Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
b2.exe

Overview

General Information

Sample Name:b2.exe
Analysis ID:626045
MD5:b23f3235c02c47b25ea90d9830aa37c7
SHA1:8dbaf4ec74cc2710582157100afe98ff9158d994
SHA256:46b7d84280339d0b887a8e225d0649e1fcf86302bd553c33716b9c42d3894cc7
Tags:AgentTeslaexe
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Malicious sample detected (through community Yara rule)
Yara detected Telegram RAT
Yara detected AgentTesla
Antivirus / Scanner detection for submitted sample
Machine Learning detection for sample
Injects a PE file into a foreign processes
Yara detected Generic Downloader
.NET source code contains very large array initializations
Tries to detect virtualization through RDTSC time measurements
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Detected potential crypto function
Found potential string decryption / allocating functions
Contains functionality to launch a process as a different user
Yara detected Credential Stealer
Contains long sleeps (>= 3 min)
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Sample file is different than original file name gathered from version info
Drops PE files
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • b2.exe (PID: 4852 cmdline: "C:\Users\user\Desktop\b2.exe" MD5: B23F3235C02C47B25EA90D9830AA37C7)
    • b2.exe (PID: 7148 cmdline: C:\Users\user\Desktop\b2.exe MD5: B23F3235C02C47B25EA90D9830AA37C7)
  • cleanup
{"C2 url": "https://api.telegram.org/bot1324911145:AAEQBcai78GJtNdHHMwAX0xQhP0p7EcyOuo/sendMessage"}
{"Exfil Mode": "Telegram", "Chat id": "1329186530", "Chat URL": "https://api.telegram.org/bot1324911145:AAEQBcai78GJtNdHHMwAX0xQhP0p7EcyOuo/sendDocument"}
SourceRuleDescriptionAuthorStrings
0000000C.00000000.522653847.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    0000000C.00000000.522653847.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
      0000000C.00000002.613014718.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        0000000C.00000002.613014718.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
          0000000C.00000000.523738264.0000000000402000.00000040.00000400.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 13 entries
            SourceRuleDescriptionAuthorStrings
            12.0.b2.exe.400000.8.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
              12.0.b2.exe.400000.8.unpackJoeSecurity_AgentTesla_2Yara detected AgentTeslaJoe Security
                12.0.b2.exe.400000.8.unpackJoeSecurity_GenericDownloader_1Yara detected Generic DownloaderJoe Security
                  12.0.b2.exe.400000.8.unpackMALWARE_Win_AgentTeslaV3AgentTeslaV3 infostealer payloadditekSHen
                  • 0x30d39:$s1: get_kbok
                  • 0x3166d:$s2: get_CHoo
                  • 0x322c8:$s3: set_passwordIsSet
                  • 0x30b3d:$s4: get_enableLog
                  • 0x35272:$s8: torbrowser
                  • 0x33c4e:$s10: logins
                  • 0x33527:$s11: credential
                  • 0x2ff23:$g1: get_Clipboard
                  • 0x2ff31:$g2: get_Keyboard
                  • 0x2ff3e:$g3: get_Password
                  • 0x3151b:$g4: get_CtrlKeyDown
                  • 0x3152b:$g5: get_ShiftKeyDown
                  • 0x3153c:$g6: get_AltKeyDown
                  12.0.b2.exe.400000.6.unpackJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
                    Click to see the 19 entries
                    No Sigma rule has matched
                    No Snort rule has matched

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: 12.0.b2.exe.400000.4.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "Telegram", "Chat id": "1329186530", "Chat URL": "https://api.telegram.org/bot1324911145:AAEQBcai78GJtNdHHMwAX0xQhP0p7EcyOuo/sendDocument"}
                    Source: b2.exe.7148.12.memstrminMalware Configuration Extractor: Telegram RAT {"C2 url": "https://api.telegram.org/bot1324911145:AAEQBcai78GJtNdHHMwAX0xQhP0p7EcyOuo/sendMessage"}
                    Source: b2.exeVirustotal: Detection: 64%Perma Link
                    Source: b2.exeReversingLabs: Detection: 75%
                    Source: b2.exeAvira: detected
                    Source: b2.exeJoe Sandbox ML: detected
                    Source: 12.0.b2.exe.400000.4.unpackAvira: Label: TR/Spy.Gen8
                    Source: 12.0.b2.exe.400000.12.unpackAvira: Label: TR/Spy.Gen8
                    Source: 12.0.b2.exe.400000.6.unpackAvira: Label: TR/Spy.Gen8
                    Source: 12.0.b2.exe.400000.8.unpackAvira: Label: TR/Spy.Gen8
                    Source: 12.0.b2.exe.400000.10.unpackAvira: Label: TR/Spy.Gen8
                    Source: 12.2.b2.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
                    Source: b2.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                    Source: b2.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
                    Source: Binary string: C:\Dropbox\Dev\ag.v66\Libraries\MSILJitter\bin\RELEASE\win32\AgileDotNetRT.pdb source: f.dll.0.dr

                    Networking

                    barindex
                    Source: Yara matchFile source: 12.0.b2.exe.400000.8.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 12.0.b2.exe.400000.6.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 12.0.b2.exe.400000.12.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 12.0.b2.exe.400000.10.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 12.2.b2.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 12.0.b2.exe.400000.4.unpack, type: UNPACKEDPE
                    Source: b2.exe, 0000000C.00000002.615030457.00000000034D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://127.0.0.1:HTTP/1.1
                    Source: b2.exe, 0000000C.00000002.615030457.00000000034D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://DynDns.comDynDNS
                    Source: f.dll.0.drString found in binary or memory: http://crl.thawte.com/ThawteTimestampingCA.crl0
                    Source: f.dll.0.drString found in binary or memory: http://ocsp.thawte.com0
                    Source: f.dll.0.drString found in binary or memory: http://s1.symcb.com/pca3-g5.crl0
                    Source: f.dll.0.drString found in binary or memory: http://s2.symcb.com0
                    Source: f.dll.0.drString found in binary or memory: http://sv.symcb.com/sv.crl0a
                    Source: f.dll.0.drString found in binary or memory: http://sv.symcb.com/sv.crt0
                    Source: f.dll.0.drString found in binary or memory: http://sv.symcd.com0&
                    Source: f.dll.0.drString found in binary or memory: http://ts-aia.ws.symantec.com/tss-ca-g2.cer0
                    Source: f.dll.0.drString found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
                    Source: f.dll.0.drString found in binary or memory: http://ts-ocsp.ws.symantec.com07
                    Source: f.dll.0.drString found in binary or memory: http://www.symauth.com/cps0(
                    Source: f.dll.0.drString found in binary or memory: http://www.symauth.com/rpa00
                    Source: b2.exe, 0000000C.00000002.615030457.00000000034D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://xqtbof.com
                    Source: b2.exe, 0000000C.00000002.615030457.00000000034D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.orgGETMozilla/5.0
                    Source: b2.exe, 00000000.00000003.516030971.000000000637B000.00000004.00000800.00020000.00000000.sdmp, b2.exe, 00000000.00000003.515670250.0000000006376000.00000004.00000800.00020000.00000000.sdmp, b2.exe, 00000000.00000003.516280598.000000000637B000.00000004.00000800.00020000.00000000.sdmp, b2.exe, 00000000.00000003.514691789.000000000636D000.00000004.00000800.00020000.00000000.sdmp, b2.exe, 00000000.00000003.520969631.0000000006A1C000.00000004.00000800.00020000.00000000.sdmp, b2.exe, 00000000.00000003.516074359.0000000006A14000.00000004.00000800.00020000.00000000.sdmp, b2.exe, 00000000.00000003.519825219.0000000006A1A000.00000004.00000800.00020000.00000000.sdmp, b2.exe, 00000000.00000003.515451731.0000000006376000.00000004.00000800.00020000.00000000.sdmp, b2.exe, 00000000.00000003.518667846.000000000637B000.00000004.00000800.00020000.00000000.sdmp, b2.exe, 00000000.00000003.519966505.0000000006A1C000.00000004.00000800.00020000.00000000.sdmp, b2.exe, 0000000C.00000000.522653847.0000000000402000.00000040.00000400.00020000.00000000.sdmp, b2.exe, 0000000C.00000000.522219203.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot1324911145:AAEQBcai78GJtNdHHMwAX0xQhP0p7EcyOuo/
                    Source: b2.exe, 0000000C.00000002.615030457.00000000034D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot1324911145:AAEQBcai78GJtNdHHMwAX0xQhP0p7EcyOuo/sendDocumentdocument-----
                    Source: f.dll.0.drString found in binary or memory: https://d.symcb.com/cps0%
                    Source: f.dll.0.drString found in binary or memory: https://d.symcb.com/rpa0
                    Source: b2.exe, 00000000.00000003.516030971.000000000637B000.00000004.00000800.00020000.00000000.sdmp, b2.exe, 00000000.00000003.515670250.0000000006376000.00000004.00000800.00020000.00000000.sdmp, b2.exe, 00000000.00000003.516280598.000000000637B000.00000004.00000800.00020000.00000000.sdmp, b2.exe, 00000000.00000003.514691789.000000000636D000.00000004.00000800.00020000.00000000.sdmp, b2.exe, 00000000.00000003.520969631.0000000006A1C000.00000004.00000800.00020000.00000000.sdmp, b2.exe, 00000000.00000003.516074359.0000000006A14000.00000004.00000800.00020000.00000000.sdmp, b2.exe, 00000000.00000003.519825219.0000000006A1A000.00000004.00000800.00020000.00000000.sdmp, b2.exe, 00000000.00000003.515451731.0000000006376000.00000004.00000800.00020000.00000000.sdmp, b2.exe, 00000000.00000003.518667846.000000000637B000.00000004.00000800.00020000.00000000.sdmp, b2.exe, 00000000.00000003.519966505.0000000006A1C000.00000004.00000800.00020000.00000000.sdmp, b2.exe, 0000000C.00000000.522653847.0000000000402000.00000040.00000400.00020000.00000000.sdmp, b2.exe, 0000000C.00000000.522219203.0000000000402000.00000040.00000400.00020000.00000000.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip
                    Source: b2.exe, 0000000C.00000002.615030457.00000000034D1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha
                    Source: b2.exe, 00000000.00000002.533971800.0000000000C09000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

