Create Interactive Tour

Windows Analysis Report
sharphound.exe

Overview

General Information

Sample Name:sharphound.exe
Analysis ID:639866
MD5:76a2363d509cc7174c4abee9a7d7ae68
SHA1:286588a50b9b128d07aa0f8851f2d7ee91dfa372
SHA256:3b873bc8c7ee12fe879ab175d439b5968c8803fbb92e414de39176e2371896b2
Infos:

Detection

Score:52
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected Costura Assembly Loader
Uses 32bit PE files
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Queries the volume information (name, serial number etc) of a device
May sleep (evasive loops) to hinder dynamic analysis
Binary contains a suspicious time stamp
Contains long sleeps (>= 3 min)

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is start
  • sharphound.exe (PID: 1740 cmdline: "C:\Users\alfredo\Desktop\sharphound.exe" MD5: 76A2363D509CC7174C4ABEE9A7D7AE68)
    • conhost.exe (PID: 6340 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: C5E9B1D1103EDCEA2E408E9497A5A88F)
  • cleanup
SourceRuleDescriptionAuthorStrings
sharphound.exeJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
    SourceRuleDescriptionAuthorStrings
    00000000.00000000.1663690976.00000142EE7E2000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_CosturaAssemblyLoaderYara detected Costura Assembly LoaderJoe Security
      No Sigma rule has matched
      No Snort rule has matched

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: sharphound.exeVirustotal: Detection: 64%Perma Link
      Source: sharphound.exeMetadefender: Detection: 22%Perma Link
      Source: sharphound.exeReversingLabs: Detection: 69%
      Source: sharphound.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
      Source: sharphound.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
      Source: sharphound.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
      Source: sharphound.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      Source: sharphound.exeVirustotal: Detection: 64%
      Source: sharphound.exeMetadefender: Detection: 22%
      Source: sharphound.exeReversingLabs: Detection: 69%
      Source: sharphound.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      Source: C:\Users\alfredo\Desktop\sharphound.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
      Source: sharphound.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
      Source: C:\Users\alfredo\Desktop\sharphound.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_64\mscorlib\ec23d1294499b4ffba61f212cb1217cd\mscorlib.ni.dll
      Source: unknownProcess created: C:\Users\alfredo\Desktop\sharphound.exe "C:\Users\alfredo\Desktop\sharphound.exe"
      Source: C:\Users\alfredo\Desktop\sharphound.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\alfredo\Desktop\sharphound.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32
      Source: C:\Users\alfredo\Desktop\sharphound.exeFile created: C:\Users\alfredo\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\sharphound.exe.log
      Source: classification engineClassification label: mal52.evad.winEXE@2/3@0/0
      Source: C:\Users\alfredo\Desktop\sharphound.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dll
      Source: sharphound.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
      Source: sharphound.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
      Source: sharphound.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG

