVM60(?,?,?,?), ref: 0020A190
                                • __vbaVarCat.MSVBVM60(?,?,00000008), ref: 0020A1A2
                                • __vbaStrVarMove.MSVBVM60(00000000), ref: 0020A1A9
                                • __vbaStrMove.MSVBVM60 ref: 0020A1B4
                                • __vbaFreeVarList.MSVBVM60(00000003,00000002,?,?), ref: 0020A1C4
                                • __vbaFreeVar.MSVBVM60(0020A209), ref: 0020A202
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.1375656335.0000000000130000.00000020.00000001.01000000.00000003.sdmp, Offset: 00010000, based on PE: true
                                • Associated: 00000000.00000002.1375436874.0000000000010000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1375462713.0000000000011000.00000020.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1375530743.000000000001E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1375656335.000000000001F000.00000020.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1376345270.000000000026E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1376345270.0000000000272000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1376574614.0000000000273000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000_tb4B9ni6vl.jbxd
                                Similarity
                                • API ID: __vba$Free$Move$#632#653List
                                • String ID: `bm
                                • API String ID: 1043057846-121691798
                                • Opcode ID: a4b9dbc8b4ba3e585ce96689d9122515de745c66ab3831d1baa4fd4e26185987
                                • Instruction ID: 76f49264fa07c1e74b39e93e53a64aa378f967a6a34ece6eb89769c0e81c1968
                                • Opcode Fuzzy Hash: a4b9dbc8b4ba3e585ce96689d9122515de745c66ab3831d1baa4fd4e26185987
                                • Instruction Fuzzy Hash: 05310AB1C0020DAFDB19DFE4D888AEEBBB8FB48704F10C119E626A3255EB745649CF50
                                APIs
                                • #644.MSVBVM60(?,00206BA0,00000001,6D60EC2C,00000000,?,?,?,?,?,?,00011406), ref: 00206E07
                                • #644.MSVBVM60(00000001,?,?,?,?,?,?,00011406), ref: 00206E12
                                • #644.MSVBVM60(00000000,00000000,00000000,?,?,?,?,?,?,00011406), ref: 00206E24
                                • #644.MSVBVM60(-00000004,00000000,00000000,00000004,?,?,?,?,?,?,00011406), ref: 00206E42
                                Memory Dump Source
                                • Source File: 00000000.00000002.1375656335.0000000000130000.00000020.00000001.01000000.00000003.sdmp, Offset: 00010000, based on PE: true
                                • Associated: 00000000.00000002.1375436874.0000000000010000.00000002.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1375462713.0000000000011000.00000020.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1375530743.000000000001E000.00000040.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1375656335.000000000001F000.00000020.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1376345270.000000000026E000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1376345270.0000000000272000.00000004.00000001.01000000.00000003.sdmpDownload File
                                • Associated: 00000000.00000002.1376574614.0000000000273000.00000002.00000001.01000000.00000003.sdmpDownload File
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_10000_tb4B9ni6vl.jbxd
                                Similarity
                                • API ID: #644
                                • String ID:
                                • API String ID: 700137900-0
                                • Opcode ID: 3d6b3a216c140c8b9bf10cf16ee8f287e9d222b8c92aeed291acc35493463c1e
                                • Instruction ID: a1a38de030ae9f993939cb12c3a59f65072005312bf82dddf2f50ed0e89e8042
                                • Opcode Fuzzy Hash: 3d6b3a216c140c8b9bf10cf16ee8f287e9d222b8c92aeed291acc35493463c1e
                                • Instruction Fuzzy Hash: 6611E7B8D10304AFCB00EB78DD49EAA7BFDEB49700F00815AF501E3292D6B45D118BB1

