Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SharkHCShark.exe

Overview

General Information

Sample name:SharkHCShark.exe
Analysis ID:1500381
MD5:1714616095f0d3f62aac384222620ad5
SHA1:31412d21c22f20efa0f5f57b45842d1df6db0c11
SHA256:4788d6606f23c828bbaaad8f8d3418fa86d704fc35aabebd48db7de370fb0f3b
Tags:exe
Infos:

Detection

PureLog Stealer, zgRAT
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected PureLog Stealer
Yara detected zgRAT
.NET source code contains method to dynamically call methods (often used by packers)
.NET source code contains potential unpacker
.NET source code contains very large array initializations
AI detected suspicious sample
Allocates memory in foreign processes
Injects a PE file into a foreign processes
Machine Learning detection for dropped file
Machine Learning detection for sample
PE file contains section with special chars
Reads the System eventlog
Writes to foreign memory regions
Allocates memory with a write watch (potentially for evading sandboxes)
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to query CPU information (cpuid)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Drops PE files
Enables security privileges
Found dropped PE file which has not been started or loaded
Found large amount of non-executed APIs
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • SharkHCShark.exe (PID: 4904 cmdline: "C:\Users\user\Desktop\SharkHCShark.exe" MD5: 1714616095F0D3F62AAC384222620AD5)
    • conhost.exe (PID: 3224 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • MSBuild.exe (PID: 5256 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe" MD5: 8FDF47E0FF70C40ED3A17014AEEA4232)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
zgRATzgRAT is a Remote Access Trojan malware which sometimes drops other malware such as AgentTesla malware. zgRAT has an inforstealer use which targets browser information and cryptowallets.Usually spreads by USB or phishing emails with -zip/-lnk/.bat/.xlsx attachments and so on.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.zgrat
No configs have been found
SourceRuleDescriptionAuthorStrings
00000003.00000002.2125917148.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
    00000000.00000002.2137887935.000000006D41A000.00000004.00000001.01000000.00000006.sdmpJoeSecurity_zgRAT_1Yara detected zgRATJoe Security
      00000000.00000002.2137887935.000000006D41A000.00000004.00000001.01000000.00000006.sdmpJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
        00000000.00000002.2137887935.000000006D41A000.00000004.00000001.01000000.00000006.sdmpMALWARE_Win_zgRATDetects zgRATditekSHen
        • 0x4ed2d:$s1: file:///
        • 0x4ec89:$s2: {11111-22222-10009-11112}
        • 0x4ecbd:$s3: {11111-22222-50001-00000}
        • 0x4c1ff:$s4: get_Module
        • 0x4837e:$s5: Reverse
        • 0x48849:$s6: BlockCopy
        • 0x48346:$s7: ReadByte
        • 0x4ed3f:$s8: 4C 00 6F 00 63 00 61 00 74 00 69 00 6F 00 6E 00 00 0B 46 00 69 00 6E 00 64 00 20 00 00 13 52 00 65 00 73 00 6F 00 75 00 72 00 63 00 65 00 41 00 00 11 56 00 69 00 72 00 74 00 75 00 61 00 6C 00 ...
        SourceRuleDescriptionAuthorStrings
        3.2.MSBuild.exe.400000.0.unpackJoeSecurity_zgRAT_1Yara detected zgRATJoe Security
          3.2.MSBuild.exe.400000.0.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
            3.2.MSBuild.exe.400000.0.unpackMALWARE_Win_zgRATDetects zgRATditekSHen
            • 0x4ed2d:$s1: file:///
            • 0x4ec89:$s2: {11111-22222-10009-11112}
            • 0x4ecbd:$s3: {11111-22222-50001-00000}
            • 0x4c1ff:$s4: get_Module
            • 0x4837e:$s5: Reverse
            • 0x48849:$s6: BlockCopy
            • 0x48346:$s7: ReadByte
            • 0x4ed3f:$s8: 4C 00 6F 00 63 00 61 00 74 00 69 00 6F 00 6E 00 00 0B 46 00 69 00 6E 00 64 00 20 00 00 13 52 00 65 00 73 00 6F 00 75 00 72 00 63 00 65 00 41 00 00 11 56 00 69 00 72 00 74 00 75 00 61 00 6C 00 ...
            0.2.SharkHCShark.exe.6d41a000.2.raw.unpackJoeSecurity_zgRAT_1Yara detected zgRATJoe Security
              0.2.SharkHCShark.exe.6d41a000.2.raw.unpackJoeSecurity_PureLogStealerYara detected PureLog StealerJoe Security
                Click to see the 7 entries
                No Sigma rule has matched
                No Suricata rule has matched

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: SharkHCShark.exeVirustotal: Detection: 45%Perma Link
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
                Source: C:\Users\user\AppData\Roaming\d3d9x.dllJoe Sandbox ML: detected
                Source: SharkHCShark.exeJoe Sandbox ML: detected
                Source: SharkHCShark.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: unknownHTTPS traffic detected: 40.126.31.71:443 -> 192.168.2.6:49722 version: TLS 1.2
                Source: SharkHCShark.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: C:\Users\user\Desktop\SharkHCShark.exeCode function: 0_2_6D40B868 FindFirstFileExW,0_2_6D40B868
                Source: Joe Sandbox ViewJA3 fingerprint: 28a2c9bd18a11de089ef85a160da29e4
                Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
                Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
                Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
                Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
                Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
                Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
                Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.64
                Source: unknownTCP traffic detected without corresponding DNS query: 40.126.31.71
                Source: unknownTCP traffic detected without corresponding DNS query: 40.126.31.71
                Source: unknownTCP traffic detected without corresponding DNS query: 40.126.31.71
                Source: unknownTCP traffic detected without corresponding DNS query: 40.126.31.71
                Source: unknownTCP traffic detected without corresponding DNS query: 40.126.31.71
                Source: unknownTCP traffic detected without corresponding DNS query: 40.126.31.71
                Source: unknownTCP traffic detected without corresponding DNS query: 40.126.31.71
                Source: unknownTCP traffic detected without corresponding DNS query: 40.126.31.71
                Source: unknownTCP traffic detected without corresponding DNS query: 40.126.31.71
                Source: unknownTCP traffic detected without corresponding DNS query: 40.126.31.71
                Source: unknownTCP traffic detected without corresponding DNS query: 40.126.31.71
                Source: unknownTCP traffic detected without corresponding DNS query: 40.126.31.71
                Source: unknownTCP traffic detected without corresponding DNS query: 2.19.126.137
                Source: unknownTCP traffic detected without corresponding DNS query: 2.19.126.137
                Source: unknownNetwork traffic detected: HTTP traffic on port 49674 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49722
                Source: unknownNetwork traffic detected: HTTP traffic on port 49673 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49672 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49705 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 49722 -> 443
                Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49705
                Source: unknownHTTPS traffic detected: 40.126.31.71:443 -> 192.168.2.6:49722 version: TLS 1.2

                Spam, unwanted Advertisements and Ransom Demands

                barindex
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeKey opened: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\EventLog\SystemJump to behavior

                System Summary

                barindex
                Source: 3.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                Source: 0.2.SharkHCShark.exe.6d41a000.2.raw.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                Source: 0.2.SharkHCShark.exe.6d41a000.2.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                Source: 0.2.SharkHCShark.exe.6d3f0000.1.unpack, type: UNPACKEDPEMatched rule: Detects zgRAT Author: ditekSHen
                Source: 00000000.00000002.2137887935.000000006D41A000.00000004.00000001.01000000.00000006.sdmp, type: MEMORYMatched rule: Detects zgRAT Author: ditekSHen
                Source: 0.2.SharkHCShark.exe.6d41a000.2.raw.unpack, Strings.csLarge array initialization: Strings: array initializer size 6160
                Source: d3d9x.dll.0.drStatic PE information: section name: ."D9
                Source: C:\Users\user\Desktop\SharkHCShark.exeCode function: 0_2_6D3F7FD0 GetModuleHandleW,NtQueryInformationProcess,0_2_6D3F7FD0
                Source: C:\Users\user\Desktop\SharkHCShark.exeCode function: 0_2_6D3F14100_2_6D3F1410
                Source: C:\Users\user\Desktop\SharkHCShark.exeCode function: 0_2_6D3F10100_2_6D3F1010
                Source: C:\Users\user\Desktop\SharkHCShark.exeCode function: 0_2_6D411E050_2_6D411E05
                Source: C:\Users\user\Desktop\SharkHCShark.exeCode function: 0_2_6D3F82E00_2_6D3F82E0
                Source: C:\Users\user\Desktop\SharkHCShark.exeCode function: 0_2_6D3F76E00_2_6D3F76E0
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_02A920693_2_02A92069
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_02BBEF383_2_02BBEF38
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_02BBEF283_2_02BBEF28
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeCode function: 3_2_02BBCF543_2_02BBCF54
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess token adjusted: SecurityJump to behavior
                Source: SharkHCShark.exe, 00000000.00000000.2116964133.0000000000ECC000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameIrisDiana776George.mscL vs SharkHCShark.exe
                Source: SharkHCShark.exe, 00000000.00000002.2131097114.000000000160E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs SharkHCShark.exe
                Source: SharkHCShark.exe, 00000000.00000002.2137887935.000000006D41A000.00000004.00000001.01000000.00000006.sdmpBinary or memory string: OriginalFilenameCoverlid.exe" vs SharkHCShark.exe
                Source: SharkHCShark.exeBinary or memory string: OriginalFilenameIrisDiana776George.mscL vs SharkHCShark.exe
                Source: SharkHCShark.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: 3.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                Source: 0.2.SharkHCShark.exe.6d41a000.2.raw.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                Source: 0.2.SharkHCShark.exe.6d41a000.2.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                Source: 0.2.SharkHCShark.exe.6d3f0000.1.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                Source: 00000000.00000002.2137887935.000000006D41A000.00000004.00000001.01000000.00000006.sdmp, type: MEMORYMatched rule: MALWARE_Win_zgRAT author = ditekSHen, description = Detects zgRAT
                Source: 0.2.SharkHCShark.exe.6d41a000.2.raw.unpack, Strings.csCryptographic APIs: 'CreateDecryptor'
                Source: 0.2.SharkHCShark.exe.6d41a000.2.raw.unpack, BjJ.csCryptographic APIs: 'TransformFinalBlock'
                Source: 0.2.SharkHCShark.exe.6d41a000.2.raw.unpack, DiQ.csCryptographic APIs: 'CreateDecryptor'
                Source: 0.2.SharkHCShark.exe.6d41a000.2.raw.unpack, Strings.csBase64 encoded string: 'GS8nOSoENDQhFRISOAEyPDcLJig1PRkUJz4BVj4TOBknNToIDApYSxkFIBs9MTwPNRIjHjldHCQ9M1xE'
                Source: classification engineClassification label: mal100.troj.evad.winEXE@4/3@0/0
                Source: C:\Users\user\Desktop\SharkHCShark.exeFile created: C:\Users\user\AppData\Roaming\d3d9x.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMutant created: NULL
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3224:120:WilError_03
                Source: SharkHCShark.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: SharkHCShark.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                Source: C:\Users\user\Desktop\SharkHCShark.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: SharkHCShark.exeVirustotal: Detection: 45%
                Source: unknownProcess created: C:\Users\user\Desktop\SharkHCShark.exe "C:\Users\user\Desktop\SharkHCShark.exe"
                Source: C:\Users\user\Desktop\SharkHCShark.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: C:\Users\user\Desktop\SharkHCShark.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                Source: C:\Users\user\Desktop\SharkHCShark.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"Jump to behavior
                Source: C:\Users\user\Desktop\SharkHCShark.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Users\user\Desktop\SharkHCShark.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\SharkHCShark.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\SharkHCShark.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\SharkHCShark.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\SharkHCShark.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\SharkHCShark.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Users\user\Desktop\SharkHCShark.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\SharkHCShark.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: mscoree.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: dwrite.dllJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeSection loaded: textshaping.dllJump to behavior
                Source: SharkHCShark.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: SharkHCShark.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                Data Obfuscation

                barindex
                Source: 0.2.SharkHCShark.exe.6d41a000.2.raw.unpack, DiQ.cs.Net Code: typeof(Marshal).GetMethod("GetDelegateForFunctionPointer", new Type[2]{typeof(IntPtr),typeof(Type)})
                Source: 0.2.SharkHCShark.exe.6d41a000.2.raw.unpack, jFP.cs.Net Code: D4w
                Source: 0.2.SharkHCShark.exe.6d41a000.2.raw.unpack, jFP.cs.Net Code: eBW
                Source: d3d9x.dll.0.drStatic PE information: section name: ."D9
                Source: C:\Users\user\Desktop\SharkHCShark.exeCode function: 0_2_6D412534 push ecx; ret 0_2_6D412547
                Source: SharkHCShark.exeStatic PE information: section name: .text entropy: 7.109273724380006
                Source: d3d9x.dll.0.drStatic PE information: section name: .text entropy: 6.834247127694947
                Source: 0.2.SharkHCShark.exe.6d41a000.2.raw.unpack, jFP.csHigh entropy of concatenated method names: 'PEZ', 'FEA', 'zER', 'JEQ', 'eEy', 'JE0', 'qEJ', 'BFf', 'JEb', 'CEX'
                Source: C:\Users\user\Desktop\SharkHCShark.exeFile created: C:\Users\user\AppData\Roaming\d3d9x.dllJump to dropped file
                Source: C:\Users\user\Desktop\SharkHCShark.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SharkHCShark.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SharkHCShark.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SharkHCShark.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SharkHCShark.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SharkHCShark.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SharkHCShark.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SharkHCShark.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SharkHCShark.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SharkHCShark.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SharkHCShark.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SharkHCShark.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SharkHCShark.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SharkHCShark.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\SharkHCShark.exeMemory allocated: 1850000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\SharkHCShark.exeMemory allocated: 32B0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\SharkHCShark.exeMemory allocated: 1850000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\SharkHCShark.exeMemory allocated: 57F0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\SharkHCShark.exeMemory allocated: 67F0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\SharkHCShark.exeMemory allocated: 6920000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\SharkHCShark.exeMemory allocated: 7920000 memory reserve | memory write watchJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMemory allocated: 2A50000 memory reserve | memory write watchJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMemory allocated: 2CE0000 memory reserve | memory write watchJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeMemory allocated: 2AF0000 memory reserve | memory write watchJump to behavior
                Source: C:\Users\user\Desktop\SharkHCShark.exeCode function: 0_2_6D3FA674 rdtsc 0_2_6D3FA674
                Source: C:\Users\user\Desktop\SharkHCShark.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\SharkHCShark.exeDropped PE file which has not been started: C:\Users\user\AppData\Roaming\d3d9x.dllJump to dropped file
                Source: C:\Users\user\Desktop\SharkHCShark.exeAPI coverage: 9.9 %
                Source: C:\Users\user\Desktop\SharkHCShark.exe TID: 992Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe TID: 1836Thread sleep time: -922337203685477s >= -30000sJump to behavior
                Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
                Source: C:\Users\user\Desktop\SharkHCShark.exeCode function: 0_2_6D40B868 FindFirstFileExW,0_2_6D40B868
                Source: C:\Users\user\Desktop\SharkHCShark.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeThread delayed: delay time: 922337203685477Jump to behavior
                Source: C:\Users\user\Desktop\SharkHCShark.exeCode function: 0_2_6D3FA674 rdtsc 0_2_6D3FA674
                Source: C:\Users\user\Desktop\SharkHCShark.exeCode function: 0_2_6D40B1B7 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_6D40B1B7
                Source: C:\Users\user\Desktop\SharkHCShark.exeCode function: 0_2_6D406D41 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_6D406D41
                Source: C:\Users\user\Desktop\SharkHCShark.exeCode function: 0_2_6D40B1B7 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_6D40B1B7
                Source: C:\Users\user\Desktop\SharkHCShark.exeCode function: 0_2_6D40721A IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_6D40721A
                Source: C:\Users\user\Desktop\SharkHCShark.exeMemory allocated: page read and write | page guardJump to behavior

