Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
T4oIN41uUE.exe

Overview

General Information

Sample Name:T4oIN41uUE.exe
Analysis ID:830838
MD5:1ea7bfdcef2ca0864721759907e5f824
SHA1:17ed68bcbe0c702e0d3cf2ca164eac0ba76b2ad3
SHA256:6fbcada3a3dcc462ba4848000d47ee4487632488cc2e5841af7516027649d6f7
Infos:

Detection

AgentTesla
Score:96
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected Telegram RAT
Yara detected AgentTesla
Tries to steal Mail credentials (via file / registry access)
Tries to harvest and steal Putty / WinSCP information (sessions, passwords, etc)
Machine Learning detection for sample
May check the online IP address of the machine
Injects a PE file into a foreign processes
Queries sensitive network adapter information (via WMI, Win32_NetworkAdapter, often done to detect virtual machines)
Tries to harvest and steal browser information (history, passwords, etc)
Queries sensitive BIOS Information (via WMI, Win32_Bios & Win32_BaseBoard, often done to detect virtual machines)
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
May sleep (evasive loops) to hinder dynamic analysis
Uses code obfuscation techniques (call, push, ret)
Detected potential crypto function
Yara detected Credential Stealer
JA3 SSL client fingerprint seen in connection with other malware
IP address seen in connection with other malware
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Sample file is different than original file name gathered from version info
Tries to load missing DLLs
Uses a known web browser user agent for HTTP communication
Binary contains a suspicious time stamp
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Creates a process in suspended mode (likely to inject code)

Classification

  • System is w10x64native
  • T4oIN41uUE.exe (PID: 2676 cmdline: C:\Users\user\Desktop\T4oIN41uUE.exe MD5: 1EA7BFDCEF2CA0864721759907E5F824)
    • T4oIN41uUE.exe (PID: 7328 cmdline: C:\Users\user\Desktop\T4oIN41uUE.exe MD5: 1EA7BFDCEF2CA0864721759907E5F824)
  • cleanup
{"Exfil Mode": "Telegram", "Telegram Url": "https://api.telegram.org/bot5806691582:AAH6u3QmlmdvCPddcnWF_1vIYT8ymbk2K8M/sendMessage?chat_id=5737638148"}
{"C2 url": "https://api.telegram.org/bot5806691582:AAH6u3QmlmdvCPddcnWF_1vIYT8ymbk2K8M/sendMessage"}
SourceRuleDescriptionAuthorStrings
00000007.00000002.7024966229.000000000337B000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
    00000007.00000002.7024966229.000000000337B000.00000004.00000800.00020000.00000000.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
      Process Memory Space: T4oIN41uUE.exe PID: 7328JoeSecurity_AgentTesla_1Yara detected AgentTeslaJoe Security
        Process Memory Space: T4oIN41uUE.exe PID: 7328JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
          Process Memory Space: T4oIN41uUE.exe PID: 7328JoeSecurity_TelegramRATYara detected Telegram RATJoe Security
            No Sigma rule has matched
            No Snort rule has matched

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: T4oIN41uUE.exeReversingLabs: Detection: 33%
            Source: T4oIN41uUE.exeVirustotal: Detection: 53%Perma Link
            Source: T4oIN41uUE.exeJoe Sandbox ML: detected
            Source: 7.2.T4oIN41uUE.exe.400000.0.unpackMalware Configuration Extractor: Agenttesla {"Exfil Mode": "Telegram", "Telegram Url": "https://api.telegram.org/bot5806691582:AAH6u3QmlmdvCPddcnWF_1vIYT8ymbk2K8M/sendMessage?chat_id=5737638148"}
            Source: T4oIN41uUE.exe.7328.7.memstrminMalware Configuration Extractor: Telegram RAT {"C2 url": "https://api.telegram.org/bot5806691582:AAH6u3QmlmdvCPddcnWF_1vIYT8ymbk2K8M/sendMessage"}
            Source: T4oIN41uUE.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: unknownHTTPS traffic detected: 173.231.16.76:443 -> 192.168.11.20:49813 version: TLS 1.2
            Source: T4oIN41uUE.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

            Networking

            barindex
            Source: unknownDNS query: name: api.ipify.org
            Source: unknownDNS query: name: api.ipify.org
            Source: unknownDNS query: name: api.ipify.org
            Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
            Source: Joe Sandbox ViewIP Address: 173.231.16.76 173.231.16.76
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
            Source: unknownNetwork traffic detected: HTTP traffic on port 49813 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49813
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: T4oIN41uUE.exe, 00000007.00000002.7056523415.000000000676B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.comodoca.com/AAACertificateServices.crl06
            Source: T4oIN41uUE.exe, 00000007.00000002.7056523415.000000000676B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/root-r2.crl0
            Source: T4oIN41uUE.exe, 00000007.00000002.7024966229.0000000003331000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
            Source: T4oIN41uUE.exe, 00000007.00000002.7056523415.000000000676B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.microsoft.
            Source: T4oIN41uUE.exe, 00000007.00000002.7024966229.0000000003331000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org
            Source: T4oIN41uUE.exe, 00000007.00000002.7024966229.0000000003331000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
            Source: T4oIN41uUE.exe, 00000007.00000002.7024966229.0000000003331000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://api.telegram.org/bot5806691582:AAH6u3QmlmdvCPddcnWF_1vIYT8ymbk2K8M/
            Source: T4oIN41uUE.exeString found in binary or memory: https://krdict.korean.go.kr/api/search?key=AEBB6D3290D88C645CF1452F7DA3229D0
            Source: T4oIN41uUE.exeString found in binary or memory: https://picsum.photos/80
            Source: unknownDNS traffic detected: queries for: api.ipify.org
            Source: global trafficHTTP traffic detected: GET / HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0Host: api.ipify.orgConnection: Keep-Alive
            Source: unknownHTTPS traffic detected: 173.231.16.76:443 -> 192.168.11.20:49813 version: TLS 1.2
            Source: T4oIN41uUE.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeCode function: 7_2_019140D07_2_019140D0
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeCode function: 7_2_01914CE87_2_01914CE8
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeCode function: 7_2_019144187_2_01914418
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeCode function: 7_2_070A87707_2_070A8770
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeCode function: 7_2_070AD3287_2_070AD328
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeCode function: 7_2_070ABA207_2_070ABA20
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeCode function: 7_2_070A68207_2_070A6820
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeCode function: 7_2_070B35697_2_070B3569
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeCode function: 7_2_070BD9207_2_070BD920
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeCode function: 7_2_070B9D107_2_070B9D10
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeCode function: 7_2_070BB1A87_2_070BB1A8
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeCode function: 7_2_070B88907_2_070B8890
            Source: T4oIN41uUE.exe, 00000002.00000000.1968019802.00000000009A2000.00000002.00000001.01000000.00000004.sdmpBinary or memory string: OriginalFilenameYEdj.exe: vs T4oIN41uUE.exe
            Source: T4oIN41uUE.exe, 00000007.00000002.7011434877.000000000042C000.00000040.00000400.00020000.00000000.sdmpBinary or memory string: OriginalFilename4fea6f85-f2e4-4165-ba99-4bd867ae23e9.exe4 vs T4oIN41uUE.exe
            Source: T4oIN41uUE.exe, 00000007.00000002.7014071221.0000000000F98000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs T4oIN41uUE.exe
            Source: T4oIN41uUE.exeBinary or memory string: OriginalFilenameYEdj.exe: vs T4oIN41uUE.exe
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeSection loaded: edgegdi.dllJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeSection loaded: edgegdi.dllJump to behavior
            Source: T4oIN41uUE.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: T4oIN41uUE.exeReversingLabs: Detection: 33%
            Source: T4oIN41uUE.exeVirustotal: Detection: 53%
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeFile read: C:\Users\user\Desktop\T4oIN41uUE.exe:Zone.IdentifierJump to behavior
            Source: T4oIN41uUE.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: unknownProcess created: C:\Users\user\Desktop\T4oIN41uUE.exe C:\Users\user\Desktop\T4oIN41uUE.exe
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeProcess created: C:\Users\user\Desktop\T4oIN41uUE.exe C:\Users\user\Desktop\T4oIN41uUE.exe
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeProcess created: C:\Users\user\Desktop\T4oIN41uUE.exe C:\Users\user\Desktop\T4oIN41uUE.exeJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2781761E-28E0-4109-99FE-B9D127C57AFE}\InprocServer32Jump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\T4oIN41uUE.exe.logJump to behavior
            Source: classification engineClassification label: mal96.troj.spyw.evad.winEXE@3/1@1/1
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeFile read: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
            Source: T4oIN41uUE.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\e4a1c9189d2b01f018b953e46c80d120\mscorlib.ni.dllJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\e4a1c9189d2b01f018b953e46c80d120\mscorlib.ni.dllJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\15.0\Outlook\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
            Source: T4oIN41uUE.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
            Source: T4oIN41uUE.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: T4oIN41uUE.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeCode function: 7_2_01918CE7 push ebx; ret 7_2_01918CEA
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeCode function: 7_2_0191DA72 push ss; ret 7_2_0191DA73
            Source: T4oIN41uUE.exeStatic PE information: 0x8A5E8505 [Sat Jul 25 15:17:25 2043 UTC]
            Source: initial sampleStatic PE information: section name: .text entropy: 7.603187834085938
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_NetworkAdapterConfiguration
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_BaseBoard
            Source: C:\Users\user\Desktop\T4oIN41uUE.exe TID: 3316Thread sleep time: -40023s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exe TID: 6272Thread sleep time: -922337203685477s >= -30000sJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exe TID: 5484Thread sleep count: 1875 > 30Jump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeWindow / User API: threadDelayed 1875Jump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeWMI Queries: IWbemServices::CreateInstanceEnum - root\cimv2 : Win32_Processor
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeThread delayed: delay time: 40023Jump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: T4oIN41uUE.exe, 00000007.00000003.3033747757.0000000001334000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeMemory allocated: page read and write | page guardJump to behavior

