Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
63.exe

Overview

General Information

Sample Name:63.exe
Analysis ID:626030
MD5:638161fea451ac9d2cff99a9b9a7446c
SHA1:0ebd57241094f53ce80470edd61bfc0c8361eb2a
SHA256:f144a51298e1e037133ad60094a271af9d65501a3ab5e41527efb6bcb56ccf58
Tags:exe
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Yara detected Telegram RAT
Yara detected AgentTesla
Antivirus / Scanner detection for submitted sample
Writes to foreign memory regions
Machine Learning detection for sample
Allocates memory in foreign processes
Injects a PE file into a foreign processes
Yara detected Generic Downloader
.NET source code contains very large array initializations
Tries to detect virtualization through RDTSC time measurements
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
PE file contains sections with non-standard names
Detected potential crypto function
Yara detected Credential Stealer
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Sample file is different than original file name gathered from version info
Drops PE files
Tries to load missing DLLs
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • 63.exe (PID: 6408 cmdline: "C:\Users\user\Desktop\63.exe" MD5: 638161FEA451AC9D2CFF99A9B9A7446C)
    • RegAsm.exe (PID: 5680 cmdline: C:\Users\user\AppData\Local\Temp\RegAsm.exe MD5: 6FD7592411112729BF6B1F2F6C34899F)
  • cleanup
{"C2 url": "https://api.telegram.org/bot1160330796:AAF3SAwgW-OTi9M5kDhSZUlENwhKRvFOWe8/sendMessage"}
{"Exfil Mode": "Telegram", "Chat id": "1354205151", "Chat URL": "https://api.telegram.org/bot1160330796:AAF3SAwgW-OTi9M5kDhSZUlENwhKRvFOWe8/sendDocument"}
SourceRuleDescriptionAuthorStrings
00000010.00000000.425108271.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000010.00000000.425108271.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
      00000010.00000000.424683140.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        00000010.00000000.424683140.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
          00000010.00000002.531353991.0000000002C51000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 13 entries
            SourceRuleDescriptionAuthorStrings
            16.0.RegAsm.exe.400000.4.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              16.0.RegAsm.exe.400000.4.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                16.0.RegAsm.exe.400000.4.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
                  16.0.RegAsm.exe.400000.4.unpackMALWARE_Win_AgentTeslaV3AgentTeslaV3 infostealer payloadditekSHen
                  • 0x30013:$s1: get_kbok
                  • 0x3092d:$s2: get_CHoo
                  • 0x31538:$s3: set_passwordIsSet
                  • 0x2fe29:$s4: get_enableLog
                  • 0x3445e:$s8: torbrowser
                  • 0x32e1d:$s10: logins
                  • 0x326f6:$s11: credential
                  • 0x2f254:$g1: get_Clipboard
                  • 0x2f262:$g2: get_Keyboard
                  • 0x2f26f:$g3: get_Password
                  • 0x307dd:$g4: get_CtrlKeyDown
                  • 0x307ed:$g5: get_ShiftKeyDown
                  • 0x307fe:$g6: get_AltKeyDown
                  16.0.RegAsm.exe.400000.10.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                    Click to see the 19 entries
                    No Sigma rule has matched
                    No Snort rule has matched

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: 16.2.RegAsm.exe.400000.0.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "Telegram", "Chat id": "1354205151", "Chat URL": "https://api.telegram.org/bot1160330796:AAF3SAwgW-OTi9M5kDhSZUlENwhKRvFOWe8/sendDocument"}
                    Source: RegAsm.exe.5680.16.memstrminMalware Configuration Extractor: Telegram RAT {"C2 url": "https://api.telegram.org/bot1160330796:AAF3SAwgW-OTi9M5kDhSZUlENwhKRvFOWe8/sendMessage"}
                    Source: 63.exeVirustotal: Detection: 67%Perma Link
                    Source: 63.exeReversingLabs: Detection: 65%
                    Source: 63.exeAvira: detected
                    Source: 63.exeJoe Sandbox ML: detected
                    Source: 16.2.RegAsm.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                    Source: 16.0.RegAsm.exe.400000.10.unpackAvira: Label: TR/Spy.Gen8
                    Source: 16.0.RegAsm.exe.400000.6.unpackAvira: Label: TR/Spy.Gen8
                    Source: 16.0.RegAsm.exe.400000.12.unpackAvira: Label: TR/Spy.Gen8
                    Source: 16.0.RegAsm.exe.400000.8.unpackAvira: Label: TR/Spy.Gen8
                    Source: 16.0.RegAsm.exe.400000.4.unpackAvira: Label: TR/Spy.Gen8
                    Source: 63.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                    Source: 63.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
                    Source: Binary string: clrjit.pdb source: 63.exe, 00000000.00000003.268630387.00000000052AD000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: RegAsm.pdb source: RegAsm.exe, RegAsm.exe, 00000010.00000000.424779246.0000000000952000.00000002.00000001.01000000.0000000A.sdmp, RegAsm.exe.0.dr
                    Source: Binary string: RegAsm.pdb4 source: RegAsm.exe, 00000010.00000000.424779246.0000000000952000.00000002.00000001.01000000.0000000A.sdmp, RegAsm.exe.0.dr
                    Source: Binary string: C:\Dropbox\Dev\ag.v66\Libraries\MSILJitter\bin\RELEASE\win32\AgileDotNetRT.pdb source: o.dll.0.dr

                    Networking

                    barindex
                    Source: Yara matchFile source: 16.0.RegAsm.exe.400000.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 16.0.RegAsm.exe.400000.10.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 16.0.RegAsm.exe.400000.8.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 16.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 16.0.RegAsm.exe.400000.12.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 16.0.RegAsm.exe.400000.6.unpack, type: UNPACKEDPE
                    Source: RegAsm.exe, 00000010.00000002.531353991.0000000002C51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                    Source: RegAsm.exe, 00000010.00000002.531353991.0000000002C51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://DynDns.comDynDNS
                    Source: RegAsm.exe, 00000010.00000002.531353991.0000000002C51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://ZPEHvd.com
                    Source: o.dll.0.drString found in binary or memory: http://crl.thawte.com/ThawteTimestampingCA.crl0
                    Source: o.dll.0.drString found in binary or memory: http://ocsp.thawte.com0
                    Source: o.dll.0.drString found in binary or memory: http://s1.symcb.com/pca3-g5.crl0
                    Source: o.dll.0.drString found in binary or memory: http://s2.symcb.com0
                    Source: o.dll.0.drString found in binary or memory: http://sv.symcb.com/sv.crl0a
                    Source: o.dll.0.drString found in binary or memory: http://sv.symcb.com/sv.crt0
                    Source: o.dll.0.drString found in binary or memory: http://sv.symcd.com0&
                    Source: o.dll.0.drString found in binary or memory: http://ts-aia.ws.symantec.com/tss-ca-g2.cer0
                    Source: o.dll.0.drString found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
                    Source: o.dll.0.drString found in binary or memory: http://ts-ocsp.ws.symantec.com07
                    Source: o.dll.0.drString found in binary or memory: http://www.symauth.com/cps0(
                    Source: o.dll.0.drString found in binary or memory: http://www.symauth.com/rpa00
                    Source: RegAsm.exe, 00000010.00000002.531353991.0000000002C51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.orgGETMozilla/5.0
                    Source: RegAsm.exe, 00000010.00000000.425108271.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot1160330796:AAF3SAwgW-OTi9M5kDhSZUlENwhKRvFOWe8/
                    Source: RegAsm.exe, 00000010.00000002.531353991.0000000002C51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot1160330796:AAF3SAwgW-OTi9M5kDhSZUlENwhKRvFOWe8/sendDocumentdocument-----
                    Source: o.dll.0.drString found in binary or memory: https://d.symcb.com/cps0%
                    Source: o.dll.0.drString found in binary or memory: https://d.symcb.com/rpa0
                    Source: RegAsm.exe, 00000010.00000000.425108271.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
                    Source: RegAsm.exe, 00000010.00000002.531353991.0000000002C51000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha

