Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample Name:file.exe
Analysis ID:789744
MD5:56aa80bac2e533ee3332e29ed33a144c
SHA1:72e9c9b07b5dbfe3a7fa8a2fb2f4df1526cc5a67
SHA256:6d8503cf760a86e245dde67d8ba7e338806cb0eef0d94c1904cbf84ec9e4e96e
Tags:NETexeMSIL
Infos:

Detection

AgentTesla
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected AgentTesla
Yara detected AntiVM3
Tries to steal Mail credentials (via file / registry access)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Machine Learning detection for sample
May check the online IP address of the machine
.NET source code contains potential unpacker
Injects a PE file into a foreign processes
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Antivirus or Machine Learning detection for unpacked file
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Yara detected Credential Stealer
JA3 SSL client fingerprint seen in connection with other malware
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Sample file is different than original file name gathered from version info
Uses a known web browser user agent for HTTP communication
Detected TCP or UDP traffic on non-standard ports
Binary contains a suspicious time stamp
Uses SMTP (mail sending)
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64
  • file.exe (PID: 4860 cmdline: C:\Users\user\Desktop\file.exe MD5: 56AA80BAC2E533EE3332E29ED33A144C)
    • file.exe (PID: 5048 cmdline: C:\Users\user\Desktop\file.exe MD5: 56AA80BAC2E533EE3332E29ED33A144C)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
00000000.00000002.320656667.0000000002E16000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
    00000001.00000002.576651714.0000000002C5C000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
      00000001.00000002.576651714.0000000002C5C000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        Process Memory Space: file.exe PID: 4860JoeSecurity_AntiVM_3Yara detected AntiVM_3Joe Security
          Process Memory Space: file.exe PID: 5048JoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
            Click to see the 1 entries
            No Sigma rule has matched
            No Snort rule has matched

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: file.exeReversingLabs: Detection: 69%
            Source: file.exeVirustotal: Detection: 71%Perma Link
            Source: file.exeJoe Sandbox ML: detected
            Source: 1.2.file.exe.400000.0.unpackAvira: Label: TR/Spy.Gen8
            Source: file.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: unknownHTTPS traffic detected: 64.185.227.155:443 -> 192.168.2.4:49695 version: TLS 1.2
            Source: file.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

            Networking

            barindex
            Source: C:\Users\user\Desktop\file.exeDNS query: name: api.ipify.org
            Source: C:\Users\user\Desktop\file.exeDNS query: name: api.ipify.org
            Source: C:\Users\user\Desktop\file.exeDNS query: name: api.ipify.org
            Source: C:\Users\user\Desktop\file.exeDNS query: name: api.ipify.org
            Source: C:\Users\user\Desktop\file.exeDNS query: name: api.ipify.org
            Source: C:\Users\user\Desktop\file.exeDNS query: name: api.ipify.org
            Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
            Source: Joe Sandbox ViewIP Address: 64.185.227.155 64.185.227.155
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
            Source: global trafficTCP traffic: 192.168.2.4:49696 -> 185.118.171.10:587
            Source: global trafficTCP traffic: 192.168.2.4:49696 -> 185.118.171.10:587
            Source: unknownNetwork traffic detected: HTTP traffic on port 49695 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49695
            Source: file.exe, 00000001.00000002.580691613.0000000006553000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000001.00000003.551500451.000000000654B000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000001.00000003.550223240.0000000006558000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000001.00000002.576651714.0000000002C5C000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000001.00000003.551500451.0000000006546000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl04
            Source: file.exe, 00000001.00000002.580557481.0000000006520000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000001.00000002.580691613.0000000006553000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000001.00000003.551500451.000000000654B000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000001.00000003.550223240.0000000006558000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000001.00000002.576651714.0000000002C5C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/COMODORSACertificationAuthority.crl0q
            Source: file.exe, 00000001.00000002.580691613.0000000006553000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000001.00000003.551500451.000000000654B000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000001.00000003.550223240.0000000006558000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000001.00000002.576651714.0000000002C5C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/cPanelIncCertificationAuthority.crl0
            Source: file.exe, 00000001.00000002.576651714.0000000002C5C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://mail.panservis.rs
            Source: file.exe, 00000001.00000002.580557481.0000000006520000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000001.00000002.580691613.0000000006553000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000001.00000003.551500451.000000000654B000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000001.00000003.550223240.0000000006558000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000001.00000002.576651714.0000000002C5C000.00000004.00000800.00020000.00000000.sdmp, file.exe, 00000001.00000003.551500451.0000000006546000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ocsp.comodoca.com0
            Source: file.exe, 00000001.00000002.576651714.0000000002C5C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://panservis.rs
            Source: file.exe, 00000001.00000002.576651714.0000000002C11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
            Source: file.exe, 00000001.00000002.576651714.0000000002C11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org
            Source: file.exe, 00000001.00000002.576651714.0000000002C11000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
            Source: file.exe, 00000001.00000002.580691613.0000000006553000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000001.00000003.551500451.000000000654B000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000001.00000003.550223240.0000000006558000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000001.00000002.576651714.0000000002C5C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://sectigo.com/CPS0
            Source: unknownDNS traffic detected: queries for: api.ipify.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
            Source: unknownHTTPS traffic detected: 64.185.227.155:443 -> 192.168.2.4:49695 version: TLS 1.2
            Source: file.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_028EC93C0_2_028EC93C
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_028EF3D80_2_028EF3D8
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_028EF3D60_2_028EF3D6
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_051054080_2_05105408
            Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0510960A0_2_0510960A
            Source: C:\Users\user\Desktop\file.exeCode function: 1_2_05109DC01_2_05109DC0
            Source: C:\Users\user\Desktop\file.exeCode function: 1_2_0510C9981_2_0510C998
            Source: C:\Users\user\Desktop\file.exeCode function: 1_2_0510A9D81_2_0510A9D8
            Source: C:\Users\user\Desktop\file.exeCode function: 1_2_0510A1081_2_0510A108
            Source: C:\Users\user\Desktop\file.exeCode function: 1_2_067F52281_2_067F5228
            Source: C:\Users\user\Desktop\file.exeCode function: 1_2_067FB7A81_2_067FB7A8
            Source: C:\Users\user\Desktop\file.exeCode function: 1_2_067F61F81_2_067F61F8
            Source: C:\Users\user\Desktop\file.exeCode function: 1_2_067F87B81_2_067F87B8
            Source: C:\Users\user\Desktop\file.exeCode function: 1_2_0699F4981_2_0699F498
            Source: C:\Users\user\Desktop\file.exeCode function: 1_2_0699A1F41_2_0699A1F4
            Source: C:\Users\user\Desktop\file.exeCode function: 1_2_0699EB181_2_0699EB18
            Source: file.exe, 00000000.00000000.310854296.00000000007EA000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameDGCe.exeB vs file.exe
            Source: file.exe, 00000000.00000002.324705992.0000000003D85000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCollins.dll8 vs file.exe
            Source: file.exe, 00000000.00000002.324705992.0000000004069000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename857b26fb-aee6-4707-9f23-eb8bcc8db6cb.exe4 vs file.exe
            Source: file.exe, 00000000.00000002.332311683.0000000005C60000.00000004.08000000.00040000.00000000.sdmpBinary or memory string: OriginalFilenameCollins.dll8 vs file.exe
            Source: file.exe, 00000000.00000002.320656667.0000000002A81000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilenameTigra.dll. vs file.exe
            Source: file.exe, 00000000.00000002.320656667.0000000002E16000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: OriginalFilename857b26fb-aee6-4707-9f23-eb8bcc8db6cb.exe4 vs file.exe
            Source: file.exe, 00000001.00000002.575763583.000000000042C000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilename857b26fb-aee6-4707-9f23-eb8bcc8db6cb.exe4 vs file.exe
            Source: file.exe, 00000001.00000002.575948942.0000000000D59000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs file.exe
            Source: file.exeBinary or memory string: OriginalFilenameDGCe.exeB vs file.exe
            Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: file.exeReversingLabs: Detection: 69%
            Source: file.exeVirustotal: Detection: 71%
            Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\file.exe C:\Users\user\Desktop\file.exe
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\Desktop\file.exe C:\Users\user\Desktop\file.exe
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\Desktop\file.exe C:\Users\user\Desktop\file.exeJump to behavior
            Source: C:\Users\user\Desktop\file.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
            Source: C:\Users\user\Desktop\file.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Users\user\Desktop\file.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
            Source: C:\Users\user\Desktop\file.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\file.exe.logJump to behavior
            Source: classification engineClassification label: mal100.troj.spyw.evad.winEXE@3/1@5/3
            Source: file.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
            Source: C:\Users\user\Desktop\file.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
            Source: C:\Users\user\Desktop\file.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
            Source: C:\Users\user\Desktop\file.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Users\user\Desktop\file.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Users\user\Desktop\file.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Users\user\Desktop\file.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Users\user\Desktop\file.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
            Source: C:\Users\user\Desktop\file.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
            Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
            Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
            Source: file.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG

            Data Obfuscation

            barindex
            Source: file.exe, Form1.cs.Net Code: InitializeComponent System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
            Source: 0.0.file.exe.740000.0.unpack, Form1.cs.Net Code: InitializeComponent System.Reflection.Assembly System.AppDomain::Load(System.Byte[])
            Source: C:\Users\user\Desktop\file.exeCode function: 1_2_067FA44F push es; ret 1_2_067FA460
            Source: C:\Users\user\Desktop\file.exeCode function: 1_2_067FA0B4 pushad ; retf 06CCh1_2_067FB5F5
            Source: file.exeStatic PE information: 0xA0EB22FE [Wed Jul 21 06:34:38 2055 UTC]
            Source: initial sampleStatic PE information: section name: .text entropy: 7.434153888262794
            Source: C:\Users\user\Desktop\file.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: Yara matchFile source: 00000000.00000002.320656667.0000000002E16000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: file.exe PID: 4860, type: MEMORYSTR
            Source: file.exe, 00000000.00000002.320656667.0000000002E16000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: SBIEDLL.DLL
            Source: file.exe, 00000000.00000002.320656667.0000000002E16000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: KERNEL32.DLL.WINE_GET_UNIX_FILE_NAME
            Source: C:\Users\user\Desktop\file.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
            Source: C:\Users\user\Desktop\file.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
            Source: C:\Users\user\Desktop\file.exe TID: 4624Thread sleep time: -37665s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\file.exe TID: 2788Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\file.exe TID: 5336Thread sleep count: 4415 > 30Jump to behavior
            Source: C:\Users\user\Desktop\file.exe TID: 1012Thread sleep time: -14757395258967632s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\file.exe TID: 1012Thread sleep time: -100000s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\file.exe TID: 1012Thread sleep time: -99843s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\file.exe TID: 1012Thread sleep time: -99729s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\file.exe TID: 1012Thread sleep time: -99610s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\file.exe TID: 1012Thread sleep time: -99488s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\file.exe TID: 1012Thread sleep time: -99344s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\file.exe TID: 1012Thread sleep time: -99234s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\file.exe TID: 1012Thread sleep time: -99125s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\file.exe TID: 1012Thread sleep time: -98999s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\file.exe TID: 1012Thread sleep time: -98891s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\file.exe TID: 1012Thread sleep time: -98781s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\file.exe TID: 1012Thread sleep time: -98670s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\file.exe TID: 1012Thread sleep time: -98562s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\file.exe TID: 1012Thread sleep time: -98445s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\file.exe TID: 1012Thread sleep time: -98328s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\file.exe TID: 1012Thread sleep time: -98219s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\file.exe TID: 1012Thread sleep time: -98083s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\file.exe TID: 1012Thread sleep time: -97938s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\file.exe TID: 1012Thread sleep time: -97797s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\file.exe TID: 1012Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\file.exeWindow / User API: threadDelayed 4415Jump to behavior
            Source: C:\Users\user\Desktop\file.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Users\user\Desktop\file.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_Processor
            Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 37665Jump to behavior
            Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 100000Jump to behavior
            Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 99843Jump to behavior
            Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 99729Jump to behavior
            Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 99610Jump to behavior
            Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 99488Jump to behavior
            Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 99344Jump to behavior
            Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 99234Jump to behavior
            Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 99125Jump to behavior
            Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 98999Jump to behavior
            Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 98891Jump to behavior
            Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 98781Jump to behavior
            Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 98670Jump to behavior
            Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 98562Jump to behavior
            Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 98445Jump to behavior
            Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 98328Jump to behavior
            Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 98219Jump to behavior
            Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 98083Jump to behavior
            Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 97938Jump to behavior
            Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 97797Jump to behavior
            Source: C:\Users\user\Desktop\file.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: file.exe, 00000000.00000002.320656667.0000000002E16000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: InstallPathJC:\PROGRAM FILES\VMWARE\VMWARE TOOLS\
            Source: file.exe, 00000000.00000002.320656667.0000000002E16000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: vmware
            Source: file.exe, 00000000.00000002.320656667.0000000002E16000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMware SVGA II
            Source: file.exe, 00000000.00000002.320656667.0000000002E16000.00000004.00000800.00020000.00000000.sdmpBinary or memory string: VMWAREDSOFTWARE\VMware, Inc.\VMware Tools
            Source: C:\Users\user\Desktop\file.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\Desktop\file.exeMemory allocated: page read and write | page guardJump to behavior