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeMemory written: C:\Users\user\Desktop\T4oIN41uUE.exe base: 400000 value starts with: 4D5AJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeProcess created: C:\Users\user\Desktop\T4oIN41uUE.exe C:\Users\user\Desktop\T4oIN41uUE.exeJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Users\user\Desktop\T4oIN41uUE.exe VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\arial.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\ariali.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\arialbd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\arialbi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\ARIALN.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\ariblk.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\ARIALNI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\ARIALNB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\ARIALNBI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\bahnschrift.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\calibri.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\calibril.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\calibrii.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\calibrili.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\calibrib.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\calibriz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\cambria.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\cambriai.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\cambriab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\cambriaz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\Candara.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\Candaral.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\Candarai.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\Candarali.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\Candarab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\Candaraz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\comic.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\comici.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\comicbd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\comicz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\consolai.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\consolab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\consolaz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\constan.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\constani.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\constanb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\constanz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\corbel.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\corbell.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\corbeli.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\corbelli.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\corbelb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\corbelz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\cour.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\couri.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\courbd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\courbi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\ebrima.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\ebrimabd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\framd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\framdit.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\Gabriola.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\gadugi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\gadugib.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\georgia.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\georgiai.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\georgiab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\georgiaz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\impact.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\Inkfree.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\javatext.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\LeelawUI.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\LeelUIsl.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\LeelaUIb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\lucon.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\l_10646.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\malgun.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\malgunsl.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\malgunbd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\himalaya.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\msjh.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\msjhl.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\msjhbd.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\ntailu.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\ntailub.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\phagspa.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\phagspab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\taile.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\taileb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\msyh.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\msyhl.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\msyhbd.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\msyi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\mingliub.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\monbaiti.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\msgothic.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\mvboli.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\mmrtext.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\mmrtextb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\Nirmala.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\NirmalaS.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\NirmalaB.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\pala.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\palai.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\palab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\palabi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\segoepr.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\segoeprb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\segoesc.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\segoescb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\seguisb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\seguisli.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\seguili.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\seguisbi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\seguibli.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\seguiemj.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\seguihis.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\seguisym.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\simsun.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\simsunb.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\Sitka.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\SitkaI.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\SitkaB.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\SitkaZ.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\sylfaen.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\symbol.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\tahoma.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\tahomabd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\timesi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\timesbd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\timesbi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\trebuc.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\trebucit.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\trebucbd.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\trebucbi.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\verdana.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\verdanai.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\verdanab.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\verdanaz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\webdings.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\wingding.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\YuGothR.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\YuGothM.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\YuGothL.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\YuGothB.ttc VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\holomdl2.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\BKANT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\ANTQUAI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\ANTQUAB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\ANTQUABI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\BOOKOS.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\BOOKOSB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\BOOKOSI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\BOOKOSBI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\BRADHITC.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\BSSYM7.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\CENTURY.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\DUBAI-REGULAR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\DUBAI-MEDIUM.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\DUBAI-LIGHT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\DUBAI-BOLD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\FREESCPT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\FRSCRIPT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\GARA.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\GARAIT.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\GARABD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\GOTHIC.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\GOTHICI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\GOTHICB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\GOTHICBI.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\ITCKRIST.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\JUICE___.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\LEELAWAD.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\LEELAWDB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\LHANDW.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\MISTRAL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\MSUIGHUR.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\MSUIGHUB.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\MTCORSVA.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\MTEXTRA.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\OUTLOOK.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\PAPYRUS.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\PRISTINA.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\REFSAN.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\REFSPCL.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\TEMPSITC.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\WINGDNG2.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\WINGDNG3.TTF VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\marlett.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\segoeuii.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Fonts\segoeuiz.ttf VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.VisualBasic\v4.0_10.0.0.0__b03f5f7f11d50a3a\Microsoft.VisualBasic.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Users\user\Desktop\T4oIN41uUE.exe VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Security\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Security.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Web.Extensions\v4.0_4.0.0.0__31bf3856ad364e35\System.Web.Extensions.dll VolumeInformationJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: Process Memory Space: T4oIN41uUE.exe PID: 7328, type: MEMORYSTR
            Source: Yara matchFile source: 00000007.00000002.7024966229.000000000337B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: T4oIN41uUE.exe PID: 7328, type: MEMORYSTR
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeFile opened: C:\Users\user\AppData\Roaming\Thunderbird\profiles.iniJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\Outlook\9375CFF0413111d3B88A00104B2A6676Jump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Martin Prikryl\WinSCP 2\SessionsJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
            Source: C:\Users\user\Desktop\T4oIN41uUE.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
            Source: Yara matchFile source: 00000007.00000002.7024966229.000000000337B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: T4oIN41uUE.exe PID: 7328, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: Yara matchFile source: Process Memory Space: T4oIN41uUE.exe PID: 7328, type: MEMORYSTR
            Source: Yara matchFile source: 00000007.00000002.7024966229.000000000337B000.00000004.00000800.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: T4oIN41uUE.exe PID: 7328, type: MEMORYSTR
            Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
            Valid Accounts211
            Windows Management Instrumentation
            1
            DLL Side-Loading
            111
            Process Injection
            1
            Masquerading
            1
            OS Credential Dumping
            111
            Security Software Discovery
            Remote Services1
            Email Collection
            Exfiltration Over Other Network Medium11
            Encrypted Channel
            Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
            Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
            DLL Side-Loading
            1
            Disable or Modify Tools
            1
            Credentials in Registry
            131
            Virtualization/Sandbox Evasion
            Remote Desktop Protocol1
            Archive Collected Data
            Exfiltration Over Bluetooth1
            Ingress Tool Transfer
            Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
            Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)131
            Virtualization/Sandbox Evasion
            Security Account Manager1
            Application Window Discovery
            SMB/Windows Admin Shares1
            Data from Local System
            Automated Exfiltration2
            Non-Application Layer Protocol
            Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
            Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)111
            Process Injection
            NTDS1
            System Network Configuration Discovery
            Distributed Component Object ModelInput CaptureScheduled Transfer13
            Application Layer Protocol
            SIM Card SwapCarrier Billing Fraud
            Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script2
            Obfuscated Files or Information
            LSA Secrets1
            File and Directory Discovery
            SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
            Replication Through Removable MediaLaunchdRc.commonRc.common2
            Software Packing
            Cached Domain Credentials114
            System Information Discovery
            VNCGUI Input CaptureExfiltration Over C2 ChannelMultiband CommunicationJamming or Denial of ServiceAbuse Accessibility Features
            External Remote ServicesScheduled TaskStartup ItemsStartup Items1
            Timestomp
            DCSyncNetwork SniffingWindows Remote ManagementWeb Portal CaptureExfiltration Over Alternative ProtocolCommonly Used PortRogue Wi-Fi Access PointsData Encrypted for Impact
            Drive-by CompromiseCommand and Scripting InterpreterScheduled Task/JobScheduled Task/Job1
            DLL Side-Loading
            Proc FilesystemNetwork Service ScanningShared WebrootCredential API HookingExfiltration Over Symmetric Encrypted Non-C2 ProtocolApplication Layer ProtocolDowngrade to Insecure ProtocolsGenerate Fraudulent Advertising Revenue

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.