                    System Summary

                    barindex
                    Source: 12.0.b2.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 12.0.b2.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 12.0.b2.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 12.0.b2.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 12.2.b2.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 12.0.b2.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: 0000000C.00000002.615030457.00000000034D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: Process Memory Space: b2.exe PID: 7148, type: MEMORYSTRMatched rule: AgentTeslaV3 infostealer payload Author: ditekSHen
                    Source: b2.exe, u0034cu003azu00400u002d6mwu00212u007c3siu003e87ru005bgu002c15ou0029bu003b/u0032su003eau007d68nu0029u002d7zxu00231.csLarge array initialization: 3f%s:74w(?2a0t[;6bn~1<5d9: array initializer size 151552
                    Source: 0.0.b2.exe.4c0000.0.unpack, u0034cu003azu00400u002d6mwu00212u007c3siu003e87ru005bgu002c15ou0029bu003b/u0032su003eau007d68nu0029u002d7zxu00231.csLarge array initialization: 3f%s:74w(?2a0t[;6bn~1<5d9: array initializer size 151552
                    Source: 0.2.b2.exe.4c0000.0.unpack, u0034cu003azu00400u002d6mwu00212u007c3siu003e87ru005bgu002c15ou0029bu003b/u0032su003eau007d68nu0029u002d7zxu00231.csLarge array initialization: 3f%s:74w(?2a0t[;6bn~1<5d9: array initializer size 151552
                    Source: 12.0.b2.exe.e00000.9.unpack, u0034cu003azu00400u002d6mwu00212u007c3siu003e87ru005bgu002c15ou0029bu003b/u0032su003eau007d68nu0029u002d7zxu00231.csLarge array initialization: 3f%s:74w(?2a0t[;6bn~1<5d9: array initializer size 151552
                    Source: 12.0.b2.exe.400000.4.unpack, u003cPrivateImplementationDetailsu003eu007bFEC5A5F0u002d0C6Eu002d486Fu002d9208u002d7549C4E59E3Cu007d/u00332F6BFD2u002d9E8Bu002d4D29u002d8410u002dA27354B95FB9.csLarge array initialization: .cctor: array initializer size 12014
                    Source: 12.2.b2.exe.e00000.1.unpack, u0034cu003azu00400u002d6mwu00212u007c3siu003e87ru005bgu002c15ou0029bu003b/u0032su003eau007d68nu0029u002d7zxu00231.csLarge array initialization: 3f%s:74w(?2a0t[;6bn~1<5d9: array initializer size 151552
                    Source: 12.0.b2.exe.e00000.5.unpack, u0034cu003azu00400u002d6mwu00212u007c3siu003e87ru005bgu002c15ou0029bu003b/u0032su003eau007d68nu0029u002d7zxu00231.csLarge array initialization: 3f%s:74w(?2a0t[;6bn~1<5d9: array initializer size 151552
                    Source: 12.0.b2.exe.e00000.0.unpack, u0034cu003azu00400u002d6mwu00212u007c3siu003e87ru005bgu002c15ou0029bu003b/u0032su003eau007d68nu0029u002d7zxu00231.csLarge array initialization: 3f%s:74w(?2a0t[;6bn~1<5d9: array initializer size 151552
                    Source: 12.0.b2.exe.e00000.3.unpack, u0034cu003azu00400u002d6mwu00212u007c3siu003e87ru005bgu002c15ou0029bu003b/u0032su003eau007d68nu0029u002d7zxu00231.csLarge array initialization: 3f%s:74w(?2a0t[;6bn~1<5d9: array initializer size 151552
                    Source: 12.0.b2.exe.e00000.13.unpack, u0034cu003azu00400u002d6mwu00212u007c3siu003e87ru005bgu002c15ou0029bu003b/u0032su003eau007d68nu0029u002d7zxu00231.csLarge array initialization: 3f%s:74w(?2a0t[;6bn~1<5d9: array initializer size 151552
                    Source: 12.0.b2.exe.e00000.1.unpack, u0034cu003azu00400u002d6mwu00212u007c3siu003e87ru005bgu002c15ou0029bu003b/u0032su003eau007d68nu0029u002d7zxu00231.csLarge array initialization: 3f%s:74w(?2a0t[;6bn~1<5d9: array initializer size 151552
                    Source: 12.0.b2.exe.400000.12.unpack, u003cPrivateImplementationDetailsu003eu007bFEC5A5F0u002d0C6Eu002d486Fu002d9208u002d7549C4E59E3Cu007d/u00332F6BFD2u002d9E8Bu002d4D29u002d8410u002dA27354B95FB9.csLarge array initialization: .cctor: array initializer size 12014
                    Source: 12.0.b2.exe.400000.6.unpack, u003cPrivateImplementationDetailsu003eu007bFEC5A5F0u002d0C6Eu002d486Fu002d9208u002d7549C4E59E3Cu007d/u00332F6BFD2u002d9E8Bu002d4D29u002d8410u002dA27354B95FB9.csLarge array initialization: .cctor: array initializer size 12014
                    Source: 12.0.b2.exe.e00000.7.unpack, u0034cu003azu00400u002d6mwu00212u007c3siu003e87ru005bgu002c15ou0029bu003b/u0032su003eau007d68nu0029u002d7zxu00231.csLarge array initialization: 3f%s:74w(?2a0t[;6bn~1<5d9: array initializer size 151552
                    Source: 12.0.b2.exe.400000.8.unpack, u003cPrivateImplementationDetailsu003eu007bFEC5A5F0u002d0C6Eu002d486Fu002d9208u002d7549C4E59E3Cu007d/u00332F6BFD2u002d9E8Bu002d4D29u002d8410u002dA27354B95FB9.csLarge array initialization: .cctor: array initializer size 12014
                    Source: b2.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
                    Source: 12.0.b2.exe.400000.8.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 12.0.b2.exe.400000.6.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 12.0.b2.exe.400000.12.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 12.0.b2.exe.400000.10.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 12.2.b2.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 12.0.b2.exe.400000.4.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: 0000000C.00000002.615030457.00000000034D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORYMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: Process Memory Space: b2.exe PID: 7148, type: MEMORYSTRMatched rule: MALWARE_Win_AgentTeslaV3 author = ditekSHen, description = AgentTeslaV3 infostealer payload
                    Source: C:\Users\user\Desktop\b2.exeCode function: 0_2_00BEE3F80_2_00BEE3F8
                    Source: C:\Users\user\Desktop\b2.exeCode function: 0_2_00BEE3E90_2_00BEE3E9
                    Source: C:\Users\user\Desktop\b2.exeCode function: 0_2_00BE9BB00_2_00BE9BB0
                    Source: C:\Users\user\Desktop\b2.exeCode function: 0_2_00BE9BC00_2_00BE9BC0
                    Source: C:\Users\user\Desktop\b2.exeCode function: 12_2_0160480012_2_01604800
                    Source: C:\Users\user\Desktop\b2.exeCode function: 12_2_01603EB812_2_01603EB8
                    Source: C:\Users\user\Desktop\b2.exeCode function: 12_2_016081C012_2_016081C0
                    Source: C:\Users\user\Desktop\b2.exeCode function: 12_2_0160471012_2_01604710
                    Source: C:\Users\user\Desktop\b2.exeCode function: String function: 00BE2970 appears 61 times
                    Source: C:\Users\user\Desktop\b2.exeCode function: 0_2_00BED438 CreateProcessAsUserW,0_2_00BED438
                    Source: b2.exeBinary or memory string: OriginalFilename vs b2.exe
                    Source: b2.exe, 00000000.00000002.533971800.0000000000C09000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs b2.exe
                    Source: b2.exe, 00000000.00000000.344905302.00000000004D8000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilename009273620200110_pdf.exe< vs b2.exe
                    Source: b2.exeBinary or memory string: OriginalFilename vs b2.exe
                    Source: b2.exe, 0000000C.00000000.513142471.0000000000E18000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilename009273620200110_pdf.exe< vs b2.exe
                    Source: b2.exe, 0000000C.00000000.522653847.0000000000402000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilenameHITvAreWBkWWDoLFBJGDIdpxGN.exe4 vs b2.exe
                    Source: b2.exeBinary or memory string: OriginalFilename009273620200110_pdf.exe< vs b2.exe
                    Source: b2.exeVirustotal: Detection: 64%
                    Source: b2.exeReversingLabs: Detection: 75%
                    Source: b2.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                    Source: C:\Users\user\Desktop\b2.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: unknownProcess created: C:\Users\user\Desktop\b2.exe "C:\Users\user\Desktop\b2.exe"
                    Source: C:\Users\user\Desktop\b2.exeProcess created: C:\Users\user\Desktop\b2.exe C:\Users\user\Desktop\b2.exe
                    Source: C:\Users\user\Desktop\b2.exeProcess created: C:\Users\user\Desktop\b2.exe C:\Users\user\Desktop\b2.exeJump to behavior
                    Source: C:\Users\user\Desktop\b2.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{172BDDF8-CEEA-11D1-8B05-00600806D9B6}\InProcServer32Jump to behavior
                    Source: C:\Users\user\Desktop\b2.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\Desktop\b2.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\b2.exe.logJump to behavior
                    Source: C:\Users\user\Desktop\b2.exeFile created: C:\Users\user\AppData\Local\Temp\19f93e2a-4d97-4e0c-ade5-972e41ee6cf8Jump to behavior
                    Source: classification engineClassification label: mal100.troj.evad.winEXE@3/2@0/0
                    Source: C:\Users\user\Desktop\b2.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                    Source: C:\Users\user\Desktop\b2.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                    Source: 12.0.b2.exe.400000.4.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: 12.0.b2.exe.400000.4.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: 12.0.b2.exe.400000.12.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: 12.0.b2.exe.400000.12.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: 12.0.b2.exe.400000.6.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: 12.0.b2.exe.400000.6.unpack, A/b2.csCryptographic APIs: 'TransformFinalBlock', 'CreateDecryptor'
                    Source: C:\Users\user\Desktop\b2.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                    Source: b2.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                    Source: b2.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
                    Source: Binary string: C:\Dropbox\Dev\ag.v66\Libraries\MSILJitter\bin\RELEASE\win32\AgileDotNetRT.pdb source: f.dll.0.dr
                    Source: f.dll.0.drStatic PE information: section name: .didat
                    Source: f.dll.0.drStatic PE information: section name: .00cfg
                    Source: initial sampleStatic PE information: section name: .text entropy: 7.42416946268
                    Source: C:\Users\user\Desktop\b2.exeFile created: C:\Users\user\AppData\Local\Temp\19f93e2a-4d97-4e0c-ade5-972e41ee6cf8\f.dllJump to dropped file
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                    Source: C:\Users\user\Desktop\b2.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                    Malware Analysis System Evasion

                    barindex
                    Source: C:\Users\user\Desktop\b2.exeRDTSC instruction interceptor: First address: 0000000072B81D36 second address: 0000000072B82A87 instructions: 0x00000000 rdtsc 0x00000002 mov dword ptr [ebp-10h], eax 0x00000005 mov dword ptr [ebp-0Ch], edx 0x00000008 mov eax, dword ptr [ebp-10h] 0x0000000b sub eax, dword ptr [ebp-08h] 0x0000000e mov edx, dword ptr [ebp-0Ch] 0x00000011 sbb edx, dword ptr [ebp-04h] 0x00000014 pop edi 0x00000015 pop esi 0x00000016 pop ebx 0x00000017 mov esp, ebp 0x00000019 pop ebp 0x0000001a ret 0x0000001b mov dword ptr [72B953C0h], eax 0x00000020 mov dword ptr [72B953C4h], edx 0x00000026 mov dword ptr [ebp-0Ch], 00000000h 0x0000002d jmp 00007F76FCDA0DEBh 0x0000002f mov eax, dword ptr [ebp-0Ch] 0x00000032 cmp eax, dword ptr [ebp+08h] 0x00000035 jnl 00007F76FCDA0E26h 0x00000037 rdtsc
                    Source: C:\Users\user\Desktop\b2.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
                    Source: C:\Users\user\Desktop\b2.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
                    Source: C:\Users\user\Desktop\b2.exe TID: 6848Thread sleep count: 34 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\b2.exe TID: 6848Thread sleep time: -31359464925306218s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\b2.exe TID: 3268Thread sleep count: 6199 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\b2.exe TID: 3268Thread sleep count: 3585 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\b2.exe TID: 6440Thread sleep count: 40 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\b2.exe TID: 6440Thread sleep time: -36893488147419080s >= -30000sJump to behavior
                    Source: C:\Users\user\Desktop\b2.exe TID: 4696Thread sleep count: 3690 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\b2.exe TID: 4696Thread sleep count: 6133 > 30Jump to behavior
                    Source: C:\Users\user\Desktop\b2.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\b2.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\b2.exeWindow / User API: threadDelayed 6199Jump to behavior
                    Source: C:\Users\user\Desktop\b2.exeWindow / User API: threadDelayed 3585Jump to behavior
                    Source: C:\Users\user\Desktop\b2.exeWindow / User API: threadDelayed 3690Jump to behavior
                    Source: C:\Users\user\Desktop\b2.exeWindow / User API: threadDelayed 6133Jump to behavior
                    Source: C:\Users\user\Desktop\b2.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
                    Source: C:\Users\user\Desktop\b2.exeProcess information queried: ProcessInformationJump to behavior
                    Source: C:\Users\user\Desktop\b2.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\b2.exeThread delayed: delay time: 922337203685477Jump to behavior
                    Source: C:\Users\user\Desktop\b2.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\b2.exeProcess token adjusted: DebugJump to behavior
                    Source: C:\Users\user\Desktop\b2.exeMemory allocated: page read and write | page guardJump to behavior

                    HIPS / PFW / Operating System Protection Evasion

                    barindex
                    Source: C:\Users\user\Desktop\b2.exeMemory written: C:\Users\user\Desktop\b2.exe base: 400000 value starts with: 4D5AJump to behavior
                    Source: C:\Users\user\Desktop\b2.exeProcess created: C:\Users\user\Desktop\b2.exe C:\Users\user\Desktop\b2.exeJump to behavior
                    Source: C:\Users\user\Desktop\b2.exeQueries volume information: C:\Users\user\Desktop\b2.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\b2.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\b2.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.Build.Utilities.v4.0\v4.0_4.0.0.0__b03f5f7f11d50a3a\Microsoft.Build.Utilities.v4.0.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\b2.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\b2.exeQueries volume information: C:\Users\user\Desktop\b2.exe VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\b2.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\b2.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\b2.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\b2.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\b2.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\CustomMarshalers\v4.0_4.0.0.0__b03f5f7f11d50a3a\CustomMarshalers.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\b2.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
                    Source: C:\Users\user\Desktop\b2.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                    Stealing of Sensitive Information

                    barindex
                    Source: Yara matchFile source: 0000000C.00000002.615030457.00000000034D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: b2.exe PID: 7148, type: MEMORYSTR
                    Source: Yara matchFile source: 12.0.b2.exe.400000.8.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 12.0.b2.exe.400000.6.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 12.0.b2.exe.400000.12.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 12.0.b2.exe.400000.10.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 12.2.b2.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 12.0.b2.exe.400000.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0000000C.00000000.522653847.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000C.00000002.613014718.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000C.00000000.523738264.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000C.00000000.523078417.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000C.00000000.522219203.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000C.00000002.615030457.00000000034D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: b2.exe PID: 7148, type: MEMORYSTR
                    Source: Yara matchFile source: 0000000C.00000002.615030457.00000000034D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: b2.exe PID: 7148, type: MEMORYSTR