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Users\user\Desktop\SharkHCShark.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 400000 protect: page execute and read and writeJump to behavior
                Source: C:\Users\user\Desktop\SharkHCShark.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 400000 value starts with: 4D5AJump to behavior
                Source: C:\Users\user\Desktop\SharkHCShark.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 400000Jump to behavior
                Source: C:\Users\user\Desktop\SharkHCShark.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 402000Jump to behavior
                Source: C:\Users\user\Desktop\SharkHCShark.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 45E000Jump to behavior
                Source: C:\Users\user\Desktop\SharkHCShark.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: 474000Jump to behavior
                Source: C:\Users\user\Desktop\SharkHCShark.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe base: B5B008Jump to behavior
                Source: C:\Users\user\Desktop\SharkHCShark.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"Jump to behavior
                Source: C:\Users\user\Desktop\SharkHCShark.exeCode function: 0_2_6D4073D8 cpuid 0_2_6D4073D8
                Source: C:\Users\user\Desktop\SharkHCShark.exeQueries volume information: C:\Users\user\Desktop\SharkHCShark.exe VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\SharkHCShark.exeCode function: 0_2_6D406E63 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_6D406E63
                Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 3.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.SharkHCShark.exe.6d41a000.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.SharkHCShark.exe.6d41a000.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.SharkHCShark.exe.6d3f0000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000003.00000002.2125917148.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.2137887935.000000006D41A000.00000004.00000001.01000000.00000006.sdmp, type: MEMORY
                Source: Yara matchFile source: 3.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.SharkHCShark.exe.6d41a000.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.SharkHCShark.exe.6d41a000.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.SharkHCShark.exe.6d3f0000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.2137887935.000000006D41A000.00000004.00000001.01000000.00000006.sdmp, type: MEMORY

                Remote Access Functionality

                barindex
                Source: Yara matchFile source: 3.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.SharkHCShark.exe.6d41a000.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.SharkHCShark.exe.6d41a000.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.SharkHCShark.exe.6d3f0000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000003.00000002.2125917148.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000000.00000002.2137887935.000000006D41A000.00000004.00000001.01000000.00000006.sdmp, type: MEMORY
                Source: Yara matchFile source: 3.2.MSBuild.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.SharkHCShark.exe.6d41a000.2.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.SharkHCShark.exe.6d41a000.2.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 0.2.SharkHCShark.exe.6d3f0000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000002.2137887935.000000006D41A000.00000004.00000001.01000000.00000006.sdmp, type: MEMORY
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
                DLL Side-Loading
                311
                Process Injection
                1
                Masquerading
                OS Credential Dumping1
                System Time Discovery
                Remote Services11
                Archive Collected Data
                12
                Encrypted Channel
                Exfiltration Over Other Network MediumAbuse Accessibility Features
                CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                DLL Side-Loading
                1
                Disable or Modify Tools
                LSASS Memory2
                Security Software Discovery
                Remote Desktop ProtocolData from Removable Media1
                Application Layer Protocol
                Exfiltration Over BluetoothNetwork Denial of Service
                Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)31
                Virtualization/Sandbox Evasion
                Security Account Manager31
                Virtualization/Sandbox Evasion
                SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook311
                Process Injection
                NTDS1
                File and Directory Discovery
                Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                Deobfuscate/Decode Files or Information
                LSA Secrets23
                System Information Discovery
                SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts21
                Obfuscated Files or Information
                Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items21
                Software Packing
                DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job1
                DLL Side-Loading
                Proc FilesystemSystem Owner/User DiscoveryCloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                SharkHCShark.exe45%VirustotalBrowse
                SharkHCShark.exe100%Joe Sandbox ML
                SourceDetectionScannerLabelLink
                C:\Users\user\AppData\Roaming\d3d9x.dll100%Joe Sandbox ML
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                NameIPActiveMaliciousAntivirus DetectionReputation
                bg.microsoft.map.fastly.net
                199.232.210.172
                truefalse
                  unknown
                  fp2e7a.wpc.phicdn.net
                  192.229.221.95
                  truefalse
                    unknown
                    No contacted IP infos
                    Joe Sandbox version:40.0.0 Tourmaline
                    Analysis ID:1500381
                    Start date and time:2024-08-28 11:16:07 +02:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:0h 5m 33s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Number of analysed new started processes analysed:13
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample name:SharkHCShark.exe
                    Detection:MAL
                    Classification:mal100.troj.evad.winEXE@4/3@0/0
                    EGA Information:
                    • Successful, ratio: 100%
                    HCA Information:
                    • Successful, ratio: 82%
                    • Number of executed functions: 49
                    • Number of non-executed functions: 23
                    Cookbook Comments:
                    • Found application associated with file extension: .exe
                    • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, backgroundTaskHost.exe, svchost.exe
                    • Excluded IPs from analysis (whitelisted): 40.113.103.199, 184.28.90.27, 52.165.165.26, 192.229.221.95, 13.85.23.206, 199.232.210.172, 2.23.209.174, 2.23.209.180, 2.23.209.173, 2.23.209.175, 2.23.209.182, 2.23.209.177, 2.23.209.176, 2.23.209.181, 2.23.209.178, 20.166.126.56
                    • Excluded domains from analysis (whitelisted): www.bing.com, client.wns.windows.com, fs.microsoft.com, slscr.update.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, ctldl.windowsupdate.com, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, www-www.bing.com.trafficmanager.net, fe3cr.delivery.mp.microsoft.com, wns.notify.trafficmanager.net, fe3.delivery.mp.microsoft.com, e86303.dscx.akamaiedge.net, ocsp.digicert.com, www.bing.com.edgekey.net, e16604.g.akamaiedge.net, ocsp.edge.digicert.com, glb.cws.prod.dcat.dsp.trafficmanager.net, sls.update.microsoft.com, prod.fs.microsoft.com.akadns.net, wu-b-net.trafficmanager.net, glb.sls.prod.dcat.dsp.trafficmanager.net
                    • Not all processes where analyzed, report is missing behavior information
                    No simulations
                    No context
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    bg.microsoft.map.fastly.netUploadCustomersTemplate(2).xlsmGet hashmaliciousUnknownBrowse
                    • 199.232.214.172
                    https://en.aiacademy.twGet hashmaliciousUnknownBrowse
                    • 199.232.210.172
                    https://emea.dcv.ms/haHCQHi4RDGet hashmaliciousHTMLPhisherBrowse
                    • 199.232.214.172
                    https://aka.ms/LearnAboutSenderIdentificationGet hashmaliciousHTMLPhisherBrowse
                    • 199.232.214.172
                    http://tekrollindustrial.com.br/wp-includes/kr.html#kh.jang@hyundaimovex.comGet hashmaliciousHTMLPhisherBrowse
                    • 199.232.210.172
                    https://my-apps-885d2a67.azurewebsites.netGet hashmaliciousHTMLPhisherBrowse
                    • 199.232.214.172
                    LX4CUQO8qI.dllGet hashmaliciousCobaltStrikeBrowse
                    • 199.232.210.172
                    ibero.batGet hashmaliciousSilverRatBrowse
                    • 199.232.210.172
                    https://www.wpspublish.com/customer/account/createPassword/?id=28732&token=k5FPAv4ZQlJ0DbFv9HIliRQV9FN7ztvsGet hashmaliciousUnknownBrowse
                    • 199.232.210.172
                    http://wpspublish.comGet hashmaliciousUnknownBrowse
                    • 199.232.214.172
                    fp2e7a.wpc.phicdn.nethttps://en.aiacademy.twGet hashmaliciousUnknownBrowse
                    • 192.229.221.95
                    https://dropbox-files-online.tiiny.site/?token=69090208-80b8-4346-ad00-dfe054582d02=&ci=example@domain.comGet hashmaliciousHTMLPhisherBrowse
                    • 192.229.221.95
                    https://emea.dcv.ms/haHCQHi4RDGet hashmaliciousHTMLPhisherBrowse
                    • 192.229.221.95
                    https://aka.ms/LearnAboutSenderIdentificationGet hashmaliciousHTMLPhisherBrowse
                    • 192.229.221.95
                    http://tekrollindustrial.com.br/wp-includes/kr.html#kh.jang@hyundaimovex.comGet hashmaliciousHTMLPhisherBrowse
                    • 192.229.221.95
                    https://my-apps-885d2a67.azurewebsites.netGet hashmaliciousHTMLPhisherBrowse
                    • 192.229.221.95
                    https://www.wpspublish.com/customer/account/createPassword/?id=28732&token=k5FPAv4ZQlJ0DbFv9HIliRQV9FN7ztvsGet hashmaliciousUnknownBrowse
                    • 192.229.221.95
                    https://bonanzapipeandsteel.marslccs.info/Get hashmaliciousHTMLPhisherBrowse
                    • 192.229.221.95
                    IrisLily673Xander.msc.exeGet hashmaliciousUnknownBrowse
                    • 192.229.221.95
                    http://wpspublish.comGet hashmaliciousUnknownBrowse
                    • 192.229.221.95
                    No context
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    28a2c9bd18a11de089ef85a160da29e4UploadCustomersTemplate(2).xlsmGet hashmaliciousUnknownBrowse
                    • 40.126.31.71
                    https://en.aiacademy.twGet hashmaliciousUnknownBrowse
                    • 40.126.31.71
                    file.exeGet hashmaliciousUnknownBrowse
                    • 40.126.31.71
                    https://dropbox-files-online.tiiny.site/?token=69090208-80b8-4346-ad00-dfe054582d02=&ci=example@domain.comGet hashmaliciousHTMLPhisherBrowse
                    • 40.126.31.71
                    https://emea.dcv.ms/haHCQHi4RDGet hashmaliciousHTMLPhisherBrowse
                    • 40.126.31.71
                    https://aka.ms/LearnAboutSenderIdentificationGet hashmaliciousHTMLPhisherBrowse
                    • 40.126.31.71
                    file.exeGet hashmaliciousUnknownBrowse
                    • 40.126.31.71
                    http://tekrollindustrial.com.br/wp-includes/kr.html#kh.jang@hyundaimovex.comGet hashmaliciousHTMLPhisherBrowse
                    • 40.126.31.71
                    file.exeGet hashmaliciousUnknownBrowse
                    • 40.126.31.71
                    https://my-apps-885d2a67.azurewebsites.netGet hashmaliciousHTMLPhisherBrowse
                    • 40.126.31.71
                    No context
                    Process:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                    File Type:ASCII text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):1119
                    Entropy (8bit):5.345080863654519
                    Encrypted:false
                    SSDEEP:24:MLUE4K5E4KH1qE4qXKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4j:MIHK5HKH1qHiYHKh3oPtHo6hAHKze0Hj
                    MD5:88593431AEF401417595E7A00FE86E5F
                    SHA1:1714B8F6F6DCAAB3F3853EDABA7687F16DD331F4
                    SHA-256:ED5E60336FB00579E0867B9615CBD0C560BB667FE3CEE0674F690766579F1032
                    SHA-512:1D442441F96E69D8A6D5FB7E8CF01F13AF88CA2C2D0960120151B15505DD1CADC607EF9983373BA8E422C65FADAB04A615968F335A875B5C075BB9A6D0F346C9
                    Malicious:false
                    Reputation:moderate, very likely benign file
                    Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\2062ed810929ec0e33254c02
                    Process:C:\Users\user\Desktop\SharkHCShark.exe
                    File Type:ASCII text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):42
                    Entropy (8bit):4.0050635535766075
                    Encrypted:false
                    SSDEEP:3:QHXMKa/xwwUy:Q3La/xwQ
                    MD5:84CFDB4B995B1DBF543B26B86C863ADC
                    SHA1:D2F47764908BF30036CF8248B9FF5541E2711FA2
                    SHA-256:D8988D672D6915B46946B28C06AD8066C50041F6152A91D37FFA5CF129CC146B
                    SHA-512:485F0ED45E13F00A93762CBF15B4B8F996553BAA021152FAE5ABA051E3736BCD3CA8F4328F0E6D9E3E1F910C96C4A9AE055331123EE08E3C2CE3A99AC2E177CE
                    Malicious:true
                    Reputation:high, very likely benign file
                    Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..
                    Process:C:\Users\user\Desktop\SharkHCShark.exe
                    File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                    Category:dropped
                    Size (bytes):671232
                    Entropy (8bit):6.633422160662858
                    Encrypted:false
                    SSDEEP:12288:UepXIlZt+s6qg/FVbVejhhQR8jNUXPeqH3XKxceRjmuou7So3scqbQJyzywyIyrH:VpMC67QR8jNUXPeqH3XKxceRjmuou7SR
                    MD5:5EA2EABB109B3734949E5EEA224D93FE
                    SHA1:2530257875E917CA87DADACE1B2C82C7876DB3F5
                    SHA-256:42F1743D0CBC771D2E74A0C0F6DFAA75DC0734AF80F6A7F8FB09304D8FF486CE
                    SHA-512:D8CBCC93A8DF6C8A4738F79BD2A2AA5882F1F59384A2FE13951256A2D6A5C4C29E01B8F9DA042DFDF0CEDAA4028CBD4247F059DEFB7994340D5BF8C17ACC643A
                    Malicious:true
                    Antivirus:
                    • Antivirus: Joe Sandbox ML, Detection: 100%
                    Reputation:low
                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....n.f...........!...&.............m.......0...............................p............@.........................@...x.......<............................P..........................................@............0..L............................text............................... ..`.rdata..Bh...0...j..................@..@.data...\...........................@...."D9............................... ..`.reloc.......P.......$..............@..B........................................................................................................................................................................................................................................................................................................................................................................................................................................
                    File type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                    Entropy (8bit):7.1026902111809305
                    TrID:
                    • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                    • Win32 Executable (generic) a (10002005/4) 49.78%
                    • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                    • Generic Win/DOS Executable (2004/3) 0.01%
                    • DOS Executable Generic (2002/1) 0.01%
                    File name:SharkHCShark.exe
                    File size:692'736 bytes
                    MD5:1714616095f0d3f62aac384222620ad5
                    SHA1:31412d21c22f20efa0f5f57b45842d1df6db0c11
                    SHA256:4788d6606f23c828bbaaad8f8d3418fa86d704fc35aabebd48db7de370fb0f3b
                    SHA512:cebc07a2990261d28286f93c856c1e81282e9e99d19905181acde53a7add4add980180296647784309b9947d52c06a69b916955c2382cc6aacf5a425d345861e
                    SSDEEP:12288:n6CpQpr4Aqyt0MbXYgDq+qh58WcYrFmYqMdCN1VXmdWnSRv/MEkqI9zDVATDNTkT:nHpCr4Ryt9S+qRcS
                    TLSH:CEE481DD365072DFC85BC8728AA81D64FB6078BB471F9203A0671AED9A4D897CF140F2
                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....n.f............................N.... ........@.. ....................................@................................
                    Icon Hash:00928e8e8686b000
                    Entrypoint:0x4aa44e
                    Entrypoint Section:.text
                    Digitally signed:false
                    Imagebase:0x400000
                    Subsystem:windows cui
                    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                    Time Stamp:0x66CD6EDD [Tue Aug 27 06:14:53 2024 UTC]
                    TLS Callbacks:
                    CLR (.Net) Version:
                    OS Version Major:4
                    OS Version Minor:0
                    File Version Major:4
                    File Version Minor:0
                    Subsystem Version Major:4
                    Subsystem Version Minor:0
                    Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                    Instruction
                    jmp dword ptr [00402000h]
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    NameVirtual AddressVirtual Size Is in Section
                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IMPORT0xaa4000x4b.text
                    IMAGE_DIRECTORY_ENTRY_RESOURCE0xac0000x6e0.rsrc
                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                    IMAGE_DIRECTORY_ENTRY_BASERELOC0xae0000xc.reloc
                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                    .text0x20000xa84540xa860079652f311e8eb2c78bcf248c50897df9False0.6921674902561247data7.109273724380006IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    .rsrc0xac0000x6e00x8000f305f75fae84c0c92204b16651bd7e6False0.36328125data3.730028585773052IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    .reloc0xae0000xc0x200337dca95d200f00340d74d9aa51162ceFalse0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                    NameRVASizeTypeLanguageCountryZLIB Complexity
                    RT_VERSION0xac0a00x454data0.39620938628158847
                    RT_MANIFEST0xac4f40x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5469387755102041
                    DLLImport
                    mscoree.dll_CorExeMain
                    TimestampSource PortDest PortSource IPDest IP
                    Aug 28, 2024 11:16:57.383944035 CEST49674443192.168.2.6173.222.162.64
                    Aug 28, 2024 11:16:57.383997917 CEST49673443192.168.2.6173.222.162.64
                    Aug 28, 2024 11:16:57.712035894 CEST49672443192.168.2.6173.222.162.64
                    Aug 28, 2024 11:17:06.993275881 CEST49674443192.168.2.6173.222.162.64
                    Aug 28, 2024 11:17:06.993275881 CEST49673443192.168.2.6173.222.162.64
                    Aug 28, 2024 11:17:07.321420908 CEST49672443192.168.2.6173.222.162.64
                    Aug 28, 2024 11:17:08.992367983 CEST44349705173.222.162.64192.168.2.6
                    Aug 28, 2024 11:17:08.992465973 CEST49705443192.168.2.6173.222.162.64
                    Aug 28, 2024 11:17:24.950434923 CEST49722443192.168.2.640.126.31.71
                    Aug 28, 2024 11:17:24.950479984 CEST4434972240.126.31.71192.168.2.6
                    Aug 28, 2024 11:17:24.950592041 CEST49722443192.168.2.640.126.31.71
                    Aug 28, 2024 11:17:24.950730085 CEST49722443192.168.2.640.126.31.71
                    Aug 28, 2024 11:17:24.950741053 CEST4434972240.126.31.71192.168.2.6
                    Aug 28, 2024 11:17:25.724553108 CEST4434972240.126.31.71192.168.2.6
                    Aug 28, 2024 11:17:25.724646091 CEST49722443192.168.2.640.126.31.71
                    Aug 28, 2024 11:17:25.738322973 CEST49722443192.168.2.640.126.31.71
                    Aug 28, 2024 11:17:25.738334894 CEST4434972240.126.31.71192.168.2.6
                    Aug 28, 2024 11:17:25.738610983 CEST4434972240.126.31.71192.168.2.6
                    Aug 28, 2024 11:17:25.739062071 CEST49722443192.168.2.640.126.31.71
                    Aug 28, 2024 11:17:25.739110947 CEST49722443192.168.2.640.126.31.71
                    Aug 28, 2024 11:17:25.739125013 CEST4434972240.126.31.71192.168.2.6
                    Aug 28, 2024 11:17:26.125813961 CEST4434972240.126.31.71192.168.2.6
                    Aug 28, 2024 11:17:26.125837088 CEST4434972240.126.31.71192.168.2.6
                    Aug 28, 2024 11:17:26.125878096 CEST4434972240.126.31.71192.168.2.6
                    Aug 28, 2024 11:17:26.125894070 CEST49722443192.168.2.640.126.31.71
                    Aug 28, 2024 11:17:26.125912905 CEST4434972240.126.31.71192.168.2.6
                    Aug 28, 2024 11:17:26.125937939 CEST49722443192.168.2.640.126.31.71
                    Aug 28, 2024 11:17:26.125976086 CEST4434972240.126.31.71192.168.2.6
                    Aug 28, 2024 11:17:26.126033068 CEST49722443192.168.2.640.126.31.71
                    Aug 28, 2024 11:17:26.126338959 CEST49722443192.168.2.640.126.31.71
                    Aug 28, 2024 11:17:26.126363993 CEST4434972240.126.31.71192.168.2.6
                    Aug 28, 2024 11:17:26.126389980 CEST49722443192.168.2.640.126.31.71
                    Aug 28, 2024 11:17:26.126396894 CEST4434972240.126.31.71192.168.2.6
                    Aug 28, 2024 11:18:37.197204113 CEST4970480192.168.2.62.19.126.137
                    Aug 28, 2024 11:18:37.202689886 CEST80497042.19.126.137192.168.2.6
                    Aug 28, 2024 11:18:37.202738047 CEST4970480192.168.2.62.19.126.137
                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                    Aug 28, 2024 11:17:18.081985950 CEST1.1.1.1192.168.2.60x5b50No error (0)fp2e7a.wpc.2be4.phicdn.netfp2e7a.wpc.phicdn.netCNAME (Canonical name)IN (0x0001)false
                    Aug 28, 2024 11:17:18.081985950 CEST1.1.1.1192.168.2.60x5b50No error (0)fp2e7a.wpc.phicdn.net192.229.221.95A (IP address)IN (0x0001)false
                    Aug 28, 2024 11:17:19.342850924 CEST1.1.1.1192.168.2.60x21d0No error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
                    Aug 28, 2024 11:17:19.342850924 CEST1.1.1.1192.168.2.60x21d0No error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
                    Aug 28, 2024 11:18:19.058285952 CEST1.1.1.1192.168.2.60x923eNo error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
                    Aug 28, 2024 11:18:19.058285952 CEST1.1.1.1192.168.2.60x923eNo error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false

