Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
ZAXkflgLEq.exe

Overview

General Information

Sample name:ZAXkflgLEq.exe
renamed because original name is a hash value
Original sample name:464ea1bd9930cd4ecae392d7214c3905.exe
Analysis ID:1417252
MD5:464ea1bd9930cd4ecae392d7214c3905
SHA1:525be920ce25cf340d8e47a0f3fd993a908449fc
SHA256:cade479a0b203af759b0f82c80d4b95ca46abe3a4f665f365953eb5e25fe9284
Tags:exe
Infos:

Detection

RHADAMANTHYS
Score:72
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Yara detected RHADAMANTHYS Stealer
Machine Learning detection for sample
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
AV process strings found (often used to terminate AV products)
Contains functionality to read the PEB
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a DirectInput object (often for capturing keystrokes)
Creates a process in suspended mode (likely to inject code)
Detected potential crypto function
Installs a raw input device (often for capturing keystrokes)
JA3 SSL client fingerprint seen in connection with other malware
PE file contains sections with non-standard names
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Sample file is different than original file name gathered from version info
Tries to load missing DLLs
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara detected Keylogger Generic

Classification

  • System is w10x64
  • ZAXkflgLEq.exe (PID: 7392 cmdline: "C:\Users\user\Desktop\ZAXkflgLEq.exe" MD5: 464EA1BD9930CD4ECAE392D7214C3905)
    • dialer.exe (PID: 7436 cmdline: "C:\Windows\system32\dialer.exe" MD5: E4BD77FB64DDE78F1A95ECE09F6A9B85)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
RhadamanthysAccording to PCrisk, Rhadamanthys is a stealer-type malware, and as its name implies - it is designed to extract data from infected machines.At the time of writing, this malware is spread through malicious websites mirroring those of genuine software such as AnyDesk, Zoom, Notepad++, and others. Rhadamanthys is downloaded alongside the real program, thus diminishing immediate user suspicion. These sites were promoted through Google ads, which superseded the legitimate search results on the Google search engine.
  • Sandworm
https://malpedia.caad.fkie.fraunhofer.de/details/win.rhadamanthys
No configs have been found
SourceRuleDescriptionAuthorStrings
00000001.00000003.1687455325.00000000035F0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_RHADAMANTHYSYara detected RHADAMANTHYS StealerJoe Security
    00000000.00000003.1684570895.00000000010B0000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_RHADAMANTHYSYara detected RHADAMANTHYS StealerJoe Security
      00000001.00000003.1689171130.00000000058D0000.00000004.00000001.00020000.00000000.sdmpJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
        00000000.00000003.1686332148.0000000004720000.00000004.00000001.00020000.00000000.sdmpJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
          00000000.00000003.1686637669.0000000004940000.00000004.00000001.00020000.00000000.sdmpJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
            Click to see the 5 entries
            SourceRuleDescriptionAuthorStrings
            1.3.dialer.exe.58d0000.7.raw.unpackJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
              1.3.dialer.exe.56b0000.6.unpackJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
                0.3.ZAXkflgLEq.exe.4720000.6.raw.unpackJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
                  1.3.dialer.exe.56b0000.0.unpackJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
                    1.3.dialer.exe.58d0000.7.unpackJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
                      Click to see the 2 entries
                      No Sigma rule has matched
                      No Snort rule has matched