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: 0000000C.00000002.615030457.00000000034D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: b2.exe PID: 7148, type: MEMORYSTR
                    Source: Yara matchFile source: 12.0.b2.exe.400000.8.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 12.0.b2.exe.400000.6.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 12.0.b2.exe.400000.12.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 12.0.b2.exe.400000.10.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 12.2.b2.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 12.0.b2.exe.400000.4.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0000000C.00000000.522653847.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000C.00000002.613014718.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000C.00000000.523738264.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000C.00000000.523078417.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000C.00000000.522219203.0000000000402000.00000040.00000400.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 0000000C.00000002.615030457.00000000034D1000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: Process Memory Space: b2.exe PID: 7148, type: MEMORYSTR
                    Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                    1
                    Valid Accounts
                    211
                    Windows Management Instrumentation
                    1
                    Valid Accounts
                    1
                    Valid Accounts
                    1
                    Masquerading
                    1
                    Input Capture
                    21
                    Security Software Discovery
                    Remote Services1
                    Input Capture
                    Exfiltration Over Other Network Medium1
                    Encrypted Channel
                    Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                    Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                    Access Token Manipulation
                    1
                    Valid Accounts
                    LSASS Memory1
                    Process Discovery
                    Remote Desktop Protocol11
                    Archive Collected Data
                    Exfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                    Domain AccountsAt (Linux)Logon Script (Windows)111
                    Process Injection
                    1
                    Access Token Manipulation
                    Security Account Manager131
                    Virtualization/Sandbox Evasion
                    SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                    Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
                    Disable or Modify Tools
                    NTDS1
                    Application Window Discovery
                    Distributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
                    Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script131
                    Virtualization/Sandbox Evasion
                    LSA Secrets213
                    System Information Discovery
                    SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                    Replication Through Removable MediaLaunchdRc.commonRc.common111
                    Process Injection
                    Cached Domain CredentialsSystem Owner/User DiscoveryVNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
                    External Remote ServicesScheduled TaskStartup ItemsStartup Items11
                    Deobfuscate/Decode Files or Information
                    DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
                    Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job2
                    Obfuscated Files or Information
                    Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
                    Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)2
                    Software Packing
                    /etc/passwd and /etc/shadowSystem Network Connections DiscoverySoftware Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    b2.exe64%VirustotalBrowse
                    b2.exe75%ReversingLabsByteCode-MSIL.Trojan.AgentTesla
                    b2.exe100%AviraHEUR/AGEN.1234902
                    b2.exe100%Joe Sandbox ML
                    SourceDetectionScannerLabelLink
                    C:\Users\user\AppData\Local\Temp\19f93e2a-4d97-4e0c-ade5-972e41ee6cf8\f.dll0%VirustotalBrowse
                    C:\Users\user\AppData\Local\Temp\19f93e2a-4d97-4e0c-ade5-972e41ee6cf8\f.dll0%MetadefenderBrowse
                    C:\Users\user\AppData\Local\Temp\19f93e2a-4d97-4e0c-ade5-972e41ee6cf8\f.dll2%ReversingLabs
                    SourceDetectionScannerLabelLinkDownload
                    12.0.b2.exe.e00000.9.unpack100%AviraHEUR/AGEN.1234902Download File
                    12.0.b2.exe.400000.4.unpack100%AviraTR/Spy.Gen8Download File
                    12.2.b2.exe.e00000.1.unpack100%AviraHEUR/AGEN.1234902Download File
                    12.0.b2.exe.e00000.5.unpack100%AviraHEUR/AGEN.1234902Download File
                    12.0.b2.exe.e00000.0.unpack100%AviraHEUR/AGEN.1234902Download File
                    12.0.b2.exe.e00000.3.unpack100%AviraHEUR/AGEN.1234902Download File
                    12.0.b2.exe.e00000.13.unpack100%AviraHEUR/AGEN.1234902Download File
                    0.0.b2.exe.4c0000.0.unpack100%AviraHEUR/AGEN.1234902Download File
                    12.0.b2.exe.e00000.1.unpack100%AviraHEUR/AGEN.1234902Download File
                    12.0.b2.exe.400000.12.unpack100%AviraTR/Spy.Gen8Download File
                    12.0.b2.exe.400000.6.unpack100%AviraTR/Spy.Gen8Download File
                    12.0.b2.exe.e00000.7.unpack100%AviraHEUR/AGEN.1234902Download File
                    12.0.b2.exe.400000.8.unpack100%AviraTR/Spy.Gen8Download File
                    12.0.b2.exe.400000.10.unpack100%AviraTR/Spy.Gen8Download File
                    12.0.b2.exe.e00000.11.unpack100%AviraHEUR/AGEN.1234902Download File
                    12.2.b2.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
                    0.2.b2.exe.4c0000.0.unpack100%AviraHEUR/AGEN.1234902Download File
                    12.0.b2.exe.e00000.2.unpack100%AviraHEUR/AGEN.1234902Download File
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    http://xqtbof.com0%Avira URL Cloudsafe
                    http://127.0.0.1:HTTP/1.10%Avira URL Cloudsafe
                    http://DynDns.comDynDNS0%URL Reputationsafe
                    https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%ha0%URL Reputationsafe
                    https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip0%URL Reputationsafe
                    http://ocsp.thawte.com00%URL Reputationsafe
                    https://api.ipify.orgGETMozilla/5.00%URL Reputationsafe
                    No contacted domains info
                    NameSourceMaliciousAntivirus DetectionReputation
                    http://xqtbof.comb2.exe, 0000000C.00000002.615030457.00000000034D1000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    unknown
                    http://127.0.0.1:HTTP/1.1b2.exe, 0000000C.00000002.615030457.00000000034D1000.00000004.00000800.00020000.00000000.sdmpfalse
                    • Avira URL Cloud: safe
                    low
                    http://DynDns.comDynDNSb2.exe, 0000000C.00000002.615030457.00000000034D1000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    https://api.telegram.org/bot1324911145:AAEQBcai78GJtNdHHMwAX0xQhP0p7EcyOuo/sendDocumentdocument-----b2.exe, 0000000C.00000002.615030457.00000000034D1000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      https://api.telegram.org/bot1324911145:AAEQBcai78GJtNdHHMwAX0xQhP0p7EcyOuo/b2.exe, 00000000.00000003.516030971.000000000637B000.00000004.00000800.00020000.00000000.sdmp, b2.exe, 00000000.00000003.515670250.0000000006376000.00000004.00000800.00020000.00000000.sdmp, b2.exe, 00000000.00000003.516280598.000000000637B000.00000004.00000800.00020000.00000000.sdmp, b2.exe, 00000000.00000003.514691789.000000000636D000.00000004.00000800.00020000.00000000.sdmp, b2.exe, 00000000.00000003.520969631.0000000006A1C000.00000004.00000800.00020000.00000000.sdmp, b2.exe, 00000000.00000003.516074359.0000000006A14000.00000004.00000800.00020000.00000000.sdmp, b2.exe, 00000000.00000003.519825219.0000000006A1A000.00000004.00000800.00020000.00000000.sdmp, b2.exe, 00000000.00000003.515451731.0000000006376000.00000004.00000800.00020000.00000000.sdmp, b2.exe, 00000000.00000003.518667846.000000000637B000.00000004.00000800.00020000.00000000.sdmp, b2.exe, 00000000.00000003.519966505.0000000006A1C000.00000004.00000800.00020000.00000000.sdmp, b2.exe, 0000000C.00000000.522653847.0000000000402000.00000040.00000400.00020000.00000000.sdmp, b2.exe, 0000000C.00000000.522219203.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                        high
                        http://crl.thawte.com/ThawteTimestampingCA.crl0f.dll.0.drfalse
                          high
                          https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zip%tordir%%hab2.exe, 0000000C.00000002.615030457.00000000034D1000.00000004.00000800.00020000.00000000.sdmpfalse
                          • URL Reputation: safe
                          unknown
                          http://www.symauth.com/cps0(f.dll.0.drfalse
                            high
                            http://www.symauth.com/rpa00f.dll.0.drfalse
                              high
                              https://www.theonionrouter.com/dist.torproject.org/torbrowser/9.5.3/tor-win32-0.4.3.6.zipb2.exe, 00000000.00000003.516030971.000000000637B000.00000004.00000800.00020000.00000000.sdmp, b2.exe, 00000000.00000003.515670250.0000000006376000.00000004.00000800.00020000.00000000.sdmp, b2.exe, 00000000.00000003.516280598.000000000637B000.00000004.00000800.00020000.00000000.sdmp, b2.exe, 00000000.00000003.514691789.000000000636D000.00000004.00000800.00020000.00000000.sdmp, b2.exe, 00000000.00000003.520969631.0000000006A1C000.00000004.00000800.00020000.00000000.sdmp, b2.exe, 00000000.00000003.516074359.0000000006A14000.00000004.00000800.00020000.00000000.sdmp, b2.exe, 00000000.00000003.519825219.0000000006A1A000.00000004.00000800.00020000.00000000.sdmp, b2.exe, 00000000.00000003.515451731.0000000006376000.00000004.00000800.00020000.00000000.sdmp, b2.exe, 00000000.00000003.518667846.000000000637B000.00000004.00000800.00020000.00000000.sdmp, b2.exe, 00000000.00000003.519966505.0000000006A1C000.00000004.00000800.00020000.00000000.sdmp, b2.exe, 0000000C.00000000.522653847.0000000000402000.00000040.00000400.00020000.00000000.sdmp, b2.exe, 0000000C.00000000.522219203.0000000000402000.00000040.00000400.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              http://ocsp.thawte.com0f.dll.0.drfalse
                              • URL Reputation: safe
                              unknown
                              https://api.ipify.orgGETMozilla/5.0b2.exe, 0000000C.00000002.615030457.00000000034D1000.00000004.00000800.00020000.00000000.sdmpfalse
                              • URL Reputation: safe
                              unknown
                              No contacted IP infos
                              Joe Sandbox Version:34.0.0 Boulder Opal
                              Analysis ID:626045
                              Start date and time: 13/05/202214:32:122022-05-13 14:32:12 +02:00
                              Joe Sandbox Product:CloudBasic
                              Overall analysis duration:0h 9m 53s
                              Hypervisor based Inspection enabled:false
                              Report type:full
                              Sample file name:b2.exe
                              Cookbook file name:default.jbs
                              Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
                              Number of analysed new started processes analysed:20
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • HDC enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Detection:MAL
                              Classification:mal100.troj.evad.winEXE@3/2@0/0
                              EGA Information:
                              • Successful, ratio: 100%
                              HDC Information:
                              • Successful, ratio: 0.5% (good quality ratio 0.2%)
                              • Quality average: 13.9%
                              • Quality standard deviation: 12.9%
                              HCA Information:
                              • Successful, ratio: 100%
                              • Number of executed functions: 34
                              • Number of non-executed functions: 2
                              Cookbook Comments:
                              • Found application associated with file extension: .exe
                              • Adjust boot time
                              • Enable AMSI
                              • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, WMIADAP.exe, backgroundTaskHost.exe, conhost.exe, WmiPrvSE.exe, svchost.exe, wuapihost.exe
                              • Excluded domains from analysis (whitelisted): ris.api.iris.microsoft.com, fp-afd.azureedge.us, client.wns.windows.com, store-images.s-microsoft.com, login.live.com, fp-vp.azureedge.net, sls.update.microsoft.com, settings-win.data.microsoft.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, b-ring.msedge.net, arc.msn.com
                              • Not all processes where analyzed, report is missing behavior information
                              • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                              • Report size getting too big, too many NtOpenKeyEx calls found.
                              TimeTypeDescription
                              14:33:26API Interceptor434x Sleep call for process: b2.exe modified
                              No context
                              No context
                              No context
                              No context
                              MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                              C:\Users\user\AppData\Local\Temp\19f93e2a-4d97-4e0c-ade5-972e41ee6cf8\f.dll20.exeGet hashmaliciousBrowse
                                63.exeGet hashmaliciousBrowse
                                  d4.exeGet hashmaliciousBrowse
                                    VirusMaker_setup.exeGet hashmaliciousBrowse
                                      Hackeplex Loader x32.exeGet hashmaliciousBrowse
                                        Lunar Builder.exeGet hashmaliciousBrowse
                                          2aiZD9auQ0.exeGet hashmaliciousBrowse
                                            Lunar_Builder.exeGet hashmaliciousBrowse
                                              Lunar_Builder.exeGet hashmaliciousBrowse
                                                nAnM21musB.exeGet hashmaliciousBrowse
                                                  dLlF0bPWxx.exeGet hashmaliciousBrowse
                                                    eNjIpT5RzD.exeGet hashmaliciousBrowse
                                                      Plq7ADczmp.exeGet hashmaliciousBrowse
                                                        Courvix-VPN.exeGet hashmaliciousBrowse
                                                          VPN.exeGet hashmaliciousBrowse
                                                            PAYMENT.exeGet hashmaliciousBrowse
                                                              ORDER FORM DENK.exeGet hashmaliciousBrowse
                                                                SecuriteInfo.com.BackDoor.SpyBotNET.25.5189.exeGet hashmaliciousBrowse
                                                                  UVZxk61Vdc.exeGet hashmaliciousBrowse
                                                                    niMONOdcTZ.exeGet hashmaliciousBrowse
                                                                      Process:C:\Users\user\Desktop\b2.exe
                                                                      File Type:ASCII text, with CRLF line terminators
                                                                      Category:dropped
                                                                      Size (bytes):1976
                                                                      Entropy (8bit):5.3569395659576475
                                                                      Encrypted:false
                                                                      SSDEEP:48:MxHKXeHKlEHU0YHKhQnouHIW7HKjntHoxHhAHKzvGHKogHG1qHj:iqXeqm00YqhQnouRqjntIxHeqz+qogmm
                                                                      MD5:D1F580650522B7EBD7F438FD6B22F339
                                                                      SHA1:768BA6465A6C6107AC504EC2E254F090021EB643
                                                                      SHA-256:8280C0A16B5638C762196E6C892BF0940FF9C94435407C66992DA9D592999910
                                                                      SHA-512:BE90D7CD9009EF4BB5DE65E64CE522CBEFE3070386D937CCEACFB85E949CA39F954DD5808593D1A4FB806E990E61D465E83B87B80CD2540CF1CE80A0B184700C
                                                                      Malicious:true
                                                                      Reputation:moderate, very likely benign file
                                                                      Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..3,"PresentationCore, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35","C:\Windows\assembly\NativeImages_v4.0.30319_32\PresentationCore\820a27781e8540ca263d835ec155f1a5\PresentationCore.ni.dll",0..3,"PresentationFramework, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35","C:\Windows\assembly\NativeImages_v4.0.30319_32\Presentatio5ae0f00f#\889128adc9a7c9370e5e293f65060164\PresentationFramework.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"WindowsBase, Version=4.0.0.0, Culture=neutral, PublicKeyToken=31bf3856ad364e35","C:\Windows\assembly\NativeImages_v4.0.30319_32\Wi
                                                                      Process:C:\Users\user\Desktop\b2.exe
                                                                      File Type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
                                                                      Category:dropped
                                                                      Size (bytes):96664
                                                                      Entropy (8bit):5.567444078679915
                                                                      Encrypted:false
                                                                      SSDEEP:1536:JKQ7ZLTFq31bfnHSukoY1IPtan1sBrGxEm5g:JKc/FM1bfnyNNdkrGxJg
                                                                      MD5:14FF402962AD21B78AE0B4C43CD1F194
                                                                      SHA1:F8A510EB26666E875A5BDD1CADAD40602763AD72
                                                                      SHA-256:FB9646CB956945BDC503E69645F6B5316D3826B780D3C36738D6B944E884D15B
                                                                      SHA-512:DAA7A08BF3709119A944BCE28F6EBDD24E54A22B18CD9F86A87873E958DF121A3881DCDD5E162F6B4E543238C7AEF20F657C9830DF01D4C79290F7C9A4FCC54B
                                                                      Malicious:false
                                                                      Antivirus:
                                                                      • Antivirus: Virustotal, Detection: 0%, Browse
                                                                      • Antivirus: Metadefender, Detection: 0%, Browse
                                                                      • Antivirus: ReversingLabs, Detection: 2%
                                                                      Joe Sandbox View:
                                                                      • Filename: 20.exe, Detection: malicious, Browse
                                                                      • Filename: 63.exe, Detection: malicious, Browse
                                                                      • Filename: d4.exe, Detection: malicious, Browse
                                                                      • Filename: VirusMaker_setup.exe, Detection: malicious, Browse
                                                                      • Filename: Hackeplex Loader x32.exe, Detection: malicious, Browse
                                                                      • Filename: Lunar Builder.exe, Detection: malicious, Browse
                                                                      • Filename: 2aiZD9auQ0.exe, Detection: malicious, Browse
                                                                      • Filename: Lunar_Builder.exe, Detection: malicious, Browse
                                                                      • Filename: Lunar_Builder.exe, Detection: malicious, Browse
                                                                      • Filename: nAnM21musB.exe, Detection: malicious, Browse
                                                                      • Filename: dLlF0bPWxx.exe, Detection: malicious, Browse
                                                                      • Filename: eNjIpT5RzD.exe, Detection: malicious, Browse
                                                                      • Filename: Plq7ADczmp.exe, Detection: malicious, Browse
                                                                      • Filename: Courvix-VPN.exe, Detection: malicious, Browse
                                                                      • Filename: VPN.exe, Detection: malicious, Browse
                                                                      • Filename: PAYMENT.exe, Detection: malicious, Browse
                                                                      • Filename: ORDER FORM DENK.exe, Detection: malicious, Browse
                                                                      • Filename: SecuriteInfo.com.BackDoor.SpyBotNET.25.5189.exe, Detection: malicious, Browse
                                                                      • Filename: UVZxk61Vdc.exe, Detection: malicious, Browse
                                                                      • Filename: niMONOdcTZ.exe, Detection: malicious, Browse
                                                                      Reputation:moderate, very likely benign file
                                                                      Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........jr..jr..jr..8...ir......kr......cr..jr..9r..8...kr......sr......kr....x.kr..jr..kr......kr..Richjr..................PE..L...5 .\...........!.........F...............0......................................Z.....@..........................C......0b..d....................b..........4...`A..8...........................x7..@............`..0....p..`....................text...h........................... ..`.rdata.......0......."..............@..@.data........P.......:..............@....idata.......`.......<..............@..@.didat..a....p.......J..............@....00cfg...............N..............@..@.rsrc................P..............@..@.reloc...............X..............@..B........................................................................................................................................................................................
                                                                      File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                      Entropy (8bit):7.404995176366941
                                                                      TrID:
                                                                      • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
                                                                      • Win32 Executable (generic) a (10002005/4) 49.97%
                                                                      • Generic Win/DOS Executable (2004/3) 0.01%
                                                                      • DOS Executable Generic (2002/1) 0.01%
                                                                      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                                                      File name:b2.exe
                                                                      File size:410624
                                                                      MD5:b23f3235c02c47b25ea90d9830aa37c7
                                                                      SHA1:8dbaf4ec74cc2710582157100afe98ff9158d994
                                                                      SHA256:46b7d84280339d0b887a8e225d0649e1fcf86302bd553c33716b9c42d3894cc7
                                                                      SHA512:c60f1880fd35d086055c285f4c9002c0a75088a2cff0927985b8c2ae59f708bf93f100c17bf9c2baeeb7d265ca2e23c7fda1bd6981495ae82cbc0ad080667558
                                                                      SSDEEP:12288:k9D4fqRBdy4r3XyMb6U0t3TtUcIlXlWC:+fdNXPmPCJlXl
                                                                      TLSH:D2945A70F883445DC97B87F2616744F0F5B915C6FB400E0D61EA73388E1BA6BA39E16A
                                                                      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...X`.^.................8...........W... ...`....@.. ....................................`................................
                                                                      Icon Hash:00828e8e8686b000
                                                                      Entrypoint:0x4657ce
                                                                      Entrypoint Section:.text
                                                                      Digitally signed:false
                                                                      Imagebase:0x400000
                                                                      Subsystem:windows gui
                                                                      Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
                                                                      DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT, HIGH_ENTROPY_VA
                                                                      Time Stamp:0x5EAB6058 [Thu Apr 30 23:33:44 2020 UTC]
                                                                      TLS Callbacks:
                                                                      CLR (.Net) Version:v4.0.30319
                                                                      OS Version Major:4
                                                                      OS Version Minor:0
                                                                      File Version Major:4
                                                                      File Version Minor:0
                                                                      Subsystem Version Major:4
                                                                      Subsystem Version Minor:0
                                                                      Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                                      Instruction
                                                                      jmp dword ptr [00402000h]
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      add byte ptr [eax], al
                                                                      NameVirtual AddressVirtual Size Is in Section
                                                                      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_IMPORT0x657780x53.text
                                                                      IMAGE_DIRECTORY_ENTRY_RESOURCE0x660000x622.rsrc
                                                                      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_BASERELOC0x680000xc.reloc
                                                                      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                      NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                      .text0x20000x637d40x63800False0.669809005967data7.42416946268IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
                                                                      .rsrc0x660000x6220x800False0.36181640625data3.65899044286IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                      .reloc0x680000xc0x200False0.044921875data0.101910425663IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                      NameRVASizeTypeLanguageCountry
                                                                      RT_VERSION0x660a00x398data
                                                                      RT_MANIFEST0x664380x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators
                                                                      DLLImport
                                                                      mscoree.dll_CorExeMain
                                                                      DescriptionData
                                                                      Translation0x0000 0x04b0
                                                                      LegalCopyrightCopyright 2014 - 2020
                                                                      Assembly Version0.0.0.0
                                                                      InternalName009273620200110_pdf.exe
                                                                      FileVersion9.13.18.22
                                                                      CompanyNameu{5/3x9e*:6vi$01m?a_
                                                                      Comments3h:=2s8g%;0mv[69j!i/7&
                                                                      ProductName2e=y)4+3u7z~*
                                                                      ProductVersion9.13.18.22
                                                                      FileDescription2e=y)4+3u7z~*
                                                                      OriginalFilename009273620200110_pdf.exe
                                                                      No network behavior found