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Users\user\Desktop\file.exeMemory written: C:\Users\user\Desktop\file.exe base: 400000 value starts with: 4D5AJump to behavior
            Source: C:\Users\user\Desktop\file.exeProcess created: C:\Users\user\Desktop\file.exe C:\Users\user\Desktop\file.exeJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\file.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
            Source: C:\Users\user\Desktop\file.exeCode function: 1_2_0510F6F0 GetUserNameW,1_2_0510F6F0

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 00000001.00000002.576651714.0000000002C5C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: file.exe PID: 5048, type: MEMORYSTR
            Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
            Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
            Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
            Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
            Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
            Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
            Source: C:\Users\user\Desktop\file.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
            Source: Yara matchFile source: 00000001.00000002.576651714.0000000002C5C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: file.exe PID: 5048, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: 00000001.00000002.576651714.0000000002C5C000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: file.exe PID: 5048, type: MEMORYSTR
            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
            Valid Accounts211
            Windows Management Instrumentation
            Path Interception111
            Process Injection
            1
            Disable or Modify Tools
            1
            OS Credential Dumping
            1
            Account Discovery
            Remote Services1
            Archive Collected Data
            Exfiltration Over Other Network Medium1
            Ingress Tool Transfer
            Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
            Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts2
            Obfuscated Files or Information
            1
            Credentials in Registry
            114
            System Information Discovery
            Remote Desktop Protocol1
            Data from Local System
            Exfiltration Over Bluetooth11
            Encrypted Channel
            Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
            Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)13
            Software Packing
            Security Account Manager1
            Query Registry
            SMB/Windows Admin Shares1
            Email Collection
            Automated Exfiltration1
            Non-Standard Port
            Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
            Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
            Timestomp
            NTDS211
            Security Software Discovery
            Distributed Component Object ModelInput CaptureScheduled Transfer2
            Non-Application Layer Protocol
            SIM Card SwapCarrier Billing Fraud
            Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
            Masquerading
            LSA Secrets131
            Virtualization/Sandbox Evasion
            SSHKeyloggingData Transfer Size Limits23
            Application Layer Protocol
            Manipulate Device CommunicationManipulate App Store Rankings or Ratings
            Replication Through Removable MediaLaunchdRc.commonRc.common131
            Virtualization/Sandbox Evasion
            Cached Domain Credentials1
            Application Window Discovery
            VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
            External Remote ServicesScheduled TaskStartup ItemsStartup Items111
            Process Injection
            DCSync1
            System Owner/User Discovery
            Windows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
            Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/JobIndicator Removal from ToolsProc Filesystem1
            Remote System Discovery
            Shared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue
            Exploit Public-Facing ApplicationPowerShellAt (Linux)At (Linux)Masquerading/etc/passwd and /etc/shadow1
            System Network Configuration Discovery
            Software Deployment ToolsData StagedExfiltration Over Asymmetric Encrypted Non-C2 ProtocolWeb ProtocolsRogue Cellular Base StationData Destruction
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            file.exe69%ReversingLabsWin32.Trojan.Leonem
            file.exe71%VirustotalBrowse
            file.exe100%Joe Sandbox ML
            No Antivirus matches
            SourceDetectionScannerLabelLinkDownload
            1.2.file.exe.400000.0.unpack100%AviraTR/Spy.Gen8Download File
            SourceDetectionScannerLabelLink
            panservis.rs0%VirustotalBrowse
            mail.panservis.rs0%VirustotalBrowse
            SourceDetectionScannerLabelLink
            https://sectigo.com/CPS00%URL Reputationsafe
            http://mail.panservis.rs0%VirustotalBrowse
            http://panservis.rs0%VirustotalBrowse
            http://mail.panservis.rs0%Avira URL Cloudsafe
            http://panservis.rs0%Avira URL Cloudsafe
            NameIPActiveMaliciousAntivirus DetectionReputation
            panservis.rs
            185.118.171.10
            truefalseunknown
            api4.ipify.org
            64.185.227.155
            truefalse
              high
              api.ipify.org
              unknown
              unknownfalse
                high
                mail.panservis.rs
                unknown
                unknownfalseunknown
                NameMaliciousAntivirus DetectionReputation
                https://api.ipify.org/false
                  high
                  NameSourceMaliciousAntivirus DetectionReputation
                  https://api.ipify.orgfile.exe, 00000001.00000002.576651714.0000000002C11000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    https://sectigo.com/CPS0file.exe, 00000001.00000002.580691613.0000000006553000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000001.00000003.551500451.000000000654B000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000001.00000003.550223240.0000000006558000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000001.00000002.576651714.0000000002C5C000.00000004.00000800.00020000.00000000.sdmpfalse
                    • URL Reputation: safe
                    unknown
                    http://mail.panservis.rsfile.exe, 00000001.00000002.576651714.0000000002C5C000.00000004.00000800.00020000.00000000.sdmpfalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/namefile.exe, 00000001.00000002.576651714.0000000002C11000.00000004.00000800.00020000.00000000.sdmpfalse
                      high
                      http://panservis.rsfile.exe, 00000001.00000002.576651714.0000000002C5C000.00000004.00000800.00020000.00000000.sdmpfalse
                      • 0%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      • No. of IPs < 25%
                      • 25% < No. of IPs < 50%
                      • 50% < No. of IPs < 75%
                      • 75% < No. of IPs
                      IPDomainCountryFlagASNASN NameMalicious
                      185.118.171.10
                      panservis.rsSerbia
                      203877ASTRATELEKOMRSfalse
                      64.185.227.155
                      api4.ipify.orgUnited States
                      18450WEBNXUSfalse
                      IP
                      192.168.2.1
                      Joe Sandbox Version:36.0.0 Rainbow Opal
                      Analysis ID:789744
                      Start date and time:2023-01-23 14:52:29 +01:00
                      Joe Sandbox Product:CloudBasic
                      Overall analysis duration:0h 10m 10s
                      Hypervisor based Inspection enabled:false
                      Report type:full
                      Sample file name:file.exe
                      Cookbook file name:default.jbs
                      Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                      Number of analysed new started processes analysed:7
                      Number of new started drivers analysed:0
                      Number of existing processes analysed:0
                      Number of existing drivers analysed:0
                      Number of injected processes analysed:0
                      Technologies:
                      • HCA enabled
                      • EGA enabled
                      • HDC enabled
                      • AMSI enabled
                      Analysis Mode:default
                      Analysis stop reason:Timeout
                      Detection:MAL
                      Classification:mal100.troj.spyw.evad.winEXE@3/1@5/3
                      EGA Information:
                      • Successful, ratio: 100%
                      HDC Information:Failed
                      HCA Information:
                      • Successful, ratio: 99%
                      • Number of executed functions: 39
                      • Number of non-executed functions: 4
                      Cookbook Comments:
                      • Found application associated with file extension: .exe
                      • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, WMIADAP.exe, conhost.exe, backgroundTaskHost.exe
                      • Not all processes where analyzed, report is missing behavior information
                      • Report creation exceeded maximum time and may have missing disassembly code information.
                      • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                      • Report size getting too big, too many NtOpenKeyEx calls found.
                      • Report size getting too big, too many NtProtectVirtualMemory calls found.
                      • Report size getting too big, too many NtQueryValueKey calls found.
                      TimeTypeDescription
                      14:53:29API Interceptor20x Sleep call for process: file.exe modified
                      MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                      185.118.171.104dxXH2RAM2.exeGet hashmaliciousBrowse
                        file.exeGet hashmaliciousBrowse
                          64.185.227.155file.exeGet hashmaliciousBrowse
                          • api.ipify.org/?format=wef
                          48PTRR4pVY.exeGet hashmaliciousBrowse
                          • api.ipify.org/?format=qwd
                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                          api4.ipify.orgfile.exeGet hashmaliciousBrowse
                          • 64.185.227.155
                          message.htmlGet hashmaliciousBrowse
                          • 64.185.227.155
                          NEW OFER LIST 2023_01_23.exeGet hashmaliciousBrowse
                          • 64.185.227.155
                          profoma invoice.exeGet hashmaliciousBrowse
                          • 64.185.227.155
                          KPCPU-231.exeGet hashmaliciousBrowse
                          • 64.185.227.155
                          message.htmlGet hashmaliciousBrowse
                          • 64.185.227.155
                          Pagamento jpg.exeGet hashmaliciousBrowse
                          • 64.185.227.155
                          DHL Express Shipment Documents.exeGet hashmaliciousBrowse
                          • 64.185.227.155
                          Orden de compra_PDF.GZ.exeGet hashmaliciousBrowse
                          • 64.185.227.155
                          PI_NBI-2230123(MECH)_pdf.exeGet hashmaliciousBrowse
                          • 64.185.227.155
                          SOA.exeGet hashmaliciousBrowse
                          • 64.185.227.155
                          QUOTATION.exeGet hashmaliciousBrowse
                          • 64.185.227.155
                          AWB 907853880911 PRE-ALRET.xlsGet hashmaliciousBrowse
                          • 64.185.227.155
                          Contract Analysis 20230119216.xlsGet hashmaliciousBrowse
                          • 64.185.227.155
                          Maerskline shipping Doc..exeGet hashmaliciousBrowse
                          • 64.185.227.155
                          Halkbank_Ekstre_20230120_08.pdf.exeGet hashmaliciousBrowse
                          • 64.185.227.155
                          5x4TtmkPxl.exeGet hashmaliciousBrowse
                          • 64.185.227.155
                          e-dekont-20230120-.exeGet hashmaliciousBrowse
                          • 64.185.227.155
                          DHL56789341SHIPMENT.exeGet hashmaliciousBrowse
                          • 64.185.227.155
                          DHL Validation.exeGet hashmaliciousBrowse
                          • 64.185.227.155
                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                          ASTRATELEKOMRS4dxXH2RAM2.exeGet hashmaliciousBrowse
                          • 185.118.171.10
                          file.exeGet hashmaliciousBrowse
                          • 185.118.171.10
                          eyjlIAxLom.elfGet hashmaliciousBrowse
                          • 109.94.117.186
                          z8QWD02El3.elfGet hashmaliciousBrowse
                          • 85.202.112.208
                          apep.x86Get hashmaliciousBrowse
                          • 109.94.117.187
                          mkRkjGXjDJGet hashmaliciousBrowse
                          • 62.241.1.210
                          dark.arm6Get hashmaliciousBrowse
                          • 62.240.15.200
                          WEBNXUSfile.exeGet hashmaliciousBrowse
                          • 64.185.227.155
                          message.htmlGet hashmaliciousBrowse
                          • 64.185.227.155
                          NEW OFER LIST 2023_01_23.exeGet hashmaliciousBrowse
                          • 64.185.227.155
                          profoma invoice.exeGet hashmaliciousBrowse
                          • 64.185.227.155
                          KPCPU-231.exeGet hashmaliciousBrowse
                          • 64.185.227.155
                          message.htmlGet hashmaliciousBrowse
                          • 64.185.227.155
                          Pagamento jpg.exeGet hashmaliciousBrowse
                          • 64.185.227.155
                          DHL Express Shipment Documents.exeGet hashmaliciousBrowse
                          • 64.185.227.155
                          Orden de compra_PDF.GZ.exeGet hashmaliciousBrowse
                          • 64.185.227.155
                          PI_NBI-2230123(MECH)_pdf.exeGet hashmaliciousBrowse
                          • 64.185.227.155
                          https://file10.gofile.io/download/f64c8d71-6572-43c5-94ad-c5b224d8fbe6/Lucia%20Javorcekova.zipGet hashmaliciousBrowse
                          • 67.220.228.201
                          SOA.exeGet hashmaliciousBrowse
                          • 64.185.227.155
                          QUOTATION.exeGet hashmaliciousBrowse
                          • 64.185.227.155
                          AWB 907853880911 PRE-ALRET.xlsGet hashmaliciousBrowse
                          • 64.185.227.155
                          Contract Analysis 20230119216.xlsGet hashmaliciousBrowse
                          • 64.185.227.155
                          Maerskline shipping Doc..exeGet hashmaliciousBrowse
                          • 64.185.227.155
                          Halkbank_Ekstre_20230120_08.pdf.exeGet hashmaliciousBrowse
                          • 64.185.227.155
                          e-dekont-20230120-.exeGet hashmaliciousBrowse
                          • 64.185.227.155
                          DHL56789341SHIPMENT.exeGet hashmaliciousBrowse
                          • 64.185.227.155
                          DHL Validation.exeGet hashmaliciousBrowse
                          • 64.185.227.155
                          MatchAssociated Sample Name / URLSHA 256DetectionLinkContext
                          3b5074b1b5d032e5620f69f9f700ff0efile.exeGet hashmaliciousBrowse
                          • 64.185.227.155
                          Shipping Details_PDF.exeGet hashmaliciousBrowse
                          • 64.185.227.155
                          NEW OFER LIST 2023_01_23.exeGet hashmaliciousBrowse
                          • 64.185.227.155
                          ac36e4bd21762b111edf4758873dfb1697462e7b08f19.exeGet hashmaliciousBrowse
                          • 64.185.227.155
                          shipping document PL&BL draft.exeGet hashmaliciousBrowse
                          • 64.185.227.155
                          PO.exeGet hashmaliciousBrowse
                          • 64.185.227.155
                          Purchase order.exeGet hashmaliciousBrowse
                          • 64.185.227.155
                          profoma invoice.exeGet hashmaliciousBrowse
                          • 64.185.227.155
                          KPCPU-231.exeGet hashmaliciousBrowse
                          • 64.185.227.155
                          file.exeGet hashmaliciousBrowse
                          • 64.185.227.155
                          Pagamento jpg.exeGet hashmaliciousBrowse