            windows-stand
            SourceDetectionScannerLabelLink
            T4oIN41uUE.exe100%Joe Sandbox ML
            T4oIN41uUE.exe33%ReversingLabsWin32.Trojan.Pwsx
            T4oIN41uUE.exe54%VirustotalBrowse
            No Antivirus matches
            SourceDetectionScannerLabelLinkDownload
            7.2.T4oIN41uUE.exe.400000.0.unpack100%AviraHEUR/AGEN.1203035Download File
            No Antivirus matches
            SourceDetectionScannerLabelLink
            http://www.microsoft.0%Avira URL Cloudsafe
            https://krdict.korean.go.kr/api/search?key=AEBB6D3290D88C645CF1452F7DA3229D00%Avira URL Cloudsafe
            http://www.microsoft.1%VirustotalBrowse
            NameIPActiveMaliciousAntivirus DetectionReputation
            api4.ipify.org
            173.231.16.76
            truefalse
              high
              api.ipify.org
              unknown
              unknownfalse
                high
                NameMaliciousAntivirus DetectionReputation
                https://api.ipify.org/false
                  high
                  NameSourceMaliciousAntivirus DetectionReputation
                  https://api.ipify.orgT4oIN41uUE.exe, 00000007.00000002.7024966229.0000000003331000.00000004.00000800.00020000.00000000.sdmpfalse
                    high
                    https://picsum.photos/80T4oIN41uUE.exefalse
                      high
                      https://krdict.korean.go.kr/api/search?key=AEBB6D3290D88C645CF1452F7DA3229D0T4oIN41uUE.exefalse
                      • Avira URL Cloud: safe
                      unknown
                      http://www.microsoft.T4oIN41uUE.exe, 00000007.00000002.7056523415.000000000676B000.00000004.00000020.00020000.00000000.sdmpfalse
                      • 1%, Virustotal, Browse
                      • Avira URL Cloud: safe
                      unknown
                      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameT4oIN41uUE.exe, 00000007.00000002.7024966229.0000000003331000.00000004.00000800.00020000.00000000.sdmpfalse
                        high
                        https://api.telegram.org/bot5806691582:AAH6u3QmlmdvCPddcnWF_1vIYT8ymbk2K8M/T4oIN41uUE.exe, 00000007.00000002.7024966229.0000000003331000.00000004.00000800.00020000.00000000.sdmpfalse
                          high
                          • No. of IPs < 25%
                          • 25% < No. of IPs < 50%
                          • 50% < No. of IPs < 75%
                          • 75% < No. of IPs
                          IPDomainCountryFlagASNASN NameMalicious
                          173.231.16.76
                          api4.ipify.orgUnited States
                          18450WEBNXUSfalse
                          Joe Sandbox Version:37.0.0 Beryl
                          Analysis ID:830838
                          Start date and time:2023-03-20 18:56:16 +01:00
                          Joe Sandbox Product:CloudBasic
                          Overall analysis duration:0h 13m 12s
                          Hypervisor based Inspection enabled:false
                          Report type:full
                          Cookbook file name:default.jbs
                          Analysis system description:Windows 10 64 bit 20H2 Native physical Machine for testing VM-aware malware (Office 2019, IE 11, Chrome 93, Firefox 91, Adobe Reader DC 21, Java 8 Update 301
                          Number of analysed new started processes analysed:14
                          Number of new started drivers analysed:0
                          Number of existing processes analysed:0
                          Number of existing drivers analysed:0
                          Number of injected processes analysed:0
                          Technologies:
                          • HCA enabled
                          • EGA enabled
                          • HDC enabled
                          • AMSI enabled
                          Analysis Mode:default
                          Analysis stop reason:Timeout
                          Sample file name:T4oIN41uUE.exe
                          Detection:MAL
                          Classification:mal96.troj.spyw.evad.winEXE@3/1@1/1
                          EGA Information:
                          • Successful, ratio: 100%
                          HDC Information:Failed
                          HCA Information:
                          • Successful, ratio: 99%
                          • Number of executed functions: 30
                          • Number of non-executed functions: 3
                          Cookbook Comments:
                          • Found application associated with file extension: .exe
                          • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
                          • Exclude process from analysis (whitelisted): dllhost.exe, audiodg.exe, UserOOBEBroker.exe, RuntimeBroker.exe, ShellExperienceHost.exe, WMIADAP.exe, backgroundTaskHost.exe, svchost.exe
                          • Excluded domains from analysis (whitelisted): spclient.wg.spotify.com, wdcpalt.microsoft.com, client.wns.windows.com, login.live.com, ctldl.windowsupdate.com, wdcp.microsoft.com
                          • Report size getting too big, too many NtAllocateVirtualMemory calls found.
                          • Report size getting too big, too many NtOpenKeyEx calls found.
                          • Report size getting too big, too many NtProtectVirtualMemory calls found.
                          • Report size getting too big, too many NtQueryValueKey calls found.
                          No simulations
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          173.231.16.76DttL6H1DqQ.exeGet hashmaliciousBabuk, Chaos, ContiBrowse
                          • api.ipify.org/
                          one.docGet hashmaliciousCryptOne, HancitorBrowse
                          • api.ipify.org/
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          api4.ipify.orgPSFBGrvmxy.exeGet hashmaliciousAgentTeslaBrowse
                          • 64.185.227.155
                          izwFjkhFJm.exeGet hashmaliciousAgentTeslaBrowse
                          • 173.231.16.76
                          Q4YODvoYjL.exeGet hashmaliciousAgentTeslaBrowse
                          • 173.231.16.76
                          Smh3IA9098.exeGet hashmaliciousAgentTeslaBrowse
                          • 64.185.227.155
                          CsTapHIkAO.exeGet hashmaliciousAgentTeslaBrowse
                          • 104.237.62.211
                          cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeGet hashmaliciousAgentTesla, zgRATBrowse
                          • 173.231.16.76
                          g0PWOnCNZH.exeGet hashmaliciousAgentTeslaBrowse
                          • 64.185.227.155
                          FeDex_shipping_document.exeGet hashmaliciousAgentTeslaBrowse
                          • 64.185.227.155
                          DHL_Shipping_Document2.exeGet hashmaliciousAgentTesla, zgRATBrowse
                          • 173.231.16.76
                          New_Order_M2023SI3.xlsGet hashmaliciousAgentTeslaBrowse
                          • 104.237.62.211
                          TT_copy.xlsGet hashmaliciousAgentTeslaBrowse
                          • 173.231.16.76
                          PO2023#PREORDER.PDF.exeGet hashmaliciousAgentTeslaBrowse
                          • 64.185.227.155
                          PO_340166.exeGet hashmaliciousAgentTeslaBrowse
                          • 64.185.227.155
                          2303-64687.exeGet hashmaliciousAgentTeslaBrowse
                          • 173.231.16.76
                          Product_specifications.exeGet hashmaliciousAgentTeslaBrowse
                          • 104.237.62.211
                          REQUEST_FOR_QUOTE_1603023.exeGet hashmaliciousAgentTesla, zgRATBrowse
                          • 104.237.62.211
                          eRPRiQhQEI.exeGet hashmaliciousAgentTeslaBrowse
                          • 173.231.16.76
                          INV_SOA.exeGet hashmaliciousAgentTeslaBrowse
                          • 173.231.16.76
                          IMG_6071220733pdf.exeGet hashmaliciousAgentTeslaBrowse
                          • 104.237.62.211
                          yeni_sipari#U015f.exeGet hashmaliciousAgentTeslaBrowse
                          • 173.231.16.76
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          WEBNXUS02OVGHpJ8z.exeGet hashmaliciousUnknownBrowse
                          • 64.185.227.155
                          PSFBGrvmxy.exeGet hashmaliciousAgentTeslaBrowse
                          • 173.231.16.76
                          izwFjkhFJm.exeGet hashmaliciousAgentTeslaBrowse
                          • 173.231.16.76
                          Q4YODvoYjL.exeGet hashmaliciousAgentTeslaBrowse
                          • 173.231.16.76
                          Smh3IA9098.exeGet hashmaliciousAgentTeslaBrowse
                          • 64.185.227.155
                          CsTapHIkAO.exeGet hashmaliciousAgentTeslaBrowse
                          • 173.231.16.76
                          cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeGet hashmaliciousAgentTesla, zgRATBrowse
                          • 173.231.16.76
                          g0PWOnCNZH.exeGet hashmaliciousAgentTeslaBrowse
                          • 64.185.227.155
                          FeDex_shipping_document.exeGet hashmaliciousAgentTeslaBrowse
                          • 64.185.227.155
                          DHL_Shipping_Document2.exeGet hashmaliciousAgentTesla, zgRATBrowse
                          • 173.231.16.76
                          New_Order_M2023SI3.xlsGet hashmaliciousAgentTeslaBrowse
                          • 104.237.62.211
                          TT_copy.xlsGet hashmaliciousAgentTeslaBrowse
                          • 173.231.16.76
                          PO2023#PREORDER.PDF.exeGet hashmaliciousAgentTeslaBrowse
                          • 64.185.227.155
                          PO_340166.exeGet hashmaliciousAgentTeslaBrowse
                          • 64.185.227.155
                          2303-64687.exeGet hashmaliciousAgentTeslaBrowse
                          • 173.231.16.76
                          Product_specifications.exeGet hashmaliciousAgentTeslaBrowse
                          • 173.231.16.76
                          REQUEST_FOR_QUOTE_1603023.exeGet hashmaliciousAgentTesla, zgRATBrowse
                          • 173.231.16.76
                          eRPRiQhQEI.exeGet hashmaliciousAgentTeslaBrowse
                          • 173.231.16.76
                          INV_SOA.exeGet hashmaliciousAgentTeslaBrowse
                          • 173.231.16.76
                          IMG_6071220733pdf.exeGet hashmaliciousAgentTeslaBrowse
                          • 104.237.62.211
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          3b5074b1b5d032e5620f69f9f700ff0ePSFBGrvmxy.exeGet hashmaliciousAgentTeslaBrowse
                          • 173.231.16.76
                          izwFjkhFJm.exeGet hashmaliciousAgentTeslaBrowse
                          • 173.231.16.76
                          Q4YODvoYjL.exeGet hashmaliciousAgentTeslaBrowse
                          • 173.231.16.76
                          widnOAntje.exeGet hashmaliciousAgentTeslaBrowse
                          • 173.231.16.76
                          Smh3IA9098.exeGet hashmaliciousAgentTeslaBrowse
                          • 173.231.16.76
                          CsTapHIkAO.exeGet hashmaliciousAgentTeslaBrowse
                          • 173.231.16.76
                          cotizaci#U00f3n_y_dise#U00f1os_de_muestra.exeGet hashmaliciousAgentTesla, zgRATBrowse
                          • 173.231.16.76
                          g0PWOnCNZH.exeGet hashmaliciousAgentTeslaBrowse
                          • 173.231.16.76
                          Payment Invoice file.htmGet hashmaliciousHTMLPhisherBrowse
                          • 173.231.16.76
                          file.exeGet hashmaliciousUnknownBrowse
                          • 173.231.16.76
                          Budget plan 2023.zipGet hashmaliciousUnknownBrowse
                          • 173.231.16.76
                          setup.exeGet hashmaliciousXmrigBrowse
                          • 173.231.16.76
                          Remittance_slip.batGet hashmaliciousUnknownBrowse
                          • 173.231.16.76
                          Payment Invoice 0012657.htmlGet hashmaliciousHTMLPhisherBrowse
                          • 173.231.16.76
                          FeDex_shipping_document.exeGet hashmaliciousAgentTeslaBrowse
                          • 173.231.16.76
                          DHL_Shipping_Document2.exeGet hashmaliciousAgentTesla, zgRATBrowse
                          • 173.231.16.76
                          PDA_REQUEST_DISCHARGE_55,000_MT_GRAIN_IN_BULK_pdf.exeGet hashmaliciousVector StealerBrowse
                          • 173.231.16.76
                          PO2023#PREORDER.PDF.exeGet hashmaliciousAgentTeslaBrowse
                          • 173.231.16.76
                          PO_340166.exeGet hashmaliciousAgentTeslaBrowse
                          • 173.231.16.76
                          PO_IN34023.exeGet hashmaliciousAgentTesla, zgRATBrowse
                          • 173.231.16.76
                          No context
                          Process:C:\Users\user\Desktop\T4oIN41uUE.exe
                          File Type:ASCII text, with CRLF line terminators
                          Category:dropped
                          Size (bytes):1216
                          Entropy (8bit):5.3584340594103494
                          Encrypted:false
                          SSDEEP:24:MLUE4K5E4KGN1qE4qXKDE4KhKzKhPKIE4oKXKoZAE4Kz9fhfE4x84j:MIHK5HKGN1qHiYHKhSoPtHokhAHKzTfp
                          MD5:52D666938F0111F0BFD0456A12623437
                          SHA1:0E88A434C23CAD5BC0EF4C11E8E263C824E0530D
                          SHA-256:7C207D29E8EFC73141C4BDD33C763C4CD0286BD8C63E814E7FDEC8C4129B7E51
                          SHA-512:E05AA6A4237D2D69F07DF60BCE2E16B1B1C030D76A966C3B3DF6C6C5754AAD7C5AD2FCD71E0BE5F2320805FC517429555943F2D004AD8EA3AA417E587AAD7BC6
                          Malicious:true
                          Reputation:moderate, very likely benign file
                          Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\68e52ded8d0e73920808d8880ed14efd\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\62fe5fc1b5bafb28a19a2754318abf00\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\96b2b7229c43d2712ff1bf4906a723f6\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Xml\5a5dc2f9e9c66b74d361d490
                          File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                          Entropy (8bit):7.601204337352873
                          TrID:
                          • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                          • Win32 Executable (generic) a (10002005/4) 49.78%
                          • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                          • Win16/32 Executable Delphi generic (2074/23) 0.01%
                          • Generic Win/DOS Executable (2004/3) 0.01%
                          File name:T4oIN41uUE.exe
                          File size:950272
                          MD5:1ea7bfdcef2ca0864721759907e5f824
                          SHA1:17ed68bcbe0c702e0d3cf2ca164eac0ba76b2ad3
                          SHA256:6fbcada3a3dcc462ba4848000d47ee4487632488cc2e5841af7516027649d6f7
                          SHA512:adbfb4fefa005a1c1004b80ca867bb1bc1d0c085fc676d5cc6d2ef381f52f9f75bd4414125c131a568b39714b168384e04a2b8953cfb6b384f0529ff4c52dcea
                          SSDEEP:12288:lbXOGqIG/oBlDC8dzNgSrW9+pGXaFfCGSjKs5sSzi9W0/vTSl8cmhVDQ:ROLI7CSNg4dCjjZ5VMW0HA8F
                          TLSH:14158C9533B19473E99A05370634A59E1E39A10B709BE33A7B273741A20067BB77EFD0
                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L.....^...............0..v............... ........@.. ....................................@................................
                          Icon Hash:00828e8e8686b000
                          Entrypoint:0x4e949a
                          Entrypoint Section:.text
                          Digitally signed:false
                          Imagebase:0x400000
                          Subsystem:windows gui
                          Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                          DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                          Time Stamp:0x8A5E8505 [Sat Jul 25 15:17:25 2043 UTC]
                          TLS Callbacks:
                          CLR (.Net) Version:
                          OS Version Major:4
                          OS Version Minor:0
                          File Version Major:4
                          File Version Minor:0
                          Subsystem Version Major:4
                          Subsystem Version Minor:0
                          Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                          Instruction
                          jmp dword ptr [00402000h]
                          shr byte ptr [eax+00005500h], 00000000h
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          add byte ptr [eax], al
                          NameVirtual AddressVirtual Size Is in Section
                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IMPORT0xe94480x4f.text
                          IMAGE_DIRECTORY_ENTRY_RESOURCE0xea0000x5ac.rsrc
                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                          IMAGE_DIRECTORY_ENTRY_BASERELOC0xec0000xc.reloc
                          IMAGE_DIRECTORY_ENTRY_DEBUG0xe942c0x1c.text
                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                          NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                          .text0x20000xe74a80xe7600False0.8233872737709347data7.603187834085938IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                          .rsrc0xea0000x5ac0x600False0.4225260416666667data4.086796671727855IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          .reloc0xec0000xc0x200False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                          NameRVASizeTypeLanguageCountry
                          RT_VERSION0xea0900x31cdata
                          RT_MANIFEST0xea3bc0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                          DLLImport
                          mscoree.dll_CorExeMain
                          TimestampSource PortDest PortSource IPDest IP
                          Mar 20, 2023 18:59:53.154913902 CET49813443192.168.11.20173.231.16.76
                          Mar 20, 2023 18:59:53.155024052 CET44349813173.231.16.76192.168.11.20
                          Mar 20, 2023 18:59:53.155324936 CET49813443192.168.11.20173.231.16.76
                          Mar 20, 2023 18:59:53.200392008 CET49813443192.168.11.20173.231.16.76
                          Mar 20, 2023 18:59:53.200414896 CET44349813173.231.16.76192.168.11.20
                          Mar 20, 2023 18:59:53.830248117 CET44349813173.231.16.76192.168.11.20
                          Mar 20, 2023 18:59:53.830589056 CET49813443192.168.11.20173.231.16.76
                          Mar 20, 2023 18:59:53.831911087 CET49813443192.168.11.20173.231.16.76
                          Mar 20, 2023 18:59:53.831926107 CET44349813173.231.16.76192.168.11.20
                          Mar 20, 2023 18:59:53.832264900 CET44349813173.231.16.76192.168.11.20
                          Mar 20, 2023 18:59:53.872334957 CET49813443192.168.11.20173.231.16.76
                          Mar 20, 2023 18:59:53.897835970 CET49813443192.168.11.20173.231.16.76
                          Mar 20, 2023 18:59:53.940501928 CET44349813173.231.16.76192.168.11.20
                          Mar 20, 2023 18:59:54.166052103 CET44349813173.231.16.76192.168.11.20
                          Mar 20, 2023 18:59:54.166322947 CET44349813173.231.16.76192.168.11.20
                          Mar 20, 2023 18:59:54.166624069 CET49813443192.168.11.20173.231.16.76
                          Mar 20, 2023 18:59:54.168960094 CET49813443192.168.11.20173.231.16.76
                          TimestampSource PortDest PortSource IPDest IP
                          Mar 20, 2023 18:59:53.135600090 CET5414353192.168.11.201.1.1.1
                          Mar 20, 2023 18:59:53.145261049 CET53541431.1.1.1192.168.11.20
                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                          Mar 20, 2023 18:59:53.135600090 CET192.168.11.201.1.1.10xfa16Standard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                          Mar 20, 2023 18:59:53.145261049 CET1.1.1.1192.168.11.200xfa16No error (0)api.ipify.orgapi4.ipify.orgCNAME (Canonical name)IN (0x0001)false
                          Mar 20, 2023 18:59:53.145261049 CET1.1.1.1192.168.11.200xfa16No error (0)api4.ipify.org173.231.16.76A (IP address)IN (0x0001)false
                          Mar 20, 2023 18:59:53.145261049 CET1.1.1.1192.168.11.200xfa16No error (0)api4.ipify.org104.237.62.211A (IP address)IN (0x0001)false
                          Mar 20, 2023 18:59:53.145261049 CET1.1.1.1192.168.11.200xfa16No error (0)api4.ipify.org64.185.227.155A (IP address)IN (0x0001)false
                          • api.ipify.org
                          Session IDSource IPSource PortDestination IPDestination PortProcess
                          0192.168.11.2049813173.231.16.76443C:\Users\user\Desktop\T4oIN41uUE.exe
                          TimestampkBytes transferredDirectionData
                          2023-03-20 17:59:53 UTC0OUTGET / HTTP/1.1
                          User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:99.0) Gecko/20100101 Firefox/99.0
                          Host: api.ipify.org
                          Connection: Keep-Alive
                          2023-03-20 17:59:54 UTC0INHTTP/1.1 200 OK
                          Content-Length: 11
                          Content-Type: text/plain
                          Date: Mon, 20 Mar 2023 17:59:54 GMT
                          Vary: Origin
                          Connection: close
                          2023-03-20 17:59:54 UTC0INData Raw: 38 34 2e 31 37 2e 35 32 2e 33 35
                          Data Ascii: 84.17.52.35