                                Execution Graph

                                Execution Coverage:8.6%
                                Dynamic/Decrypted Code Coverage:37.8%
                                Signature Coverage:8.1%
                                Total number of Nodes:37
                                Total number of Limit Nodes:5
                                execution_graph 26325 5c8a908 DuplicateHandle 26326 5c8a99e 26325->26326 26349 2207070 26350 22070b4 CheckRemoteDebuggerPresent 26349->26350 26351 22070f6 26350->26351 26352 446194 26353 4461a8 26352->26353 26354 446278 26353->26354 26356 445b13 GetPEB 26353->26356 26357 445b71 26356->26357 26327 442000 26328 442006 26327->26328 26330 442013 26328->26330 26331 4460ba GetPEB 26328->26331 26332 5c8a6c0 26333 5c8a706 GetCurrentProcess 26332->26333 26335 5c8a758 GetCurrentThread 26333->26335 26336 5c8a751 26333->26336 26337 5c8a78e 26335->26337 26338 5c8a795 GetCurrentProcess 26335->26338 26336->26335 26337->26338 26339 5c8a7cb 26338->26339 26340 5c8a7f3 GetCurrentThreadId 26339->26340 26341 5c8a824 26340->26341 26342 4460cf 26347 445bce GetPEB 26342->26347 26348 445ae6 26347->26348 26358 444338 26359 444339 26358->26359 26360 44435b NtClose 26359->26360 26361 444360 26360->26361 26361->26360 26362 445b79 NtAllocateVirtualMemory 26363 445b57 26362->26363 26363->26362 26364 445bb4 26363->26364 26365 44423b 26366 444211 26365->26366 26366->26365 26367 44425d 26366->26367 26370 445912 GetPEB 26366->26370

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 52 2207070-22070f4 CheckRemoteDebuggerPresent 54 22070f6-22070fc 52->54 55 22070fd-2207138 52->55 54->55
                                APIs
                                • CheckRemoteDebuggerPresent.KERNEL32(?,?), ref: 022070E7
                                Strings
                                Memory Dump Source
                                • Source File: 00000002.00000002.3763699250.0000000002200000.00000040.00000800.00020000.00000000.sdmp, Offset: 02200000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_2200000_RegAsm.jbxd
                                Similarity
                                • API ID: CheckDebuggerPresentRemote
                                • String ID: D7/o
                                • API String ID: 3662101638-3674712007
                                • Opcode ID: e0826d01d2389598c65d30db1bd5ffd11120749d66ff5b7f07e13aa3ee1762c2
                                • Instruction ID: 9165180e2afc10761ad91daaeca7561f790dc0165faf9a46d01ea339b48df103
                                • Opcode Fuzzy Hash: e0826d01d2389598c65d30db1bd5ffd11120749d66ff5b7f07e13aa3ee1762c2
                                • Instruction Fuzzy Hash: DA2159B2D00259CFCB14CF9AD484BEEFBF4AF48220F14841AE454A3240C778A944CF61

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 68 2204a88-2204aee 70 2204af0-2204afb 68->70 71 2204b38-2204b3a 68->71 70->71 72 2204afd-2204b09 70->72 73 2204b3c-2204b55 71->73 74 2204b0b-2204b15 72->74 75 2204b2c-2204b36 72->75 79 2204ba1-2204ba3 73->79 80 2204b57-2204b63 73->80 76 2204b17 74->76 77 2204b19-2204b28 74->77 75->73 76->77 77->77 81 2204b2a 77->81 82 2204ba5-2204bbd 79->82 80->79 83 2204b65-2204b71 80->83 81->75 90 2204c07-2204c09 82->90 91 2204bbf-2204bca 82->91 84 2204b73-2204b7d 83->84 85 2204b94-2204b9f 83->85 86 2204b81-2204b90 84->86 87 2204b7f 84->87 85->82 86->86 89 2204b92 86->89 87->86 89->85 92 2204c0b-2204c23 90->92 91->90 93 2204bcc-2204bd8 91->93 99 2204c25-2204c30 92->99 100 2204c6d-2204c6f 92->100 94 2204bda-2204be4 93->94 95 2204bfb-2204c05 93->95 97 2204be6 94->97 98 2204be8-2204bf7 94->98 95->92 97->98 98->98 101 2204bf9 98->101 99->100 102 2204c32-2204c3e 99->102 103 2204c71-2204ce4 100->103 101->95 104 2204c40-2204c4a 102->104 105 2204c61-2204c6b 102->105 112 2204cea-2204cf8 103->112 106 2204c4c 104->106 107 2204c4e-2204c5d 104->107 105->103 106->107 107->107 109 2204c5f 107->109 109->105 113 2204d01-2204d61 112->113 114 2204cfa-2204d00 112->114 121 2204d71-2204d75 113->121 122 2204d63-2204d67 113->122 114->113 124 2204d85-2204d89 121->124 125 2204d77-2204d7b 121->125 122->121 123 2204d69 122->123 123->121 127 2204d99-2204d9d 124->127 128 2204d8b-2204d8f 124->128 125->124 126 2204d7d 125->126 126->124 130 2204dad-2204db1 127->130 131 2204d9f-2204da3 127->131 128->127 129 2204d91 128->129 129->127 132 2204dc1-2204dc5 130->132 133 2204db3-2204db7 130->133 131->130 134 2204da5 131->134 136 2204dd5 132->136 137 2204dc7-2204dcb 132->137 133->132 135 2204db9-2204dbc call 2200ab8 133->135 134->130 135->132 141 2204dd6 136->141 137->136 139 2204dcd-2204dd0 call 2200ab8 137->139 139->136 141->141
                                Strings
                                Memory Dump Source
                                • Source File: 00000002.00000002.3763699250.0000000002200000.00000040.00000800.00020000.00000000.sdmp, Offset: 02200000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_2200000_RegAsm.jbxd
                                Similarity
                                • API ID:
                                • String ID: D7/o$D7/o
                                • API String ID: 0-3827964196
                                • Opcode ID: d4aad1649123c743d4671d1e307f28bb5698aeb6a9fd9f94a3088003758e4f69
                                • Instruction ID: a8a239a20f244fdcc81f3a18b849a4bd2a8bec554a965d19affeb88c9ef1f4e8
                                • Opcode Fuzzy Hash: d4aad1649123c743d4671d1e307f28bb5698aeb6a9fd9f94a3088003758e4f69
                                • Instruction Fuzzy Hash: 51B17F74E1020A8FDB14DFE9C8C179DBBF2BF88714F14C129E515A7299EB749845CB81