                    System Summary

                    barindex
                    Source: 16.0.RegAsm.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 16.0.RegAsm.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 16.0.RegAsm.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 16.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 16.0.RegAsm.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 16.0.RegAsm.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 00000010.00000002.531353991.0000000002C51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: Process Memory Space: RegAsm.exe PID: 5680, type: MEMORYSTRMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 63.exe, owjkr/vpvao.csLarge array initialization: .cctor: array initializer size 132624
                    Source: 0.0.63.exe.7c0000.0.unpack, owjkr/vpvao.csLarge array initialization: .cctor: array initializer size 132624
                    Source: 16.2.RegAsm.exe.400000.0.unpack, u003cPrivateImplementationDetailsu003eu007bD9E03315u002dB701u002d40B2u002dA9AAu002d216CD680177Fu007d/u003874ABDA0u002dAC0Cu002d4641u002dA022u002d803F71CBA88B.csLarge array initialization: .cctor: array initializer size 11839
                    Source: 16.0.RegAsm.exe.400000.10.unpack, u003cPrivateImplementationDetailsu003eu007bD9E03315u002dB701u002d40B2u002dA9AAu002d216CD680177Fu007d/u003874ABDA0u002dAC0Cu002d4641u002dA022u002d803F71CBA88B.csLarge array initialization: .cctor: array initializer size 11839
                    Source: 16.0.RegAsm.exe.400000.6.unpack, u003cPrivateImplementationDetailsu003eu007bD9E03315u002dB701u002d40B2u002dA9AAu002d216CD680177Fu007d/u003874ABDA0u002dAC0Cu002d4641u002dA022u002d803F71CBA88B.csLarge array initialization: .cctor: array initializer size 11839
                    Source: 16.0.RegAsm.exe.400000.12.unpack, u003cPrivateImplementationDetailsu003eu007bD9E03315u002dB701u002d40B2u002dA9AAu002d216CD680177Fu007d/u003874ABDA0u002dAC0Cu002d4641u002dA022u002d803F71CBA88B.csLarge array initialization: .cctor: array initializer size 11839
                    Source: 16.0.RegAsm.exe.400000.8.unpack, u003cPrivateImplementationDetailsu003eu007bD9E03315u002dB701u002d40B2u002dA9AAu002d216CD680177Fu007d/u003874ABDA0u002dAC0Cu002d4641u002dA022u002d803F71CBA88B.csLarge array initialization: .cctor: array initializer size 11839
                    Source: 63.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                    Source: 16.0.RegAsm.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 16.0.RegAsm.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 16.0.RegAsm.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 16.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 16.0.RegAsm.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 16.0.RegAsm.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 00000010.00000002.531353991.0000000002C51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: Process Memory Space: RegAsm.exe PID: 5680, type: MEMORYSTRMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeCode function: 16_2_00953DFE16_2_00953DFE
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeCode function: 16_2_010B46E016_2_010B46E0
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeCode function: 16_2_010B461016_2_010B4610
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeCode function: 16_2_010B46B016_2_010B46B0
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeCode function: 16_2_010BD1A016_2_010BD1A0
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeCode function: 16_2_05EE650816_2_05EE6508
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeCode function: 16_2_05EE8CD816_2_05EE8CD8
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeCode function: 16_2_05EE712016_2_05EE7120
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeCode function: 16_2_05EE685016_2_05EE6850
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeCode function: 16_2_05EE220416_2_05EE2204
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeCode function: 16_2_05EE219416_2_05EE2194
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeCode function: 16_2_05EE225816_2_05EE2258
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeCode function: 16_2_05EE222416_2_05EE2224
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeCode function: 16_2_05EE223416_2_05EE2234
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeCode function: 16_2_05EE220216_2_05EE2202
                    Source: 63.exe, 00000000.00000000.261457145.0000000000832000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameDOCUMENT.exe4 vs 63.exe
                    Source: 63.exe, 00000000.00000003.268630387.00000000052AD000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclrjit.dllT vs 63.exe
                    Source: 63.exeBinary or memory string: OriginalFilenameDOCUMENT.exe4 vs 63.exe
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeSection loaded: sfc.dllJump to behavior
                    Source: 63.exeVirustotal: Detection: 67%
                    Source: 63.exeReversingLabs: Detection: 65%
                    Source: C:\Users\user\Desktop\63.exeFile read: C:\Users\user\Desktop\63.exe:Zone.IdentifierJump to behavior
                    Source: 63.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                    Source: C:\Users\user\Desktop\63.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: unknownProcess created: C:\Users\user\Desktop\63.exe "C:\Users\user\Desktop\63.exe"
                    Source: C:\Users\user\Desktop\63.exeProcess created: C:\Users\user\AppData\Local\Temp\RegAsm.exe C:\Users\user\AppData\Local\Temp\RegAsm.exe
                    Source: C:\Users\user\Desktop\63.exeProcess created: C:\Users\user\AppData\Local\Temp\RegAsm.exe C:\Users\user\AppData\Local\Temp\RegAsm.exeJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{172BDDF8-CEEA-11D1-8B05-00600806D9B6}\InProcServer32Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\Desktop\63.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\63.exe.logJump to behavior
                    Source: C:\Users\user\Desktop\63.exeFile created: C:\Users\user\AppData\Local\Temp\851a6346-8539-40b9-b694-d1d5343c092eJump to behavior
                    Source: classification engineClassification label: mal100.troj.evad.winEXE@3/3@0/0
                    Source: C:\Users\user\Desktop\63.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                    Source: 63.exe, uhvtn/ruypt.csCryptographic APIs: 'TransformBlock'
                    Source: 63.exe, muhbh/lnibr.csCryptographic APIs: 'TransformBlock'
                    Source: 63.exe, qgfei/supzt.csCryptographic APIs: 'CreateDecryptor'
                    Source: 0.0.63.exe.7c0000.0.unpack, muhbh/lnibr.csCryptographic APIs: 'TransformBlock'
                    Source: 0.0.63.exe.7c0000.0.unpack, qgfei/supzt.csCryptographic APIs: 'CreateDecryptor'
                    Source: 0.0.63.exe.7c0000.0.unpack, uhvtn/ruypt.csCryptographic APIs: 'TransformBlock'
                    Source: 16.2.RegAsm.exe.400000.0.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: 16.2.RegAsm.exe.400000.0.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: 16.0.RegAsm.exe.400000.10.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: 16.0.RegAsm.exe.400000.10.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: C:\Users\user\Desktop\63.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                    Source: 63.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                    Source: 63.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
                    Source: Binary string: clrjit.pdb source: 63.exe, 00000000.00000003.268630387.00000000052AD000.00000004.00000800.00020000.00000000.sdmp
                    Source: Binary string: RegAsm.pdb source: RegAsm.exe, RegAsm.exe, 00000010.00000000.424779246.0000000000952000.00000002.00000001.01000000.0000000A.sdmp, RegAsm.exe.0.dr
                    Source: Binary string: RegAsm.pdb4 source: RegAsm.exe, 00000010.00000000.424779246.0000000000952000.00000002.00000001.01000000.0000000A.sdmp, RegAsm.exe.0.dr
                    Source: Binary string: C:\Dropbox\Dev\ag.v66\Libraries\MSILJitter\bin\RELEASE\win32\AgileDotNetRT.pdb source: o.dll.0.dr
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeCode function: 16_2_00954289 push es; retf 16_2_00954294
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeCode function: 16_2_009544A3 push es; retf 16_2_009544A4
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeCode function: 16_2_00954469 push cs; retf 16_2_0095449E
                    Source: o.dll.0.drStatic PE information: section name: .didat
                    Source: o.dll.0.drStatic PE information: section name: .00cfg
                    Source: initial sampleStatic PE information: section name: .text entropy: 7.51647686445
                    Source: C:\Users\user\Desktop\63.exeFile created: C:\Users\user\AppData\Local\Temp\851a6346-8539-40b9-b694-d1d5343c092e\o.dllJump to dropped file
                    Source: C:\Users\user\Desktop\63.exeFile created: C:\Users\user\AppData\Local\Temp\RegAsm.exeJump to dropped file
                    Source: C:\Users\user\Desktop\63.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\63.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\63.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\63.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\63.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\63.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\63.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\63.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\63.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\63.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\63.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\63.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\63.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\63.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\63.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\63.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\63.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\63.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\63.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\63.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\63.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\63.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\63.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\63.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\63.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\63.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\63.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\63.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\63.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\63.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\63.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\63.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\63.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\63.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\63.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\63.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\63.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\63.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\63.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\63.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\63.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\63.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\63.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\63.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\63.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: C:\Users\user\Desktop\63.exeRDTSC instruction interceptor: First address: 0000000072BF1D36 second address: 0000000072BF2A87 instructions: 0x00000000 rdtsc 0x00000002 mov dword ptr [ebp-10h], eax 0x00000005 mov dword ptr [ebp-0Ch], edx 0x00000008 mov eax, dword ptr [ebp-10h] 0x0000000b sub eax, dword ptr [ebp-08h] 0x0000000e mov edx, dword ptr [ebp-0Ch] 0x00000011 sbb edx, dword ptr [ebp-04h] 0x00000014 pop edi 0x00000015 pop esi 0x00000016 pop ebx 0x00000017 mov esp, ebp 0x00000019 pop ebp 0x0000001a ret 0x0000001b mov dword ptr [72C053C0h], eax 0x00000020 mov dword ptr [72C053C4h], edx 0x00000026 mov dword ptr [ebp-0Ch], 00000000h 0x0000002d jmp 00007FDD04A4D2FBh 0x0000002f mov eax, dword ptr [ebp-0Ch] 0x00000032 cmp eax, dword ptr [ebp+08h] 0x00000035 jnl 00007FDD04A4D336h 0x00000037 rdtsc
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Users\user\Desktop\63.exe TID: 6460Thread sleep count: 238 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\63.exe TID: 1128Thread sleep count: 39 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\63.exe TID: 1128Thread sleep time: -35971150943733603s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\63.exe TID: 6196Thread sleep count: 4509 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\63.exe TID: 6196Thread sleep count: 4881 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\63.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\63.exeWindow / User API: threadDelayed 4509Jump to behavior
                    Source: C:\Users\user\Desktop\63.exeWindow / User API: threadDelayed 4881Jump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\Desktop\63.exeProcess information queried: ProcessInformationJump to behavior
                    Source: C:\Users\user\Desktop\63.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\63.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\63.exeMemory allocated: page read and write | page guardJump to behavior