                          Click to jump to process

                          Click to jump to process

                          Click to dive into process behavior distribution

                          Click to jump to process

                          Target ID:2
                          Start time:18:58:09
                          Start date:20/03/2023
                          Path:C:\Users\user\Desktop\T4oIN41uUE.exe
                          Wow64 process (32bit):true
                          Commandline:C:\Users\user\Desktop\T4oIN41uUE.exe
                          Imagebase:0x9a0000
                          File size:950272 bytes
                          MD5 hash:1EA7BFDCEF2CA0864721759907E5F824
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:.Net C# or VB.NET
                          Reputation:low

                          Target ID:7
                          Start time:18:59:50
                          Start date:20/03/2023
                          Path:C:\Users\user\Desktop\T4oIN41uUE.exe
                          Wow64 process (32bit):true
                          Commandline:C:\Users\user\Desktop\T4oIN41uUE.exe
                          Imagebase:0xd20000
                          File size:950272 bytes
                          MD5 hash:1EA7BFDCEF2CA0864721759907E5F824
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:.Net C# or VB.NET
                          Yara matches:
                          • Rule: JoeSecurity_AgentTesla_1, Description: Yara detected AgentTesla, Source: 00000007.00000002.7024966229.000000000337B000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000007.00000002.7024966229.000000000337B000.00000004.00000800.00020000.00000000.sdmp, Author: Joe Security
                          Reputation:low