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 217 2203e70-2203ed6 219 2203f20-2203f22 217->219 220 2203ed8-2203ee3 217->220 221 2203f24-2203f7c 219->221 220->219 222 2203ee5-2203ef1 220->222 231 2203fc6-2203fc8 221->231 232 2203f7e-2203f89 221->232 223 2203ef3-2203efd 222->223 224 2203f14-2203f1e 222->224 225 2203f01-2203f10 223->225 226 2203eff 223->226 224->221 225->225 228 2203f12 225->228 226->225 228->224 234 2203fca-2203fe2 231->234 232->231 233 2203f8b-2203f97 232->233 235 2203f99-2203fa3 233->235 236 2203fba-2203fc4 233->236 241 2203fe4-2203fef 234->241 242 220402c-220402e 234->242 237 2203fa5 235->237 238 2203fa7-2203fb6 235->238 236->234 237->238 238->238 240 2203fb8 238->240 240->236 241->242 244 2203ff1-2203ffd 241->244 243 2204030-220407e 242->243 252 2204084-2204092 243->252 245 2204020-220402a 244->245 246 2203fff-2204009 244->246 245->243 248 220400b 246->248 249 220400d-220401c 246->249 248->249 249->249 250 220401e 249->250 250->245 253 2204094-220409a 252->253 254 220409b-22040fb 252->254 253->254 261 220410b-220410f 254->261 262 22040fd-2204101 254->262 264 2204111-2204115 261->264 265 220411f-2204123 261->265 262->261 263 2204103 262->263 263->261 264->265 266 2204117-220411a call 2200ab8 264->266 267 2204133-2204137 265->267 268 2204125-2204129 265->268 266->265 271 2204147-220414b 267->271 272 2204139-220413d 267->272 268->267 270 220412b-220412e call 2200ab8 268->270 270->267 275 220415b-220415f 271->275 276 220414d-2204151 271->276 272->271 274 220413f-2204142 call 2200ab8 272->274 274->271 279 2204161-2204165 275->279 280 220416f 275->280 276->275 278 2204153 276->278 278->275 279->280 281 2204167 279->281 282 2204170 280->282 281->280 282->282
                                Strings
                                Memory Dump Source
                                • Source File: 00000002.00000002.3763699250.0000000002200000.00000040.00000800.00020000.00000000.sdmp, Offset: 02200000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_2200000_RegAsm.jbxd
                                Similarity
                                • API ID:
                                • String ID: D7/o$D7/o
                                • API String ID: 0-3827964196
                                • Opcode ID: 25d3da4a4668a267bf624e409057c7a3f687b005d7519d492bb488cc6dda95ab
                                • Instruction ID: f9950dba8e3f4d3ba201106ca8b936a31b3744a03fcb8073e49c667f74f6f868
                                • Opcode Fuzzy Hash: 25d3da4a4668a267bf624e409057c7a3f687b005d7519d492bb488cc6dda95ab
                                • Instruction Fuzzy Hash: A5916C70E1020ACFDB14DFE9D9857AEFBF2BF88314F148129E414A7299EB749845CB81
                                Memory Dump Source
                                • Source File: 00000002.00000002.3763699250.0000000002200000.00000040.00000800.00020000.00000000.sdmp, Offset: 02200000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_2200000_RegAsm.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 568567631c1e7d15d52ab0f8fede8f5f3cbe9d3a7da80d822924663d2c134502
                                • Instruction ID: 98c5cb09901bcc422eaf672cf2c42e860f5f06b9983b4d41970db0c654fa4b43
                                • Opcode Fuzzy Hash: 568567631c1e7d15d52ab0f8fede8f5f3cbe9d3a7da80d822924663d2c134502
                                • Instruction Fuzzy Hash: F953F831C10B1A8ACB11EFA8C890699F7B1FF99300F51D79AE45977125FB70AAD4CB81
                                Memory Dump Source
                                • Source File: 00000002.00000002.3763699250.0000000002200000.00000040.00000800.00020000.00000000.sdmp, Offset: 02200000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_2200000_RegAsm.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 3029f5ba5df96ee2214b22958df3c16cd284a5301284040b9bb1fd2b91ec8f18
                                • Instruction ID: c94e33745f88c4efabbe2f529ee83f5c6d1973e549e1005eaae19d3b97f71652
                                • Opcode Fuzzy Hash: 3029f5ba5df96ee2214b22958df3c16cd284a5301284040b9bb1fd2b91ec8f18
                                • Instruction Fuzzy Hash: 48332F31D1071A8EDB11EFA8C8806ADF7B1FF89300F15C69AD459B7265EB70AAC5CB41