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Users\user\Desktop\63.exeMemory written: C:\Users\user\AppData\Local\Temp\RegAsm.exe base: 400000Jump to behavior
                    Source: C:\Users\user\Desktop\63.exeMemory written: C:\Users\user\AppData\Local\Temp\RegAsm.exe base: 402000Jump to behavior
                    Source: C:\Users\user\Desktop\63.exeMemory written: C:\Users\user\AppData\Local\Temp\RegAsm.exe base: 438000Jump to behavior
                    Source: C:\Users\user\Desktop\63.exeMemory written: C:\Users\user\AppData\Local\Temp\RegAsm.exe base: 43A000Jump to behavior
                    Source: C:\Users\user\Desktop\63.exeMemory written: C:\Users\user\AppData\Local\Temp\RegAsm.exe base: B81008Jump to behavior
                    Source: C:\Users\user\Desktop\63.exeMemory allocated: C:\Users\user\AppData\Local\Temp\RegAsm.exe base: 400000 protect: page execute and read and writeJump to behavior
                    Source: C:\Users\user\Desktop\63.exeMemory written: C:\Users\user\AppData\Local\Temp\RegAsm.exe base: 400000 value starts with: 4D5AJump to behavior
                    Source: C:\Users\user\Desktop\63.exeProcess created: C:\Users\user\AppData\Local\Temp\RegAsm.exe C:\Users\user\AppData\Local\Temp\RegAsm.exeJump to behavior
                    Source: C:\Users\user\Desktop\63.exeQueries volume information: C:\Users\user\Desktop\63.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\63.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\63.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeQueries volume information: C:\Users\user\AppData\Local\Temp\RegAsm.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\AppData\Local\Temp\RegAsm.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\63.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 00000010.00000002.531353991.0000000002C51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 5680, type: MEMORYSTR
                    Source: Yara matchFile source: 16.0.RegAsm.exe.400000.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 16.0.RegAsm.exe.400000.10.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 16.0.RegAsm.exe.400000.8.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 16.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 16.0.RegAsm.exe.400000.12.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 16.0.RegAsm.exe.400000.6.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000010.00000000.425108271.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000010.00000000.424683140.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000010.00000000.424295986.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000010.00000002.529314857.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000010.00000000.423853193.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000010.00000002.531353991.0000000002C51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 5680, type: MEMORYSTR
                    Source: Yara matchFile source: 00000010.00000002.531353991.0000000002C51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 5680, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 00000010.00000002.531353991.0000000002C51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 5680, type: MEMORYSTR
                    Source: Yara matchFile source: 16.0.RegAsm.exe.400000.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 16.0.RegAsm.exe.400000.10.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 16.0.RegAsm.exe.400000.8.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 16.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 16.0.RegAsm.exe.400000.12.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 16.0.RegAsm.exe.400000.6.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000010.00000000.425108271.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000010.00000000.424683140.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000010.00000000.424295986.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000010.00000002.529314857.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000010.00000000.423853193.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000010.00000002.531353991.0000000002C51000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 5680, type: MEMORYSTR
                    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                    Valid Accounts211
                    Windows Management Instrumentation
                    1
                    DLL Side-Loading
                    311
                    Process Injection
                    1
                    Masquerading
                    OS Credential Dumping21
                    Security Software Discovery
                    Remote Services11
                    Archive Collected Data
                    Exfiltration Over Other Network Medium1
                    Encrypted Channel
                    Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                    Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                    DLL Side-Loading
                    1
                    Disable or Modify Tools
                    LSASS Memory1
                    Process Discovery
                    Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                    Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)131
                    Virtualization/Sandbox Evasion
                    Security Account Manager131
                    Virtualization/Sandbox Evasion
                    SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)311
                    Process Injection
                    NTDS1
                    Application Window Discovery
                    Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
                    Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
                    Deobfuscate/Decode Files or Information
                    LSA Secrets213
                    System Information Discovery
                    SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                    Replication Through Removable MediaLaunchdRc.commonRc.common2
                    Obfuscated Files or Information
                    Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                    External Remote ServicesScheduled TaskStartup ItemsStartup Items2
                    Software Packing
                    DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                    Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
                    DLL Side-Loading
                    Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    63.exe68%VirustotalBrowse
                    63.exe65%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
                    63.exe100%AviraHEUR/AGEN.1202787
                    63.exe100%Joe Sandbox ML
                    SourceDetectionScannerLabelLink
                    C:\Users\user\AppData\Local\Temp\851a6346-8539-40b9-b694-d1d5343c092e\o.dll0%MetadefenderBrowse
                    C:\Users\user\AppData\Local\Temp\851a6346-8539-40b9-b694-d1d5343c092e\o.dll2%ReversingLabs
                    C:\Users\user\AppData\Local\Temp\RegAsm.exe0%MetadefenderBrowse
                    C:\Users\user\AppData\Local\Temp\RegAsm.exe0%ReversingLabs
                    SourceDetectionScannerLabelLinkDownload
                    16.2.RegAsm.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
                    16.0.RegAsm.exe.400000.10.unpack100%AviraTR/Spy.Gen8Download File
                    16.0.RegAsm.exe.400000.6.unpack100%AviraTR/Spy.Gen8Download File
                    0.0.63.exe.7c0000.0.unpack100%AviraHEUR/AGEN.1202787Download File
                    16.0.RegAsm.exe.400000.12.unpack100%AviraTR/Spy.Gen8Download File
                    16.0.RegAsm.exe.400000.8.unpack100%AviraTR/Spy.Gen8Download File
                    16.0.RegAsm.exe.400000.4.unpack100%AviraTR/Spy.Gen8Download File
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
                    http://DynDns.comDynDNS0%URL Reputationsafe
                    https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                    https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                    http://ocsp.thawte.com00%URL Reputationsafe
                    http://ZPEHvd.com0%Avira URL Cloudsafe
                    https://api.ipify.orgGETMozilla/5.00%URL Reputationsafe
                    No contacted domains info
                    NameSourceMaliciousAntivirus DetectionReputation
                    http://127.0.0.1:HTTP/1.1RegAsm.exe, 00000010.00000002.531353991.0000000002C51000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    low
                    http://DynDns.comDynDNSRegAsm.exe, 00000010.00000002.531353991.0000000002C51000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://api.telegram.org/bot1160330796:AAF3SAwgW-OTi9M5kDhSZUlENwhKRvFOWe8/sendDocumentdocument-----RegAsm.exe, 00000010.00000002.531353991.0000000002C51000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://crl.thawte.com/ThawteTimestampingCA.crl0o.dll.0.drfalse
                        high
                        https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%haRegAsm.exe, 00000010.00000002.531353991.0000000002C51000.00000004.00000800.00020000.00000000.sdmpfalse
                        • URL Reputation: safe
                        unknown
                        http://www.symauth.com/cps0(o.dll.0.drfalse
                          high
                          http://www.symauth.com/rpa00o.dll.0.drfalse
                            high
                            https://api.telegram.org/bot1160330796:AAF3SAwgW-OTi9M5kDhSZUlENwhKRvFOWe8/RegAsm.exe, 00000010.00000000.425108271.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                              high
                              https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zipRegAsm.exe, 00000010.00000000.425108271.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://ocsp.thawte.com0o.dll.0.drfalse
                              • URL Reputation: safe
                              unknown
                              http://ZPEHvd.comRegAsm.exe, 00000010.00000002.531353991.0000000002C51000.00000004.00000800.00020000.00000000.sdmpfalse
                              • Avira URL Cloud: safe
                              unknown
                              https://api.ipify.orgGETMozilla/5.0RegAsm.exe, 00000010.00000002.531353991.0000000002C51000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              No contacted IP infos
                              Joe Sandbox Version:34.0.0 Boulder Opal
                              Analysis ID:626030
                              Start date and time: 13/05/202214:03:352022-05-13 14:03:35 +02:00
                              Joe Sandbox Product:CloudBasic
                              Overall analysis duration:0h 8m 5s
                              Hypervisor based Inspection enabled:false
                              Report type:full
                              Sample file name:63.exe
                              Cookbook file name:default.jbs
                              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                              Number of analysed new started processes analysed:24
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • HDC enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Detection:MAL
                              Classification:mal100.troj.evad.winEXE@3/3@0/0
                              EGA Information:
                              • Successful, ratio: 100%
                              HDC Information:
                              • Successful, ratio: 0.2% (good quality ratio 0.2%)
                              • Quality average: 64.9%
                              • Quality standard deviation: 24%
                              HCA Information:
                              • Successful, ratio: 100%
                              • Number of executed functions: 49
                              • Number of non-executed functions: 4
                              Cookbook Comments:
                              • Found application associated with file extension: .exe
                              • Adjust boot time
                              • Enable AMSI
                              • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, WmiPrvSE.exe, svchost.exe
                              • Excluded domains from analysis (whitelisted): ris.api.iris.microsoft.com, fs.microsoft.com, store-images.s-microsoft.com, login.live.com, img-prod-cms-rt-microsoft-com.akamaized.net, arc.msn.com
                              • Not all processes where analyzed, report is missing behavior information
                              • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                              TimeTypeDescription
                              14:05:44API Interceptor87x Sleep call for process: 63.exe modified
                              No context
                              No context
                              No context
                              No context
                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                              C:\Users\user\AppData\Local\Temp\851a6346-8539-40b9-b694-d1d5343c092e\o.dlld4.exeGet hashmaliciousBrowse
                                VirusMaker_setup.exeGet hashmaliciousBrowse
                                  Hackeplex Loader x32.exeGet hashmaliciousBrowse
                                    Lunar Builder.exeGet hashmaliciousBrowse
                                      2aiZD9auQ0.exeGet hashmaliciousBrowse
                                        Lunar_Builder.exeGet hashmaliciousBrowse
                                          Lunar_Builder.exeGet hashmaliciousBrowse
                                            nAnM21musB.exeGet hashmaliciousBrowse
                                              dLlF0bPWxx.exeGet hashmaliciousBrowse
                                                eNjIpT5RzD.exeGet hashmaliciousBrowse
                                                  Plq7ADczmp.exeGet hashmaliciousBrowse
                                                    Courvix-VPN.exeGet hashmaliciousBrowse
                                                      VPN.exeGet hashmaliciousBrowse
                                                        PAYMENT.exeGet hashmaliciousBrowse
                                                          ORDER FORM DENK.exeGet hashmaliciousBrowse
                                                            SecuriteInfo.com.BackDoor.SpyBotNET.25.5189.exeGet hashmaliciousBrowse
                                                              UVZxk61Vdc.exeGet hashmaliciousBrowse
                                                                niMONOdcTZ.exeGet hashmaliciousBrowse
                                                                  XiCfDFLACR.exeGet hashmaliciousBrowse
                                                                    Q7kSO3iJN3.exeGet hashmaliciousBrowse
                                                                      Process:C:\Users\user\Desktop\63.exe
                                                                      File Type:ASCII text, with CRLF line terminators
                                                                      Category:dropped
                                                                      Size (bytes):1871
                                                                      Entropy (8bit):5.35489297593518
                                                                      Encrypted:false
                                                                      SSDEEP:48:MxHKXeHKlEHU0YHKhQnouHIW7HKjntHoxHhAHKzvGHKx1qHj:iqXeqm00YqhQnouRqjntIxHeqz+qxwD
                                                                      MD5:D5C4F072A3F0ED8C0079814E68AF222D
                                                                      SHA1:D2ACD6634158C5B881919FCE628716B7C3E519EB
                                                                      SHA-256:DAAD0CC8592CA67F6ACCFCB2127FC9D08F514D4165F8617E0150FE1784808FC5
                                                                      SHA-512:635C0F7EEF16AD97257E63D6489284CF529A01CAB450A6ABEFD72FBCC78F209770EA3452B8703F637DA15938251CAD5D89A8FA8CB35903F2974A96D893456FA3
                                                                      Malicious:true
                                                                      Reputation:moderate, very likely benign file
                                                                      Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..3,"PresentationCore, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35","C:\Windows\assembly\NativeImages_v4.0.30319_32\PresentationCore\820a27781e8540ca263d835ec155f1a5\PresentationCore.ni.dll",0..3,"PresentationFramework, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35","C:\Windows\assembly\NativeImages_v4.0.30319_32\Presentatio5ae0f00f#\889128adc9a7c9370e5e293f65060164\PresentationFramework.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"WindowsBase, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35","C:\Windows\assembly\NativeImages_v4.0.30319_32\Wi
                                                                      Process:C:\Users\user\Desktop\63.exe
                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                      Category:dropped
                                                                      Size (bytes):96664
                                                                      Entropy (8bit):5.567444078679915
                                                                      Encrypted:false
                                                                      SSDEEP:1536:JKQ7ZLTFq31bfnHSukoY1IPtan1sBrGxEm5g:JKc/FM1bfnyNNdkrGxJg
                                                                      MD5:14FF402962AD21B78AE0B4C43CD1F194
                                                                      SHA1:F8A510EB26666E875A5BDD1CADAD40602763AD72
                                                                      SHA-256:FB9646CB956945BDC503E69645F6B5316D3826B780D3C36738D6B944E884D15B
                                                                      SHA-512:DAA7A08BF3709119A944BCE28F6EBDD24E54A22B18CD9F86A87873E958DF121A3881DCDD5E162F6B4E543238C7AEF20F657C9830DF01D4C79290F7C9A4FCC54B
                                                                      Malicious:false
                                                                      Antivirus:
                                                                      • Antivirus: Metadefender, Detection: 0%, Browse
                                                                      • Antivirus: ReversingLabs, Detection: 2%
                                                                      Joe Sandbox View:
                                                                      • Filename: d4.exe, Detection: malicious, Browse
                                                                      • Filename: VirusMaker_setup.exe, Detection: malicious, Browse
                                                                      • Filename: Hackeplex Loader x32.exe, Detection: malicious, Browse
                                                                      • Filename: Lunar Builder.exe, Detection: malicious, Browse
                                                                      • Filename: 2aiZD9auQ0.exe, Detection: malicious, Browse
                                                                      • Filename: Lunar_Builder.exe, Detection: malicious, Browse
                                                                      • Filename: Lunar_Builder.exe, Detection: malicious, Browse
                                                                      • Filename: nAnM21musB.exe, Detection: malicious, Browse
                                                                      • Filename: dLlF0bPWxx.exe, Detection: malicious, Browse
                                                                      • Filename: eNjIpT5RzD.exe, Detection: malicious, Browse
                                                                      • Filename: Plq7ADczmp.exe, Detection: malicious, Browse
                                                                      • Filename: Courvix-VPN.exe, Detection: malicious, Browse
                                                                      • Filename: VPN.exe, Detection: malicious, Browse
                                                                      • Filename: PAYMENT.exe, Detection: malicious, Browse
                                                                      • Filename: ORDER FORM DENK.exe, Detection: malicious, Browse
                                                                      • Filename: SecuriteInfo.com.BackDoor.SpyBotNET.25.5189.exe, Detection: malicious, Browse
                                                                      • Filename: UVZxk61Vdc.exe, Detection: malicious, Browse
                                                                      • Filename: niMONOdcTZ.exe, Detection: malicious, Browse
                                                                      • Filename: XiCfDFLACR.exe, Detection: malicious, Browse
                                                                      • Filename: Q7kSO3iJN3.exe, Detection: malicious, Browse
                                                                      Reputation:moderate, very likely benign file
                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........jr..jr..jr..8...ir......kr......cr..jr..9r..8...kr......sr......kr....x.kr..jr..kr......kr..Richjr..................PE..L...5 .\...........!.........F...............0......................................Z.....@..........................C......0b..d....................b..........4...`A..8...........................x7..@............`..0....p..`....................text...h........................... ..`.rdata.......0......."..............@..@.data........P.......:..............@....idata.......`.......<..............@..@.didat..a....p.......J..............@....00cfg...............N..............@..@.rsrc................P..............@..@.reloc...............X..............@..B........................................................................................................................................................................................
                                                                      Process:C:\Users\user\Desktop\63.exe
                                                                      File Type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                      Category:dropped
                                                                      Size (bytes):64616
                                                                      Entropy (8bit):6.037264560032456
                                                                      Encrypted:false
                                                                      SSDEEP:768:J8XcJiMjm2ieHlPyCsSuJbn8dBhFVBSMQ6Iq8TSYDKpgLaDViRLNdr:9YMaNylPYSAb8dBnTHv8DKKaDVkX
                                                                      MD5:6FD7592411112729BF6B1F2F6C34899F
                                                                      SHA1:5E5C839726D6A43C478AB0B95DBF52136679F5EA
                                                                      SHA-256:FFE4480CCC81B061F725C54587E9D1BA96547D27FE28083305D75796F2EB3E74
                                                                      SHA-512:21EFCC9DEE3960F1A64C6D8A44871742558666BB792D77ACE91236C7DBF42A6CA77086918F363C4391D9C00904C55A952E2C18BE5FA1A67A509827BFC630070D
                                                                      Malicious:true
                                                                      Antivirus:
                                                                      • Antivirus: Metadefender, Detection: 0%, Browse
                                                                      • Antivirus: ReversingLabs, Detection: 0%
                                                                      Reputation:moderate, very likely benign file
                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...xX.Z..............0.............^.... ........@.. ....................... ............`.....................................O.......8...............h>........................................................... ............... ..H............text...d.... ...................... ..`.rsrc...8...........................@..@.reloc..............................@..B................@.......H........A...p..........T................................................~P...-.r...p.....(....(....s.....P...*..0.."........(......-.r...p.rI..p(....s....z.*...0..........(....~P.....o......*..(....*n(.....(..........%...(....*~(.....(..........%...%...(....*.(.....(..........%...%...%...(....*V.(......}Q.....}R...*..{Q...*..{R...*...0...........(.......i.=...}S......i.@...}T......i.@...}U.....+m...(....o .....r]..p.o!...,..{T.......{U........o"....+(.ra..p.o!...,..{T.......
                                                                      File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                      Entropy (8bit):7.501105460847332
                                                                      TrID:
                                                                      • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                                                                      • Win32 Executable (generic) a (10002005/4) 49.97%
                                                                      • Generic Win/DOS Executable (2004/3) 0.01%
                                                                      • DOS Executable Generic (2002/1) 0.01%
                                                                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                      File name:63.exe
                                                                      File size:454656
                                                                      MD5:638161fea451ac9d2cff99a9b9a7446c
                                                                      SHA1:0ebd57241094f53ce80470edd61bfc0c8361eb2a
                                                                      SHA256:f144a51298e1e037133ad60094a271af9d65501a3ab5e41527efb6bcb56ccf58
                                                                      SHA512:2fb6f70458b40cc4d6566714873623e2ad6769fe6d5ebbf9c7fa514c9359870ea62acbd718edb96ac10c214f6b2e6f53bde59ff4b29d08866be059b7b36c3d3f
                                                                      SSDEEP:6144:DKf9ojc7FRWwDFSs5Og4HzABTOZozWIvRgDpIMRMjPjKNThg:2bRWwpSsMBHkBTkSWMjWg
                                                                      TLSH:8CA45CB73D52687DCA6E0675046A84C1FAB617CB3F908B0DB19F830C0E15A6BEB63517
                                                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....F._................................. ... ....@.. .......................`............`................................
                                                                      Icon Hash:00828e8e8686b000
                                                                      Entrypoint:0x47050e
                                                                      Entrypoint Section:.text
                                                                      Digitally signed:false
                                                                      Imagebase:0x400000
                                                                      Subsystem:windows gui
                                                                      Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                                                      DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
                                                                      Time Stamp:0x5FAA4607 [Tue Nov 10 07:49:27 2020 UTC]
                                                                      TLS Callbacks:
                                                                      CLR (.Net) Version:v4.0.30319
                                                                      OS Version Major:4
                                                                      OS Version Minor:0
                                                                      File Version Major:4
                                                                      File Version Minor:0
                                                                      Subsystem Version Major:4
                                                                      Subsystem Version Minor:0
                                                                      Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                                      Instruction
                                                                      jmp dword ptr [00402000h]
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      NameVirtual AddressVirtual Size Is in Section
                                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x704c00x4b.text
                                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x720000x4d6.rsrc
                                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x740000xc.reloc
                                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                      .text0x20000x6e5140x6e600False0.685783550396SysEx File - Moog7.51647686445IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                                      .rsrc0x720000x4d60x600False0.380859375data3.78443747428IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                      .reloc0x740000xc0x200False0.044921875data0.0815394123432IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                      NameRVASizeTypeLanguageCountry
                                                                      RT_VERSION0x720a00x24cdata
                                                                      RT_MANIFEST0x722ec0x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                                                      DLLImport
                                                                      mscoree.dll_CorExeMain
                                                                      DescriptionData
                                                                      Translation0x0000 0x04b0
                                                                      LegalCopyright
                                                                      Assembly Version0.0.0.0
                                                                      InternalNameDOCUMENT.exe
                                                                      FileVersion0.0.0.0
                                                                      ProductVersion0.0.0.0
                                                                      FileDescription
                                                                      OriginalFilenameDOCUMENT.exe
                                                                      No network behavior found