                          Reset < >

                            Execution Graph

                            Execution Coverage:11.9%
                            Dynamic/Decrypted Code Coverage:100%
                            Signature Coverage:3.7%
                            Total number of Nodes:109
                            Total number of Limit Nodes:6
                            execution_graph 36304 191df30 DuplicateHandle 36305 191dfc6 36304->36305 36306 70a6068 36308 70a606d 36306->36308 36307 70a6099 36308->36307 36311 70a50b4 36308->36311 36310 70a60bc 36312 70a50bf 36311->36312 36313 70a63b3 36312->36313 36315 70a50d0 36312->36315 36313->36310 36316 70a64f0 OleInitialize 36315->36316 36317 70a6554 36316->36317 36317->36313 36318 158d030 36319 158d048 36318->36319 36320 158d0a2 36319->36320 36323 70a1140 36319->36323 36327 70a1131 36319->36327 36325 70a116d 36323->36325 36326 70a1191 36325->36326 36331 70a0d74 CallWindowProcW 36325->36331 36328 70a1141 36327->36328 36330 70a1191 36328->36330 36332 70a0d74 CallWindowProcW 36328->36332 36331->36326 36332->36330 36283 191e548 36284 191e54d 36283->36284 36287 191db04 36284->36287 36286 191e596 36286->36286 36288 191db0f 36287->36288 36289 191f2a7 36288->36289 36292 70a6810 36288->36292 36296 70a6820 36288->36296 36289->36286 36294 70a681a 36292->36294 36293 70a68d2 36293->36289 36294->36293 36295 70a6ce8 WaitMessage 36294->36295 36295->36294 36299 70a6870 36296->36299 36297 70a6ce8 WaitMessage 36297->36299 36298 70a68d2 36298->36289 36299->36297 36299->36298 36403 191dce8 36404 191dced GetCurrentProcess 36403->36404 36406 191dd80 GetCurrentThread 36404->36406 36407 191dd79 36404->36407 36408 191ddb6 36406->36408 36409 191ddbd GetCurrentProcess 36406->36409 36407->36406 36408->36409 36410 191ddf3 36409->36410 36411 191de1b GetCurrentThreadId 36410->36411 36412 191de4c 36411->36412 36300 70a2a91 36301 70a2aa0 36300->36301 36302 70a2b3a CallWindowProcW 36301->36302 36303 70a2ae9 36301->36303 36302->36303 36333 70b20a0 36334 70b20a5 36333->36334 36336 70b20f0 36334->36336 36337 70b0550 36334->36337 36338 70b055b 36337->36338 36344 70b0560 36338->36344 36340 70b215f 36348 70bac40 36340->36348 36353 70bac58 36340->36353 36341 70b2199 36341->36336 36345 70b056b 36344->36345 36359 70b2e20 36345->36359 36347 70b3338 36347->36340 36349 70bac58 36348->36349 36350 70bac95 36349->36350 36367 70baed0 36349->36367 36371 70baec3 36349->36371 36350->36341 36355 70bac89 36353->36355 36356 70bacd5 36353->36356 36354 70bac95 36354->36341 36355->36354 36357 70baec3 3 API calls 36355->36357 36358 70baed0 3 API calls 36355->36358 36356->36341 36357->36356 36358->36356 36360 70b2e2b 36359->36360 36362 70b7611 36360->36362 36363 70b30fc 36360->36363 36362->36347 36364 70b7770 FindWindowW 36363->36364 36366 70b77f5 36364->36366 36366->36362 36369 70baec3 3 API calls 36367->36369 36383 70baf10 36367->36383 36368 70baeda 36368->36350 36369->36368 36372 70baeca 36371->36372 36373 70baf2e 36371->36373 36374 70baeda 36372->36374 36379 70baec3 2 API calls 36372->36379 36380 70baf10 2 API calls 36372->36380 36376 70baf54 36373->36376 36381 70bd208 LoadLibraryExW 36373->36381 36382 70bb1a8 LoadLibraryExW 36373->36382 36374->36350 36375 70baf4c 36375->36376 36377 70bb158 GetModuleHandleW 36375->36377 36376->36350 36378 70bb185 36377->36378 36378->36350 36379->36374 36380->36374 36381->36375 36382->36375 36384 70baf31 36383->36384 36385 70baf54 36383->36385 36384->36385 36391 70bd208 36384->36391 36395 70bb1a8 36384->36395 36385->36368 36386 70bb158 GetModuleHandleW 36388 70bb185 36386->36388 36387 70baf4c 36387->36385 36387->36386 36388->36368 36392 70bd20d 36391->36392 36393 70bd241 36392->36393 36399 70b9ec0 36392->36399 36393->36387 36398 70bb1d8 36395->36398 36396 70bd1cf 36396->36387 36397 70b9ec0 LoadLibraryExW 36397->36396 36398->36396 36398->36397 36400 70bd3c8 LoadLibraryExW 36399->36400 36402 70bd441 36400->36402 36402->36393 36413 70bfa70 36414 70bfad8 CreateWindowExW 36413->36414 36416 70bfb94 36414->36416
                            Memory Dump Source
                            • Source File: 00000007.00000002.7061825410.00000000070B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070B0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_70b0000_T4oIN41uUE.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 3c16be58eb51602c640ce62099db0bf315b3b2c322d1fd12e66212fec8ddb1ed
                            • Instruction ID: 4cdcbd2fdeaaf4ffc1fafb9a0f4c4d8eaa2afc3ab47938019b1b8f11d10ff73c
                            • Opcode Fuzzy Hash: 3c16be58eb51602c640ce62099db0bf315b3b2c322d1fd12e66212fec8ddb1ed
                            • Instruction Fuzzy Hash: 93830870D1071A8ADB55EF68C8906DDB7B1FF99300F50D69AE4497B221EB70AAC4CF81
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.7061825410.00000000070B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070B0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_70b0000_T4oIN41uUE.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: f88efa740815ce55e980dc2ee2b4dbc01dcd0d7392c3fabd755e5c5543639c5e
                            • Instruction ID: 117ff805a4ad1d74b5598c10b998160f706df295e9e1cb4b44e09ef4e35cd5a3
                            • Opcode Fuzzy Hash: f88efa740815ce55e980dc2ee2b4dbc01dcd0d7392c3fabd755e5c5543639c5e
                            • Instruction Fuzzy Hash: F0230C71D10B198ADB11EF68C8846EDF7B1FF99300F55D79AE448A7221EB70AAC4CB41
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1115 70a6820-70a6883 1117 70a68b2-70a68d0 1115->1117 1118 70a6885-70a68af 1115->1118 1123 70a68d9-70a6910 1117->1123 1124 70a68d2-70a68d4 1117->1124 1118->1117 1128 70a6d41 1123->1128 1129 70a6916-70a692a 1123->1129 1125 70a6d92-70a6da7 1124->1125 1132 70a6d46-70a6d5c 1128->1132 1130 70a6959-70a6978 1129->1130 1131 70a692c-70a6956 1129->1131 1138 70a697a-70a6980 1130->1138 1139 70a6990-70a6992 1130->1139 1131->1130 1132->1125 1143 70a6982 1138->1143 1144 70a6984-70a6986 1138->1144 1140 70a69b1-70a69ba 1139->1140 1141 70a6994-70a69ac 1139->1141 1145 70a69c2-70a69c9 1140->1145 1141->1132 1143->1139 1144->1139 1146 70a69cb-70a69d1 1145->1146 1147 70a69d3-70a69da 1145->1147 1148 70a69e7-70a6a04 call 70a513c 1146->1148 1149 70a69dc-70a69e2 1147->1149 1150 70a69e4 1147->1150 1153 70a6a0a-70a6a11 1148->1153 1154 70a6b59-70a6b5d 1148->1154 1149->1148 1150->1148 1153->1128 1157 70a6a17-70a6a54 1153->1157 1155 70a6d2c-70a6d3f 1154->1155 1156 70a6b63-70a6b67 1154->1156 1155->1132 1158 70a6b69-70a6b7c 1156->1158 1159 70a6b81-70a6b8a 1156->1159 1163 70a6a5a-70a6a5f 1157->1163 1164 70a6d22-70a6d26 1157->1164 1158->1132 1161 70a6bb9-70a6bc0 1159->1161 1162 70a6b8c-70a6bb6 1159->1162 1165 70a6c5f-70a6c74 1161->1165 1166 70a6bc6-70a6bcd 1161->1166 1162->1161 1169 70a6a91-70a6aa6 call 70a5160 1163->1169 1170 70a6a61-70a6a68 call 70a5148 1163->1170 1164->1145 1164->1155 1165->1164 1180 70a6c7a-70a6c7c 1165->1180 1167 70a6bcf-70a6bf9 1166->1167 1168 70a6bfc-70a6c1e 1166->1168 1167->1168 1168->1165 1206 70a6c20-70a6c2a 1168->1206 1178 70a6aab-70a6aaf 1169->1178 1176 70a6a6d-70a6a6f 1170->1176 1176->1169 1181 70a6a71-70a6a8f call 70a5154 1176->1181 1182 70a6b20-70a6b2d 1178->1182 1183 70a6ab1-70a6ac3 call 70a516c 1178->1183 1184 70a6cc9-70a6ce6 call 70a513c 1180->1184 1185 70a6c7e-70a6cb7 1180->1185 1181->1178 1182->1164 1200 70a6b33-70a6b3d call 70a517c 1182->1200 1208 70a6b03-70a6b1b 1183->1208 1209 70a6ac5-70a6af5 1183->1209 1184->1164 1199 70a6ce8-70a6d14 WaitMessage 1184->1199 1196 70a6cb9-70a6cbf 1185->1196 1197 70a6cc0-70a6cc7 1185->1197 1196->1197 1197->1164 1203 70a6d1b 1199->1203 1204 70a6d16 1199->1204 1213 70a6b3f-70a6b47 call 70a5188 1200->1213 1214 70a6b4c-70a6b54 call 70a5194 1200->1214 1203->1164 1204->1203 1215 70a6c2c-70a6c32 1206->1215 1216 70a6c42-70a6c45 1206->1216 1208->1132 1223 70a6afc 1209->1223 1224 70a6af7 1209->1224 1213->1164 1214->1164 1220 70a6c36-70a6c38 1215->1220 1221 70a6c34 1215->1221 1226 70a6c4e-70a6c5d 1216->1226 1220->1216 1221->1216 1223->1208 1224->1223 1226->1165 1226->1206
                            Memory Dump Source
                            • Source File: 00000007.00000002.7061454754.00000000070A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_70a0000_T4oIN41uUE.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 19922d4f507ea425bd41eac0f0e6eaa1c2f5e64c107f573faf29f9410444cb7d
                            • Instruction ID: 4936278869a58d23a6627a27997f206b4c837425b00a69ff37e7827e4afc26ff
                            • Opcode Fuzzy Hash: 19922d4f507ea425bd41eac0f0e6eaa1c2f5e64c107f573faf29f9410444cb7d
                            • Instruction Fuzzy Hash: A7F16DB0A00209EFDB54DFE9C844BADBBF1FF88314F188669E415AF261DB71A945CB40
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.7061454754.00000000070A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_70a0000_T4oIN41uUE.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 761255618dc3ed64e197e8898f48d5fa4a8f4c186c4998fd691f9073ce18c1de
                            • Instruction ID: 38e4b42b040e7dfbb2dd87e7d6360ab469c401b77c9a3faae26e50bed85dbc1d
                            • Opcode Fuzzy Hash: 761255618dc3ed64e197e8898f48d5fa4a8f4c186c4998fd691f9073ce18c1de
                            • Instruction Fuzzy Hash: 40924B70A007199FCB55EFA8C994A9DB7F2BFC5310F54C6AAD409AB254EB30AD81CF41
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.7061454754.00000000070A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_70a0000_T4oIN41uUE.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 74d7b6dc175664a9fa55a8466a5c4990ba3f8a35ec8805331c62688598632540
                            • Instruction ID: 133ab18680892cf14a39b74dd4e257800f9525be6a232932ce873039a2779b38
                            • Opcode Fuzzy Hash: 74d7b6dc175664a9fa55a8466a5c4990ba3f8a35ec8805331c62688598632540
                            • Instruction Fuzzy Hash: 4B62AEB0B00205AFDB54DBA8D490BAEB7F2AFC9310F548669D406EB394DB35DD42CB91
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.7061825410.00000000070B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070B0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_70b0000_T4oIN41uUE.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 136f6b2258394f4b9b62a475a8f951ec26e2108097bb8d07863ca51b94bf0243
                            • Instruction ID: 70f31d32522b0a61497d0be9dab1cdc46c5ada195dfea609da40ef3dd1672ce3