                          • 64.185.227.155
                          DHL Express Shipment Documents.exeGet hashmaliciousBrowse
                          • 64.185.227.155
                          Fatura_SUN2023000001661,pdf.exeGet hashmaliciousBrowse
                          • 64.185.227.155
                          Orden de compra_PDF.GZ.exeGet hashmaliciousBrowse
                          • 64.185.227.155
                          PI_NBI-2230123(MECH)_pdf.exeGet hashmaliciousBrowse
                          • 64.185.227.155
                          Masters breakdown.exeGet hashmaliciousBrowse
                          • 64.185.227.155
                          HEUR-Trojan.Win32.Crypt.gen-cd53d44c68b4b58f8.exeGet hashmaliciousBrowse
                          • 64.185.227.155
                          file.exeGet hashmaliciousBrowse
                          • 64.185.227.155
                          SOA.exeGet hashmaliciousBrowse
                          • 64.185.227.155
                          file.exeGet hashmaliciousBrowse
                          • 64.185.227.155
                          No context
                          Process:C:\Users\user\Desktop\file.exe
                          File Type:ASCII text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):1216
                          Entropy (8bit):5.355304211458859
                          Encrypted:false
                          SSDEEP:24:MLUE4K5E4Ks2E1qE4qXKDE4KhK3VZ9pKhPKIE4oKFKHKoZAE4Kzr7FE4x84j:MIHK5HKXE1qHiYHKhQnoPtHoxHhAHKzr
                          MD5:FED34146BF2F2FA59DCF8702FCC8232E
                          SHA1:B03BFEA175989D989850CF06FE5E7BBF56EAA00A
                          SHA-256:123BE4E3590609A008E85501243AF5BC53FA0C26C82A92881B8879524F8C0D5C
                          SHA-512:1CC89F2ED1DBD70628FA1DC41A32BA0BFA3E81EAE1A1CF3C5F6A48F2DA0BF1F21A5001B8A18B04043C5B8FE4FBE663068D86AA8C4BD8E17933F75687C3178FF6
                          Malicious:true
                          Reputation:high, very likely benign file
                          Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\4f0a7eefa3cd3e0ba98b5ebddbbc72e6\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\f1d8480152e0da9a60ad49c6d16a3b6d\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\8d67d92724ba494b6c7fd089d6f25b48\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\b219d4630d26b88041b59c21
                          File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Entropy (8bit):7.427802610080807
                          TrID:
                          • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                          • Win32 Executable (generic) a (10002005/4) 49.75%
                          • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                          • Windows Screen Saver (13104/52) 0.07%
                          • Generic Win/DOS Executable (2004/3) 0.01%
                          File name:file.exe
                          File size:683520
                          MD5:56aa80bac2e533ee3332e29ed33a144c
                          SHA1:72e9c9b07b5dbfe3a7fa8a2fb2f4df1526cc5a67
                          SHA256:6d8503cf760a86e245dde67d8ba7e338806cb0eef0d94c1904cbf84ec9e4e96e
                          SHA512:d115007801110a5a7918ee14433324c1613422d58be0a0218c0557d1347ce9424a5511b828c744371bc28ec719e4e83fffef76b08b7eaefe1292f30f132e74a5
                          SSDEEP:12288:60mTl0nu0bmfMwrEHjPW8ObRYb/XTYD6t1JpRiD+coYx:tmTl03AQObRYbXTY67JR1Yx
                          TLSH:FEE45A415A7B87E2E4F94E78163CA51827A51CD147ACA13EBD867DBE8CE730F0095B23
                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...."................0..f............... ........@.. ....................................@................................
                          Icon Hash:00828e8e8686b000
                          Entrypoint:0x4a849e
                          Entrypoint Section:.text
                          Digitally signed:false
                          Imagebase:0x400000
                          Subsystem:windows gui
                          Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                          DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                          Time Stamp:0xA0EB22FE [Wed Jul 21 06:34:38 2055 UTC]
                          TLS Callbacks:
                          CLR (.Net) Version:
                          OS Version Major:4
                          OS Version Minor:0
                          File Version Major:4
                          File Version Minor:0
                          Subsystem Version Major:4
                          Subsystem Version Minor:0
                          Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                          Instruction
                          jmp dword ptr [00402000h]
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          NameVirtual AddressVirtual Size Is in Section
                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IMPORT0xa844c0x4f.text
                          IMAGE_DIRECTORY_ENTRY_RESOURCE0xaa0000x398.rsrc
                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                          IMAGE_DIRECTORY_ENTRY_BASERELOC0xac0000xc.reloc
                          IMAGE_DIRECTORY_ENTRY_DEBUG0xa84300x1c.text
                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                          NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                          .text0x20000xa64a40xa6600False0.7228264697595793data7.434153888262794IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                          .rsrc0xaa0000x3980x400False0.3828125data2.9191344780314394IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          .reloc0xac0000xc0x200False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                          NameRVASizeTypeLanguageCountry
                          RT_VERSION0xaa0580x33cdata
                          DLLImport
                          mscoree.dll_CorExeMain
                          TimestampSource PortDest PortSource IPDest IP
                          Jan 23, 2023 14:53:32.772443056 CET49695443192.168.2.464.185.227.155
                          Jan 23, 2023 14:53:32.772521019 CET4434969564.185.227.155192.168.2.4
                          Jan 23, 2023 14:53:32.772697926 CET49695443192.168.2.464.185.227.155
                          Jan 23, 2023 14:53:32.823849916 CET49695443192.168.2.464.185.227.155
                          Jan 23, 2023 14:53:32.823899031 CET4434969564.185.227.155192.168.2.4
                          Jan 23, 2023 14:53:33.143074989 CET4434969564.185.227.155192.168.2.4
                          Jan 23, 2023 14:53:33.143163919 CET49695443192.168.2.464.185.227.155
                          Jan 23, 2023 14:53:33.151318073 CET49695443192.168.2.464.185.227.155
                          Jan 23, 2023 14:53:33.151354074 CET4434969564.185.227.155192.168.2.4
                          Jan 23, 2023 14:53:33.151798964 CET4434969564.185.227.155192.168.2.4
                          Jan 23, 2023 14:53:33.199031115 CET49695443192.168.2.464.185.227.155
                          Jan 23, 2023 14:53:33.433315992 CET49695443192.168.2.464.185.227.155
                          Jan 23, 2023 14:53:33.433403969 CET4434969564.185.227.155192.168.2.4
                          Jan 23, 2023 14:53:33.532294035 CET4434969564.185.227.155192.168.2.4
                          Jan 23, 2023 14:53:33.532406092 CET4434969564.185.227.155192.168.2.4
                          Jan 23, 2023 14:53:33.532484055 CET49695443192.168.2.464.185.227.155
                          Jan 23, 2023 14:53:33.533828974 CET49695443192.168.2.464.185.227.155
                          Jan 23, 2023 14:53:39.917479992 CET49696587192.168.2.4185.118.171.10
                          Jan 23, 2023 14:53:39.953246117 CET58749696185.118.171.10192.168.2.4
                          Jan 23, 2023 14:53:39.953380108 CET49696587192.168.2.4185.118.171.10
                          Jan 23, 2023 14:53:40.076312065 CET58749696185.118.171.10192.168.2.4
                          Jan 23, 2023 14:53:40.077370882 CET49696587192.168.2.4185.118.171.10
                          Jan 23, 2023 14:53:40.113017082 CET58749696185.118.171.10192.168.2.4
                          Jan 23, 2023 14:53:40.114219904 CET49696587192.168.2.4185.118.171.10
                          Jan 23, 2023 14:53:40.152295113 CET58749696185.118.171.10192.168.2.4
                          Jan 23, 2023 14:53:40.154000998 CET49696587192.168.2.4185.118.171.10
                          Jan 23, 2023 14:53:40.196729898 CET58749696185.118.171.10192.168.2.4
                          Jan 23, 2023 14:53:40.196804047 CET58749696185.118.171.10192.168.2.4
                          Jan 23, 2023 14:53:40.196855068 CET58749696185.118.171.10192.168.2.4
                          Jan 23, 2023 14:53:40.196897984 CET58749696185.118.171.10192.168.2.4
                          Jan 23, 2023 14:53:40.196983099 CET49696587192.168.2.4185.118.171.10
                          Jan 23, 2023 14:53:40.197041035 CET49696587192.168.2.4185.118.171.10
                          Jan 23, 2023 14:53:40.198914051 CET58749696185.118.171.10192.168.2.4
                          Jan 23, 2023 14:53:40.246535063 CET49696587192.168.2.4185.118.171.10
                          Jan 23, 2023 14:53:40.282092094 CET49696587192.168.2.4185.118.171.10
                          Jan 23, 2023 14:53:40.320163012 CET58749696185.118.171.10192.168.2.4
                          Jan 23, 2023 14:53:40.328334093 CET49696587192.168.2.4185.118.171.10
                          Jan 23, 2023 14:53:40.363831043 CET58749696185.118.171.10192.168.2.4
                          Jan 23, 2023 14:53:40.377609015 CET49696587192.168.2.4185.118.171.10
                          Jan 23, 2023 14:53:40.413551092 CET58749696185.118.171.10192.168.2.4
                          Jan 23, 2023 14:53:40.414155006 CET49696587192.168.2.4185.118.171.10
                          Jan 23, 2023 14:53:40.458043098 CET58749696185.118.171.10192.168.2.4
                          Jan 23, 2023 14:53:40.469099998 CET49696587192.168.2.4185.118.171.10
                          Jan 23, 2023 14:53:40.504760027 CET58749696185.118.171.10192.168.2.4
                          Jan 23, 2023 14:53:40.505122900 CET49696587192.168.2.4185.118.171.10
                          Jan 23, 2023 14:53:40.583677053 CET58749696185.118.171.10192.168.2.4
                          Jan 23, 2023 14:53:40.704057932 CET58749696185.118.171.10192.168.2.4
                          Jan 23, 2023 14:53:40.704616070 CET49696587192.168.2.4185.118.171.10
                          Jan 23, 2023 14:53:40.740060091 CET58749696185.118.171.10192.168.2.4
                          Jan 23, 2023 14:53:40.740117073 CET58749696185.118.171.10192.168.2.4
                          Jan 23, 2023 14:53:40.742136002 CET49696587192.168.2.4185.118.171.10
                          Jan 23, 2023 14:53:40.742223024 CET49696587192.168.2.4185.118.171.10
                          Jan 23, 2023 14:53:40.742269039 CET49696587192.168.2.4185.118.171.10
                          Jan 23, 2023 14:53:40.742314100 CET49696587192.168.2.4185.118.171.10
                          Jan 23, 2023 14:53:40.777635098 CET58749696185.118.171.10192.168.2.4
                          Jan 23, 2023 14:53:40.777672052 CET58749696185.118.171.10192.168.2.4
                          Jan 23, 2023 14:53:40.777945995 CET58749696185.118.171.10192.168.2.4
                          Jan 23, 2023 14:53:40.900851965 CET58749696185.118.171.10192.168.2.4
                          Jan 23, 2023 14:53:40.949641943 CET49696587192.168.2.4185.118.171.10
                          Jan 23, 2023 14:55:18.747687101 CET49696587192.168.2.4185.118.171.10
                          Jan 23, 2023 14:55:18.826915979 CET58749696185.118.171.10192.168.2.4
                          Jan 23, 2023 14:55:19.031011105 CET58749696185.118.171.10192.168.2.4
                          Jan 23, 2023 14:55:19.074013948 CET49696587192.168.2.4185.118.171.10
                          Jan 23, 2023 14:55:19.749358892 CET49696587192.168.2.4185.118.171.10
                          TimestampSource PortDest PortSource IPDest IP
                          Jan 23, 2023 14:53:32.713038921 CET5657253192.168.2.48.8.8.8
                          Jan 23, 2023 14:53:32.732079983 CET53565728.8.8.8192.168.2.4
                          Jan 23, 2023 14:53:32.740856886 CET5091153192.168.2.48.8.8.8
                          Jan 23, 2023 14:53:32.759876966 CET53509118.8.8.8192.168.2.4
                          Jan 23, 2023 14:53:38.716109037 CET5968353192.168.2.48.8.8.8
                          Jan 23, 2023 14:53:39.723031044 CET5968353192.168.2.48.8.8.8
                          Jan 23, 2023 14:53:39.798808098 CET53596838.8.8.8192.168.2.4
                          Jan 23, 2023 14:53:39.826925039 CET53596838.8.8.8192.168.2.4
                          Jan 23, 2023 14:53:39.837939024 CET6416753192.168.2.48.8.8.8
                          Jan 23, 2023 14:53:39.915606976 CET53641678.8.8.8192.168.2.4
                          TimestampSource IPDest IPChecksumCodeType
                          Jan 23, 2023 14:53:39.827115059 CET192.168.2.48.8.8.8d013(Port unreachable)Destination Unreachable
                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                          Jan 23, 2023 14:53:32.713038921 CET192.168.2.48.8.8.80xbdb1Standard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                          Jan 23, 2023 14:53:32.740856886 CET192.168.2.48.8.8.80xda57Standard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                          Jan 23, 2023 14:53:38.716109037 CET192.168.2.48.8.8.80x231aStandard query (0)mail.panservis.rsA (IP address)IN (0x0001)false
                          Jan 23, 2023 14:53:39.723031044 CET192.168.2.48.8.8.80x231aStandard query (0)mail.panservis.rsA (IP address)IN (0x0001)false
                          Jan 23, 2023 14:53:39.837939024 CET192.168.2.48.8.8.80xbe40Standard query (0)mail.panservis.rsA (IP address)IN (0x0001)false
                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                          Jan 23, 2023 14:53:32.732079983 CET8.8.8.8192.168.2.40xbdb1No error (0)api.ipify.orgapi4.ipify.orgCNAME (Canonical name)IN (0x0001)false
                          Jan 23, 2023 14:53:32.732079983 CET8.8.8.8192.168.2.40xbdb1No error (0)api4.ipify.org64.185.227.155A (IP address)IN (0x0001)false
                          Jan 23, 2023 14:53:32.732079983 CET8.8.8.8192.168.2.40xbdb1No error (0)api4.ipify.org173.231.16.76A (IP address)IN (0x0001)false
                          Jan 23, 2023 14:53:32.732079983 CET8.8.8.8192.168.2.40xbdb1No error (0)api4.ipify.org104.237.62.211A (IP address)IN (0x0001)false
                          Jan 23, 2023 14:53:32.759876966 CET8.8.8.8192.168.2.40xda57No error (0)api.ipify.orgapi4.ipify.orgCNAME (Canonical name)IN (0x0001)false
                          Jan 23, 2023 14:53:32.759876966 CET8.8.8.8192.168.2.40xda57No error (0)api4.ipify.org64.185.227.155A (IP address)IN (0x0001)false
                          Jan 23, 2023 14:53:32.759876966 CET8.8.8.8192.168.2.40xda57No error (0)api4.ipify.org173.231.16.76A (IP address)IN (0x0001)false
                          Jan 23, 2023 14:53:32.759876966 CET8.8.8.8192.168.2.40xda57No error (0)api4.ipify.org104.237.62.211A (IP address)IN (0x0001)false
                          Jan 23, 2023 14:53:39.798808098 CET8.8.8.8192.168.2.40x231aNo error (0)mail.panservis.rspanservis.rsCNAME (Canonical name)IN (0x0001)false
                          Jan 23, 2023 14:53:39.798808098 CET8.8.8.8192.168.2.40x231aNo error (0)panservis.rs185.118.171.10A (IP address)IN (0x0001)false
                          Jan 23, 2023 14:53:39.826925039 CET8.8.8.8192.168.2.40x231aNo error (0)mail.panservis.rspanservis.rsCNAME (Canonical name)IN (0x0001)false
                          Jan 23, 2023 14:53:39.826925039 CET8.8.8.8192.168.2.40x231aNo error (0)panservis.rs185.118.171.10A (IP address)IN (0x0001)false
                          Jan 23, 2023 14:53:39.915606976 CET8.8.8.8192.168.2.40xbe40No error (0)mail.panservis.rspanservis.rsCNAME (Canonical name)IN (0x0001)false
                          Jan 23, 2023 14:53:39.915606976 CET8.8.8.8192.168.2.40xbe40No error (0)panservis.rs185.118.171.10A (IP address)IN (0x0001)false
                          • api.ipify.org
                          Session IDSource IPSource PortDestination IPDestination PortProcess
                          0192.168.2.44969564.185.227.155443C:\Users\user\Desktop\file.exe
                          TimestampkBytes transferredDirectionData
                          2023-01-23 13:53:33 UTC0OUTGET / HTTP/1.1
                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                          Host: api.ipify.org
                          Connection: Keep-Alive
                          2023-01-23 13:53:33 UTC0INHTTP/1.1 200 OK
                          Access-Control-Allow-Credentials: true
                          Access-Control-Allow-Origin: *
                          Content-Length: 14
                          Content-Type: text/plain
                          Date: Mon, 23 Jan 2023 13:53:33 GMT
                          Vary: Origin
                          Connection: close
                          2023-01-23 13:53:33 UTC0INData Raw: 31 30 32 2e 31 32 39 2e 31 34 33 2e 31 30
                          Data Ascii: 102.129.143.10