                      Click to jump to signature section

                      Show All Signature Results

                      AV Detection

                      barindex
                      Source: ZAXkflgLEq.exeAvira: detected
                      Source: ZAXkflgLEq.exeReversingLabs: Detection: 71%
                      Source: ZAXkflgLEq.exeJoe Sandbox ML: detected
                      Source: ZAXkflgLEq.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: unknownHTTPS traffic detected: 91.92.254.230:443 -> 192.168.2.4:49732 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 91.92.254.230:443 -> 192.168.2.4:49733 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 91.92.254.230:443 -> 192.168.2.4:49734 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 91.92.254.230:443 -> 192.168.2.4:49740 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 91.92.254.230:443 -> 192.168.2.4:49741 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 91.92.254.230:443 -> 192.168.2.4:49742 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 91.92.254.230:443 -> 192.168.2.4:49743 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 91.92.254.230:443 -> 192.168.2.4:49744 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 91.92.254.230:443 -> 192.168.2.4:49745 version: TLS 1.2
                      Source: ZAXkflgLEq.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                      Source: Binary string: wkernel32.pdb source: ZAXkflgLEq.exe, 00000000.00000003.1686157181.00000000047A0000.00000004.00000001.00020000.00000000.sdmp, ZAXkflgLEq.exe, 00000000.00000003.1686101457.0000000002C80000.00000004.00000001.00020000.00000000.sdmp, dialer.exe, 00000001.00000003.1688891903.00000000057D0000.00000004.00000001.00020000.00000000.sdmp, dialer.exe, 00000001.00000003.1688827463.00000000056B0000.00000004.00000001.00020000.00000000.sdmp
                      Source: Binary string: wkernelbase.pdb source: ZAXkflgLEq.exe, 00000000.00000003.1686332148.0000000004720000.00000004.00000001.00020000.00000000.sdmp, ZAXkflgLEq.exe, 00000000.00000003.1686637669.0000000004940000.00000004.00000001.00020000.00000000.sdmp, dialer.exe, 00000001.00000003.1689171130.00000000058D0000.00000004.00000001.00020000.00000000.sdmp, dialer.exe, 00000001.00000003.1689027079.00000000056B0000.00000004.00000001.00020000.00000000.sdmp
                      Source: Binary string: ntdll.pdb source: ZAXkflgLEq.exe, 00000000.00000003.1685443447.0000000004720000.00000004.00000001.00020000.00000000.sdmp, ZAXkflgLEq.exe, 00000000.00000003.1685589224.0000000004910000.00000004.00000001.00020000.00000000.sdmp, dialer.exe, 00000001.00000003.1688366710.00000000058A0000.00000004.00000001.00020000.00000000.sdmp, dialer.exe, 00000001.00000003.1688216506.00000000056B0000.00000004.00000001.00020000.00000000.sdmp
                      Source: Binary string: wntdll.pdbUGP source: ZAXkflgLEq.exe, 00000000.00000003.1685818446.0000000004720000.00000004.00000001.00020000.00000000.sdmp, ZAXkflgLEq.exe, 00000000.00000003.1685939143.00000000048C0000.00000004.00000001.00020000.00000000.sdmp, dialer.exe, 00000001.00000003.1688685540.0000000005850000.00000004.00000001.00020000.00000000.sdmp, dialer.exe, 00000001.00000003.1688561745.00000000056B0000.00000004.00000001.00020000.00000000.sdmp
                      Source: Binary string: ntdll.pdbUGP source: ZAXkflgLEq.exe, 00000000.00000003.1685443447.0000000004720000.00000004.00000001.00020000.00000000.sdmp, ZAXkflgLEq.exe, 00000000.00000003.1685589224.0000000004910000.00000004.00000001.00020000.00000000.sdmp, dialer.exe, 00000001.00000003.1688366710.00000000058A0000.00000004.00000001.00020000.00000000.sdmp, dialer.exe, 00000001.00000003.1688216506.00000000056B0000.00000004.00000001.00020000.00000000.sdmp
                      Source: Binary string: wntdll.pdb source: ZAXkflgLEq.exe, 00000000.00000003.1685818446.0000000004720000.00000004.00000001.00020000.00000000.sdmp, ZAXkflgLEq.exe, 00000000.00000003.1685939143.00000000048C0000.00000004.00000001.00020000.00000000.sdmp, dialer.exe, 00000001.00000003.1688685540.0000000005850000.00000004.00000001.00020000.00000000.sdmp, dialer.exe, 00000001.00000003.1688561745.00000000056B0000.00000004.00000001.00020000.00000000.sdmp
                      Source: Binary string: wkernelbase.pdbUGP source: ZAXkflgLEq.exe, 00000000.00000003.1686332148.0000000004720000.00000004.00000001.00020000.00000000.sdmp, ZAXkflgLEq.exe, 00000000.00000003.1686637669.0000000004940000.00000004.00000001.00020000.00000000.sdmp, dialer.exe, 00000001.00000003.1689171130.00000000058D0000.00000004.00000001.00020000.00000000.sdmp, dialer.exe, 00000001.00000003.1689027079.00000000056B0000.00000004.00000001.00020000.00000000.sdmp
                      Source: Binary string: wkernel32.pdbUGP source: ZAXkflgLEq.exe, 00000000.00000003.1686157181.00000000047A0000.00000004.00000001.00020000.00000000.sdmp, ZAXkflgLEq.exe, 00000000.00000003.1686101457.0000000002C80000.00000004.00000001.00020000.00000000.sdmp, dialer.exe, 00000001.00000003.1688891903.00000000057D0000.00000004.00000001.00020000.00000000.sdmp, dialer.exe, 00000001.00000003.1688827463.00000000056B0000.00000004.00000001.00020000.00000000.sdmp
                      Source: Joe Sandbox ViewJA3 fingerprint: caec7ddf6889590d999d7ca1b76373b6
                      Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                      Source: unknownDNS traffic detected: queries for: www.carssell.online
                      Source: dialer.exe, 00000001.00000002.2180075196.000000000327C000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: https://www.carssell.online:443/b45c71e9ac60e42309ff71/ox15jpua.xlk0e
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49733 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49733
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49744
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49732
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49734 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49743
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49742
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49732 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49741
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49740
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49741 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49740 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49742 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49743 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49745 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 49744 -> 443
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49734
                      Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49745
                      Source: unknownHTTPS traffic detected: 91.92.254.230:443 -> 192.168.2.4:49732 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 91.92.254.230:443 -> 192.168.2.4:49733 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 91.92.254.230:443 -> 192.168.2.4:49734 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 91.92.254.230:443 -> 192.168.2.4:49740 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 91.92.254.230:443 -> 192.168.2.4:49741 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 91.92.254.230:443 -> 192.168.2.4:49742 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 91.92.254.230:443 -> 192.168.2.4:49743 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 91.92.254.230:443 -> 192.168.2.4:49744 version: TLS 1.2
                      Source: unknownHTTPS traffic detected: 91.92.254.230:443 -> 192.168.2.4:49745 version: TLS 1.2
                      Source: ZAXkflgLEq.exe, 00000000.00000003.1686332148.0000000004720000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: DirectInput8Creatememstr_ce44904d-b
                      Source: ZAXkflgLEq.exe, 00000000.00000003.1686332148.0000000004720000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: GetRawInputDatamemstr_dd65927f-f
                      Source: Yara matchFile source: 1.3.dialer.exe.58d0000.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.3.dialer.exe.56b0000.6.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.ZAXkflgLEq.exe.4720000.6.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.3.dialer.exe.56b0000.0.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.3.dialer.exe.58d0000.7.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 0.3.ZAXkflgLEq.exe.4940000.7.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 1.3.dialer.exe.56b0000.6.raw.unpack, type: UNPACKEDPE
                      Source: Yara matchFile source: 00000001.00000003.1689171130.00000000058D0000.00000004.00000001.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.1686332148.0000000004720000.00000004.00000001.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.1686637669.0000000004940000.00000004.00000001.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000003.1689027079.00000000056B0000.00000004.00000001.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: Process Memory Space: ZAXkflgLEq.exe PID: 7392, type: MEMORYSTR
                      Source: Yara matchFile source: Process Memory Space: dialer.exe PID: 7436, type: MEMORYSTR
                      Source: C:\Users\user\Desktop\ZAXkflgLEq.exeCode function: 0_2_00C90AA00_2_00C90AA0
                      Source: ZAXkflgLEq.exe, 00000000.00000003.1686101457.0000000002D12000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: OriginalFilenamekernel32j% vs ZAXkflgLEq.exe
                      Source: ZAXkflgLEq.exe, 00000000.00000003.1686332148.0000000004720000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: OriginalFilenameKernelbase.dllj% vs ZAXkflgLEq.exe
                      Source: ZAXkflgLEq.exe, 00000000.00000003.1685443447.0000000004898000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs ZAXkflgLEq.exe
                      Source: ZAXkflgLEq.exe, 00000000.00000002.1687647111.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameTCPZ.exe, vs ZAXkflgLEq.exe
                      Source: ZAXkflgLEq.exe, 00000000.00000003.1685939143.00000000049ED000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs ZAXkflgLEq.exe
                      Source: ZAXkflgLEq.exe, 00000000.00000003.1686157181.00000000047A0000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \[FileVersionProductVersionFileDescriptionCompanyNameProductNameOriginalFilenameInternalNameLegalCopyright vs ZAXkflgLEq.exe
                      Source: ZAXkflgLEq.exe, 00000000.00000003.1686157181.00000000047F0000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: OriginalFilenamekernel32j% vs ZAXkflgLEq.exe
                      Source: ZAXkflgLEq.exe, 00000000.00000003.1686101457.0000000002C80000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: \[FileVersionProductVersionFileDescriptionCompanyNameProductNameOriginalFilenameInternalNameLegalCopyright vs ZAXkflgLEq.exe
                      Source: ZAXkflgLEq.exe, 00000000.00000003.1686637669.0000000004B21000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: OriginalFilenameKernelbase.dllj% vs ZAXkflgLEq.exe
                      Source: ZAXkflgLEq.exe, 00000000.00000003.1685818446.0000000004843000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs ZAXkflgLEq.exe