                                                                      Click to jump to process

                                                                      Click to jump to process

                                                                      Click to dive into process behavior distribution

                                                                      Click to jump to process

                                                                      Target ID:0
                                                                      Start time:14:04:44
                                                                      Start date:13/05/2022
                                                                      Path:C:\Users\user\Desktop\63.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:"C:\Users\user\Desktop\63.exe"
                                                                      Imagebase:0x7c0000
                                                                      File size:454656 bytes
                                                                      MD5 hash:638161FEA451AC9D2CFF99A9B9A7446C
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:.Net C# or VB.NET
                                                                      Reputation:low

                                                                      Target ID:16
                                                                      Start time:14:05:59
                                                                      Start date:13/05/2022
                                                                      Path:C:\Users\user\AppData\Local\Temp\RegAsm.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:C:\Users\user\AppData\Local\Temp\RegAsm.exe
                                                                      Imagebase:0x950000
                                                                      File size:64616 bytes
                                                                      MD5 hash:6FD7592411112729BF6B1F2F6C34899F
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:.Net C# or VB.NET
                                                                      Yara matches:
                                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000010.00000000.425108271.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000010.00000000.425108271.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000010.00000000.424683140.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000010.00000000.424683140.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000010.00000002.531353991.0000000002C51000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 00000010.00000002.531353991.0000000002C51000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000010.00000002.531353991.0000000002C51000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                      • Rule: MALWARE_Win_AgentTeslaV3, Description: AgentTeslaV3 infostealer payload, Source: 00000010.00000002.531353991.0000000002C51000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000010.00000000.424295986.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000010.00000000.424295986.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000010.00000002.529314857.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000010.00000002.529314857.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000010.00000000.423853193.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 00000010.00000000.423853193.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                      Antivirus matches:
                                                                      • Detection: 0%, Metadefender, Browse
                                                                      • Detection: 0%, ReversingLabs
                                                                      Reputation:high

                                                                      Reset < >

                                                                        Execution Graph

                                                                        Execution Coverage:8.7%
                                                                        Dynamic/Decrypted Code Coverage:100%
                                                                        Signature Coverage:0%
                                                                        Total number of Nodes:94
                                                                        Total number of Limit Nodes:8
                                                                        execution_graph 24572 10b6ba8 DuplicateHandle 24573 10b6c3e 24572->24573 24621 104d01c 24622 104d034 24621->24622 24623 104d08e 24622->24623 24628 10b5288 24622->24628 24632 10b35c4 24622->24632 24641 10b5277 24622->24641 24645 10b7b9f 24622->24645 24629 10b52ae 24628->24629 24630 10b35c4 2 API calls 24629->24630 24631 10b52cf 24630->24631 24631->24623 24633 10b35cf 24632->24633 24634 10b7c31 24633->24634 24636 10b7c21 24633->24636 24672 10b77c0 24634->24672 24654 10b7e80 24636->24654 24664 10b7d58 24636->24664 24668 10b7d48 24636->24668 24637 10b7c2f 24642 10b52ae 24641->24642 24643 10b35c4 2 API calls 24642->24643 24644 10b52cf 24643->24644 24644->24623 24646 10b7bb5 24645->24646 24647 10b7c31 24646->24647 24649 10b7c21 24646->24649 24648 10b77c0 2 API calls 24647->24648 24650 10b7c2f 24648->24650 24651 10b7d48 2 API calls 24649->24651 24652 10b7d58 2 API calls 24649->24652 24653 10b7e80 2 API calls 24649->24653 24651->24650 24652->24650 24653->24650 24655 10b7e8a 24654->24655 24663 10b7d66 24654->24663 24656 10b7f7c 24655->24656 24657 10b7ed2 24655->24657 24658 10b35c4 CallWindowProcW 24656->24658 24659 10b7f2a CallWindowProcW 24657->24659 24662 10b7ed9 24657->24662 24658->24662 24659->24662 24660 10b7e5b 24660->24637 24661 10b77c0 CallWindowProcW 24661->24663 24662->24637 24663->24660 24663->24661 24666 10b7d66 24664->24666 24665 10b77c0 2 API calls 24665->24666 24666->24665 24667 10b7e5b 24666->24667 24667->24637 24670 10b7d66 24668->24670 24669 10b77c0 2 API calls 24669->24670 24670->24669 24671 10b7e5b 24670->24671 24671->24637 24673 10b77cb 24672->24673 24674 10b7f7c 24673->24674 24675 10b7ed2 24673->24675 24676 10b35c4 CallWindowProcW 24674->24676 24677 10b7f2a CallWindowProcW 24675->24677 24678 10b7ed9 24675->24678 24676->24678 24677->24678 24678->24637 24574 10b6980 GetCurrentProcess 24575 10b69fa GetCurrentThread 24574->24575 24576 10b69f3 24574->24576 24577 10b6a30 24575->24577 24578 10b6a37 GetCurrentProcess 24575->24578 24576->24575 24577->24578 24581 10b6a6d 24578->24581 24579 10b6a95 GetCurrentThreadId 24580 10b6ac6 24579->24580 24581->24579 24582 10bb5c0 24583 10bb5d4 24582->24583 24586 10bb80a 24583->24586 24584 10bb5dd 24587 10bb813 24586->24587 24592 10bb9ec 24586->24592 24596 10bba06 24586->24596 24600 10bb8f0 24586->24600 24604 10bb8e1 24586->24604 24587->24584 24593 10bb99f 24592->24593 24593->24592 24594 10bba2b 24593->24594 24608 10bbce8 24593->24608 24597 10bba19 24596->24597 24598 10bba2b 24596->24598 24599 10bbce8 2 API calls 24597->24599 24599->24598 24601 10bb934 24600->24601 24602 10bba2b 24601->24602 24603 10bbce8 2 API calls 24601->24603 24603->24602 24605 10bb8f0 24604->24605 24606 10bba2b 24605->24606 24607 10bbce8 2 API calls 24605->24607 24607->24606 24609 10bbd06 24608->24609 24613 10bbd48 24609->24613 24617 10bbd37 24609->24617 24610 10bbd16 24610->24594 24614 10bbd82 24613->24614 24615 10bbdac RtlEncodePointer 24614->24615 24616 10bbdd5 24614->24616 24615->24616 24616->24610 24618 10bbd82 24617->24618 24619 10bbdac RtlEncodePointer 24618->24619 24620 10bbdd5 24618->24620 24619->24620 24620->24610 24679 10b50d0 24680 10b5138 CreateWindowExW 24679->24680 24682 10b51f4 24680->24682

