Loading ...

Play interactive tourEdit tour

Analysis Report xVvAobZvWU

Overview

General Information

Sample Name:xVvAobZvWU (renamed file extension from none to exe)
Analysis ID:385394
MD5:b415645d1b8039996726b424cd53a81c
SHA1:cfcc4ee2d2e00ae4deb8591e7b8682d6946db5f5
SHA256:806bf1c6fa713325b45642893ede4dcb76dbf6044aea80a5315da1075cc25b9a
Infos:

Most interesting Screenshot:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected AgentTesla
Yara detected AntiVM3
.NET source code contains very large array initializations
Machine Learning detection for sample
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to harvest and steal browser information (history, passwords, etc)
Tries to harvest and steal ftp login credentials
Tries to steal Mail credentials (via file access)
Antivirus or Machine Learning detection for unpacked file
Binary contains a suspicious time stamp
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses SMTP (mail sending)
Yara detected Credential Stealer

Classification

Startup

  • System is w10x64
  • xVvAobZvWU.exe (PID: 5504 cmdline: 'C:\Users\user\Desktop\xVvAobZvWU.exe' MD5: B415645D1B8039996726B424CD53A81C)
    • xVvAobZvWU.exe (PID: 2584 cmdline: {path} MD5: B415645D1B8039996726B424CD53A81C)
  • cleanup

Malware Configuration

Threatname: Agenttesla

{"Exfil Mode": "SMTP", "SMTP Info": "jaen@brimaq.combrimaQ2012mail.brimaq.commetoyou2411@gmail.com"}

Yara Overview

Memory Dumps

SourceRuleDescriptionAuthorStrings
00000002.00000002.460161679.0000000000402000.00000040.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000002.00000002.464571382.0000000002E51000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000002.00000002.464571382.0000000002E51000.00000004.00000001.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000000.00000002.200144937.0000000003809000.00000004.00000001.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
          Process Memory Space: xVvAobZvWU.exe PID: 2584JoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 3 entries

            Unpacked PEs

            SourceRuleDescriptionAuthorStrings
            2.2.xVvAobZvWU.exe.400000.0.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              0.2.xVvAobZvWU.exe.39b33b0.2.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                0.2.xVvAobZvWU.exe.39b33b0.2.raw.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security

                  Sigma Overview

                  No Sigma rule has matched

                  Signature Overview

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection:

                  barindex
                  Found malware configurationShow sources
                  Source: 2.2.xVvAobZvWU.exe.400000.0.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "SMTP", "SMTP Info": "jaen@brimaq.combrimaQ2012mail.brimaq.commetoyou2411@gmail.com"}
                  Multi AV Scanner detection for submitted fileShow sources
                  Source: xVvAobZvWU.exeVirustotal: Detection: 30%Perma Link
                  Source: xVvAobZvWU.exeReversingLabs: Detection: 10%
                  Machine Learning detection for sampleShow sources
                  Source: xVvAobZvWU.exeJoe Sandbox ML: detected
                  Source: 2.2.xVvAobZvWU.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                  Source: xVvAobZvWU.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                  Source: xVvAobZvWU.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                  Source: global trafficTCP traffic: 192.168.2.3:49741 -> 78.128.8.31:587
                  Source: Joe Sandbox ViewASN Name: TELEPOINTBG TELEPOINTBG
                  Source: global trafficTCP traffic: 192.168.2.3:49741 -> 78.128.8.31:587
                  Source: unknownDNS traffic detected: queries for: mail.brimaq.com
                  Source: xVvAobZvWU.exe, 00000002.00000002.464571382.0000000002E51000.00000004.00000001.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                  Source: xVvAobZvWU.exe, 00000002.00000002.464571382.0000000002E51000.00000004.00000001.sdmpString found in binary or memory: http://Bavw5lBQkDhG9.net
                  Source: xVvAobZvWU.exe, 00000002.00000003.401682628.0000000001094000.00000004.00000001.sdmpString found in binary or memory: http://Bavw5lBQkDhG9.net1-5-21-3853321935-2125563209-4053062332-1002_Classes
                  Source: xVvAobZvWU.exe, 00000002.00000002.464571382.0000000002E51000.00000004.00000001.sdmpString found in binary or memory: http://DynDns.comDynDNS
                  Source: xVvAobZvWU.exe, 00000002.00000002.464571382.0000000002E51000.00000004.00000001.sdmpString found in binary or memory: http://UfeDnz.com
                  Source: xVvAobZvWU.exe, 00000002.00000003.413844373.00000000012C7000.00000004.00000001.sdmpString found in binary or memory: http://apps.identrust.com/roots/dstrootcax3.p7c0
                  Source: xVvAobZvWU.exe, 00000002.00000002.466430906.0000000003101000.00000004.00000001.sdmpString found in binary or memory: http://brimaq.com
                  Source: xVvAobZvWU.exe, 00000002.00000003.413844373.00000000012C7000.00000004.00000001.sdmpString found in binary or memory: http://cps.letsencrypt.org0
                  Source: xVvAobZvWU.exe, 00000002.00000003.413844373.00000000012C7000.00000004.00000001.sdmpString found in binary or memory: http://cps.root-x1.letsencrypt.org0
                  Source: xVvAobZvWU.exe, 00000002.00000003.413844373.00000000012C7000.00000004.00000001.sdmpString found in binary or memory: http://crl.identrust.com/DSTROOTCAX3CRL.crl0
                  Source: xVvAobZvWU.exe, 00000002.00000002.466430906.0000000003101000.00000004.00000001.sdmpString found in binary or memory: http://mail.brimaq.com
                  Source: xVvAobZvWU.exe, 00000002.00000003.413844373.00000000012C7000.00000004.00000001.sdmpString found in binary or memory: http://r3.i.lencr.org/0
                  Source: xVvAobZvWU.exe, 00000002.00000003.413844373.00000000012C7000.00000004.00000001.sdmpString found in binary or memory: http://r3.o.lencr.org0
                  Source: xVvAobZvWU.exe, 00000000.00000002.200144937.0000000003809000.00000004.00000001.sdmp, xVvAobZvWU.exe, 00000002.00000002.460161679.0000000000402000.00000040.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
                  Source: xVvAobZvWU.exe, 00000002.00000002.464571382.0000000002E51000.00000004.00000001.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha

                  System Summary:

                  barindex
                  .NET source code contains very large array initializationsShow sources
                  Source: 2.2.xVvAobZvWU.exe.400000.0.unpack, u003cPrivateImplementationDetailsu003eu007b5BCBD15Au002dC8BBu002d4A4Au002dB998u002d7E02CCE826D7u007d/C91E5AB2u002dAB1Au002d4634u002dBC6Fu002dDBEDDDE764F7.csLarge array initialization: .cctor: array initializer size 11945
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeCode function: 0_2_003A92450_2_003A9245
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeCode function: 0_2_00D6C1640_2_00D6C164
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeCode function: 0_2_00D6E5B00_2_00D6E5B0
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeCode function: 0_2_00D6E5A00_2_00D6E5A0
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeCode function: 0_2_003A929D0_2_003A929D
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeCode function: 2_2_00A592452_2_00A59245
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeCode function: 2_2_01122A982_2_01122A98
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeCode function: 2_2_011244182_2_01124418
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeCode function: 2_2_011223672_2_01122367
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeCode function: 2_2_01126D302_2_01126D30
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeCode function: 2_2_0116F8EC2_2_0116F8EC
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeCode function: 2_2_011603C52_2_011603C5
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeCode function: 2_2_0116F3C02_2_0116F3C0
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeCode function: 2_2_0116BBCC2_2_0116BBCC
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeCode function: 2_2_01165E382_2_01165E38
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeCode function: 2_2_0116A2C02_2_0116A2C0
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeCode function: 2_2_011672282_2_01167228
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeCode function: 2_2_011696602_2_01169660
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeCode function: 2_2_011754C02_2_011754C0
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeCode function: 2_2_0117B7482_2_0117B748
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeCode function: 2_2_01176BE02_2_01176BE0
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeCode function: 2_2_01174C302_2_01174C30
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeCode function: 2_2_00A5929D2_2_00A5929D
                  Source: xVvAobZvWU.exe, 00000000.00000002.202359814.0000000004D80000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs xVvAobZvWU.exe
                  Source: xVvAobZvWU.exe, 00000000.00000000.192493663.0000000000448000.00000002.00020000.sdmpBinary or memory string: OriginalFilename2A vs xVvAobZvWU.exe
                  Source: xVvAobZvWU.exe, 00000000.00000002.202558284.0000000004DF0000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameMetroFramework.dll> vs xVvAobZvWU.exe
                  Source: xVvAobZvWU.exe, 00000000.00000002.200144937.0000000003809000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameMKxlRmnrxoJfDTOrHckujWdZgfyhUUAQDs.exe4 vs xVvAobZvWU.exe
                  Source: xVvAobZvWU.exe, 00000000.00000002.203440932.0000000005941000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameMajorRevision.exe< vs xVvAobZvWU.exe
                  Source: xVvAobZvWU.exe, 00000002.00000002.463074346.00000000010A0000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamemscorrc.dllT vs xVvAobZvWU.exe
                  Source: xVvAobZvWU.exe, 00000002.00000002.461233349.0000000000AF8000.00000002.00020000.sdmpBinary or memory string: OriginalFilename2A vs xVvAobZvWU.exe
                  Source: xVvAobZvWU.exe, 00000002.00000002.460161679.0000000000402000.00000040.00000001.sdmpBinary or memory string: OriginalFilenameMKxlRmnrxoJfDTOrHckujWdZgfyhUUAQDs.exe4 vs xVvAobZvWU.exe
                  Source: xVvAobZvWU.exe, 00000002.00000002.463491577.00000000011DA000.00000004.00000020.sdmpBinary or memory string: OriginalFilenameclr.dllT vs xVvAobZvWU.exe
                  Source: xVvAobZvWU.exe, 00000002.00000002.463236763.0000000001130000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamewshom.ocx vs xVvAobZvWU.exe
                  Source: xVvAobZvWU.exe, 00000002.00000002.461362348.0000000000EF8000.00000004.00000001.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs xVvAobZvWU.exe
                  Source: xVvAobZvWU.exe, 00000002.00000002.463261981.0000000001140000.00000002.00000001.sdmpBinary or memory string: OriginalFilenamewshom.ocx.mui vs xVvAobZvWU.exe
                  Source: xVvAobZvWU.exeBinary or memory string: OriginalFilename2A vs xVvAobZvWU.exe
                  Source: xVvAobZvWU.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                  Source: xVvAobZvWU.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                  Source: 2.2.xVvAobZvWU.exe.400000.0.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                  Source: 2.2.xVvAobZvWU.exe.400000.0.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                  Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/1@2/1
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\xVvAobZvWU.exe.logJump to behavior
                  Source: xVvAobZvWU.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                  Source: xVvAobZvWU.exeVirustotal: Detection: 30%
                  Source: xVvAobZvWU.exeReversingLabs: Detection: 10%
                  Source: unknownProcess created: C:\Users\user\Desktop\xVvAobZvWU.exe 'C:\Users\user\Desktop\xVvAobZvWU.exe'
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess created: C:\Users\user\Desktop\xVvAobZvWU.exe {path}
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess created: C:\Users\user\Desktop\xVvAobZvWU.exe {path}Jump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{172BDDF8-CEEA-11D1-8B05-00600806D9B6}\InProcServer32Jump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                  Source: xVvAobZvWU.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                  Source: xVvAobZvWU.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                  Source: xVvAobZvWU.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                  Source: xVvAobZvWU.exeStatic PE information: 0x94712C9A [Tue Dec 1 14:15:54 2048 UTC]
                  Source: initial sampleStatic PE information: section name: .text entropy: 7.8881862753
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeRegistry key monitored for changes: HKEY_CURRENT_USER_ClassesJump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                  Malware Analysis System Evasion:

                  barindex
                  Yara detected AntiVM3Show sources
                  Source: Yara matchFile source: Process Memory Space: xVvAobZvWU.exe PID: 5504, type: MEMORY
                  Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)Show sources
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                  Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)Show sources
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                  Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)Show sources
                  Source: xVvAobZvWU.exe, 00000000.00000002.204367485.0000000005DA1000.00000004.00000001.sdmpBinary or memory string: WINE_GET_UNIX_FILE_NAME
                  Source: xVvAobZvWU.exe, 00000000.00000002.204367485.0000000005DA1000.00000004.00000001.sdmpBinary or memory string: SBIEDLL.DLL
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeWindow / User API: threadDelayed 2149Jump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeWindow / User API: threadDelayed 7696Jump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exe TID: 5440Thread sleep time: -31500s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exe TID: 5684Thread sleep time: -922337203685477s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exe TID: 6112Thread sleep time: -23058430092136925s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exe TID: 5824Thread sleep count: 2149 > 30Jump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exe TID: 5824Thread sleep count: 7696 > 30Jump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeThread delayed: delay time: 31500Jump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: xVvAobZvWU.exe, 00000000.00000002.204367485.0000000005DA1000.00000004.00000001.sdmpBinary or memory string: VMware SVGA IIOData Source=localhost\sqlexpress;Initial Catalog=dbSMS;Integrated Security=True
                  Source: xVvAobZvWU.exe, 00000000.00000002.204367485.0000000005DA1000.00000004.00000001.sdmpBinary or memory string: vmware
                  Source: xVvAobZvWU.exe, 00000000.00000002.204367485.0000000005DA1000.00000004.00000001.sdmpBinary or memory string: C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                  Source: xVvAobZvWU.exe, 00000000.00000002.204367485.0000000005DA1000.00000004.00000001.sdmpBinary or memory string: SOFTWARE\VMware, Inc.\VMware Tools
                  Source: xVvAobZvWU.exe, 00000000.00000002.204367485.0000000005DA1000.00000004.00000001.sdmpBinary or memory string: VMWARE
                  Source: xVvAobZvWU.exe, 00000002.00000002.463620670.0000000001249000.00000004.00000020.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll'
                  Source: xVvAobZvWU.exe, 00000000.00000002.204367485.0000000005DA1000.00000004.00000001.sdmpBinary or memory string: InstallPath%C:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
                  Source: xVvAobZvWU.exe, 00000000.00000002.204367485.0000000005DA1000.00000004.00000001.sdmpBinary or memory string: VMWARE"SOFTWARE\VMware, Inc.\VMware ToolsLHARDWARE\DEVICEMAP\Scsi\Scsi Port 1\Scsi Bus 0\Target Id 0\Logical Unit Id 0LHARDWARE\DEVICEMAP\Scsi\Scsi Port 2\Scsi Bus 0\Target Id 0\Logical Unit Id 0'SYSTEM\ControlSet001\Services\Disk\Enum
                  Source: xVvAobZvWU.exe, 00000000.00000002.204367485.0000000005DA1000.00000004.00000001.sdmpBinary or memory string: VMware SVGA II
                  Source: xVvAobZvWU.exe, 00000000.00000002.204367485.0000000005DA1000.00000004.00000001.sdmpBinary or memory string: vmwareNSYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess information queried: ProcessInformationJump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeCode function: 2_2_01122A98 LdrInitializeThunk,2_2_01122A98
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess token adjusted: DebugJump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeMemory allocated: page read and write | page guardJump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeProcess created: C:\Users\user\Desktop\xVvAobZvWU.exe {path}Jump to behavior
                  Source: xVvAobZvWU.exe, 00000002.00000002.464145624.00000000017B0000.00000002.00000001.sdmpBinary or memory string: Program Manager
                  Source: xVvAobZvWU.exe, 00000002.00000002.464145624.00000000017B0000.00000002.00000001.sdmpBinary or memory string: Shell_TrayWnd
                  Source: xVvAobZvWU.exe, 00000002.00000002.464145624.00000000017B0000.00000002.00000001.sdmpBinary or memory string: Progman
                  Source: xVvAobZvWU.exe, 00000002.00000002.464145624.00000000017B0000.00000002.00000001.sdmpBinary or memory string: Progmanlock
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeQueries volume information: C:\Users\user\Desktop\xVvAobZvWU.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeQueries volume information: C:\Users\user\Desktop\xVvAobZvWU.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                  Stealing of Sensitive Information:

                  barindex
                  Yara detected AgentTeslaShow sources
                  Source: Yara matchFile source: 00000002.00000002.460161679.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.464571382.0000000002E51000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.200144937.0000000003809000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: xVvAobZvWU.exe PID: 2584, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: xVvAobZvWU.exe PID: 5504, type: MEMORY
                  Source: Yara matchFile source: 2.2.xVvAobZvWU.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.xVvAobZvWU.exe.39b33b0.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.xVvAobZvWU.exe.39b33b0.2.raw.unpack, type: UNPACKEDPE
                  Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)Show sources
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
                  Tries to harvest and steal browser information (history, passwords, etc)Show sources
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                  Tries to harvest and steal ftp login credentialsShow sources
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeFile opened: C:\Users\user\AppData\Roaming\SmartFTP\Client 2.0\Favorites\Quick Connect\Jump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeFile opened: C:\Users\user\AppData\Roaming\FileZilla\recentservers.xmlJump to behavior
                  Tries to steal Mail credentials (via file access)Show sources
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
                  Source: C:\Users\user\Desktop\xVvAobZvWU.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                  Source: Yara matchFile source: 00000002.00000002.464571382.0000000002E51000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: xVvAobZvWU.exe PID: 2584, type: MEMORY