                      Source: ZAXkflgLEq.exe, 00000000.00000003.1685589224.0000000004A96000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs ZAXkflgLEq.exe
                      Source: ZAXkflgLEq.exeBinary or memory string: OriginalFilenameTCPZ.exe, vs ZAXkflgLEq.exe
                      Source: C:\Users\user\Desktop\ZAXkflgLEq.exeSection loaded: apphelp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\dialer.exeSection loaded: tapi32.dllJump to behavior
                      Source: C:\Windows\SysWOW64\dialer.exeSection loaded: kernel.appcore.dllJump to behavior
                      Source: C:\Windows\SysWOW64\dialer.exeSection loaded: wbemcomn.dllJump to behavior
                      Source: C:\Windows\SysWOW64\dialer.exeSection loaded: amsi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\dialer.exeSection loaded: userenv.dllJump to behavior
                      Source: C:\Windows\SysWOW64\dialer.exeSection loaded: profapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\dialer.exeSection loaded: version.dllJump to behavior
                      Source: C:\Windows\SysWOW64\dialer.exeSection loaded: uxtheme.dllJump to behavior
                      Source: C:\Windows\SysWOW64\dialer.exeSection loaded: windows.storage.dllJump to behavior
                      Source: C:\Windows\SysWOW64\dialer.exeSection loaded: wldp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\dialer.exeSection loaded: sspicli.dllJump to behavior
                      Source: C:\Windows\SysWOW64\dialer.exeSection loaded: mpr.dllJump to behavior
                      Source: C:\Windows\SysWOW64\dialer.exeSection loaded: powrprof.dllJump to behavior
                      Source: C:\Windows\SysWOW64\dialer.exeSection loaded: umpdc.dllJump to behavior
                      Source: C:\Windows\SysWOW64\dialer.exeSection loaded: wbemcomn.dllJump to behavior
                      Source: C:\Windows\SysWOW64\dialer.exeSection loaded: wbemcomn.dllJump to behavior
                      Source: C:\Windows\SysWOW64\dialer.exeSection loaded: mswsock.dllJump to behavior
                      Source: C:\Windows\SysWOW64\dialer.exeSection loaded: dnsapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\dialer.exeSection loaded: iphlpapi.dllJump to behavior
                      Source: C:\Windows\SysWOW64\dialer.exeSection loaded: rasadhlp.dllJump to behavior
                      Source: C:\Windows\SysWOW64\dialer.exeSection loaded: fwpuclnt.dllJump to behavior
                      Source: ZAXkflgLEq.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                      Source: classification engineClassification label: mal72.troj.evad.winEXE@3/0@1/1
                      Source: C:\Windows\SysWOW64\dialer.exeMutant created: \Sessions\1\BaseNamedObjects\MSCTF.Asm.{00000009-4fb3f26-9d18-66b568-627b8a85e4b6}
                      Source: C:\Windows\SysWOW64\dialer.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\SysWOW64\dialer.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_Processor
                      Source: C:\Users\user\Desktop\ZAXkflgLEq.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                      Source: ZAXkflgLEq.exeReversingLabs: Detection: 71%
                      Source: C:\Users\user\Desktop\ZAXkflgLEq.exeEvasive API call chain: __getmainargs,DecisionNodes,exitgraph_0-1272
                      Source: unknownProcess created: C:\Users\user\Desktop\ZAXkflgLEq.exe "C:\Users\user\Desktop\ZAXkflgLEq.exe"
                      Source: C:\Users\user\Desktop\ZAXkflgLEq.exeProcess created: C:\Windows\SysWOW64\dialer.exe "C:\Windows\system32\dialer.exe"
                      Source: C:\Users\user\Desktop\ZAXkflgLEq.exeProcess created: C:\Windows\SysWOW64\dialer.exe "C:\Windows\system32\dialer.exe"Jump to behavior
                      Source: C:\Windows\SysWOW64\dialer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}\InprocServer32Jump to behavior
                      Source: ZAXkflgLEq.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                      Source: ZAXkflgLEq.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                      Source: Binary string: wkernel32.pdb source: ZAXkflgLEq.exe, 00000000.00000003.1686157181.00000000047A0000.00000004.00000001.00020000.00000000.sdmp, ZAXkflgLEq.exe, 00000000.00000003.1686101457.0000000002C80000.00000004.00000001.00020000.00000000.sdmp, dialer.exe, 00000001.00000003.1688891903.00000000057D0000.00000004.00000001.00020000.00000000.sdmp, dialer.exe, 00000001.00000003.1688827463.00000000056B0000.00000004.00000001.00020000.00000000.sdmp
                      Source: Binary string: wkernelbase.pdb source: ZAXkflgLEq.exe, 00000000.00000003.1686332148.0000000004720000.00000004.00000001.00020000.00000000.sdmp, ZAXkflgLEq.exe, 00000000.00000003.1686637669.0000000004940000.00000004.00000001.00020000.00000000.sdmp, dialer.exe, 00000001.00000003.1689171130.00000000058D0000.00000004.00000001.00020000.00000000.sdmp, dialer.exe, 00000001.00000003.1689027079.00000000056B0000.00000004.00000001.00020000.00000000.sdmp
                      Source: Binary string: ntdll.pdb source: ZAXkflgLEq.exe, 00000000.00000003.1685443447.0000000004720000.00000004.00000001.00020000.00000000.sdmp, ZAXkflgLEq.exe, 00000000.00000003.1685589224.0000000004910000.00000004.00000001.00020000.00000000.sdmp, dialer.exe, 00000001.00000003.1688366710.00000000058A0000.00000004.00000001.00020000.00000000.sdmp, dialer.exe, 00000001.00000003.1688216506.00000000056B0000.00000004.00000001.00020000.00000000.sdmp
                      Source: Binary string: wntdll.pdbUGP source: ZAXkflgLEq.exe, 00000000.00000003.1685818446.0000000004720000.00000004.00000001.00020000.00000000.sdmp, ZAXkflgLEq.exe, 00000000.00000003.1685939143.00000000048C0000.00000004.00000001.00020000.00000000.sdmp, dialer.exe, 00000001.00000003.1688685540.0000000005850000.00000004.00000001.00020000.00000000.sdmp, dialer.exe, 00000001.00000003.1688561745.00000000056B0000.00000004.00000001.00020000.00000000.sdmp
                      Source: Binary string: ntdll.pdbUGP source: ZAXkflgLEq.exe, 00000000.00000003.1685443447.0000000004720000.00000004.00000001.00020000.00000000.sdmp, ZAXkflgLEq.exe, 00000000.00000003.1685589224.0000000004910000.00000004.00000001.00020000.00000000.sdmp, dialer.exe, 00000001.00000003.1688366710.00000000058A0000.00000004.00000001.00020000.00000000.sdmp, dialer.exe, 00000001.00000003.1688216506.00000000056B0000.00000004.00000001.00020000.00000000.sdmp
                      Source: Binary string: wntdll.pdb source: ZAXkflgLEq.exe, 00000000.00000003.1685818446.0000000004720000.00000004.00000001.00020000.00000000.sdmp, ZAXkflgLEq.exe, 00000000.00000003.1685939143.00000000048C0000.00000004.00000001.00020000.00000000.sdmp, dialer.exe, 00000001.00000003.1688685540.0000000005850000.00000004.00000001.00020000.00000000.sdmp, dialer.exe, 00000001.00000003.1688561745.00000000056B0000.00000004.00000001.00020000.00000000.sdmp
                      Source: Binary string: wkernelbase.pdbUGP source: ZAXkflgLEq.exe, 00000000.00000003.1686332148.0000000004720000.00000004.00000001.00020000.00000000.sdmp, ZAXkflgLEq.exe, 00000000.00000003.1686637669.0000000004940000.00000004.00000001.00020000.00000000.sdmp, dialer.exe, 00000001.00000003.1689171130.00000000058D0000.00000004.00000001.00020000.00000000.sdmp, dialer.exe, 00000001.00000003.1689027079.00000000056B0000.00000004.00000001.00020000.00000000.sdmp
                      Source: Binary string: wkernel32.pdbUGP source: ZAXkflgLEq.exe, 00000000.00000003.1686157181.00000000047A0000.00000004.00000001.00020000.00000000.sdmp, ZAXkflgLEq.exe, 00000000.00000003.1686101457.0000000002C80000.00000004.00000001.00020000.00000000.sdmp, dialer.exe, 00000001.00000003.1688891903.00000000057D0000.00000004.00000001.00020000.00000000.sdmp, dialer.exe, 00000001.00000003.1688827463.00000000056B0000.00000004.00000001.00020000.00000000.sdmp
                      Source: ZAXkflgLEq.exeStatic PE information: section name: .textbss
                      Source: C:\Users\user\Desktop\ZAXkflgLEq.exeCode function: 0_3_00C95AF4 pushad ; retf 0_3_00C95B03
                      Source: C:\Users\user\Desktop\ZAXkflgLEq.exeCode function: 0_3_00C96285 push F693B671h; retf 0_3_00C9628A
                      Source: C:\Users\user\Desktop\ZAXkflgLEq.exeCode function: 0_3_00C97C52 push dword ptr [edx+ebp+3Bh]; retf 0_3_00C97C5F
                      Source: C:\Users\user\Desktop\ZAXkflgLEq.exeCode function: 0_3_00C95DCE push edi; iretd 0_3_00C95DD5
                      Source: C:\Users\user\Desktop\ZAXkflgLEq.exeCode function: 0_3_00C96F48 push es; ret 0_3_00C96F49
                      Source: C:\Users\user\Desktop\ZAXkflgLEq.exeCode function: 0_3_00C92F4E push eax; retf 0_3_00C92F4F
                      Source: C:\Users\user\Desktop\ZAXkflgLEq.exeCode function: 0_3_00C9416F push ecx; iretd 0_3_00C9417B
                      Source: C:\Users\user\Desktop\ZAXkflgLEq.exeCode function: 0_3_00C9657C push esi; ret 0_3_00C96580
                      Source: C:\Users\user\Desktop\ZAXkflgLEq.exeCode function: 0_3_00C9412F pushad ; ret 0_3_00C94137
                      Source: C:\Users\user\Desktop\ZAXkflgLEq.exeCode function: 0_2_00C49429 push cs; retf 0_2_00C49565
                      Source: C:\Users\user\Desktop\ZAXkflgLEq.exeCode function: 0_2_00C48964 push ebx; retf 0_2_00C48965
                      Source: C:\Users\user\Desktop\ZAXkflgLEq.exeCode function: 0_2_00C4750E push ds; iretd 0_2_00C47517
                      Source: C:\Users\user\Desktop\ZAXkflgLEq.exeCode function: 0_2_00C51269 push edx; retf 0_2_00C51422
                      Source: C:\Users\user\Desktop\ZAXkflgLEq.exeCode function: 0_2_00C4FF22 push edi; iretd 0_2_00C4FF2D
                      Source: C:\Windows\SysWOW64\dialer.exeCode function: 1_3_03284305 push F693B671h; retf 1_3_0328430A
                      Source: C:\Windows\SysWOW64\dialer.exeCode function: 1_3_03283B74 pushad ; retf 1_3_03283B83
                      Source: C:\Windows\SysWOW64\dialer.exeCode function: 1_3_032821AF pushad ; ret 1_3_032821B7
                      Source: C:\Windows\SysWOW64\dialer.exeCode function: 1_3_032821EF push ecx; iretd 1_3_032821FB
                      Source: C:\Windows\SysWOW64\dialer.exeCode function: 1_3_032845FC push esi; ret 1_3_03284600
                      Source: C:\Windows\SysWOW64\dialer.exeCode function: 1_3_03284FC8 push es; ret 1_3_03284FC9
                      Source: C:\Windows\SysWOW64\dialer.exeCode function: 1_3_03280FCE push eax; retf 1_3_03280FCF
                      Source: C:\Windows\SysWOW64\dialer.exeCode function: 1_3_03283E4E push edi; iretd 1_3_03283E55
                      Source: C:\Windows\SysWOW64\dialer.exeCode function: 1_3_03285CD2 push dword ptr [edx+ebp+3Bh]; retf 1_3_03285CDF
                      Source: C:\Users\user\Desktop\ZAXkflgLEq.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\dialer.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\dialer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\dialer.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                      Source: C:\Windows\SysWOW64\dialer.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior