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 158 5ee8cd8-5ee8cf3 160 5ee8cf9-5ee8d00 158->160 161 5ee8f25-5ee8f4d 158->161 162 5ee8d0c-5ee8d2b 160->162 163 5ee8d02-5ee8d0b 160->163 176 5ee8f54-5ee8f65 161->176 165 5ee8f18-5ee8f24 162->165 166 5ee8d31-5ee8d52 162->166 169 5ee8d5a-5ee8d88 166->169 170 5ee8d54-5ee8d58 166->170 173 5ee8d8d-5ee8e13 call 5ee7af8 169->173 170->169 171 5ee8d8a 170->171 171->173 233 5ee8e15 call 5ee8ccb 173->233 234 5ee8e15 call 5ee8cd8 173->234 235 5ee8e15 call 5ee8c70 173->235 180 5ee8fdf-5ee9059 176->180 181 5ee8f67-5ee8fde 176->181 193 5ee905e-5ee906c 180->193 181->180 191 5ee8e1b-5ee8e29 call 5ee8288 197 5ee8e2b-5ee8e2d 191->197 198 5ee8e88-5ee8e8c 191->198 195 5ee906e-5ee9074 193->195 196 5ee9075-5ee90c0 193->196 195->196 220 5ee90ca-5ee90ce 196->220 221 5ee90c2 196->221 201 5ee8e71-5ee8e80 197->201 202 5ee8e8e-5ee8e9b 198->202 203 5ee8ecf-5ee8ed6 198->203 201->198 204 5ee8e82 201->204 205 5ee8eaf-5ee8ec1 202->205 206 5ee8e9d-5ee8ea2 202->206 207 5ee8eea-5ee8eee 203->207 208 5ee8ed8-5ee8edf 203->208 212 5ee8e2f-5ee8e3b 204->212 213 5ee8e84-5ee8e86 204->213 209 5ee8f10-5ee8f15 205->209 222 5ee8ec3-5ee8ecd 205->222 206->205 214 5ee8ea4-5ee8ead 206->214 207->209 210 5ee8ef0-5ee8ef7 207->210 208->207 215 5ee8ee1 208->215 209->165 210->209 216 5ee8ef9-5ee8f0f 210->216 212->176 218 5ee8e41-5ee8e70 212->218 213->198 213->212 214->209 215->207 216->209 218->201 224 5ee90ea 220->224 225 5ee90d0-5ee90dc 220->225 221->220 222->209 230 5ee90eb 224->230 227 5ee90de-5ee90e1 225->227 228 5ee90e4 225->228 227->228 228->224 230->230 233->191 234->191 235->191
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000010.00000002.532947678.0000000005EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_16_2_5ee0000_RegAsm.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: <.l
                                                                        • API String ID: 0-3808708745
                                                                        • Opcode ID: 6b6fa42c2db3cafe8292f043d08ec2c41f66a9bdb7f811973ba02e01bd6531ff
                                                                        • Instruction ID: a4e867724d7f909cce63dd9560272aadb488c7eaa3ab30510c1f12db3b2d0a38
                                                                        • Opcode Fuzzy Hash: 6b6fa42c2db3cafe8292f043d08ec2c41f66a9bdb7f811973ba02e01bd6531ff
                                                                        • Instruction Fuzzy Hash: 5AD19F70E04219CFCB14DFA8C884AAEFBF2FF88314F148559E459AB351DB34A946CB90
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000010.00000002.530745544.00000000010B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010B0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_16_2_10b0000_RegAsm.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 5359b6aa7b248f2dbd4508ff81ddc8c5b44fde34960dcefe29b835ab9ef71290
                                                                        • Instruction ID: c500b3ea758031bfc81a62c7afe136842bc4e49c51f43032a10ffec316d0978b
                                                                        • Opcode Fuzzy Hash: 5359b6aa7b248f2dbd4508ff81ddc8c5b44fde34960dcefe29b835ab9ef71290
                                                                        • Instruction Fuzzy Hash: 3C12B4B4705756CAD330CF69E94A2853BA1F785328B51820CE2E91BAD9D7FF118ACF44
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000010.00000002.532947678.0000000005EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_16_2_5ee0000_RegAsm.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: d0bb57082000296f55f3cf74811e0713b18bf4e44fdad2c65ef3419f88d12908
                                                                        • Instruction ID: 53505a5984a75e049b438089a8886d3b565cfbad11af6d5d44c1c1a6c5249a8c
                                                                        • Opcode Fuzzy Hash: d0bb57082000296f55f3cf74811e0713b18bf4e44fdad2c65ef3419f88d12908
                                                                        • Instruction Fuzzy Hash: 42B18E70E142498FDF14CFA9D8857EEBBF2FF48318F149129E855A7294EB349845CB81
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000010.00000002.530745544.00000000010B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010B0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_16_2_10b0000_RegAsm.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 626101ac95d5a2c8a5badde27e2e11c12d4dcfb8d11b356feddcb0330a347079
                                                                        • Instruction ID: aeb4a92d7aad6dd729820a3d4143f858a45dba49b0129ca3c31e81956cb86b48
                                                                        • Opcode Fuzzy Hash: 626101ac95d5a2c8a5badde27e2e11c12d4dcfb8d11b356feddcb0330a347079
                                                                        • Instruction Fuzzy Hash: 38D120B5A04745CFD720CF69E84A2893BB1FB85314F11820DE1A96BAD9D7FE148ACF44
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000010.00000002.532947678.0000000005EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_16_2_5ee0000_RegAsm.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 03ce40f69b278fe85dc90b51f174ad8c326743cd155db82331a80c0630aa45a1
                                                                        • Instruction ID: 604fa46873dfc6687ede0dec867ba7b0bcc009edc0cefe829d67e3389a58bb45
                                                                        • Opcode Fuzzy Hash: 03ce40f69b278fe85dc90b51f174ad8c326743cd155db82331a80c0630aa45a1
                                                                        • Instruction Fuzzy Hash: 7991AD70E14209CFDF10CFA8D8857EEBBF2BF98318F149529E845A7294EB349845CB81
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000010.00000002.530745544.00000000010B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010B0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_16_2_10b0000_RegAsm.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 6fe23a7a9885273996c33661ce9b95083f3ab069a2d0446f137f3ae1f1439841
                                                                        • Instruction ID: 9541e4448304602e8d02cdbbe22c25b4187b8b3ef48bcc93c792b0a5a68043ad
                                                                        • Opcode Fuzzy Hash: 6fe23a7a9885273996c33661ce9b95083f3ab069a2d0446f137f3ae1f1439841
                                                                        • Instruction Fuzzy Hash: BAC11FB5A00755CFD720CF69E44A2893BB1FB85324F11820CE1A96BAD9D7FE148ACF44
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Control-flow Graph

                                                                        APIs
                                                                        • GetCurrentProcess.KERNEL32 ref: 010B69E0
                                                                        • GetCurrentThread.KERNEL32 ref: 010B6A1D
                                                                        • GetCurrentProcess.KERNEL32 ref: 010B6A5A
                                                                        • GetCurrentThreadId.KERNEL32 ref: 010B6AB3
                                                                        Memory Dump Source
                                                                        • Source File: 00000010.00000002.530745544.00000000010B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010B0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_16_2_10b0000_RegAsm.jbxd
                                                                        Similarity
                                                                        • API ID: Current$ProcessThread
                                                                        • String ID:
                                                                        • API String ID: 2063062207-0
                                                                        • Opcode ID: 83f1c2eb879b467cee10202c91f2eccfede9543a8035344f6fb0991ef94df62d
                                                                        • Instruction ID: 595ee2643750f9452d87dc9a102769f925cbfad86fc79d4a2b27be1a0182f9b1
                                                                        • Opcode Fuzzy Hash: 83f1c2eb879b467cee10202c91f2eccfede9543a8035344f6fb0991ef94df62d
                                                                        • Instruction Fuzzy Hash: 32519CB09083498FDB10CFA9D5887EEBFF1AF49308F14845AE489A7251CB795988CF65
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Control-flow Graph