                  Remote Access Functionality:

                  barindex
                  Yara detected AgentTeslaShow sources
                  Source: Yara matchFile source: 00000002.00000002.460161679.0000000000402000.00000040.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000002.00000002.464571382.0000000002E51000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: 00000000.00000002.200144937.0000000003809000.00000004.00000001.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: xVvAobZvWU.exe PID: 2584, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: xVvAobZvWU.exe PID: 5504, type: MEMORY
                  Source: Yara matchFile source: 2.2.xVvAobZvWU.exe.400000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.xVvAobZvWU.exe.39b33b0.2.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 0.2.xVvAobZvWU.exe.39b33b0.2.raw.unpack, type: UNPACKEDPE

                  Mitre Att&ck Matrix

                  Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                  Valid AccountsWindows Management Instrumentation211Path InterceptionProcess Injection12Masquerading1OS Credential Dumping2Query Registry1Remote ServicesEmail Collection1Exfiltration Over Other Network MediumEncrypted Channel1Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                  Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsDisable or Modify Tools1Credentials in Registry1Security Software Discovery211Remote Desktop ProtocolArchive Collected Data11Exfiltration Over BluetoothNon-Standard Port1Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                  Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Virtualization/Sandbox Evasion131Security Account ManagerProcess Discovery2SMB/Windows Admin SharesData from Local System2Automated ExfiltrationNon-Application Layer Protocol1Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                  Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection12NTDSVirtualization/Sandbox Evasion131Distributed Component Object ModelInput CaptureScheduled TransferApplication Layer Protocol11SIM Card SwapCarrier Billing Fraud
                  Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptDeobfuscate/Decode Files or Information1LSA SecretsApplication Window Discovery1SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                  Replication Through Removable MediaLaunchdRc.commonRc.commonObfuscated Files or Information1Cached Domain CredentialsRemote System Discovery1VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                  External Remote ServicesScheduled TaskStartup ItemsStartup ItemsSoftware Packing3DCSyncSystem Information Discovery114Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                  Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobTimestomp1Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

                  Behavior Graph

                  Screenshots

                  Thumbnails

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.

                  windows-stand

                  Antivirus, Machine Learning and Genetic Malware Detection

                  Initial Sample

                  SourceDetectionScannerLabelLink
                  xVvAobZvWU.exe30%VirustotalBrowse
                  xVvAobZvWU.exe10%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
                  xVvAobZvWU.exe100%Joe Sandbox ML

                  Dropped Files

                  No Antivirus matches

                  Unpacked PE Files

                  SourceDetectionScannerLabelLinkDownload
                  2.2.xVvAobZvWU.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File

                  Domains

                  SourceDetectionScannerLabelLink
                  brimaq.com0%VirustotalBrowse
                  mail.brimaq.com1%VirustotalBrowse

                  URLs

                  SourceDetectionScannerLabelLink
                  http://UfeDnz.com0%Avira URL Cloudsafe
                  http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
                  http://Bavw5lBQkDhG9.net1-5-21-3853321935-2125563209-4053062332-1002_Classes0%Avira URL Cloudsafe
                  http://DynDns.comDynDNS0%URL Reputationsafe
                  http://DynDns.comDynDNS0%URL Reputationsafe
                  http://DynDns.comDynDNS0%URL Reputationsafe
                  http://DynDns.comDynDNS0%URL Reputationsafe
                  http://Bavw5lBQkDhG9.net0%Avira URL Cloudsafe
                  http://cps.letsencrypt.org00%URL Reputationsafe
                  http://cps.letsencrypt.org00%URL Reputationsafe
                  http://cps.letsencrypt.org00%URL Reputationsafe
                  http://cps.letsencrypt.org00%URL Reputationsafe
                  https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                  https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                  https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                  https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                  http://brimaq.com0%Avira URL Cloudsafe
                  http://mail.brimaq.com0%Avira URL Cloudsafe
                  http://r3.o.lencr.org00%URL Reputationsafe
                  http://r3.o.lencr.org00%URL Reputationsafe
                  http://r3.o.lencr.org00%URL Reputationsafe
                  https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                  https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                  https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                  http://cps.root-x1.letsencrypt.org00%URL Reputationsafe
                  http://cps.root-x1.letsencrypt.org00%URL Reputationsafe
                  http://cps.root-x1.letsencrypt.org00%URL Reputationsafe
                  http://r3.i.lencr.org/00%URL Reputationsafe
                  http://r3.i.lencr.org/00%URL Reputationsafe
                  http://r3.i.lencr.org/00%URL Reputationsafe

                  Domains and IPs

                  Contacted Domains

                  NameIPActiveMaliciousAntivirus DetectionReputation
                  brimaq.com
                  78.128.8.31
                  truetrueunknown
                  mail.brimaq.com
                  unknown
                  unknowntrueunknown

                  URLs from Memory and Binaries

                  NameSourceMaliciousAntivirus DetectionReputation
                  http://UfeDnz.comxVvAobZvWU.exe, 00000002.00000002.464571382.0000000002E51000.00000004.00000001.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://127.0.0.1:HTTP/1.1xVvAobZvWU.exe, 00000002.00000002.464571382.0000000002E51000.00000004.00000001.sdmpfalse
                  • Avira URL Cloud: safe
                  low
                  http://Bavw5lBQkDhG9.net1-5-21-3853321935-2125563209-4053062332-1002_ClassesxVvAobZvWU.exe, 00000002.00000003.401682628.0000000001094000.00000004.00000001.sdmpfalse
                  • Avira URL Cloud: safe
                  low
                  http://DynDns.comDynDNSxVvAobZvWU.exe, 00000002.00000002.464571382.0000000002E51000.00000004.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://Bavw5lBQkDhG9.netxVvAobZvWU.exe, 00000002.00000002.464571382.0000000002E51000.00000004.00000001.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://cps.letsencrypt.org0xVvAobZvWU.exe, 00000002.00000003.413844373.00000000012C7000.00000004.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%haxVvAobZvWU.exe, 00000002.00000002.464571382.0000000002E51000.00000004.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://brimaq.comxVvAobZvWU.exe, 00000002.00000002.466430906.0000000003101000.00000004.00000001.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://mail.brimaq.comxVvAobZvWU.exe, 00000002.00000002.466430906.0000000003101000.00000004.00000001.sdmpfalse
                  • Avira URL Cloud: safe
                  unknown
                  http://r3.o.lencr.org0xVvAobZvWU.exe, 00000002.00000003.413844373.00000000012C7000.00000004.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zipxVvAobZvWU.exe, 00000000.00000002.200144937.0000000003809000.00000004.00000001.sdmp, xVvAobZvWU.exe, 00000002.00000002.460161679.0000000000402000.00000040.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://cps.root-x1.letsencrypt.org0xVvAobZvWU.exe, 00000002.00000003.413844373.00000000012C7000.00000004.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown
                  http://r3.i.lencr.org/0xVvAobZvWU.exe, 00000002.00000003.413844373.00000000012C7000.00000004.00000001.sdmpfalse
                  • URL Reputation: safe
                  • URL Reputation: safe
                  • URL Reputation: safe
                  unknown

                  Contacted IPs

                  • No. of IPs < 25%
                  • 25% < No. of IPs < 50%
                  • 50% < No. of IPs < 75%
                  • 75% < No. of IPs

                  Public

                  IPDomainCountryFlagASNASN NameMalicious
                  78.128.8.31
                  brimaq.comBulgaria
                  31083TELEPOINTBGtrue

                  General Information

                  Joe Sandbox Version:31.0.0 Emerald
                  Analysis ID:385394
                  Start date:12.04.2021
                  Start time:12:44:14
                  Joe Sandbox Product:CloudBasic
                  Overall analysis duration:0h 7m 32s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Sample file name:xVvAobZvWU (renamed file extension from none to exe)
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                  Number of analysed new started processes analysed:25
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • HDC enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Detection:MAL
                  Classification:mal100.troj.spyw.evad.winEXE@3/1@2/1
                  EGA Information:
                  • Successful, ratio: 100%
                  HDC Information:
                  • Successful, ratio: 0.1% (good quality ratio 0%)
                  • Quality average: 45%
                  • Quality standard deviation: 39.5%
                  HCA Information:
                  • Successful, ratio: 99%
                  • Number of executed functions: 68
                  • Number of non-executed functions: 3
                  Cookbook Comments:
                  • Adjust boot time
                  • Enable AMSI
                  Warnings:
                  Show All
                  • Exclude process from analysis (whitelisted): taskhostw.exe, MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, UsoClient.exe
                  • Excluded IPs from analysis (whitelisted): 131.253.33.200, 13.107.22.200, 13.64.90.137, 104.43.139.144, 52.147.198.201, 20.82.210.154, 52.255.188.83, 92.122.144.200, 92.122.213.247, 92.122.213.194, 20.54.26.129
                  • Excluded domains from analysis (whitelisted): www.bing.com, skypedataprdcolwus17.cloudapp.net, arc.msn.com.nsatc.net, fs.microsoft.com, ris-prod.trafficmanager.net, e1723.g.akamaiedge.net, skypedataprdcolcus16.cloudapp.net, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, a1449.dscg2.akamai.net, arc.msn.com, dual-a-0001.dc-msedge.net, skypedataprdcoleus16.cloudapp.net, ris.api.iris.microsoft.com, skypedataprdcoleus17.cloudapp.net, a-0001.a-afdentry.net.trafficmanager.net, www-bing-com.dual-a-0001.a-msedge.net, blobcollector.events.data.trafficmanager.net, arc.trafficmanager.net, watson.telemetry.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, prod.fs.microsoft.com.akadns.net
                  • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                  • Report size getting too big, too many NtOpenKeyEx calls found.
                  • Report size getting too big, too many NtProtectVirtualMemory calls found.
                  • Report size getting too big, too many NtQueryValueKey calls found.

                  Simulations

                  Behavior and APIs

                  TimeTypeDescription
                  12:44:57API Interceptor838x Sleep call for process: xVvAobZvWU.exe modified

                  Joe Sandbox View / Context

                  IPs

                  MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                  78.128.8.31FAKTURA I RACHUNKI.exeGet hashmaliciousBrowse

                    Domains

                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext

                    ASN

                    MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                    TELEPOINTBGFAKTURA I RACHUNKI.exeGet hashmaliciousBrowse
                    • 78.128.8.31
                    0AX4532QWSA.xlsxGet hashmaliciousBrowse
                    • 217.174.152.38
                    INV8222874744_20210111490395.xlsmGet hashmaliciousBrowse
                    • 217.174.149.3
                    spetsifikatsiya.xlsGet hashmaliciousBrowse
                    • 79.124.76.20
                    spetsifikatsiya.xlsGet hashmaliciousBrowse
                    • 79.124.76.20
                    document-1932597637.xlsGet hashmaliciousBrowse
                    • 217.174.152.52
                    document-1932597637.xlsGet hashmaliciousBrowse
                    • 217.174.152.52
                    document-1961450761.xlsGet hashmaliciousBrowse
                    • 217.174.152.52
                    document-1909441643.xlsGet hashmaliciousBrowse
                    • 217.174.152.52
                    document-1961450761.xlsGet hashmaliciousBrowse
                    • 217.174.152.52
                    document-1909441643.xlsGet hashmaliciousBrowse
                    • 217.174.152.52
                    document-1942925331.xlsGet hashmaliciousBrowse
                    • 217.174.152.52
                    document-1942925331.xlsGet hashmaliciousBrowse
                    • 217.174.152.52
                    document-1892683183.xlsGet hashmaliciousBrowse
                    • 217.174.152.52
                    document-1892683183.xlsGet hashmaliciousBrowse
                    • 217.174.152.52
                    document-1909894964.xlsGet hashmaliciousBrowse
                    • 217.174.152.52
                    document-1909894964.xlsGet hashmaliciousBrowse
                    • 217.174.152.52
                    document-1965918496.xlsGet hashmaliciousBrowse
                    • 217.174.152.52
                    document-1965918496.xlsGet hashmaliciousBrowse
                    • 217.174.152.52
                    document-1901557343.xlsGet hashmaliciousBrowse
                    • 217.174.152.52

                    JA3 Fingerprints

                    No context

                    Dropped Files

                    No context

                    Created / dropped Files

                    C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\xVvAobZvWU.exe.log
                    Process:C:\Users\user\Desktop\xVvAobZvWU.exe
                    File Type:ASCII text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):1216
                    Entropy (8bit):5.355304211458859
                    Encrypted:false
                    SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
                    MD5:FED34146BF2F2FA59DCF8702FCC8232E
                    SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
                    SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
                    SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
                    Malicious:true
                    Reputation:high, very likely benign file
                    Preview: 1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21

                    Static File Info

                    General

                    File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                    Entropy (8bit):7.881411013396599
                    TrID:
                    • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                    • Win32 Executable (generic) a (10002005/4) 49.75%
                    • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                    • Windows Screen Saver (13104/52) 0.07%
                    • Generic Win/DOS Executable (2004/3) 0.01%
                    File name:xVvAobZvWU.exe
                    File size:678400
                    MD5:b415645d1b8039996726b424cd53a81c
                    SHA1:cfcc4ee2d2e00ae4deb8591e7b8682d6946db5f5
                    SHA256:806bf1c6fa713325b45642893ede4dcb76dbf6044aea80a5315da1075cc25b9a
                    SHA512:a3d6f1444a13842e56e7aada5fcaf323058718fc564b9699956316afc1563f2b426e13b7f556fd4cd6de1ac6eef98e7fdebd05bdaecf986291bde742cb939c37
                    SSDEEP:12288:j0yZ00LCYKcGRcbLtD7TJrQrfVpo67st01Q5WMMe1zr6FEg848vDEpW:JZpCYKcGabvWXuoMMedr6F1zU
                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....,q...............0..P...........n... ........@.. ....................................@................................