                      Malware Analysis System Evasion

                      barindex
                      Source: dialer.exe, 00000001.00000002.2180370129.00000000036C0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OLLYDBG.EXE
                      Source: dialer.exe, 00000001.00000002.2180370129.00000000036C0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: X64DBG.EXE
                      Source: dialer.exe, 00000001.00000002.2180370129.00000000036C0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: IMMUNITYDEBUGGER.EXEWINDUMP.EXEX64DBG.EXEX32DBG.EXEOLLYDBG.EXEP
                      Source: dialer.exe, 00000001.00000002.2180370129.00000000036C0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: WINDUMP.EXE
                      Source: C:\Windows\SysWOW64\dialer.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_Processor
                      Source: C:\Windows\SysWOW64\dialer.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT * FROM Win32_Processor
                      Source: dialer.exe, 00000001.00000003.1689027079.00000000056B0000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: DisableGuestVmNetworkConnectivity
                      Source: dialer.exe, 00000001.00000002.2180219972.00000000034E7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                      Source: dialer.exe, 00000001.00000003.1689027079.00000000056B0000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: EnableGuestVmNetworkConnectivity
                      Source: C:\Users\user\Desktop\ZAXkflgLEq.exeProcess information queried: ProcessInformationJump to behavior
                      Source: C:\Users\user\Desktop\ZAXkflgLEq.exeCode function: 0_3_00C92277 mov eax, dword ptr fs:[00000030h]0_3_00C92277
                      Source: C:\Users\user\Desktop\ZAXkflgLEq.exeCode function: 0_2_00C92277 mov eax, dword ptr fs:[00000030h]0_2_00C92277
                      Source: C:\Windows\SysWOW64\dialer.exeCode function: 1_3_0328027F mov eax, dword ptr fs:[00000030h]1_3_0328027F
                      Source: C:\Users\user\Desktop\ZAXkflgLEq.exeCode function: 0_2_00C90AA0 HeapCreate,HeapAlloc,HeapAlloc,GetModuleHandleA,HeapAlloc,CreateEventA,HeapAlloc,HeapAlloc,GetProcessHeap,HeapAlloc,memcpy,GetProcessHeap,HeapAlloc,memcpy,HeapFree,WaitForSingleObject,FindCloseChangeNotification,VirtualFree,GetProcessHeap,HeapFree,HeapDestroy,0_2_00C90AA0
                      Source: C:\Users\user\Desktop\ZAXkflgLEq.exeProcess created: C:\Windows\SysWOW64\dialer.exe "C:\Windows\system32\dialer.exe"Jump to behavior
                      Source: dialer.exe, 00000001.00000002.2180370129.00000000036C0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OllyDbg.exe

                      Stealing of Sensitive Information

                      barindex
                      Source: Yara matchFile source: 00000001.00000003.1687455325.00000000035F0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.1684570895.00000000010B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.1687219829.0000000003DE0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.2180403207.0000000004E70000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY

                      Remote Access Functionality

                      barindex
                      Source: Yara matchFile source: 00000001.00000003.1687455325.00000000035F0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.1684570895.00000000010B0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000000.00000003.1687219829.0000000003DE0000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      Source: Yara matchFile source: 00000001.00000002.2180403207.0000000004E70000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                      Gather Victim Identity InformationAcquire InfrastructureValid Accounts11
                      Windows Management Instrumentation
                      1
                      DLL Side-Loading
                      11
                      Process Injection
                      1
                      Virtualization/Sandbox Evasion
                      21
                      Input Capture
                      131
                      Security Software Discovery
                      Remote Services21
                      Input Capture
                      12
                      Encrypted Channel
                      Exfiltration Over Other Network MediumAbuse Accessibility Features
                      CredentialsDomainsDefault Accounts2
                      Command and Scripting Interpreter
                      Boot or Logon Initialization Scripts1
                      DLL Side-Loading
                      11
                      Process Injection
                      LSASS Memory1
                      Virtualization/Sandbox Evasion
                      Remote Desktop Protocol1
                      Archive Collected Data
                      1
                      Non-Application Layer Protocol
                      Exfiltration Over BluetoothNetwork Denial of Service
                      Email AddressesDNS ServerDomain Accounts1
                      Native API
                      Logon Script (Windows)Logon Script (Windows)1
                      Obfuscated Files or Information
                      Security Account Manager1
                      Process Discovery
                      SMB/Windows Admin SharesData from Network Shared Drive2
                      Application Layer Protocol
                      Automated ExfiltrationData Encrypted for Impact
                      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                      DLL Side-Loading
                      NTDS2
                      System Information Discovery
                      Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                      Hide Legend