      Data Obfuscation

      barindex
      Source: Yara matchFile source: sharphound.exe, type: SAMPLE
      Source: Yara matchFile source: 00000000.00000000.1663690976.00000142EE7E2000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
      Source: sharphound.exeStatic PE information: 0xDBED848D [Tue Dec 3 17:51:09 2086 UTC]
      Source: initial sampleStatic PE information: section name: .text entropy: 7.92437329633
      Source: C:\Users\alfredo\Desktop\sharphound.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\alfredo\Desktop\sharphound.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\alfredo\Desktop\sharphound.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\alfredo\Desktop\sharphound.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\alfredo\Desktop\sharphound.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\alfredo\Desktop\sharphound.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\alfredo\Desktop\sharphound.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\alfredo\Desktop\sharphound.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\alfredo\Desktop\sharphound.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\alfredo\Desktop\sharphound.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\alfredo\Desktop\sharphound.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\alfredo\Desktop\sharphound.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\alfredo\Desktop\sharphound.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\alfredo\Desktop\sharphound.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\alfredo\Desktop\sharphound.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\alfredo\Desktop\sharphound.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\alfredo\Desktop\sharphound.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\alfredo\Desktop\sharphound.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\alfredo\Desktop\sharphound.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\alfredo\Desktop\sharphound.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\alfredo\Desktop\sharphound.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\alfredo\Desktop\sharphound.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\alfredo\Desktop\sharphound.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\alfredo\Desktop\sharphound.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\alfredo\Desktop\sharphound.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\alfredo\Desktop\sharphound.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\alfredo\Desktop\sharphound.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\alfredo\Desktop\sharphound.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\alfredo\Desktop\sharphound.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\alfredo\Desktop\sharphound.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\alfredo\Desktop\sharphound.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\alfredo\Desktop\sharphound.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\alfredo\Desktop\sharphound.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\alfredo\Desktop\sharphound.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\alfredo\Desktop\sharphound.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\alfredo\Desktop\sharphound.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\alfredo\Desktop\sharphound.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\alfredo\Desktop\sharphound.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\alfredo\Desktop\sharphound.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\alfredo\Desktop\sharphound.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\alfredo\Desktop\sharphound.exeProcess information set: NOOPENFILEERRORBOX
      Source: C:\Users\alfredo\Desktop\sharphound.exeWindow / User API: threadDelayed 368
      Source: C:\Users\alfredo\Desktop\sharphound.exe TID: 5984Thread sleep time: -922337203685477s >= -30000s
      Source: C:\Users\alfredo\Desktop\sharphound.exeThread delayed: delay time: 922337203685477
      Source: C:\Users\alfredo\Desktop\sharphound.exeThread delayed: delay time: 922337203685477
      Source: C:\Users\alfredo\Desktop\sharphound.exeMemory allocated: page read and write | page guard
      Source: C:\Users\alfredo\Desktop\sharphound.exeQueries volume information: C:\Users\alfredo\Desktop\sharphound.exe VolumeInformation
      Source: C:\Users\alfredo\Desktop\sharphound.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.DirectoryServices.Protocols\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.DirectoryServices.Protocols.dll VolumeInformation
      Source: C:\Users\alfredo\Desktop\sharphound.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuid
      Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
      Valid AccountsWindows Management InstrumentationPath Interception1
      Process Injection
      1
      Masquerading
      OS Credential Dumping21
      Virtualization/Sandbox Evasion
      Remote ServicesData from Local SystemExfiltration Over Other Network MediumData ObfuscationEavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
      Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
      Disable or Modify Tools
      LSASS Memory1
      Application Window Discovery
      Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
      Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)21
      Virtualization/Sandbox Evasion
      Security Account Manager12
      System Information Discovery
      SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
      Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)2
      Software Packing
      NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
      Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
      Process Injection
      LSA SecretsRemote System DiscoverySSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
      Replication Through Removable MediaLaunchdRc.commonRc.common1
      Timestomp
      Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
      External Remote ServicesScheduled TaskStartup ItemsStartup Items1
      Obfuscated Files or Information
      DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      sharphound.exe65%VirustotalBrowse
      sharphound.exe23%MetadefenderBrowse
      sharphound.exe69%ReversingLabsWin32.Hacktool.SharpHound
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      No contacted domains info
      No contacted IP infos
      Joe Sandbox Version:35.0.0 Citrine
      Analysis ID:639866
      Start date and time: 06/06/202215:05:022022-06-06 15:05:02 +02:00
      Joe Sandbox Product:CloudBasic
      Hypervisor based Inspection enabled:false
      Report type:full
      Sample file name:sharphound.exe
      Cookbook file name:defaultwindowsinteractivecookbook.jbs