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 1461 445b79-445b7b NtAllocateVirtualMemory 1462 445b57-445b59 1461->1462 1463 445bb4-445bb7 1462->1463 1464 445b5b-445b5e 1462->1464 1464->1461
                                APIs
                                • NtAllocateVirtualMemory.NTDLL ref: 00445B79
                                Memory Dump Source
                                • Source File: 00000002.00000002.3762739371.0000000000442000.00000040.80000000.00040000.00000000.sdmp, Offset: 00442000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_442000_RegAsm.jbxd
                                Similarity
                                • API ID: AllocateMemoryVirtual
                                • String ID:
                                • API String ID: 2167126740-0
                                • Opcode ID: 15c17c5efd1e4e0c98527a4d8d67195ebc9f1ff02e3a1a1ed02da13f8d6b031d
                                • Instruction ID: e007aaf93056af3a4acd6733d2c36c7ee5bac758b90c0c71f72701d2c00de0c9
                                • Opcode Fuzzy Hash: 15c17c5efd1e4e0c98527a4d8d67195ebc9f1ff02e3a1a1ed02da13f8d6b031d
                                • Instruction Fuzzy Hash: 9BC040305044C6DBAF04C795C444EA87770B704388F1404959456D7552D774BA45D71F
                                Memory Dump Source
                                • Source File: 00000002.00000002.3766067277.0000000005C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C80000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_5c80000_RegAsm.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: fd6d18558e44ad576a0cfcb277eeae8b8299ffa764ed0858827f10944085fdf9
                                • Instruction ID: f230d72e9a2f082449d9d5ff206d11d7555fa4c428b7b5e3e74b50acc4aaeaed
                                • Opcode Fuzzy Hash: fd6d18558e44ad576a0cfcb277eeae8b8299ffa764ed0858827f10944085fdf9
                                • Instruction Fuzzy Hash: 9A322F30E107198FDB14EB69C8946ADB7B2FF89300F5586A9D409AB254EF70AA85CF50
                                Memory Dump Source
                                • Source File: 00000002.00000002.3766067277.0000000005C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C80000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_5c80000_RegAsm.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: a0c1af3711c9881fb94f5f1f1c6c0e805570103eb84786f636e02cb9933bfcc9
                                • Instruction ID: fe92619650b79b099189f374af111e602b9d1916b653c37b5cbd7827391de8ff
                                • Opcode Fuzzy Hash: a0c1af3711c9881fb94f5f1f1c6c0e805570103eb84786f636e02cb9933bfcc9
                                • Instruction Fuzzy Hash: EC029030B002159FDB14EB68D890A7EBBE2FF84704F148969D406EB355DB75ED42CB90