                                                                      Click to jump to process

                                                                      Click to jump to process

                                                                      Click to dive into process behavior distribution

                                                                      Click to jump to process

                                                                      Target ID:0
                                                                      Start time:14:33:23
                                                                      Start date:13/05/2022
                                                                      Path:C:\Users\user\Desktop\b2.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:"C:\Users\user\Desktop\b2.exe"
                                                                      Imagebase:0x4c0000
                                                                      File size:410624 bytes
                                                                      MD5 hash:B23F3235C02C47B25EA90D9830AA37C7
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:.Net C# or VB.NET
                                                                      Reputation:low

                                                                      Target ID:12
                                                                      Start time:14:34:41
                                                                      Start date:13/05/2022
                                                                      Path:C:\Users\user\Desktop\b2.exe
                                                                      Wow64 process (32bit):true
                                                                      Commandline:C:\Users\user\Desktop\b2.exe
                                                                      Imagebase:0xe00000
                                                                      File size:410624 bytes
                                                                      MD5 hash:B23F3235C02C47B25EA90D9830AA37C7
                                                                      Has elevated privileges:true
                                                                      Has administrator privileges:true
                                                                      Programmed in:.Net C# or VB.NET
                                                                      Yara matches:
                                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000C.00000000.522653847.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 0000000C.00000000.522653847.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000C.00000002.613014718.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 0000000C.00000002.613014718.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000C.00000000.523738264.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 0000000C.00000000.523738264.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000C.00000000.523078417.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 0000000C.00000000.523078417.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000C.00000000.522219203.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_AgentTesla_2, Description: Yara detected AgentTesla, Source: 0000000C.00000000.522219203.0000000000402000.00000040.00000400.00020000.00000000.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 0000000C.00000002.615030457.00000000034D1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_TelegramRAT, Description: Yara detected Telegram RAT, Source: 0000000C.00000002.615030457.00000000034D1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                      • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 0000000C.00000002.615030457.00000000034D1000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                                                                      • Rule: MALWARE_Win_AgentTeslaV3, Description: AgentTeslaV3 infostealer payload, Source: 0000000C.00000002.615030457.00000000034D1000.00000004.00000800.00020000.00000000.sdmp, Author: ditekSHen
                                                                      Reputation:low