                          TimestampSource PortDest PortSource IPDest IPCommands
                          Jan 23, 2023 14:53:40.076312065 CET58749696185.118.171.10192.168.2.4220-cp1.astratelekom.com ESMTP Exim 4.95 #2 Mon, 23 Jan 2023 14:53:40 +0100
                          220-We do not authorize the use of this system to transport unsolicited,
                          220 and/or bulk e-mail.
                          Jan 23, 2023 14:53:40.077370882 CET49696587192.168.2.4185.118.171.10EHLO 888683
                          Jan 23, 2023 14:53:40.113017082 CET58749696185.118.171.10192.168.2.4250-cp1.astratelekom.com Hello 888683 [102.129.143.10]
                          250-SIZE 52428800
                          250-8BITMIME
                          250-PIPELINING
                          250-PIPE_CONNECT
                          250-AUTH PLAIN LOGIN
                          250-STARTTLS
                          250 HELP
                          Jan 23, 2023 14:53:40.114219904 CET49696587192.168.2.4185.118.171.10STARTTLS
                          Jan 23, 2023 14:53:40.152295113 CET58749696185.118.171.10192.168.2.4220 TLS go ahead

                          Click to jump to process

                          Click to jump to process

                          Click to dive into process behavior distribution

                          Click to jump to process

                          Target ID:0
                          Start time:14:53:26
                          Start date:23/01/2023
                          Path:C:\Users\user\Desktop\file.exe
                          Wow64 process (32bit):true
                          Commandline:C:\Users\user\Desktop\file.exe
                          Imagebase:0x740000
                          File size:683520 bytes
                          MD5 hash:56AA80BAC2E533EE3332E29ED33A144C
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:.Net C# or VB.NET
                          Yara matches:
                          • Rule: JoeSecurity_AntiVM_3, Description: Yara detected AntiVM_3, Source: 00000000.00000002.320656667.0000000002E16000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          Reputation:low

                          Target ID:1
                          Start time:14:53:30
                          Start date:23/01/2023
                          Path:C:\Users\user\Desktop\file.exe
                          Wow64 process (32bit):true
                          Commandline:C:\Users\user\Desktop\file.exe
                          Imagebase:0x910000
                          File size:683520 bytes
                          MD5 hash:56AA80BAC2E533EE3332E29ED33A144C
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:.Net C# or VB.NET
                          Yara matches:
                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000001.00000002.576651714.0000000002C5C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000001.00000002.576651714.0000000002C5C000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          Reputation:low