                    Click to jump to process

                    Click to jump to process

                    Click to dive into process behavior distribution

                    Click to jump to process

                    Target ID:0
                    Start time:05:16:59
                    Start date:28/08/2024
                    Path:C:\Users\user\Desktop\SharkHCShark.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\Desktop\SharkHCShark.exe"
                    Imagebase:0xe20000
                    File size:692'736 bytes
                    MD5 hash:1714616095F0D3F62AAC384222620AD5
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_zgRAT_1, Description: Yara detected zgRAT, Source: 00000000.00000002.2137887935.000000006D41A000.00000004.00000001.01000000.00000006.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000000.00000002.2137887935.000000006D41A000.00000004.00000001.01000000.00000006.sdmp, Author: Joe Security
                    • Rule: MALWARE_Win_zgRAT, Description: Detects zgRAT, Source: 00000000.00000002.2137887935.000000006D41A000.00000004.00000001.01000000.00000006.sdmp, Author: ditekSHen
                    Reputation:low
                    Has exited:true

                    Target ID:1
                    Start time:05:16:59
                    Start date:28/08/2024
                    Path:C:\Windows\System32\conhost.exe
                    Wow64 process (32bit):false
                    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                    Imagebase:0x7ff66e660000
                    File size:862'208 bytes
                    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:true

                    Target ID:3
                    Start time:05:17:00
                    Start date:28/08/2024
                    Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"
                    Imagebase:0x8e0000
                    File size:262'432 bytes
                    MD5 hash:8FDF47E0FF70C40ED3A17014AEEA4232
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_PureLogStealer, Description: Yara detected PureLog Stealer, Source: 00000003.00000002.2125917148.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                    Reputation:high
                    Has exited:true

                    Reset < >

                      Execution Graph

                      Execution Coverage:2.5%
                      Dynamic/Decrypted Code Coverage:0%
                      Signature Coverage:41.5%
                      Total number of Nodes:65
                      Total number of Limit Nodes:5
                      execution_graph 69946 6d411400 20 API calls __startOneArgErrorHandling 69923 6d408247 14 API calls ___std_exception_copy 69947 6d406f07 15 API calls ___std_type_info_destroy_list 69924 6d40704b 21 API calls 2 library calls 69925 6d40a6cb 6 API calls 69929 6d40ec4f 15 API calls __freea 69931 6d40cf55 FreeLibrary 69949 6d40a69b 68 API calls 69933 6d40bd5c 32 API calls 2 library calls 69934 6d40ca5f 20 API calls __freea 69951 6d40b0a2 7 API calls 69936 6d406e63 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 69952 6d40cfa6 32 API calls 69937 6d40cd69 6 API calls _unexpected 69938 6d40b6eb 46 API calls 3 library calls 69953 6d407fac 49 API calls _unexpected 69939 6d4101ef 69 API calls ___std_exception_copy 69889 6d3f1410 69906 6d3f1438 __FrameHandler3::FrameUnwindToState CatchIt 69889->69906 69890 6d3f7013 CloseHandle CloseHandle 69890->69906 69891 6d3f642e GetModuleHandleA 69891->69906 69892 6d3f7448 K32GetModuleInformation GetModuleFileNameA CreateFileA 69892->69906 69893 6d3f6ff3 FindCloseChangeNotification 69893->69906 69894 6d3f6579 K32GetModuleInformation GetModuleFileNameA CreateFileA 69894->69906 69895 6d3f7044 69908 6d4069d0 5 API calls CatchGuardHandler 69895->69908 69897 6d3f704e 69898 6d3f63e6 GetCurrentProcess 69898->69906 69899 6d3f6882 CloseHandle 69899->69906 69900 6d3f68b1 MapViewOfFile 69900->69906 69901 6d3f680b CreateFileMappingA 69901->69906 69902 6d3f7571 VirtualProtect 69909 6d407730 69902->69909 69904 6d3f760f VirtualProtect 69904->69906 69905 6d3f6bf0 VirtualProtect 69905->69906 69906->69890 69906->69891 69906->69892 69906->69893 69906->69894 69906->69895 69906->69898 69906->69899 69906->69900 69906->69901 69906->69902 69906->69905 69907 6d3f6c8e VirtualProtect 69906->69907 69907->69906 69908->69897 69910 6d407748 69909->69910 69910->69904 69910->69910 69911 6d3f7fd0 69914 6d3f7fef 69911->69914 69912 6d3f80db GetModuleHandleW 69913 6d3f8126 __FrameHandler3::FrameUnwindToState 69912->69913 69913->69914 69914->69912 69915 6d3f82ac 69914->69915 69918 6d3f8168 NtQueryInformationProcess 69914->69918 69919 6d4069d0 5 API calls CatchGuardHandler 69915->69919 69917 6d3f82bc 69918->69914 69919->69917 69940 6d3f1010 5 API calls CatchGuardHandler 69941 6d407cf0 6 API calls 4 library calls 69954 6d40e6b0 39 API calls 69942 6d410b70 15 API calls 69956 6d4091b3 52 API calls 3 library calls 69957 6d4070b4 4 API calls 2 library calls 69876 6d3faf08 69877 6d3f9989 69876->69877 69880 6d3f87cd 69876->69880 69878 6d48bed3 VirtualAllocEx 69877->69878 69877->69880 69879 6d3fac06 69878->69879 69878->69880 69879->69880 69944 6d4088f8 6 API calls ___vcrt_FlsGetValue 69881 6d40707b 69882 6d407084 69881->69882 69887 6d4073d8 IsProcessorFeaturePresent 69882->69887 69884 6d407090 69888 6d407ead 9 API calls 2 library calls 69884->69888 69886 6d407095 69887->69884 69888->69886 69958 6d409ebb 53 API calls 3 library calls 69959 6d4092be 29 API calls std::exception::exception
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2137809306.000000006D3F1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6D3F0000, based on PE: true
                      • Associated: 00000000.00000002.2137794265.000000006D3F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2137865059.000000006D413000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2137887935.000000006D41A000.00000004.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2138029437.000000006D48B000.00000020.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2138060617.000000006D495000.00000002.00000001.01000000.00000006.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6d3f0000_SharkHCShark.jbxd
                      Yara matches
                      Similarity
                      • API ID: File$Module$CloseHandleProtectVirtual$Create$InformationName$ChangeCurrentFindMappingNotificationProcessView
                      • String ID: %|m$%|m$)M4$1:2$$1:2$$@$Rm?$Rm?$WiC#$[H=P$\,r$\,r$h[Rn$n?\
                      • API String ID: 3371177692-160575036
                      • Opcode ID: 275158fb2ba4492c987598f72b19f4c35f8d1f2f9398185fb4f92e338592391f
                      • Instruction ID: 159f0d510962772aec25526de83e7a739812a2a9e889caf2302bd109122cdccd
                      • Opcode Fuzzy Hash: 275158fb2ba4492c987598f72b19f4c35f8d1f2f9398185fb4f92e338592391f
                      • Instruction Fuzzy Hash: DEB3F171A5421ACFCB15CE3CC9867E9B7F2BB43312F109689D518DB3A4C6369D8A8F11

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 3134 6d3f7fd0-6d3f7fe8 3135 6d3f7fef-6d3f7ffa 3134->3135 3136 6d3f82c6-6d3f82c9 3135->3136 3137 6d3f8000-6d3f800d 3135->3137 3138 6d3f82d0 3136->3138 3140 6d3f80db-6d3f8163 GetModuleHandleW call 6d3f76e0 call 6d4075d0 3137->3140 3141 6d3f8013-6d3f8020 3137->3141 3138->3135 3140->3138 3144 6d3f828e-6d3f8295 3141->3144 3145 6d3f8026-6d3f8033 3141->3145 3144->3138 3149 6d3f81fa-6d3f824c 3145->3149 3150 6d3f8039-6d3f8046 3145->3150 3149->3138 3153 6d3f82ac-6d3f82c5 call 6d4069d0 3150->3153 3154 6d3f804c-6d3f8059 3150->3154 3158 6d3f805f-6d3f806c 3154->3158 3159 6d3f8168-6d3f81af NtQueryInformationProcess 3154->3159 3161 6d3f8072-6d3f807f 3158->3161 3162 6d3f8251-6d3f8258 3158->3162 3159->3138 3164 6d3f829a-6d3f82a7 3161->3164 3165 6d3f8085-6d3f8092 3161->3165 3162->3138 3164->3138 3167 6d3f8098-6d3f80a5 3165->3167 3168 6d3f81b4-6d3f81f5 3165->3168 3170 6d3f825d-6d3f826a 3167->3170 3171 6d3f80ab-6d3f80b8 3167->3171 3168->3138 3170->3138 3173 6d3f826f-6d3f8276 3171->3173 3174 6d3f80be-6d3f80cb 3171->3174 3173->3138 3176 6d3f827b-6d3f8289 3174->3176 3177 6d3f80d1-6d3f80d6 3174->3177 3176->3138 3177->3138
                      APIs
                      • GetModuleHandleW.KERNEL32(?,?,?,?,?,?,?), ref: 6D3F8109
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2137809306.000000006D3F1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6D3F0000, based on PE: true
                      • Associated: 00000000.00000002.2137794265.000000006D3F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2137865059.000000006D413000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2137887935.000000006D41A000.00000004.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2138029437.000000006D48B000.00000020.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2138060617.000000006D495000.00000002.00000001.01000000.00000006.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6d3f0000_SharkHCShark.jbxd
                      Yara matches
                      Similarity
                      • API ID: HandleModule
                      • String ID: NtQueryInformationProcess$ntdll.dll
                      • API String ID: 4139908857-2906145389
                      • Opcode ID: 24b808152e2a485d3b9ddf58b11710418aec045d9a7269dfd693e78cca36e72e
                      • Instruction ID: fd208501c36ff7c32303152d441cf73fe41abf24043ab27018c5bf72b1c32e43
                      • Opcode Fuzzy Hash: 24b808152e2a485d3b9ddf58b11710418aec045d9a7269dfd693e78cca36e72e
                      • Instruction Fuzzy Hash: CE815AB1A1420AAFCF08CFADD5856DEBBF5BF49340F00811AE511EB354D6399905CFA2