                            • Opcode Fuzzy Hash: 136f6b2258394f4b9b62a475a8f951ec26e2108097bb8d07863ca51b94bf0243
                            • Instruction Fuzzy Hash: 855259B0521716CFE721CF28E88AB997FB2FB40314F908719E1615B2D1EBB4654AEF44
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.7061454754.00000000070A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_70a0000_T4oIN41uUE.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: a8e0560586aa988cbdca6df6a9834441b3befff97f78052df2d66dfa0cf13ccb
                            • Instruction ID: e775670cda2ca8d3a0c4d62cfaad4b3036c17bcd9a4e0dfc7651dc931f918732
                            • Opcode Fuzzy Hash: a8e0560586aa988cbdca6df6a9834441b3befff97f78052df2d66dfa0cf13ccb
                            • Instruction Fuzzy Hash: 2202C171B00206AFDB15DFB8D4506AEB7E2AFC4310F548569D506EB788DE71DC82CB91
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.7023378943.0000000001910000.00000040.00000800.00020000.00000000.sdmp, Offset: 01910000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1910000_T4oIN41uUE.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 8b7e92d939bfba58d5bda3cd192a18c190a559e5f562c6a133b0e25b56d8d13e
                            • Instruction ID: f7e0c331f430edb07802e3a501ec44d47541738186408ac941429601a69eb44d
                            • Opcode Fuzzy Hash: 8b7e92d939bfba58d5bda3cd192a18c190a559e5f562c6a133b0e25b56d8d13e
                            • Instruction Fuzzy Hash: A5B16D70E0020D8FEF10CFA9D98579DBBF2AF88715F148529D419EB398EB359885CB81
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.7023378943.0000000001910000.00000040.00000800.00020000.00000000.sdmp, Offset: 01910000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1910000_T4oIN41uUE.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 35dbc16dda34e2591f725b10664db77ecfe8d23192ef72ca0d2c8bdff4d4ad3e
                            • Instruction ID: 2957e0026e0e55fbb73d65e81fabb44d03a354dc089a92159409ea07e05c37e6
                            • Opcode Fuzzy Hash: 35dbc16dda34e2591f725b10664db77ecfe8d23192ef72ca0d2c8bdff4d4ad3e
                            • Instruction Fuzzy Hash: 0C917070E0020D9FDF14CFA9D9857DDBBF6BF88315F148529E419AB298EB349885CB81
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            APIs
                            • GetCurrentProcess.KERNEL32 ref: 0191DD66
                            • GetCurrentThread.KERNEL32 ref: 0191DDA3
                            • GetCurrentProcess.KERNEL32 ref: 0191DDE0
                            • GetCurrentThreadId.KERNEL32 ref: 0191DE39
                            Memory Dump Source
                            • Source File: 00000007.00000002.7023378943.0000000001910000.00000040.00000800.00020000.00000000.sdmp, Offset: 01910000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1910000_T4oIN41uUE.jbxd
                            Similarity
                            • API ID: Current$ProcessThread
                            • String ID:
                            • API String ID: 2063062207-0
                            • Opcode ID: a229ce29ebfe2c3906504bcaf32fcd880be3d0f3c73f980d0c6676a97add0cb4
                            • Instruction ID: b3ee100a42f279869c17053af5198cde8c034968151c649ed68a018e9e960792
                            • Opcode Fuzzy Hash: a229ce29ebfe2c3906504bcaf32fcd880be3d0f3c73f980d0c6676a97add0cb4
                            • Instruction Fuzzy Hash: ED5187B4A003498FEB04CFA9E548BEEBFF1EF88314F20855AD449A7250D775A944CF65
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            APIs
                            • GetCurrentProcess.KERNEL32 ref: 0191DD66
                            • GetCurrentThread.KERNEL32 ref: 0191DDA3
                            • GetCurrentProcess.KERNEL32 ref: 0191DDE0
                            • GetCurrentThreadId.KERNEL32 ref: 0191DE39
                            Memory Dump Source
                            • Source File: 00000007.00000002.7023378943.0000000001910000.00000040.00000800.00020000.00000000.sdmp, Offset: 01910000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1910000_T4oIN41uUE.jbxd
                            Similarity
                            • API ID: Current$ProcessThread
                            • String ID:
                            • API String ID: 2063062207-0
                            • Opcode ID: 410ff6576e3eb842376bca8533131e631c66e054abd998d9900308c84510538f
                            • Instruction ID: 30e419967513846a73ca15786390ffda2bb17b93bac26fb9b1b8dc27898fc4b2
                            • Opcode Fuzzy Hash: 410ff6576e3eb842376bca8533131e631c66e054abd998d9900308c84510538f
                            • Instruction Fuzzy Hash: 285178B4A003498FEB54CFA9D548BEEBBF5EF88304F20841AD449A7350DB75A944CF65
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1228 70baec3-70baec8 1229 70baeca-70baecc 1228->1229 1230 70baf2e-70baf32 1228->1230 1233 70baece-70baed3 1229->1233 1234 70baf03 1229->1234 1231 70baf3c-70baf3e 1230->1231 1232 70baf37 call 70b9e7c 1230->1232 1237 70baf40 1231->1237 1238 70baf54-70baf5f 1231->1238 1232->1231 1292 70baed4 call 70baec3 1233->1292 1293 70baed4 call 70baf10 1233->1293 1235 70baf04-70baf08 1234->1235 1294 70baf46 call 70bd208 1237->1294 1295 70baf46 call 70bb1a8 1237->1295 1242 70baf73-70bafb4 1238->1242 1243 70baf61-70baf6b 1238->1243 1240 70baeda-70baee5 1240->1235 1250 70baee7-70baf01 1240->1250 1241 70baf4c-70baf4e 1241->1238 1244 70bb090-70bb150 1241->1244 1248 70bafc1-70bafcf 1242->1248 1249 70bafb6-70bafbe 1242->1249 1243->1242 1287 70bb158-70bb183 GetModuleHandleW 1244->1287 1288 70bb152-70bb155 1244->1288 1252 70baff3-70baff5 1248->1252 1253 70bafd1-70bafd6 1248->1253 1249->1248 1250->1234 1254 70baff8-70bafff 1252->1254 1255 70bafd8-70bafdf call 70b9e88 1253->1255 1256 70bafe1 1253->1256 1261 70bb00c-70bb013 1254->1261 1262 70bb001-70bb009 1254->1262 1259 70bafe3-70baff1 1255->1259 1256->1259 1259->1254 1265 70bb020-70bb029 1261->1265 1266 70bb015-70bb01d 1261->1266 1262->1261 1269 70bb02b-70bb033 1265->1269 1270 70bb036-70bb03b 1265->1270 1266->1265 1269->1270 1271 70bb059-70bb05d 1270->1271 1272 70bb03d-70bb044 1270->1272 1296 70bb060 call 70bd563 1271->1296 1297 70bb060 call 70bd790 1271->1297 1298 70bb060 call 70bd7a0 1271->1298 1299 70bb060 call 70bd570 1271->1299 1272->1271 1274 70bb046-70bb056 call 70b8220 call 70b9e98 1272->1274 1274->1271 1277 70bb063-70bb066 1279 70bb089-70bb08f 1277->1279 1280 70bb068-70bb086 1277->1280 1280->1279 1289 70bb18c-70bb1a0 1287->1289 1290 70bb185-70bb18b 1287->1290 1288->1287 1290->1289 1292->1240 1293->1240 1294->1241 1295->1241 1296->1277 1297->1277 1298->1277 1299->1277
                            Memory Dump Source
                            • Source File: 00000007.00000002.7061825410.00000000070B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070B0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_70b0000_T4oIN41uUE.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 19fcd8175058ec037d15f38056c00ffc73ec420080892d23f93f7798b08cb8a6
                            • Instruction ID: ee4132b95fd0ceec21548bc3f4235f624c6b49f16495ca945c8b6817afbcd96a
                            • Opcode Fuzzy Hash: 19fcd8175058ec037d15f38056c00ffc73ec420080892d23f93f7798b08cb8a6
                            • Instruction Fuzzy Hash: 628178B0A00B068FD774DF69D04479ABBF1FF88204F008A2AD49ADBB50D735EA05CB91
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1300 70bfa6f-70bfad6 1302 70bfad8-70bfade 1300->1302 1303 70bfae1-70bfae8 1300->1303 1302->1303 1304 70bfaea-70bfaf0 1303->1304 1305 70bfaf3-70bfb2b 1303->1305 1304->1305 1306 70bfb33-70bfb92 CreateWindowExW 1305->1306 1307 70bfb9b-70bfbd3 1306->1307 1308 70bfb94-70bfb9a 1306->1308 1312 70bfbe0 1307->1312 1313 70bfbd5-70bfbd8 1307->1313 1308->1307 1314 70bfbe1 1312->1314 1313->1312 1314->1314
                            APIs
                            • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 070BFB82
                            Memory Dump Source
                            • Source File: 00000007.00000002.7061825410.00000000070B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070B0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_70b0000_T4oIN41uUE.jbxd
                            Similarity
                            • API ID: CreateWindow
                            • String ID:
                            • API String ID: 716092398-0
                            • Opcode ID: e52fab9d2df2c7fcd3fe1f75a040938d284bcf4ef23909133ca1b61675b622a0
                            • Instruction ID: 2a5a39bcde42f73dac89e9f3f4a5ce53b0cd625a3372aac21c828d69144f94fb
                            • Opcode Fuzzy Hash: e52fab9d2df2c7fcd3fe1f75a040938d284bcf4ef23909133ca1b61675b622a0
                            • Instruction Fuzzy Hash: F241B0B1D003499FDB14CF99D884ADEBBF5BF88314F24822AE818AB250D775A945CF90
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1315 70bfa70-70bfad6 1316 70bfad8-70bfade 1315->1316 1317 70bfae1-70bfae8 1315->1317 1316->1317 1318 70bfaea-70bfaf0 1317->1318 1319 70bfaf3-70bfb92 CreateWindowExW 1317->1319 1318->1319 1321 70bfb9b-70bfbd3 1319->1321 1322 70bfb94-70bfb9a 1319->1322 1326 70bfbe0 1321->1326 1327 70bfbd5-70bfbd8 1321->1327 1322->1321 1328 70bfbe1 1326->1328 1327->1326 1328->1328
                            APIs
                            • CreateWindowExW.USER32(?,?,?,?,?,?,0000000C,?,?,?,?,?), ref: 070BFB82
                            Memory Dump Source
                            • Source File: 00000007.00000002.7061825410.00000000070B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070B0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_70b0000_T4oIN41uUE.jbxd
                            Similarity
                            • API ID: CreateWindow
                            • String ID:
                            • API String ID: 716092398-0
                            • Opcode ID: 41ca5d5d94289c0a2ec490945c3811174d33d3c19e7558973d0331f04c5d474f
                            • Instruction ID: a1cd499fab11d5f53b68ecfa3c9491119b5f4d1afeb8fca78766c715b62a145a
                            • Opcode Fuzzy Hash: 41ca5d5d94289c0a2ec490945c3811174d33d3c19e7558973d0331f04c5d474f
                            • Instruction Fuzzy Hash: D541B0B1D003499FDB14CF99D884ADEBBF5BF88314F24822AE818AB250D775A945CF90