                          Reset < >

                            Execution Graph

                            Execution Coverage:12.7%
                            Dynamic/Decrypted Code Coverage:100%
                            Signature Coverage:0%
                            Total number of Nodes:116
                            Total number of Limit Nodes:5
                            execution_graph 18895 51033f0 18896 5103432 18895->18896 18898 5103439 18895->18898 18897 510348a CallWindowProcW 18896->18897 18896->18898 18897->18898 19005 5101080 SetWindowLongW 19006 51010ec 19005->19006 18899 28e43c8 18900 28e43da 18899->18900 18901 28e43e6 18900->18901 18905 28e44d8 18900->18905 18911 28e3f58 18901->18911 18903 28e4405 18906 28e44e2 18905->18906 18908 28e4537 18905->18908 18915 28e45c8 18906->18915 18919 28e45d8 18906->18919 18908->18901 18912 28e3f63 18911->18912 18927 28e70d8 18912->18927 18914 28e7624 18914->18903 18917 28e45ff 18915->18917 18916 28e46dc 18916->18916 18917->18916 18923 28e4144 18917->18923 18921 28e45ff 18919->18921 18920 28e46dc 18920->18920 18921->18920 18922 28e4144 CreateActCtxA 18921->18922 18922->18920 18924 28e5668 CreateActCtxA 18923->18924 18926 28e572b 18924->18926 18928 28e70e3 18927->18928 18931 28e71d4 18928->18931 18930 28e7a2d 18930->18914 18932 28e71df 18931->18932 18935 28e7204 18932->18935 18934 28e7b02 18934->18930 18936 28e720f 18935->18936 18939 28e7234 18936->18939 18938 28e7c02 18938->18934 18941 28e723f 18939->18941 18940 28e835c 18940->18938 18941->18940 18944 28ec220 18941->18944 18949 28ec211 18941->18949 18945 28ec241 18944->18945 18946 28ec265 18945->18946 18954 28ec38d 18945->18954 18958 28ec3d0 18945->18958 18946->18940 18951 28ec241 18949->18951 18950 28ec265 18950->18940 18951->18950 18952 28ec38d 3 API calls 18951->18952 18953 28ec3d0 3 API calls 18951->18953 18952->18950 18953->18950 18956 28ec3a3 18954->18956 18955 28ec417 18955->18946 18956->18955 18962 28eaa3c 18956->18962 18960 28ec3dd 18958->18960 18959 28ec417 18959->18946 18960->18959 18961 28eaa3c 3 API calls 18960->18961 18961->18959 18963 28eaa47 18962->18963 18965 28ed110 18963->18965 18966 28ec764 18963->18966 18967 28ec76f 18966->18967 18968 28e7234 3 API calls 18967->18968 18969 28ed17f 18968->18969 18973 28eeaf0 18969->18973 18982 28eeb08 18969->18982 18970 28ed1b8 18970->18965 18975 28eeb39 18973->18975 18976 28eec2a 18973->18976 18974 28eeb45 18974->18970 18975->18974 18978 28ef37f LoadLibraryExW GetModuleHandleW 18975->18978 18979 28ef390 LoadLibraryExW GetModuleHandleW 18975->18979 18976->18970 18977 28eeb85 18980 5100040 CreateWindowExW 18977->18980 18981 5100038 CreateWindowExW 18977->18981 18978->18977 18979->18977 18980->18976 18981->18976 18984 28eeb39 18982->18984 18986 28eec2a 18982->18986 18983 28eeb45 18983->18970 18984->18983 18987 28ef37f LoadLibraryExW GetModuleHandleW 18984->18987 18988 28ef390 LoadLibraryExW GetModuleHandleW 18984->18988 18985 28eeb85 18989 5100040 CreateWindowExW 18985->18989 18990 5100038 CreateWindowExW 18985->18990 18986->18970 18987->18985 18988->18985 18989->18986 18990->18986 18991 28ec4e8 18992 28ec54e 18991->18992 18993 28ec5fd 18992->18993 18996 28ecab0 18992->18996 18999 28ecaa1 18992->18999 18997 28ecade 18996->18997 19002 28ec704 18996->19002 18997->18993 19000 28ec704 DuplicateHandle 18999->19000 19001 28ecade 19000->19001 19001->18993 19003 28ecb18 DuplicateHandle 19002->19003 19004 28ecbae 19003->19004 19004->18997 19007 28ea110 19008 28ea11f 19007->19008 19011 28ea208 19007->19011 19019 28ea1f7 19007->19019 19012 28ea21b 19011->19012 19013 28ea233 19012->19013 19027 28ea480 19012->19027 19031 28ea490 19012->19031 19013->19008 19014 28ea22b 19014->19013 19015 28ea430 GetModuleHandleW 19014->19015 19016 28ea45d 19015->19016 19016->19008 19020 28ea21b 19019->19020 19021 28ea233 19020->19021 19025 28ea480 LoadLibraryExW 19020->19025 19026 28ea490 LoadLibraryExW 19020->19026 19021->19008 19022 28ea22b 19022->19021 19023 28ea430 GetModuleHandleW 19022->19023 19024 28ea45d 19023->19024 19024->19008 19025->19022 19026->19022 19028 28ea4a4 19027->19028 19030 28ea4c9 19028->19030 19035 28e95e0 19028->19035 19030->19014 19032 28ea4a4 19031->19032 19033 28e95e0 LoadLibraryExW 19032->19033 19034 28ea4c9 19032->19034 19033->19034 19034->19014 19037 28eaa70 LoadLibraryExW 19035->19037 19038 28eaae9 19037->19038 19038->19030
                            Memory Dump Source
                            • Source File: 00000000.00000002.330935253.0000000005100000.00000040.00000800.00020000.00000000.sdmp, Offset: 05100000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5100000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 9505c3a3c182d3b88b6f5bb95b75c0f610b83bcb1feb136b6628826e7331fe38
                            • Instruction ID: 5b8b5036df18001dbc4ecf234be1a380c5c6c3869c1111449de5f6671c4b0cd7
                            • Opcode Fuzzy Hash: 9505c3a3c182d3b88b6f5bb95b75c0f610b83bcb1feb136b6628826e7331fe38
                            • Instruction Fuzzy Hash: BDE1F674E01219CFDB14DFA9C894B9DBBB2FF89300F2081A9D509AB355DB70A985CF51
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            APIs
                            • GetModuleHandleW.KERNELBASE(00000000), ref: 028EA44E
                            Memory Dump Source
                            • Source File: 00000000.00000002.320364252.00000000028E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028E0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_28e0000_file.jbxd
                            Similarity
                            • API ID: HandleModule
                            • String ID:
                            • API String ID: 4139908857-0
                            • Opcode ID: 4a58e96e7d00e66be3c77f56fc4dd7d991d1c99ecea6ea89b3fd83aa79663993
                            • Instruction ID: bb7a7267913d5fa89c4583f26b3cfd9cb48637a33e993316e174970b7598c7a2
                            • Opcode Fuzzy Hash: 4a58e96e7d00e66be3c77f56fc4dd7d991d1c99ecea6ea89b3fd83aa79663993
                            • Instruction Fuzzy Hash: 11713478A00B058FDB24DF6AC04075ABBF1BF89714F108A2AD45AD7B50DB75E806CF91
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 57 5100e38-5100e9e 58 5100ea0-5100ea6 57->58 59 5100ea9-5100eb0 57->59 58->59 60 5100eb2-5100eb8 59->60 61 5100ebb-5100f5a CreateWindowExW 59->61 60->61 63 5100f63-5100f9b 61->63 64 5100f5c-5100f62 61->64 68 5100fa8 63->68 69 5100f9d-5100fa0 63->69 64->63 69->68
                            APIs
                            • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 05100F4A
                            Memory Dump Source
                            • Source File: 00000000.00000002.330935253.0000000005100000.00000040.00000800.00020000.00000000.sdmp, Offset: 05100000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5100000_file.jbxd
                            Similarity
                            • API ID: CreateWindow
                            • String ID:
                            • API String ID: 716092398-0
                            • Opcode ID: 6d314caa4f640bc44703f4f1e474af43b4adad6a05bb3a1761b603ef2c150582
                            • Instruction ID: 39441df130e99efb63af3e9237d912d1412630eecabf363b6d58c39c0eb99356
                            • Opcode Fuzzy Hash: 6d314caa4f640bc44703f4f1e474af43b4adad6a05bb3a1761b603ef2c150582
                            • Instruction Fuzzy Hash: 0341B2B1D00309DFDF14DF9AC884ADEBBB5BF48310F64812AE819AB250D7B49985CF90
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 70 28e565c-28e5729 CreateActCtxA 72 28e572b-28e5731 70->72 73 28e5732-28e578c 70->73 72->73 80 28e578e-28e5791 73->80 81 28e579b-28e579f 73->81 80->81 82 28e57b0 81->82 83 28e57a1-28e57ad 81->83 85 28e57b1 82->85 83->82 85->85
                            APIs
                            • CreateActCtxA.KERNEL32(?), ref: 028E5719
                            Memory Dump Source
                            • Source File: 00000000.00000002.320364252.00000000028E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028E0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_28e0000_file.jbxd
                            Similarity
                            • API ID: Create
                            • String ID:
                            • API String ID: 2289755597-0
                            • Opcode ID: 191fe031a25d7a1f887a304757cb3c4c71c638f9b7f9d823b880c59a7d654417
                            • Instruction ID: bff3e86b7c3a9b6ce527a49790881ab2d80050fafbdc47de6302478ba6108d2f
                            • Opcode Fuzzy Hash: 191fe031a25d7a1f887a304757cb3c4c71c638f9b7f9d823b880c59a7d654417
                            • Instruction Fuzzy Hash: 6B41F3B5C00618CFDB24CFA9C885BCDBBB2BF49318F248059D409AB250DB755946CF90
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 86 28e4144-28e5729 CreateActCtxA 89 28e572b-28e5731 86->89 90 28e5732-28e578c 86->90 89->90 97 28e578e-28e5791 90->97 98 28e579b-28e579f 90->98 97->98 99 28e57b0 98->99 100 28e57a1-28e57ad 98->100 102 28e57b1 99->102 100->99 102->102
                            APIs
                            • CreateActCtxA.KERNEL32(?), ref: 028E5719
                            Memory Dump Source
                            • Source File: 00000000.00000002.320364252.00000000028E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028E0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_28e0000_file.jbxd
                            Similarity
                            • API ID: Create
                            • String ID:
                            • API String ID: 2289755597-0
                            • Opcode ID: 21d12d872bc42ab6c1b470544b7c6496179982c7efbfe61744763272fbca9218
                            • Instruction ID: b665be03eba8cc8852e0123a6647d088e57e29bc892b99d65493bfa9271c5699
                            • Opcode Fuzzy Hash: 21d12d872bc42ab6c1b470544b7c6496179982c7efbfe61744763272fbca9218
                            • Instruction Fuzzy Hash: 4B41F2B5C0061CCBDB24DFA9C884B8EBBB6BF59318F648059D409AB251DB786946CF90
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 103 51033f0-510342c 104 5103432-5103437 103->104 105 51034dc-51034fc 103->105 106 5103439-5103470 104->106 107 510348a-51034c2 CallWindowProcW 104->107 111 51034ff-510350c 105->111 113 5103472-5103478 106->113 114 5103479-5103488 106->114 109 51034c4-51034ca 107->109 110 51034cb-51034da 107->110 109->110 110->111 113->114 114->111
                            APIs
                            • CallWindowProcW.USER32(?,?,?,?,?), ref: 051034B1
                            Memory Dump Source
                            • Source File: 00000000.00000002.330935253.0000000005100000.00000040.00000800.00020000.00000000.sdmp, Offset: 05100000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5100000_file.jbxd
                            Similarity
                            • API ID: CallProcWindow
                            • String ID:
                            • API String ID: 2714655100-0
                            • Opcode ID: 60ffea8155876e6ea1f92ae874461c846b13bbf36956bef7b07dd7a87e5109d0
                            • Instruction ID: 266e665b6dd502672d323b3b573c3d0b8d4a116fac698d3f17c7732ed5a30b41
                            • Opcode Fuzzy Hash: 60ffea8155876e6ea1f92ae874461c846b13bbf36956bef7b07dd7a87e5109d0
                            • Instruction Fuzzy Hash: 934136B4A003099FDB55CF99C488AAEBBF6FF88314F24C459D519AB361D374A845CFA0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 117 28eaa4d-28eaa68 118 28eaa0f 117->118 119 28eaa6a-28eaab0 117->119 120 28eaab8-28eaae7 LoadLibraryExW 119->120 121 28eaab2-28eaab5 119->121 123 28eaae9-28eaaef 120->123 124 28eaaf0-28eab0d 120->124 121->120 123->124
                            APIs
                            • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,028EA4C9,00000800,00000000,00000000), ref: 028EAADA
                            Memory Dump Source
                            • Source File: 00000000.00000002.320364252.00000000028E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028E0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_28e0000_file.jbxd
                            Similarity
                            • API ID: LibraryLoad
                            • String ID:
                            • API String ID: 1029625771-0
                            • Opcode ID: 4653936e82250c5187ad3b2580a59a435f2c3eb375df8c72b7ffd026708dba28
                            • Instruction ID: 37e8092c54317e4202947866ba6c76d3e3fec1113fd4cdc940bb71b8234d87b5
                            • Opcode Fuzzy Hash: 4653936e82250c5187ad3b2580a59a435f2c3eb375df8c72b7ffd026708dba28
                            • Instruction Fuzzy Hash: 5A219ABAC043498FDB00CFAAC5807DEBBF4EF59314F45815AD45AA7600D3789546CFA5
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 128 28ec704-28ecbac DuplicateHandle 130 28ecbae-28ecbb4 128->130 131 28ecbb5-28ecbd2 128->131 130->131
                            APIs
                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,028ECADE,?,?,?,?,?), ref: 028ECB9F
                            Memory Dump Source
                            • Source File: 00000000.00000002.320364252.00000000028E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028E0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_28e0000_file.jbxd
                            Similarity