                      Legend:

                      • Process
                      • Signature
                      • Created File
                      • DNS/IP Info
                      • Is Dropped
                      • Is Windows Process
                      • Number of created Registry Values
                      • Number of created Files
                      • Visual Basic
                      • Delphi
                      • Java
                      • .Net C# or VB.NET
                      • C, C++ or other language
                      • Is malicious
                      • Internet

                      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                      windows-stand
                      SourceDetectionScannerLabelLink
                      ZAXkflgLEq.exe71%ReversingLabsWin32.Trojan.Rhadamanthys
                      ZAXkflgLEq.exe100%AviraTR/Crypt.XPACK.Gen
                      ZAXkflgLEq.exe100%Joe Sandbox ML
                      No Antivirus matches
                      No Antivirus matches
                      No Antivirus matches
                      SourceDetectionScannerLabelLink
                      https://www.carssell.online:443/b45c71e9ac60e42309ff71/ox15jpua.xlk0e0%Avira URL Cloudsafe
                      NameIPActiveMaliciousAntivirus DetectionReputation
                      www.carssell.online
                      91.92.254.230
                      truefalse
                        unknown
                        NameSourceMaliciousAntivirus DetectionReputation
                        https://www.carssell.online:443/b45c71e9ac60e42309ff71/ox15jpua.xlk0edialer.exe, 00000001.00000002.2180075196.000000000327C000.00000004.00000010.00020000.00000000.sdmpfalse
                        • Avira URL Cloud: safe
                        unknown
                        • No. of IPs < 25%
                        • 25% < No. of IPs < 50%
                        • 50% < No. of IPs < 75%
                        • 75% < No. of IPs
                        IPDomainCountryFlagASNASN NameMalicious
                        91.92.254.230
                        www.carssell.onlineBulgaria
                        34368THEZONEBGfalse
                        Joe Sandbox version:40.0.0 Tourmaline
                        Analysis ID:1417252
                        Start date and time:2024-03-28 20:13:04 +01:00
                        Joe Sandbox product:CloudBasic
                        Overall analysis duration:0h 4m 55s
                        Hypervisor based Inspection enabled:false
                        Report type:full
                        Cookbook file name:default.jbs
                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                        Number of analysed new started processes analysed:5
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • HCA enabled
                        • EGA enabled
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Sample name:ZAXkflgLEq.exe
                        renamed because original name is a hash value
                        Original Sample Name:464ea1bd9930cd4ecae392d7214c3905.exe
                        Detection:MAL
                        Classification:mal72.troj.evad.winEXE@3/0@1/1
                        EGA Information:
                        • Successful, ratio: 50%
                        HCA Information:Failed
                        Cookbook Comments:
                        • Found application associated with file extension: .exe
                        • Stop behavior analysis, all processes terminated
                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, SIHClient.exe, conhost.exe
                        • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
                        • Execution Graph export aborted for target dialer.exe, PID 7436 because there are no executed function
                        • Not all processes where analyzed, report is missing behavior information
                        • Report size getting too big, too many NtOpenKeyEx calls found.
                        • Report size getting too big, too many NtQueryValueKey calls found.
                        • VT rate limit hit for: ZAXkflgLEq.exe
                        No simulations
                        No context
                        No context
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        THEZONEBGYdpdt8Efff.exeGet hashmaliciousMetasploitBrowse
                        • 91.92.251.119
                        SecuriteInfo.com.Linux.BtcMine.798.28745.31751.elfGet hashmaliciousUnknownBrowse
                        • 91.92.249.202
                        SecuriteInfo.com.Linux.BtcMine.791.1794.25936.elfGet hashmaliciousUnknownBrowse
                        • 91.92.249.202
                        https://accedi.91-92-243-23.cprapid.com/ING/Get hashmaliciousUnknownBrowse
                        • 91.92.243.23
                        6Y6IpTEdR1.elfGet hashmaliciousMiraiBrowse
                        • 91.92.241.246
                        6CllngOjeS.elfGet hashmaliciousMiraiBrowse
                        • 91.92.241.246
                        QFrEHZB9q7.elfGet hashmaliciousMiraiBrowse
                        • 91.92.241.246
                        TVcKf6reGr.elfGet hashmaliciousMiraiBrowse
                        • 91.92.241.246
                        3f1esZupW0.elfGet hashmaliciousMiraiBrowse
                        • 91.92.241.246
                        bNEazx06Ai.elfGet hashmaliciousMiraiBrowse
                        • 91.92.241.246
                        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                        caec7ddf6889590d999d7ca1b76373b6IN3 0GC-(94762)_489.lnkGet hashmaliciousRHADAMANTHYSBrowse
                        • 91.92.254.230
                        SecuriteInfo.com.Win32.TrojanX-gen.9272.30056.exeGet hashmaliciousPureCrypter, Amadey, PureLog Stealer, RHADAMANTHYSBrowse
                        • 91.92.254.230
                        Browser Update.jsGet hashmaliciousBitRAT, RHADAMANTHYSBrowse
                        • 91.92.254.230
                        qHqbFN7Xof.exeGet hashmaliciousRHADAMANTHYSBrowse
                        • 91.92.254.230
                        qqeng.pdf.lnkGet hashmaliciousRHADAMANTHYSBrowse
                        • 91.92.254.230
                        qqeng.exeGet hashmaliciousRHADAMANTHYSBrowse
                        • 91.92.254.230
                        sdfsadsa.jsGet hashmaliciousRHADAMANTHYSBrowse
                        • 91.92.254.230
                        ChromeSetup.exeGet hashmaliciousRHADAMANTHYSBrowse
                        • 91.92.254.230
                        iSbEfOEmv8.exeGet hashmaliciousRHADAMANTHYSBrowse
                        • 91.92.254.230
                        Leak Porn MMS Teen Girl.jsGet hashmaliciousRHADAMANTHYSBrowse
                        • 91.92.254.230
                        No context
                        No created / dropped files found
                        File type:PE32 executable (GUI) Intel 80386, for MS Windows
                        Entropy (8bit):4.843708182845879
                        TrID:
                        • Win32 Executable (generic) a (10002005/4) 99.96%
                        • Generic Win/DOS Executable (2004/3) 0.02%
                        • DOS Executable Generic (2002/1) 0.02%
                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                        File name:ZAXkflgLEq.exe
                        File size:363'520 bytes
                        MD5:464ea1bd9930cd4ecae392d7214c3905
                        SHA1:525be920ce25cf340d8e47a0f3fd993a908449fc
                        SHA256:cade479a0b203af759b0f82c80d4b95ca46abe3a4f665f365953eb5e25fe9284
                        SHA512:73bcb3c6119a73ccd34d8300cf4e4fc3b4abf4f7cdbba49d9ad341931785e36dc98258b0e759fe999c31b56320533f228bee8755838cb7850797ef5f14ad3aa3
                        SSDEEP:6144:g2qezd2ab1/RuHk+M3k8M3W7XomjOJCqshrOlumY6DMIewgxQfqrsb:gf2R/EEkCQFYDwRqw
                        TLSH:017423DFB69A5418ED3626F3DE5652383B1574580B460EFF9D7B6E20A010FA94E28F03
                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......]...............v...............v...................,.....................\.............Rich....................PE..L..._{_d...
                        Icon Hash:90cececece8e8eb0
                        Entrypoint:0x4508ce
                        Entrypoint Section:.text
                        Digitally signed:false
                        Imagebase:0x400000
                        Subsystem:windows gui
                        Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                        DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                        Time Stamp:0x645F7B5F [Sat May 13 11:58:23 2023 UTC]
                        TLS Callbacks:
                        CLR (.Net) Version:
                        OS Version Major:6
                        OS Version Minor:0
                        File Version Major:6
                        File Version Minor:0
                        Subsystem Version Major:6
                        Subsystem Version Minor:0
                        Import Hash:be49a2411263045f8ee0c442783b5f83
                        Instruction
                        push ebp
                        mov ebp, esp
                        push FFFFFFFFh
                        push 004697B0h
                        push 004510BFh
                        mov eax, dword ptr fs:[00000000h]
                        push eax
                        mov dword ptr fs:[00000000h], esp
                        sub esp, 68h
                        push ebx
                        push esi
                        push edi
                        mov dword ptr [ebp-18h], esp
                        xor ebx, ebx
                        mov dword ptr [ebp-04h], ebx
                        push 00000002h
                        call dword ptr [00462040h]
                        pop ecx
                        or dword ptr [0046A038h], FFFFFFFFh
                        or dword ptr [0046A03Ch], FFFFFFFFh
                        call dword ptr [00462044h]
                        mov ecx, dword ptr [0046A034h]
                        mov dword ptr [eax], ecx
                        call dword ptr [00462048h]
                        mov ecx, dword ptr [0046A030h]
                        mov dword ptr [eax], ecx
                        mov eax, dword ptr [0046204Ch]
                        mov eax, dword ptr [eax]
                        mov dword ptr [0046A040h], eax
                        call 00007F409D07B9B9h
                        cmp dword ptr [0046A010h], ebx
                        jne 00007F409D07B8BEh
                        push 00450A3Eh
                        call dword ptr [00462050h]
                        pop ecx
                        call 00007F409D07B98Bh
                        push 0046A00Ch
                        push 0046A008h
                        call 00007F409D07C009h
                        mov eax, dword ptr [0046A02Ch]
                        mov dword ptr [ebp-6Ch], eax
                        lea eax, dword ptr [ebp-6Ch]
                        push eax
                        push dword ptr [0046A028h]
                        lea eax, dword ptr [ebp-64h]
                        push eax
                        lea eax, dword ptr [ebp-70h]
                        push eax
                        lea eax, dword ptr [ebp-60h]
                        push eax
                        call dword ptr [00462058h]
                        push 0046A004h
                        push 0046A000h
                        call 00007F409D07BFD6h
                        NameVirtual AddressVirtual Size Is in Section
                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IMPORT0x699380x78.rdata
                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x6b0000x3e8.rsrc
                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x6c0000xec.reloc
                        IMAGE_DIRECTORY_ENTRY_DEBUG0x697bc0x1c.rdata
                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IAT0x620000xe0.rdata
                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                        .text0x10000x500cb0x50200bdbcdd118c6e30fb53bf5111c1951d15False0.685620002925117data4.9977211758267455IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        .textbss0x520000x100000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        .rdata0x620000x7de60x7e001709bd218ecea6c5cc61d8d6b305dc08False0.466827876984127data3.2818934390044032IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .data0x6a0000x440x200598e1aae6ecbd8237c4383f4be94b9f1False0.033203125data0.020393135236084953IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        .rsrc0x6b0000x3e80x400f0f5533983957143427cb560728e8d9bFalse0.43359375data3.2476078648555533IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .reloc0x6c0000xec0x200a556edc642fb4f2d688da12eb6e5cf04False0.490234375data3.440680260594041IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                        NameRVASizeTypeLanguageCountryZLIB Complexity