                      Control-flow Graph

                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2137809306.000000006D3F1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6D3F0000, based on PE: true
                      • Associated: 00000000.00000002.2137794265.000000006D3F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2137865059.000000006D413000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2137887935.000000006D41A000.00000004.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2138029437.000000006D48B000.00000020.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2138060617.000000006D495000.00000002.00000001.01000000.00000006.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6d3f0000_SharkHCShark.jbxd
                      Yara matches
                      Similarity
                      • API ID: AllocVirtual
                      • String ID: "$-:p$-L2Rh-$-M$/M6t$6$;$@$l$f$ #$ P$!+$"&$"J$#"$#%$#d$'$(D$(M$*~$+$++$,I$.N$/S$/|$/~$02$0V$2p$32$3^$4$4B$5%$72$7C$8-$83$8E$98$:1$:G$<^$<e$><$>h$?8$@ $@f$C;$DJ$Ew$F)$F4$F[$H;$I>$Ki$O<$Pb$QK$R#$Ra$Rk$V$W:$X>$XW$Y$YP$ZD$Zc$[9$[I$\X$],$]-$]H$^'$cR$dU$d^$dm$e>$fP$i&$ia$j1$k;$k<$m-$mC$of$p5$p5$s!$tz$u$vn$w`$y]$yi$yl$ym$z"$z6${0${l$}($~7$$)$+$2$4$5$F$K$M$R$T$U$^$`$a$m$s${
                      • API String ID: 4275171209-1831446191
                      • Opcode ID: cd9bee08899013b8229ba67924423f8697ba602e7b9a72d647b3c62d42730f32
                      • Instruction ID: b094692a8899b6cfc291701311dcbfa45156019c15a2e7915049dd812128800e
                      • Opcode Fuzzy Hash: cd9bee08899013b8229ba67924423f8697ba602e7b9a72d647b3c62d42730f32
                      • Instruction Fuzzy Hash: 326373319A811BCBC7228E7D8588FA97BB4BB03340F54C292D518FB619C625DF47CB96
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2137809306.000000006D3F1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6D3F0000, based on PE: true
                      • Associated: 00000000.00000002.2137794265.000000006D3F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2137865059.000000006D413000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2137887935.000000006D41A000.00000004.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2138029437.000000006D48B000.00000020.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2138060617.000000006D495000.00000002.00000001.01000000.00000006.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6d3f0000_SharkHCShark.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID: "$-:p$-L2Rh-$-M$/M6t$6$;$l$f$ #$ P$!+$"&$"J$#"$#%$#d$'$(D$(M$*~$+$++$,I$.N$/S$/|$/~$02$0V$2p$32$3^$4$4B$72$7C$8-$83$8E$98$:1$:G$<^$<e$><$>h$?8$@ $@f$C;$DJ$Ew$F)$F4$F[$H;$Ki$O<$Pb$QK$R#$Ra$Rk$V$W:$X>$XW$Y$YP$ZD$Zc$[9$[I$\X$],$]-$]H$^'$cR$dU$d^$dm$e>$fP$i&$j1$k;$k<$m-$mC$of$p5$p5$s!$tz$u$vn$w`$y]$yi$yl$ym$z"$z6${0${l$}($~7$$)$+$4$5$F$K$M$R$T$U$^$`$a$m$s${
                      • API String ID: 0-3895616205
                      • Opcode ID: e5bae1ddb960f12188c21fb7ffa3a1b3e84f863d2834dedc96f15548fa25d30f
                      • Instruction ID: e4a632f0386bc2a856b2ac29ef5d9ed81ff3ab0ade856953613ec2ab0a6b4b4e
                      • Opcode Fuzzy Hash: e5bae1ddb960f12188c21fb7ffa3a1b3e84f863d2834dedc96f15548fa25d30f
                      • Instruction Fuzzy Hash: D56373319A811ACBC7228E7D8988FE87B75BB03340F54C292D518FB619C625DF47CB96
                      APIs
                      • IsProcessorFeaturePresent.KERNEL32(00000017,00000000), ref: 6D407226
                      • IsDebuggerPresent.KERNEL32 ref: 6D4072F2
                      • SetUnhandledExceptionFilter.KERNEL32(00000000), ref: 6D40730B
                      • UnhandledExceptionFilter.KERNEL32(?), ref: 6D407315
                      Memory Dump Source
                      • Source File: 00000000.00000002.2137809306.000000006D3F1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6D3F0000, based on PE: true
                      • Associated: 00000000.00000002.2137794265.000000006D3F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2137865059.000000006D413000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2137887935.000000006D41A000.00000004.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2138029437.000000006D48B000.00000020.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2138060617.000000006D495000.00000002.00000001.01000000.00000006.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6d3f0000_SharkHCShark.jbxd
                      Yara matches
                      Similarity
                      • API ID: ExceptionFilterPresentUnhandled$DebuggerFeatureProcessor
                      • String ID:
                      • API String ID: 254469556-0
                      • Opcode ID: c4d6a58ebcf65a6632fa41dafb235e11617e39fccf99bfca59f222b8f98c3eb0
                      • Instruction ID: d7eabfd642394e03dd3aa43789bcb16632e3bc9f547c781f3bbdc1e9b66c64be
                      • Opcode Fuzzy Hash: c4d6a58ebcf65a6632fa41dafb235e11617e39fccf99bfca59f222b8f98c3eb0
                      • Instruction Fuzzy Hash: E731F675D052199BDF20EFA4D949BCDBBF8AF08304F1041AAE50CAB240EB709E85CF45
                      APIs
                      • SetUnhandledExceptionFilter.KERNEL32(00000000,?,6D406E61,6D413934), ref: 6D406D46
                      • UnhandledExceptionFilter.KERNEL32(?), ref: 6D406D4F
                      • GetCurrentProcess.KERNEL32(C0000409), ref: 6D406D5A
                      • TerminateProcess.KERNEL32(00000000), ref: 6D406D61
                      Memory Dump Source
                      • Source File: 00000000.00000002.2137809306.000000006D3F1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6D3F0000, based on PE: true
                      • Associated: 00000000.00000002.2137794265.000000006D3F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2137865059.000000006D413000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2137887935.000000006D41A000.00000004.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2138029437.000000006D48B000.00000020.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2138060617.000000006D495000.00000002.00000001.01000000.00000006.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6d3f0000_SharkHCShark.jbxd
                      Yara matches
                      Similarity
                      • API ID: ExceptionFilterProcessUnhandled$CurrentTerminate
                      • String ID:
                      • API String ID: 3231755760-0
                      • Opcode ID: 0b7b5b65ae8c1f4e615ac25aac0002094007a4a75348284af07746160580bde9
                      • Instruction ID: 25c1cc35e2ed829417d167ce77ea8fb466b3b13961c71c16d73c6b0d3fae8430
                      • Opcode Fuzzy Hash: 0b7b5b65ae8c1f4e615ac25aac0002094007a4a75348284af07746160580bde9
                      • Instruction Fuzzy Hash: 70D0CA3210020ABBCE003BE0CC0EBA93FB8AB0B256F000000F72A82008CB3189448B61
                      APIs
                      • IsDebuggerPresent.KERNEL32(?,?,?,?,?,?), ref: 6D40B2AF
                      • SetUnhandledExceptionFilter.KERNEL32(00000000,?,?,?,?,?,?), ref: 6D40B2B9
                      • UnhandledExceptionFilter.KERNEL32(?,?,?,?,?,?,?), ref: 6D40B2C6
                      Memory Dump Source
                      • Source File: 00000000.00000002.2137809306.000000006D3F1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6D3F0000, based on PE: true
                      • Associated: 00000000.00000002.2137794265.000000006D3F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2137865059.000000006D413000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2137887935.000000006D41A000.00000004.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2138029437.000000006D48B000.00000020.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2138060617.000000006D495000.00000002.00000001.01000000.00000006.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6d3f0000_SharkHCShark.jbxd
                      Yara matches
                      Similarity
                      • API ID: ExceptionFilterUnhandled$DebuggerPresent
                      • String ID:
                      • API String ID: 3906539128-0
                      • Opcode ID: 0ef718b75305449e6902cb1da1ec4da895df048be8350c34c011089ac7c3ca76
                      • Instruction ID: b1931599ef9d1b846e78f1021fa6bd614430f29f1b42d5771776f6029d533c79
                      • Opcode Fuzzy Hash: 0ef718b75305449e6902cb1da1ec4da895df048be8350c34c011089ac7c3ca76
                      • Instruction Fuzzy Hash: B2319374D012299BCB21DF64D988B9DBBB8BF08314F6041EAE51CA7250E7709F858F49
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2137809306.000000006D3F1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6D3F0000, based on PE: true
                      • Associated: 00000000.00000002.2137794265.000000006D3F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2137865059.000000006D413000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2137887935.000000006D41A000.00000004.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2138029437.000000006D48B000.00000020.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2138060617.000000006D495000.00000002.00000001.01000000.00000006.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6d3f0000_SharkHCShark.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID: IrQ$IrQ
                      • API String ID: 0-3487509776
                      • Opcode ID: c059a8b875c7391225f82b9625e9eb91a9a6fea4ad1fb238ddf46940ec41396d
                      • Instruction ID: 1059a24c24461b16819b522c0e21cba84c7d821e8279fef601da0dd2025baf7e
                      • Opcode Fuzzy Hash: c059a8b875c7391225f82b9625e9eb91a9a6fea4ad1fb238ddf46940ec41396d
                      • Instruction Fuzzy Hash: 8132DDB6E5030A8FDB05CEACC591BED7BF6FB46311F108919E528DB394D23A9906CB50
                      APIs
                      • RaiseException.KERNEL32(C000000D,00000000,00000001,?,?,00000008,?,?,6D411E00,?,?,00000008,?,?,6D411A03,00000000), ref: 6D412032
                      Memory Dump Source
                      • Source File: 00000000.00000002.2137809306.000000006D3F1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6D3F0000, based on PE: true
                      • Associated: 00000000.00000002.2137794265.000000006D3F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2137865059.000000006D413000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2137887935.000000006D41A000.00000004.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2138029437.000000006D48B000.00000020.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2138060617.000000006D495000.00000002.00000001.01000000.00000006.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6d3f0000_SharkHCShark.jbxd
                      Yara matches
                      Similarity
                      • API ID: ExceptionRaise
                      • String ID:
                      • API String ID: 3997070919-0
                      • Opcode ID: 331d50ccf44aa534050ca8fc342260057c45c9eacd1877e594aaa2a86fa4b0a3
                      • Instruction ID: b2917231004e2d99e6d34c3112f9a387b125a838b78d1d41c2919c7a380cce73
                      • Opcode Fuzzy Hash: 331d50ccf44aa534050ca8fc342260057c45c9eacd1877e594aaa2a86fa4b0a3
                      • Instruction Fuzzy Hash: 67B1283122460A9FD715CF28C886B757BE0FF46364F258658E9A9CF2A1C735ED92CB40
                      APIs
                      • IsProcessorFeaturePresent.KERNEL32(0000000A), ref: 6D4073EE
                      Memory Dump Source
                      • Source File: 00000000.00000002.2137809306.000000006D3F1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6D3F0000, based on PE: true
                      • Associated: 00000000.00000002.2137794265.000000006D3F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2137865059.000000006D413000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2137887935.000000006D41A000.00000004.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2138029437.000000006D48B000.00000020.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2138060617.000000006D495000.00000002.00000001.01000000.00000006.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6d3f0000_SharkHCShark.jbxd
                      Yara matches
                      Similarity
                      • API ID: FeaturePresentProcessor
                      • String ID:
                      • API String ID: 2325560087-0
                      • Opcode ID: bf8c7dfb98accff4e740f2e000e38180167058ea22c33278281f722d42de823e
                      • Instruction ID: 43eaeb2d52cf03f1908f3cdcd3527f5b7d4ee2f9457dad8b144510ecb672b949
                      • Opcode Fuzzy Hash: bf8c7dfb98accff4e740f2e000e38180167058ea22c33278281f722d42de823e
                      • Instruction Fuzzy Hash: 44518AB1E196169BEB05CFA4C581BAABBF0FB4A351F24807AC416EB780D379DD00CB51
                      Memory Dump Source
                      • Source File: 00000000.00000002.2137809306.000000006D3F1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6D3F0000, based on PE: true
                      • Associated: 00000000.00000002.2137794265.000000006D3F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2137865059.000000006D413000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2137887935.000000006D41A000.00000004.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2138029437.000000006D48B000.00000020.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2138060617.000000006D495000.00000002.00000001.01000000.00000006.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6d3f0000_SharkHCShark.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: c3c39d19c32a54ac2810f6f757fbc0f7f09505887cc306d65b232c382b103a9f
                      • Instruction ID: 915b0450bb4576b5d453a5bce471049bdabdecc0b8e405cac64749cc458305ff
                      • Opcode Fuzzy Hash: c3c39d19c32a54ac2810f6f757fbc0f7f09505887cc306d65b232c382b103a9f
                      • Instruction Fuzzy Hash: AC4190B5808219AFDB10DF79CC88EAABBB8EF45304F1442EDE459A3210DB359E848F54
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2137809306.000000006D3F1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6D3F0000, based on PE: true
                      • Associated: 00000000.00000002.2137794265.000000006D3F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2137865059.000000006D413000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2137887935.000000006D41A000.00000004.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2138029437.000000006D48B000.00000020.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2138060617.000000006D495000.00000002.00000001.01000000.00000006.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6d3f0000_SharkHCShark.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID: a>E}
                      • API String ID: 0-798044449
                      • Opcode ID: 3491f2356789f26b0c837018130fda807e778ec270d4b4120135ac2ae1ea256a
                      • Instruction ID: c7a31003f453674e84ddf77a352dcd9a598bc5aa725a0359c092cab59cbc4039
                      • Opcode Fuzzy Hash: 3491f2356789f26b0c837018130fda807e778ec270d4b4120135ac2ae1ea256a
                      • Instruction Fuzzy Hash: DDB127B2A0424A8FCF04CEBCD8817DEB7F6BB8A352F149119C511EB345C33A9806CB65
                      Memory Dump Source
                      • Source File: 00000000.00000002.2137809306.000000006D3F1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6D3F0000, based on PE: true
                      • Associated: 00000000.00000002.2137794265.000000006D3F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2137865059.000000006D413000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2137887935.000000006D41A000.00000004.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2138029437.000000006D48B000.00000020.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2138060617.000000006D495000.00000002.00000001.01000000.00000006.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6d3f0000_SharkHCShark.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 36c34ba34dd5435ab276e82175ebbb1b6c0758d205ecb3163ca4c37e13cd667c
                      • Instruction ID: 6b29bfb1c95ab6cbe6b1c3c4c5deef3465ec0f7b9e1b80ff4f230c21b95a1b1b
                      • Opcode Fuzzy Hash: 36c34ba34dd5435ab276e82175ebbb1b6c0758d205ecb3163ca4c37e13cd667c
                      • Instruction Fuzzy Hash: F5C11BB6A102098FCF0DCE7DC9967DE77F2AB4A331F109219D521E73D4C63A990A8B10
                      APIs
                      • type_info::operator==.LIBVCRUNTIME ref: 6D408D69
                      • ___TypeMatch.LIBVCRUNTIME ref: 6D408E77
                      • CatchIt.LIBVCRUNTIME ref: 6D408EC8
                      • _UnwindNestedFrames.LIBCMT ref: 6D408FC9
                      • CallUnexpected.LIBVCRUNTIME ref: 6D408FE4
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2137809306.000000006D3F1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6D3F0000, based on PE: true
                      • Associated: 00000000.00000002.2137794265.000000006D3F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2137865059.000000006D413000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2137887935.000000006D41A000.00000004.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2138029437.000000006D48B000.00000020.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2138060617.000000006D495000.00000002.00000001.01000000.00000006.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6d3f0000_SharkHCShark.jbxd
                      Yara matches
                      Similarity
                      • API ID: CallCatchFramesMatchNestedTypeUnexpectedUnwindtype_info::operator==
                      • String ID: csm$csm$csm
                      • API String ID: 4119006552-393685449
                      • Opcode ID: e16a664a41db68ec50206e3f8e3b3bd00b2d0f085221b4933cae3e56665d4463
                      • Instruction ID: bb666887ece26e1c69a6389f6923ad227c2be668c4ee4b46dc3202dd1f2f67b7
                      • Opcode Fuzzy Hash: e16a664a41db68ec50206e3f8e3b3bd00b2d0f085221b4933cae3e56665d4463
                      • Instruction Fuzzy Hash: 6AB1467180420AEFCF05EFA4CA80DAEBBB6BF08314B25467AE9146B215D731DE51CBD1
                      APIs
                      • _ValidateLocalCookies.LIBCMT ref: 6D407D27
                      • ___except_validate_context_record.LIBVCRUNTIME ref: 6D407D2F
                      • _ValidateLocalCookies.LIBCMT ref: 6D407DB8
                      • __IsNonwritableInCurrentImage.LIBCMT ref: 6D407DE3
                      • _ValidateLocalCookies.LIBCMT ref: 6D407E38
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2137809306.000000006D3F1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6D3F0000, based on PE: true
                      • Associated: 00000000.00000002.2137794265.000000006D3F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2137865059.000000006D413000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2137887935.000000006D41A000.00000004.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2138029437.000000006D48B000.00000020.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2138060617.000000006D495000.00000002.00000001.01000000.00000006.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6d3f0000_SharkHCShark.jbxd
                      Yara matches
                      Similarity
                      • API ID: CookiesLocalValidate$CurrentImageNonwritable___except_validate_context_record
                      • String ID: csm
                      • API String ID: 1170836740-1018135373
                      • Opcode ID: 67ff2ba41987b9a675a6290ad30c4a9dd0af7b2e806c4958e5567d99ebbf9207