                                                                      Reset < >

                                                                        Execution Graph

                                                                        Execution Coverage:22.7%
                                                                        Dynamic/Decrypted Code Coverage:100%
                                                                        Signature Coverage:6.8%
                                                                        Total number of Nodes:190
                                                                        Total number of Limit Nodes:15
                                                                        execution_graph 11129 bef228 11130 bef268 ResumeThread 11129->11130 11132 bef299 11130->11132 11332 be3848 11333 be2770 LoadLibraryA 11332->11333 11334 be3860 11332->11334 11333->11334 11338 be3d30 11334->11338 11341 be3d40 11334->11341 11335 be391e 11344 be2484 11338->11344 11342 be3d48 11341->11342 11343 be2484 DeleteFileW 11341->11343 11342->11335 11343->11342 11345 be3d60 DeleteFileW 11344->11345 11347 be3d48 11345->11347 11347->11335 11348 bec948 11349 be2770 LoadLibraryA 11348->11349 11350 bec950 11349->11350 11351 be2748 11353 be2770 LoadLibraryA 11351->11353 11355 be2760 11351->11355 11352 be2751 11353->11352 11356 be2770 11355->11356 11357 be2846 11356->11357 11358 be2de8 LoadLibraryA 11356->11358 11359 be2df0 LoadLibraryA 11356->11359 11357->11352 11358->11357 11359->11357 11133 beece0 11134 beed20 VirtualAllocEx 11133->11134 11136 beed5d 11134->11136 11137 bef090 11138 bef0d5 SetThreadContext 11137->11138 11140 bef11d 11138->11140 11141 be37d0 11144 be2770 11141->11144 11145 be2784 11144->11145 11146 be2846 11144->11146 11145->11146 11149 be2de8 11145->11149 11154 be2df0 11145->11154 11150 be2ded 11149->11150 11158 be2e98 11150->11158 11162 be2e93 11150->11162 11151 be2dff 11151->11146 11156 be2e98 LoadLibraryA 11154->11156 11157 be2e93 LoadLibraryA 11154->11157 11155 be2dff 11155->11146 11156->11155 11157->11155 11161 be2eba 11158->11161 11166 be2448 11161->11166 11165 be2e98 11162->11165 11163 be2448 LoadLibraryA 11164 be3199 11163->11164 11164->11164 11165->11163 11167 be3430 LoadLibraryA 11166->11167 11169 be3516 11167->11169 11170 beeed0 11171 beef18 WriteProcessMemory 11170->11171 11173 beef6f 11171->11173 11174 bed750 11175 bed75f 11174->11175 11176 bed775 11175->11176 11179 bed7a0 11175->11179 11209 bed790 11175->11209 11180 bed7db 11179->11180 11239 bedbf8 11180->11239 11246 bedc08 11180->11246 11181 bed84c 11187 bedb4d 11181->11187 11252 bedee1 11181->11252 11257 bedef0 11181->11257 11182 bed8a8 11182->11187 11262 bee868 11182->11262 11266 bee858 11182->11266 11183 bed8e3 11270 beeba8 11183->11270 11274 beeb98 11183->11274 11184 bed93e 11184->11187 11278 beed90 11184->11278 11282 beeda0 11184->11282 11185 beda6c 11193 beeda0 2 API calls 11185->11193 11194 beed90 2 API calls 11185->11194 11186 bed99a 11186->11185 11186->11187 11191 beeda0 2 API calls 11186->11191 11192 beed90 2 API calls 11186->11192 11187->11175 11188 beda95 11188->11187 11286 beefb3 11188->11286 11290 beefc0 11188->11290 11189 bedb3c 11294 bef168 11189->11294 11298 bef165 11189->11298 11190 bedb48 11190->11175 11191->11186 11192->11186 11193->11188 11194->11188 11210 bed7db 11209->11210 11223 bedbf8 2 API calls 11210->11223 11224 bedc08 2 API calls 11210->11224 11211 bed84c 11217 bedb4d 11211->11217 11231 bedef0 2 API calls 11211->11231 11232 bedee1 2 API calls 11211->11232 11212 bed8a8 11212->11217 11235 bee868 2 API calls 11212->11235 11236 bee858 2 API calls 11212->11236 11213 bed8e3 11225 beeba8 2 API calls 11213->11225 11226 beeb98 2 API calls 11213->11226 11214 bed93e 11214->11217 11227 beeda0 2 API calls 11214->11227 11228 beed90 2 API calls 11214->11228 11215 beda6c 11221 beeda0 2 API calls 11215->11221 11222 beed90 2 API calls 11215->11222 11216 bed99a 11216->11215 11216->11217 11237 beeda0 2 API calls 11216->11237 11238 beed90 2 API calls 11216->11238 11217->11175 11218 beda95 11218->11217 11229 beefb3 2 API calls 11218->11229 11230 beefc0 2 API calls 11218->11230 11219 bedb3c 11233 bef168 2 API calls 11219->11233 11234 bef165 2 API calls 11219->11234 11220 bedb48 11220->11175 11221->11218 11222->11218 11223->11211 11224->11211 11225->11214 11226->11214 11227->11216 11228->11216 11229->11219 11230->11219 11231->11212 11232->11212 11233->11220 11234->11220 11235->11213 11236->11213 11237->11216 11238->11216 11240 bedc08 11239->11240 11302 bed438 11240->11302 11242 bedc39 11242->11181 11243 bedc35 11243->11242 11244 bedd89 CreateProcessAsUserW 11243->11244 11245 bede00 11244->11245 11247 bed438 CreateProcessAsUserW 11246->11247 11249 bedc35 11247->11249 11248 bedc39 11248->11181 11249->11248 11250 bedd89 CreateProcessAsUserW 11249->11250 11251 bede00 11250->11251 11253 bedf0f 11252->11253 11306 bee1d3 11253->11306 11314 bee1e0 11253->11314 11254 bedf7a 11254->11182 11258 bedf0f 11257->11258 11260 bee1d3 2 API calls 11258->11260 11261 bee1e0 2 API calls 11258->11261 11259 bedf7a 11259->11182 11260->11259 11261->11259 11263 bee88c 11262->11263 11264 bee1e0 2 API calls 11263->11264 11265 bee95e 11264->11265 11265->11183 11267 bee862 11266->11267 11268 bee1e0 2 API calls 11267->11268 11269 bee95e 11268->11269 11269->11183 11271 beebc7 11270->11271 11272 bee1e0 2 API calls 11271->11272 11273 beec99 11272->11273 11273->11184 11275 beeba8 11274->11275 11276 bee1e0 2 API calls 11275->11276 11277 beec99 11276->11277 11277->11184 11279 beeda0 11278->11279 11280 bee1e0 2 API calls 11279->11280 11281 beee86 11280->11281 11281->11186 11283 beedc4 11282->11283 11284 bee1e0 2 API calls 11283->11284 11285 beee86 11284->11285 11285->11186 11287 beefc0 11286->11287 11288 bee1e0 2 API calls 11287->11288 11289 bef047 11288->11289 11289->11189 11291 beefdf 11290->11291 11292 bee1e0 2 API calls 11291->11292 11293 bef047 11292->11293 11293->11189 11295 bef185 11294->11295 11296 bee1e0 2 API calls 11295->11296 11297 bef1de 11296->11297 11297->11190 11299 bef168 11298->11299 11300 bee1e0 2 API calls 11299->11300 11301 bef1de 11300->11301 11301->11190 11303 bedc80 CreateProcessAsUserW 11302->11303 11305 bede00 11303->11305 11307 bee1f1 11306->11307 11310 bee1d3 2 API calls 11306->11310 11311 bee1e0 2 API calls 11306->11311 11309 bee223 11307->11309 11322 bee3f8 11307->11322 11327 bee3e9 11307->11327 11308 bee219 11308->11254 11310->11307 11311->11307 11318 bee1d3 2 API calls 11314->11318 11319 bee1e0 2 API calls 11314->11319 11315 bee1f1 11317 bee223 11315->11317 11320 bee3f8 GetThreadContext 11315->11320 11321 bee3e9 GetThreadContext 11315->11321 11316 bee219 11316->11254 11318->11315 11319->11315 11320->11316 11321->11316 11324 bee42c 11322->11324 11323 bee73e 11323->11308 11324->11323 11325 bee7f5 GetThreadContext 11324->11325 11326 bee81d 11325->11326 11326->11308 11329 bee42c 11327->11329 11328 bee73e 11328->11308 11329->11328 11330 bee7f5 GetThreadContext 11329->11330 11331 bee81d 11330->11331 11331->11308