                            • API ID: DuplicateHandle
                            • String ID:
                            • API String ID: 3793708945-0
                            • Opcode ID: 279b4038b6cc58ab2f758f3a0ac92652ef6294a2b8d9c0724096e844a224646a
                            • Instruction ID: 651730a00fad327e3c524e1fa6f3d62ad5fd3b737fc96b8c0bdec8bcb7939c86
                            • Opcode Fuzzy Hash: 279b4038b6cc58ab2f758f3a0ac92652ef6294a2b8d9c0724096e844a224646a
                            • Instruction Fuzzy Hash: 2621E3B5D002089FDB10CFAAD584ADEBBF9EB58324F14845AE955A3310D378A944CFA5
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 134 28ecb11-28ecbac DuplicateHandle 135 28ecbae-28ecbb4 134->135 136 28ecbb5-28ecbd2 134->136 135->136
                            APIs
                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,028ECADE,?,?,?,?,?), ref: 028ECB9F
                            Memory Dump Source
                            • Source File: 00000000.00000002.320364252.00000000028E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028E0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_28e0000_file.jbxd
                            Similarity
                            • API ID: DuplicateHandle
                            • String ID:
                            • API String ID: 3793708945-0
                            • Opcode ID: b7f6674bef3f793c750088d64432e398cb3b7af74edb288a5c4c3afdd9f0ae86
                            • Instruction ID: cb01e11f7928939330fce373324df2ab213919bc72f355d50b0f0c255d05225f
                            • Opcode Fuzzy Hash: b7f6674bef3f793c750088d64432e398cb3b7af74edb288a5c4c3afdd9f0ae86
                            • Instruction Fuzzy Hash: 2321E4B9D002489FDB10CFAAD584ADEBFF5EB58324F14845AE954A3310D378A944CF65
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 139 28e95e0-28eaab0 141 28eaab8-28eaae7 LoadLibraryExW 139->141 142 28eaab2-28eaab5 139->142 143 28eaae9-28eaaef 141->143 144 28eaaf0-28eab0d 141->144 142->141 143->144
                            APIs
                            • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,028EA4C9,00000800,00000000,00000000), ref: 028EAADA
                            Memory Dump Source
                            • Source File: 00000000.00000002.320364252.00000000028E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028E0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_28e0000_file.jbxd
                            Similarity
                            • API ID: LibraryLoad
                            • String ID:
                            • API String ID: 1029625771-0
                            • Opcode ID: 25e9a3df395c115db54232ed52ff7906c2297acff0ac69d3221d4e3d775e6b8b
                            • Instruction ID: 8cf32b25c8a86483b0abd07f272805805f4f9d1606408604a229edc2778fa31d
                            • Opcode Fuzzy Hash: 25e9a3df395c115db54232ed52ff7906c2297acff0ac69d3221d4e3d775e6b8b
                            • Instruction Fuzzy Hash: 091147BAD003088FCB14CF9AC544ADEFBF4EB48714F14801AE41AB7200C374A545CFA4
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 147 28ea3e8-28ea428 148 28ea42a-28ea42d 147->148 149 28ea430-28ea45b GetModuleHandleW 147->149 148->149 150 28ea45d-28ea463 149->150 151 28ea464-28ea478 149->151 150->151
                            APIs
                            • GetModuleHandleW.KERNELBASE(00000000), ref: 028EA44E
                            Memory Dump Source
                            • Source File: 00000000.00000002.320364252.00000000028E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028E0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_28e0000_file.jbxd
                            Similarity
                            • API ID: HandleModule
                            • String ID:
                            • API String ID: 4139908857-0
                            • Opcode ID: f09620bea85fe6be3753a88c1f22e15db3b17704de366ba5af453f76d51117b7
                            • Instruction ID: cda7265ccc516a03c98340cd6fbb67906df6f108cb1031491f3407b53ee9d916
                            • Opcode Fuzzy Hash: f09620bea85fe6be3753a88c1f22e15db3b17704de366ba5af453f76d51117b7
                            • Instruction Fuzzy Hash: AA1116B9D006098FCB10CF9AC544ADEFBF4EF88328F14C51AD819A7600D378A545CFA1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 153 5101078-51010ea SetWindowLongW 154 51010f3-5101107 153->154 155 51010ec-51010f2 153->155 155->154
                            APIs
                            • SetWindowLongW.USER32(?,?,?), ref: 051010DD
                            Memory Dump Source
                            • Source File: 00000000.00000002.330935253.0000000005100000.00000040.00000800.00020000.00000000.sdmp, Offset: 05100000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5100000_file.jbxd
                            Similarity
                            • API ID: LongWindow
                            • String ID:
                            • API String ID: 1378638983-0
                            • Opcode ID: 0251cefe8494c1fca90f6576ed3195e9784f4e01824c2730d7302a39e16f6b9d
                            • Instruction ID: 78dd0639a6211c709edd178b24956b41a58a0a785a54cc6367d30c1162fcea43
                            • Opcode Fuzzy Hash: 0251cefe8494c1fca90f6576ed3195e9784f4e01824c2730d7302a39e16f6b9d
                            • Instruction Fuzzy Hash: 4B1133B58002099FDB10DF9AD585BDEBBF8FB48324F20840AD955B7601C378AA41CFA1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 157 5101080-51010ea SetWindowLongW 158 51010f3-5101107 157->158 159 51010ec-51010f2 157->159 159->158
                            APIs
                            • SetWindowLongW.USER32(?,?,?), ref: 051010DD
                            Memory Dump Source
                            • Source File: 00000000.00000002.330935253.0000000005100000.00000040.00000800.00020000.00000000.sdmp, Offset: 05100000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5100000_file.jbxd
                            Similarity
                            • API ID: LongWindow
                            • String ID:
                            • API String ID: 1378638983-0
                            • Opcode ID: 5cdf6c504add5a4da341e3a80b54c81635f7a63108c4554ed89b52b710466482
                            • Instruction ID: 5234f0af46f7901bc1e72ef3b7606de48eb9895fd8a25759c055ce46566c97a2
                            • Opcode Fuzzy Hash: 5cdf6c504add5a4da341e3a80b54c81635f7a63108c4554ed89b52b710466482
                            • Instruction Fuzzy Hash: B31103B58002499FDB10DF9AD584BDEBBF8FB48324F20841AD855A7640C378A944CFA1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.320115800.000000000284D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0284D000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_284d000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: fb76b9baf2f0366cf7db2f376e23da514cff8ca655f76e818e6fb73170f237e8
                            • Instruction ID: 2df8f5b54d4a218c3876d6093ca8090a4931851c24766ba1a603dce8f3e38050
                            • Opcode Fuzzy Hash: fb76b9baf2f0366cf7db2f376e23da514cff8ca655f76e818e6fb73170f237e8
                            • Instruction Fuzzy Hash: D5210A7D504248DFDB15DF14D9C0B26BF65FB8431CF24C569E9098B206CB3AD455CBA1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.320152718.000000000285D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0285D000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_285d000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: dcb5e2ef019b6f0616256f72f8c001a120a902bd89f880c5274a4319e188b9d3
                            • Instruction ID: 183bc4a419c596ada77f910bbce600f07d260065645613b4f5615e3421c2eb0a
                            • Opcode Fuzzy Hash: dcb5e2ef019b6f0616256f72f8c001a120a902bd89f880c5274a4319e188b9d3
                            • Instruction Fuzzy Hash: B221D07D604244DFDB15DF14D9C0B26BBA5EF84328F24C569EC4A8B246C33AD847CA61
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.320152718.000000000285D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0285D000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_285d000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: dde47817b09c5b5a80f2ef6511deddc584b034a931b0d0430978bf45d3796360
                            • Instruction ID: 72fc76a37f55e76b93ba336c9c2b85b4967b3e84cc867c71ca8ba36879592d85
                            • Opcode Fuzzy Hash: dde47817b09c5b5a80f2ef6511deddc584b034a931b0d0430978bf45d3796360
                            • Instruction Fuzzy Hash: F12192795093C08FDB12CF24D994B15BF71EF46214F28C6EADC498B657C33A940ACB62
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.320115800.000000000284D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0284D000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_284d000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 592ece47119f67d140ea7e82aae040392f4fe946fa5bf8865279594dce73126f
                            • Instruction ID: 1af549b2233a1d3d725c864458c8ed16e5f36e28151accb46270c52a26d28e1c
                            • Opcode Fuzzy Hash: 592ece47119f67d140ea7e82aae040392f4fe946fa5bf8865279594dce73126f
                            • Instruction Fuzzy Hash: 3D11E67A504284DFCB12CF14D5C4B16BF72FB84328F24C6A9D8494B616C73AD456CBA1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.320115800.000000000284D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0284D000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_284d000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 06e0786db1eef54b16480b834d04b5236189703aa34d3c5c160e7df8edd7aaa4
                            • Instruction ID: 26a9e4511f30eac76e5bc614a61da665161c3248fcbec2740ca06b75f3460d5d
                            • Opcode Fuzzy Hash: 06e0786db1eef54b16480b834d04b5236189703aa34d3c5c160e7df8edd7aaa4
                            • Instruction Fuzzy Hash: 2F01F77D5043889BE7104A25CCC0B66FFD8EF40378F18C55AFD489B242DB789840CAB1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.320115800.000000000284D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0284D000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_284d000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 3b31365228ae55fd868c8ab6ce6611a9acdd35dec45d0590fe6c078336e2db64
                            • Instruction ID: 65f11ac21bb28bb7b54f5c62e406c4660e0f226ddd6bd49342260bb9b008d020
                            • Opcode Fuzzy Hash: 3b31365228ae55fd868c8ab6ce6611a9acdd35dec45d0590fe6c078336e2db64
                            • Instruction Fuzzy Hash: 3AF0F67A4043889FE7108A16CCC4B62FFDCEB80378F18C55AED485F282D7789844CAB1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.330935253.0000000005100000.00000040.00000800.00020000.00000000.sdmp, Offset: 05100000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_5100000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 91fc971fe98503d1e108d802b09fdbd3d505996998c8d217320c2140a320d24d
                            • Instruction ID: 80e5fe991fdca3520e6f2009ba2d575428e0e83601ae09079895ce940e023eb7
                            • Opcode Fuzzy Hash: 91fc971fe98503d1e108d802b09fdbd3d505996998c8d217320c2140a320d24d
                            • Instruction Fuzzy Hash: 8F126F35B04115CFCB18EF69C4A8E6DBBB2BF88760B159169E806DB3A2DB74DC01CB51
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.320364252.00000000028E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028E0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_28e0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: cc2553b80d109fc485b901973bfd3c3e4dcdff9dc9c5abc94e5dc4c9f0ca2df2
                            • Instruction ID: 9b2a185a520547e76a535cb81d26762e9d2f3db575c87ed650e1470249370850
                            • Opcode Fuzzy Hash: cc2553b80d109fc485b901973bfd3c3e4dcdff9dc9c5abc94e5dc4c9f0ca2df2
                            • Instruction Fuzzy Hash: 6F12B4F1E1274AEAD710CF65F8881893BB1F745328F906208D2616FAD1D7BC196ACF46
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.320364252.00000000028E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028E0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_28e0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 3dae1a43efca9c7e2138629ec7be920fac3d0480b683e05b64716a5ba3a15df3
                            • Instruction ID: f191d267c946991c1f1d81d152460d7a1cd5957fae809491ba868ac0272d4c06
                            • Opcode Fuzzy Hash: 3dae1a43efca9c7e2138629ec7be920fac3d0480b683e05b64716a5ba3a15df3
                            • Instruction Fuzzy Hash: AEA16E7AE002198FCF05DFA9C8445EDBBB2FF86304B15816AE906FB261DB35A955CF40
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000000.00000002.320364252.00000000028E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 028E0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_28e0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: ec847ef38a47cbac71301151cedc654c38e4c43482093ed279d08a51b497f54f
                            • Instruction ID: e231cd87fac96327674267656c0440455af6177c517d0948a36eb616aee41701
                            • Opcode Fuzzy Hash: ec847ef38a47cbac71301151cedc654c38e4c43482093ed279d08a51b497f54f
                            • Instruction Fuzzy Hash: F0C126F1E1274AAAD710CF64F8881893BB1FB85328F506308D2616F6D1D7BC186ACF85
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Execution Graph