                    File Icon

                    Icon Hash:00828e8e8686b000

                    Static PE Info

                    General

                    Entrypoint:0x4a6ed2
                    Entrypoint Section:.text
                    Digitally signed:false
                    Imagebase:0x400000
                    Subsystem:windows gui
                    Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                    DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
                    Time Stamp:0x94712C9A [Tue Dec 1 14:15:54 2048 UTC]
                    TLS Callbacks:
                    CLR (.Net) Version:v4.0.30319
                    OS Version Major:4
                    OS Version Minor:0
                    File Version Major:4
                    File Version Minor:0
                    Subsystem Version Major:4
                    Subsystem Version Minor:0
                    Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

                    Entrypoint Preview

                    Instruction
                    jmp dword ptr [00402000h]
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al
                    add byte ptr [eax], al

                    Data Directories

                    NameVirtual AddressVirtual Size Is in Section
                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IMPORT0xa6e800x4f.text
                    IMAGE_DIRECTORY_ENTRY_RESOURCE0xa80000x5f8.rsrc
                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                    IMAGE_DIRECTORY_ENTRY_BASERELOC0xaa0000xc.reloc
                    IMAGE_DIRECTORY_ENTRY_DEBUG0xa6e640x1c.text
                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

                    Sections

                    NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                    .text0x20000xa4ed80xa5000False0.90078272964data7.8881862753IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                    .rsrc0xa80000x5f80x600False0.438802083333data4.24177120131IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    .reloc0xaa0000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

                    Resources

                    NameRVASizeTypeLanguageCountry
                    RT_VERSION0xa80900x366data
                    RT_MANIFEST0xa84080x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

                    Imports

                    DLLImport
                    mscoree.dll_CorExeMain

                    Version Infos

                    DescriptionData
                    Translation0x0000 0x04b0
                    LegalCopyrightCopyright Integra Wealth
                    Assembly Version1.8.9.10
                    InternalName2i.exe
                    FileVersion1.9.1.0
                    CompanyNameIntegra Wealth
                    LegalTrademarks
                    Comments
                    ProductNameReplacementFallback
                    ProductVersion1.9.1.0
                    FileDescriptionReplacementFallback
                    OriginalFilename2i.exe

                    Network Behavior

                    Network Port Distribution

                    TCP Packets

                    TimestampSource PortDest PortSource IPDest IP
                    Apr 12, 2021 12:46:38.869477987 CEST49741587192.168.2.378.128.8.31
                    Apr 12, 2021 12:46:38.946281910 CEST5874974178.128.8.31192.168.2.3
                    Apr 12, 2021 12:46:38.946373940 CEST49741587192.168.2.378.128.8.31
                    Apr 12, 2021 12:46:39.163911104 CEST5874974178.128.8.31192.168.2.3
                    Apr 12, 2021 12:46:39.164525986 CEST49741587192.168.2.378.128.8.31
                    Apr 12, 2021 12:46:39.243127108 CEST5874974178.128.8.31192.168.2.3
                    Apr 12, 2021 12:46:39.243381023 CEST49741587192.168.2.378.128.8.31
                    Apr 12, 2021 12:46:39.323828936 CEST5874974178.128.8.31192.168.2.3
                    Apr 12, 2021 12:46:39.378572941 CEST49741587192.168.2.378.128.8.31
                    Apr 12, 2021 12:46:39.385159016 CEST49741587192.168.2.378.128.8.31
                    Apr 12, 2021 12:46:39.473922014 CEST5874974178.128.8.31192.168.2.3
                    Apr 12, 2021 12:46:39.473978996 CEST5874974178.128.8.31192.168.2.3
                    Apr 12, 2021 12:46:39.474025965 CEST5874974178.128.8.31192.168.2.3
                    Apr 12, 2021 12:46:39.474138021 CEST49741587192.168.2.378.128.8.31
                    Apr 12, 2021 12:46:39.485213995 CEST49741587192.168.2.378.128.8.31
                    Apr 12, 2021 12:46:39.564122915 CEST5874974178.128.8.31192.168.2.3
                    Apr 12, 2021 12:46:39.613044977 CEST49741587192.168.2.378.128.8.31
                    Apr 12, 2021 12:46:39.850397110 CEST49741587192.168.2.378.128.8.31
                    Apr 12, 2021 12:46:39.928841114 CEST5874974178.128.8.31192.168.2.3
                    Apr 12, 2021 12:46:39.932363033 CEST49741587192.168.2.378.128.8.31
                    Apr 12, 2021 12:46:40.011511087 CEST5874974178.128.8.31192.168.2.3
                    Apr 12, 2021 12:46:40.016185045 CEST49741587192.168.2.378.128.8.31
                    Apr 12, 2021 12:46:40.115988970 CEST5874974178.128.8.31192.168.2.3
                    Apr 12, 2021 12:46:40.117352962 CEST49741587192.168.2.378.128.8.31
                    Apr 12, 2021 12:46:40.194215059 CEST5874974178.128.8.31192.168.2.3
                    Apr 12, 2021 12:46:40.194924116 CEST49741587192.168.2.378.128.8.31
                    Apr 12, 2021 12:46:40.311352968 CEST5874974178.128.8.31192.168.2.3
                    Apr 12, 2021 12:46:40.351804972 CEST5874974178.128.8.31192.168.2.3
                    Apr 12, 2021 12:46:40.352585077 CEST49741587192.168.2.378.128.8.31
                    Apr 12, 2021 12:46:40.429482937 CEST5874974178.128.8.31192.168.2.3
                    Apr 12, 2021 12:46:40.435127974 CEST49741587192.168.2.378.128.8.31
                    Apr 12, 2021 12:46:40.435487032 CEST49741587192.168.2.378.128.8.31
                    Apr 12, 2021 12:46:40.435702085 CEST49741587192.168.2.378.128.8.31
                    Apr 12, 2021 12:46:40.435915947 CEST49741587192.168.2.378.128.8.31
                    Apr 12, 2021 12:46:40.512160063 CEST5874974178.128.8.31192.168.2.3
                    Apr 12, 2021 12:46:40.512242079 CEST5874974178.128.8.31192.168.2.3
                    Apr 12, 2021 12:46:40.512346983 CEST5874974178.128.8.31192.168.2.3
                    Apr 12, 2021 12:46:40.512382984 CEST5874974178.128.8.31192.168.2.3
                    Apr 12, 2021 12:46:40.543119907 CEST5874974178.128.8.31192.168.2.3
                    Apr 12, 2021 12:46:40.597439051 CEST49741587192.168.2.378.128.8.31

                    UDP Packets

                    TimestampSource PortDest PortSource IPDest IP
                    Apr 12, 2021 12:44:50.612360954 CEST5062053192.168.2.38.8.8.8
                    Apr 12, 2021 12:44:50.669533014 CEST53506208.8.8.8192.168.2.3
                    Apr 12, 2021 12:44:51.245843887 CEST6493853192.168.2.38.8.8.8
                    Apr 12, 2021 12:44:51.297452927 CEST53649388.8.8.8192.168.2.3
                    Apr 12, 2021 12:44:52.431533098 CEST6015253192.168.2.38.8.8.8
                    Apr 12, 2021 12:44:52.481501102 CEST53601528.8.8.8192.168.2.3
                    Apr 12, 2021 12:44:53.900589943 CEST5754453192.168.2.38.8.8.8
                    Apr 12, 2021 12:44:53.949954987 CEST53575448.8.8.8192.168.2.3
                    Apr 12, 2021 12:44:57.193084955 CEST5598453192.168.2.38.8.8.8
                    Apr 12, 2021 12:44:57.241938114 CEST53559848.8.8.8192.168.2.3
                    Apr 12, 2021 12:44:58.087940931 CEST6418553192.168.2.38.8.8.8
                    Apr 12, 2021 12:44:58.141357899 CEST53641858.8.8.8192.168.2.3
                    Apr 12, 2021 12:44:59.118503094 CEST6511053192.168.2.38.8.8.8
                    Apr 12, 2021 12:44:59.175698042 CEST53651108.8.8.8192.168.2.3
                    Apr 12, 2021 12:45:00.035691023 CEST5836153192.168.2.38.8.8.8
                    Apr 12, 2021 12:45:00.086199045 CEST53583618.8.8.8192.168.2.3
                    Apr 12, 2021 12:45:01.092727900 CEST6349253192.168.2.38.8.8.8
                    Apr 12, 2021 12:45:01.141478062 CEST53634928.8.8.8192.168.2.3
                    Apr 12, 2021 12:45:01.867960930 CEST6083153192.168.2.38.8.8.8
                    Apr 12, 2021 12:45:01.916639090 CEST53608318.8.8.8192.168.2.3
                    Apr 12, 2021 12:45:03.007688046 CEST6010053192.168.2.38.8.8.8
                    Apr 12, 2021 12:45:03.059261084 CEST53601008.8.8.8192.168.2.3
                    Apr 12, 2021 12:45:03.925549984 CEST5319553192.168.2.38.8.8.8
                    Apr 12, 2021 12:45:03.974323988 CEST53531958.8.8.8192.168.2.3
                    Apr 12, 2021 12:45:06.181027889 CEST5014153192.168.2.38.8.8.8
                    Apr 12, 2021 12:45:06.234987974 CEST53501418.8.8.8192.168.2.3
                    Apr 12, 2021 12:45:07.642683983 CEST5302353192.168.2.38.8.8.8
                    Apr 12, 2021 12:45:07.691351891 CEST53530238.8.8.8192.168.2.3
                    Apr 12, 2021 12:45:24.676044941 CEST4956353192.168.2.38.8.8.8
                    Apr 12, 2021 12:45:24.728600979 CEST53495638.8.8.8192.168.2.3
                    Apr 12, 2021 12:45:26.453423977 CEST5135253192.168.2.38.8.8.8
                    Apr 12, 2021 12:45:26.505266905 CEST53513528.8.8.8192.168.2.3
                    Apr 12, 2021 12:45:27.536922932 CEST5934953192.168.2.38.8.8.8
                    Apr 12, 2021 12:45:27.585517883 CEST53593498.8.8.8192.168.2.3
                    Apr 12, 2021 12:45:31.249435902 CEST5708453192.168.2.38.8.8.8
                    Apr 12, 2021 12:45:31.322732925 CEST53570848.8.8.8192.168.2.3
                    Apr 12, 2021 12:45:36.898156881 CEST5882353192.168.2.38.8.8.8
                    Apr 12, 2021 12:45:36.956593990 CEST53588238.8.8.8192.168.2.3
                    Apr 12, 2021 12:45:45.408162117 CEST5756853192.168.2.38.8.8.8
                    Apr 12, 2021 12:45:45.474838018 CEST53575688.8.8.8192.168.2.3
                    Apr 12, 2021 12:45:47.998008013 CEST5054053192.168.2.38.8.8.8
                    Apr 12, 2021 12:45:48.047997952 CEST53505408.8.8.8192.168.2.3
                    Apr 12, 2021 12:45:52.693586111 CEST5436653192.168.2.38.8.8.8
                    Apr 12, 2021 12:45:52.742301941 CEST53543668.8.8.8192.168.2.3
                    Apr 12, 2021 12:45:56.675220966 CEST5303453192.168.2.38.8.8.8
                    Apr 12, 2021 12:45:56.726906061 CEST53530348.8.8.8192.168.2.3
                    Apr 12, 2021 12:45:59.935096025 CEST5776253192.168.2.38.8.8.8
                    Apr 12, 2021 12:45:59.986671925 CEST53577628.8.8.8192.168.2.3
                    Apr 12, 2021 12:46:02.939059019 CEST5543553192.168.2.38.8.8.8
                    Apr 12, 2021 12:46:03.000535965 CEST53554358.8.8.8192.168.2.3
                    Apr 12, 2021 12:46:34.890126944 CEST5071353192.168.2.38.8.8.8
                    Apr 12, 2021 12:46:34.941271067 CEST53507138.8.8.8192.168.2.3
                    Apr 12, 2021 12:46:37.076522112 CEST5613253192.168.2.38.8.8.8
                    Apr 12, 2021 12:46:37.137068987 CEST53561328.8.8.8192.168.2.3
                    Apr 12, 2021 12:46:38.585671902 CEST5898753192.168.2.38.8.8.8
                    Apr 12, 2021 12:46:38.683134079 CEST53589878.8.8.8192.168.2.3
                    Apr 12, 2021 12:46:38.718928099 CEST5657953192.168.2.38.8.8.8
                    Apr 12, 2021 12:46:38.780081034 CEST53565798.8.8.8192.168.2.3

                    DNS Queries

                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClass
                    Apr 12, 2021 12:46:38.585671902 CEST192.168.2.38.8.8.80xd703Standard query (0)mail.brimaq.comA (IP address)IN (0x0001)
                    Apr 12, 2021 12:46:38.718928099 CEST192.168.2.38.8.8.80xae83Standard query (0)mail.brimaq.comA (IP address)IN (0x0001)

                    DNS Answers

                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClass
                    Apr 12, 2021 12:46:38.683134079 CEST8.8.8.8192.168.2.30xd703No error (0)mail.brimaq.combrimaq.comCNAME (Canonical name)IN (0x0001)
                    Apr 12, 2021 12:46:38.683134079 CEST8.8.8.8192.168.2.30xd703No error (0)brimaq.com78.128.8.31A (IP address)IN (0x0001)
                    Apr 12, 2021 12:46:38.780081034 CEST8.8.8.8192.168.2.30xae83No error (0)mail.brimaq.combrimaq.comCNAME (Canonical name)IN (0x0001)
                    Apr 12, 2021 12:46:38.780081034 CEST8.8.8.8192.168.2.30xae83No error (0)brimaq.com78.128.8.31A (IP address)IN (0x0001)

                    SMTP Packets

                    TimestampSource PortDest PortSource IPDest IPCommands
                    Apr 12, 2021 12:46:39.163911104 CEST5874974178.128.8.31192.168.2.3220-srvr.laprimeracloud08.com ESMTP Exim 4.94 #2 Mon, 12 Apr 2021 12:46:39 +0200
                    220-We do not authorize the use of this system to transport unsolicited,
                    220 and/or bulk e-mail.
                    Apr 12, 2021 12:46:39.164525986 CEST49741587192.168.2.378.128.8.31EHLO 818225
                    Apr 12, 2021 12:46:39.243127108 CEST5874974178.128.8.31192.168.2.3250-srvr.laprimeracloud08.com Hello 818225 [84.17.52.3]
                    250-SIZE 52428800
                    250-8BITMIME
                    250-PIPELINING
                    250-X_PIPE_CONNECT
                    250-AUTH PLAIN LOGIN
                    250-STARTTLS
                    250 HELP
                    Apr 12, 2021 12:46:39.243381023 CEST49741587192.168.2.378.128.8.31STARTTLS
                    Apr 12, 2021 12:46:39.323828936 CEST5874974178.128.8.31192.168.2.3220 TLS go ahead

                    Code Manipulations

                    Statistics

                    CPU Usage

                    Click to jump to process

                    Memory Usage

                    Click to jump to process

                    High Level Behavior Distribution

                    Click to dive into process behavior distribution

                    Behavior

                    Click to jump to process

                    System Behavior

                    General

                    Start time:12:44:56
                    Start date:12/04/2021
                    Path:C:\Users\user\Desktop\xVvAobZvWU.exe
                    Wow64 process (32bit):true
                    Commandline:'C:\Users\user\Desktop\xVvAobZvWU.exe'
                    Imagebase:0x3a0000
                    File size:678400 bytes
                    MD5 hash:B415645D1B8039996726B424CD53A81C
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:.Net C# or VB.NET
                    Yara matches:
                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000000.00000002.200144937.0000000003809000.00000004.00000001.sdmp, Author: Joe Security
                    Reputation:low

                    General

                    Start time:12:44:59
                    Start date:12/04/2021
                    Path:C:\Users\user\Desktop\xVvAobZvWU.exe
                    Wow64 process (32bit):true
                    Commandline:{path}
                    Imagebase:0xa50000
                    File size:678400 bytes
                    MD5 hash:B415645D1B8039996726B424CD53A81C
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:.Net C# or VB.NET
                    Yara matches:
                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.460161679.0000000000402000.00000040.00000001.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000002.00000002.464571382.0000000002E51000.00000004.00000001.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000002.00000002.464571382.0000000002E51000.00000004.00000001.sdmp, Author: Joe Security
                    Reputation:low

                    Disassembly

                    Code Analysis

                    Reset < >

                      Execution Graph

                      Execution Coverage:10.6%
                      Dynamic/Decrypted Code Coverage:100%
                      Signature Coverage:0%
                      Total number of Nodes:109
                      Total number of Limit Nodes:6

                      Graph

                      execution_graph 14267 d6b6d0 14268 d6b736 14267->14268 14272 d6b883 14268->14272 14275 d6b890 14268->14275 14269 d6b7e5 14273 d6b8be 14272->14273 14278 d69800 14272->14278 14273->14269 14276 d69800 DuplicateHandle 14275->14276 14277 d6b8be 14276->14277 14277->14269 14279 d6b8f8 DuplicateHandle 14278->14279 14280 d6b98e 14279->14280 14280->14273 14281 d640d0 14282 d640e2 14281->14282 14283 d640ee 14282->14283 14287 d641e0 14282->14287 14292 d63c64 14283->14292 14285 d6410d 14288 d64205 14287->14288 14296 d642e0 14288->14296 14300 d642df 14288->14300 14293 d63c6f 14292->14293 14308 d651a4 14293->14308 14295 d66a18 14295->14285 14298 d64307 14296->14298 14297 d643e4 14298->14297 14304 d63de8 14298->14304 14302 d64307 14300->14302 14301 d643e4 14301->14301 14302->14301 14303 d63de8 CreateActCtxA 14302->14303 14303->14301 14305 d65370 CreateActCtxA 14304->14305 14307 d65433 14305->14307 14309 d651af 14308->14309 14312 d657f8 14309->14312 14311 d66abd 14311->14295 14313 d65803 14312->14313 14316 d65828 14313->14316 14315 d66b9a 14315->14311 14317 d65833 14316->14317 14320 d65858 14317->14320 14319 d66c8a 14319->14315 14322 d65863 14320->14322 14321 d673dc 14321->14319 14322->14321 14325 d6b300 14322->14325 14330 d6b2ff 14322->14330 14326 d6b321 14325->14326 14327 d6b345 14326->14327 14335 d6b5b3 14326->14335 14339 d6b5b8 14326->14339 14327->14321 14332 d6b321 14330->14332 14331 d6b345 14331->14321 14332->14331 14333 d6b5b3 2 API calls 14332->14333 14334 d6b5b8 2 API calls 14332->14334 14333->14331 14334->14331 14337 d6b5c5 14335->14337 14336 d6b5ff 14336->14327 14337->14336 14343 d69778 14337->14343 14340 d6b5c5 14339->14340 14341 d69778 2 API calls 14340->14341 14342 d6b5ff 14340->14342 14341->14342 14342->14327 14344 d69783 14343->14344 14346 d6c2f8 14344->14346 14347 d69840 14344->14347 14348 d6984b 14347->14348 14349 d65858 2 API calls 14348->14349 14350 d6c367 14348->14350 14349->14350 14354 d6e0d8 14350->14354 14364 d6e0e8 14350->14364 14351 d6c3a0 14351->14346 14356 d6e119 14354->14356 14357 d6e20a 14354->14357 14355 d6e125 14355->14351 14356->14355 14361 d6e5a0 LoadLibraryExW 14356->14361 14362 d6e55b LoadLibraryExW 14356->14362 14363 d6e568 LoadLibraryExW 14356->14363 14357->14351 14358 d6e165 14359 d6ef30 CreateWindowExW 14358->14359 14360 d6ef2b CreateWindowExW 14358->14360 14359->14357 14360->14357 14361->14358 14362->14358 14363->14358 14366 d6e20a 14364->14366 14367 d6e119 14364->14367 14365 d6e125 14365->14351 14366->14351 14367->14365 14371 d6e5a0 LoadLibraryExW 14367->14371 14372 d6e55b LoadLibraryExW 14367->14372 14373 d6e568 LoadLibraryExW 14367->14373 14368 d6e165 14369 d6ef30 CreateWindowExW 14368->14369 14370 d6ef2b CreateWindowExW 14368->14370 14369->14366 14370->14366 14371->14368 14372->14368 14373->14368 14374 d69190 14378 d69288 14374->14378 14383 d69278 14374->14383 14375 d6919f 14379 d6929b 14378->14379 14380 d692ab 14379->14380 14388 d69917 14379->14388 14392 d69918 14379->14392 14380->14375 14384 d6929b 14383->14384 14385 d692ab 14384->14385 14386 d69917 LoadLibraryExW 14384->14386 14387 d69918 LoadLibraryExW 14384->14387 14385->14375 14386->14385 14387->14385 14389 d6992c 14388->14389 14391 d69951 14389->14391 14396 d69478 14389->14396 14391->14380 14393 d6992c 14392->14393 14394 d69951 14393->14394 14395 d69478 LoadLibraryExW 14393->14395 14394->14380 14395->14394 14397 d69af8 LoadLibraryExW 14396->14397 14399 d69b71 14397->14399 14399->14391 14400 d69870 14401 d698b2 14400->14401 14402 d698b8 GetModuleHandleW 14400->14402 14401->14402 14403 d698e5 14402->14403