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 235 bee3f8-bee42a 236 bee42c-bee42e 235->236 237 bee436-bee439 235->237 238 bee708-bee731 236->238 239 bee434 236->239 237->238 240 bee43f-bee462 237->240 257 bee738-bee73c 238->257 239->240 243 bee46e-bee471 240->243 244 bee464-bee466 240->244 243->238 245 bee477-bee485 243->245 244->238 247 bee46c 244->247 250 bee487-bee491 245->250 251 bee493-bee49a 245->251 247->245 252 bee49d-bee49f 250->252 251->252 254 bee4ab-bee4ae 252->254 255 bee4a1-bee4a3 252->255 254->238 258 bee4b4-bee4db 254->258 255->238 256 bee4a9 255->256 256->258 259 bee73e-bee748 257->259 260 bee749-bee77f 257->260 263 bee4dd-bee4df 258->263 264 bee4e7-bee4ea 258->264 279 bee781-bee78d 260->279 263->238 265 bee4e5 263->265 264->238 266 bee4f0-bee508 264->266 265->266 269 bee50a-bee50c 266->269 270 bee514-bee517 266->270 269->238 272 bee512 269->272 270->238 273 bee51d-bee535 270->273 272->273 277 bee537-bee539 273->277 278 bee541-bee544 273->278 277->238 280 bee53f 277->280 278->238 281 bee54a-bee562 278->281 279->279 282 bee78f-bee7db 279->282 280->281 285 bee56e-bee571 281->285 286 bee564-bee566 281->286 288 bee7dd-bee7e9 282->288 289 bee7eb-bee81b GetThreadContext 282->289 285->238 287 bee577-bee58f 285->287 286->238 290 bee56c 286->290 293 bee59b-bee59e 287->293 294 bee591-bee593 287->294 288->289 295 bee81d-bee823 289->295 296 bee824-bee854 289->296 290->287 293->238 298 bee5a4-bee5b9 293->298 294->238 297 bee599 294->297 295->296 297->298 298->257 303 bee5bf-bee5ee 298->303 304 bee5fa-bee5fd 303->304 305 bee5f0-bee5f2 303->305 304->238 307 bee603-bee619 304->307 305->238 306 bee5f8 305->306 306->307 309 bee61b-bee61d 307->309 310 bee625-bee628 307->310 309->238 311 bee623 309->311 310->238 312 bee62e 310->312 311->312 313 bee635-bee639 312->313 314 bee63f-bee64b 313->314 315 bee6f7-bee700 313->315 314->315 318 bee651-bee674 314->318 315->303 316 bee706 315->316 316->257 319 bee676-bee678 318->319 320 bee680-bee683 318->320 319->238 321 bee67e 319->321 320->238 322 bee689-bee6b9 320->322 321->322 324 bee6bb-bee6bd 322->324 325 bee6c1-bee6c4 322->325 324->238 326 bee6bf 324->326 325->238 327 bee6c6-bee6e3 325->327 326->327 329 bee6eb-bee6ee 327->329 330 bee6e5-bee6e7 327->330 329->238 332 bee6f0-bee6f5 329->332 330->238 331 bee6e9 330->331 331->332 332->257
                                                                        APIs
                                                                        • GetThreadContext.KERNELBASE(?,00000000), ref: 00BEE80E
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.533827214.0000000000BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_be0000_b2.jbxd
                                                                        Similarity
                                                                        • API ID: ContextThread
                                                                        • String ID:
                                                                        • API String ID: 1591575202-0
                                                                        • Opcode ID: 5ac1d2e491aa8ad54638ad1a2575b7b8d7e2770ee80c1e105cfa2aaf149fce8b
                                                                        • Instruction ID: 978e3b47424cb6b44551e3f1a8ff557b77a556f9c4e8eee5a5107a207dc85433
                                                                        • Opcode Fuzzy Hash: 5ac1d2e491aa8ad54638ad1a2575b7b8d7e2770ee80c1e105cfa2aaf149fce8b
                                                                        • Instruction Fuzzy Hash: E1C1C031F002954BEB14CA7E88903AE76E39FD4328F298279D966DB3C4EB74DD419781
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 392 bed438-bedd0b 395 bedd0d-bedd13 392->395 396 bedd16-bedd1f 392->396 395->396 397 bedd30-bedd46 396->397 398 bedd21-bedd2d 396->398 399 bedd48-bedd4e 397->399 400 bedd51-beddfe CreateProcessAsUserW 397->400 398->397 399->400 402 bede07-bede8d 400->402 403 bede00-bede06 400->403 411 bede9f-bedea6 402->411 412 bede8f-bede95 402->412 403->402 413 bedebd 411->413 414 bedea8-bedeb7 411->414 412->411 416 bedebe 413->416 414->413 416->416
                                                                        APIs
                                                                        • CreateProcessAsUserW.KERNELBASE(00000000,00000000,?,0000000A,?,?,?,?,?,?,?), ref: 00BEDDEB
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.533827214.0000000000BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_be0000_b2.jbxd
                                                                        Similarity
                                                                        • API ID: CreateProcessUser
                                                                        • String ID:
                                                                        • API String ID: 2217836671-0
                                                                        • Opcode ID: 8cc6de5f766dd34ad278bf4b0c02041bf6ceffe02c7aacecb131cf010915f2cd
                                                                        • Instruction ID: f2c407c8b70d3aac221e6ced3c63a6791209a80dc35783788bf088111c1321dc
                                                                        • Opcode Fuzzy Hash: 8cc6de5f766dd34ad278bf4b0c02041bf6ceffe02c7aacecb131cf010915f2cd
                                                                        • Instruction Fuzzy Hash: A25104719002699FDF20CF99C944BDDBBB1FF48314F0585AAE909B7250DB71AA89CF90
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.533827214.0000000000BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_be0000_b2.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 9ec948904c63659d48b7a6fc6369db6c9077bb59d56bdcd61e68cc3bcac3a9a0
                                                                        • Instruction ID: 0f7933af7d81e37738d559c8661a481e2ee0f740d111574a39b980aec3725c7e
                                                                        • Opcode Fuzzy Hash: 9ec948904c63659d48b7a6fc6369db6c9077bb59d56bdcd61e68cc3bcac3a9a0
                                                                        • Instruction Fuzzy Hash: CD71AD32F002964BEB08CA6F8C903AE61E39BD4218F2D8179D96ADB785FF74DD415381
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 333 bedc08-bedc37 call bed438 336 bedc39-bedc51 333->336 337 bedc52-bedc6f 333->337 341 bedc71-bedc7d 337->341 341->341 342 bedc7f-bedd0b 341->342 344 bedd0d-bedd13 342->344 345 bedd16-bedd1f 342->345 344->345 346 bedd30-bedd46 345->346 347 bedd21-bedd2d 345->347 348 bedd48-bedd4e 346->348 349 bedd51-beddfe CreateProcessAsUserW 346->349 347->346 348->349 351 bede07-bede8d 349->351 352 bede00-bede06 349->352 360 bede9f-bedea6 351->360 361 bede8f-bede95 351->361 352->351 362 bedebd 360->362 363 bedea8-bedeb7 360->363 361->360 365 bedebe 362->365 363->362 365->365
                                                                        APIs
                                                                        • CreateProcessAsUserW.KERNELBASE(00000000,00000000,?,0000000A,?,?,?,?,?,?,?), ref: 00BEDDEB
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.533827214.0000000000BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_be0000_b2.jbxd
                                                                        Similarity
                                                                        • API ID: CreateProcessUser
                                                                        • String ID:
                                                                        • API String ID: 2217836671-0
                                                                        • Opcode ID: 9543b429a405a116d60875ae4091e852db7bdb6e14eee40aa19793ff1851357e
                                                                        • Instruction ID: 64c7095b96094cb488b97198e58c5140a454e5ad7b768a2482893599faee57f6
                                                                        • Opcode Fuzzy Hash: 9543b429a405a116d60875ae4091e852db7bdb6e14eee40aa19793ff1851357e
                                                                        • Instruction Fuzzy Hash: B6814A719042699FDF20CF65C840BDDBBB1FF48304F1585AAE949B7250DB70AA89CF90
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 366 bedc74-bedc7d 367 bedc7f-bedd0b 366->367 368 bedc71-bedc7d 366->368 370 bedd0d-bedd13 367->370 371 bedd16-bedd1f 367->371 368->367 368->368 370->371 372 bedd30-bedd46 371->372 373 bedd21-bedd2d 371->373 374 bedd48-bedd4e 372->374 375 bedd51-bedd7e 372->375 373->372 374->375 376 bedd89-beddfe CreateProcessAsUserW 375->376 377 bede07-bede8d 376->377 378 bede00-bede06 376->378 386 bede9f-bedea6 377->386 387 bede8f-bede95 377->387 378->377 388 bedebd 386->388 389 bedea8-bedeb7 386->389 387->386 391 bedebe 388->391 389->388 391->391
                                                                        APIs
                                                                        • CreateProcessAsUserW.KERNELBASE(00000000,00000000,?,0000000A,?,?,?,?,?,?,?), ref: 00BEDDEB
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.533827214.0000000000BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_be0000_b2.jbxd
                                                                        Similarity
                                                                        • API ID: CreateProcessUser
                                                                        • String ID:
                                                                        • API String ID: 2217836671-0
                                                                        • Opcode ID: c6cdb30b2b3f76534288e15a32ed4d1e213eed765f44d3f088994651d1e90411
                                                                        • Instruction ID: ca442bfd2ca7e51a693c39312901fa7a218799859ec12e01fef7d01b33a31f55
                                                                        • Opcode Fuzzy Hash: c6cdb30b2b3f76534288e15a32ed4d1e213eed765f44d3f088994651d1e90411
                                                                        • Instruction Fuzzy Hash: 205113719002699FDF20CF95C940BDDBBB1FF48304F0585AAE908B7250DB719A89CF90
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 417 be2448-be348f 420 be34c8-be3514 LoadLibraryA 417->420 421 be3491-be349b 417->421 428 be351d-be354e 420->428 429 be3516-be351c 420->429 421->420 422 be349d-be349f 421->422 423 be34c2-be34c5 422->423 424 be34a1-be34ab 422->424 423->420 426 be34af-be34be 424->426 427 be34ad 424->427 426->426 431 be34c0 426->431 427->426 432 be355e 428->432 433 be3550-be3554 428->433 429->428 431->423 436 be355f 432->436 433->432 435 be3556 433->435 435->432 436->436
                                                                        APIs
                                                                        • LoadLibraryA.KERNELBASE(00BE3199), ref: 00BE3504
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.533827214.0000000000BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_be0000_b2.jbxd
                                                                        Similarity
                                                                        • API ID: LibraryLoad
                                                                        • String ID:
                                                                        • API String ID: 1029625771-0
                                                                        • Opcode ID: eb4d4f1fe2591df6d309bf0aeca67f0ba8a036a003dbc1d8e510592b1bf498b6
                                                                        • Instruction ID: 0f28985291412b60626d82b327b41fa786ec4294a823fce67c4fd0449dcae439
                                                                        • Opcode Fuzzy Hash: eb4d4f1fe2591df6d309bf0aeca67f0ba8a036a003dbc1d8e510592b1bf498b6
                                                                        • Instruction Fuzzy Hash: 9A3159B0D006989FDB10CFAAC8897DEBBF1EF48B14F148169E815A7380D774A985CF91
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 437 be342c-be348f 440 be34c8-be3514 LoadLibraryA 437->440 441 be3491-be349b 437->441 448 be351d-be354e 440->448 449 be3516-be351c 440->449 441->440 442 be349d-be349f 441->442 443 be34c2-be34c5 442->443 444 be34a1-be34ab 442->444 443->440 446 be34af-be34be 444->446 447 be34ad 444->447 446->446 451 be34c0 446->451 447->446 452 be355e 448->452 453 be3550-be3554 448->453 449->448 451->443 456 be355f 452->456 453->452 455 be3556 453->455 455->452 456->456
                                                                        APIs
                                                                        • LoadLibraryA.KERNELBASE(00BE3199), ref: 00BE3504
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.533827214.0000000000BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_be0000_b2.jbxd
                                                                        Similarity
                                                                        • API ID: LibraryLoad
                                                                        • String ID:
                                                                        • API String ID: 1029625771-0
                                                                        • Opcode ID: 224da3d3dac52153b6ab503684e6d7f9a8387355094817f5971dfa9024a40cac
                                                                        • Instruction ID: 2d0f67f65c25948f28d0f7e1be782689f28abb0bdf1b5ab45928d08593ac966f
                                                                        • Opcode Fuzzy Hash: 224da3d3dac52153b6ab503684e6d7f9a8387355094817f5971dfa9024a40cac
                                                                        • Instruction Fuzzy Hash: 0A3159B0D006589FDB10CFAAC8897DEBBF1EF48714F14852AD815A7380D7749985CF91
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 457 beeecb-beeecd 458 beeecf-beef1e 457->458 459 beeec1-beeec9 457->459 461 beef2e-beef6d WriteProcessMemory 458->461 462 beef20-beef2c 458->462 459->457 464 beef6f-beef75 461->464 465 beef76-beefa6 461->465 462->461 464->465
                                                                        APIs
                                                                        • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 00BEEF60
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.533827214.0000000000BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_be0000_b2.jbxd
                                                                        Similarity
                                                                        • API ID: MemoryProcessWrite
                                                                        • String ID:
                                                                        • API String ID: 3559483778-0
                                                                        • Opcode ID: 952ea048884b286bab8a25ce42f628d8ea281105e3dc72b94d291ff9df2e0bed
                                                                        • Instruction ID: 9f040ee2c38217064d9590de2b5bffd281c77fc968a347efa300f3827798a300
                                                                        • Opcode Fuzzy Hash: 952ea048884b286bab8a25ce42f628d8ea281105e3dc72b94d291ff9df2e0bed
                                                                        • Instruction Fuzzy Hash: FF316B759043899FCF10CFAAD8807EEBBF4FF48314F05846AE918A7241D7789945CBA1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 469 be3d58-be3d5d 470 be3d5f-be3daa 469->470 471 be3cf1-be3d03 469->471 475 be3dac-be3daf 470->475 476 be3db2-be3ddd DeleteFileW 470->476 472 be3d0d-be3d0e 471->472 473 be3d08 call be2970 471->473 473->472 475->476 477 be3ddf-be3de5 476->477 478 be3de6-be3e0e 476->478 477->478
                                                                        APIs
                                                                        • DeleteFileW.KERNELBASE(00000000,?,?,?,?,?,?,?,?,?,?,00BE3D48), ref: 00BE3DD0
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.533827214.0000000000BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_be0000_b2.jbxd
                                                                        Similarity
                                                                        • API ID: DeleteFile
                                                                        • String ID:
                                                                        • API String ID: 4033686569-0
                                                                        • Opcode ID: 1efe5b757cb417ea464735dbf7cc93616e559979482e1ad09a913058c102a176
                                                                        • Instruction ID: 5c557ef40ecf78c457e4431b068127f9fe51dd702b2eba5ea214d104893be115
                                                                        • Opcode Fuzzy Hash: 1efe5b757cb417ea464735dbf7cc93616e559979482e1ad09a913058c102a176
                                                                        • Instruction Fuzzy Hash: 4E218BB1C046498FCB10CFAAC4457EEBBF0EF49320F05816AD844A7641D7385945CFA1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 481 beeed0-beef1e 483 beef2e-beef6d WriteProcessMemory 481->483 484 beef20-beef2c 481->484 486 beef6f-beef75 483->486 487 beef76-beefa6 483->487 484->483 486->487
                                                                        APIs
                                                                        • WriteProcessMemory.KERNELBASE(?,?,00000000,?,?), ref: 00BEEF60
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.533827214.0000000000BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_be0000_b2.jbxd
                                                                        Similarity
                                                                        • API ID: MemoryProcessWrite
                                                                        • String ID:
                                                                        • API String ID: 3559483778-0
                                                                        • Opcode ID: 435dadb0c55a67b8cd2b5155620b5dead7e9215ba37e100fb91f64f909515171
                                                                        • Instruction ID: fa843bf205dc5080a919e648d7bffd55aa6354386f3e74f562847e95d1b29395
                                                                        • Opcode Fuzzy Hash: 435dadb0c55a67b8cd2b5155620b5dead7e9215ba37e100fb91f64f909515171
                                                                        • Instruction Fuzzy Hash: A32127759003499FDB10CFAAC884BDEBBF5FF48314F10842AE918A7240D778A944CBA1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 503 bef088-bef0db 506 bef0dd-bef0e9 503->506 507 bef0eb-bef11b SetThreadContext 503->507 506->507 509 bef11d-bef123 507->509 510 bef124-bef154 507->510 509->510
                                                                        APIs
                                                                        • SetThreadContext.KERNELBASE(?,00000000), ref: 00BEF10E
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.533827214.0000000000BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_be0000_b2.jbxd
                                                                        Similarity
                                                                        • API ID: ContextThread
                                                                        • String ID:
                                                                        • API String ID: 1591575202-0
                                                                        • Opcode ID: a4b9a62528dddcfca1f9ffa08ffffdec1b43002302fd29b950a510f26aacf0d8
                                                                        • Instruction ID: 8e75f2c2707dac4bcbf1af1648a7a843511eafd1e7a28aad61498b23f7746f88
                                                                        • Opcode Fuzzy Hash: a4b9a62528dddcfca1f9ffa08ffffdec1b43002302fd29b950a510f26aacf0d8
                                                                        • Instruction Fuzzy Hash: FA2157B1D042498FCB10CFAAC4847EEBBF4EF48314F14842ED559A7241DB789989CFA1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 491 bee788-bee78d 492 bee78f-bee7db 491->492 493 bee781-bee78d 491->493 495 bee7dd-bee7e9 492->495 496 bee7eb-bee7ee 492->496 493->492 493->493 495->496 497 bee7f5-bee81b GetThreadContext 496->497 498 bee81d-bee823 497->498 499 bee824-bee854 497->499 498->499
                                                                        APIs
                                                                        • GetThreadContext.KERNELBASE(?,00000000), ref: 00BEE80E
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.533827214.0000000000BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_be0000_b2.jbxd
                                                                        Similarity
                                                                        • API ID: ContextThread
                                                                        • String ID:
                                                                        • API String ID: 1591575202-0
                                                                        • Opcode ID: 9596681ede386b73cccbe8103bcd28473459f63f484cb90bdfb7ab0cb7b7a8df
                                                                        • Instruction ID: b3659040d9f5ec4660fd064dd5f4e434f09a59f192167a826e8176018e7c1bfa
                                                                        • Opcode Fuzzy Hash: 9596681ede386b73cccbe8103bcd28473459f63f484cb90bdfb7ab0cb7b7a8df
                                                                        • Instruction Fuzzy Hash: 08214C71D042488FCB10DFAAC4847EEBBF4EF48324F14842ED529A7240D7789989CFA1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 514 bef090-bef0db 516 bef0dd-bef0e9 514->516 517 bef0eb-bef11b SetThreadContext 514->517 516->517 519 bef11d-bef123 517->519 520 bef124-bef154 517->520 519->520
                                                                        APIs
                                                                        • SetThreadContext.KERNELBASE(?,00000000), ref: 00BEF10E
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.533827214.0000000000BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_be0000_b2.jbxd
                                                                        Similarity
                                                                        • API ID: ContextThread
                                                                        • String ID:
                                                                        • API String ID: 1591575202-0
                                                                        • Opcode ID: 9276921cc72436d096f82342357a61ae9ee517253bcacd9effa392d0215338e5
                                                                        • Instruction ID: d9589191fbd8985c92a385818073b5da6881a2986170afd27e45b2f1937e1659
                                                                        • Opcode Fuzzy Hash: 9276921cc72436d096f82342357a61ae9ee517253bcacd9effa392d0215338e5
                                                                        • Instruction Fuzzy Hash: BD211871D042498FDB10DFAAC5847EEBBF4EF48314F14842ED519A7241DB78A989CFA1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        APIs
                                                                        • DeleteFileW.KERNELBASE(00000000,?,?,?,?,?,?,?,?,?,?,00BE3D48), ref: 00BE3DD0
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.533827214.0000000000BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_be0000_b2.jbxd
                                                                        Similarity
                                                                        • API ID: DeleteFile
                                                                        • String ID:
                                                                        • API String ID: 4033686569-0
                                                                        • Opcode ID: c05f2f7b71f73afb8fd6a0eafde6e9784b0c72fddcdea1a5f8d5b307fc364c69
                                                                        • Instruction ID: 7fef9d9a1eb5f16b8ea8e0799da1120372839bb2f781c57b61656722afbb8211
                                                                        • Opcode Fuzzy Hash: c05f2f7b71f73afb8fd6a0eafde6e9784b0c72fddcdea1a5f8d5b307fc364c69
                                                                        • Instruction Fuzzy Hash: F02149B1D046599BCB10CF9AC9447EEFBF4EB48720F05816AD814B7240D778AA44CFA1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        APIs
                                                                        • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 00BEED4E
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.533827214.0000000000BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_be0000_b2.jbxd
                                                                        Similarity
                                                                        • API ID: AllocVirtual
                                                                        • String ID:
                                                                        • API String ID: 4275171209-0
                                                                        • Opcode ID: e77a99eac433610768db35e98dadfceb10f479e0205de387ecf48c8507119261
                                                                        • Instruction ID: ae2f63b81f53dc8e885128713011b4a33cecaae39fd47de8a8cb3766bce4a172
                                                                        • Opcode Fuzzy Hash: e77a99eac433610768db35e98dadfceb10f479e0205de387ecf48c8507119261
                                                                        • Instruction Fuzzy Hash: 9F1167769042489FCF10DFAAC944BEFBBF5EF48324F148829E529A7210C7759949CFA1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.533827214.0000000000BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_be0000_b2.jbxd
                                                                        Similarity
                                                                        • API ID: ResumeThread
                                                                        • String ID:
                                                                        • API String ID: 947044025-0
                                                                        • Opcode ID: f4f67955774b160745b230bd4eb1034954822c39578c9b21daff9b05efe66ed2
                                                                        • Instruction ID: 735f35509d39cfa0622beba24b2cce0f3a850dde06f6d5ec28be27bd67b54e4a
                                                                        • Opcode Fuzzy Hash: f4f67955774b160745b230bd4eb1034954822c39578c9b21daff9b05efe66ed2
                                                                        • Instruction Fuzzy Hash: C51134B5D042498BCB14DFAAD8457EEFBF4EB88324F14842AD519AB200D774A989CB91
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        APIs
                                                                        • VirtualAllocEx.KERNELBASE(?,?,?,?,?), ref: 00BEED4E
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.533827214.0000000000BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_be0000_b2.jbxd
                                                                        Similarity
                                                                        • API ID: AllocVirtual
                                                                        • String ID:
                                                                        • API String ID: 4275171209-0
                                                                        • Opcode ID: f787d06274f787f9110a1edec750dec1185a7066e8cfef862cb2198a9e59ba0c
                                                                        • Instruction ID: 253fe7ef5a02c09e5971ba085f8b6149d73c7bafb750e956e3878ebec4108f33
                                                                        • Opcode Fuzzy Hash: f787d06274f787f9110a1edec750dec1185a7066e8cfef862cb2198a9e59ba0c
                                                                        • Instruction Fuzzy Hash: 251149759042499FCF10DFAAC844BDFBBF5EF48324F148819E525A7250C775A948CFA1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        APIs
                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.533827214.0000000000BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_be0000_b2.jbxd
                                                                        Similarity
                                                                        • API ID: ResumeThread
                                                                        • String ID:
                                                                        • API String ID: 947044025-0
                                                                        • Opcode ID: ee05ecaa4c0214a9a054327665c5264a1111b7dc46f1b09677a36452f5e3bf35
                                                                        • Instruction ID: af1ad41a28a87fb0c72f4caf6940490b58e5856ad4f7a29e804b9b4931142225
                                                                        • Opcode Fuzzy Hash: ee05ecaa4c0214a9a054327665c5264a1111b7dc46f1b09677a36452f5e3bf35
                                                                        • Instruction Fuzzy Hash: 5B113A75D046498FCB14DFAAC4447EEFBF4EB88324F148429D515A7240C774A948CF95
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.533581632.0000000000ADD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00ADD000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_add000_b2.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 450d8d8eaf678b56ecde131548ecd4c54261b31f9830e265d0ad49c7bd35413f
                                                                        • Instruction ID: 71cf3bb1e4cfd9942b4d742add09d60b8506c47c9c8648d2e225cb5f8e083e19
                                                                        • Opcode Fuzzy Hash: 450d8d8eaf678b56ecde131548ecd4c54261b31f9830e265d0ad49c7bd35413f
                                                                        • Instruction Fuzzy Hash: D821C475504240EFCF15DF50D9C0B26BB65FB88314F24C66AEA0A5B346C336D856DBA1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.533581632.0000000000ADD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00ADD000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_add000_b2.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 50b19e126ec7cdec70c5565182e6d5089102e0f6316445b94ade06efc0a31adc
                                                                        • Instruction ID: 2b146e6c690ce3bf449a7dcf502428cc4de3d50cab23315bef9f92de2466b60c
                                                                        • Opcode Fuzzy Hash: 50b19e126ec7cdec70c5565182e6d5089102e0f6316445b94ade06efc0a31adc
                                                                        • Instruction Fuzzy Hash: 772137B5604240EFDB11CF10D9C0F2ABF65FB98324F24C5AAE90A4B346C336D856DBA1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.533632298.0000000000AED000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AED000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_aed000_b2.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 51b735494141f9eaab8b5ffc8417db019573a73b1491b85b2922f3d8f2bf05aa
                                                                        • Instruction ID: 56adce7ff89af66e6233b38caf4f915cb7a5a63ffd3586b2b6d2cf508c9dbe87
                                                                        • Opcode Fuzzy Hash: 51b735494141f9eaab8b5ffc8417db019573a73b1491b85b2922f3d8f2bf05aa
                                                                        • Instruction Fuzzy Hash: AD21F675608284EFDB14DF14D9C4B26BB65FB84314F28C969E90A4B346C337D847CB61
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.533632298.0000000000AED000.00000040.00000800.00020000.00000000.sdmp, Offset: 00AED000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_aed000_b2.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 3b9084b93494f68207707dc7bf3bdf59e01ece4bfd8be7c74d1dddc627b626e9
                                                                        • Instruction ID: 768c7f0215b9dada02c2b5ccfaa0fc0a34dd7469d03c04b1d14cd5a3d5f60c92
                                                                        • Opcode Fuzzy Hash: 3b9084b93494f68207707dc7bf3bdf59e01ece4bfd8be7c74d1dddc627b626e9
                                                                        • Instruction Fuzzy Hash: 53218B755093C08FCB02CF20D990B15BF71EB46314F28C5EAD8498B6A7C33A984ACB62
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.533581632.0000000000ADD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00ADD000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_add000_b2.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 7c2c5882e25604fd872b9dbc7f35d2fdf2a73254c6fe2e8b235065a821d2e4b9
                                                                        • Instruction ID: 322bec330737645a74564b88247abfe1eccd4c386f447c548cb48cec78f22ad9
                                                                        • Opcode Fuzzy Hash: 7c2c5882e25604fd872b9dbc7f35d2fdf2a73254c6fe2e8b235065a821d2e4b9
                                                                        • Instruction Fuzzy Hash: 3F21AF76504280DFCF16CF10D9C4B16BF72FB88314F28C6AAE9490B656C33AD866CB91
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.533581632.0000000000ADD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00ADD000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_add000_b2.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 7425af53418665467c2c3727c99d4395e71cf0a38a0910a017d6a260ab402405
                                                                        • Instruction ID: 1503151ec27a7b3087d0f35f0f2d904f7a31d3914d375bcf561335e6a5d989fa
                                                                        • Opcode Fuzzy Hash: 7425af53418665467c2c3727c99d4395e71cf0a38a0910a017d6a260ab402405
                                                                        • Instruction Fuzzy Hash: D5118176504284DFDB16CF10D9C4B16BF71FB94324F24C6AAD8054B756C336D85ACBA2
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.533581632.0000000000ADD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00ADD000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_add000_b2.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: fb111cb037348c178b923826210fd126a42b4a40b19c1ea35e4b3d595f729b0c
                                                                        • Instruction ID: 34506b51d1014fd1810361a3fdf848657d51cd9b819e00d481f2fd7ad84f1e96
                                                                        • Opcode Fuzzy Hash: fb111cb037348c178b923826210fd126a42b4a40b19c1ea35e4b3d595f729b0c
                                                                        • Instruction Fuzzy Hash: F501A7715083449AE7114B26CD84B6ABFA8EF41365F18855BED0A5B386C3749888DAB1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.533581632.0000000000ADD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00ADD000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_add000_b2.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 76f5b8d1ef2678b47b30d419a62f55640f0d2e59fe7e76bf0adf0593bc52e8c9
                                                                        • Instruction ID: 5cc5da212e84915233e5d4a98c3fbd0703b27b6f8cb423ac16ae120833c7847c
                                                                        • Opcode Fuzzy Hash: 76f5b8d1ef2678b47b30d419a62f55640f0d2e59fe7e76bf0adf0593bc52e8c9
                                                                        • Instruction Fuzzy Hash: 80F06271404284AEE7118B16DDC4B66FF98EB41734F18C45BED095F386C3799888DAB1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.533827214.0000000000BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_be0000_b2.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 894c38578f1a2fb4abc2298d319542fbcca1bd1bbbfb83c8c603f06e57fec50e
                                                                        • Instruction ID: 113dfc231d4b1a9533de27836db8231fc45a92e6a6fde6e47c99ba1eab84319d
                                                                        • Opcode Fuzzy Hash: 894c38578f1a2fb4abc2298d319542fbcca1bd1bbbfb83c8c603f06e57fec50e
                                                                        • Instruction Fuzzy Hash: 13D11731D2475A8ACB10EB74DA50ADDB3B1FFD5300F518B9AE4097B225EB706AC5CB81
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Memory Dump Source
                                                                        • Source File: 00000000.00000002.533827214.0000000000BE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00BE0000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_0_2_be0000_b2.jbxd
                                                                        Similarity
                                                                        • API ID:
                                                                        • String ID:
                                                                        • API String ID:
                                                                        • Opcode ID: 2f74fb294b822d5b6fc2456895d24ff2088b659f3967426b6697518af44ea82d
                                                                        • Instruction ID: 55a6248c78da21ba5446b24a96c7f5fe4a4450ca1f1d4ff82ca328be37b95316
                                                                        • Opcode Fuzzy Hash: 2f74fb294b822d5b6fc2456895d24ff2088b659f3967426b6697518af44ea82d
                                                                        • Instruction Fuzzy Hash: 88D11831D2475A8ACB10EB74DA50ADDB3B1FFD5300F518B9AE4097B224EB706AC5CB81
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Execution Graph