                                                                        APIs
                                                                        • GetCurrentProcess.KERNEL32 ref: 010B69E0
                                                                        • GetCurrentThread.KERNEL32 ref: 010B6A1D
                                                                        • GetCurrentProcess.KERNEL32 ref: 010B6A5A
                                                                        • GetCurrentThreadId.KERNEL32 ref: 010B6AB3
                                                                        Memory Dump Source
                                                                        • Source File: 00000010.00000002.530745544.00000000010B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010B0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_16_2_10b0000_RegAsm.jbxd
                                                                        Similarity
                                                                        • API ID: Current$ProcessThread
                                                                        • String ID:
                                                                        • API String ID: 2063062207-0
                                                                        • Opcode ID: b3da0655d54c744767787c3cdd5d7acefd466e5ac8f4a00166debeece227a0b0
                                                                        • Instruction ID: 3e9d50a6da821738021ab795ba532495e1aae5ed3bdcb6eefea152167ffa35e6
                                                                        • Opcode Fuzzy Hash: b3da0655d54c744767787c3cdd5d7acefd466e5ac8f4a00166debeece227a0b0
                                                                        • Instruction Fuzzy Hash: 725187B09042098FDB14CFAAC5887EEBBF5EF49308F20805DE449A3350CB795984CF65
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 113 10b50c4-10b5136 114 10b5138-10b513e 113->114 115 10b5141-10b5148 113->115 114->115 116 10b514a-10b5150 115->116 117 10b5153-10b518b 115->117 116->117 118 10b5193-10b51f2 CreateWindowExW 117->118 119 10b51fb-10b5233 118->119 120 10b51f4-10b51fa 118->120 124 10b5240 119->124 125 10b5235-10b5238 119->125 120->119 126 10b5241 124->126 125->124 126->126
                                                                        APIs
                                                                        • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 010B51E2
                                                                        Memory Dump Source
                                                                        • Source File: 00000010.00000002.530745544.00000000010B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010B0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_16_2_10b0000_RegAsm.jbxd
                                                                        Similarity
                                                                        • API ID: CreateWindow
                                                                        • String ID:
                                                                        • API String ID: 716092398-0
                                                                        • Opcode ID: 0430fa5c4a8dff558a9aa64bf3114c2637e8e2d1670ba7be97dd22b423d29f46
                                                                        • Instruction ID: 3878315b12d15910b9b86f90a72b791aa0c4fb7f178d6a09261c18eb5bf8dc87
                                                                        • Opcode Fuzzy Hash: 0430fa5c4a8dff558a9aa64bf3114c2637e8e2d1670ba7be97dd22b423d29f46
                                                                        • Instruction Fuzzy Hash: D351E0B1D003499FDB14CF99C884ADDFFB1BF48310F24856AE819AB210D7749985CF90
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 127 10b50d0-10b5136 128 10b5138-10b513e 127->128 129 10b5141-10b5148 127->129 128->129 130 10b514a-10b5150 129->130 131 10b5153-10b51f2 CreateWindowExW 129->131 130->131 133 10b51fb-10b5233 131->133 134 10b51f4-10b51fa 131->134 138 10b5240 133->138 139 10b5235-10b5238 133->139 134->133 140 10b5241 138->140 139->138 140->140
                                                                        APIs
                                                                        • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 010B51E2
                                                                        Memory Dump Source
                                                                        • Source File: 00000010.00000002.530745544.00000000010B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010B0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_16_2_10b0000_RegAsm.jbxd
                                                                        Similarity
                                                                        • API ID: CreateWindow
                                                                        • String ID:
                                                                        • API String ID: 716092398-0
                                                                        • Opcode ID: e2d53a00743b67aa5c0d8b379691533ad45faaaaf83fcd890db76372a5adfb0e
                                                                        • Instruction ID: 67aaf54b8f2ac84291b4e38f7760c990e1e20ae050fe8a0fbb1c4db827b39f5e
                                                                        • Opcode Fuzzy Hash: e2d53a00743b67aa5c0d8b379691533ad45faaaaf83fcd890db76372a5adfb0e
                                                                        • Instruction Fuzzy Hash: 7241AEB1D003499FDB14CF99C884ADEFBB6BF49314F24856AE819AB210D774A985CF90
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 141 10b77c0-10b7ecc 144 10b7f7c-10b7f9c call 10b35c4 141->144 145 10b7ed2-10b7ed7 141->145 152 10b7f9f-10b7fac 144->152 147 10b7f2a-10b7f62 CallWindowProcW 145->147 148 10b7ed9-10b7f10 145->148 150 10b7f6b-10b7f7a 147->150 151 10b7f64-10b7f6a 147->151 154 10b7f19-10b7f28 148->154 155 10b7f12-10b7f18 148->155 150->152 151->150 154->152 155->154
                                                                        APIs
                                                                        • CallWindowProcW.USER32(?,?,?,?,?), ref: 010B7F51
                                                                        Memory Dump Source
                                                                        • Source File: 00000010.00000002.530745544.00000000010B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010B0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_16_2_10b0000_RegAsm.jbxd
                                                                        Similarity
                                                                        • API ID: CallProcWindow
                                                                        • String ID:
                                                                        • API String ID: 2714655100-0
                                                                        • Opcode ID: 4dc011760664bf5065570f3ca767435dc39cfcb47b71648392761c783c13bfa7
                                                                        • Instruction ID: 88e267909858e0dfc90b3f001408505faa594de81a5a94b498efe68aff4b6431
                                                                        • Opcode Fuzzy Hash: 4dc011760664bf5065570f3ca767435dc39cfcb47b71648392761c783c13bfa7
                                                                        • Instruction Fuzzy Hash: 6F4129B4A04206CFCB14CF99C488BAAFBF5FB88314F25C859E559A7361D774A845CFA0
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 241 10b6ba8-10b6c3c DuplicateHandle 242 10b6c3e-10b6c44 241->242 243 10b6c45-10b6c62 241->243 242->243
                                                                        APIs
                                                                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 010B6C2F
                                                                        Memory Dump Source
                                                                        • Source File: 00000010.00000002.530745544.00000000010B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010B0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_16_2_10b0000_RegAsm.jbxd
                                                                        Similarity
                                                                        • API ID: DuplicateHandle
                                                                        • String ID:
                                                                        • API String ID: 3793708945-0
                                                                        • Opcode ID: fea21aba7f732d9a9829c38f750b1af1af212946f5b76d58f66701c96332e7c1
                                                                        • Instruction ID: a0dfe3006f1a65dd0beaf4991b5e15f5b63a0ac41ebe16c184c01919c6ffec2c
                                                                        • Opcode Fuzzy Hash: fea21aba7f732d9a9829c38f750b1af1af212946f5b76d58f66701c96332e7c1
                                                                        • Instruction Fuzzy Hash: 7F21F5B5D002089FDB10CF99D984AEEFBF5FB48314F14841AE954A3310D774A954CFA1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 236 10b6ba0-10b6c3c DuplicateHandle 237 10b6c3e-10b6c44 236->237 238 10b6c45-10b6c62 236->238 237->238
                                                                        APIs
                                                                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 010B6C2F
                                                                        Memory Dump Source
                                                                        • Source File: 00000010.00000002.530745544.00000000010B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010B0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_16_2_10b0000_RegAsm.jbxd
                                                                        Similarity
                                                                        • API ID: DuplicateHandle
                                                                        • String ID:
                                                                        • API String ID: 3793708945-0
                                                                        • Opcode ID: 8100e16f7f1b79e8c55aeaa2e3d082d09c445b40f7d4acbd6b2dd820e530bb02
                                                                        • Instruction ID: b9a515699cfd4b5440d4c76a709ece9ed4b1de5d7424318bd3ef4b8c5fead6ec
                                                                        • Opcode Fuzzy Hash: 8100e16f7f1b79e8c55aeaa2e3d082d09c445b40f7d4acbd6b2dd820e530bb02
                                                                        • Instruction Fuzzy Hash: 8C2123B5D002089FDB00CFA9D584AEEFBF4FB48320F14841AE954A3350D738AA54CF60
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 246 10bbd37-10bbd8a 249 10bbd8c-10bbd8e 246->249 250 10bbd90 246->250 251 10bbd95-10bbda0 249->251 250->251 252 10bbda2-10bbdd3 RtlEncodePointer 251->252 253 10bbe01-10bbe0e 251->253 255 10bbddc-10bbdfc 252->255 256 10bbdd5-10bbddb 252->256 255->253 256->255
                                                                        APIs
                                                                        • RtlEncodePointer.NTDLL(00000000), ref: 010BBDC2
                                                                        Memory Dump Source
                                                                        • Source File: 00000010.00000002.530745544.00000000010B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010B0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_16_2_10b0000_RegAsm.jbxd
                                                                        Similarity
                                                                        • API ID: EncodePointer
                                                                        • String ID:
                                                                        • API String ID: 2118026453-0
                                                                        • Opcode ID: 5b2cf89cfe295e0fb38ea9cdb9e9adb8cf323232b10373132dbe67293a8f2fd9
                                                                        • Instruction ID: 06c3964fd090ea45f86a7c8d482c554286cfde88e9e44b95fe9ac00dbfb0a5fc
                                                                        • Opcode Fuzzy Hash: 5b2cf89cfe295e0fb38ea9cdb9e9adb8cf323232b10373132dbe67293a8f2fd9
                                                                        • Instruction Fuzzy Hash: 16219AB19003058FDB60EFA9D54A3EEBBF0FB04308F24846AD448A7641D7789549CFA1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 258 10bbd48-10bbd8a 261 10bbd8c-10bbd8e 258->261 262 10bbd90 258->262 263 10bbd95-10bbda0 261->263 262->263 264 10bbda2-10bbdd3 RtlEncodePointer 263->264 265 10bbe01-10bbe0e 263->265 267 10bbddc-10bbdfc 264->267 268 10bbdd5-10bbddb 264->268 267->265 268->267
                                                                        APIs
                                                                        • RtlEncodePointer.NTDLL(00000000), ref: 010BBDC2
                                                                        Memory Dump Source
                                                                        • Source File: 00000010.00000002.530745544.00000000010B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010B0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_16_2_10b0000_RegAsm.jbxd
                                                                        Similarity
                                                                        • API ID: EncodePointer
                                                                        • String ID:
                                                                        • API String ID: 2118026453-0
                                                                        • Opcode ID: 426939c272420b1490f54ade2c10e5df8e0b6e57712a15dfafae6b1b9e7967a3
                                                                        • Instruction ID: d7957cf8b2458d970efdee164d65140753295a1c789e0d2a37ff00ad2dc3b403
                                                                        • Opcode Fuzzy Hash: 426939c272420b1490f54ade2c10e5df8e0b6e57712a15dfafae6b1b9e7967a3
                                                                        • Instruction Fuzzy Hash: DD119DB09003058FDB60EF99D54A7EEBFF5FB04318F208429D445A7640DB79A945CFA1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 270 5ee8900-5ee8922 272 5ee8928-5ee8937 270->272 273 5ee8a61-5ee8aa2 270->273 274 5ee8939-5ee893e 272->274 275 5ee8940 272->275 288 5ee8aa9-5ee8abe 273->288 289 5ee8aa4-5ee8aa7 273->289 277 5ee8942-5ee8944 274->277 275->277 278 5ee8a3c-5ee8a60 277->278 279 5ee894a-5ee8979 277->279 327 5ee897c call 5ee8aa8 279->327 328 5ee897c call 5ee8a98 279->328 329 5ee897c call 5ee8900 279->329 330 5ee897c call 5ee88f0 279->330 290 5ee8b57-5ee8b60 288->290 291 5ee8ac4-5ee8b24 call 5ee19b0 call 5ee1a00 call 5ee19b0 * 4 288->291 289->288 323 5ee8b2e 291->323 324 5ee8b26-5ee8b2c 291->324 294 5ee8982-5ee898b 296 5ee89cf-5ee89dc 294->296 297 5ee898d-5ee89c0 294->297 299 5ee89de-5ee89e3 296->299 300 5ee89f0-5ee89f9 296->300 297->296 299->300 302 5ee89e5-5ee89ee 299->302 303 5ee89fb-5ee8a0d 300->303 304 5ee8a19-5ee8a3b 300->304 302->304 303->304 313 5ee8a0f-5ee8a12 303->313 313->304 325 5ee8b31-5ee8b48 323->325 324->325 331 5ee8b4b call 5ee6e8c 325->331 332 5ee8b4b call 5ee6e98 325->332 326 5ee8b4d-5ee8b4f 326->290 327->294 328->294 329->294 330->294 331->326 332->326