                      • Instruction ID: e976278a74dc2316edf2317333bb2e9ebb31f1212cd3b4f3c53feccc74ed8a01
                      • Opcode Fuzzy Hash: 67ff2ba41987b9a675a6290ad30c4a9dd0af7b2e806c4958e5567d99ebbf9207
                      • Instruction Fuzzy Hash: 0C416034E08599ABCF00DF68C884EAE7BB5AF45318F208169E9155B352D731DD45CBD1
                      APIs
                      • FreeLibrary.KERNEL32(00000000,?,6D40CCC9,00000000,6D40A4D0,00000000,00000000,00000001,?,6D40CE42,00000022,FlsSetValue,6D414CD8,6D414CE0,00000000), ref: 6D40CC7B
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2137809306.000000006D3F1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6D3F0000, based on PE: true
                      • Associated: 00000000.00000002.2137794265.000000006D3F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2137865059.000000006D413000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2137887935.000000006D41A000.00000004.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2138029437.000000006D48B000.00000020.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2138060617.000000006D495000.00000002.00000001.01000000.00000006.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6d3f0000_SharkHCShark.jbxd
                      Yara matches
                      Similarity
                      • API ID: FreeLibrary
                      • String ID: api-ms-$ext-ms-
                      • API String ID: 3664257935-537541572
                      • Opcode ID: 2699334d1383bab39a898be6f6424132910fa75249fcc3bdef9d3c42e6da4437
                      • Instruction ID: 63a1af6ab4644ac9dabdb2ad5ebb7c572be0e60a6efbdc0a4bdfbad66e609248
                      • Opcode Fuzzy Hash: 2699334d1383bab39a898be6f6424132910fa75249fcc3bdef9d3c42e6da4437
                      • Instruction Fuzzy Hash: 5D21D831909112EBDB11AB24DD85F6B3BB99F837A4B224135E925A73C4D730ED05CAE0
                      APIs
                      • GetLastError.KERNEL32(?,?,6D408293,6D407FF0), ref: 6D4082AA
                      • ___vcrt_FlsGetValue.LIBVCRUNTIME ref: 6D4082B8
                      • ___vcrt_FlsSetValue.LIBVCRUNTIME ref: 6D4082D1
                      • SetLastError.KERNEL32(00000000,6D408293,6D407FF0), ref: 6D408323
                      Memory Dump Source
                      • Source File: 00000000.00000002.2137809306.000000006D3F1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6D3F0000, based on PE: true
                      • Associated: 00000000.00000002.2137794265.000000006D3F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2137865059.000000006D413000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2137887935.000000006D41A000.00000004.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2138029437.000000006D48B000.00000020.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2138060617.000000006D495000.00000002.00000001.01000000.00000006.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6d3f0000_SharkHCShark.jbxd
                      Yara matches
                      Similarity
                      • API ID: ErrorLastValue___vcrt_
                      • String ID:
                      • API String ID: 3852720340-0
                      • Opcode ID: 8cfa0a72c9d9827a694f87546e6dfd4a321fb942523f33f2fa61e9d77d42eb53
                      • Instruction ID: 2fb6b8135d2ca6322e4ed3d52699de61a1c30c2ee3484bf607d6da2e34ebd9a4
                      • Opcode Fuzzy Hash: 8cfa0a72c9d9827a694f87546e6dfd4a321fb942523f33f2fa61e9d77d42eb53
                      • Instruction Fuzzy Hash: 9201D83210DB225FEA0137756E85E2F2EBCEB437B9330023DE221926D0EF62CC419280
                      Strings
                      • C:\Users\user\Desktop\SharkHCShark.exe, xrefs: 6D40BE0A
                      Memory Dump Source
                      • Source File: 00000000.00000002.2137809306.000000006D3F1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6D3F0000, based on PE: true
                      • Associated: 00000000.00000002.2137794265.000000006D3F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2137865059.000000006D413000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2137887935.000000006D41A000.00000004.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2138029437.000000006D48B000.00000020.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2138060617.000000006D495000.00000002.00000001.01000000.00000006.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6d3f0000_SharkHCShark.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID: C:\Users\user\Desktop\SharkHCShark.exe
                      • API String ID: 0-3793623226
                      • Opcode ID: b8a0eeb4b2b9ab50f9b09297feb8093313d32794c042c151a3d167149adc1ffd
                      • Instruction ID: 02b2f4846c4fa3de1b8024dfb35c5dd03bcc19da5e7d497a2d536c33091a8499
                      • Opcode Fuzzy Hash: b8a0eeb4b2b9ab50f9b09297feb8093313d32794c042c151a3d167149adc1ffd
                      • Instruction Fuzzy Hash: A9216D71608206AFDB11DF75CC80D6B7BADEF013687218939EB2897240E734ED4187EA
                      APIs
                      • GetModuleHandleExW.KERNEL32(00000000,mscoree.dll,00000000,A1372F1C,00000000,?,00000000,6D412702,000000FF,?,6D409D98,?,?,6D409D6C,?), ref: 6D409E33
                      • GetProcAddress.KERNEL32(00000000,CorExitProcess), ref: 6D409E45
                      • FreeLibrary.KERNEL32(00000000,?,00000000,6D412702,000000FF,?,6D409D98,?,?,6D409D6C,?), ref: 6D409E67
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2137809306.000000006D3F1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6D3F0000, based on PE: true
                      • Associated: 00000000.00000002.2137794265.000000006D3F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2137865059.000000006D413000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2137887935.000000006D41A000.00000004.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2138029437.000000006D48B000.00000020.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2138060617.000000006D495000.00000002.00000001.01000000.00000006.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6d3f0000_SharkHCShark.jbxd
                      Yara matches
                      Similarity
                      • API ID: AddressFreeHandleLibraryModuleProc
                      • String ID: CorExitProcess$mscoree.dll
                      • API String ID: 4061214504-1276376045
                      • Opcode ID: c88333145f0585015d583f01d8c1951d9ecce154ff13680e6dea89a66fa3a457
                      • Instruction ID: 0126aadfee2ffb3de07979957942bf33a894218312071721975a0e7ac3ee35e0
                      • Opcode Fuzzy Hash: c88333145f0585015d583f01d8c1951d9ecce154ff13680e6dea89a66fa3a457
                      • Instruction Fuzzy Hash: CB01623590466ABBDF01AF50CC09FBFBBF9FB05B55F004529E921A2284DB75DE04CA94
                      APIs
                      • EncodePointer.KERNEL32(00000000,?), ref: 6D409014
                      • CatchIt.LIBVCRUNTIME ref: 6D4090FA
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2137809306.000000006D3F1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6D3F0000, based on PE: true
                      • Associated: 00000000.00000002.2137794265.000000006D3F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2137865059.000000006D413000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2137887935.000000006D41A000.00000004.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2138029437.000000006D48B000.00000020.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2138060617.000000006D495000.00000002.00000001.01000000.00000006.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6d3f0000_SharkHCShark.jbxd
                      Yara matches
                      Similarity
                      • API ID: CatchEncodePointer
                      • String ID: MOC$RCC
                      • API String ID: 1435073870-2084237596
                      • Opcode ID: cc929c80a3c362961632a1255f6bd08f0822931968f98a840564854ff83fdad1
                      • Instruction ID: b9e22a833ae5170021e8b1df24bb13fcafe19520d05237cbd36abcc350e61d7e
                      • Opcode Fuzzy Hash: cc929c80a3c362961632a1255f6bd08f0822931968f98a840564854ff83fdad1
                      • Instruction Fuzzy Hash: 22415875A0020AEFDF01DF94CD85EAE7BB5FF49304F298069FA186A211D3769950DB90
                      APIs
                      • LoadLibraryExW.KERNEL32(00000000,00000000,00000800,?,6D408823,00000000,?,00000001,?,?,?,6D408912,00000001,FlsFree,6D4143B0,FlsFree), ref: 6D40887F
                      • GetLastError.KERNEL32(?,6D408823,00000000,?,00000001,?,?,?,6D408912,00000001,FlsFree,6D4143B0,FlsFree,00000000,?,6D408371), ref: 6D408889
                      • LoadLibraryExW.KERNEL32(00000000,00000000,00000000), ref: 6D4088B1
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2137809306.000000006D3F1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6D3F0000, based on PE: true
                      • Associated: 00000000.00000002.2137794265.000000006D3F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2137865059.000000006D413000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2137887935.000000006D41A000.00000004.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2138029437.000000006D48B000.00000020.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2138060617.000000006D495000.00000002.00000001.01000000.00000006.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6d3f0000_SharkHCShark.jbxd
                      Yara matches
                      Similarity
                      • API ID: LibraryLoad$ErrorLast
                      • String ID: api-ms-
                      • API String ID: 3177248105-2084034818
                      • Opcode ID: fbf5662dcaf9ee144e10073c07db8e8f8e598801b75c5aa574882eb02731ffbf
                      • Instruction ID: 99aab60784752fc4ef68b8591bae5c29ec61127a0419686ea6f9d002c64d6940
                      • Opcode Fuzzy Hash: fbf5662dcaf9ee144e10073c07db8e8f8e598801b75c5aa574882eb02731ffbf
                      • Instruction Fuzzy Hash: 38E04F3168420ABBFF503F60DD0AF793FA99B81B64F200070FA4DE81E5E761DD549989
                      APIs
                      • GetConsoleOutputCP.KERNEL32(A1372F1C,00000000,00000000,?), ref: 6D40EFE5
                        • Part of subcall function 6D40C9BC: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,6D40EA20,?,00000000,-00000008), ref: 6D40CA1D
                      • WriteFile.KERNEL32(?,?,00000000,?,00000000), ref: 6D40F237
                      • WriteFile.KERNEL32(?,?,00000001,?,00000000), ref: 6D40F27D
                      • GetLastError.KERNEL32 ref: 6D40F320
                      Memory Dump Source
                      • Source File: 00000000.00000002.2137809306.000000006D3F1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6D3F0000, based on PE: true
                      • Associated: 00000000.00000002.2137794265.000000006D3F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2137865059.000000006D413000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2137887935.000000006D41A000.00000004.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2138029437.000000006D48B000.00000020.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2138060617.000000006D495000.00000002.00000001.01000000.00000006.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6d3f0000_SharkHCShark.jbxd
                      Yara matches
                      Similarity
                      • API ID: FileWrite$ByteCharConsoleErrorLastMultiOutputWide
                      • String ID:
                      • API String ID: 2112829910-0
                      • Opcode ID: 103f10efdddeef65fcf47faed8f665204065e7d159a6e2f5f074f509e2300011
                      • Instruction ID: 975dbd75ef28c0d8d553bb72850460711c5b054acf2a5963bdc78e4031434411
                      • Opcode Fuzzy Hash: 103f10efdddeef65fcf47faed8f665204065e7d159a6e2f5f074f509e2300011
                      • Instruction Fuzzy Hash: CBD16975D052499FCB05CFE8C880AADBBB9FF49314F24457AE926AB341D730AD42CB54
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.2137809306.000000006D3F1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6D3F0000, based on PE: true
                      • Associated: 00000000.00000002.2137794265.000000006D3F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2137865059.000000006D413000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2137887935.000000006D41A000.00000004.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2138029437.000000006D48B000.00000020.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2138060617.000000006D495000.00000002.00000001.01000000.00000006.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6d3f0000_SharkHCShark.jbxd
                      Yara matches
                      Similarity
                      • API ID: AdjustPointer
                      • String ID:
                      • API String ID: 1740715915-0
                      • Opcode ID: 6e251e1ac6811c89d952155af7b391ffaddd4a95e989c2828812dd29785b47a0
                      • Instruction ID: 18b7c4d239cf3e1f0cae494894128c303359476f973c1d77c4a0952d5c5e41d7
                      • Opcode Fuzzy Hash: 6e251e1ac6811c89d952155af7b391ffaddd4a95e989c2828812dd29785b47a0
                      • Instruction Fuzzy Hash: E5519AB2A09602EFEB15AF14CA80F6A77B5EF04314F21453DE91557691EB31EC81CAD0
                      APIs
                        • Part of subcall function 6D40C9BC: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,6D40EA20,?,00000000,-00000008), ref: 6D40CA1D
                      • GetLastError.KERNEL32 ref: 6D40B66C
                      • __dosmaperr.LIBCMT ref: 6D40B673
                      • GetLastError.KERNEL32(?,?,?,?), ref: 6D40B6AD
                      • __dosmaperr.LIBCMT ref: 6D40B6B4
                      Memory Dump Source
                      • Source File: 00000000.00000002.2137809306.000000006D3F1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6D3F0000, based on PE: true
                      • Associated: 00000000.00000002.2137794265.000000006D3F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2137865059.000000006D413000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2137887935.000000006D41A000.00000004.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2138029437.000000006D48B000.00000020.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2138060617.000000006D495000.00000002.00000001.01000000.00000006.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6d3f0000_SharkHCShark.jbxd
                      Yara matches
                      Similarity
                      • API ID: ErrorLast__dosmaperr$ByteCharMultiWide
                      • String ID:
                      • API String ID: 1913693674-0
                      • Opcode ID: 75a53a6284475318ad0ade6f0f5ceea1a4e7824d55a2a01e871374380024be9b
                      • Instruction ID: 71cde75577a8bcee7a4a71fa4197c8ef91ffb1c85efb5705965948df56aefe43
                      • Opcode Fuzzy Hash: 75a53a6284475318ad0ade6f0f5ceea1a4e7824d55a2a01e871374380024be9b
                      • Instruction Fuzzy Hash: BB21C231618206AF9B12DF65C880D7AB7BDFF00368715893CE91997250DB30ED018BE9
                      APIs
                      • GetEnvironmentStringsW.KERNEL32 ref: 6D40CA67
                        • Part of subcall function 6D40C9BC: WideCharToMultiByte.KERNEL32(?,00000000,00000000,00000000,?,-00000008,?,00000000,-00000008,-00000008,00000000,?,6D40EA20,?,00000000,-00000008), ref: 6D40CA1D
                      • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 6D40CA9F
                      • FreeEnvironmentStringsW.KERNEL32(00000000), ref: 6D40CABF
                      Memory Dump Source
                      • Source File: 00000000.00000002.2137809306.000000006D3F1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6D3F0000, based on PE: true
                      • Associated: 00000000.00000002.2137794265.000000006D3F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2137865059.000000006D413000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2137887935.000000006D41A000.00000004.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2138029437.000000006D48B000.00000020.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2138060617.000000006D495000.00000002.00000001.01000000.00000006.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6d3f0000_SharkHCShark.jbxd
                      Yara matches
                      Similarity
                      • API ID: EnvironmentStrings$Free$ByteCharMultiWide
                      • String ID:
                      • API String ID: 158306478-0
                      • Opcode ID: 486b2af92f7f1577a079df081219af99fada2cb870403fe3a12a9e0fdf1dfb22
                      • Instruction ID: cc477d07b96314fbe5b679231f5eed273e3069eab54f44abf636350cf09bb979
                      • Opcode Fuzzy Hash: 486b2af92f7f1577a079df081219af99fada2cb870403fe3a12a9e0fdf1dfb22
                      • Instruction Fuzzy Hash: A411A1B2519526BFAA01E7B54C89E7F2D7CDE962A87110439FA01E1200EF74CD0289F0
                      APIs
                      • WriteConsoleW.KERNEL32(00000000,?,00000000,00000000,00000000,?,6D4100B6,00000000,00000001,00000000,?,?,6D40F374,?,00000000,00000000), ref: 6D41090D
                      • GetLastError.KERNEL32(?,6D4100B6,00000000,00000001,00000000,?,?,6D40F374,?,00000000,00000000,?,?,?,6D40F917,00000000), ref: 6D410919
                        • Part of subcall function 6D4108DF: CloseHandle.KERNEL32(FFFFFFFE,6D410929,?,6D4100B6,00000000,00000001,00000000,?,?,6D40F374,?,00000000,00000000,?,?), ref: 6D4108EF
                      • ___initconout.LIBCMT ref: 6D410929
                        • Part of subcall function 6D4108A1: CreateFileW.KERNEL32(CONOUT$,40000000,00000003,00000000,00000003,00000000,00000000,6D4108D0,6D4100A3,?,?,6D40F374,?,00000000,00000000,?), ref: 6D4108B4
                      • WriteConsoleW.KERNEL32(00000000,?,00000000,00000000,?,6D4100B6,00000000,00000001,00000000,?,?,6D40F374,?,00000000,00000000,?), ref: 6D41093E
                      Memory Dump Source
                      • Source File: 00000000.00000002.2137809306.000000006D3F1000.00000020.00000001.01000000.00000006.sdmp, Offset: 6D3F0000, based on PE: true
                      • Associated: 00000000.00000002.2137794265.000000006D3F0000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2137865059.000000006D413000.00000002.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2137887935.000000006D41A000.00000004.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2138029437.000000006D48B000.00000020.00000001.01000000.00000006.sdmpDownload File
                      • Associated: 00000000.00000002.2138060617.000000006D495000.00000002.00000001.01000000.00000006.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_6d3f0000_SharkHCShark.jbxd
                      Yara matches
                      Similarity
                      • API ID: ConsoleWrite$CloseCreateErrorFileHandleLast___initconout
                      • String ID:
                      • API String ID: 2744216297-0
                      • Opcode ID: 0a4e7c8afbef178c7d39d00c7a7ce2bdcbedbcee52c6e607ae09d08c697f52a6
                      • Instruction ID: 990f2468256dfa0df3b93d43dae4c7eff48c068eb670829d17e6abdf7109f8a2
                      • Opcode Fuzzy Hash: 0a4e7c8afbef178c7d39d00c7a7ce2bdcbedbcee52c6e607ae09d08c697f52a6
                      • Instruction Fuzzy Hash: 95F0F836448119BBCF226F92DC09FAA7F76EF0A7B5B054054FA1C95220C732CC209BD1