                            Execution Coverage:12.6%
                            Dynamic/Decrypted Code Coverage:100%
                            Signature Coverage:1.5%
                            Total number of Nodes:196
                            Total number of Limit Nodes:28
                            execution_graph 36265 5105af0 36266 5105b0e 36265->36266 36269 510497c 36266->36269 36268 5105b45 36271 5107610 LoadLibraryA 36269->36271 36272 5107709 36271->36272 36273 510f6f0 36275 510f751 GetUserNameW 36273->36275 36276 510f83d 36275->36276 36277 6991a78 36278 6991a7d 36277->36278 36279 6991a9b 36278->36279 36281 6993980 36278->36281 36282 6993996 36281->36282 36283 6993a47 36282->36283 36285 6994158 36282->36285 36283->36278 36286 6994163 36285->36286 36287 699509e 36286->36287 36294 6997d18 36286->36294 36299 6997d28 36286->36299 36288 6995b7e 36287->36288 36304 699d660 36287->36304 36308 699d703 36287->36308 36312 699d650 36287->36312 36288->36282 36295 6997d28 36294->36295 36296 6997d6d 36295->36296 36316 6997ed8 36295->36316 36320 6997ec7 36295->36320 36296->36287 36300 6997d49 36299->36300 36301 6997d6d 36300->36301 36302 6997ed8 2 API calls 36300->36302 36303 6997ec7 2 API calls 36300->36303 36301->36287 36302->36301 36303->36301 36306 699d67d 36304->36306 36305 699d719 36306->36305 36434 699db68 36306->36434 36309 699d6d8 36308->36309 36310 699d719 36309->36310 36311 699db68 2 API calls 36309->36311 36311->36309 36314 699d660 36312->36314 36313 699d719 36314->36313 36315 699db68 2 API calls 36314->36315 36315->36314 36317 6997ee5 36316->36317 36318 6997f1e 36317->36318 36324 6994cd8 36317->36324 36318->36296 36321 6997ed8 36320->36321 36322 6997f1e 36321->36322 36323 6994cd8 2 API calls 36321->36323 36322->36296 36323->36322 36325 6994ce3 36324->36325 36327 6997f90 36325->36327 36328 6994d0c 36325->36328 36327->36327 36329 6994d17 36328->36329 36335 6994d1c 36329->36335 36331 6997fff 36339 699cef0 36331->36339 36348 699cf08 36331->36348 36332 6998038 36332->36327 36338 6994d27 36335->36338 36336 6998734 36336->36331 36337 6997d28 2 API calls 36337->36336 36338->36336 36338->36337 36341 699cf39 36339->36341 36342 699d02a 36339->36342 36340 699cf45 36340->36332 36341->36340 36357 699d198 36341->36357 36361 699d188 36341->36361 36342->36332 36343 699cf85 36365 699f498 36343->36365 36374 699f488 36343->36374 36350 699cf39 36348->36350 36352 699d02a 36348->36352 36349 699cf45 36349->36332 36350->36349 36355 699d198 2 API calls 36350->36355 36356 699d188 2 API calls 36350->36356 36351 699cf85 36353 699f498 GetModuleHandleW 36351->36353 36354 699f488 GetModuleHandleW 36351->36354 36352->36332 36353->36352 36354->36352 36355->36351 36356->36351 36383 699d1d9 36357->36383 36389 699d1e8 36357->36389 36358 699d1a2 36358->36343 36362 699d1a2 36361->36362 36363 699d1d9 2 API calls 36361->36363 36364 699d1e8 2 API calls 36361->36364 36362->36343 36363->36362 36364->36362 36367 699f4a9 36365->36367 36366 699f4cd 36366->36342 36367->36366 36409 699c65c 36367->36409 36370 699f600 36371 699c504 GetModuleHandleW 36370->36371 36372 699f629 36370->36372 36371->36372 36373 699c65c GetModuleHandleW 36373->36370 36375 699f498 36374->36375 36376 699f4cd 36375->36376 36377 699c65c GetModuleHandleW 36375->36377 36376->36342 36378 699f5e4 36377->36378 36382 699c65c GetModuleHandleW 36378->36382 36379 699f600 36380 699c504 GetModuleHandleW 36379->36380 36381 699f629 36379->36381 36380->36381 36382->36379 36395 699c504 36383->36395 36386 699d20b 36386->36358 36390 699d1fb 36389->36390 36391 699c504 GetModuleHandleW 36389->36391 36392 699d20b 36390->36392 36393 699dc88 2 API calls 36390->36393 36394 699dc75 2 API calls 36390->36394 36391->36390 36392->36358 36393->36392 36394->36392 36396 699d4f0 GetModuleHandleW 36395->36396 36398 699d1fb 36396->36398 36398->36386 36399 699dc75 36398->36399 36404 699dc88 36398->36404 36400 699c504 GetModuleHandleW 36399->36400 36401 699dc9c 36399->36401 36400->36401 36402 699c5cc LoadLibraryExW 36401->36402 36403 699dcc1 36401->36403 36402->36403 36403->36386 36405 699c504 GetModuleHandleW 36404->36405 36406 699dc9c 36405->36406 36407 699c5cc LoadLibraryExW 36406->36407 36408 699dcc1 36406->36408 36407->36408 36408->36386 36410 699c667 36409->36410 36411 699f5e4 36410->36411 36414 699fbd0 36410->36414 36424 699fbc3 36410->36424 36411->36373 36415 699fbe5 36414->36415 36416 699c504 GetModuleHandleW 36415->36416 36417 699fc09 36415->36417 36416->36417 36418 699c504 GetModuleHandleW 36417->36418 36423 699fdc5 36417->36423 36419 699fd4b 36418->36419 36420 699c504 GetModuleHandleW 36419->36420 36419->36423 36421 699fd99 36420->36421 36422 699c504 GetModuleHandleW 36421->36422 36421->36423 36422->36423 36423->36411 36425 699fbd0 36424->36425 36426 699c504 GetModuleHandleW 36425->36426 36427 699fc09 36425->36427 36426->36427 36428 699c504 GetModuleHandleW 36427->36428 36433 699fdc5 36427->36433 36429 699fd4b 36428->36429 36430 699c504 GetModuleHandleW 36429->36430 36429->36433 36431 699fd99 36430->36431 36432 699c504 GetModuleHandleW 36431->36432 36431->36433 36432->36433 36433->36411 36436 699db82 36434->36436 36435 699dc4b 36436->36435 36441 699dce8 36436->36441 36446 699dce6 36436->36446 36451 699de00 36436->36451 36456 699e021 36436->36456 36443 699dd09 36441->36443 36442 699e050 36442->36436 36443->36442 36461 699e1d8 36443->36461 36466 699e1d6 36443->36466 36448 699dce8 36446->36448 36447 699e050 36447->36436 36448->36447 36449 699e1d8 LoadLibraryExW 36448->36449 36450 699e1d6 LoadLibraryExW 36448->36450 36449->36448 36450->36448 36453 699dd09 36451->36453 36452 699e050 36452->36436 36453->36452 36454 699e1d8 LoadLibraryExW 36453->36454 36455 699e1d6 LoadLibraryExW 36453->36455 36454->36453 36455->36453 36458 699dd09 36456->36458 36457 699e050 36457->36436 36458->36457 36459 699e1d8 LoadLibraryExW 36458->36459 36460 699e1d6 LoadLibraryExW 36458->36460 36459->36458 36460->36458 36463 699e1f4 36461->36463 36462 699e257 36462->36443 36463->36462 36464 699e3f0 LoadLibraryExW 36463->36464 36465 699e421 36464->36465 36465->36443 36467 699e1d8 36466->36467 36468 699e3f0 LoadLibraryExW 36467->36468 36470 699e257 36467->36470 36469 699e421 36468->36469 36469->36443 36470->36443 36471 6993758 36472 69937be 36471->36472 36473 699386d 36472->36473 36475 6993918 36472->36475 36478 6993524 36475->36478 36479 6993b20 DuplicateHandle 36478->36479 36480 6993946 36479->36480 36480->36473 36481 67fbb68 36482 67fbb9d 36481->36482 36483 67fbb75 36481->36483 36489 67fa760 36482->36489 36485 67fbbbe 36487 67fbc86 GlobalMemoryStatusEx 36488 67fbcb6 36487->36488 36490 67fbc40 GlobalMemoryStatusEx 36489->36490 36492 67fbbba 36490->36492 36492->36485 36492->36487 36493 5100448 36494 510044d 36493->36494 36495 510048f 36494->36495 36498 699263f 36494->36498 36502 6992650 36494->36502 36499 699265f 36498->36499 36506 6991e44 36499->36506 36503 699265f 36502->36503 36504 6991e44 4 API calls 36503->36504 36505 6992680 36504->36505 36505->36494 36507 6991e4f 36506->36507 36508 6994158 4 API calls 36507->36508 36509 699458e 36508->36509 36509->36509