                      Executed Functions

                      Memory Dump Source
                      • Source File: 00000000.00000002.199845434.0000000000D60000.00000040.00000001.sdmp, Offset: 00D60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d60000_xVvAobZvWU.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: eda01bc05bd61b4535fa0a5bbc41bc1160f3cd3024bcaa394a33dae25b80b7ad
                      • Instruction ID: 00f992f0892b024a81461591a48f11bcfbaf33067538d9fce62abe3c2af5e29f
                      • Opcode Fuzzy Hash: eda01bc05bd61b4535fa0a5bbc41bc1160f3cd3024bcaa394a33dae25b80b7ad
                      • Instruction Fuzzy Hash: 81C149B5821B46CBD714DF65FCC82893BA1FB85328F514308D261AB7E8D7B4644ACFA4
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 0 d6de03-d6de08 1 d6de13-d6fd9e 0->1 2 d6de0a-d6de0e 0->2 4 d6fda0-d6fda6 1->4 5 d6fda9-d6fdb0 1->5 2->1 4->5 6 d6fdb2-d6fdb8 5->6 7 d6fdbb-d6fdf3 5->7 6->7 8 d6fdfb-d6fe5a CreateWindowExW 7->8 9 d6fe63-d6fe9b 8->9 10 d6fe5c-d6fe62 8->10 14 d6fe9d-d6fea0 9->14 15 d6fea8 9->15 10->9 14->15 16 d6fea9 15->16 16->16
                      APIs
                      • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 00D6FE4A
                      Memory Dump Source
                      • Source File: 00000000.00000002.199845434.0000000000D60000.00000040.00000001.sdmp, Offset: 00D60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d60000_xVvAobZvWU.jbxd
                      Similarity
                      • API ID: CreateWindow
                      • String ID:
                      • API String ID: 716092398-0
                      • Opcode ID: bdaf1751c61f7527620b537ecab42a5d20c34b3aeebecf5cb3fbdcdc1e224eac
                      • Instruction ID: 024500e49d355c2a22f276065711d49d57f3b92d652fbadc3ded3855a0915721
                      • Opcode Fuzzy Hash: bdaf1751c61f7527620b537ecab42a5d20c34b3aeebecf5cb3fbdcdc1e224eac
                      • Instruction Fuzzy Hash: 5551D0B1D003089FDB14CF99D880ADEBFB5FF88314F24812AE819AB211D775A845CFA1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 17 d6fd2c-d6fd9e 18 d6fda0-d6fda6 17->18 19 d6fda9-d6fdb0 17->19 18->19 20 d6fdb2-d6fdb8 19->20 21 d6fdbb-d6fdf3 19->21 20->21 22 d6fdfb-d6fe5a CreateWindowExW 21->22 23 d6fe63-d6fe9b 22->23 24 d6fe5c-d6fe62 22->24 28 d6fe9d-d6fea0 23->28 29 d6fea8 23->29 24->23 28->29 30 d6fea9 29->30 30->30
                      APIs
                      • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 00D6FE4A
                      Memory Dump Source
                      • Source File: 00000000.00000002.199845434.0000000000D60000.00000040.00000001.sdmp, Offset: 00D60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d60000_xVvAobZvWU.jbxd
                      Similarity
                      • API ID: CreateWindow
                      • String ID:
                      • API String ID: 716092398-0
                      • Opcode ID: 49de7af1428f24d12ad64a67ba3e04062eca7d3a6f5aedb1ed9cf53c5dd9f49d
                      • Instruction ID: 782bab15dcf5cc24593f476051d6131e4846bcd06563c7de99545cfb42517388
                      • Opcode Fuzzy Hash: 49de7af1428f24d12ad64a67ba3e04062eca7d3a6f5aedb1ed9cf53c5dd9f49d
                      • Instruction Fuzzy Hash: 1351C0B1D007099FDB14DFA9D880ADEBFB5FF88314F24812AE819AB211D775A945CF90
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 31 d6de0c-d6fd9e 34 d6fda0-d6fda6 31->34 35 d6fda9-d6fdb0 31->35 34->35 36 d6fdb2-d6fdb8 35->36 37 d6fdbb-d6fe5a CreateWindowExW 35->37 36->37 39 d6fe63-d6fe9b 37->39 40 d6fe5c-d6fe62 37->40 44 d6fe9d-d6fea0 39->44 45 d6fea8 39->45 40->39 44->45 46 d6fea9 45->46 46->46
                      APIs
                      • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 00D6FE4A
                      Memory Dump Source
                      • Source File: 00000000.00000002.199845434.0000000000D60000.00000040.00000001.sdmp, Offset: 00D60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d60000_xVvAobZvWU.jbxd
                      Similarity
                      • API ID: CreateWindow
                      • String ID:
                      • API String ID: 716092398-0
                      • Opcode ID: 47c07ad0518f8faee0b477cbf7aa9954ad78dde87c659b81a4e1334e3794f203
                      • Instruction ID: 71882be0c84319a277d34bb94862a689d883abdae9c0bce36f7e59570fd78d32
                      • Opcode Fuzzy Hash: 47c07ad0518f8faee0b477cbf7aa9954ad78dde87c659b81a4e1334e3794f203
                      • Instruction Fuzzy Hash: A951B0B1D007099FDB14DF99D884ADEBFB5BF88314F24812AE419AB211D775A845CFA0
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 47 d6de12-d6fd9e 50 d6fda0-d6fda6 47->50 51 d6fda9-d6fdb0 47->51 50->51 52 d6fdb2-d6fdb8 51->52 53 d6fdbb-d6fdf3 51->53 52->53 54 d6fdfb-d6fe5a CreateWindowExW 53->54 55 d6fe63-d6fe9b 54->55 56 d6fe5c-d6fe62 54->56 60 d6fe9d-d6fea0 55->60 61 d6fea8 55->61 56->55 60->61 62 d6fea9 61->62 62->62
                      APIs
                      • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 00D6FE4A
                      Memory Dump Source
                      • Source File: 00000000.00000002.199845434.0000000000D60000.00000040.00000001.sdmp, Offset: 00D60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d60000_xVvAobZvWU.jbxd
                      Similarity
                      • API ID: CreateWindow
                      • String ID:
                      • API String ID: 716092398-0
                      • Opcode ID: 92514eeadbc8de90191796b65357895e46957eb2cd4465945e56bdf126ded4eb
                      • Instruction ID: b998356860dbe328397fc8d44273c917280a2569f9864206604663420afea95d
                      • Opcode Fuzzy Hash: 92514eeadbc8de90191796b65357895e46957eb2cd4465945e56bdf126ded4eb
                      • Instruction Fuzzy Hash: 9A41D0B1D00709DFDB14CF99D880ADEBFB5BF88310F24812AE419AB211D775A845CFA0
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 63 d63de8-d65431 CreateActCtxA 66 d65433-d65439 63->66 67 d6543a-d65494 63->67 66->67 74 d65496-d65499 67->74 75 d654a3-d654a7 67->75 74->75 76 d654b8 75->76 77 d654a9-d654b5 75->77 79 d654b9 76->79 77->76 79->79
                      APIs
                      • CreateActCtxA.KERNEL32(?), ref: 00D65421
                      Memory Dump Source
                      • Source File: 00000000.00000002.199845434.0000000000D60000.00000040.00000001.sdmp, Offset: 00D60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d60000_xVvAobZvWU.jbxd
                      Similarity
                      • API ID: Create
                      • String ID:
                      • API String ID: 2289755597-0
                      • Opcode ID: ad24a7d022b755b06dc81338eda2079c67e8720b3cfefb183cea65fb25fb5038
                      • Instruction ID: 859ab19150f6787eddf12a905076e5c40d87e1f0f9c08cae7db906288afb6205
                      • Opcode Fuzzy Hash: ad24a7d022b755b06dc81338eda2079c67e8720b3cfefb183cea65fb25fb5038
                      • Instruction Fuzzy Hash: 7141F271D04618CBDB24DFA9C844BCDBBB5BF49308F2480A9D418BB255DBB56985CFA0
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 80 d6536d-d65431 CreateActCtxA 82 d65433-d65439 80->82 83 d6543a-d65494 80->83 82->83 90 d65496-d65499 83->90 91 d654a3-d654a7 83->91 90->91 92 d654b8 91->92 93 d654a9-d654b5 91->93 95 d654b9 92->95 93->92 95->95
                      APIs
                      • CreateActCtxA.KERNEL32(?), ref: 00D65421
                      Memory Dump Source
                      • Source File: 00000000.00000002.199845434.0000000000D60000.00000040.00000001.sdmp, Offset: 00D60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d60000_xVvAobZvWU.jbxd
                      Similarity
                      • API ID: Create
                      • String ID:
                      • API String ID: 2289755597-0
                      • Opcode ID: ad8405686bc50c0a55e7643a0d42dfa87d6c4c993dce9d2beb3e8191ca8641a8
                      • Instruction ID: da9eebe802789332294ad04065e18f0525d0cf752c1ecfd42ecdc56d55db827f
                      • Opcode Fuzzy Hash: ad8405686bc50c0a55e7643a0d42dfa87d6c4c993dce9d2beb3e8191ca8641a8
                      • Instruction Fuzzy Hash: C841E271D00618CFDB24DFA5C8447CDBBB1BF49308F2580A9D418BB255DB756986CFA0
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 96 d69800-d6b98c DuplicateHandle 98 d6b995-d6b9b2 96->98 99 d6b98e-d6b994 96->99 99->98
                      APIs
                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,00D6B8BE,?,?,?,?,?), ref: 00D6B97F
                      Memory Dump Source
                      • Source File: 00000000.00000002.199845434.0000000000D60000.00000040.00000001.sdmp, Offset: 00D60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d60000_xVvAobZvWU.jbxd
                      Similarity
                      • API ID: DuplicateHandle
                      • String ID:
                      • API String ID: 3793708945-0
                      • Opcode ID: 7bed87507789dddd810579f90a7cbe78185d45dd22523374cc00702d6671f2cb
                      • Instruction ID: b516b907f52cb0d7a7dba9277e5e1a17273e44c8c91d7d709102e594a690b9da
                      • Opcode Fuzzy Hash: 7bed87507789dddd810579f90a7cbe78185d45dd22523374cc00702d6671f2cb
                      • Instruction Fuzzy Hash: 0321F4B5900208AFDB10DF9AD884ADEBBF8EB48320F14801AE914A7310D374A944CFA0
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 102 d6b8f3-d6b98c DuplicateHandle 103 d6b995-d6b9b2 102->103 104 d6b98e-d6b994 102->104 104->103
                      APIs
                      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,00D6B8BE,?,?,?,?,?), ref: 00D6B97F
                      Memory Dump Source
                      • Source File: 00000000.00000002.199845434.0000000000D60000.00000040.00000001.sdmp, Offset: 00D60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d60000_xVvAobZvWU.jbxd
                      Similarity
                      • API ID: DuplicateHandle
                      • String ID:
                      • API String ID: 3793708945-0
                      • Opcode ID: a019d3bb35e83b6ba7b34da31f15948b28d963d8319ab645176820ff7a548f30
                      • Instruction ID: b505ecc67d8e687729a7f3015aa7bbec9c5f4d0ebfb917b882801c33315480ff
                      • Opcode Fuzzy Hash: a019d3bb35e83b6ba7b34da31f15948b28d963d8319ab645176820ff7a548f30
                      • Instruction Fuzzy Hash: A42103B5901248AFDB10CFA9D884ADEFFF4FB48320F14841AE954A7310C374A944CFA4
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 107 d69af0-d69af5 108 d69af7-d69b38 107->108 109 d69ab9 107->109 110 d69b40-d69b6f LoadLibraryExW 108->110 111 d69b3a-d69b3d 108->111 109->107 112 d69b71-d69b77 110->112 113 d69b78-d69b95 110->113 111->110 112->113
                      APIs
                      • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,00D69951,00000800,00000000,00000000), ref: 00D69B62
                      Memory Dump Source
                      • Source File: 00000000.00000002.199845434.0000000000D60000.00000040.00000001.sdmp, Offset: 00D60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d60000_xVvAobZvWU.jbxd
                      Similarity
                      • API ID: LibraryLoad
                      • String ID:
                      • API String ID: 1029625771-0
                      • Opcode ID: a580c6c6cf5dc0f8d7d99577553f2c9a7ba17578e54254ee58ec50a8e6935cdc
                      • Instruction ID: 195430681e2b1aeeaa8b1ec4dd435addbb9ccfe582754659d57fd8f6b4aa04b8
                      • Opcode Fuzzy Hash: a580c6c6cf5dc0f8d7d99577553f2c9a7ba17578e54254ee58ec50a8e6935cdc
                      • Instruction Fuzzy Hash: 852138B2C00209DFDB20DF9AD484ADEFBF8EB88720F148559E425A7640C374A545CFA0
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 116 d69478-d69b38 118 d69b40-d69b6f LoadLibraryExW 116->118 119 d69b3a-d69b3d 116->119 120 d69b71-d69b77 118->120 121 d69b78-d69b95 118->121 119->118 120->121
                      APIs
                      • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,00D69951,00000800,00000000,00000000), ref: 00D69B62
                      Memory Dump Source
                      • Source File: 00000000.00000002.199845434.0000000000D60000.00000040.00000001.sdmp, Offset: 00D60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d60000_xVvAobZvWU.jbxd
                      Similarity
                      • API ID: LibraryLoad
                      • String ID:
                      • API String ID: 1029625771-0
                      • Opcode ID: 3371fc924eb3b71fd6ac4b3d269fd5b7b6dc80b442ad7d6b6eaf4a9e8d32aae3
                      • Instruction ID: c0fbf8ece2d6e92c5960eb7e7801f8b95dda300bc5b528b25a06c35bfe9a6f34
                      • Opcode Fuzzy Hash: 3371fc924eb3b71fd6ac4b3d269fd5b7b6dc80b442ad7d6b6eaf4a9e8d32aae3
                      • Instruction Fuzzy Hash: 281106B29003099FDB10DF9AD484ADEFBF8EB48724F14842AE415A7200C374A945CFA5
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 130 d69870-d698b0 131 d698b2-d698b5 130->131 132 d698b8-d698e3 GetModuleHandleW 130->132 131->132 133 d698e5-d698eb 132->133 134 d698ec-d69900 132->134 133->134
                      APIs
                      • GetModuleHandleW.KERNELBASE(00000000), ref: 00D698D6
                      Memory Dump Source
                      • Source File: 00000000.00000002.199845434.0000000000D60000.00000040.00000001.sdmp, Offset: 00D60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d60000_xVvAobZvWU.jbxd
                      Similarity
                      • API ID: HandleModule
                      • String ID:
                      • API String ID: 4139908857-0
                      • Opcode ID: 0f324e84ebc92de0068b8238d1a0dbdf5e3571e6924f9feda41cfc07b5d742ea
                      • Instruction ID: 61dea26f49fdc9ce9594231c50640df43a79556c195fc11c31f44163c8a77ef9
                      • Opcode Fuzzy Hash: 0f324e84ebc92de0068b8238d1a0dbdf5e3571e6924f9feda41cfc07b5d742ea
                      • Instruction Fuzzy Hash: 851102B2C002098FDB20DF9AD844ADEFBF8EB89324F14842AD429B7200C374A545CFA1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 124 d6986f-d698b0 125 d698b2-d698b5 124->125 126 d698b8-d698e3 GetModuleHandleW 124->126 125->126 127 d698e5-d698eb 126->127 128 d698ec-d69900 126->128 127->128
                      APIs
                      • GetModuleHandleW.KERNELBASE(00000000), ref: 00D698D6
                      Memory Dump Source
                      • Source File: 00000000.00000002.199845434.0000000000D60000.00000040.00000001.sdmp, Offset: 00D60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d60000_xVvAobZvWU.jbxd
                      Similarity
                      • API ID: HandleModule
                      • String ID:
                      • API String ID: 4139908857-0
                      • Opcode ID: 1a9ba592ce6e69a118cd4211cf9a64b481fb3b5fee265763d170461cb43aa6a0
                      • Instruction ID: 03a7784d346e5ed7c85a14ce5efc03d34baeaa5d1bc536a9dce6470062cda8ae
                      • Opcode Fuzzy Hash: 1a9ba592ce6e69a118cd4211cf9a64b481fb3b5fee265763d170461cb43aa6a0
                      • Instruction Fuzzy Hash: 0F1102B2C002098FDB20DF9AD444ADEFBF8EB89324F14842AD429B7200C374A545CFA1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.199801467.0000000000BFD000.00000040.00000001.sdmp, Offset: 00BFD000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_bfd000_xVvAobZvWU.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 76772e623268fe34329a5aec15579d612ef134c9c0a47ae2bae5c65f6f9bacf8
                      • Instruction ID: 32c0294518da3c393f01b57b43cbd9c7b2afcad227615edab3d1b9f5200f9cb3
                      • Opcode Fuzzy Hash: 76772e623268fe34329a5aec15579d612ef134c9c0a47ae2bae5c65f6f9bacf8
                      • Instruction Fuzzy Hash: 402128B1504208DFDB14DF54D9C0B26BBA6FB94324F24C5A9EA094F346C336E84AD7A1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.199801467.0000000000BFD000.00000040.00000001.sdmp, Offset: 00BFD000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_bfd000_xVvAobZvWU.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 9cc884a76ceb7772c58d37daaa76b4cf1f4fa251c68a00670c6f7a4d231698ba
                      • Instruction ID: 7157841652af705feb40ef2374799637c5ffe2346c3c0ee9bbd20e5c6a5feeb8
                      • Opcode Fuzzy Hash: 9cc884a76ceb7772c58d37daaa76b4cf1f4fa251c68a00670c6f7a4d231698ba
                      • Instruction Fuzzy Hash: 5F2128B1504248DFDB11DF54D8C0B36BFA6FB94318F2485A9EA054B246C336D84AD7A1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.199813314.0000000000C0D000.00000040.00000001.sdmp, Offset: 00C0D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_c0d000_xVvAobZvWU.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 75cab297b1cd9bf822558030f009645ed38c49f22c95b15fe885f8ea6fbd1843
                      • Instruction ID: 899f50e76fe995d84ec330ef736261311b2b31309b02131f233c05b4ad2e64b3
                      • Opcode Fuzzy Hash: 75cab297b1cd9bf822558030f009645ed38c49f22c95b15fe885f8ea6fbd1843
                      • Instruction Fuzzy Hash: F6210775504240DFDB14DF94D9C0B16BB65FB84318F24C5A9E80E4B286C337D847CB61
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.199813314.0000000000C0D000.00000040.00000001.sdmp, Offset: 00C0D000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_c0d000_xVvAobZvWU.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: a646cfc24b64e9a2af0784548a93af3134f88f35bce7ac7e9937fc2a65d49fea
                      • Instruction ID: f359423a006763ddc35ce6316a032495c46b23534539bd1e4395b0776524044d
                      • Opcode Fuzzy Hash: a646cfc24b64e9a2af0784548a93af3134f88f35bce7ac7e9937fc2a65d49fea
                      • Instruction Fuzzy Hash: 72219F755093C08FCB02CF24D990B15BF71EB46314F28C5EAD8498B6A7C33A980ACB62
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.199801467.0000000000BFD000.00000040.00000001.sdmp, Offset: 00BFD000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_bfd000_xVvAobZvWU.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 184b28d4c02099fc0a852538407da5dc7e76361d293f30cbc9c792e0a6473fb9
                      • Instruction ID: de15250d0963b6c712bec81dfafe6ae0525714959952e22281af52a367ae4ac6
                      • Opcode Fuzzy Hash: 184b28d4c02099fc0a852538407da5dc7e76361d293f30cbc9c792e0a6473fb9
                      • Instruction Fuzzy Hash: A511B176504284CFCB11CF14D9C4B26BFB2FB94324F24C6A9D9450B656C336D85ACBA2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.199801467.0000000000BFD000.00000040.00000001.sdmp, Offset: 00BFD000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_bfd000_xVvAobZvWU.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 184b28d4c02099fc0a852538407da5dc7e76361d293f30cbc9c792e0a6473fb9
                      • Instruction ID: c26d9d521381f8771e6a6e3598aeaea3385dcccb07bc55f5935594d38587ecbe
                      • Opcode Fuzzy Hash: 184b28d4c02099fc0a852538407da5dc7e76361d293f30cbc9c792e0a6473fb9
                      • Instruction Fuzzy Hash: F811B476504244DFCB11CF14D5C4B26BFB2FB94324F24C6A9D9090B716C33AD85ACBA1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.199801467.0000000000BFD000.00000040.00000001.sdmp, Offset: 00BFD000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_bfd000_xVvAobZvWU.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 6bbfa8e7dba00c2e03bd7fbac61a975b2ffefd6ce1b576bfef0e1c735dc470ba
                      • Instruction ID: 10c146cb114b40afb6d61907499df391dad8868f49e687961949a82725d5da76
                      • Opcode Fuzzy Hash: 6bbfa8e7dba00c2e03bd7fbac61a975b2ffefd6ce1b576bfef0e1c735dc470ba
                      • Instruction Fuzzy Hash: 3401D4724083489AE7206B25CCC07B6FBD8EB40324F288599EE145F242C3789C48D7B1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.199801467.0000000000BFD000.00000040.00000001.sdmp, Offset: 00BFD000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_bfd000_xVvAobZvWU.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 3e5f36edceafd2947dff067af3e54155ed90fed7056895807293697a770d5229
                      • Instruction ID: a2b0f1113d749518814d7dbf89a4a53630daf6cab8e8390bacfae589652b7d2d
                      • Opcode Fuzzy Hash: 3e5f36edceafd2947dff067af3e54155ed90fed7056895807293697a770d5229
                      • Instruction Fuzzy Hash: FCF044724042449AE7119A15DDC4B76FBD8EB81734F18855AEE185F246C2755C48CA71
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Non-executed Functions