                      Execution Graph

                      Execution Coverage:9.8%
                      Dynamic/Decrypted Code Coverage:100%
                      Signature Coverage:0%
                      Total number of Nodes:49
                      Total number of Limit Nodes:3
                      execution_graph 19723 2bbc729 19724 2bbc6ec DuplicateHandle 19723->19724 19726 2bbc732 19723->19726 19725 2bbc6fe 19724->19725 19687 2bba090 19691 2bba188 19687->19691 19699 2bba177 19687->19699 19688 2bba09f 19692 2bba199 19691->19692 19693 2bba1bc 19691->19693 19692->19693 19707 2bba420 19692->19707 19711 2bba410 19692->19711 19693->19688 19694 2bba1b4 19694->19693 19695 2bba3c0 GetModuleHandleW 19694->19695 19696 2bba3ed 19695->19696 19696->19688 19700 2bba199 19699->19700 19702 2bba1bc 19699->19702 19700->19702 19705 2bba420 LoadLibraryExW 19700->19705 19706 2bba410 LoadLibraryExW 19700->19706 19701 2bba1b4 19701->19702 19703 2bba3c0 GetModuleHandleW 19701->19703 19702->19688 19704 2bba3ed 19703->19704 19704->19688 19705->19701 19706->19701 19708 2bba434 19707->19708 19709 2bba459 19708->19709 19715 2bb9e70 19708->19715 19709->19694 19712 2bba434 19711->19712 19713 2bb9e70 LoadLibraryExW 19712->19713 19714 2bba459 19712->19714 19713->19714 19714->19694 19716 2bba600 LoadLibraryExW 19715->19716 19718 2bba679 19716->19718 19718->19709 19719 2bbd150 19720 2bbd17e 19719->19720 19721 2bbd24a KiUserCallbackDispatcher 19720->19721 19722 2bbd24f 19720->19722 19721->19722 19727 2bb37a0 19728 2bb37a9 19727->19728 19729 2bb37b5 19728->19729 19731 2bb39a0 19728->19731 19732 2bb39c5 19731->19732 19736 2bb3a9f 19732->19736 19740 2bb3ab0 19732->19740 19738 2bb3ad7 19736->19738 19737 2bb3bb4 19737->19737 19738->19737 19744 2bb3690 19738->19744 19742 2bb3ad7 19740->19742 19741 2bb3bb4 19742->19741 19743 2bb3690 CreateActCtxA 19742->19743 19743->19741 19745 2bb4f40 CreateActCtxA 19744->19745 19747 2bb5003 19745->19747

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 889 2a92069-2a920d5 895 2a9210a-2a9211c 889->895 896 2a920d7-2a92101 889->896 899 2a921cc-2a9220a 895->899 900 2a92122-2a92145 895->900 896->895 907 2a92103 896->907 919 2a9220c-2a92281 899->919 920 2a92283-2a922bd 899->920 908 2a921bc-2a921c5 900->908 907->895 909 2a9215f-2a92168 908->909 910 2a921c7 908->910 913 2a9216e-2a9218e 909->913 914 2a92841-2a928b8 909->914 912 2a92373-2a923b7 910->912 942 2a923bd-2a923d8 912->942 943 2a92575-2a925a6 912->943 913->914 921 2a92194-2a921b6 913->921 922 2a928ba-2a92991 914->922 923 2a9283c-2a9283e 914->923 937 2a922c4-2a922cf 919->937 920->937 945 2a921b8 921->945 946 2a921bb 921->946 929 2a92993 922->929 930 2a92985-2a92989 922->930 997 2a9292d-2a9297f call 2a92aea 929->997 998 2a92923-2a92927 929->998 937->912 941 2a922d5-2a922de 937->941 941->914 947 2a922e4-2a922fe 941->947 951 2a9255c-2a9256f 942->951 952 2a923de 942->952 943->923 945->946 946->908 976 2a92300-2a92312 947->976 977 2a92334-2a92346 947->977 951->942 951->943 957 2a92519-2a92525 952->957 958 2a9247d-2a924be 952->958 959 2a9243f-2a92478 952->959 960 2a924ee-2a92517 952->960 961 2a924c3-2a924ec 952->961 962 2a92533-2a92555 952->962 963 2a92402-2a9243a 952->963 964 2a923e5-2a923f1 952->964 957->914 970 2a9252b-2a92531 957->970 958->951 959->951 960->951 961->951 962->951 963->951 964->914 968 2a923f7-2a923fd 964->968 968->951 970->951 976->914 982 2a92318-2a92332 976->982 977->914 980 2a9234c-2a9235c 977->980 999 2a92363-2a9236d 980->999 982->999 997->930 998->997 999->912 999->941
                      Memory Dump Source
                      • Source File: 00000003.00000002.2127300694.0000000002A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A90000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_2a90000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 23a92e39c32b5280c2895d804f9d213909ca6205b979ce1f798ee216426e798c
                      • Instruction ID: 078edebf67f5d44bc3db9b07b1b1fac5b154178fbac9aa11fb7d3cad12243efd
                      • Opcode Fuzzy Hash: 23a92e39c32b5280c2895d804f9d213909ca6205b979ce1f798ee216426e798c
                      • Instruction Fuzzy Hash: B5123934A00254DFDB15DB69C894BA9BBF2AF88310F1585D9D90AAB361CE31ED81CF50

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 0 2a91878-2a918b7 1 2a918b9 0->1 2 2a918be-2a918d0 0->2 1->2 4 2a918df-2a918eb 2->4 5 2a918d2 2->5 6 2a918f1-2a918f6 4->6 7 2a91f57 4->7 171 2a918d9 call 2a92069 5->171 172 2a918d9 call 2a925a9 5->172 173 2a918d9 call 2a928b3 5->173 8 2a91929-2a91949 6->8 9 2a918f8-2a91901 6->9 10 2a91f5c-2a91f60 7->10 8->7 16 2a9194f-2a919ef 8->16 9->7 11 2a91907-2a91924 9->11 13 2a91f13-2a91f2a 10->13 14 2a91f62 10->14 15 2a92056-2a9205c 11->15 40 2a91f35-2a91f4c 13->40 17 2a91f69-2a91f86 14->17 18 2a91f8b-2a91fad 14->18 19 2a91fd3-2a91ff2 14->19 20 2a91fb2-2a91fd1 14->20 21 2a91ff4-2a9201a 14->21 22 2a9205e 15->22 23 2a92066 15->23 57 2a919f5-2a91a1f 16->57 39 2a92049-2a92051 17->39 18->39 19->39 20->39 41 2a9201c-2a92033 21->41 42 2a92043 21->42 22->23 27 2a92067 23->27 27->27 39->15 40->7 41->7 47 2a92039-2a92041 41->47 42->39 47->41 47->42 60 2a91bfb-2a91c2c 57->60 61 2a91a25-2a91a31 57->61 68 2a91c2e-2a91c5a 60->68 69 2a91c91-2a91cc2 60->69 61->7 62 2a91a37-2a91a7e 61->62 77 2a91a8b-2a91a97 62->77 78 2a91a80-2a91a89 62->78 85 2a91c5c-2a91c5f 68->85 86 2a91c74-2a91c8f 68->86 83 2a91cc8-2a91d55 69->83 84 2a91db4-2a91de7 69->84 87 2a91a99-2a91a9e 77->87 88 2a91aa3-2a91aaf 77->88 78->77 131 2a91d77-2a91d7a 83->131 132 2a91d57-2a91d75 83->132 89 2a91e39-2a91e7d 84->89 90 2a91de9-2a91e33 84->90 85->86 91 2a91c61-2a91c71 85->91 86->68 86->69 93 2a91be3-2a91bf5 87->93 98 2a91abb-2a91ac7 88->98 99 2a91ab1-2a91ab6 88->99 115 2a91eec-2a91f0e 89->115 116 2a91e7f-2a91eaf 89->116 90->89 91->86 93->60 93->61 107 2a91ac9-2a91ace 98->107 108 2a91ad3-2a91adf 98->108 99->93 107->93 112 2a91aeb-2a91af7 108->112 113 2a91ae1-2a91ae6 108->113 121 2a91af9-2a91afe 112->121 122 2a91b03-2a91b0f 112->122 113->93 115->15 116->40 130 2a91eb5-2a91ebd 116->130 121->93 127 2a91b1b-2a91b27 122->127 128 2a91b11-2a91b16 122->128 138 2a91b29-2a91b2e 127->138 139 2a91b33-2a91b3f 127->139 128->93 130->7 135 2a91ec3-2a91eca 130->135 133 2a91d8d 131->133 134 2a91d7c-2a91d8b 131->134 142 2a91d99-2a91dae 132->142 133->142 134->142 135->10 137 2a91ed0-2a91eea 135->137 137->115 137->116 138->93 146 2a91b4b-2a91b57 139->146 147 2a91b41-2a91b46 139->147 142->83 142->84 151 2a91b59-2a91b5e 146->151 152 2a91b63-2a91b6f 146->152 147->93 151->93 154 2a91b78-2a91b84 152->154 155 2a91b71-2a91b76 152->155 157 2a91b8d-2a91b99 154->157 158 2a91b86-2a91b8b 154->158 155->93 160 2a91b9b-2a91ba0 157->160 161 2a91ba2-2a91bae 157->161 158->93 160->93 163 2a91bb0-2a91bb5 161->163 164 2a91bb7-2a91bc3 161->164 163->93 166 2a91bcc-2a91bd8 164->166 167 2a91bc5-2a91bca 164->167 169 2a91bda-2a91bdf 166->169 170 2a91be1 166->170 167->93 169->93 170->93 171->4 172->4 173->4
                      Strings
                      Memory Dump Source
                      • Source File: 00000003.00000002.2127300694.0000000002A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A90000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_2a90000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID: 2
                      • API String ID: 0-450215437
                      • Opcode ID: b1379cb865e37a035e6d37128f86fc3e99aa6d86a4b821c20f8c3bbc6a00dbde
                      • Instruction ID: 596c6aff093ae3d3935c53d8eb7caa88430ce32af3a2d5989e18d3d35a81621c
                      • Opcode Fuzzy Hash: b1379cb865e37a035e6d37128f86fc3e99aa6d86a4b821c20f8c3bbc6a00dbde
                      • Instruction Fuzzy Hash: CA32F474A04219CFCB18DF6AD594B6DBBF2BB88300F6085A9D50A9B355DF70AC81CF51

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 174 2bba188-2bba197 175 2bba199-2bba1a6 call 2bb8c00 174->175 176 2bba1c3-2bba1c7 174->176 183 2bba1a8 175->183 184 2bba1bc 175->184 177 2bba1db-2bba21c 176->177 178 2bba1c9-2bba1d3 176->178 185 2bba229-2bba237 177->185 186 2bba21e-2bba226 177->186 178->177 229 2bba1ae call 2bba420 183->229 230 2bba1ae call 2bba410 183->230 184->176 188 2bba25b-2bba25d 185->188 189 2bba239-2bba23e 185->189 186->185 187 2bba1b4-2bba1b6 187->184 190 2bba2f8-2bba3b8 187->190 191 2bba260-2bba267 188->191 192 2bba249 189->192 193 2bba240-2bba247 call 2bb9e18 189->193 224 2bba3ba-2bba3bd 190->224 225 2bba3c0-2bba3eb GetModuleHandleW 190->225 195 2bba269-2bba271 191->195 196 2bba274-2bba27b 191->196 194 2bba24b-2bba259 192->194 193->194 194->191 195->196 199 2bba288-2bba28a call 2bb9e28 196->199 200 2bba27d-2bba285 196->200 203 2bba28f-2bba291 199->203 200->199 205 2bba29e-2bba2a3 203->205 206 2bba293-2bba29b 203->206 207 2bba2c1-2bba2ce 205->207 208 2bba2a5-2bba2ac 205->208 206->205 215 2bba2f1-2bba2f7 207->215 216 2bba2d0-2bba2ee 207->216 208->207 210 2bba2ae-2bba2be call 2bb9e38 call 2bb9e48 208->210 210->207 216->215 224->225 226 2bba3ed-2bba3f3 225->226 227 2bba3f4-2bba408 225->227 226->227 229->187 230->187
                      APIs
                      • GetModuleHandleW.KERNELBASE(00000000), ref: 02BBA3DE
                      Memory Dump Source
                      • Source File: 00000003.00000002.2127504908.0000000002BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BB0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_2bb0000_MSBuild.jbxd
                      Similarity
                      • API ID: HandleModule
                      • String ID:
                      • API String ID: 4139908857-0
                      • Opcode ID: c5b71edd6505ba001bd4dadfb040e3e217d5d26437934b468db7cf7358fc766a
                      • Instruction ID: 32151a96d6064d2f06a296cf006ab4b5ef05bfe13bc8c6e909c0b27c812f5637
                      • Opcode Fuzzy Hash: c5b71edd6505ba001bd4dadfb040e3e217d5d26437934b468db7cf7358fc766a
                      • Instruction Fuzzy Hash: BF713370A00B058FDB25DF6AD5407AABBF5FF88204F108A6DD48AD7A50DBB5E845CB90

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 231 2bb3690-2bb5001 CreateActCtxA 234 2bb500a-2bb5064 231->234 235 2bb5003-2bb5009 231->235 242 2bb5073-2bb5077 234->242 243 2bb5066-2bb5069 234->243 235->234 244 2bb5079-2bb5085 242->244 245 2bb5088 242->245 243->242 244->245 247 2bb5089 245->247 247->247
                      APIs
                      • CreateActCtxA.KERNEL32(?), ref: 02BB4FF1
                      Memory Dump Source
                      • Source File: 00000003.00000002.2127504908.0000000002BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BB0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_2bb0000_MSBuild.jbxd
                      Similarity
                      • API ID: Create
                      • String ID:
                      • API String ID: 2289755597-0
                      • Opcode ID: d5ad2ae3ee4bb0a3f744399dacce249e4bdf4bfd82cb32bbacbd3c9b03d18be5
                      • Instruction ID: 4107f7b239bf9b5d2dc9a7e5a8b457cf31a66bb54821f32f836164c613581a7f
                      • Opcode Fuzzy Hash: d5ad2ae3ee4bb0a3f744399dacce249e4bdf4bfd82cb32bbacbd3c9b03d18be5
                      • Instruction Fuzzy Hash: 9941F1B0C0471DCBEB25CFA9C944BDEBBB5BF48304F6084AAD509AB251DBB16945CF90

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 248 2bb4f34-2bb5001 CreateActCtxA 250 2bb500a-2bb5064 248->250 251 2bb5003-2bb5009 248->251 258 2bb5073-2bb5077 250->258 259 2bb5066-2bb5069 250->259 251->250 260 2bb5079-2bb5085 258->260 261 2bb5088 258->261 259->258 260->261 263 2bb5089 261->263 263->263
                      APIs
                      • CreateActCtxA.KERNEL32(?), ref: 02BB4FF1
                      Memory Dump Source
                      • Source File: 00000003.00000002.2127504908.0000000002BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BB0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_2bb0000_MSBuild.jbxd
                      Similarity
                      • API ID: Create
                      • String ID:
                      • API String ID: 2289755597-0
                      • Opcode ID: 4fa208ceaf1d584a612977aa342c33ba624c0d740d719f8a93c3a3ab1133b0f0
                      • Instruction ID: 4f9933b39ade9f4c3e7957b4893a491367e018a5c671f63ea74ee685185fff76
                      • Opcode Fuzzy Hash: 4fa208ceaf1d584a612977aa342c33ba624c0d740d719f8a93c3a3ab1133b0f0
                      • Instruction Fuzzy Hash: A64102B0C00318CFEB25CFA9C984BDDBBB5BF48304F6084AAD408AB251DBB56945CF90