                        RT_VERSION0x6b0600x384dataEnglishUnited States0.45555555555555555
                        DLLImport
                        KERNEL32.dllHeapAlloc, HeapFree, GetProcessHeap, WaitForSingleObject, HeapDestroy, MulDiv, lstrlenW, CreateEventA, GetModuleFileNameW, GetModuleHandleA, CloseHandle, HeapCreate, GetStartupInfoA
                        USER32.dllAdjustWindowRect, GetDlgItem, GetIconInfo, SendDlgItemMessageA, InflateRect, DialogBoxParamA, CreateIconFromResourceEx, SendMessageW, LookupIconIdFromDirectoryEx, LoadImageA, SetForegroundWindow, EndDialog, OffsetRect, GetWindowLongA, SetWindowPos, UnionRect, SetWindowTextW
                        GDI32.dllGetObjectA
                        ole32.dllCoCreateGuid, CoTaskMemFree, CoInitializeEx
                        MSVCRT.dll__set_app_type, __p__fmode, __p__commode, _adjust_fdiv, __setusermatherr, _initterm, __getmainargs, _acmdln, exit, _XcptFilter, _exit, memset, memcpy, wcsrchr, wcschr, _controlfp, _except_handler3
                        Language of compilation systemCountry where language is spokenMap
                        EnglishUnited States
                        TimestampSource PortDest PortSource IPDest IP
                        Mar 28, 2024 20:13:59.704015970 CET49732443192.168.2.491.92.254.230
                        Mar 28, 2024 20:13:59.704047918 CET4434973291.92.254.230192.168.2.4
                        Mar 28, 2024 20:13:59.704125881 CET49732443192.168.2.491.92.254.230
                        Mar 28, 2024 20:13:59.704188108 CET49732443192.168.2.491.92.254.230
                        Mar 28, 2024 20:13:59.704195023 CET4434973291.92.254.230192.168.2.4
                        Mar 28, 2024 20:14:00.274635077 CET4434973291.92.254.230192.168.2.4
                        Mar 28, 2024 20:14:00.274702072 CET49732443192.168.2.491.92.254.230
                        Mar 28, 2024 20:14:00.282838106 CET49732443192.168.2.491.92.254.230
                        Mar 28, 2024 20:14:00.282850027 CET4434973291.92.254.230192.168.2.4
                        Mar 28, 2024 20:14:00.283097029 CET4434973291.92.254.230192.168.2.4
                        Mar 28, 2024 20:14:00.283150911 CET49732443192.168.2.491.92.254.230
                        Mar 28, 2024 20:14:00.285976887 CET49732443192.168.2.491.92.254.230
                        Mar 28, 2024 20:14:00.285995007 CET4434973291.92.254.230192.168.2.4
                        Mar 28, 2024 20:14:05.271744013 CET49733443192.168.2.491.92.254.230
                        Mar 28, 2024 20:14:05.271779060 CET4434973391.92.254.230192.168.2.4
                        Mar 28, 2024 20:14:05.271861076 CET49733443192.168.2.491.92.254.230
                        Mar 28, 2024 20:14:05.271958113 CET49733443192.168.2.491.92.254.230
                        Mar 28, 2024 20:14:05.271967888 CET4434973391.92.254.230192.168.2.4
                        Mar 28, 2024 20:14:05.812031031 CET4434973391.92.254.230192.168.2.4
                        Mar 28, 2024 20:14:05.812144995 CET49733443192.168.2.491.92.254.230
                        Mar 28, 2024 20:14:05.813637972 CET49733443192.168.2.491.92.254.230
                        Mar 28, 2024 20:14:05.813644886 CET4434973391.92.254.230192.168.2.4
                        Mar 28, 2024 20:14:05.813880920 CET4434973391.92.254.230192.168.2.4
                        Mar 28, 2024 20:14:05.813940048 CET49733443192.168.2.491.92.254.230
                        Mar 28, 2024 20:14:05.817764997 CET49733443192.168.2.491.92.254.230
                        Mar 28, 2024 20:14:05.817791939 CET4434973391.92.254.230192.168.2.4
                        Mar 28, 2024 20:14:10.818871021 CET49734443192.168.2.491.92.254.230
                        Mar 28, 2024 20:14:10.818916082 CET4434973491.92.254.230192.168.2.4
                        Mar 28, 2024 20:14:10.818981886 CET49734443192.168.2.491.92.254.230
                        Mar 28, 2024 20:14:10.819084883 CET49734443192.168.2.491.92.254.230
                        Mar 28, 2024 20:14:10.819097996 CET4434973491.92.254.230192.168.2.4
                        Mar 28, 2024 20:14:11.382241964 CET4434973491.92.254.230192.168.2.4
                        Mar 28, 2024 20:14:11.382353067 CET49734443192.168.2.491.92.254.230
                        Mar 28, 2024 20:14:11.383959055 CET49734443192.168.2.491.92.254.230
                        Mar 28, 2024 20:14:11.383969069 CET4434973491.92.254.230192.168.2.4
                        Mar 28, 2024 20:14:11.387305975 CET49734443192.168.2.491.92.254.230
                        Mar 28, 2024 20:14:11.390552998 CET4434973491.92.254.230192.168.2.4
                        Mar 28, 2024 20:14:11.390635014 CET49734443192.168.2.491.92.254.230
                        Mar 28, 2024 20:14:16.381176949 CET49740443192.168.2.491.92.254.230
                        Mar 28, 2024 20:14:16.381221056 CET4434974091.92.254.230192.168.2.4
                        Mar 28, 2024 20:14:16.381347895 CET49740443192.168.2.491.92.254.230
                        Mar 28, 2024 20:14:16.381469011 CET49740443192.168.2.491.92.254.230
                        Mar 28, 2024 20:14:16.381479025 CET4434974091.92.254.230192.168.2.4
                        Mar 28, 2024 20:14:16.944820881 CET4434974091.92.254.230192.168.2.4
                        Mar 28, 2024 20:14:16.945071936 CET49740443192.168.2.491.92.254.230
                        Mar 28, 2024 20:14:16.946537971 CET49740443192.168.2.491.92.254.230
                        Mar 28, 2024 20:14:16.946547031 CET4434974091.92.254.230192.168.2.4
                        Mar 28, 2024 20:14:16.946693897 CET4434974091.92.254.230192.168.2.4
                        Mar 28, 2024 20:14:16.946757078 CET49740443192.168.2.491.92.254.230
                        Mar 28, 2024 20:14:16.950090885 CET49740443192.168.2.491.92.254.230
                        Mar 28, 2024 20:14:16.950114012 CET4434974091.92.254.230192.168.2.4
                        Mar 28, 2024 20:14:21.943599939 CET49741443192.168.2.491.92.254.230
                        Mar 28, 2024 20:14:21.943635941 CET4434974191.92.254.230192.168.2.4
                        Mar 28, 2024 20:14:21.943792105 CET49741443192.168.2.491.92.254.230
                        Mar 28, 2024 20:14:21.943880081 CET49741443192.168.2.491.92.254.230
                        Mar 28, 2024 20:14:21.943891048 CET4434974191.92.254.230192.168.2.4
                        Mar 28, 2024 20:14:22.483638048 CET4434974191.92.254.230192.168.2.4
                        Mar 28, 2024 20:14:22.483748913 CET49741443192.168.2.491.92.254.230
                        Mar 28, 2024 20:14:22.485389948 CET49741443192.168.2.491.92.254.230
                        Mar 28, 2024 20:14:22.485404015 CET4434974191.92.254.230192.168.2.4
                        Mar 28, 2024 20:14:22.485615015 CET4434974191.92.254.230192.168.2.4
                        Mar 28, 2024 20:14:22.485688925 CET49741443192.168.2.491.92.254.230
                        Mar 28, 2024 20:14:22.488742113 CET49741443192.168.2.491.92.254.230
                        Mar 28, 2024 20:14:22.488764048 CET4434974191.92.254.230192.168.2.4
                        Mar 28, 2024 20:14:28.301003933 CET49742443192.168.2.491.92.254.230
                        Mar 28, 2024 20:14:28.301049948 CET4434974291.92.254.230192.168.2.4
                        Mar 28, 2024 20:14:28.301142931 CET49742443192.168.2.491.92.254.230
                        Mar 28, 2024 20:14:28.301275969 CET49742443192.168.2.491.92.254.230
                        Mar 28, 2024 20:14:28.301285028 CET4434974291.92.254.230192.168.2.4
                        Mar 28, 2024 20:14:28.865582943 CET4434974291.92.254.230192.168.2.4
                        Mar 28, 2024 20:14:28.865709066 CET49742443192.168.2.491.92.254.230
                        Mar 28, 2024 20:14:28.867258072 CET49742443192.168.2.491.92.254.230
                        Mar 28, 2024 20:14:28.867266893 CET4434974291.92.254.230192.168.2.4
                        Mar 28, 2024 20:14:28.867424965 CET4434974291.92.254.230192.168.2.4
                        Mar 28, 2024 20:14:28.867468119 CET49742443192.168.2.491.92.254.230
                        Mar 28, 2024 20:14:28.870656967 CET49742443192.168.2.491.92.254.230
                        Mar 28, 2024 20:14:28.870673895 CET4434974291.92.254.230192.168.2.4
                        Mar 28, 2024 20:14:33.881027937 CET49743443192.168.2.491.92.254.230
                        Mar 28, 2024 20:14:33.881078005 CET4434974391.92.254.230192.168.2.4
                        Mar 28, 2024 20:14:33.881148100 CET49743443192.168.2.491.92.254.230
                        Mar 28, 2024 20:14:33.881263971 CET49743443192.168.2.491.92.254.230
                        Mar 28, 2024 20:14:33.881278992 CET4434974391.92.254.230192.168.2.4
                        Mar 28, 2024 20:14:34.450644016 CET4434974391.92.254.230192.168.2.4
                        Mar 28, 2024 20:14:34.450825930 CET49743443192.168.2.491.92.254.230
                        Mar 28, 2024 20:14:34.456334114 CET49743443192.168.2.491.92.254.230
                        Mar 28, 2024 20:14:34.456351995 CET4434974391.92.254.230192.168.2.4
                        Mar 28, 2024 20:14:34.456654072 CET4434974391.92.254.230192.168.2.4
                        Mar 28, 2024 20:14:34.456722975 CET49743443192.168.2.491.92.254.230
                        Mar 28, 2024 20:14:34.459772110 CET49743443192.168.2.491.92.254.230
                        Mar 28, 2024 20:14:34.459809065 CET4434974391.92.254.230192.168.2.4
                        Mar 28, 2024 20:14:39.443681002 CET49744443192.168.2.491.92.254.230
                        Mar 28, 2024 20:14:39.443732023 CET4434974491.92.254.230192.168.2.4
                        Mar 28, 2024 20:14:39.443825960 CET49744443192.168.2.491.92.254.230
                        Mar 28, 2024 20:14:39.443964005 CET49744443192.168.2.491.92.254.230
                        Mar 28, 2024 20:14:39.443980932 CET4434974491.92.254.230192.168.2.4
                        Mar 28, 2024 20:14:40.006283045 CET4434974491.92.254.230192.168.2.4
                        Mar 28, 2024 20:14:40.006407022 CET49744443192.168.2.491.92.254.230
                        Mar 28, 2024 20:14:40.007884026 CET49744443192.168.2.491.92.254.230
                        Mar 28, 2024 20:14:40.007890940 CET4434974491.92.254.230192.168.2.4
                        Mar 28, 2024 20:14:40.008111954 CET4434974491.92.254.230192.168.2.4
                        Mar 28, 2024 20:14:40.008203030 CET49744443192.168.2.491.92.254.230
                        Mar 28, 2024 20:14:40.010433912 CET49744443192.168.2.491.92.254.230
                        Mar 28, 2024 20:14:40.010445118 CET4434974491.92.254.230192.168.2.4
                        Mar 28, 2024 20:14:45.661933899 CET49745443192.168.2.491.92.254.230
                        Mar 28, 2024 20:14:45.661972046 CET4434974591.92.254.230192.168.2.4
                        Mar 28, 2024 20:14:45.662034035 CET49745443192.168.2.491.92.254.230
                        Mar 28, 2024 20:14:45.662118912 CET49745443192.168.2.491.92.254.230
                        Mar 28, 2024 20:14:45.662127972 CET4434974591.92.254.230192.168.2.4
                        Mar 28, 2024 20:14:46.199973106 CET4434974591.92.254.230192.168.2.4
                        Mar 28, 2024 20:14:46.200203896 CET49745443192.168.2.491.92.254.230
                        Mar 28, 2024 20:14:46.201570034 CET49745443192.168.2.491.92.254.230
                        Mar 28, 2024 20:14:46.201580048 CET4434974591.92.254.230192.168.2.4
                        Mar 28, 2024 20:14:46.201750994 CET4434974591.92.254.230192.168.2.4
                        Mar 28, 2024 20:14:46.201798916 CET49745443192.168.2.491.92.254.230
                        Mar 28, 2024 20:14:46.204579115 CET49745443192.168.2.491.92.254.230
                        Mar 28, 2024 20:14:46.204600096 CET4434974591.92.254.230192.168.2.4
                        TimestampSource PortDest PortSource IPDest IP
                        Mar 28, 2024 20:13:59.598016977 CET5729453192.168.2.41.1.1.1
                        Mar 28, 2024 20:13:59.701288939 CET53572941.1.1.1192.168.2.4
                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                        Mar 28, 2024 20:13:59.598016977 CET192.168.2.41.1.1.10x434aStandard query (0)www.carssell.onlineA (IP address)IN (0x0001)false
                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                        Mar 28, 2024 20:13:59.701288939 CET1.1.1.1192.168.2.40x434aNo error (0)www.carssell.online91.92.254.230A (IP address)IN (0x0001)false
                        Mar 28, 2024 20:13:59.701288939 CET1.1.1.1192.168.2.40x434aNo error (0)www.carssell.online91.92.255.217A (IP address)IN (0x0001)false