                      Memory Dump Source
                      • Source File: 00000000.00000002.199406396.00000000003A2000.00000002.00020000.sdmp, Offset: 003A0000, based on PE: true
                      • Associated: 00000000.00000002.199401785.00000000003A0000.00000002.00020000.sdmp Download File
                      • Associated: 00000000.00000002.199497311.0000000000448000.00000002.00020000.sdmp Download File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_3a0000_xVvAobZvWU.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 31fdd71d15dbfbc838446994eae6114fb44a2a4ca884b19a0cb978e50ba37f86
                      • Instruction ID: ade0588081de46fc9b5ba85ba33ae498dd10952ec0ee14fc447b45c319be3047
                      • Opcode Fuzzy Hash: 31fdd71d15dbfbc838446994eae6114fb44a2a4ca884b19a0cb978e50ba37f86
                      • Instruction Fuzzy Hash: 31A2ED9280E7C19FDB138B785DB62A1BFB1AE6721471E48C7C0C0DF4A7E109196ED726
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.199845434.0000000000D60000.00000040.00000001.sdmp, Offset: 00D60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d60000_xVvAobZvWU.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: dee226127cdd1e764f482a6ac32a0b71fab96f92cc9f5988c79b53d997f0611a
                      • Instruction ID: e1ab0d32e2f20133d208ecf700e79599084727c16ee9c4eb62aec3a9b64fad79
                      • Opcode Fuzzy Hash: dee226127cdd1e764f482a6ac32a0b71fab96f92cc9f5988c79b53d997f0611a
                      • Instruction Fuzzy Hash: 4C12B2B5421F46CAD718DF65FCC82893BA1B745728B904308D261ABBF8D7B8254ACF64
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000000.00000002.199845434.0000000000D60000.00000040.00000001.sdmp, Offset: 00D60000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_d60000_xVvAobZvWU.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 70a643e9a990013d819ac93cd231950cdd9cae5342dfa15541401291eab84fd6
                      • Instruction ID: 9466170e23f5813045af7b77ba2c2863062daa309a48bdf20e4bd22037007ea5
                      • Opcode Fuzzy Hash: 70a643e9a990013d819ac93cd231950cdd9cae5342dfa15541401291eab84fd6
                      • Instruction Fuzzy Hash: B6A18032E102198FCF15DFA5D8445EEB7B2FF89300B19816AE905BB261DB35A945CF60
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Execution Graph

                      Execution Coverage:10%
                      Dynamic/Decrypted Code Coverage:100%
                      Signature Coverage:2.3%
                      Total number of Nodes:171
                      Total number of Limit Nodes:23

                      Graph

                      execution_graph 32877 1125c80 32881 1125c9f 32877->32881 32878 1125f08 32880 11258a0 RegQueryValueExW 32880->32881 32881->32878 32881->32880 32882 1125894 32881->32882 32883 1125f90 RegOpenKeyExW 32882->32883 32885 1126056 32883->32885 32996 1122367 32997 11220c4 32996->32997 32997->32996 32998 112240b 32997->32998 32999 112321c LdrInitializeThunk 32997->32999 32999->32997 32886 1171380 32887 117138f 32886->32887 32890 1170d74 32887->32890 32891 1170d7f 32890->32891 32894 1170e10 32891->32894 32893 1171486 32893->32893 32900 1170e1b 32894->32900 32895 1171b8d 32896 1171bbd 32895->32896 32897 1171884 OleInitialize 32895->32897 32901 1171be8 32896->32901 32917 1171884 32896->32917 32897->32896 32900->32895 32900->32901 32906 11732b0 32900->32906 32911 117329f 32900->32911 32901->32893 32907 11732d1 32906->32907 32908 11732f5 32907->32908 32930 1173450 32907->32930 32934 1173460 32907->32934 32908->32895 32912 117327d 32911->32912 32913 11732a6 32911->32913 32912->32895 32914 11732f5 32913->32914 32915 1173450 LoadLibraryExW 32913->32915 32916 1173460 LoadLibraryExW 32913->32916 32914->32895 32915->32914 32916->32914 32919 117188f 32917->32919 32918 1171bd5 32922 117b748 32918->32922 32926 117b738 32918->32926 32919->32918 32985 117a5c4 32919->32985 32921 117b204 32924 117b7ad 32922->32924 32923 117bc10 WaitMessage 32923->32924 32924->32923 32925 117b7fa 32924->32925 32925->32901 32927 117b7ad 32926->32927 32928 117bc10 WaitMessage 32927->32928 32929 117b7fa 32927->32929 32928->32927 32929->32901 32932 117346d 32930->32932 32931 11734a6 32931->32908 32932->32931 32938 11727a0 32932->32938 32935 117346d 32934->32935 32936 11734a6 32935->32936 32937 11727a0 LoadLibraryExW 32935->32937 32936->32908 32937->32936 32939 11727ab 32938->32939 32941 1173518 32939->32941 32942 11727d4 32939->32942 32941->32941 32943 11727df 32942->32943 32949 11727e4 32943->32949 32945 1173587 32953 1177718 32945->32953 32959 1177700 32945->32959 32946 11735c0 32946->32941 32950 11727ef 32949->32950 32951 11738bc 32950->32951 32952 11732b0 LoadLibraryExW 32950->32952 32951->32945 32952->32951 32955 1177749 32953->32955 32956 1177795 32953->32956 32954 1177755 32954->32946 32955->32954 32964 1177970 32955->32964 32967 1177980 32955->32967 32956->32946 32961 1177718 32959->32961 32960 1177755 32960->32946 32961->32960 32962 1177970 LoadLibraryExW 32961->32962 32963 1177980 LoadLibraryExW 32961->32963 32962->32960 32963->32960 32970 11779b2 32964->32970 32965 117798a 32965->32956 32968 117798a 32967->32968 32969 11779b2 LoadLibraryExW 32967->32969 32968->32956 32969->32968 32971 11779d3 32970->32971 32973 11779eb 32971->32973 32975 11779b2 LoadLibraryExW 32971->32975 32977 1177ba0 32971->32977 32972 11779e3 32972->32973 32981 1176d44 32972->32981 32973->32965 32975->32972 32978 1177bb4 32977->32978 32979 1176d44 LoadLibraryExW 32978->32979 32980 1177bd9 32978->32980 32979->32980 32980->32972 32982 1177c00 LoadLibraryExW 32981->32982 32984 1177c79 32982->32984 32984->32973 32986 117a5cf 32985->32986 32988 117b4fb 32986->32988 32989 117a5e0 32986->32989 32988->32921 32990 117b530 OleInitialize 32989->32990 32991 117b594 32990->32991 32991->32988 32873 1122a98 32875 1122abd 32873->32875 32874 1122c37 32875->32874 32876 112321c LdrInitializeThunk 32875->32876 32876->32875 32992 112ae88 32993 112aea7 LdrInitializeThunk 32992->32993 32995 112aedb 32993->32995 33000 112c7e8 33002 112c7fd 33000->33002 33001 112cadc 33002->33001 33003 112da69 GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx GlobalMemoryStatusEx 33002->33003 33007 112cc70 33002->33007 33011 112cafa 33002->33011 33018 112dc44 33002->33018 33003->33002 33008 112cc97 33007->33008 33023 112cd38 33007->33023 33030 112cd28 33007->33030 33008->33002 33012 112cb16 33011->33012 33013 112cb39 33011->33013 33012->33002 33014 112cb5e 33013->33014 33016 112cd38 4 API calls 33013->33016 33017 112cd28 4 API calls 33013->33017 33014->33002 33015 112cc97 33015->33002 33016->33015 33017->33015 33019 112dc45 33018->33019 33020 112dc87 33019->33020 33021 112df00 4 API calls 33019->33021 33022 112def0 4 API calls 33019->33022 33020->33002 33021->33020 33022->33020 33024 112cd4c 33023->33024 33026 112cd8a 33023->33026 33028 112cd38 4 API calls 33024->33028 33029 112cd28 4 API calls 33024->33029 33025 112cd62 33037 112da69 33025->33037 33026->33008 33028->33025 33029->33025 33031 112cd4c 33030->33031 33033 112cd8a 33030->33033 33034 112cd38 4 API calls 33031->33034 33035 112cd28 4 API calls 33031->33035 33032 112cd62 33036 112da69 4 API calls 33032->33036 33033->33008 33034->33032 33035->33032 33036->33033 33038 112da83 33037->33038 33040 112daab 33037->33040 33038->33026 33039 112dafe 33039->33026 33040->33039 33041 112cc70 4 API calls 33040->33041 33042 112db95 33040->33042 33041->33040 33042->33039 33045 112df00 33042->33045 33050 112def0 33042->33050 33056 112de80 33045->33056 33065 112df38 33045->33065 33073 112df2a 33045->33073 33046 112df0e 33046->33039 33051 112def3 33050->33051 33052 112df0e 33051->33052 33053 112de80 2 API calls 33051->33053 33054 112df2a 2 API calls 33051->33054 33055 112df38 2 API calls 33051->33055 33052->33039 33053->33052 33054->33052 33055->33052 33057 112de9e 33056->33057 33059 112dec1 33056->33059 33057->33046 33058 112df45 33058->33046 33059->33046 33059->33058 33081 1125c48 33059->33081 33061 112df8e 33061->33046 33063 112e056 GlobalMemoryStatusEx 33064 112e086 33063->33064 33064->33046 33066 112df43 33065->33066 33067 112df45 33066->33067 33068 1125c48 GlobalMemoryStatusEx 33066->33068 33067->33046 33069 112df8a 33068->33069 33070 112df8e 33069->33070 33071 112e056 GlobalMemoryStatusEx 33069->33071 33070->33046 33072 112e086 33071->33072 33072->33046 33074 112df43 33073->33074 33075 112df45 33074->33075 33076 1125c48 GlobalMemoryStatusEx 33074->33076 33075->33046 33078 112df8a 33076->33078 33077 112df8e 33077->33046 33078->33077 33079 112e056 GlobalMemoryStatusEx 33078->33079 33080 112e086 33079->33080 33080->33046 33082 112e010 GlobalMemoryStatusEx 33081->33082 33084 112df8a 33082->33084 33084->33061 33084->33063