                                Control-flow Graph

                                APIs
                                • GetCurrentProcess.KERNEL32 ref: 05C8A73E
                                • GetCurrentThread.KERNEL32 ref: 05C8A77B
                                • GetCurrentProcess.KERNEL32 ref: 05C8A7B8
                                • GetCurrentThreadId.KERNEL32 ref: 05C8A811
                                Strings
                                Memory Dump Source
                                • Source File: 00000002.00000002.3766067277.0000000005C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C80000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_5c80000_RegAsm.jbxd
                                Similarity
                                • API ID: Current$ProcessThread
                                • String ID: D7/o
                                • API String ID: 2063062207-3674712007
                                • Opcode ID: dafd2e3a24f597098121d6f2842a1fee345ea770bfad9051177831f202128f11
                                • Instruction ID: afe90df47b426d46b67b442ab57be3646f9805dfc823e0b6d1b968fd13bd410a
                                • Opcode Fuzzy Hash: dafd2e3a24f597098121d6f2842a1fee345ea770bfad9051177831f202128f11
                                • Instruction Fuzzy Hash: BA5155B49007498FDB14DFAAD988BAEBBF1FF48314F248819E019A7350DB746A44CB65

                                Control-flow Graph

                                APIs
                                • GetCurrentProcess.KERNEL32 ref: 05C8A73E
                                • GetCurrentThread.KERNEL32 ref: 05C8A77B
                                • GetCurrentProcess.KERNEL32 ref: 05C8A7B8
                                • GetCurrentThreadId.KERNEL32 ref: 05C8A811
                                Strings
                                Memory Dump Source
                                • Source File: 00000002.00000002.3766067277.0000000005C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C80000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_5c80000_RegAsm.jbxd
                                Similarity
                                • API ID: Current$ProcessThread
                                • String ID: D7/o
                                • API String ID: 2063062207-3674712007
                                • Opcode ID: 86d8c5616554e9b4168e2d52ae5d4b3d700a297733be6ba34311702913f8dbbe
                                • Instruction ID: 407252cfdd9e3d3c25a4267af20cd47bee45d2569532603ba105a8eafc14833d
                                • Opcode Fuzzy Hash: 86d8c5616554e9b4168e2d52ae5d4b3d700a297733be6ba34311702913f8dbbe
                                • Instruction Fuzzy Hash: A15165B49007498FDB14DFAAD988BAEBBF1FF48314F248819E019A7350DB746A44CB65

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 45 220706a-22070f4 CheckRemoteDebuggerPresent 48 22070f6-22070fc 45->48 49 22070fd-2207138 45->49 48->49
                                APIs
                                • CheckRemoteDebuggerPresent.KERNEL32(?,?), ref: 022070E7
                                Strings
                                Memory Dump Source
                                • Source File: 00000002.00000002.3763699250.0000000002200000.00000040.00000800.00020000.00000000.sdmp, Offset: 02200000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_2200000_RegAsm.jbxd
                                Similarity
                                • API ID: CheckDebuggerPresentRemote
                                • String ID: D7/o
                                • API String ID: 3662101638-3674712007
                                • Opcode ID: 6ef532ed52d35b9d330b4047d22777375099476639c10d9d254d635f837fab62
                                • Instruction ID: 836f313db17f755da1bb3ba26501d0b4dfc85515f90f8c97bc7f6e2ba2436c6b
                                • Opcode Fuzzy Hash: 6ef532ed52d35b9d330b4047d22777375099476639c10d9d254d635f837fab62
                                • Instruction Fuzzy Hash: D62148B2D00259CFCB14CF9AD884BEEFBF5AF48220F14842AE855A7250C778A944CF61

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 58 5c8a900-5c8a99c DuplicateHandle 59 5c8a99e-5c8a9a4 58->59 60 5c8a9a5-5c8a9c2 58->60 59->60
                                APIs
                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 05C8A98F
                                Strings
                                Memory Dump Source
                                • Source File: 00000002.00000002.3766067277.0000000005C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C80000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_5c80000_RegAsm.jbxd
                                Similarity
                                • API ID: DuplicateHandle
                                • String ID: D7/o
                                • API String ID: 3793708945-3674712007
                                • Opcode ID: 3a3f2cd52acfea1eb54016426446ac43078c476ab4f25ac7e090c88acb9e00f1
                                • Instruction ID: 46f4ec1909210ebc41960f9c8c6c39d4df5e371657c0c8d391024fc41af5d4e8
                                • Opcode Fuzzy Hash: 3a3f2cd52acfea1eb54016426446ac43078c476ab4f25ac7e090c88acb9e00f1
                                • Instruction Fuzzy Hash: 9021D4B5D052489FDB10CF9AD984AEEBBF5FB48320F14841AE954A3310D374A944CF65