                        Click to jump to process

                        Click to jump to process

                        Click to dive into process behavior distribution

                        Click to jump to process

                        Target ID:0
                        Start time:20:13:53
                        Start date:28/03/2024
                        Path:C:\Users\user\Desktop\ZAXkflgLEq.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Users\user\Desktop\ZAXkflgLEq.exe"
                        Imagebase:0xc40000
                        File size:363'520 bytes
                        MD5 hash:464EA1BD9930CD4ECAE392D7214C3905
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_RHADAMANTHYS, Description: Yara detected RHADAMANTHYS Stealer, Source: 00000000.00000003.1684570895.00000000010B0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000000.00000003.1686332148.0000000004720000.00000004.00000001.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000000.00000003.1686637669.0000000004940000.00000004.00000001.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_RHADAMANTHYS, Description: Yara detected RHADAMANTHYS Stealer, Source: 00000000.00000003.1687219829.0000000003DE0000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                        Reputation:low
                        Has exited:true

                        Target ID:1
                        Start time:20:13:56
                        Start date:28/03/2024
                        Path:C:\Windows\SysWOW64\dialer.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Windows\system32\dialer.exe"
                        Imagebase:0xa20000
                        File size:32'256 bytes
                        MD5 hash:E4BD77FB64DDE78F1A95ECE09F6A9B85
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Yara matches:
                        • Rule: JoeSecurity_RHADAMANTHYS, Description: Yara detected RHADAMANTHYS Stealer, Source: 00000001.00000003.1687455325.00000000035F0000.00000004.00001000.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000001.00000003.1689171130.00000000058D0000.00000004.00000001.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_Keylogger_Generic, Description: Yara detected Keylogger Generic, Source: 00000001.00000003.1689027079.00000000056B0000.00000004.00000001.00020000.00000000.sdmp, Author: Joe Security
                        • Rule: JoeSecurity_RHADAMANTHYS, Description: Yara detected RHADAMANTHYS Stealer, Source: 00000001.00000002.2180403207.0000000004E70000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                        Reputation:moderate
                        Has exited:true

                        Reset < >

                          Execution Graph

                          Execution Coverage:3.3%
                          Dynamic/Decrypted Code Coverage:0%
                          Signature Coverage:35.6%
                          Total number of Nodes:59
                          Total number of Limit Nodes:1
                          execution_graph 1267 c908ce __set_app_type __p__fmode __p__commode 1268 c9093d 1267->1268 1269 c90951 1268->1269 1270 c90945 __setusermatherr 1268->1270 1279 c90a2c _controlfp 1269->1279 1270->1269 1272 c90956 _initterm __getmainargs _initterm 1273 c909aa GetStartupInfoA 1272->1273 1275 c909de GetModuleHandleA 1273->1275 1280 c90fe0 1275->1280 1279->1272 1283 c90aa0 HeapCreate 1280->1283 1284 c90a02 exit _XcptFilter 1283->1284 1285 c90ac1 HeapAlloc 1283->1285 1286 c90e31 HeapDestroy 1285->1286 1287 c90b07 GetModuleHandleA HeapAlloc CreateEventA 1285->1287 1286->1284 1287->1286 1288 c90b3f 1287->1288 1303 c90e50 GetProcessHeap RtlAllocateHeap 1288->1303 1290 c90b53 1291 c90db4 WaitForSingleObject FindCloseChangeNotification 1290->1291 1295 c90c06 HeapAlloc 1290->1295 1292 c90dd2 1291->1292 1292->1286 1293 c90e13 GetProcessHeap HeapFree 1292->1293 1294 c90e07 VirtualFree 1292->1294 1293->1286 1293->1292 1294->1293 1295->1291 1299 c90c1b 1295->1299 1296 c90da3 HeapFree 1296->1291 1297 c90d9f 1297->1296 1298 c90d11 GetProcessHeap HeapAlloc 1298->1299 1301 c90d2d memcpy 1298->1301 1299->1296 1299->1297 1299->1298 1300 c90ccf GetProcessHeap HeapAlloc 1299->1300 1300->1299 1302 c90cef memcpy 1300->1302 1301->1299 1302->1299 1304 c90fae 1303->1304 1305 c90e7a memset GetModuleFileNameW 1303->1305 1304->1290 1306 c90fbe GetProcessHeap HeapFree 1305->1306 1307 c90ea7 wcsrchr 1305->1307 1306->1304 1307->1306 1308 c90ec0 wcschr 1307->1308 1309 c90ed2 1308->1309 1310 c90ed7 lstrlenW 1308->1310 1309->1310 1311 c90ee9 memset 1310->1311 1312 c90f86 RtlFreeHeap MulDiv 1310->1312 1314 c90f00 1311->1314 1312->1304 1315 c90f35 wcschr 1314->1315 1316 c90f54 1314->1316 1315->1312 1315->1314 1316->1312 1317 c90f68 HeapFree 1316->1317 1317->1290 1319 c92000 1320 c92009 1319->1320 1323 c922cc 1320->1323 1322 c92042 1335 c92277 GetPEB 1323->1335 1325 c922e5 1326 c92306 VirtualAlloc 1325->1326 1331 c923f7 1325->1331 1327 c9231e 1326->1327 1326->1331 1337 c92098 VirtualAlloc 1327->1337 1330 c923e8 VirtualFree 1330->1331 1331->1322 1332 c92356 VirtualAlloc 1332->1330 1334 c9236d 1332->1334 1333 c923ab VirtualProtect 1333->1330 1334->1333 1336 c92295 1335->1336 1336->1325 1338 c92270 1337->1338 1340 c920d0 VirtualFree 1337->1340 1338->1330 1338->1332 1340->1338