                      Executed Functions

                      Memory Dump Source
                      • Source File: 00000002.00000002.463287910.0000000001160000.00000040.00000001.sdmp, Offset: 01160000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_1160000_xVvAobZvWU.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 2e921ad1851b10247260c4adf8ce970a29f8595e808e1c3fd1591fa1df2760c2
                      • Instruction ID: ea2155460ba8357a0d5914cfc8aa5ff989d3ec5fa74f3d129b811711497a80bf
                      • Opcode Fuzzy Hash: 2e921ad1851b10247260c4adf8ce970a29f8595e808e1c3fd1591fa1df2760c2
                      • Instruction Fuzzy Hash: 9B835C31D1071A8FCB19DF68C8806A9F7B6FF95310F55C6AAE09867211EB30AAD5CF41
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 699 1122a98-1122b9e 717 1122ba0-1122be1 699->717 718 1122bf5-1122bff 699->718 717->718 724 1122be3-1122bf3 717->724 721 1122c05-1122c20 718->721 899 1122c22 call 1123a70 721->899 900 1122c22 call 1123a69 721->900 901 1122c22 call 1123a0f 721->901 724->721 726 1122c27-1122c35 728 1122c37-1122c40 726->728 729 1122c45-1122ff2 726->729 730 1123610-112361d 728->730 768 1122ff8-1123005 729->768 769 11235dd-1123600 729->769 770 1123605-112360f 768->770 771 112300b-1123076 768->771 769->770 770->730 771->769 782 112307c-11230b1 771->782 785 11230b3-11230d8 782->785 786 11230da-11230e2 782->786 789 11230e5-112312e 785->789 786->789 794 11235c4-11235ca 789->794 795 1123134-112318c 789->795 794->769 796 11235cc-11235d5 794->796 795->794 802 1123192-112319c 795->802 796->771 797 11235db 796->797 797->770 802->794 803 11231a2-11231b5 802->803 803->794 804 11231bb-11231e2 803->804 808 1123585-11235a8 804->808 809 11231e8-11231eb 804->809 817 11235ad-11235b3 808->817 809->808 810 11231f1-112322b LdrInitializeThunk 809->810 820 1123231-1123280 810->820 817->769 819 11235b5-11235be 817->819 819->794 819->804 828 1123286-11232bf 820->828 829 11233c5-11233cb 820->829 833 11233e1-11233e7 828->833 845 11232c5-11232fb 828->845 830 11233d9 829->830 831 11233cd-11233cf 829->831 830->833 831->830 834 11233f5-11233f8 833->834 835 11233e9-11233eb 833->835 837 1123403-1123409 834->837 835->834 839 1123417-112341a 837->839 840 112340b-112340d 837->840 842 1123369-1123399 839->842 840->839 848 112339b-11233ba 842->848 851 1123301-1123324 845->851 852 112341f-112344d 845->852 856 1123452-11234a4 848->856 857 11233c0 848->857 851->852 861 112332a-112335d 851->861 852->848 874 11234a6-11234ac 856->874 875 11234ae-11234b4 856->875 857->817 861->837 873 1123363 861->873 873->842 876 11234c5-11234e3 874->876 877 11234c2 875->877 878 11234b6-11234b8 875->878 882 1123507-1123583 876->882 883 11234e5-11234f5 876->883 877->876 878->877 882->817 883->882 886 11234f7-1123500 883->886 886->882 899->726 900->726 901->726
                      APIs
                      Memory Dump Source
                      • Source File: 00000002.00000002.463216057.0000000001120000.00000040.00000001.sdmp, Offset: 01120000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_1120000_xVvAobZvWU.jbxd
                      Similarity
                      • API ID: InitializeThunk
                      • String ID:
                      • API String ID: 2994545307-0
                      • Opcode ID: 82cc7d94f6d78af0779c19435003773565c9a211ad7dbc14b36003561bdcf223
                      • Instruction ID: c256f1fa9de715c0dec1736a3f520274f4b9eafbad337560c2a4c7c5fe3d6cfc
                      • Opcode Fuzzy Hash: 82cc7d94f6d78af0779c19435003773565c9a211ad7dbc14b36003561bdcf223
                      • Instruction Fuzzy Hash: 7F62FA35E107298FCB28EF78C8546DDB7B1AF89304F1085A9D55AAB354EF30AA85CF41
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 902 117b748-117b7ab 903 117b7ad-117b7d7 902->903 904 117b7da-117b7f8 902->904 903->904 909 117b801-117b838 904->909 910 117b7fa-117b7fc 904->910 914 117b83e-117b852 909->914 915 117bc69 909->915 912 117bcba-117bccf 910->912 916 117b854-117b87e 914->916 917 117b881-117b8a0 914->917 918 117bc6e-117bc84 915->918 916->917 924 117b8a2-117b8a8 917->924 925 117b8b8-117b8ba 917->925 918->912 929 117b8ac-117b8ae 924->929 930 117b8aa 924->930 926 117b8bc-117b8d4 925->926 927 117b8d9-117b8e2 925->927 926->918 931 117b8ea-117b8f1 927->931 929->925 930->925 932 117b8f3-117b8f9 931->932 933 117b8fb-117b902 931->933 934 117b90f-117b92c call 117a640 932->934 935 117b904-117b90a 933->935 936 117b90c 933->936 939 117b932-117b939 934->939 940 117ba81-117ba85 934->940 935->934 936->934 939->915 943 117b93f-117b97c 939->943 941 117bc54-117bc67 940->941 942 117ba8b-117ba8f 940->942 941->918 944 117ba91-117baa4 942->944 945 117baa9-117bab2 942->945 951 117b982-117b987 943->951 952 117bc4a-117bc4e 943->952 944->918 947 117bab4-117bade 945->947 948 117bae1-117bae8 945->948 947->948 949 117bb87-117bb9c 948->949 950 117baee-117baf5 948->950 949->952 966 117bba2-117bba4 949->966 953 117baf7-117bb21 950->953 954 117bb24-117bb46 950->954 955 117b9b9-117b9ce call 117a664 951->955 956 117b989-117b997 call 117a64c 951->956 952->931 952->941 953->954 954->949 993 117bb48-117bb52 954->993 964 117b9d3-117b9d7 955->964 956->955 967 117b999-117b9b2 call 117a658 956->967 968 117b9d9-117b9eb call 117a670 964->968 969 117ba48-117ba55 964->969 970 117bba6-117bbdf 966->970 971 117bbf1-117bc0e call 117a640 966->971 978 117b9b7 967->978 994 117b9ed-117ba1d 968->994 995 117ba2b-117ba43 968->995 969->952 986 117ba5b-117ba65 call 117a680 969->986 982 117bbe1-117bbe7 970->982 983 117bbe8-117bbef 970->983 971->952 985 117bc10-117bc3c WaitMessage 971->985 978->964 982->983 983->952 990 117bc43 985->990 991 117bc3e 985->991 999 117ba67-117ba6f call 117a68c 986->999 1000 117ba74-117ba7c call 117a698 986->1000 990->952 991->990 1001 117bb54-117bb5a 993->1001 1002 117bb6a-117bb85 993->1002 1010 117ba24 994->1010 1011 117ba1f 994->1011 995->918 999->952 1000->952 1007 117bb5e-117bb60 1001->1007 1008 117bb5c 1001->1008 1002->949 1002->993 1007->1002 1008->1002 1010->995 1011->1010
                      Memory Dump Source
                      • Source File: 00000002.00000002.463316536.0000000001170000.00000040.00000001.sdmp, Offset: 01170000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_1170000_xVvAobZvWU.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 41ec7914294ed729e6ac3f0e87180834c6e0020ab70811e69cb5ed5df94e738b
                      • Instruction ID: e85e088a55145f319f1ccccbb59efdff5b4f0e3c384d6590737d9535e2eaa6d7
                      • Opcode Fuzzy Hash: 41ec7914294ed729e6ac3f0e87180834c6e0020ab70811e69cb5ed5df94e738b
                      • Instruction Fuzzy Hash: 67F15A70A04209CFDB18DFA9C884BADBBF1BF88304F15C169E515AF3A5DB74A945CB84
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000002.00000002.463287910.0000000001160000.00000040.00000001.sdmp, Offset: 01160000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_1160000_xVvAobZvWU.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 2844633b5f5427e961ed36d35a9cc06b785346b7de6253ba0ca11948d1052ba4
                      • Instruction ID: 2808d3d72a67636fcc2d28adcd4309d4291b59ed9a0dbd52a382168fd903904a
                      • Opcode Fuzzy Hash: 2844633b5f5427e961ed36d35a9cc06b785346b7de6253ba0ca11948d1052ba4
                      • Instruction Fuzzy Hash: 21A2F130B002158FCB19DF78C894BAE7BFAAF89204F1584A9E505DB3A2DB75DC51CB91
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000002.00000002.463287910.0000000001160000.00000040.00000001.sdmp, Offset: 01160000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_1160000_xVvAobZvWU.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 704b4195d58c89826834b062b680f1fd31187d8a205d37cb48ef10dc9c3e837b
                      • Instruction ID: 6c282fa20b551866a5a6994eaa58f12268b69e01b57237e0edeb0f20535c6245
                      • Opcode Fuzzy Hash: 704b4195d58c89826834b062b680f1fd31187d8a205d37cb48ef10dc9c3e837b
                      • Instruction Fuzzy Hash: 2232D530A042488FEB28EBA8C4947ADBBB6EF85304F15C069D449DF396DB75DC45CB92
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000002.00000002.463287910.0000000001160000.00000040.00000001.sdmp, Offset: 01160000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_1160000_xVvAobZvWU.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: d0fab440838986dfc57fa0b8db23e0876d9ad611109490d7676698c31fe86315
                      • Instruction ID: c63fe80d0a3fe364bc28e53524e82f36fcb3ffed5eb47cf82cf41091730a7b7b
                      • Opcode Fuzzy Hash: d0fab440838986dfc57fa0b8db23e0876d9ad611109490d7676698c31fe86315
                      • Instruction Fuzzy Hash: 4FF1B731B001159FDB28DB6CD8A4BAD7BBAEF89714F158425E015EB392CB36DC52CB11
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000002.00000002.463287910.0000000001160000.00000040.00000001.sdmp, Offset: 01160000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_1160000_xVvAobZvWU.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: dc0601691aa018e2805a889462e0d66e6dc8ed703b1ea38db7b72a9d87eb4763
                      • Instruction ID: 1fd5d4a2a62aa2ff96e01f5765accee81cf7b591ee14de35d0ca411992b571a0
                      • Opcode Fuzzy Hash: dc0601691aa018e2805a889462e0d66e6dc8ed703b1ea38db7b72a9d87eb4763
                      • Instruction Fuzzy Hash: FFF1C270A006158FCB18EFB8D48469DBBB6FF88314F148525D916EB395DB36EC92CB90
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000002.00000002.463287910.0000000001160000.00000040.00000001.sdmp, Offset: 01160000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_1160000_xVvAobZvWU.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 244aa2e16ae8dbd6625d4e2016125deb64bc5575a8d97e0ebf335e94696c546d
                      • Instruction ID: bbfaa831c019693d7956d468e1daf2133658dc284f57be1bb0ac1e9da89e80d8
                      • Opcode Fuzzy Hash: 244aa2e16ae8dbd6625d4e2016125deb64bc5575a8d97e0ebf335e94696c546d
                      • Instruction Fuzzy Hash: 9CD12930B043068FCB29DFB8D8907AEBBBAEF85314F10896AD155C7662D735E816C791
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1014 112ae88-112aed4 LdrInitializeThunk 1018 112aedb-112aee7 1014->1018 1019 112b0e7-112b0fa 1018->1019 1020 112aeed-112aef6 1018->1020 1021 112b121-112b125 1019->1021 1022 112b11c 1020->1022 1023 112aefc-112af11 1020->1023 1024 112b130 1021->1024 1025 112b127 1021->1025 1022->1021 1028 112af13-112af26 1023->1028 1029 112af2b-112af46 1023->1029 1027 112b131 1024->1027 1025->1024 1027->1027 1030 112b0bb-112b0bf 1028->1030 1037 112af54 1029->1037 1038 112af48-112af52 1029->1038 1032 112b0c1 1030->1032 1033 112b0ca-112b0cb 1030->1033 1032->1033 1033->1019 1039 112af59-112af5b 1037->1039 1038->1039 1040 112af75-112b00d call 11279e8 1039->1040 1041 112af5d-112af70 1039->1041 1060 112b01b 1040->1060 1061 112b00f-112b019 1040->1061 1041->1030 1062 112b020-112b022 1060->1062 1061->1062 1063 112b024-112b026 1062->1063 1064 112b065-112b0b9 1062->1064 1065 112b034 1063->1065 1066 112b028-112b032 1063->1066 1064->1030 1068 112b039-112b03b 1065->1068 1066->1068 1068->1064 1069 112b03d-112b063 1068->1069 1069->1064
                      APIs
                      Memory Dump Source
                      • Source File: 00000002.00000002.463216057.0000000001120000.00000040.00000001.sdmp, Offset: 01120000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_1120000_xVvAobZvWU.jbxd
                      Similarity
                      • API ID: InitializeThunk
                      • String ID:
                      • API String ID: 2994545307-0
                      • Opcode ID: d1e025b9252f0ed9d9c2852ed7ee6611daf64808ac3727b79cad799e0cd80e5a
                      • Instruction ID: 7f4f96dc2f3b773554e1601a9c8c9218ee1c259250cd218068fdfa0b8519081b
                      • Opcode Fuzzy Hash: d1e025b9252f0ed9d9c2852ed7ee6611daf64808ac3727b79cad799e0cd80e5a
                      • Instruction Fuzzy Hash: BC615F30A143259FDB18EFB5D458BAEBBF2AF84305F108828E516A7354DF399845CB94
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1079 112df38-112df43 1081 112df45-112df6c call 1125c3c 1079->1081 1082 112df6d-112df8c call 1125c48 1079->1082 1088 112df92-112dfc9 1082->1088 1089 112df8e-112df91 1082->1089 1094 112dfcb 1088->1094 1095 112dfcd-112dfd1 1088->1095 1094->1095 1096 112dfd3 1095->1096 1097 112dfd5-112dff1 1095->1097 1096->1097 1100 112dff3-112dff6 1097->1100 1101 112dff7-112e084 GlobalMemoryStatusEx 1097->1101 1104 112e086-112e08c 1101->1104 1105 112e08d-112e0b5 1101->1105 1104->1105
                      Memory Dump Source
                      • Source File: 00000002.00000002.463216057.0000000001120000.00000040.00000001.sdmp, Offset: 01120000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_1120000_xVvAobZvWU.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 47c41d2821b259c982179b6b3d4a03dcc972931afd05242687b42c0bf4f7a946
                      • Instruction ID: 03a6d30523d226b540e9f3f882488cbb5368b0f3800de41fd55365984b0dd694
                      • Opcode Fuzzy Hash: 47c41d2821b259c982179b6b3d4a03dcc972931afd05242687b42c0bf4f7a946
                      • Instruction Fuzzy Hash: F6417672E043558FCB18CFB9D8406EEBBF5AF89224F0585AAD504E7341DB389895CBE1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1108 11261e9-11261f5 1109 1126213 1108->1109 1110 11261f7-1126207 1108->1110 1113 1126215-1126226 1109->1113 1114 1126228-112622b 1109->1114 1111 1126209-1126211 1110->1111 1112 112622c-11262b1 1110->1112 1111->1109 1118 11262b3-11262b6 1112->1118 1119 11262b9-11262c3 1112->1119 1113->1114 1118->1119 1120 11262c5-11262cd 1119->1120 1121 11262cf-1126311 RegQueryValueExW 1119->1121 1120->1121 1122 1126313-1126319 1121->1122 1123 112631a-1126354 1121->1123 1122->1123 1127 1126356 1123->1127 1128 112635e 1123->1128 1127->1128 1129 112635f 1128->1129 1129->1129
                      APIs
                      • RegQueryValueExW.KERNEL32(00000000,00000000,?,?,00000000,?), ref: 01126301
                      Memory Dump Source
                      • Source File: 00000002.00000002.463216057.0000000001120000.00000040.00000001.sdmp, Offset: 01120000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_1120000_xVvAobZvWU.jbxd
                      Similarity
                      • API ID: QueryValue
                      • String ID:
                      • API String ID: 3660427363-0
                      • Opcode ID: 5849777a33c68bdfe02684ebe9584afc3d6a7c717ac35b39ae72b0b1fbea8d23
                      • Instruction ID: a65858b8873acf15b13c91c530ed0702332d89e8f2b551c9e1530cef16877cee
                      • Opcode Fuzzy Hash: 5849777a33c68bdfe02684ebe9584afc3d6a7c717ac35b39ae72b0b1fbea8d23
                      • Instruction Fuzzy Hash: 554144B4E042589FCB14CFA9D884ADEBFF5AF49314F18846AE808AB341D7749845CB90
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1130 1125f32-1125f4f 1131 1125f51-1125f5b 1130->1131 1132 1125f74-1125fe0 1130->1132 1133 1125f70-1125f73 1131->1133 1134 1125f5d-1125f6e 1131->1134 1137 1125fe2-1125fe5 1132->1137 1138 1125fe8 1132->1138 1134->1133 1137->1138 1139 1125ff2-1126054 RegOpenKeyExW 1138->1139 1140 1126056-112605c 1139->1140 1141 112605d-1126095 1139->1141 1140->1141 1145 1126097-11260a0 1141->1145 1146 11260a8 1141->1146 1145->1146 1147 11260a9 1146->1147 1147->1147