                                                                        Execution Coverage:11.4%
                                                                        Dynamic/Decrypted Code Coverage:100%
                                                                        Signature Coverage:0%
                                                                        Total number of Nodes:63
                                                                        Total number of Limit Nodes:4
                                                                        execution_graph 13148 16051f0 13149 1605258 CreateWindowExW 13148->13149 13151 1605314 13149->13151 13151->13151 13152 160b6d0 13153 160b6e4 13152->13153 13156 160b91a 13153->13156 13154 160b6ed 13160 160b923 13156->13160 13162 160ba00 13156->13162 13166 160bafc 13156->13166 13170 160bb16 13156->13170 13174 160b9f1 13156->13174 13160->13154 13163 160ba44 13162->13163 13164 160bb3b 13163->13164 13178 160bdf7 13163->13178 13167 160baaf 13166->13167 13168 160bb3b 13167->13168 13169 160bdf7 2 API calls 13167->13169 13169->13168 13171 160bb29 13170->13171 13172 160bb3b 13170->13172 13173 160bdf7 2 API calls 13171->13173 13173->13172 13175 160ba44 13174->13175 13176 160bb3b 13175->13176 13177 160bdf7 2 API calls 13175->13177 13177->13176 13179 160be16 13178->13179 13183 160be48 13179->13183 13187 160be58 13179->13187 13180 160be26 13180->13164 13184 160be92 13183->13184 13185 160bebc RtlEncodePointer 13184->13185 13186 160bee5 13184->13186 13185->13186 13186->13180 13188 160be92 13187->13188 13189 160bebc RtlEncodePointer 13188->13189 13190 160bee5 13188->13190 13189->13190 13190->13180 13191 1606bb0 GetCurrentProcess 13192 1606c23 13191->13192 13193 1606c2a GetCurrentThread 13191->13193 13192->13193 13194 1606c60 13193->13194 13195 1606c67 GetCurrentProcess 13193->13195 13194->13195 13196 1606c9d 13195->13196 13197 1606cc5 GetCurrentThreadId 13196->13197 13198 1606cf6 13197->13198 13124 16053a8 13125 16053ce 13124->13125 13128 1603d04 13125->13128 13129 1603d0f 13128->13129 13130 1607a49 13129->13130 13132 1607a39 13129->13132 13133 1607a47 13130->13133 13144 16069c4 13130->13144 13136 1607b60 13132->13136 13140 1607b70 13132->13140 13138 1607b7e 13136->13138 13137 16069c4 CallWindowProcW 13137->13138 13138->13137 13139 1607c67 13138->13139 13139->13133 13142 1607b7e 13140->13142 13141 16069c4 CallWindowProcW 13141->13142 13142->13141 13143 1607c67 13142->13143 13143->13133 13145 16069cf 13144->13145 13146 1607d32 CallWindowProcW 13145->13146 13147 1607ce1 13145->13147 13146->13147 13147->13133 13199 1606dd8 DuplicateHandle 13200 1606e6e 13199->13200