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 264 2bbc729-2bbc730 265 2bbc6ec-2bbc6fc DuplicateHandle 264->265 266 2bbc732-2bbc856 264->266 268 2bbc6fe-2bbc704 265->268 269 2bbc705-2bbc722 265->269 268->269
                      APIs
                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 02BBC6EF
                      Memory Dump Source
                      • Source File: 00000003.00000002.2127504908.0000000002BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BB0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_2bb0000_MSBuild.jbxd
                      Similarity
                      • API ID: DuplicateHandle
                      • String ID:
                      • API String ID: 3793708945-0
                      • Opcode ID: b6e613da4beb9c3f3b93f17f2f544e7a7c89bf078f56e23e5ee11518745dc563
                      • Instruction ID: 3ff35a0309ef924910d739dd1d6ba22a5aa86281e3b3d5cbd7661afbc33625c0
                      • Opcode Fuzzy Hash: b6e613da4beb9c3f3b93f17f2f544e7a7c89bf078f56e23e5ee11518745dc563
                      • Instruction Fuzzy Hash: 97313E74A943408FF704EFA0E98A7693B69F784360F11892AE941CB3C8DF745890CF11

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 282 2bbc660-2bbc6fc DuplicateHandle 283 2bbc6fe-2bbc704 282->283 284 2bbc705-2bbc722 282->284 283->284
                      APIs
                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 02BBC6EF
                      Memory Dump Source
                      • Source File: 00000003.00000002.2127504908.0000000002BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BB0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_2bb0000_MSBuild.jbxd
                      Similarity
                      • API ID: DuplicateHandle
                      • String ID:
                      • API String ID: 3793708945-0
                      • Opcode ID: 4dbdd4860490f51807743bc07fbabeaa67ee11a3e5f5d7ef989fe9fdd931cee3
                      • Instruction ID: 3877aeda23cc9ba36e334991686f7914c88f7aacb1522508cda125772429264e
                      • Opcode Fuzzy Hash: 4dbdd4860490f51807743bc07fbabeaa67ee11a3e5f5d7ef989fe9fdd931cee3
                      • Instruction Fuzzy Hash: 7221E3B5D002499FDB10CFAAD984AEEBFF5FB48320F24845AE914A3350D374A954CF64

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 287 2bbc668-2bbc6fc DuplicateHandle 288 2bbc6fe-2bbc704 287->288 289 2bbc705-2bbc722 287->289 288->289
                      APIs
                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 02BBC6EF
                      Memory Dump Source
                      • Source File: 00000003.00000002.2127504908.0000000002BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BB0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_2bb0000_MSBuild.jbxd
                      Similarity
                      • API ID: DuplicateHandle
                      • String ID:
                      • API String ID: 3793708945-0
                      • Opcode ID: 261c2ed75ca7f4e02ccb234d88ff09fbe02d8a83089c7eb936a0131faacf192c
                      • Instruction ID: 4068e976e82c76ed34e342bc64e746e39d3e40dfb1e7fc2ee917e336de3c646c
                      • Opcode Fuzzy Hash: 261c2ed75ca7f4e02ccb234d88ff09fbe02d8a83089c7eb936a0131faacf192c
                      • Instruction Fuzzy Hash: C521C4B59002499FDB10CFAAD984ADEBFF4FF48320F14845AE914A3350D374A954CF65

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 292 2bb9e70-2bba640 294 2bba648-2bba677 LoadLibraryExW 292->294 295 2bba642-2bba645 292->295 296 2bba679-2bba67f 294->296 297 2bba680-2bba69d 294->297 295->294 296->297
                      APIs
                      • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,02BBA459,00000800,00000000,00000000), ref: 02BBA66A
                      Memory Dump Source
                      • Source File: 00000003.00000002.2127504908.0000000002BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BB0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_2bb0000_MSBuild.jbxd
                      Similarity
                      • API ID: LibraryLoad
                      • String ID:
                      • API String ID: 1029625771-0
                      • Opcode ID: b04ff69c855b81e93322f83f6fbc005cf8303aaa97d37b66efe4f509a72175c3
                      • Instruction ID: aa685a90d00cbfe401d4ac6b6f450edd24fd2aad47e930638771b958227a2378
                      • Opcode Fuzzy Hash: b04ff69c855b81e93322f83f6fbc005cf8303aaa97d37b66efe4f509a72175c3
                      • Instruction Fuzzy Hash: E31103B6D042099FDB10CFAAC544AEEFBF8EF48710F11846AE919A7300C7B5A544CFA4

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 300 2bba5f9-2bba640 301 2bba648-2bba677 LoadLibraryExW 300->301 302 2bba642-2bba645 300->302 303 2bba679-2bba67f 301->303 304 2bba680-2bba69d 301->304 302->301 303->304
                      APIs
                      • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,02BBA459,00000800,00000000,00000000), ref: 02BBA66A
                      Memory Dump Source
                      • Source File: 00000003.00000002.2127504908.0000000002BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BB0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_2bb0000_MSBuild.jbxd
                      Similarity
                      • API ID: LibraryLoad
                      • String ID:
                      • API String ID: 1029625771-0
                      • Opcode ID: fe404c7e81cf5bc1b6e3da3e6430b9f281a9844d978cd071047fc30683b4bf81
                      • Instruction ID: 271e45d464cf94943ca151eef384984a746fd09b15b7045fba09af497d15937b
                      • Opcode Fuzzy Hash: fe404c7e81cf5bc1b6e3da3e6430b9f281a9844d978cd071047fc30683b4bf81
                      • Instruction Fuzzy Hash: F41123B6C002098FDB11CFAAC944BEEFBF4AF48710F14845AE919A7300C3B8A545CFA4

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 307 2bba378-2bba3b8 308 2bba3ba-2bba3bd 307->308 309 2bba3c0-2bba3eb GetModuleHandleW 307->309 308->309 310 2bba3ed-2bba3f3 309->310 311 2bba3f4-2bba408 309->311 310->311
                      APIs
                      • GetModuleHandleW.KERNELBASE(00000000), ref: 02BBA3DE
                      Memory Dump Source
                      • Source File: 00000003.00000002.2127504908.0000000002BB0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02BB0000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_2bb0000_MSBuild.jbxd
                      Similarity
                      • API ID: HandleModule
                      • String ID:
                      • API String ID: 4139908857-0
                      • Opcode ID: b96279984c15cf290a6cb55c554a929b5bffe3e3adc7fd6453476b38d78aad4f
                      • Instruction ID: 18d88a0a8e85de468f80dcecfc7f4e38c5043e2f3065b11cdc6cc5d23d2290df
                      • Opcode Fuzzy Hash: b96279984c15cf290a6cb55c554a929b5bffe3e3adc7fd6453476b38d78aad4f
                      • Instruction Fuzzy Hash: 8311DFB6C007498FDB10CF9AC544ADEFBF4EF88224F10845AD829A7610D3B9A545CFA5