                      APIs
                      • RegOpenKeyExW.KERNEL32(80000001,00000000,?,00000001,?), ref: 01126044
                      Memory Dump Source
                      • Source File: 00000002.00000002.463216057.0000000001120000.00000040.00000001.sdmp, Offset: 01120000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_1120000_xVvAobZvWU.jbxd
                      Similarity
                      • API ID: Open
                      • String ID:
                      • API String ID: 71445658-0
                      • Opcode ID: 129ea10544c06e0e45942ce12582a2f2eb1ecd8e1f7a7e152a63ed4f48ab377d
                      • Instruction ID: b235a51655ffbef502b79453ded4f7222865df16ee7588f3aaa2266762db1cab
                      • Opcode Fuzzy Hash: 129ea10544c06e0e45942ce12582a2f2eb1ecd8e1f7a7e152a63ed4f48ab377d
                      • Instruction Fuzzy Hash: CA4168B1D043488FDB04CFA9C588B8DBFF1AF49304F2981AAE408AB351C7759845CB55
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1148 11258a0-11262b1 1151 11262b3-11262b6 1148->1151 1152 11262b9-11262c3 1148->1152 1151->1152 1153 11262c5-11262cd 1152->1153 1154 11262cf-1126311 RegQueryValueExW 1152->1154 1153->1154 1155 1126313-1126319 1154->1155 1156 112631a-1126354 1154->1156 1155->1156 1160 1126356 1156->1160 1161 112635e 1156->1161 1160->1161 1162 112635f 1161->1162 1162->1162
                      APIs
                      • RegQueryValueExW.KERNEL32(00000000,00000000,?,?,00000000,?), ref: 01126301
                      Memory Dump Source
                      • Source File: 00000002.00000002.463216057.0000000001120000.00000040.00000001.sdmp, Offset: 01120000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_1120000_xVvAobZvWU.jbxd
                      Similarity
                      • API ID: QueryValue
                      • String ID:
                      • API String ID: 3660427363-0
                      • Opcode ID: 984f8637bd2e305a9f7c65935957657d98fddf3b97e96d4f62187df2ae8b8976
                      • Instruction ID: b8dac97127cd0615f94b9c22a0fa2285ffd2562aeda69e2cfcbc427591771509
                      • Opcode Fuzzy Hash: 984f8637bd2e305a9f7c65935957657d98fddf3b97e96d4f62187df2ae8b8976
                      • Instruction Fuzzy Hash: DF31E0B1D042689FCB24CF9AD884A9EFBF5FF48314F15802AE819AB344D7749945CFA1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1163 1125894-1125fe0 1165 1125fe2-1125fe5 1163->1165 1166 1125fe8-1126054 RegOpenKeyExW 1163->1166 1165->1166 1168 1126056-112605c 1166->1168 1169 112605d-1126095 1166->1169 1168->1169 1173 1126097-11260a0 1169->1173 1174 11260a8 1169->1174 1173->1174 1175 11260a9 1174->1175 1175->1175
                      APIs
                      • RegOpenKeyExW.KERNEL32(80000001,00000000,?,00000001,?), ref: 01126044
                      Memory Dump Source
                      • Source File: 00000002.00000002.463216057.0000000001120000.00000040.00000001.sdmp, Offset: 01120000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_1120000_xVvAobZvWU.jbxd
                      Similarity
                      • API ID: Open
                      • String ID:
                      • API String ID: 71445658-0
                      • Opcode ID: 2d8f3b67d82d622ac748ee6f56dd71dc9d7e420cf110fd2e7ce1ab70bc0752ae
                      • Instruction ID: 280764955d9636f5b35e88db51aad4dde35685ed22779dc7fa911e046435f74b
                      • Opcode Fuzzy Hash: 2d8f3b67d82d622ac748ee6f56dd71dc9d7e420cf110fd2e7ce1ab70bc0752ae
                      • Instruction Fuzzy Hash: E03114B0D002489FDB14CF99C584A8EFFF5BF48314F25816AE909AB381C7759884CFA5
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1176 112ae78-112aeb6 1179 112aebf-112aed4 LdrInitializeThunk 1176->1179 1180 112aedb-112aee7 1179->1180 1181 112b0e7-112b0fa 1180->1181 1182 112aeed-112aef6 1180->1182 1183 112b121-112b125 1181->1183 1184 112b11c 1182->1184 1185 112aefc-112af11 1182->1185 1186 112b130 1183->1186 1187 112b127 1183->1187 1184->1183 1190 112af13-112af26 1185->1190 1191 112af2b-112af46 1185->1191 1189 112b131 1186->1189 1187->1186 1189->1189 1192 112b0bb-112b0bf 1190->1192 1199 112af54 1191->1199 1200 112af48-112af52 1191->1200 1194 112b0c1 1192->1194 1195 112b0ca-112b0cb 1192->1195 1194->1195 1195->1181 1201 112af59-112af5b 1199->1201 1200->1201 1202 112af75-112b00d call 11279e8 1201->1202 1203 112af5d-112af70 1201->1203 1222 112b01b 1202->1222 1223 112b00f-112b019 1202->1223 1203->1192 1224 112b020-112b022 1222->1224 1223->1224 1225 112b024-112b026 1224->1225 1226 112b065-112b0b9 1224->1226 1227 112b034 1225->1227 1228 112b028-112b032 1225->1228 1226->1192 1230 112b039-112b03b 1227->1230 1228->1230 1230->1226 1231 112b03d-112b063 1230->1231 1231->1226
                      APIs
                      Memory Dump Source
                      • Source File: 00000002.00000002.463216057.0000000001120000.00000040.00000001.sdmp, Offset: 01120000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_1120000_xVvAobZvWU.jbxd
                      Similarity
                      • API ID: InitializeThunk
                      • String ID:
                      • API String ID: 2994545307-0
                      • Opcode ID: e83e1a16e5ac1fa0c7949c2e300242bc9d2b0691bf1ce7b723e477dc160fa238
                      • Instruction ID: 285093ef5ebbedda2a020761d9bca55768978cb11b395225d96914a378891844
                      • Opcode Fuzzy Hash: e83e1a16e5ac1fa0c7949c2e300242bc9d2b0691bf1ce7b723e477dc160fa238
                      • Instruction Fuzzy Hash: 47216D30A00258DFCB19EF75D498ADEBBB2FF45304F148968D401AB254CB369845CF54
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1248 1176d44-1177c40 1250 1177c42-1177c45 1248->1250 1251 1177c48-1177c77 LoadLibraryExW 1248->1251 1250->1251 1252 1177c80-1177c9d 1251->1252 1253 1177c79-1177c7f 1251->1253 1253->1252
                      APIs
                      • LoadLibraryExW.KERNEL32(00000000,00000000,?,?,?,?,?,?,00000000,?,01177BD9,00000800), ref: 01177C6A
                      Memory Dump Source
                      • Source File: 00000002.00000002.463316536.0000000001170000.00000040.00000001.sdmp, Offset: 01170000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_1170000_xVvAobZvWU.jbxd
                      Similarity
                      • API ID: LibraryLoad
                      • String ID:
                      • API String ID: 1029625771-0
                      • Opcode ID: ba106c15c4b011b5918bcbd4e497e855da0a77c608a2b694de5204bf591c84c5
                      • Instruction ID: 78fea7010455052c4125bf7a96c6db612473a1132465b1939cae674d14f1ebbf
                      • Opcode Fuzzy Hash: ba106c15c4b011b5918bcbd4e497e855da0a77c608a2b694de5204bf591c84c5
                      • Instruction Fuzzy Hash: FA1106B6D002099FDB24CF9AD848B9EFBF4AB48324F15842AE515A7340C374A545CFA5
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1241 1125c48-112e084 GlobalMemoryStatusEx 1244 112e086-112e08c 1241->1244 1245 112e08d-112e0b5 1241->1245 1244->1245
                      APIs
                      • GlobalMemoryStatusEx.KERNEL32(?,?,?,?,?,?,?,?,?,0112DF8A), ref: 0112E077
                      Memory Dump Source
                      • Source File: 00000002.00000002.463216057.0000000001120000.00000040.00000001.sdmp, Offset: 01120000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_1120000_xVvAobZvWU.jbxd
                      Similarity
                      • API ID: GlobalMemoryStatus
                      • String ID:
                      • API String ID: 1890195054-0
                      • Opcode ID: 97300a33cbd8c3010a43da33bcdc037a17537b4aa2d79842b3a9f5c3f4aaa163
                      • Instruction ID: ef8da4360e5f4b18c82c4a224be946cbe9426f1fa6662e46f57a77e9ed0ee702
                      • Opcode Fuzzy Hash: 97300a33cbd8c3010a43da33bcdc037a17537b4aa2d79842b3a9f5c3f4aaa163
                      • Instruction Fuzzy Hash: 201144B1D006199BCB10DFAAD444BDEFBF4AF48324F15856AE814B7200D378A955CFE5
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1256 112e008-112e04e 1257 112e056-112e084 GlobalMemoryStatusEx 1256->1257 1258 112e086-112e08c 1257->1258 1259 112e08d-112e0b5 1257->1259 1258->1259
                      APIs
                      • GlobalMemoryStatusEx.KERNEL32(?,?,?,?,?,?,?,?,?,0112DF8A), ref: 0112E077
                      Memory Dump Source
                      • Source File: 00000002.00000002.463216057.0000000001120000.00000040.00000001.sdmp, Offset: 01120000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_1120000_xVvAobZvWU.jbxd
                      Similarity
                      • API ID: GlobalMemoryStatus
                      • String ID:
                      • API String ID: 1890195054-0
                      • Opcode ID: c81f279f1ee16e247c09a8d2721cdbd29eafcfcd34d23752957a1cf0157d6ad6
                      • Instruction ID: 961830621f9d739f246796a307d49c84747f15ddd2dd423eec529a78f44cb136
                      • Opcode Fuzzy Hash: c81f279f1ee16e247c09a8d2721cdbd29eafcfcd34d23752957a1cf0157d6ad6
                      • Instruction Fuzzy Hash: 951144B5C006199FCB10CFAAD544BDEFBB4AF08224F15856AE414B7200D338A945CFA5
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1262 1177bf9-1177c40 1263 1177c42-1177c45 1262->1263 1264 1177c48-1177c77 LoadLibraryExW 1262->1264 1263->1264 1265 1177c80-1177c9d 1264->1265 1266 1177c79-1177c7f 1264->1266 1266->1265
                      APIs
                      • LoadLibraryExW.KERNEL32(00000000,00000000,?,?,?,?,?,?,00000000,?,01177BD9,00000800), ref: 01177C6A
                      Memory Dump Source
                      • Source File: 00000002.00000002.463316536.0000000001170000.00000040.00000001.sdmp, Offset: 01170000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_1170000_xVvAobZvWU.jbxd
                      Similarity
                      • API ID: LibraryLoad
                      • String ID:
                      • API String ID: 1029625771-0
                      • Opcode ID: 9013413ea422f9a77c406cee0cc296897517c7a08ee8ec1faddc8d653722a1b4
                      • Instruction ID: c62c78f7e4e68d96f480d93c5c9caaac9e1d803d54780cc2d5f2273f86997150
                      • Opcode Fuzzy Hash: 9013413ea422f9a77c406cee0cc296897517c7a08ee8ec1faddc8d653722a1b4
                      • Instruction Fuzzy Hash: A11114B6D003099FDB24CFAAD488BDEFBF4AB88324F14842AE515A7340C375A545CFA4
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1269 117a5e0-117b592 OleInitialize 1271 117b594-117b59a 1269->1271 1272 117b59b-117b5b8 1269->1272 1271->1272
                      APIs
                      • OleInitialize.OLE32(00000000), ref: 0117B585
                      Memory Dump Source
                      • Source File: 00000002.00000002.463316536.0000000001170000.00000040.00000001.sdmp, Offset: 01170000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_1170000_xVvAobZvWU.jbxd
                      Similarity
                      • API ID: Initialize
                      • String ID:
                      • API String ID: 2538663250-0
                      • Opcode ID: 7432a82e12b4fea89f5769f32131c5f47ae0e5f98f0237df5f60df05b9f7a22d
                      • Instruction ID: 3a26031c0ae72f480100196f2bf18f178a38aabcee31c4b9a7e65d22bc86f265
                      • Opcode Fuzzy Hash: 7432a82e12b4fea89f5769f32131c5f47ae0e5f98f0237df5f60df05b9f7a22d
                      • Instruction Fuzzy Hash: 2E1103B59043498FCB20DF99D448B9EBBF4EB48324F148459E519A7300D374A944CFA5
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 1275 117b528-117b592 OleInitialize 1276 117b594-117b59a 1275->1276 1277 117b59b-117b5b8 1275->1277 1276->1277
                      APIs
                      • OleInitialize.OLE32(00000000), ref: 0117B585
                      Memory Dump Source
                      • Source File: 00000002.00000002.463316536.0000000001170000.00000040.00000001.sdmp, Offset: 01170000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_1170000_xVvAobZvWU.jbxd
                      Similarity
                      • API ID: Initialize
                      • String ID:
                      • API String ID: 2538663250-0
                      • Opcode ID: f36315e03e03cce647ab4ee585eab4bcdf31fa49fc1eeca3bac5463c35199a19
                      • Instruction ID: d42a9e2ef6ff3ef5acc93c4dc2b9cbef9608ede4cf4a9a24073184dc145d98e4
                      • Opcode Fuzzy Hash: f36315e03e03cce647ab4ee585eab4bcdf31fa49fc1eeca3bac5463c35199a19
                      • Instruction Fuzzy Hash: 3B1103B5D042498FDB20DF99D584BDEBBF4AB48324F14845AE519B7700C338A544CFA5
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000002.00000002.463287910.0000000001160000.00000040.00000001.sdmp, Offset: 01160000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_1160000_xVvAobZvWU.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 4bafd0537c17d59521c3e3c6ebdf64e3223e8a360a3b9aefd7040e8e94a87bc1
                      • Instruction ID: b70fa2e36d4f289d62ad453bc97501e9c5c49da88d52137d4b450124f4b9a590
                      • Opcode Fuzzy Hash: 4bafd0537c17d59521c3e3c6ebdf64e3223e8a360a3b9aefd7040e8e94a87bc1
                      • Instruction Fuzzy Hash: 5B22BD30B003198FCB19ABB4D4546AEBBF6AF85308F108969D406DB395EF76DC46CB91
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000002.00000002.463287910.0000000001160000.00000040.00000001.sdmp, Offset: 01160000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_1160000_xVvAobZvWU.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 8fb7f827c35b4f942c7811f9a82242ed2951bae30686e60c83950b8b6ee695a8
                      • Instruction ID: 71b3970c3c3895e514f2b17bbdf16b8b91089cbf9ab9010c5a3c438ea8fe359a
                      • Opcode Fuzzy Hash: 8fb7f827c35b4f942c7811f9a82242ed2951bae30686e60c83950b8b6ee695a8
                      • Instruction Fuzzy Hash: 93028B30B042158FCB28EBB8C4587AE7BF6AF89308F148469D406DB795EF35DC468B95
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000002.00000002.463287910.0000000001160000.00000040.00000001.sdmp, Offset: 01160000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_1160000_xVvAobZvWU.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 6acc727862ffa176219537c9a9fa235a194f95e6e6776c6916bf103e274ee21b
                      • Instruction ID: 9fb4b295a31a77f427bb030daa2c244f18ba5b0964f25c029a518fe72468ec94
                      • Opcode Fuzzy Hash: 6acc727862ffa176219537c9a9fa235a194f95e6e6776c6916bf103e274ee21b
                      • Instruction Fuzzy Hash: AED10230B092804FD316973898547A97FB6AF8A304F1980EAD559EF3D2EB75DC068B52
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000002.00000002.463287910.0000000001160000.00000040.00000001.sdmp, Offset: 01160000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_1160000_xVvAobZvWU.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 76bd6d72d524d3fc37d5972005efeb4ff2b3dea98dd3db56d0cd081c6d8b36fe