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1329 70a0d74-70a2adc 1332 70a2b8c-70a2bac 1329->1332 1333 70a2ae2-70a2ae7 1329->1333 1339 70a2baf-70a2bbc 1332->1339 1334 70a2b3a-70a2b72 CallWindowProcW 1333->1334 1335 70a2ae9-70a2b20 1333->1335 1336 70a2b7b-70a2b8a 1334->1336 1337 70a2b74-70a2b7a 1334->1337 1342 70a2b29-70a2b38 1335->1342 1343 70a2b22-70a2b28 1335->1343 1336->1339 1337->1336 1342->1339 1343->1342
                            APIs
                            • CallWindowProcW.USER32(?,?,?,?,?), ref: 070A2B61
                            Memory Dump Source
                            • Source File: 00000007.00000002.7061454754.00000000070A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_70a0000_T4oIN41uUE.jbxd
                            Similarity
                            • API ID: CallProcWindow
                            • String ID:
                            • API String ID: 2714655100-0
                            • Opcode ID: 8d8776086cce590e11c7135ac9e850cc4914dc6634452cd1511521c322b0893d
                            • Instruction ID: 4e64c8198d5b3a84f9f7ed5212bde842d6e3cf39c978329d4a646d7bea7f096e
                            • Opcode Fuzzy Hash: 8d8776086cce590e11c7135ac9e850cc4914dc6634452cd1511521c322b0893d
                            • Instruction Fuzzy Hash: 6F4119B4A10305DFDB14CF99C488BAABBF5FF88314F248569D419AB321D775A941CBA0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1345 191df2a-191df2b 1346 191df31-191dfc4 DuplicateHandle 1345->1346 1347 191dfc6-191dfcc 1346->1347 1348 191dfcd-191dfea 1346->1348 1347->1348
                            APIs
                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0191DFB7
                            Memory Dump Source
                            • Source File: 00000007.00000002.7023378943.0000000001910000.00000040.00000800.00020000.00000000.sdmp, Offset: 01910000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1910000_T4oIN41uUE.jbxd
                            Similarity
                            • API ID: DuplicateHandle
                            • String ID:
                            • API String ID: 3793708945-0
                            • Opcode ID: 8428267ab7a98e7f5770689776227f13ef2fa9f70bd9067900a9e84477f53e5a
                            • Instruction ID: 5b55ae110f9abf34916d89976072537d6822cbef80ea4dd7358a4a37f52ca0bc
                            • Opcode Fuzzy Hash: 8428267ab7a98e7f5770689776227f13ef2fa9f70bd9067900a9e84477f53e5a
                            • Instruction Fuzzy Hash: F32114B59002489FDB00CFAAD884ADEFBF4FB48310F14841AE958A3310C374AA44CFA1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1351 191df30-191dfc4 DuplicateHandle 1352 191dfc6-191dfcc 1351->1352 1353 191dfcd-191dfea 1351->1353 1352->1353
                            APIs
                            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 0191DFB7
                            Memory Dump Source
                            • Source File: 00000007.00000002.7023378943.0000000001910000.00000040.00000800.00020000.00000000.sdmp, Offset: 01910000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1910000_T4oIN41uUE.jbxd
                            Similarity
                            • API ID: DuplicateHandle
                            • String ID:
                            • API String ID: 3793708945-0
                            • Opcode ID: c2a0b5e39b6cc9ec3b432f5bb009f3756d039277997910b5881825a578bfdcf5
                            • Instruction ID: ecbf909b99658fce15b9b87700b7dc4b2b49b379814229dea70bdbb3574af168
                            • Opcode Fuzzy Hash: c2a0b5e39b6cc9ec3b432f5bb009f3756d039277997910b5881825a578bfdcf5
                            • Instruction Fuzzy Hash: 2221E4B59002499FDB10CFAAD884ADEFBF8FB48310F14841AE958A3350C374AA44CFA1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1356 70b7768-70b77b3 1358 70b77bb-70b77bf 1356->1358 1359 70b77b5-70b77b8 1356->1359 1360 70b77c1-70b77c4 1358->1360 1361 70b77c7-70b77f3 FindWindowW 1358->1361 1359->1358 1360->1361 1362 70b77fc-70b7810 1361->1362 1363 70b77f5-70b77fb 1361->1363 1363->1362
                            APIs
                            • FindWindowW.USER32(00000000,00000000), ref: 070B77E6
                            Memory Dump Source
                            • Source File: 00000007.00000002.7061825410.00000000070B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070B0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_70b0000_T4oIN41uUE.jbxd
                            Similarity
                            • API ID: FindWindow
                            • String ID:
                            • API String ID: 134000473-0
                            • Opcode ID: 7edcbc8d4cb059c1a1deea5f8523620bb3eda7ca92345ae288072ee7fde0f5f1
                            • Instruction ID: d6803cdfceb9ae9a6bfc19eb99b40634997ac9f07c8b3109698d8ce075ac2561
                            • Opcode Fuzzy Hash: 7edcbc8d4cb059c1a1deea5f8523620bb3eda7ca92345ae288072ee7fde0f5f1
                            • Instruction Fuzzy Hash: 2F2110B580134A8FCB14CF9AD884ADEFBF4FB89214F14856ED459A7600C375A645CBA1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1365 70b30fc-70b77b3 1367 70b77bb-70b77bf 1365->1367 1368 70b77b5-70b77b8 1365->1368 1369 70b77c1-70b77c4 1367->1369 1370 70b77c7-70b77f3 FindWindowW 1367->1370 1368->1367 1369->1370 1371 70b77fc-70b7810 1370->1371 1372 70b77f5-70b77fb 1370->1372 1372->1371
                            APIs
                            • FindWindowW.USER32(00000000,00000000), ref: 070B77E6
                            Memory Dump Source
                            • Source File: 00000007.00000002.7061825410.00000000070B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070B0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_70b0000_T4oIN41uUE.jbxd
                            Similarity
                            • API ID: FindWindow
                            • String ID:
                            • API String ID: 134000473-0
                            • Opcode ID: ff01109f73beb0fadabaf2018aed5b306cde4bf23531d371152f746521a9afc1
                            • Instruction ID: 09f0c546df0251a76885cbeadc873d348fa90fee0805073fccd806b81c9c1abf
                            • Opcode Fuzzy Hash: ff01109f73beb0fadabaf2018aed5b306cde4bf23531d371152f746521a9afc1
                            • Instruction Fuzzy Hash: C42124B5D0030A8FCB24CF9AD884ADEFBF4FB89214F10956ED419B7600C375AA44CBA0
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1374 70b9ec0-70bd408 1376 70bd40a-70bd40d 1374->1376 1377 70bd410-70bd43f LoadLibraryExW 1374->1377 1376->1377 1378 70bd448-70bd465 1377->1378 1379 70bd441-70bd447 1377->1379 1379->1378
                            APIs
                            • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,070BD241,00000800,00000000,00000000), ref: 070BD432
                            Memory Dump Source
                            • Source File: 00000007.00000002.7061825410.00000000070B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070B0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_70b0000_T4oIN41uUE.jbxd
                            Similarity
                            • API ID: LibraryLoad
                            • String ID:
                            • API String ID: 1029625771-0
                            • Opcode ID: 61cabff10f1758c0c74ec2c3524224c511c0890313990bbdcd407c9f3dea9340
                            • Instruction ID: a14cf05ea1b285e80d5479ad87e79e17f0d98e55625cc458d20ca7eebabf9a78
                            • Opcode Fuzzy Hash: 61cabff10f1758c0c74ec2c3524224c511c0890313990bbdcd407c9f3dea9340
                            • Instruction Fuzzy Hash: CD1114B69003499FDB24CF9AD444BDEFBF4EB88314F14852AD819A7700C3B5AA44CFA5
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1382 70bd3c0-70bd408 1384 70bd40a-70bd40d 1382->1384 1385 70bd410-70bd43f LoadLibraryExW 1382->1385 1384->1385 1386 70bd448-70bd465 1385->1386 1387 70bd441-70bd447 1385->1387 1387->1386
                            APIs
                            • LoadLibraryExW.KERNELBASE(00000000,00000000,?,?,?,?,00000000,?,070BD241,00000800,00000000,00000000), ref: 070BD432
                            Memory Dump Source
                            • Source File: 00000007.00000002.7061825410.00000000070B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070B0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_70b0000_T4oIN41uUE.jbxd
                            Similarity
                            • API ID: LibraryLoad
                            • String ID:
                            • API String ID: 1029625771-0
                            • Opcode ID: e34d72bdbc259ae0db8c90746459174e429be7fa2839575c65195f2c3cf2bbd1
                            • Instruction ID: b748da8ed9bdd3b96a72b0fe0dec4d8e3f14bea70f7a91fdcfb63633b85ba185
                            • Opcode Fuzzy Hash: e34d72bdbc259ae0db8c90746459174e429be7fa2839575c65195f2c3cf2bbd1
                            • Instruction Fuzzy Hash: C31103B69002499FDB14CFAAD844AEEFBF4EB88324F10852AD419A7600C775A645CFA5
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1390 70bb110-70bb150 1391 70bb158-70bb183 GetModuleHandleW 1390->1391 1392 70bb152-70bb155 1390->1392 1393 70bb18c-70bb1a0 1391->1393 1394 70bb185-70bb18b 1391->1394 1392->1391 1394->1393
                            APIs
                            • GetModuleHandleW.KERNELBASE(00000000), ref: 070BB176
                            Memory Dump Source
                            • Source File: 00000007.00000002.7061825410.00000000070B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070B0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_70b0000_T4oIN41uUE.jbxd
                            Similarity
                            • API ID: HandleModule
                            • String ID:
                            • API String ID: 4139908857-0
                            • Opcode ID: 53e73d0ce707abf62df626c0d06deaa898fcd2e4091f3712ecea9dee095b78d0
                            • Instruction ID: f566ca02a0b3f8cb348a7cde2ddb6d9ff66dc6a6a138af1879f5056102a88818
                            • Opcode Fuzzy Hash: 53e73d0ce707abf62df626c0d06deaa898fcd2e4091f3712ecea9dee095b78d0
                            • Instruction Fuzzy Hash: 1D1102B5C0024A8FCB20CF9AD844ADEFBF5AB89214F10852AC468A7710C375A645CFA1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Control-flow Graph