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 620 8b90895-8b9089e 621 8b908a0-8b908d3 620->621 622 8b90843-8b9084a 620->622 627 8b908d5-8b908df 621->627 628 8b908e6-8b90906 621->628 624 8b90852-8b90855 622->624 627->628 630 8b90919-8b90939 628->630 631 8b90908-8b90912 628->631 633 8b9093b-8b90945 630->633 634 8b9094c-8b9096c 630->634 631->630 633->634 636 8b9097f-8b90988 call 8b900dc 634->636 637 8b9096e-8b90978 634->637 640 8b9098a-8b909a5 call 8b900dc 636->640 641 8b909ac-8b909b5 636->641 637->636 640->641 645 8b909d9-8b909e2 call 8b900ec 641->645 646 8b909b7-8b909d2 641->646 651 8b909ed-8b90a09 645->651 652 8b909e4-8b909e8 call 8b900fc 645->652 646->645 656 8b90a0b-8b90a11 651->656 657 8b90a21-8b90a25 651->657 652->651 658 8b90a13 656->658 659 8b90a15-8b90a17 656->659 660 8b90a3f-8b90a87 657->660 661 8b90a27-8b90a38 call 8b9010c 657->661 658->657 659->657 667 8b90a89 660->667 668 8b90aab-8b90ab2 660->668 661->660 669 8b90a8c-8b90a92 667->669 670 8b90ac9-8b90ad7 668->670 671 8b90ab4-8b90ac3 668->671 672 8b90a98-8b90a9e 669->672 673 8b90c70-8b90c76 669->673 679 8b90ad9-8b90adb 670->679 680 8b90ae1-8b90b0a call 8b90448 670->680 671->670 674 8b90aa8-8b90aa9 672->674 675 8b90aa0-8b90aa2 672->675 674->668 674->669 675->674 679->680 684 8b90b0c-8b90b1a 680->684 685 8b90b37-8b90b53 680->685 684->685 688 8b90b1c-8b90b30 684->688 689 8b90b55-8b90b5f 685->689 690 8b90b66-8b90b8d call 8b9011c 685->690 688->685 689->690 695 8b90b8f-8b90b95 690->695 696 8b90ba5-8b90ba9 690->696 697 8b90b99-8b90b9b 695->697 698 8b90b97 695->698 699 8b90bab-8b90bbd 696->699 700 8b90bc4-8b90be0 696->700 697->696 698->696 699->700 703 8b90bf8-8b90bfc 700->703 704 8b90be2-8b90be8 700->704 707 8b90c68-8b90c6f 703->707 708 8b90bfe-8b90c0c 703->708 705 8b90bea 704->705 706 8b90bec-8b90bee 704->706 705->703 706->703 710 8b90c1e-8b90c22 708->710 711 8b90c0e-8b90c1c 708->711 713 8b90c28-8b90c40 710->713 711->710 711->713
                      Memory Dump Source
                      • Source File: 00000003.00000002.2128483833.0000000008B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 08B90000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_8b90000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: baa34108e5869acd68698aa9a0179bd722a4c03cb95fe568f0848782239114f9
                      • Instruction ID: 479cc638c5bfb359bfbdd82f87f82fc7959cc8eef40d37b483562ec587eef0c1
                      • Opcode Fuzzy Hash: baa34108e5869acd68698aa9a0179bd722a4c03cb95fe568f0848782239114f9
                      • Instruction Fuzzy Hash: 74C19931701A048FEB26EB76C450BAEB7F6EF89701F1444ADD2869B790CB75E902CB51
                      Memory Dump Source
                      • Source File: 00000003.00000002.2127300694.0000000002A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A90000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_2a90000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 75b5206236c12e3e007649c959436714d7b8dcaaf86493f11077759903b70fb8
                      • Instruction ID: 1b21acbe24df26706227d12f84e86cf4d1e3f74b0e0b317bc6b1ce5ebd4575f6
                      • Opcode Fuzzy Hash: 75b5206236c12e3e007649c959436714d7b8dcaaf86493f11077759903b70fb8
                      • Instruction Fuzzy Hash: D4D11675A00254CFCB15DF69C898B99BBF2BF89314F1584E9D90A9B362DB31EC81CB50
                      Memory Dump Source
                      • Source File: 00000003.00000002.2128483833.0000000008B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 08B90000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_8b90000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 3f5b969faef193390277459f137b278fe342044c02450331b312666acefb3e00
                      • Instruction ID: 8c8726a5857e067e1fa15d3ebd71ed7a90d0de8131bd31eec991504f9bc16054
                      • Opcode Fuzzy Hash: 3f5b969faef193390277459f137b278fe342044c02450331b312666acefb3e00
                      • Instruction Fuzzy Hash: DBB19A70B016049FDB15EBA8C594BAEBBF6EF89701F2440A9E545EB3A1CB74DD02CB50
                      Memory Dump Source
                      • Source File: 00000003.00000002.2127300694.0000000002A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A90000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_2a90000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 1f0b714a3397dee64fac3786b1cb2cd5a498d749cd06c247c0382d4c0a1f8772
                      • Instruction ID: d5b202906de41b3d6bf44f226150daf4e74143b840c43297b2239ed660468bd9
                      • Opcode Fuzzy Hash: 1f0b714a3397dee64fac3786b1cb2cd5a498d749cd06c247c0382d4c0a1f8772
                      • Instruction Fuzzy Hash: 9B918F30A04604DBDF29ABB6D5A47BD76F3EFC9340FA4046ED506AB290CE31AC41CB12
                      Memory Dump Source
                      • Source File: 00000003.00000002.2127300694.0000000002A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A90000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_2a90000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 15439efe710d9c88b07ab031d26205808506367a29e841c3b1106898eb61b94f
                      • Instruction ID: d8ec07d199d1bdab38599675b4edfcb56a308fdee9a703186830f79bcc8d078f
                      • Opcode Fuzzy Hash: 15439efe710d9c88b07ab031d26205808506367a29e841c3b1106898eb61b94f
                      • Instruction Fuzzy Hash: 45517B34A04155EFDB09EF2AD984B6A77F2FB88300F214569C8069F395CF74AC41CBA1
                      Memory Dump Source
                      • Source File: 00000003.00000002.2127300694.0000000002A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A90000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_2a90000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 88d4a1fba58b94ab16715dc95a5f904309a9dd92c449278b24f1c2c85e206f68
                      • Instruction ID: 5ab6d97ebeedc6a44a7cfc76ee428208918b9ba231a16d7d0512c29752fefc25
                      • Opcode Fuzzy Hash: 88d4a1fba58b94ab16715dc95a5f904309a9dd92c449278b24f1c2c85e206f68
                      • Instruction Fuzzy Hash: 6A210871E0D289DFEF46DBB799511E87FF2AF92284B1484DAC485DB202EE315A06CB01
                      Memory Dump Source
                      • Source File: 00000003.00000002.2127300694.0000000002A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A90000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_2a90000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 3764f25835a720f2dff7accc1fe7375bdb2eb03400217a702b674b9f3a97b073
                      • Instruction ID: 6dd883665aaac88d3614bfc9c1ca0f3fad9b0fdbccd39852e7cb3be21e2b74d0
                      • Opcode Fuzzy Hash: 3764f25835a720f2dff7accc1fe7375bdb2eb03400217a702b674b9f3a97b073
                      • Instruction Fuzzy Hash: C43125353041409FC758DB39D4A8F69BBF2EF8A610B1540E9E50ACF3B2CA61EC05CB51
                      Memory Dump Source
                      • Source File: 00000003.00000002.2127300694.0000000002A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A90000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_2a90000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 6e62eab6149850fc45fa702305a6cdaa6b3f9c54f54edcb84288d55b18098532
                      • Instruction ID: fb020361a7d8bc446ad759937fc3df486142dba0257aee6b847512757ae4bcf3
                      • Opcode Fuzzy Hash: 6e62eab6149850fc45fa702305a6cdaa6b3f9c54f54edcb84288d55b18098532
                      • Instruction Fuzzy Hash: E931217890419AEBDF25CB2AD4957FDBFF2AB84300F148996D059EB281CB315C81CF90
                      Memory Dump Source
                      • Source File: 00000003.00000002.2127139301.00000000029CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 029CD000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_29cd000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b24803cba38a90b832fa2de3a785ac82a539b19edee9488330e0e0fc58632a76
                      • Instruction ID: d48224c656306327907d2e443cca91151ae1fd4a066792f752d20b8f9ad6afbb
                      • Opcode Fuzzy Hash: b24803cba38a90b832fa2de3a785ac82a539b19edee9488330e0e0fc58632a76
                      • Instruction Fuzzy Hash: 2821CF75604244EFDB14DF18D980B26BBA5EB88324F30C96DD90A4B296C77AD446CA72
                      Memory Dump Source
                      • Source File: 00000003.00000002.2127139301.00000000029CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 029CD000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_29cd000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 61e425e326fa6eaaf9ed312e44c266c07f2000ec9c5befbf97b7e470558f0379
                      • Instruction ID: 5bc7c0644c1f68c80001d3fdb08b9f1c4a0d381a56c65dc5fd9cdc956b4c63d6
                      • Opcode Fuzzy Hash: 61e425e326fa6eaaf9ed312e44c266c07f2000ec9c5befbf97b7e470558f0379
                      • Instruction Fuzzy Hash: 0C21F2B5504204EFDB05DF14D9C0B26BBA5FB88314F30C97DE90A4B29AC776D446CA72
                      Memory Dump Source
                      • Source File: 00000003.00000002.2127300694.0000000002A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A90000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_2a90000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 733d30611d2281f81823857f44b1e8fb931e4bdea8fd685893992b3e54138de6
                      • Instruction ID: bc1810998c0f2220a4df1185e883ae39d823bad6d64285c42c4a652704c97ba3
                      • Opcode Fuzzy Hash: 733d30611d2281f81823857f44b1e8fb931e4bdea8fd685893992b3e54138de6
                      • Instruction Fuzzy Hash: 7221A534A0D289DFDB46DBBB98962ED7FF2AF96244B24C0E6C485D7112DE315916CB00
                      Memory Dump Source
                      • Source File: 00000003.00000002.2127139301.00000000029CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 029CD000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_29cd000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: ef69c83c15b6aabee0e6b0f7e5f948875e63371aa01b129d92ec61735862219a
                      • Instruction ID: 0bcd74803340350705c285e94b2267701f7a8ac6f61ffc4b88d5d9275032a49e
                      • Opcode Fuzzy Hash: ef69c83c15b6aabee0e6b0f7e5f948875e63371aa01b129d92ec61735862219a
                      • Instruction Fuzzy Hash: 4D2150755093C09FDB12CF24D594715BF71EB46214F28C5EED8498B6A7C33A940ACB62
                      Memory Dump Source
                      • Source File: 00000003.00000002.2127300694.0000000002A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A90000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_2a90000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 2c3be91d57320564704e4b69b16b344999168bbb8ad9e02e988ea428b0bdef74
                      • Instruction ID: f33a82a7b912d869849fd0eaf055efbcef405d977b9d38f6178330507755cd62
                      • Opcode Fuzzy Hash: 2c3be91d57320564704e4b69b16b344999168bbb8ad9e02e988ea428b0bdef74
                      • Instruction Fuzzy Hash: 0301B1B180D2C89FEB039BB188612A83FF19DA714031900C7C484DF253D8240907D722
                      Memory Dump Source
                      • Source File: 00000003.00000002.2127139301.00000000029CD000.00000040.00000800.00020000.00000000.sdmp, Offset: 029CD000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_29cd000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 703b7abd3718bd21aa6f36dac6c8dc0e73c65716f16ca45b46755fc1987422b6
                      • Instruction ID: a21075de8916b35c2c27fc03be5f008178a28eaa14a1f9b9cda53cfc187af79c
                      • Opcode Fuzzy Hash: 703b7abd3718bd21aa6f36dac6c8dc0e73c65716f16ca45b46755fc1987422b6
                      • Instruction Fuzzy Hash: 73119D76504284DFDB15CF10D9C4B15FBB1FB84318F24C6AED8494B6AAC33AD44ACB62
                      Memory Dump Source
                      • Source File: 00000003.00000002.2128483833.0000000008B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 08B90000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_8b90000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b28e2c96de876b37761dcd5ce6038a0262dafdfd92dd60797153f584a4537f71
                      • Instruction ID: 6259f1aa9b26c728220ee7105325d487bed213164847d29fb60cc358069d158e
                      • Opcode Fuzzy Hash: b28e2c96de876b37761dcd5ce6038a0262dafdfd92dd60797153f584a4537f71
                      • Instruction Fuzzy Hash: 9B0192326097849FC7139764D854A9A3FB5AF83315B0A85FBD098CF2A3D735881ACB51
                      Memory Dump Source
                      • Source File: 00000003.00000002.2127300694.0000000002A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A90000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_2a90000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: dd8fed48820dc381911d6d798718a28386c74b32b1ed95a56fe981280673eb24
                      • Instruction ID: eb5836ab3a8f07d20eaca60e85aed8347818224180b6523e725e14faf55e3b57
                      • Opcode Fuzzy Hash: dd8fed48820dc381911d6d798718a28386c74b32b1ed95a56fe981280673eb24
                      • Instruction Fuzzy Hash: 67018430E0818ADFEF49DB7B98511AD7FF1AF95340B24C4A9C446D7225EE305A02CB11
                      Memory Dump Source
                      • Source File: 00000003.00000002.2127300694.0000000002A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A90000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_2a90000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 3ddc5b9ea96c8c1726b4840dbb52a73eff49625b02bd150aa6f18bd2cd51602f
                      • Instruction ID: 7dfe280ac8817a4a849cd12f38f11bbd4e9f4c0376a34edb60eadb39aad8a25f
                      • Opcode Fuzzy Hash: 3ddc5b9ea96c8c1726b4840dbb52a73eff49625b02bd150aa6f18bd2cd51602f
                      • Instruction Fuzzy Hash: E9F0F031B44104D78E14E3ABEA8057E73DBCBC2621798C87BE30EC7702CE22A8018763
                      Memory Dump Source
                      • Source File: 00000003.00000002.2127300694.0000000002A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A90000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_2a90000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: cef4aade30ec7f8168bee5c9edbf527a0a767cec035ae231ac1e6b2337024687
                      • Instruction ID: 263b6728b7e7d0f98f68f81b6ccfeb5177ea4400bcc71936004a339c9c3bd3c0
                      • Opcode Fuzzy Hash: cef4aade30ec7f8168bee5c9edbf527a0a767cec035ae231ac1e6b2337024687
                      • Instruction Fuzzy Hash: 9F014F31E08109DFEF48EB6B984526D7AF6ABA4340F20C4A9C446D7214EE305A01CB00
                      Memory Dump Source
                      • Source File: 00000003.00000002.2127300694.0000000002A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A90000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_2a90000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b869e1fb4cda64c6fcca8d77d36981fc94cf0e4e20dfc3dbbbad0bd4befaff8e
                      • Instruction ID: 10a4f24e7448a1ddbb7d7cf11a4f6371c0fc19a15b921cceaded4c44315363d0
                      • Opcode Fuzzy Hash: b869e1fb4cda64c6fcca8d77d36981fc94cf0e4e20dfc3dbbbad0bd4befaff8e
                      • Instruction Fuzzy Hash: 21115E74A01214CFDB94DF68C994A99BBF1FF89301F5181E9E60AAB361DB31AD81CF01
                      Memory Dump Source
                      • Source File: 00000003.00000002.2127300694.0000000002A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A90000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_2a90000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 9945b5534266e125e8cce5f4079d33cf116850579b4e5f3f23481d10d87ae52a
                      • Instruction ID: a3cc4eddd352996463aa355d02ef63fa3d20ce50d88bf305ed7e12c0129d902b
                      • Opcode Fuzzy Hash: 9945b5534266e125e8cce5f4079d33cf116850579b4e5f3f23481d10d87ae52a
                      • Instruction Fuzzy Hash: DD010874A45218CFDB54CF29C948BA8B7F1FF89301F1084DAD149AB261CB359E85CF40
                      Memory Dump Source
                      • Source File: 00000003.00000002.2127300694.0000000002A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A90000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_2a90000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: dcb3c84557fe47db91f395879e0734c69d99caaba540d9e96bfeca20fa116628
                      • Instruction ID: 06ebc8ef378f680b113409e27506f73c90f77d0adcd16615f8ef0ff775d9adfc
                      • Opcode Fuzzy Hash: dcb3c84557fe47db91f395879e0734c69d99caaba540d9e96bfeca20fa116628
                      • Instruction Fuzzy Hash: 5501C970A05614DFEF54CB6AC945B68B7F1EF49304F05C4E6D009AB2A2DB369D86CF01
                      Memory Dump Source
                      • Source File: 00000003.00000002.2127300694.0000000002A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A90000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_2a90000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: b856495b7c0a971105c7b449a61fdf5e38030c3f111d59894006d7debee0466d
                      • Instruction ID: 5d1803fc8a7597d6173bf00170afffcf9956efeb63fbba16f5cc2a1df270d91e
                      • Opcode Fuzzy Hash: b856495b7c0a971105c7b449a61fdf5e38030c3f111d59894006d7debee0466d
                      • Instruction Fuzzy Hash: D80146B4A08209CFCB14CF68D8805A8FBB1FB88214F108AE6D91997281DB309924CF10
                      Memory Dump Source
                      • Source File: 00000003.00000002.2127300694.0000000002A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A90000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_2a90000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 32044f512d287b64b4ba2bafb349e62eb212f2b9634067b280c2c20c6a7ffac7
                      • Instruction ID: a4f35da4019a8f4dbc1dd1a4eec644ca7c4e85d1b9bb9ea2c5228a3e9484a06e
                      • Opcode Fuzzy Hash: 32044f512d287b64b4ba2bafb349e62eb212f2b9634067b280c2c20c6a7ffac7
                      • Instruction Fuzzy Hash: 99F0E575A48258CFCF04CFA5D9844ACB7F1FB403257100AD5D0269B295CF72D815CF01
                      Memory Dump Source
                      • Source File: 00000003.00000002.2127300694.0000000002A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A90000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_2a90000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e401741a6e30f30dad595bd58bb8140a0dd19988ebeaa6db492b455be0d98c70
                      • Instruction ID: ba7a10337fd24b198e13acced1477f6137a7482106044621731fd322e051fdd2
                      • Opcode Fuzzy Hash: e401741a6e30f30dad595bd58bb8140a0dd19988ebeaa6db492b455be0d98c70
                      • Instruction Fuzzy Hash: EBE06D725082409EC749AB21D0966F67FB99B8A314F1584AED0964AA02DB31945FEA40
                      Memory Dump Source
                      • Source File: 00000003.00000002.2128483833.0000000008B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 08B90000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_8b90000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 2389a54d653a368dd21b812da1b169e9c576f4b2220d1c523dc81a454d6b0f74
                      • Instruction ID: 65ebeaec1386200cd21f4742888619bc360fc4c4cd3f9b2ac0dbf4639afc103c
                      • Opcode Fuzzy Hash: 2389a54d653a368dd21b812da1b169e9c576f4b2220d1c523dc81a454d6b0f74
                      • Instruction Fuzzy Hash: 56E030B0D0071A9FDB50EF6E8845B6BBFF4AF48610F108879D459E3200E77485018B90
                      Memory Dump Source
                      • Source File: 00000003.00000002.2127300694.0000000002A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A90000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_2a90000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 3b0a739ac89aeed43cf3589dc4fa55a1dc1f89cb28d279128b722efbe60dea04
                      • Instruction ID: 42aae3c65d26080e65882cb599fcf6916e8793c94cb30f53325675f0e566c225
                      • Opcode Fuzzy Hash: 3b0a739ac89aeed43cf3589dc4fa55a1dc1f89cb28d279128b722efbe60dea04
                      • Instruction Fuzzy Hash: 3EE0E67194810DFF9B00EFA6D60056D7BFAEFD5344B10459AD406E7240DE716E109B56
                      Memory Dump Source
                      • Source File: 00000003.00000002.2128483833.0000000008B90000.00000040.00000800.00020000.00000000.sdmp, Offset: 08B90000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_8b90000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 02f6b6c74f3eb711dd9e84876fd20317475faaa768c7a22d9fd646f91373869f
                      • Instruction ID: 75e47c3bdc135fb63593dd8350c9e52007d0810599da7983dfddb0ab22dab857
                      • Opcode Fuzzy Hash: 02f6b6c74f3eb711dd9e84876fd20317475faaa768c7a22d9fd646f91373869f
                      • Instruction Fuzzy Hash: 38D02E32B08A10938A28210AA0446BFB6EEDBC4B6330200BEE08EC3200EE31480382D0
                      Memory Dump Source
                      • Source File: 00000003.00000002.2127300694.0000000002A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A90000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_2a90000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 315c424f63a00671fad437f61412ddde9198e55f3b075296882cc458543632c4
                      • Instruction ID: 8ba3dc0a9824b6fb90423325f6776ddcf20f3178932a441c94f8f8362e6124ff
                      • Opcode Fuzzy Hash: 315c424f63a00671fad437f61412ddde9198e55f3b075296882cc458543632c4
                      • Instruction Fuzzy Hash: 3AE0C234A0A620CFEF419F69D54DB64BAF0FB05309F4488E6C046E7154CB7AC942CF41
                      Memory Dump Source
                      • Source File: 00000003.00000002.2127300694.0000000002A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A90000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_2a90000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: fe0960c1498ed968f757ef2faec3624e4eb7a36533c894aedd2c304c8cfd291e
                      • Instruction ID: a0277f9a90f522927f1fc309131a386b4b0f4e3057d00264ed3675b826acf3c4
                      • Opcode Fuzzy Hash: fe0960c1498ed968f757ef2faec3624e4eb7a36533c894aedd2c304c8cfd291e
                      • Instruction Fuzzy Hash: 86E00234E46215CFDB54DF68C998AA8BBF1BF88201F1584D5E91AA7361DB309D40CF10
                      Memory Dump Source
                      • Source File: 00000003.00000002.2127300694.0000000002A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A90000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_2a90000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 89583b4f46801d4ddafa33627e190ce1bfd1f3c37518d69cbfd9f854cdfcbc21
                      • Instruction ID: 281b1a73c20103dc3d2c533203134925c455419be54c4bbbfe27b946f125e3d3
                      • Opcode Fuzzy Hash: 89583b4f46801d4ddafa33627e190ce1bfd1f3c37518d69cbfd9f854cdfcbc21
                      • Instruction Fuzzy Hash: 48D0C934E07211CFDB00CB25C94A9697BF0AF88241F5544E8A80AA7231DA30DC40CE50
                      Memory Dump Source
                      • Source File: 00000003.00000002.2127300694.0000000002A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A90000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_2a90000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 80ffbfd49b0cd0ac7ba635233c1f7229d12daab68d83d428791edf866e46c1ad
                      • Instruction ID: ac94215c7fab5b3641a118aa841103caebf7a1b5ae64f9a12e53dc267e4765d1
                      • Opcode Fuzzy Hash: 80ffbfd49b0cd0ac7ba635233c1f7229d12daab68d83d428791edf866e46c1ad
                      • Instruction Fuzzy Hash: B1D0221080E2C24EC7060778404A9C13FA46F0F03071D56DCC0D20F883D601C4AB8A02
                      Memory Dump Source
                      • Source File: 00000003.00000002.2127300694.0000000002A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A90000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_2a90000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 8ab4bbdd17a120ddc1ef3c4cf224515beb75f8373d4b4482147fda78e6e90976
                      • Instruction ID: 20159973dc6c4478fa717a34ac84a2881d4813b9dc5cbab7339b5de6a68ee492
                      • Opcode Fuzzy Hash: 8ab4bbdd17a120ddc1ef3c4cf224515beb75f8373d4b4482147fda78e6e90976
                      • Instruction Fuzzy Hash: 0DB01231250208CFC300DB6CE444C0033FCAF4DA1431000D0F10C8B331C721FC008A40
                      Memory Dump Source
                      • Source File: 00000003.00000002.2127300694.0000000002A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A90000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_2a90000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: ba36aef03bc27f84ab667d144efac4fccdcd93af6e34ac239b6cc8976010b3de
                      • Instruction ID: a086de6630c9c25d0d1ef151d61145ab0e9105ca671659dc64f504c3d7f1862d
                      • Opcode Fuzzy Hash: ba36aef03bc27f84ab667d144efac4fccdcd93af6e34ac239b6cc8976010b3de
                      • Instruction Fuzzy Hash: DBB092301402088FC300DA58D445C5077A8AB08A0430500D0E2088B232D622F8008A40
                      Memory Dump Source
                      • Source File: 00000003.00000002.2127300694.0000000002A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A90000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_2a90000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 3c6a7776ecdc66ff2badcffdaf35b8b1322b3b9dcc2f8f5c8c2b1fa1d7393b36
                      • Instruction ID: 66b4ff20401152a37dd7cd20f697c78aad120993c9283fcd37d3bc67bd9b1e54
                      • Opcode Fuzzy Hash: 3c6a7776ecdc66ff2badcffdaf35b8b1322b3b9dcc2f8f5c8c2b1fa1d7393b36
                      • Instruction Fuzzy Hash: 3BB09270409900CACB08AF12D0481A8F7E2EAC8222B248829D08641054EB300460DA41
                      Memory Dump Source
                      • Source File: 00000003.00000002.2127300694.0000000002A90000.00000040.00000800.00020000.00000000.sdmp, Offset: 02A90000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_3_2_2a90000_MSBuild.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: a39d4b6164bdeaee762f78de648d5851e979775bacb75db9e9692325c888bdfd
                      • Instruction ID: b590cc7d45d66e6b43dcf05e006479d0ecdc2c3f807ad64c74c763b16a717708
                      • Opcode Fuzzy Hash: a39d4b6164bdeaee762f78de648d5851e979775bacb75db9e9692325c888bdfd
                      • Instruction Fuzzy Hash: 6490223208C20C8B0200238030080A0330C80800223C00000A00C020000E80302000C0