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 445 510f6f0-510f74f 446 510f751-510f77c 445->446 447 510f7ba-510f7be 445->447 453 510f7ac 446->453 454 510f77e-510f780 446->454 448 510f7c0-510f7e3 447->448 449 510f7e9-510f7f4 447->449 448->449 451 510f800-510f83b GetUserNameW 449->451 452 510f7f6-510f7fe 449->452 455 510f844-510f85a 451->455 456 510f83d-510f843 451->456 452->451 466 510f7b1-510f7b4 453->466 458 510f7a2-510f7aa 454->458 459 510f782-510f78c 454->459 460 510f870-510f897 455->460 461 510f85c-510f868 455->461 456->455 458->466 463 510f790-510f79e 459->463 464 510f78e 459->464 470 510f8a7 460->470 471 510f899-510f89d 460->471 461->460 463->463 468 510f7a0 463->468 464->463 466->447 468->458 473 510f8a8 470->473 471->470 472 510f89f 471->472 472->470 473->473
                            APIs
                            • GetUserNameW.ADVAPI32(00000000,00000000), ref: 0510F82B
                            Memory Dump Source
                            • Source File: 00000001.00000002.579785019.0000000005100000.00000040.00000800.00020000.00000000.sdmp, Offset: 05100000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_5100000_file.jbxd
                            Similarity
                            • API ID: NameUser
                            • String ID:
                            • API String ID: 2645101109-0
                            • Opcode ID: 0d8f6819eb761bef58cb898cfb8f1ca5e3cfdc514298fd5ad70cfd2318a0864e
                            • Instruction ID: cf9f31ec9091bee5e08b4b2e74f08ffe2669f089e09cb70cb03482ad1f9a26c2
                            • Opcode Fuzzy Hash: 0d8f6819eb761bef58cb898cfb8f1ca5e3cfdc514298fd5ad70cfd2318a0864e
                            • Instruction Fuzzy Hash: 9D5127B4D002188FDB28CFA9C899BEDBBB1BF48314F14911AD815BB390D7B49845CF91
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 323 699e1d8-699e1f2 324 699e1f4-699e1f7 323->324 325 699e1f9-699e218 324->325 326 699e21d-699e220 324->326 325->326 327 699e238-699e23b 326->327 328 699e222-699e231 326->328 329 699e23d-699e243 327->329 330 699e252-699e255 327->330 336 699e257-699e279 328->336 339 699e233 328->339 333 699e249-699e24d 329->333 334 699e38f-699e3e8 329->334 335 699e27a-699e27d 330->335 330->336 333->330 353 699e3ea-699e3ed 334->353 354 699e3f0-699e41f LoadLibraryExW 334->354 337 699e27f-699e29e 335->337 338 699e2a3-699e2a6 335->338 337->338 342 699e2a8-699e2c7 338->342 343 699e2cc-699e2cf 338->343 339->327 342->343 346 699e2d1-699e2ef 343->346 347 699e2f6-699e2f9 343->347 358 699e320-699e321 346->358 374 699e2f1 346->374 350 699e31b-699e31e 347->350 351 699e2fb-699e316 347->351 350->358 359 699e326-699e329 350->359 351->350 353->354 360 699e428-699e445 354->360 361 699e421-699e427 354->361 358->359 362 699e32b-699e32e 359->362 363 699e33d-699e343 359->363 361->360 366 699e338-699e33b 362->366 367 699e330-699e333 362->367 363->329 369 699e349 363->369 366->363 373 699e34e-699e351 366->373 367->366 369->373 377 699e363-699e366 373->377 378 699e353 373->378 374->347 379 699e368-699e36a 377->379 380 699e36d-699e370 377->380 381 699e35b-699e35e 378->381 379->380 382 699e372-699e374 380->382 383 699e384-699e38e 380->383 381->377 384 699e37b-699e37e 382->384 385 699e376 382->385 384->324 384->383 385->384
                            APIs
                            • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,0699DCC1,00000800,00000000,00000000), ref: 0699E412
                            Memory Dump Source
                            • Source File: 00000001.00000002.581088801.0000000006990000.00000040.00000800.00020000.00000000.sdmp, Offset: 06990000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6990000_file.jbxd
                            Similarity
                            • API ID: LibraryLoad
                            • String ID:
                            • API String ID: 1029625771-0
                            • Opcode ID: 21fe15bbec4685179b70b17f1b366009594a071b0229fd80cc591a29a6783426
                            • Instruction ID: cf09edee7b291ad015993b59b7015a22e0e1c1ef30e981a0aaf10be0e5af586c
                            • Opcode Fuzzy Hash: 21fe15bbec4685179b70b17f1b366009594a071b0229fd80cc591a29a6783426
                            • Instruction Fuzzy Hash: AA61A170E0020A8BDF64DBADD4807AEB7AAFF89714F604829D419E7791DB34D845CBA1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 386 67fbb68-67fbb73 387 67fbb9d-67fbbbc call 67fa760 386->387 388 67fbb75-67fbb9c call 67fa754 386->388 394 67fbbbe-67fbbc1 387->394 395 67fbbc2-67fbbfa 387->395 400 67fbbfc-67fbc01 395->400 401 67fbc02 395->401 400->401 402 67fbc0a-67fbc21 401->402 403 67fbc04 401->403 406 67fbc27-67fbcb4 GlobalMemoryStatusEx 402->406 407 67fbc23-67fbc26 402->407 403->402 412 67fbcbd-67fbce5 406->412 413 67fbcb6-67fbcbc 406->413 413->412
                            Memory Dump Source
                            • Source File: 00000001.00000002.580998295.00000000067F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067F0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_67f0000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 95dc936c8d17318f8a995d48e6b81c77f9c0740a6eb1497d2fbd98306a88b252
                            • Instruction ID: 84985a87e5f10dfdaedca5341fea4f3ce3c75563bc2ca34d15920b15b1393bbd
                            • Opcode Fuzzy Hash: 95dc936c8d17318f8a995d48e6b81c77f9c0740a6eb1497d2fbd98306a88b252
                            • Instruction Fuzzy Hash: E6416871E103498FCB44CFBAC8546AEBFB5EF85310F14866AD508E7340DB389845CBA1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 416 510f6e4-510f74f 417 510f751-510f77c 416->417 418 510f7ba-510f7be 416->418 424 510f7ac 417->424 425 510f77e-510f780 417->425 419 510f7c0-510f7e3 418->419 420 510f7e9-510f7f4 418->420 419->420 422 510f800-510f83b GetUserNameW 420->422 423 510f7f6-510f7fe 420->423 426 510f844-510f85a 422->426 427 510f83d-510f843 422->427 423->422 437 510f7b1-510f7b4 424->437 429 510f7a2-510f7aa 425->429 430 510f782-510f78c 425->430 431 510f870-510f897 426->431 432 510f85c-510f868 426->432 427->426 429->437 434 510f790-510f79e 430->434 435 510f78e 430->435 441 510f8a7 431->441 442 510f899-510f89d 431->442 432->431 434->434 439 510f7a0 434->439 435->434 437->418 439->429 444 510f8a8 441->444 442->441 443 510f89f 442->443 443->441 444->444
                            APIs
                            • GetUserNameW.ADVAPI32(00000000,00000000), ref: 0510F82B
                            Memory Dump Source
                            • Source File: 00000001.00000002.579785019.0000000005100000.00000040.00000800.00020000.00000000.sdmp, Offset: 05100000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_5100000_file.jbxd
                            Similarity
                            • API ID: NameUser
                            • String ID:
                            • API String ID: 2645101109-0
                            • Opcode ID: 90206cbc6c032b43843df08fcd238f33f0f8c009cdce0c88141a87522d3e3a13
                            • Instruction ID: 12f5b489122b17044f8d8380962883312d2f64d22d5e4fbd0d2b4c7b386e5c6e
                            • Opcode Fuzzy Hash: 90206cbc6c032b43843df08fcd238f33f0f8c009cdce0c88141a87522d3e3a13
                            • Instruction Fuzzy Hash: F65138B5D002188FDB28CFA9C885BEDBBB1BF48314F14811AD815BB390D7B49845CF91
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 474 510497c-5107667 476 5107669-510768e 474->476 477 51076bb-5107707 LoadLibraryA 474->477 476->477 480 5107690-5107692 476->480 481 5107710-5107741 477->481 482 5107709-510770f 477->482 483 5107694-510769e 480->483 484 51076b5-51076b8 480->484 489 5107751 481->489 490 5107743-5107747 481->490 482->481 486 51076a0 483->486 487 51076a2-51076b1 483->487 484->477 486->487 487->487 491 51076b3 487->491 493 5107752 489->493 490->489 492 5107749 490->492 491->484 492->489 493->493
                            APIs
                            • LoadLibraryA.KERNELBASE(?), ref: 051076F7
                            Memory Dump Source
                            • Source File: 00000001.00000002.579785019.0000000005100000.00000040.00000800.00020000.00000000.sdmp, Offset: 05100000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_5100000_file.jbxd
                            Similarity
                            • API ID: LibraryLoad
                            • String ID:
                            • API String ID: 1029625771-0
                            • Opcode ID: e199d674affdd4280b9865eff09a5d88de89a46624f3abacda569a74d11b8a26
                            • Instruction ID: 2f006acb32aac99cfb598becfdc3f0553760517f411837d355998275f14dae4b
                            • Opcode Fuzzy Hash: e199d674affdd4280b9865eff09a5d88de89a46624f3abacda569a74d11b8a26
                            • Instruction Fuzzy Hash: 894148B0D002599FDB14DFA9C9887AEBBF1FB48314F148129D815EB380D7B8A885CF91
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 494 5107605-5107667 496 5107669-510768e 494->496 497 51076bb-5107707 LoadLibraryA 494->497 496->497 500 5107690-5107692 496->500 501 5107710-5107741 497->501 502 5107709-510770f 497->502 503 5107694-510769e 500->503 504 51076b5-51076b8 500->504 509 5107751 501->509 510 5107743-5107747 501->510 502->501 506 51076a0 503->506 507 51076a2-51076b1 503->507 504->497 506->507 507->507 511 51076b3 507->511 513 5107752 509->513 510->509 512 5107749 510->512 511->504 512->509 513->513
                            APIs
                            • LoadLibraryA.KERNELBASE(?), ref: 051076F7
                            Memory Dump Source
                            • Source File: 00000001.00000002.579785019.0000000005100000.00000040.00000800.00020000.00000000.sdmp, Offset: 05100000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_5100000_file.jbxd
                            Similarity
                            • API ID: LibraryLoad
                            • String ID:
                            • API String ID: 1029625771-0
                            • Opcode ID: 2617c7afc722377a75260f54ba858c5178e2251fb9d3ab966b936fdb8ab10853
                            • Instruction ID: 6ec609751d8f97ae238edad498e8a33f00a3288769cd86c24edf2558d2385e9d
                            • Opcode Fuzzy Hash: 2617c7afc722377a75260f54ba858c5178e2251fb9d3ab966b936fdb8ab10853
                            • Instruction Fuzzy Hash: 8C4147B0D102599FDB14DFA9C9857AEBBF1FB48314F148129D815EB280D7B4A885CF91
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1134 6993b18-6993b1e 1135 6993b20-6993bb4 DuplicateHandle 1134->1135 1136 6993bbd-6993bda 1135->1136 1137 6993bb6-6993bbc 1135->1137 1137->1136
                            APIs
                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,06993946,?,?,?,?,?), ref: 06993BA7
                            Memory Dump Source
                            • Source File: 00000001.00000002.581088801.0000000006990000.00000040.00000800.00020000.00000000.sdmp, Offset: 06990000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6990000_file.jbxd
                            Similarity
                            • API ID: DuplicateHandle
                            • String ID:
                            • API String ID: 3793708945-0
                            • Opcode ID: 01b17c318539db804e07fdfa09c05905f6c56f8a3fdea7838c6ad15a2109b437
                            • Instruction ID: 487be5f4012855b39b09ef8d4286b87a9ba2c1231d6e897d20df46cf8b72722f
                            • Opcode Fuzzy Hash: 01b17c318539db804e07fdfa09c05905f6c56f8a3fdea7838c6ad15a2109b437
                            • Instruction Fuzzy Hash: 5A21E5B59002189FDB10CF9AD984ADEBFF9FF58324F24841AE954A3610D378A945CFA1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1140 6993524-6993bb4 DuplicateHandle 1142 6993bbd-6993bda 1140->1142 1143 6993bb6-6993bbc 1140->1143 1143->1142
                            APIs
                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,06993946,?,?,?,?,?), ref: 06993BA7
                            Memory Dump Source
                            • Source File: 00000001.00000002.581088801.0000000006990000.00000040.00000800.00020000.00000000.sdmp, Offset: 06990000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6990000_file.jbxd
                            Similarity
                            • API ID: DuplicateHandle
                            • String ID:
                            • API String ID: 3793708945-0
                            • Opcode ID: 5659c8d6fda0f7611d90ac338a76e16114c94769ee734809cc2c3ebff017a22d
                            • Instruction ID: 576798c184be4ae3a41d02da61eb203ddd911d5db029e50738e1ce86373a6b76
                            • Opcode Fuzzy Hash: 5659c8d6fda0f7611d90ac338a76e16114c94769ee734809cc2c3ebff017a22d
                            • Instruction Fuzzy Hash: 002114B5D006089FDF50CF9AD884AEEBFF8EB48320F14845AE914A3710D378A944CFA0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1146 67fbc38-67fbc7e 1149 67fbc86-67fbcb4 GlobalMemoryStatusEx 1146->1149 1150 67fbcbd-67fbce5 1149->1150 1151 67fbcb6-67fbcbc 1149->1151 1151->1150
                            APIs
                            • GlobalMemoryStatusEx.KERNELBASE(?,?,?,?,?,?,?,?,?,067FBBBA), ref: 067FBCA7
                            Memory Dump Source
                            • Source File: 00000001.00000002.580998295.00000000067F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067F0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_67f0000_file.jbxd
                            Similarity
                            • API ID: GlobalMemoryStatus
                            • String ID:
                            • API String ID: 1890195054-0
                            • Opcode ID: e0f2ec92ef27ea8a33dfcb3138d46e3590d9ff314387b0a8b68f6d0a08dba808
                            • Instruction ID: 3e9874373ebbdfa1736e1fcfaafbec9579cc635ec4ed3b0a435955a1e9d4c465
                            • Opcode Fuzzy Hash: e0f2ec92ef27ea8a33dfcb3138d46e3590d9ff314387b0a8b68f6d0a08dba808
                            • Instruction Fuzzy Hash: 5F1144B1C006199BCB10CF9AC544BEEFBB8EF48320F10862AD818B7740D778A944CFA1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1154 699e3a0-699e3e8 1156 699e3ea-699e3ed 1154->1156 1157 699e3f0-699e41f LoadLibraryExW 1154->1157 1156->1157 1158 699e428-699e445 1157->1158 1159 699e421-699e427 1157->1159 1159->1158
                            APIs
                            • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,0699DCC1,00000800,00000000,00000000), ref: 0699E412
                            Memory Dump Source
                            • Source File: 00000001.00000002.581088801.0000000006990000.00000040.00000800.00020000.00000000.sdmp, Offset: 06990000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6990000_file.jbxd
                            Similarity
                            • API ID: LibraryLoad
                            • String ID:
                            • API String ID: 1029625771-0
                            • Opcode ID: 8aeb6fb5d984acbad3b6bf8d47aa14ee7279aa39a0b29fafa832377a6716a539
                            • Instruction ID: 9269dd2ecd315ffeacfb94f9dedc24a6a851ad20030bfefc5ba02e6c32a3890a
                            • Opcode Fuzzy Hash: 8aeb6fb5d984acbad3b6bf8d47aa14ee7279aa39a0b29fafa832377a6716a539
                            • Instruction Fuzzy Hash: 491133B6C003499FCB10CFAAC844ADEFBF8EF58320F10852AE455A7640C378A545CFA5
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1169 699c5cc-699e3e8 1171 699e3ea-699e3ed 1169->1171 1172 699e3f0-699e41f LoadLibraryExW 1169->1172 1171->1172 1173 699e428-699e445 1172->1173 1174 699e421-699e427 1172->1174 1174->1173
                            APIs
                            • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,0699DCC1,00000800,00000000,00000000), ref: 0699E412
                            Memory Dump Source
                            • Source File: 00000001.00000002.581088801.0000000006990000.00000040.00000800.00020000.00000000.sdmp, Offset: 06990000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6990000_file.jbxd
                            Similarity
                            • API ID: LibraryLoad
                            • String ID:
                            • API String ID: 1029625771-0
                            • Opcode ID: e54060691e8229a70631be6a9a2a1e88dd33b89db938a87829561aeca6122627
                            • Instruction ID: 4d21e517c4e443bb977b5e93a8f58bd6048c341db6d6ae8b4f13ad79dd853c40
                            • Opcode Fuzzy Hash: e54060691e8229a70631be6a9a2a1e88dd33b89db938a87829561aeca6122627
                            • Instruction Fuzzy Hash: 981103B6D002489FDF10CF9AC844ADEBBF8EF98324F10842AE415A7600C378A945CFA1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1162 67fa760-67fbcb4 GlobalMemoryStatusEx 1165 67fbcbd-67fbce5 1162->1165 1166 67fbcb6-67fbcbc 1162->1166 1166->1165
                            APIs
                            • GlobalMemoryStatusEx.KERNELBASE(?,?,?,?,?,?,?,?,?,067FBBBA), ref: 067FBCA7
                            Memory Dump Source
                            • Source File: 00000001.00000002.580998295.00000000067F0000.00000040.00000800.00020000.00000000.sdmp, Offset: 067F0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_67f0000_file.jbxd
                            Similarity
                            • API ID: GlobalMemoryStatus
                            • String ID:
                            • API String ID: 1890195054-0
                            • Opcode ID: 32c4dd029b3fe179ecbe317d7dba968dfa07ce87489b284f943f9435ff02684b
                            • Instruction ID: 3cc06dc1ebf50a3529ead4dabb6d71734d67327266d6992d544160e3476d93ff
                            • Opcode Fuzzy Hash: 32c4dd029b3fe179ecbe317d7dba968dfa07ce87489b284f943f9435ff02684b
                            • Instruction Fuzzy Hash: E71103B1C006199BCB10CF9AC544BEEFBB8EB48724F14826AD918B7740D778A944CFE5
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1177 699d4e9-699d530 1179 699d538-699d563 GetModuleHandleW 1177->1179 1180 699d532-699d535 1177->1180 1181 699d56c-699d580 1179->1181 1182 699d565-699d56b 1179->1182 1180->1179 1182->1181
                            APIs
                            • GetModuleHandleW.KERNELBASE(00000000,?,?,?,?,?,?,?,0699D1FB), ref: 0699D556
                            Memory Dump Source
                            • Source File: 00000001.00000002.581088801.0000000006990000.00000040.00000800.00020000.00000000.sdmp, Offset: 06990000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6990000_file.jbxd
                            Similarity
                            • API ID: HandleModule
                            • String ID:
                            • API String ID: 4139908857-0
                            • Opcode ID: 912bdd8a84078286bd8de9a8bdac04859ca7a77fa8e2c0f6f4f5938274d12f9b
                            • Instruction ID: 62e66d45d86be9c1b642768d864fbcd575ac4b7da77ecb1c95d8a18faef1a7f0
                            • Opcode Fuzzy Hash: 912bdd8a84078286bd8de9a8bdac04859ca7a77fa8e2c0f6f4f5938274d12f9b
                            • Instruction Fuzzy Hash: FF1123B6C006498FCB10CF9AC484ADEFFF8EF48224F20851AD469B7600C378A545CFA1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1184 699c504-699d530 1186 699d538-699d563 GetModuleHandleW 1184->1186 1187 699d532-699d535 1184->1187 1188 699d56c-699d580 1186->1188 1189 699d565-699d56b 1186->1189 1187->1186 1189->1188
                            APIs
                            • GetModuleHandleW.KERNELBASE(00000000,?,?,?,?,?,?,?,0699D1FB), ref: 0699D556
                            Memory Dump Source
                            • Source File: 00000001.00000002.581088801.0000000006990000.00000040.00000800.00020000.00000000.sdmp, Offset: 06990000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_6990000_file.jbxd
                            Similarity
                            • API ID: HandleModule
                            • String ID:
                            • API String ID: 4139908857-0
                            • Opcode ID: 7f5e33d9348435b1084691201b4ce622635b75a9bbe4005fdbbe45c1ed1b1349
                            • Instruction ID: dda426c68bd3f031579c1f27d3fccaf7d59fa78df42a4cda5cd91ff5e99f4ca6
                            • Opcode Fuzzy Hash: 7f5e33d9348435b1084691201b4ce622635b75a9bbe4005fdbbe45c1ed1b1349
                            • Instruction Fuzzy Hash: 3D1104B5C006498FCB50DF9AC484BDEFBF8EF88228F10841AD419B7600D378A545CFA5
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000001.00000002.576439831.000000000115D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0115D000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_115d000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 765b9017249f55bb5d94cef45f4349c9de7d166d1be4b0edebc85faeb6e2f8bd
                            • Instruction ID: e84fbd713cb7fa8f8ab4eb892c0ac13c05fbd3995ece86e7dd7c49749aa46535
                            • Opcode Fuzzy Hash: 765b9017249f55bb5d94cef45f4349c9de7d166d1be4b0edebc85faeb6e2f8bd
                            • Instruction Fuzzy Hash: F821E271500240DFDF4ACF98E9C0B16BF75FB88328F248569ED050A206C33AD845CBA2
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000001.00000002.576467853.000000000116D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0116D000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_116d000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 952b8f9a797a99b5ac0b61228da63828dd2e1a9bc9b8d36351a35e7d5f3d0f79
                            • Instruction ID: dc3192c526853da42cb3fedbab88ceed8e6902a353b9eb535e89b2b8da85ee85
                            • Opcode Fuzzy Hash: 952b8f9a797a99b5ac0b61228da63828dd2e1a9bc9b8d36351a35e7d5f3d0f79
                            • Instruction Fuzzy Hash: 7F217E7150D3C09FCB078F24D990B11BF75AB46214F29C6DBD8848F2A7C33A981ACB62
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000001.00000002.576467853.000000000116D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0116D000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_116d000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: aa98c31ce5f77a1c6b1f58f74f8d536ba6438463c4b7576ef5f3284a6aadc8b7
                            • Instruction ID: 933eae9512bc921d103b60b0a4cef2aa260572fe5f3e28c51b88b21768907089
                            • Opcode Fuzzy Hash: aa98c31ce5f77a1c6b1f58f74f8d536ba6438463c4b7576ef5f3284a6aadc8b7
                            • Instruction Fuzzy Hash: 10213771604240DFDF19DF58E9C0B26BBA9FB84314F24C56DE8894B242C33BD856CB62
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000001.00000002.576439831.000000000115D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0115D000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_115d000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 592ece47119f67d140ea7e82aae040392f4fe946fa5bf8865279594dce73126f
                            • Instruction ID: affde2ace4d1396f46b3c31d7292253564b91e6db6fe1708bf648dc7a7cde0a7
                            • Opcode Fuzzy Hash: 592ece47119f67d140ea7e82aae040392f4fe946fa5bf8865279594dce73126f
                            • Instruction Fuzzy Hash: 6D11B176504280DFDF16CF54D5C4B16BF72FB84328F2486A9DD490B616C33AD45ACBA2
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000001.00000002.576439831.000000000115D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0115D000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_115d000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 4077fcb5cf4c52d47fac899b6043385fe88f4ad1b29a08560493ac6ddb32e669
                            • Instruction ID: 4eec7038c4046b42f98ef587bdb5682e47de0be725c4d735c00396764353d3f4
                            • Opcode Fuzzy Hash: 4077fcb5cf4c52d47fac899b6043385fe88f4ad1b29a08560493ac6ddb32e669
                            • Instruction Fuzzy Hash: F9012B71404380EAEB594A5AEC80766BF98DF45334F08C41EED1C5B286C379D440CBB2
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000001.00000002.576439831.000000000115D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0115D000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_1_2_115d000_file.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: a7ad0b4f0bbd95227e9cded86b99fb3e828c1b0fa752d7c0100481e47ce59b5d
                            • Instruction ID: bb589ab1a243f01d6f876d9f6ae7427efeed1f65d683b76443bb2e66918a5518
                            • Opcode Fuzzy Hash: a7ad0b4f0bbd95227e9cded86b99fb3e828c1b0fa752d7c0100481e47ce59b5d
                            • Instruction Fuzzy Hash: B3F0C271404384EAEB258A0ADC84B62FF98EB85334F18C45AED585B282C3799844CBB1
                            Uniqueness

                            Uniqueness Score: -1.00%