                            • Executed
                            • Not Executed
                            control_flow_graph 1396 70a50d0-70a6552 OleInitialize 1398 70a655b-70a6578 1396->1398 1399 70a6554-70a655a 1396->1399 1399->1398
                            APIs
                            • OleInitialize.OLE32(00000000), ref: 070A6545
                            Memory Dump Source
                            • Source File: 00000007.00000002.7061454754.00000000070A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_70a0000_T4oIN41uUE.jbxd
                            Similarity
                            • API ID: Initialize
                            • String ID:
                            • API String ID: 2538663250-0
                            • Opcode ID: 671628f7785e431b3455d24172c6aaefc7b14b3be4390e43749ac928549cb7d2
                            • Instruction ID: 440eed502ff895b49b7b98ae6a920b387ba2f6c220db5d2f05cb1b4f0b7c70b3
                            • Opcode Fuzzy Hash: 671628f7785e431b3455d24172c6aaefc7b14b3be4390e43749ac928549cb7d2
                            • Instruction Fuzzy Hash: BC1115B19003499FDB10DFAAD448BDEFBF4EB48314F14846AD558A7700C775A944CFA5
                            Uniqueness

                            Uniqueness Score: -1.00%

                            APIs
                            • OleInitialize.OLE32(00000000), ref: 070A6545
                            Memory Dump Source
                            • Source File: 00000007.00000002.7061454754.00000000070A0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070A0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_70a0000_T4oIN41uUE.jbxd
                            Similarity
                            • API ID: Initialize
                            • String ID:
                            • API String ID: 2538663250-0
                            • Opcode ID: 54f7ee11e8e7d21f23ac4307e5645c40380f765712d7f5ca2b57782828379c4c
                            • Instruction ID: 3693fdb2f65b4b9fa1855a9dd24f52673ec10b5bffa6822ef1dcb2a7da0b09ac
                            • Opcode Fuzzy Hash: 54f7ee11e8e7d21f23ac4307e5645c40380f765712d7f5ca2b57782828379c4c
                            • Instruction Fuzzy Hash: 9D1123B59003499FCB10CFAAD448BDEFBF4EB48324F24881AD558A7700C379AA44CFA5
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.7021520065.000000000157D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0157D000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_157d000_T4oIN41uUE.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 1fa809083a891b56ad1826ca49d2ad7e23c3b752e3c111fa6cd3da26a539ea9c
                            • Instruction ID: df6cc11c809b0e44876da4c0bef48faf0a7dcd3d20b13e9e997fea32b363e87c
                            • Opcode Fuzzy Hash: 1fa809083a891b56ad1826ca49d2ad7e23c3b752e3c111fa6cd3da26a539ea9c
                            • Instruction Fuzzy Hash: E421E071604240DFDB05CF98E9C1B1ABFB5FF88328F248569E8050F246C336D856CAA1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.7021829830.000000000158D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0158D000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_158d000_T4oIN41uUE.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: c47bbf1c7dbbdb3464db0e874f551d1ef1fdd669e184cef3feebff28aabae083
                            • Instruction ID: 53b99928a4414f477245574e13681887714b977373c66aef264715a20f8ad33b
                            • Opcode Fuzzy Hash: c47bbf1c7dbbdb3464db0e874f551d1ef1fdd669e184cef3feebff28aabae083
                            • Instruction Fuzzy Hash: 53210375204340DFEB15EF54D880B26BBF1FB84354F24C56AD8495F282D336D847CA61
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.7021829830.000000000158D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0158D000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_158d000_T4oIN41uUE.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 237e5d6202bd557a88df3fbaebc3336bf826fc69b4d7e8aa76f8faa66d57c45b
                            • Instruction ID: 703bcfddb1d6fd40754cc57d77c22f61a7ac0c327b0e1b73f3e7a72a131cef7f
                            • Opcode Fuzzy Hash: 237e5d6202bd557a88df3fbaebc3336bf826fc69b4d7e8aa76f8faa66d57c45b
                            • Instruction Fuzzy Hash: 08216B751093C0DFCB039F64D990715BFB1AF46214F2985DBD8888F2A7C23A981ACB62
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.7021520065.000000000157D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0157D000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_157d000_T4oIN41uUE.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 3b6763ca4a77b55572621b0e91c5a44e0c14720048fd2d20f06e836edac44fb9
                            • Instruction ID: dcb7cad60b89d2c533e91f1caf8428b94720c295a66db1822e1177fdeb077819
                            • Opcode Fuzzy Hash: 3b6763ca4a77b55572621b0e91c5a44e0c14720048fd2d20f06e836edac44fb9
                            • Instruction Fuzzy Hash: 4A11AF76504280CFCB12CF54E5C4B1ABF71FF84324F2486A9D9090F256C33AD556CBA1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.7021520065.000000000157D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0157D000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_157d000_T4oIN41uUE.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 549d7fe83bf7f0884d540d2dc372be97128b0598b6a7eee4ad521f4b6415a603
                            • Instruction ID: 2468c18b0d0ecc73b9745d910e9c200cd3eeba9e872042909b23a6962f3139ce
                            • Opcode Fuzzy Hash: 549d7fe83bf7f0884d540d2dc372be97128b0598b6a7eee4ad521f4b6415a603
                            • Instruction Fuzzy Hash: 0A01F271504340AFE7118E9AEC8176ABFF8EF41264F18841AED4D1F283C27A9840CAB1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.7021520065.000000000157D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0157D000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_157d000_T4oIN41uUE.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 4792963eb80ab64f832462887768151ca991ca4e2c0fcafc13f8620d983f9d4e
                            • Instruction ID: 57bcc95b1206d12a43d5c189c820c7bb4333f62629b8460fd6a583a1d4852536
                            • Opcode Fuzzy Hash: 4792963eb80ab64f832462887768151ca991ca4e2c0fcafc13f8620d983f9d4e
                            • Instruction Fuzzy Hash: 73F062B1504344AEE7118A5ADC85B66FFA8EF41734F18C05AED5C5F287C379A844CAB1
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.7061825410.00000000070B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070B0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_70b0000_T4oIN41uUE.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: b8daba87b5d875de383fc4662284f8fef376ff604d807a1e18f4af77720f611b
                            • Instruction ID: 1cd4075909327f68a6b680111d004ddb53291931e7208bd3d90548e9e26437c7
                            • Opcode Fuzzy Hash: b8daba87b5d875de383fc4662284f8fef376ff604d807a1e18f4af77720f611b
                            • Instruction Fuzzy Hash: A12250B1A0021A8FDB24DF64C884BEDB7B6FF85304F1585A9D409AB2A1C775AE45CF90
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.7023378943.0000000001910000.00000040.00000800.00020000.00000000.sdmp, Offset: 01910000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_1910000_T4oIN41uUE.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 393f2e7b66bbcad24b8699ce16e9891371214f42b0a49ce4c6998831cc4b91fb
                            • Instruction ID: a02c0b52e9940455f76030c91f22755d9e35717f7299a76a374f01fabbdb668e
                            • Opcode Fuzzy Hash: 393f2e7b66bbcad24b8699ce16e9891371214f42b0a49ce4c6998831cc4b91fb
                            • Instruction Fuzzy Hash: BAB16F70E0020DCFDB15CFA9D8857EDBBF6AF88715F148529D419AB298EB349885CF81
                            Uniqueness

                            Uniqueness Score: -1.00%

                            Memory Dump Source
                            • Source File: 00000007.00000002.7061825410.00000000070B0000.00000040.00000800.00020000.00000000.sdmp, Offset: 070B0000, based on PE: false
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_7_2_70b0000_T4oIN41uUE.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: d19f6bbb2f4366ba954aa2db0af004dea19ac3a09daad05f99b24a019e2ff11c
                            • Instruction ID: 04feaebae275dba118eaac76a8cc5b5e22a3852d29c73e7b4f972b211082b570
                            • Opcode Fuzzy Hash: d19f6bbb2f4366ba954aa2db0af004dea19ac3a09daad05f99b24a019e2ff11c
                            • Instruction Fuzzy Hash: 29A15BB6A10205CFCF15DFB5C8845DEB7F2FF85300B15866AE905AB251DB75EA05CB80
                            Uniqueness

                            Uniqueness Score: -1.00%