                                Control-flow Graph

                                • Executed
                                • Not Executed
                                control_flow_graph 63 5c8a908-5c8a99c DuplicateHandle 64 5c8a99e-5c8a9a4 63->64 65 5c8a9a5-5c8a9c2 63->65 64->65
                                APIs
                                • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 05C8A98F
                                Strings
                                Memory Dump Source
                                • Source File: 00000002.00000002.3766067277.0000000005C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C80000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_5c80000_RegAsm.jbxd
                                Similarity
                                • API ID: DuplicateHandle
                                • String ID: D7/o
                                • API String ID: 3793708945-3674712007
                                • Opcode ID: d80339279ecd44af7e550ce2ab2eb0a53294e434b96c136ee823c9c2da5d99da
                                • Instruction ID: 7ebad6cf988fba9388e6638e9852a07e7bac3260351333a3089b4fec0117e609
                                • Opcode Fuzzy Hash: d80339279ecd44af7e550ce2ab2eb0a53294e434b96c136ee823c9c2da5d99da
                                • Instruction Fuzzy Hash: CC21E3B59002489FDB10CF9AD984BEEFBF4FB48320F14841AE954A3310D374A944CFA5
                                Memory Dump Source
                                • Source File: 00000002.00000002.3763450196.000000000213D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0213D000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_213d000_RegAsm.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 34082570b0bc4489f125153085849690b8c0b100f8364ab44f0729a7f1ffb5b9
                                • Instruction ID: 7696fb01a1767ccae6d627065d1ac74333c8cff7a34f619100f8d46ce158efb5
                                • Opcode Fuzzy Hash: 34082570b0bc4489f125153085849690b8c0b100f8364ab44f0729a7f1ffb5b9
                                • Instruction Fuzzy Hash: 402134B1644340DFDB16DF20E9C0B26BBA2FB84B14F24C56DD84A4B246C33AD847CA62
                                Memory Dump Source
                                • Source File: 00000002.00000002.3763450196.000000000213D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0213D000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_213d000_RegAsm.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 3860dea56daf856edb53f0aa3dd63235f66e8a2a3fd6207865f101e13cbdcdb4
                                • Instruction ID: bc9bcd779a3bc2215004fca89db8c730ec0a31dde96ecf853b43cb46520ac6b5
                                • Opcode Fuzzy Hash: 3860dea56daf856edb53f0aa3dd63235f66e8a2a3fd6207865f101e13cbdcdb4
                                • Instruction Fuzzy Hash: EE2180755483809FCB03CF24D994B11BF71EB46614F28C5EAD8498F267C33A985ACB62
                                Strings
                                Memory Dump Source
                                • Source File: 00000002.00000002.3763699250.0000000002200000.00000040.00000800.00020000.00000000.sdmp, Offset: 02200000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_2200000_RegAsm.jbxd
                                Similarity
                                • API ID:
                                • String ID: D7/o$D7/o
                                • API String ID: 0-3827964196
                                • Opcode ID: f6187b091ccd2257f98e6657ac7395b3517570275597bd137cad799d6a4a91f3
                                • Instruction ID: fbd00be498e0d97932e2f43c3949604ad3cb1306a7ea822b58cdd5da79183ba6
                                • Opcode Fuzzy Hash: f6187b091ccd2257f98e6657ac7395b3517570275597bd137cad799d6a4a91f3
                                • Instruction Fuzzy Hash: 7DB17070E1020A8FDB10DFE9D88179EBBF2BF88314F14C129D915AB299EB749841CF81
                                Memory Dump Source
                                • Source File: 00000002.00000002.3766067277.0000000005C80000.00000040.00000800.00020000.00000000.sdmp, Offset: 05C80000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_2_2_5c80000_RegAsm.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 244c89b6500123e86f82d863fad6dfd94d55aba67425bf0372212191bce1990c
                                • Instruction ID: ee01d79afa35bffb1447a1cd4c3af0124d226ac69d8590f7c78cc861244deef2
                                • Opcode Fuzzy Hash: 244c89b6500123e86f82d863fad6dfd94d55aba67425bf0372212191bce1990c
                                • Instruction Fuzzy Hash: 41125F30A00259CFDB24EF69C854BADB7F2BF85704F209969D406AB355DB309D85CF90