                      • Instruction ID: c07bf7387fb1cc9f57d8f0de9b5c726b9e5163060edbf04816ffafa874f487c3
                      • Opcode Fuzzy Hash: 76bd6d72d524d3fc37d5972005efeb4ff2b3dea98dd3db56d0cd081c6d8b36fe
                      • Instruction Fuzzy Hash: FEA1C330A003588FDB19CF6AC5407ADBBFAAF85744F15816AE445DB391EB72DC90CB91
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000002.00000002.463287910.0000000001160000.00000040.00000001.sdmp, Offset: 01160000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_1160000_xVvAobZvWU.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: ea84ecdb5a9a1e673e51a8f1680f436a2452583fe9eb5141bbb1cd2e94da253f
                      • Instruction ID: 21ed68d1bb6d91f7692efab6a142b0d27cf9e930a78f9976f4e141d1e58888c9
                      • Opcode Fuzzy Hash: ea84ecdb5a9a1e673e51a8f1680f436a2452583fe9eb5141bbb1cd2e94da253f
                      • Instruction Fuzzy Hash: D0A1C475A00249DFCF09CFA8C844ADEBFB6BF89304F04859AE515AB3A1D731A865CB51
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000002.00000002.463287910.0000000001160000.00000040.00000001.sdmp, Offset: 01160000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_1160000_xVvAobZvWU.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 23e265dbddfd6cff34b7431ceafc8b83cb9f31d32df166d8340242b39a0ab09a
                      • Instruction ID: 7b8f4e3537f9107d045f03a8c990a2205cd3816ed7065645c7da71c20940fd4d
                      • Opcode Fuzzy Hash: 23e265dbddfd6cff34b7431ceafc8b83cb9f31d32df166d8340242b39a0ab09a
                      • Instruction Fuzzy Hash: 0081D230B002149FDB28A7B8C8587AE7AEBAFCA304F15C469E0559F391DB76DC06C752
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000002.00000002.463287910.0000000001160000.00000040.00000001.sdmp, Offset: 01160000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_1160000_xVvAobZvWU.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 7da0647f8b5a22153e2ccb214f76ca3dddf8ac9377cd4d5735097361fb12c8ce
                      • Instruction ID: 2b8cd16653cd27a434131648f7e7fbf971699fb93ce3450b35ade8ed59e2108d
                      • Opcode Fuzzy Hash: 7da0647f8b5a22153e2ccb214f76ca3dddf8ac9377cd4d5735097361fb12c8ce
                      • Instruction Fuzzy Hash: 5781B634B093848FD70A977898546993FBA9F86304F1A80E7D545EB293EB799C06C722
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000002.00000002.463287910.0000000001160000.00000040.00000001.sdmp, Offset: 01160000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_1160000_xVvAobZvWU.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 8d5f101bc0ada5e5ba5a74401a4b319887ad96de32d77de7ac9c47f1be01dc7f
                      • Instruction ID: 68d12a43460107460dfed772ed697dbbd49431c4480b5a6dba5227335d3ad9e9
                      • Opcode Fuzzy Hash: 8d5f101bc0ada5e5ba5a74401a4b319887ad96de32d77de7ac9c47f1be01dc7f
                      • Instruction Fuzzy Hash: FA71A530B002158FDB68ABB8D4687AE76E7AFC8304F148439D516DB784EF74DC468B95
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000002.00000002.463287910.0000000001160000.00000040.00000001.sdmp, Offset: 01160000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_1160000_xVvAobZvWU.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 6335e64ce48f2c54b33ee15ad16af8097842ebda60da3b361c8348a93035d6e7
                      • Instruction ID: f73a4bf0172db16e11618015756907abca0121e529d2c26a73de095d140b09f9
                      • Opcode Fuzzy Hash: 6335e64ce48f2c54b33ee15ad16af8097842ebda60da3b361c8348a93035d6e7
                      • Instruction Fuzzy Hash: E681B431E002158FDB28CBACE4A47ADBBFAEB45310F158465E015EB392CB36DC56C751
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000002.00000002.463287910.0000000001160000.00000040.00000001.sdmp, Offset: 01160000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_1160000_xVvAobZvWU.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 6758470057eb62158e730e969a6579920d5980b8db973c03bb4f582d762a18a7
                      • Instruction ID: 7a2005d36ed1767544254ddb6755d571474fc530e078e588e252f9b53a559cc6
                      • Opcode Fuzzy Hash: 6758470057eb62158e730e969a6579920d5980b8db973c03bb4f582d762a18a7
                      • Instruction Fuzzy Hash: 1281A531E002198FDB29CB6CD8A47ADBBFAEB45310F158469E015EB392CB36DC56C751
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000002.00000002.463287910.0000000001160000.00000040.00000001.sdmp, Offset: 01160000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_1160000_xVvAobZvWU.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 3ed523633e77239e148c2fa0ac143abadc63a6ebcbfcd16fc2dca26de5b9e545
                      • Instruction ID: b2419cd8c3edbb992f55cfc5e17cce81ca67a1c605fa4dcd2f3128c1c8d215ad
                      • Opcode Fuzzy Hash: 3ed523633e77239e148c2fa0ac143abadc63a6ebcbfcd16fc2dca26de5b9e545
                      • Instruction Fuzzy Hash: 9861C530F002148FDF58ABB898597AEBABAEFC8314F108569D115EB391DF754C058F92
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000002.00000002.463287910.0000000001160000.00000040.00000001.sdmp, Offset: 01160000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_1160000_xVvAobZvWU.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 0ee7d505abf3d2035396a286a0f92e41bf6e47a4cbfd0f54d04bd2865b0e6099
                      • Instruction ID: 88720c9b76520b6eeb207e19e1c0acff2adc7dbd5dfc6331dbed0886f9fd8867
                      • Opcode Fuzzy Hash: 0ee7d505abf3d2035396a286a0f92e41bf6e47a4cbfd0f54d04bd2865b0e6099
                      • Instruction Fuzzy Hash: 24617171D007498FDB19CFA9C1407EEFBF6AF8A310F208259D845AB242D771A955CF90
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000002.00000002.463287910.0000000001160000.00000040.00000001.sdmp, Offset: 01160000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_1160000_xVvAobZvWU.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 8b909778d1b6f7d6f64cb663c40487c95dca840a49dea2db9e7e2ecf337bcf67
                      • Instruction ID: 70d0d432235208f8d50f36f7fd534cd7221d4c6b9a574247f99beee2d264adb2
                      • Opcode Fuzzy Hash: 8b909778d1b6f7d6f64cb663c40487c95dca840a49dea2db9e7e2ecf337bcf67
                      • Instruction Fuzzy Hash: FD51D930B043554FCB06ABB894186AD7BF69F86208B1544BAD409DF396EF35DC46CB51
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000002.00000002.463287910.0000000001160000.00000040.00000001.sdmp, Offset: 01160000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_1160000_xVvAobZvWU.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 621ff5594eaf9ab515a02e3df3df48ac8b31a02edca5c6c88b6758733aed1292
                      • Instruction ID: 795689f0d21c43ca76cfeb025b76c83539583c3d0e7fed20c1839da02109bbfd
                      • Opcode Fuzzy Hash: 621ff5594eaf9ab515a02e3df3df48ac8b31a02edca5c6c88b6758733aed1292
                      • Instruction Fuzzy Hash: 92418130B012118FDB2C9BB48459B7E7AE6AF88700F144438E916DB798EF75CC42CB95
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000002.00000002.463287910.0000000001160000.00000040.00000001.sdmp, Offset: 01160000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_1160000_xVvAobZvWU.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: ac088ad9932343bc0ccf43195ce354ad322c2634eeb6e1db4b5e74eb1bc0163c
                      • Instruction ID: fb0258d56c844e8435a5245672705730e642bb9b8ce64227aa702abcd08fa5c3
                      • Opcode Fuzzy Hash: ac088ad9932343bc0ccf43195ce354ad322c2634eeb6e1db4b5e74eb1bc0163c
                      • Instruction Fuzzy Hash: 7A411735A00249DFCF0ACFA8C844ADEBFB6BF45318F008056E9159F291D332E925CBA1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000002.00000002.463433582.00000000011BD000.00000040.00000001.sdmp, Offset: 011BD000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_11bd000_xVvAobZvWU.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 56bedfd93bf766e8dd517b6d727415868277e17902aa669441f0621e5a24da7e
                      • Instruction ID: ee06bec41d067a3e1cfb8c1a3e0df1242e8761498161fe216771039659828183
                      • Opcode Fuzzy Hash: 56bedfd93bf766e8dd517b6d727415868277e17902aa669441f0621e5a24da7e
                      • Instruction Fuzzy Hash: 5521F4B1504240DFDF0DDF94E8C0BA6BF75FB8832CF2485A9E9054B246C336D456C6A2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000002.00000002.463433582.00000000011BD000.00000040.00000001.sdmp, Offset: 011BD000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_11bd000_xVvAobZvWU.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 7407b3ee4edaed049e185e937ae9f0e6342a6ffe02d2ea19a24f8c139f22f169
                      • Instruction ID: 297262759aadaa72af76cba310b26053ef973c1bb3245e061f02bb938a7896e5
                      • Opcode Fuzzy Hash: 7407b3ee4edaed049e185e937ae9f0e6342a6ffe02d2ea19a24f8c139f22f169
                      • Instruction Fuzzy Hash: F321F475504240DFDF1DDF94E8C0BA7BB65FB88328F2485A9E9054B606C33AE845C7A2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000002.00000002.463460107.00000000011CD000.00000040.00000001.sdmp, Offset: 011CD000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_11cd000_xVvAobZvWU.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 45722efc51cb13fa93df1b154167d5a53afccb259ee10e27fa7b3392b0e6ad8c
                      • Instruction ID: 00432af95db604d0a2f2a2a21e355e9e8707e1463ba82f937c17a42a0a749306
                      • Opcode Fuzzy Hash: 45722efc51cb13fa93df1b154167d5a53afccb259ee10e27fa7b3392b0e6ad8c
                      • Instruction Fuzzy Hash: E8210371504240DFCF19DF98E8C0B16BB65FB84754F24C5BDE80A4B246C336D817CAA2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000002.00000002.463460107.00000000011CD000.00000040.00000001.sdmp, Offset: 011CD000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_11cd000_xVvAobZvWU.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 046b559fd2c67f93e2bd052ec4d636aaa3eed5204c047b73d62c34a7e82a4877
                      • Instruction ID: 612f8bca98154d0d3b8649a755f8345861e81e011f4717650d4b16c7c30f49ab
                      • Opcode Fuzzy Hash: 046b559fd2c67f93e2bd052ec4d636aaa3eed5204c047b73d62c34a7e82a4877
                      • Instruction Fuzzy Hash: 212192754083809FCB07CF58E994B15BF71EB46214F28C5EAD8498B657C33A985ACBA2
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000002.00000002.463287910.0000000001160000.00000040.00000001.sdmp, Offset: 01160000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_1160000_xVvAobZvWU.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 88f6c6395f8e2f1ace08a040ce188fcf7a4f2196efc2221f61eb7540fa0c0bce
                      • Instruction ID: ded9edbb0f28f009b9008582211219f9c05eb9e185c2affb5d158be9859c26fb
                      • Opcode Fuzzy Hash: 88f6c6395f8e2f1ace08a040ce188fcf7a4f2196efc2221f61eb7540fa0c0bce
                      • Instruction Fuzzy Hash: 0511C830B002198F8B54EBBCD8449EE7BF6BFC92147508569D14AE7354EF309C038BA4
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000002.00000002.463287910.0000000001160000.00000040.00000001.sdmp, Offset: 01160000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_1160000_xVvAobZvWU.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 073ad32c75d03eca539dbe8487e310091bc1dbf5be5c13554f1b611f17cc8963
                      • Instruction ID: 451901c114154e2aee1b46b0463f789fb084a143c3e359f2b83532ce74fed80f
                      • Opcode Fuzzy Hash: 073ad32c75d03eca539dbe8487e310091bc1dbf5be5c13554f1b611f17cc8963
                      • Instruction Fuzzy Hash: CB11B131A00206DBDB18CF68C840B5ABFBBAF85328F048656D5145B2D2D372F861C7A4
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000002.00000002.463433582.00000000011BD000.00000040.00000001.sdmp, Offset: 011BD000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_11bd000_xVvAobZvWU.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 184b28d4c02099fc0a852538407da5dc7e76361d293f30cbc9c792e0a6473fb9
                      • Instruction ID: 37320e67be6fd3507efbfe015c531f7d4baf6d8cf7611c406104cd37d268b6ed
                      • Opcode Fuzzy Hash: 184b28d4c02099fc0a852538407da5dc7e76361d293f30cbc9c792e0a6473fb9
                      • Instruction Fuzzy Hash: A111AF76404280CFCF0ACF54E9C4B56BF72FB88328F24C6A9D8094B616C336D45ACBA1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000002.00000002.463433582.00000000011BD000.00000040.00000001.sdmp, Offset: 011BD000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_11bd000_xVvAobZvWU.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 184b28d4c02099fc0a852538407da5dc7e76361d293f30cbc9c792e0a6473fb9
                      • Instruction ID: 18c20bb5582212dc5c8cc5004d11bbd5af1954f1457076c77219336b1e1fc833
                      • Opcode Fuzzy Hash: 184b28d4c02099fc0a852538407da5dc7e76361d293f30cbc9c792e0a6473fb9
                      • Instruction Fuzzy Hash: 3011B176404280CFDF1ACF54E9C4B56BF71FB88328F2486A9D8090B617C33AD45ACBA1
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000002.00000002.463287910.0000000001160000.00000040.00000001.sdmp, Offset: 01160000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_1160000_xVvAobZvWU.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 6d060d2c9d5875eaaa1d6580b6e39284fe769fc93b7903464df89cb73a95ff56
                      • Instruction ID: 0ec4a8c7b3bd6f6dc541de9a0079b83ad968f24eabfdc93015db680185e47741
                      • Opcode Fuzzy Hash: 6d060d2c9d5875eaaa1d6580b6e39284fe769fc93b7903464df89cb73a95ff56
                      • Instruction Fuzzy Hash: D6115230B102198F8B48FBBDD8449DEB7F5BBC86147508569D10AE7344EF309D028BA5
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000002.00000002.463287910.0000000001160000.00000040.00000001.sdmp, Offset: 01160000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_1160000_xVvAobZvWU.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 6c4d32b1d4f22b3b4c6947792aaaa2cf729f9a84636ea49d5129c33cc953e0d3
                      • Instruction ID: 1eee7cec106284d57ef2c9a182c1cc53349ed327b72e0e060fc69c19ccca79cf
                      • Opcode Fuzzy Hash: 6c4d32b1d4f22b3b4c6947792aaaa2cf729f9a84636ea49d5129c33cc953e0d3
                      • Instruction Fuzzy Hash: D9011735A041689FCB09CFA9D9048DDBBB5EF8D310F00816AE906AB355DB319919DB90
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Memory Dump Source
                      • Source File: 00000002.00000002.463287910.0000000001160000.00000040.00000001.sdmp, Offset: 01160000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_2_2_1160000_xVvAobZvWU.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: e24d5e108af407fad5660d7eadae12fb72439ffb888bc80fc79e3f2d10a75256
                      • Instruction ID: 11e7ee069d8f6c6943f4f9d149d29f05fce85ffb74e7dd333d491efc45b24d39
                      • Opcode Fuzzy Hash: e24d5e108af407fad5660d7eadae12fb72439ffb888bc80fc79e3f2d10a75256
                      • Instruction Fuzzy Hash: DDE0ED35B101298F8F48F7F9D8545DD77F6AFC8224B1180A5D50AE7354DE389C428BA5
                      Uniqueness

                      Uniqueness Score: -1.00%

                      Non-executed Functions