                                                                        Control-flow Graph

                                                                        APIs
                                                                        • GetCurrentProcess.KERNEL32 ref: 01606C10
                                                                        • GetCurrentThread.KERNEL32 ref: 01606C4D
                                                                        • GetCurrentProcess.KERNEL32 ref: 01606C8A
                                                                        • GetCurrentThreadId.KERNEL32 ref: 01606CE3
                                                                        Memory Dump Source
                                                                        • Source File: 0000000C.00000002.613979712.0000000001600000.00000040.00000800.00020000.00000000.sdmp, Offset: 01600000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_12_2_1600000_b2.jbxd
                                                                        Similarity
                                                                        • API ID: Current$ProcessThread
                                                                        • String ID:
                                                                        • API String ID: 2063062207-0
                                                                        • Opcode ID: 0e42f0b584a2d6aa91774f1f732d6180dbf50c91047f206addadf33a52a0ad7a
                                                                        • Instruction ID: df1c2bf9152402ac8f2bd64e23a7c265d40a32102b97dccc1690f1d2d52619bd
                                                                        • Opcode Fuzzy Hash: 0e42f0b584a2d6aa91774f1f732d6180dbf50c91047f206addadf33a52a0ad7a
                                                                        • Instruction Fuzzy Hash: 255153B4E046498FDB14CFAADA88B9EBFF0EF48314F248459E409A7390D7346984CF65
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 683 16051e7-1605256 685 1605261-1605268 683->685 686 1605258-160525e 683->686 687 1605273-16052ab 685->687 688 160526a-1605270 685->688 686->685 689 16052b3-1605312 CreateWindowExW 687->689 688->687 690 1605314-160531a 689->690 691 160531b-1605353 689->691 690->691 695 1605360 691->695 696 1605355-1605358 691->696 697 1605361 695->697 696->695 697->697
                                                                        APIs
                                                                        • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 01605302
                                                                        Memory Dump Source
                                                                        • Source File: 0000000C.00000002.613979712.0000000001600000.00000040.00000800.00020000.00000000.sdmp, Offset: 01600000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_12_2_1600000_b2.jbxd
                                                                        Similarity
                                                                        • API ID: CreateWindow
                                                                        • String ID:
                                                                        • API String ID: 716092398-0
                                                                        • Opcode ID: 2f0c8025a82d601c47c7e5108aa84725ea1174facb4e113f081a0f1ad747ac45
                                                                        • Instruction ID: 7e890f0f9cd62aa7e26e45875af221a9e8e31bce5d8cd5c6f4f2e8bb33250461
                                                                        • Opcode Fuzzy Hash: 2f0c8025a82d601c47c7e5108aa84725ea1174facb4e113f081a0f1ad747ac45
                                                                        • Instruction Fuzzy Hash: 5051C1B1D04348DFDF19CF99C984ADEBBB5BF48310F24822AE819AB250D7749885CF90
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 698 16051f0-1605256 699 1605261-1605268 698->699 700 1605258-160525e 698->700 701 1605273-1605312 CreateWindowExW 699->701 702 160526a-1605270 699->702 700->699 704 1605314-160531a 701->704 705 160531b-1605353 701->705 702->701 704->705 709 1605360 705->709 710 1605355-1605358 705->710 711 1605361 709->711 710->709 711->711
                                                                        APIs
                                                                        • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 01605302
                                                                        Memory Dump Source
                                                                        • Source File: 0000000C.00000002.613979712.0000000001600000.00000040.00000800.00020000.00000000.sdmp, Offset: 01600000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_12_2_1600000_b2.jbxd
                                                                        Similarity
                                                                        • API ID: CreateWindow
                                                                        • String ID:
                                                                        • API String ID: 716092398-0
                                                                        • Opcode ID: 365db09bb5ec9f2ece9e50cf90cee96b9289f27fe366b2d974cc725429bb8630
                                                                        • Instruction ID: 7520742e723477c38551c574a7c4048906ef6c2311bb9b1c62caf6100e73727e
                                                                        • Opcode Fuzzy Hash: 365db09bb5ec9f2ece9e50cf90cee96b9289f27fe366b2d974cc725429bb8630
                                                                        • Instruction Fuzzy Hash: 4841C1B1D00309DFDF19CF99C984ADEBBB5BF48310F24822AE819AB250D7749885CF90
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 712 16069c4-1607cd4 715 1607d84-1607da4 call 1603d04 712->715 716 1607cda-1607cdf 712->716 723 1607da7-1607db4 715->723 718 1607ce1-1607d18 716->718 719 1607d32-1607d6a CallWindowProcW 716->719 726 1607d21-1607d30 718->726 727 1607d1a-1607d20 718->727 720 1607d73-1607d82 719->720 721 1607d6c-1607d72 719->721 720->723 721->720 726->723 727->726
                                                                        APIs
                                                                        • CallWindowProcW.USER32(?,?,?,?,?), ref: 01607D59
                                                                        Memory Dump Source
                                                                        • Source File: 0000000C.00000002.613979712.0000000001600000.00000040.00000800.00020000.00000000.sdmp, Offset: 01600000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_12_2_1600000_b2.jbxd
                                                                        Similarity
                                                                        • API ID: CallProcWindow
                                                                        • String ID:
                                                                        • API String ID: 2714655100-0
                                                                        • Opcode ID: b6e5b1562be8bc8f389d3c1ed9008c63b0462e9265144b05daad01eaf232e969
                                                                        • Instruction ID: 629fc46ed5e20f3960170d7ad1f66a39110767760dbd0b4640a513afb46b4d7f
                                                                        • Opcode Fuzzy Hash: b6e5b1562be8bc8f389d3c1ed9008c63b0462e9265144b05daad01eaf232e969
                                                                        • Instruction Fuzzy Hash: 5B415DB6A003059FDB19CF99C848AABBBF5FB88314F14C459D559AB351D330A945CFA0
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 729 1606dd3-1606e6c DuplicateHandle 730 1606e75-1606e92 729->730 731 1606e6e-1606e74 729->731 731->730
                                                                        APIs
                                                                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 01606E5F
                                                                        Memory Dump Source
                                                                        • Source File: 0000000C.00000002.613979712.0000000001600000.00000040.00000800.00020000.00000000.sdmp, Offset: 01600000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_12_2_1600000_b2.jbxd
                                                                        Similarity
                                                                        • API ID: DuplicateHandle
                                                                        • String ID:
                                                                        • API String ID: 3793708945-0
                                                                        • Opcode ID: f40a4d8649755840a3fe93968f65b0d27e602c57a7ba90bc7e7bac9d61693a15
                                                                        • Instruction ID: 493f37c21c452b51aaa03a5141a73854cb35d02e73c4714a85072bef4645c777
                                                                        • Opcode Fuzzy Hash: f40a4d8649755840a3fe93968f65b0d27e602c57a7ba90bc7e7bac9d61693a15
                                                                        • Instruction Fuzzy Hash: E321F3B5D04208EFDB10CFA9D984AEEBBF4FB48320F14851AE915A7350D378A954DF61
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 734 1606dd8-1606e6c DuplicateHandle 735 1606e75-1606e92 734->735 736 1606e6e-1606e74 734->736 736->735
                                                                        APIs
                                                                        • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 01606E5F
                                                                        Memory Dump Source
                                                                        • Source File: 0000000C.00000002.613979712.0000000001600000.00000040.00000800.00020000.00000000.sdmp, Offset: 01600000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_12_2_1600000_b2.jbxd
                                                                        Similarity
                                                                        • API ID: DuplicateHandle
                                                                        • String ID:
                                                                        • API String ID: 3793708945-0
                                                                        • Opcode ID: 5feb9040d7e0cef249db39dc54d51050231198dfbf7773f8b0bc3de3ebfca31e
                                                                        • Instruction ID: c4d027a38272657afa620178fab5aea1664ad0270a060e46df2530837946f157
                                                                        • Opcode Fuzzy Hash: 5feb9040d7e0cef249db39dc54d51050231198dfbf7773f8b0bc3de3ebfca31e
                                                                        • Instruction Fuzzy Hash: 8121D5B5D04208AFDB10CFA9D984ADEBBF8FB48324F14851AE914A7350D374A954DFA1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 739 160be48-160be9a call 160bf30 742 160bea0 739->742 743 160be9c-160be9e 739->743 744 160bea5-160beb0 742->744 743->744 745 160bf11-160bf1e 744->745 746 160beb2-160bee3 RtlEncodePointer 744->746 748 160bee5-160beeb 746->748 749 160beec-160bf0c 746->749 748->749 749->745
                                                                        APIs
                                                                        • RtlEncodePointer.NTDLL(00000000), ref: 0160BED2
                                                                        Memory Dump Source
                                                                        • Source File: 0000000C.00000002.613979712.0000000001600000.00000040.00000800.00020000.00000000.sdmp, Offset: 01600000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_12_2_1600000_b2.jbxd
                                                                        Similarity
                                                                        • API ID: EncodePointer
                                                                        • String ID:
                                                                        • API String ID: 2118026453-0
                                                                        • Opcode ID: 2828c52475a32ae7634f03268449ec2147a8f67b38dcad741be8f63ad7171600
                                                                        • Instruction ID: abcf782403fb603234e599dc852b7b3a986c3e27be723c58f6184c3773d3659e
                                                                        • Opcode Fuzzy Hash: 2828c52475a32ae7634f03268449ec2147a8f67b38dcad741be8f63ad7171600
                                                                        • Instruction Fuzzy Hash: 8C21B6B5904305CFDB20DFA9D8887DEBBF4FB49320F24886AD44AA7241C3396844CF61
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%

                                                                        Control-flow Graph

                                                                        • Executed
                                                                        • Not Executed
                                                                        control_flow_graph 752 160be58-160be89 753 160be92-160be9a 752->753 764 160be8c call 160bf30 752->764 755 160bea0 753->755 756 160be9c-160be9e 753->756 757 160bea5-160beb0 755->757 756->757 758 160bf11-160bf1e 757->758 759 160beb2-160bee3 RtlEncodePointer 757->759 761 160bee5-160beeb 759->761 762 160beec-160bf0c 759->762 761->762 762->758 764->753
                                                                        APIs
                                                                        • RtlEncodePointer.NTDLL(00000000), ref: 0160BED2
                                                                        Memory Dump Source
                                                                        • Source File: 0000000C.00000002.613979712.0000000001600000.00000040.00000800.00020000.00000000.sdmp, Offset: 01600000, based on PE: false
                                                                        Joe Sandbox IDA Plugin
                                                                        • Snapshot File: hcaresult_12_2_1600000_b2.jbxd
                                                                        Similarity
                                                                        • API ID: EncodePointer
                                                                        • String ID:
                                                                        • API String ID: 2118026453-0
                                                                        • Opcode ID: 75ef946efdbd68ccdd33d9da58254eb60df1399f21f1bb36be7a98fab6d2198e
                                                                        • Instruction ID: 1afc5b461c8b5413a4705206693d656f39cabef26401a95e0e8ec5c22ddebe1b
                                                                        • Opcode Fuzzy Hash: 75ef946efdbd68ccdd33d9da58254eb60df1399f21f1bb36be7a98fab6d2198e
                                                                        • Instruction Fuzzy Hash: D8116AB5900309CFDB20EFA9D94879EBBF8EB48324F24C52AD509A7740D7396944CFA1
                                                                        Uniqueness

                                                                        Uniqueness Score: -1.00%