                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000010.00000002.532947678.0000000005EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_16_2_5ee0000_RegAsm.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: <.l
                                                                        • API String ID: 0-3808708745
                                                                        • Opcode ID: 551563783913bec7b1a1f36522092550318ca7d15f40c22562060840d7a896a4
                                                                        • Instruction ID: e6b5e017bbc7d7a4afab445f9cd451ae1be9a9f0d6bd8e14145303e10aebcb19
                                                                        • Opcode Fuzzy Hash: 551563783913bec7b1a1f36522092550318ca7d15f40c22562060840d7a896a4
                                                                        • Instruction Fuzzy Hash: 0971B171A14204CFCB14DBA4C844AADBBF2FF89314F1484A9D44AEB361DB36ED81CB90
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000010.00000002.532947678.0000000005EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_16_2_5ee0000_RegAsm.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: g
                                                                        • API String ID: 0-30677878
                                                                        • Opcode ID: 881244e10a405624e9df5bc58caf6849a5ccc78935a14a7f96f06f94100e46b3
                                                                        • Instruction ID: 1f4a8d5b60b02010de62f5d4ed04a99c9158087dfbdc838b45186d456c5dcba9
                                                                        • Opcode Fuzzy Hash: 881244e10a405624e9df5bc58caf6849a5ccc78935a14a7f96f06f94100e46b3
                                                                        • Instruction Fuzzy Hash: 67317B7262C2548BC7149FA8D8911EDBBF3BF89214B58523ED445EB347D7358C82C785
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000010.00000002.532947678.0000000005EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_16_2_5ee0000_RegAsm.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: <.l
                                                                        • API String ID: 0-3808708745
                                                                        • Opcode ID: b24eef03ec565e80872101c4e7176cfecca32df4dd58bc1b793dbad076cc909c
                                                                        • Instruction ID: 4407a06fdcdb02b9d75e758e069c6864d9d83814f9223bc23cc7577d608ff41f
                                                                        • Opcode Fuzzy Hash: b24eef03ec565e80872101c4e7176cfecca32df4dd58bc1b793dbad076cc909c
                                                                        • Instruction Fuzzy Hash: 47312830B142108FDF18EB68E845A7D7BA3EF85219B1551A9E446DF385CF34DD82C781
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000010.00000002.532947678.0000000005EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_16_2_5ee0000_RegAsm.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 40bdb7235bd9b602871b89f396678c857a0350c818f34c43dcd6038b3fe8747e
                                                                        • Instruction ID: 909166379d4ed47486814858d2100c040f8af3dbdf779dd140db4666a7104945
                                                                        • Opcode Fuzzy Hash: 40bdb7235bd9b602871b89f396678c857a0350c818f34c43dcd6038b3fe8747e
                                                                        • Instruction Fuzzy Hash: 9DB18C70E142498FDF10CFA8D8857DDBBF2FF48318F149129E895A7294EB349845CB81
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000010.00000002.532947678.0000000005EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_16_2_5ee0000_RegAsm.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: bebc97b1c41558d154d871eaee856c996b465ef690555dc9fe2bf35bd01f6e0d
                                                                        • Instruction ID: 8b12fae49671d0dcbdbb08d7b571c27e9a59d213d4a22db0d222d1dfeac113bb
                                                                        • Opcode Fuzzy Hash: bebc97b1c41558d154d871eaee856c996b465ef690555dc9fe2bf35bd01f6e0d
                                                                        • Instruction Fuzzy Hash: 0091AE70E14209CFDF10CFA8D8857DDBBF2BF98318F149529E885A7294EB349845CB91
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000010.00000002.532947678.0000000005EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_16_2_5ee0000_RegAsm.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: a8f7d47f87bd6c393297685fbb24e77681dfb91110f27cbf5d810357c5f9d615
                                                                        • Instruction ID: 1896ae2ed2519ba27f2401676b831e35f03f0a81eb72108850fb4974d1469430
                                                                        • Opcode Fuzzy Hash: a8f7d47f87bd6c393297685fbb24e77681dfb91110f27cbf5d810357c5f9d615
                                                                        • Instruction Fuzzy Hash: FB719870E142589FDB10CFA8D8847DEFBF2FF88318F149129E499A7294EB749845CB91
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000010.00000002.532947678.0000000005EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_16_2_5ee0000_RegAsm.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 8e31f126d8703afb6893b22db324e5de9b0a735146dbdfdcea3db3eebef9a7ab
                                                                        • Instruction ID: fa2004483656ec99db744faedcd1c06636a2789a27fd63db783c7c5468ebb195
                                                                        • Opcode Fuzzy Hash: 8e31f126d8703afb6893b22db324e5de9b0a735146dbdfdcea3db3eebef9a7ab
                                                                        • Instruction Fuzzy Hash: 94718670E142588FDB10CFA8D8847EEFBF2FF88348F149029E459A7294EB349845CB91
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000010.00000002.532947678.0000000005EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_16_2_5ee0000_RegAsm.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: c88e47c726c2f102b75c286e460c5cd15eeb8928c433378d8add08760fc29adc
                                                                        • Instruction ID: 6e0455446aecaca3059ae70976405038020a8955f0917dca784865d503cfe0fa
                                                                        • Opcode Fuzzy Hash: c88e47c726c2f102b75c286e460c5cd15eeb8928c433378d8add08760fc29adc
                                                                        • Instruction Fuzzy Hash: 87713970E14258DFDB10CFA5C884BEEBBB6FF48304F148129E459AB254DB749946CF90
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000010.00000002.532947678.0000000005EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_16_2_5ee0000_RegAsm.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 246666f9b2399d363d08ebbfd948adac38ea436bb4d0e07410df70d242c583aa
                                                                        • Instruction ID: 1160819b8011a3f586704ac3a18df601500d19b13dbc8b4c43391d3c9f9a27e8
                                                                        • Opcode Fuzzy Hash: 246666f9b2399d363d08ebbfd948adac38ea436bb4d0e07410df70d242c583aa
                                                                        • Instruction Fuzzy Hash: 32715870E14218DFDB10DFA9C884BEEBBB6FF48304F14812AE459AB254DB749946CF90
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000010.00000002.532947678.0000000005EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_16_2_5ee0000_RegAsm.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 75899fae412086e248ad396b251275d09f917d4e5143d088c6e0980885e1d9fc
                                                                        • Instruction ID: 59e4bfd2447177a622eab21d00cf552f553ea1957251dc2bf6af5d879e8c9ef7
                                                                        • Opcode Fuzzy Hash: 75899fae412086e248ad396b251275d09f917d4e5143d088c6e0980885e1d9fc
                                                                        • Instruction Fuzzy Hash: B8515E71E04209CFCB14DF98C884AAEB7B2FF88314F159555E495A7361D734E946CB90
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000010.00000002.532947678.0000000005EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_16_2_5ee0000_RegAsm.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 2b59a67d1d2952a4fa7fe840737d3102e973ba9b9cd099a3cebbb9e6fd7a110e
                                                                        • Instruction ID: 86b39c2f24d19945c2c2d239b39860e420a13bd7f88eb5d17ce27a10359c2fb3
                                                                        • Opcode Fuzzy Hash: 2b59a67d1d2952a4fa7fe840737d3102e973ba9b9cd099a3cebbb9e6fd7a110e
                                                                        • Instruction Fuzzy Hash: 68413471B08601CBC714EF78D9806AAB3E2AFC1208754D92CC58EDB655EF35ED46CB94
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000010.00000002.532947678.0000000005EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_16_2_5ee0000_RegAsm.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 8170c961458c5893b71014a2a8c803d186a224869f476ecaff0a2bbfca8c9d3d
                                                                        • Instruction ID: 45eb1ea8c252e55d43b2f368d83afb0a4f54faf7865b67948bfc56b8cdcd54dd
                                                                        • Opcode Fuzzy Hash: 8170c961458c5893b71014a2a8c803d186a224869f476ecaff0a2bbfca8c9d3d
                                                                        • Instruction Fuzzy Hash: B341B374F186248FCB19DF65D4546BEBFB3FF89615F10906AE886A3344DB348942CB90
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000010.00000002.532947678.0000000005EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_16_2_5ee0000_RegAsm.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: c6c6d59de5589f36867dc82ad1d389757b3f79fe9b01e400bb64ee10daf833c3
                                                                        • Instruction ID: 6d571f3c2e6229306194d92675504b0f910528e51a31cebdde37388a82397f6a
                                                                        • Opcode Fuzzy Hash: c6c6d59de5589f36867dc82ad1d389757b3f79fe9b01e400bb64ee10daf833c3
                                                                        • Instruction Fuzzy Hash: BA418074F246248FDB18DF66D4546BEBBF3FF88614F109069E88AA3344DB348942CB90
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000010.00000002.532947678.0000000005EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_16_2_5ee0000_RegAsm.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: b561dac9cefe8f8b6080409354558015c001447e985f1cde81bc0feb23837c2f
                                                                        • Instruction ID: ad161dc45c71cfc478b4225f9f2b4ed521fccc7e6b7dd4a0f7659c8e54cc7743
                                                                        • Opcode Fuzzy Hash: b561dac9cefe8f8b6080409354558015c001447e985f1cde81bc0feb23837c2f
                                                                        • Instruction Fuzzy Hash: 0731B232E182088FDB14DB64C5459EDBBB3FF88324F189459D489B7355DB32AD45CB90
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000010.00000002.532947678.0000000005EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_16_2_5ee0000_RegAsm.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: d861ff0ee60504a096fd37aae524670e8b67c3111fdbb38c348a25b9bb5df209
                                                                        • Instruction ID: b497af058f0151bf9a39014ee672057637b7660fda23e9caef0e5102bd1d3d17
                                                                        • Opcode Fuzzy Hash: d861ff0ee60504a096fd37aae524670e8b67c3111fdbb38c348a25b9bb5df209
                                                                        • Instruction Fuzzy Hash: FF314D31E10619DFDB14CBA8C444AADBBFAFB48314F1494A9D449EB354DB30AE85CB80
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000010.00000002.532947678.0000000005EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_16_2_5ee0000_RegAsm.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: aa5669434736080a75d6b54ebaaf03f6960aaabcccf4ce8b83a2634b2b261b3d
                                                                        • Instruction ID: da2e4ce33c35677480bad0919458eb3a35aa240245000a2f00ac6a5398b4c6c2
                                                                        • Opcode Fuzzy Hash: aa5669434736080a75d6b54ebaaf03f6960aaabcccf4ce8b83a2634b2b261b3d
                                                                        • Instruction Fuzzy Hash: A4318231A04705DFCB19DFA5C8809AEBBF2FF49210B14956DE19997761D732EC81CB50
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000010.00000002.530201995.0000000000F2D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F2D000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_16_2_f2d000_RegAsm.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 0137d0eb5c7482ba218616c49383416e23c6addca324387fa95f6611501a4dbd
                                                                        • Instruction ID: e639050202d225c3e943677feee581da3cb75d95f0950487a7026264ee29c7b3
                                                                        • Opcode Fuzzy Hash: 0137d0eb5c7482ba218616c49383416e23c6addca324387fa95f6611501a4dbd
                                                                        • Instruction Fuzzy Hash: 51213AB1904244DFDB04CF10E9C1B26BB65FB88328F38C569E9054B246C376D845E7A2
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000010.00000002.530201995.0000000000F2D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F2D000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_16_2_f2d000_RegAsm.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: f480d32008f448661418a3f03b3cfe031d2fec7d9440e9ecf6ce6664d7c880c6
                                                                        • Instruction ID: dfd75ca05517f57d4d146cb97a92b696e26e8ae734a0ff70c5e1d28f0ba90f43
                                                                        • Opcode Fuzzy Hash: f480d32008f448661418a3f03b3cfe031d2fec7d9440e9ecf6ce6664d7c880c6
                                                                        • Instruction Fuzzy Hash: 7C210AB1904244DFDB05EF10E9C0B26BB65FB94324F34C569E9094B246C336E856E7A2
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000010.00000002.532947678.0000000005EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_16_2_5ee0000_RegAsm.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 128dcfced527f3e700fda03890cfa77a0e4142c4003b6be71c4b1f26dd1ae27b
                                                                        • Instruction ID: c36eebea6f3c210cde43563dac0b3f87b2e33d379449b02bdbb3901636e51b5b
                                                                        • Opcode Fuzzy Hash: 128dcfced527f3e700fda03890cfa77a0e4142c4003b6be71c4b1f26dd1ae27b
                                                                        • Instruction Fuzzy Hash: A511E4307081105BC714B7A9989067FB2EFEFC5A047559939D14AEB344DF38DC0187E4