      Number of analysed new started processes analysed:7
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • EGA enabled
      Analysis Mode:stream
      Analysis stop reason:Timeout
      Detection:MAL
      Classification:mal52.evad.winEXE@2/3@0/0
      Cookbook Comments:
      • Found application associated with file extension: .exe
      • Adjust boot time
      • Enable AMSI
      • Exclude process from analysis (whitelisted): SIHClient.exe, svchost.exe
      • Excluded IPs from analysis (whitelisted): 20.82.210.154, 40.112.88.60, 20.223.24.244, 93.184.221.240
      • Excluded domains from analysis (whitelisted): fs.microsoft.com, login.live.com, slscr.update.microsoft.com, nexusrules.officeapps.live.com
      • Not all processes where analyzed, report is missing behavior information
      • Report size getting too big, too many NtAllocateVirtualMemory calls found.
      Process:C:\Users\alfredo\Desktop\sharphound.exe
      File Type:ASCII text, with CRLF line terminators
      Category:dropped
      Size (bytes):768
      Entropy (8bit):5.345753214763177
      Encrypted:false
      SSDEEP:
      MD5:7821859EC04A9DFF9CF3272DC0E6414A
      SHA1:7836F1C81CDAAAA12BF084E454DE09565B268C44
      SHA-256:A42257F75E5B31A2727B56F93066CC169A7FE4AE6FA1D22ABD87E18885BB95F0
      SHA-512:989743E392FC47288CE39E1C6271E071F443A44F3D742717B738C878D4F9B78088A5EF418264C4DF9B0397E359BF3124E6B456E480DC2F9F1DE7EEB1DDF0BB14
      Malicious:true
      Reputation:low
      Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System\e074a852d0b7a87fc8713d9727b9a1bb\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Core\5aa66136dfbf2cc6e3ba6b00dd4d2e9f\System.Core.ni.dll",0..2,"System.DirectoryServices.Protocols, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.DirectoryServices, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_64\System.Dired13b18a9#\f748e4b13f5fbda04a3d2ca0f2363e8c\System.DirectoryServices.ni.dll",0..
      Process:C:\Users\alfredo\Desktop\sharphound.exe
      File Type:ASCII text, with CRLF line terminators
      Category:dropped
      Size (bytes):359
      Entropy (8bit):5.378790277310715
      Encrypted:false
      SSDEEP:
      MD5:B971BDCE15FD3BDCD119975132B87982
      SHA1:850087602F8C1815BE9F6F19C974A5A381CE66C5
      SHA-256:513F751B9C4434B2A22039CE55692B1BE50118B7BBD42C20AA6B123E78439D5B
      SHA-512:15FE7B4C086C5984734E053DC62DE45EBB52EFA3CCF0E70C4C09AD481BA5B328412976E731EA4D7FABBA0E368577F2E1C973F8D998F8943946AD7876E2709C98
      Malicious:false
      Reputation:low
      Preview:2022-06-06T15:05:43.8043269-07:00|INFORMATION|Resolved Collection Methods: Group, LocalAdmin, Session, Trusts, ACL, Container, RDP, ObjectProps, DCOM, SPNTargets, PSRemote..2022-06-06T15:05:44.9043227-07:00|INFORMATION|Initializing SharpHound at 3:05 PM on 6/6/2022..2022-06-06T15:05:50.5043264-07:00|ERROR|Unable to connect to LDAP, verify your credentials..
      Process:C:\Users\alfredo\Desktop\sharphound.exe
      File Type:data
      Category:dropped
      Size (bytes):64
      Entropy (8bit):3.7765037105656543
      Encrypted:false
      SSDEEP:
      MD5:E2AFFE41EE283A779A2E10218FD3937E
      SHA1:031620031D894A8A2409032FE46C42ED5C5B4A9D
      SHA-256:D5E092D430425AA5075CD09483DEFB6F3F5662C0921261159E6DBAF525B7DC36
      SHA-512:C2F9AE03B301F9D889E1DDBE6ECE3D1B41FEA4FB712C515149536F34266F0E5084FC506F8BDD998F4DC2FB4F5A301638B82485987B69D229CA8CE76A6B5E6289
      Malicious:false
      Reputation:low
      Preview:....1.7.9.6.0.5.....\MAILSLOT\NET\GETDC4E24896D............ ....
      File type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
      Entropy (8bit):7.910420996670306
      TrID:
      • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
      • Win32 Executable (generic) a (10002005/4) 49.75%
      • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
      • Windows Screen Saver (13104/52) 0.07%
      • Generic Win/DOS Executable (2004/3) 0.01%
      File name:sharphound.exe
      File size:906752
      MD5:76a2363d509cc7174c4abee9a7d7ae68
      SHA1:286588a50b9b128d07aa0f8851f2d7ee91dfa372
      SHA256:3b873bc8c7ee12fe879ab175d439b5968c8803fbb92e414de39176e2371896b2
      SHA512:ca81e19d0a5559e65670fd29d4faf82711c26ab395898b195408b31a32f1c9d6281f668d0dac17ab0936dd017f0b5885b4b269d58f64e65ad94c4f4b82ce3b32
      SSDEEP:24576:aDJLNvNuXoELdB5O6Pw0JkoZ7g/28DDghyhpRT4vyDLk9rMtNtj88:aDJLNvN2dBJJX7K2yDghMrT4KDLQMl
      TLSH:D115122053F8A902D2BF1EBE646012154AB5FF0BFD16FF9E554C70EE18A378195227A3
      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L................."...0.................. ........@.. ....................... ............`................................
      Icon Hash:41b972cca8529200
      Entrypoint:0x4dd7fe
      Entrypoint Section:.text
      Digitally signed:false
      Imagebase:0x400000
      Subsystem:windows cui
      Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
      DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
      Time Stamp:0xDBED848D [Tue Dec 3 17:51:09 2086 UTC]
      TLS Callbacks:
      CLR (.Net) Version:v4.0.30319
      OS Version Major:4
      OS Version Minor:0
      File Version Major:4
      File Version Minor:0
      Subsystem Version Major:4
      Subsystem Version Minor:0
      Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
      Instruction
      jmp dword ptr [00402000h]
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      add byte ptr [eax], al
      NameVirtual AddressVirtual Size Is in Section
      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IMPORT0xdd7ac0x4f.text
      IMAGE_DIRECTORY_ENTRY_RESOURCE0xde0000x16ac.rsrc
      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
      IMAGE_DIRECTORY_ENTRY_BASERELOC0xe00000xc.reloc
      IMAGE_DIRECTORY_ENTRY_DEBUG0xdd71c0x38.text
      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
      .text0x20000xdb8040xdba00False0.923300103159data7.92437329633IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
      .rsrc0xde0000x16ac0x1800False0.388671875data4.13466156094IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .reloc0xe00000xc0x200False0.041015625data0.0815394123432IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
      NameRVASizeTypeLanguageCountry
      RT_ICON0xde1000x10a8dBase III DBT, version number 0, next free block index 40
      RT_GROUP_ICON0xdf1b80x14data
      RT_VERSION0xdf1dc0x2d0data
      RT_MANIFEST0xdf4bc0x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
      DLLImport
      mscoree.dll_CorExeMain
      DescriptionData
      Translation0x0000 0x04b0
      LegalCopyright
      Assembly Version1.0.3.0
      InternalNameSharpHound.exe
      FileVersion1.0.3
      CompanyNameSpecterOps
      ProductNameSharpHound
      ProductVersion1.0.3
      FileDescriptionSharpHound
      OriginalFilenameSharpHound.exe