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000010.00000002.530525438.000000000104D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0104D000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_16_2_104d000_RegAsm.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: a852ca225b62d097546447f40933036c818e6a45bd22151940e45155bc450641
                                                                        • Instruction ID: c49bcf0059060104dfc4327cdf57199c2d4c762516a3eb1c60f7556e094b1ca9
                                                                        • Opcode Fuzzy Hash: a852ca225b62d097546447f40933036c818e6a45bd22151940e45155bc450641
                                                                        • Instruction Fuzzy Hash: A82103B0508244DFCB15CF94D8C0B26BBA1EB94358F20C9BDE9894B246C73AD846CB61
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000010.00000002.532947678.0000000005EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_16_2_5ee0000_RegAsm.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: fc4baccc0b865f835c0a92e5b5365d226cc2bdd2a09527a87a3048e12f20b846
                                                                        • Instruction ID: 29fd549590a2a0ac7495e12e12f915a28f6cc073d0b089ceeffd4b4582ca62af
                                                                        • Opcode Fuzzy Hash: fc4baccc0b865f835c0a92e5b5365d226cc2bdd2a09527a87a3048e12f20b846
                                                                        • Instruction Fuzzy Hash: 2A211B31A00205DFCB29DFA9C480DAEBBB2FF48254B10856DE55997760D732E891CB90
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000010.00000002.532947678.0000000005EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_16_2_5ee0000_RegAsm.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 72970bba7468bdb1d69955d9f12077cc9edd5f02f3a1544aa9b50833e22f53ef
                                                                        • Instruction ID: 4712e8aec9c2fde97fe7cb98195df9a7fe7214279125ebd382b14b475595f0ce
                                                                        • Opcode Fuzzy Hash: 72970bba7468bdb1d69955d9f12077cc9edd5f02f3a1544aa9b50833e22f53ef
                                                                        • Instruction Fuzzy Hash: 2B217F71A10601CFCB29DFA9C484AAEB7F2FF48305B14456DD19A97761D736E881CB80
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000010.00000002.532947678.0000000005EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_16_2_5ee0000_RegAsm.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 1faf6b5712fbba94ac350e19303c44ab242d3b38dfd81e74da3827224e55c130
                                                                        • Instruction ID: 1e3fbdaac4e1de5f9ae2f1f6b41d3ecbadf5ffc396ccc26fcc0ee9b8f06e17fe
                                                                        • Opcode Fuzzy Hash: 1faf6b5712fbba94ac350e19303c44ab242d3b38dfd81e74da3827224e55c130
                                                                        • Instruction Fuzzy Hash: 7821C071E206199FDB10CF68C844BADB7FAFF48308F048169E449E7254EB30E944CB80
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000010.00000002.532947678.0000000005EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_16_2_5ee0000_RegAsm.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 81dcca1f81d287a56e6ab99d10d08216e24d3d7c1cbca59009edd58018e867a0
                                                                        • Instruction ID: 7e10c637b8d9e7367aa52ef7001908528940025dba311bbf3ed23a334649905b
                                                                        • Opcode Fuzzy Hash: 81dcca1f81d287a56e6ab99d10d08216e24d3d7c1cbca59009edd58018e867a0
                                                                        • Instruction Fuzzy Hash: 99212970A00605CFCB28DFA9C4849AEB7F2FF48255B10856DD15A97761DB32E881CB90
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000010.00000002.530525438.000000000104D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0104D000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_16_2_104d000_RegAsm.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 2cbcb40b37226c15e1c81bc35528cfc5dedeead2f8a5d7b77c44d0139a21fba7
                                                                        • Instruction ID: 6adf848befe4801779317cfb39a065ff4c81a94881a065b84c3b50c235a14269
                                                                        • Opcode Fuzzy Hash: 2cbcb40b37226c15e1c81bc35528cfc5dedeead2f8a5d7b77c44d0139a21fba7
                                                                        • Instruction Fuzzy Hash: 862183B55083849FCB02CF54D9D4711BFB1EB46214F24C5EAD8858B257C33AD806CB62
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000010.00000002.532947678.0000000005EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_16_2_5ee0000_RegAsm.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: e01e7f559d5950a4ad4f322113c5cfbaf8bdd26f83ee48d73db91b652e9d6df0
                                                                        • Instruction ID: e261beb3bb7618c1bef6053871f57ee5899d17b4ca9a34e19b64cfcb2e20c81f
                                                                        • Opcode Fuzzy Hash: e01e7f559d5950a4ad4f322113c5cfbaf8bdd26f83ee48d73db91b652e9d6df0
                                                                        • Instruction Fuzzy Hash: 0F11E630A1414A8BEF10EF69E8407BEBBB6FB4630CF004625D441E7280DB789644CBD1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000010.00000002.530201995.0000000000F2D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F2D000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_16_2_f2d000_RegAsm.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: d848937c21700c4f5a00deb31842a9de4270da1d72eb15fc58e393853b037092
                                                                        • Instruction ID: a437ffa3da0fdc8751539796ae84b91a813757b89f8c1266da250d4382f137f8
                                                                        • Opcode Fuzzy Hash: d848937c21700c4f5a00deb31842a9de4270da1d72eb15fc58e393853b037092
                                                                        • Instruction Fuzzy Hash: 9111E676904284DFCF15CF10D5C4B16BF71FB94328F28C6A9D8094B25AC33AD85ADBA2
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000010.00000002.530201995.0000000000F2D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F2D000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_16_2_f2d000_RegAsm.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: d848937c21700c4f5a00deb31842a9de4270da1d72eb15fc58e393853b037092
                                                                        • Instruction ID: f5226979cc1598d9c012d7dd4bb4ba28df5d33a55339f8b84bb79aa132781364
                                                                        • Opcode Fuzzy Hash: d848937c21700c4f5a00deb31842a9de4270da1d72eb15fc58e393853b037092
                                                                        • Instruction Fuzzy Hash: E111E676904284DFCF05DF10D5C4B56BF72FB94324F24C6A9D8480B656C33AE85ADBA1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000010.00000002.532947678.0000000005EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_16_2_5ee0000_RegAsm.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: a8496b1050183361910d866bb31384cfa1e39f17a702e3cb960418c720935cfe
                                                                        • Instruction ID: 3e44e15580057a31f48068a52d91c6278fef2ba5806dbff4d8e4243e0c2056f3
                                                                        • Opcode Fuzzy Hash: a8496b1050183361910d866bb31384cfa1e39f17a702e3cb960418c720935cfe
                                                                        • Instruction Fuzzy Hash: C711DC75A14258CFD714DFA6C045BEEBBF2EF88318F148069C441AB3A0DB309845CB95
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000010.00000002.532947678.0000000005EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_16_2_5ee0000_RegAsm.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 886ed263799bf3e2d34f45dbc06c55f08e3a92a8b5b33659433ecf8317582ac8
                                                                        • Instruction ID: ec54f28589a33d090f7525606ba263fa4d274cdde95ca0bc734af688713a3ccb
                                                                        • Opcode Fuzzy Hash: 886ed263799bf3e2d34f45dbc06c55f08e3a92a8b5b33659433ecf8317582ac8
                                                                        • Instruction Fuzzy Hash: 4B110831B142009FEB18DB69EC49B797BA7AB82214F1641A9E459CB382DF25DD82C781
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000010.00000002.532947678.0000000005EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_16_2_5ee0000_RegAsm.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 3c58e17565812e4e3b30248fd28a5935d4521022f899a182e270511ff02ba0f1
                                                                        • Instruction ID: 98a84c350510126b3449ce2ab2e56d6417d8a0b3f708e266ac71352e42eab02b
                                                                        • Opcode Fuzzy Hash: 3c58e17565812e4e3b30248fd28a5935d4521022f899a182e270511ff02ba0f1
                                                                        • Instruction Fuzzy Hash: AD01803031C2018BD718EF65DA9186B77A6EF81218301E979DA9BCB261DF31AD428760
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000010.00000002.532947678.0000000005EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_16_2_5ee0000_RegAsm.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 7f233e313c783a89ed3377b8732be6580e6ff88d15af15356454c2b67b3337f8
                                                                        • Instruction ID: 0bf2084576b39ce0838940d55b06d5be3f8db816d84f9e48b9a6ddc417d06127
                                                                        • Opcode Fuzzy Hash: 7f233e313c783a89ed3377b8732be6580e6ff88d15af15356454c2b67b3337f8
                                                                        • Instruction Fuzzy Hash: 3D11C470A282878BEF14EFB9D8047BE7AB6FB4721CF004A19D451A62D5DB7485448B91
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000010.00000002.532947678.0000000005EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_16_2_5ee0000_RegAsm.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: b7945bf3eba2668a750de0605c94cdf9b327e4368b15484869633857ff47273a
                                                                        • Instruction ID: efa1a099b15f33f7443501d31675bfe0d56834e5d409fd1e9271471db40306c0
                                                                        • Opcode Fuzzy Hash: b7945bf3eba2668a750de0605c94cdf9b327e4368b15484869633857ff47273a
                                                                        • Instruction Fuzzy Hash: 5C01D63511C3409FC715DF26CA40CAA7B72FF81225305A5BADACACB276EB319D45C761
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000010.00000002.532947678.0000000005EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_16_2_5ee0000_RegAsm.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 0d2ed1f930a1d3a68a586bbc50972051163d8afb392a0b4b2e52f29644cd7a03
                                                                        • Instruction ID: 7d5ac869f49fd96b9c6e357f21bf84acf311f10498a209529a3f4ef9b17cce9d
                                                                        • Opcode Fuzzy Hash: 0d2ed1f930a1d3a68a586bbc50972051163d8afb392a0b4b2e52f29644cd7a03
                                                                        • Instruction Fuzzy Hash: 33E0C236720A204B96246A69A4096AE77EBDB88521300422ABC4EC3381CE389D0283E0
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Strings
                                                                        Memory Dump Source
                                                                        • Source File: 00000010.00000002.530745544.00000000010B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010B0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_16_2_10b0000_RegAsm.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID: D0.l
                                                                        • API String ID: 0-1583010233
                                                                        • Opcode ID: edef40f81ddc18a0dde03403e0ac82f38c95f9ca1d56638fde17c8c9ad021389
                                                                        • Instruction ID: 04f7035887c8814990a2bb579b324163b5c066824568441e6a3485075aef2f6e
                                                                        • Opcode Fuzzy Hash: edef40f81ddc18a0dde03403e0ac82f38c95f9ca1d56638fde17c8c9ad021389
                                                                        • Instruction Fuzzy Hash: 92818234B042148BDB18DFB594542BEBAA3BFC9704F05896EE547E7388DF3998058B91
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000010.00000002.532947678.0000000005EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_16_2_5ee0000_RegAsm.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: c4deac260481266d52079a4800fb3eb9d8c14e67a8cf888aac6b212f2012950b
                                                                        • Instruction ID: 1890c275e7f08142494018bb179bb600251d6a345a2c434659651087c5127257
                                                                        • Opcode Fuzzy Hash: c4deac260481266d52079a4800fb3eb9d8c14e67a8cf888aac6b212f2012950b
                                                                        • Instruction Fuzzy Hash: F7E21B74A18218CFDB15EF60C990BEDB7B2FF88304F1199A5C64AAB654DB315E85CF40
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000010.00000002.529600169.0000000000952000.00000002.00000001.01000000.0000000A.sdmp, Offset: 00950000, based on PE: true
                                                                        • Associated: 00000010.00000002.529568393.0000000000950000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                        • Associated: 00000010.00000002.529704091.000000000095E000.00000002.00000001.01000000.0000000A.sdmpDownload File
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_16_2_950000_RegAsm.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 5ec8d6aa764601db8594d99451073de23fe2117d192bb0691357646dd4af4239
                                                                        • Instruction ID: bd1474affde89b524f8e797c54e9253e90b8f79627bd721bd75909f2dda6da33
                                                                        • Opcode Fuzzy Hash: 5ec8d6aa764601db8594d99451073de23fe2117d192bb0691357646dd4af4239
                                                                        • Instruction Fuzzy Hash: CE22456140F7D28FC7538B789CB1691BFB1AE5321471E49CBC8C0CF0A3D2195A9ADB62
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000010.00000002.532947678.0000000005EE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 05EE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_16_2_5ee0000_RegAsm.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: edb16c585a14d047c59c6f849b6c6ba7d2757fcdda1df9d87c5047fba9b92dbb
                                                                        • Instruction ID: 055f9712fef653b4b47f2dc4b2f1f57c0e8265a91f7a5577d093d262984ec557
                                                                        • Opcode Fuzzy Hash: edb16c585a14d047c59c6f849b6c6ba7d2757fcdda1df9d87c5047fba9b92dbb
                                                                        • Instruction Fuzzy Hash: B3B16170E14209CFDF10CFA9D8857EEBBF2BF98708F149129D859AB254EB749845CB81
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%