                          Control-flow Graph

                          APIs
                          • HeapCreate.KERNELBASE(00000000,00100000,01000000,?,?,?,?,?,?,?,00C90FEE,00C90A02,00CA20E0,00C90A02,00000000), ref: 00C90AAF
                          • HeapAlloc.KERNEL32 ref: 00C90AF7
                          • GetModuleHandleA.KERNEL32(00000000), ref: 00C90B09
                          • HeapAlloc.KERNEL32(00000000,00000008,0004B000), ref: 00C90B21
                          • CreateEventA.KERNEL32(00000000,00000000,00000000,00000000), ref: 00C90B2E
                            • Part of subcall function 00C90E50: GetProcessHeap.KERNEL32(00000000,3B9ACA00,00000000,76ED5E70,00000000,00000000), ref: 00C90E67
                            • Part of subcall function 00C90E50: RtlAllocateHeap.NTDLL(00000000), ref: 00C90E6A
                            • Part of subcall function 00C90E50: memset.MSVCRT ref: 00C90E85
                            • Part of subcall function 00C90E50: GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00C90E99
                            • Part of subcall function 00C90E50: wcsrchr.MSVCRT ref: 00C90EAE
                            • Part of subcall function 00C90E50: wcschr.MSVCRT ref: 00C90EC3
                            • Part of subcall function 00C90E50: lstrlenW.KERNEL32(-00000002), ref: 00C90ED8
                            • Part of subcall function 00C90E50: memset.MSVCRT ref: 00C90EF2
                            • Part of subcall function 00C90E50: wcschr.MSVCRT ref: 00C90F3B
                          • HeapAlloc.KERNEL32(?,00000008,00000000,?,?,?,?,?,?,?,?,?,?,00C90FEE,00C90A02,00CA20E0), ref: 00C90C0D
                          • GetProcessHeap.KERNEL32(00000008,?,?,?,?,?,?,?,?,?,?,?,00C90FEE,00C90A02,00CA20E0,00C90A02), ref: 00C90CD8
                          • HeapAlloc.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,00C90FEE,00C90A02,00CA20E0,00C90A02,00000000), ref: 00C90CDF
                          • memcpy.MSVCRT ref: 00C90D03
                          • GetProcessHeap.KERNEL32(00000008,?,?,?,?,?,?,?,?,?,?,?,00C90FEE,00C90A02,00CA20E0,00C90A02), ref: 00C90D1A
                          • HeapAlloc.KERNEL32(00000000,?,?,?,?,?,?,?,?,?,?,00C90FEE,00C90A02,00CA20E0,00C90A02,00000000), ref: 00C90D21
                          • memcpy.MSVCRT ref: 00C90D41
                          • HeapFree.KERNEL32(?,00000000,00000000,?,?,?,?,?,?,?,?,?,?,00C90FEE,00C90A02,00CA20E0), ref: 00C90DAA
                          • WaitForSingleObject.KERNEL32(00000000,000003E8,?,?,?,?,?,?,?,?,00C90FEE,00C90A02,00CA20E0,00C90A02,00000000), ref: 00C90DBC
                          • FindCloseChangeNotification.KERNELBASE(00000000,?,?,?,?,?,?,?,?,00C90FEE,00C90A02,00CA20E0,00C90A02,00000000,?,0000000A), ref: 00C90DC5
                          • VirtualFree.KERNELBASE(?,00000000,00008000), ref: 00C90E11
                          • GetProcessHeap.KERNEL32(00000000,?), ref: 00C90E16
                          • HeapFree.KERNEL32(00000000), ref: 00C90E1D
                          • HeapDestroy.KERNELBASE(0000003C), ref: 00C90E35
                          Memory Dump Source
                          • Source File: 00000000.00000002.1687591670.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                          • Associated: 00000000.00000002.1687578983.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1687619709.0000000000C92000.00000040.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1687633503.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1687647111.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_c40000_ZAXkflgLEq.jbxd
                          Similarity
                          • API ID: Heap$Alloc$Process$Free$CreateModulememcpymemsetwcschr$AllocateChangeCloseDestroyEventFileFindHandleNameNotificationObjectSingleVirtualWaitlstrlenwcsrchr
                          • String ID:
                          • API String ID: 1234286951-0
                          • Opcode ID: a731241c5ceca8f3e767991ca9361735b23a42f9799f4611fdfe4803fd6fcaac
                          • Instruction ID: 38e7f6b89e8c51c300f363208982e776e66682cbef88d51bf12736a8830352b6
                          • Opcode Fuzzy Hash: a731241c5ceca8f3e767991ca9361735b23a42f9799f4611fdfe4803fd6fcaac
                          • Instruction Fuzzy Hash: 17B1DF719083419FDB14DF68CC48B2ABBE5FF89308F14892CFA9A87251DB70E944CB51
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 50 c90e50-c90e74 GetProcessHeap RtlAllocateHeap 51 c90fca-c90fd6 50->51 52 c90e7a-c90ea1 memset GetModuleFileNameW 50->52 53 c90fbe-c90fc4 GetProcessHeap HeapFree 52->53 54 c90ea7-c90eba wcsrchr 52->54 53->51 54->53 55 c90ec0-c90ed0 wcschr 54->55 56 c90ed2-c90ed4 55->56 57 c90ed7-c90ee3 lstrlenW 55->57 56->57 58 c90ee9-c90efc memset 57->58 59 c90f86-c90fac RtlFreeHeap MulDiv 57->59 60 c90f00-c90f0c 58->60 59->51 63 c90fae-c90fbd 59->63 60->60 62 c90f0e 60->62 64 c90f10-c90f27 62->64 64->64 65 c90f29-c90f33 64->65 66 c90f35-c90f45 wcschr 65->66 67 c90f54-c90f57 65->67 66->59 68 c90f47-c90f52 66->68 69 c90f59-c90f5c 67->69 70 c90f68-c90f85 HeapFree 67->70 68->66 68->67 69->70 71 c90f5e-c90f61 69->71 71->70 72 c90f63-c90f66 71->72 72->59 72->70
                          APIs
                          • GetProcessHeap.KERNEL32(00000000,3B9ACA00,00000000,76ED5E70,00000000,00000000), ref: 00C90E67
                          • RtlAllocateHeap.NTDLL(00000000), ref: 00C90E6A
                          • memset.MSVCRT ref: 00C90E85
                          • GetModuleFileNameW.KERNEL32(00000000,?,00000104), ref: 00C90E99
                          • wcsrchr.MSVCRT ref: 00C90EAE
                          • wcschr.MSVCRT ref: 00C90EC3
                          • lstrlenW.KERNEL32(-00000002), ref: 00C90ED8
                          • memset.MSVCRT ref: 00C90EF2
                          • wcschr.MSVCRT ref: 00C90F3B
                          • HeapFree.KERNEL32(00000000,00000000,00000000), ref: 00C90F73
                          • RtlFreeHeap.NTDLL(00000000,00000000,00000000), ref: 00C90F91
                          • MulDiv.KERNEL32(00000001,80000000,80000000), ref: 00C90FA3
                          • GetProcessHeap.KERNEL32(00000000,00000000), ref: 00C90FC1
                          • HeapFree.KERNEL32(00000000), ref: 00C90FC4
                          Memory Dump Source
                          • Source File: 00000000.00000002.1687591670.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                          • Associated: 00000000.00000002.1687578983.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1687619709.0000000000C92000.00000040.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1687633503.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1687647111.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_c40000_ZAXkflgLEq.jbxd
                          Similarity
                          • API ID: Heap$Free$Processmemsetwcschr$AllocateFileModuleNamelstrlenwcsrchr
                          • String ID:
                          • API String ID: 2120544777-0
                          • Opcode ID: c5de14b431edfc312e733d02cc0e85fcb55f52952b88e7ff2a3b060f00ecb6d4
                          • Instruction ID: 281e4d918b44fd16b5b3b049a2e569208687bdf66c20f67e8609dfd4257af9d2
                          • Opcode Fuzzy Hash: c5de14b431edfc312e733d02cc0e85fcb55f52952b88e7ff2a3b060f00ecb6d4
                          • Instruction Fuzzy Hash: B34128316043159BEF30A7A4AC8EB7E73A8EB85755F24002AFE05D7180EA69DB45C361
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          APIs
                          Memory Dump Source
                          • Source File: 00000000.00000002.1687591670.0000000000C41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                          • Associated: 00000000.00000002.1687578983.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1687619709.0000000000C92000.00000040.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1687633503.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1687647111.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_c40000_ZAXkflgLEq.jbxd
                          Similarity
                          • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
                          • String ID:
                          • API String ID: 801014965-0
                          • Opcode ID: 277ce4af971321a90a5f8b20a46c8731fb157a4db3efde624faf0531900ce871
                          • Instruction ID: e0ceaf5ea8b40a7df600411590b8e151240778041bebd33cdbcc4c8131146e6c
                          • Opcode Fuzzy Hash: 277ce4af971321a90a5f8b20a46c8731fb157a4db3efde624faf0531900ce871
                          • Instruction Fuzzy Hash: DB418171C40354EFDF219FA8DC89BAD7BB8FB0A714F20011AF956972A2C7744940DB61
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004,00000000,?,?), ref: 00C92311
                            • Part of subcall function 00C92098: VirtualAlloc.KERNELBASE(00000000,00001012,00001000,00000004), ref: 00C920C1
                            • Part of subcall function 00C92098: VirtualFree.KERNELBASE(00000000,00000000,00008000), ref: 00C9226D
                          • VirtualAlloc.KERNELBASE(00000000,00400000,00001000,00000004), ref: 00C92363
                          • VirtualProtect.KERNELBASE(0000002C,?,00000040,0000002C), ref: 00C923BD
                          • VirtualFree.KERNELBASE(00000000,00000000,00008000), ref: 00C923F0
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000003.1684662033.0000000000C92000.00000040.00000001.01000000.00000003.sdmp, Offset: 00C92000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_3_c92000_ZAXkflgLEq.jbxd
                          Similarity
                          • API ID: Virtual$Alloc$Free$Protect
                          • String ID: ,
                          • API String ID: 1004437363-3772416878
                          • Opcode ID: 15a4efe748f616053fe8ffffddab00f5333e8782292edb7e0670b88d1d28ae77
                          • Instruction ID: afd061057be8982de2c411395a002e400fc5d1f9cbf9f418e5463529f844a684
                          • Opcode Fuzzy Hash: 15a4efe748f616053fe8ffffddab00f5333e8782292edb7e0670b88d1d28ae77
                          • Instruction Fuzzy Hash: 87410975900709AFCF10DFA9C885A9EBBF8FF08354F10851AF969A7640D370EA54CBA4
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 95 c922cc-c922e9 call c92277 98 c922ef-c92318 call c92430 VirtualAlloc 95->98 99 c92427 95->99 98->99 103 c9231e-c9233b call c92098 98->103 101 c92429-c9242d 99->101 106 c923e8-c923f5 VirtualFree 103->106 107 c92341-c92345 103->107 106->99 108 c923f7-c92425 call c9205b 106->108 107->106 109 c9234b-c92350 107->109 108->101 109->106 111 c92356-c9236b VirtualAlloc 109->111 111->106 113 c9236d-c92385 call c9205b 111->113 116 c923ab-c923e5 VirtualProtect 113->116 117 c92387-c923a9 call c9205b 113->117 116->106 117->116
                          APIs
                          • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004,00000000,?,?,?,0000000B), ref: 00C92311
                            • Part of subcall function 00C92098: VirtualAlloc.KERNELBASE(00000000,00001012,00001000,00000004), ref: 00C920C1
                            • Part of subcall function 00C92098: VirtualFree.KERNELBASE(00000000,00000000,00008000), ref: 00C9226D
                          • VirtualAlloc.KERNELBASE(00000000,00400000,00001000,00000004,?,?,?,00000000,?,?,0000000B), ref: 00C92363
                          • VirtualProtect.KERNELBASE(0000002C,?,00000040,0000002C,00000000,00000000,?,?,0000000B), ref: 00C923BD
                          • VirtualFree.KERNELBASE(00000000,00000000,00008000,?,?,?,00000000,?,?,0000000B), ref: 00C923F0
                          Strings
                          Memory Dump Source
                          • Source File: 00000000.00000002.1687619709.0000000000C92000.00000040.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                          • Associated: 00000000.00000002.1687578983.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1687591670.0000000000C41000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1687633503.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1687647111.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_c40000_ZAXkflgLEq.jbxd
                          Similarity
                          • API ID: Virtual$Alloc$Free$Protect
                          • String ID: ,
                          • API String ID: 1004437363-3772416878
                          • Opcode ID: 15a4efe748f616053fe8ffffddab00f5333e8782292edb7e0670b88d1d28ae77
                          • Instruction ID: afd061057be8982de2c411395a002e400fc5d1f9cbf9f418e5463529f844a684
                          • Opcode Fuzzy Hash: 15a4efe748f616053fe8ffffddab00f5333e8782292edb7e0670b88d1d28ae77
                          • Instruction Fuzzy Hash: 87410975900709AFCF10DFA9C885A9EBBF8FF08354F10851AF969A7640D370EA54CBA4
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • VirtualAlloc.KERNELBASE(00000000,00001012,00001000,00000004), ref: 00C920C1
                          • VirtualFree.KERNELBASE(00000000,00000000,00008000), ref: 00C9226D
                          Memory Dump Source
                          • Source File: 00000000.00000003.1684662033.0000000000C92000.00000040.00000001.01000000.00000003.sdmp, Offset: 00C92000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_3_c92000_ZAXkflgLEq.jbxd
                          Similarity
                          • API ID: Virtual$AllocFree
                          • String ID:
                          • API String ID: 2087232378-0
                          • Opcode ID: 7dc8e79fde86babc96161718fc4e5f80a5398d7d893a888eaa0e52eee754c683
                          • Instruction ID: 58d33a2286b1307ecf43942fa3a2943298be9470f27338292b4d4f4598374a42
                          • Opcode Fuzzy Hash: 7dc8e79fde86babc96161718fc4e5f80a5398d7d893a888eaa0e52eee754c683
                          • Instruction Fuzzy Hash: ED718B71E0464AEFDF41CF98C985BEEBBF0AB09314F244095E5A5FB241C234AA91DF64
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 120 c92098-c920ca VirtualAlloc 121 c92270-c92274 120->121 122 c920d0-c920d4 120->122 123 c920dd-c920e4 122->123 124 c920f1-c920f8 123->124 125 c920e6-c920ef 123->125 127 c920fc-c9210e 124->127 125->123 128 c92110-c92116 127->128 129 c92133-c9213b 127->129 130 c92118 128->130 131 c9211d-c92130 128->131 132 c9213d-c92143 129->132 133 c9219c-c921a2 129->133 134 c92260-c9226d VirtualFree 130->134 131->129 135 c9214a-c92167 132->135 136 c92145 132->136 137 c921a9-c921b0 133->137 138 c921a4 133->138 134->121 139 c92169 135->139 140 c9216e-c92197 135->140 136->134 141 c921b2 137->141 142 c921b7-c921fa 137->142 138->134 139->134 143 c9225b 140->143 141->134 144 c92203-c92209 142->144 143->127 144->143 145 c9220b-c92238 144->145 146 c9223a 145->146 147 c9223c-c92259 145->147 146->143 147->144
                          APIs
                          • VirtualAlloc.KERNELBASE(00000000,00001012,00001000,00000004), ref: 00C920C1
                          • VirtualFree.KERNELBASE(00000000,00000000,00008000), ref: 00C9226D
                          Memory Dump Source
                          • Source File: 00000000.00000002.1687619709.0000000000C92000.00000040.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                          • Associated: 00000000.00000002.1687578983.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1687591670.0000000000C41000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1687633503.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1687647111.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_c40000_ZAXkflgLEq.jbxd
                          Similarity
                          • API ID: Virtual$AllocFree
                          • String ID:
                          • API String ID: 2087232378-0
                          • Opcode ID: c4e05415e69c24d916c032145dcef53eb47034c17d4a44e0f4697a572808d492
                          • Instruction ID: 58d33a2286b1307ecf43942fa3a2943298be9470f27338292b4d4f4598374a42
                          • Opcode Fuzzy Hash: c4e05415e69c24d916c032145dcef53eb47034c17d4a44e0f4697a572808d492
                          • Instruction Fuzzy Hash: ED718B71E0464AEFDF41CF98C985BEEBBF0AB09314F244095E5A5FB241C234AA91DF64
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Memory Dump Source
                          • Source File: 00000000.00000003.1684662033.0000000000C92000.00000040.00000001.01000000.00000003.sdmp, Offset: 00C92000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_3_c92000_ZAXkflgLEq.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: d558d006f42668ff0cb3938fe5626bc0e09627662ae6e14989234e2d35bd114b
                          • Instruction ID: a038c646b6034cfeac575c1a50066f44b59d435e7a24f5f0d8d45ffb79ec1308
                          • Opcode Fuzzy Hash: d558d006f42668ff0cb3938fe5626bc0e09627662ae6e14989234e2d35bd114b
                          • Instruction Fuzzy Hash: 25F06D79A00A00EF8F24CF0AC54CC95B7F6FB9573076545A5E414DB221D3B0EE44DBA1
                          Uniqueness

                          Uniqueness Score: -1.00%

                          Memory Dump Source
                          • Source File: 00000000.00000002.1687619709.0000000000C92000.00000040.00000001.01000000.00000003.sdmp, Offset: 00C40000, based on PE: true
                          • Associated: 00000000.00000002.1687578983.0000000000C40000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1687591670.0000000000C41000.00000020.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1687633503.0000000000CA2000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000000.00000002.1687647111.0000000000CAB000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_0_2_c40000_ZAXkflgLEq.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: d558d006f42668ff0cb3938fe5626bc0e09627662ae6e14989234e2d35bd114b
                          • Instruction ID: a038c646b6034cfeac575c1a50066f44b59d435e7a24f5f0d8d45ffb79ec1308
                          • Opcode Fuzzy Hash: d558d006f42668ff0cb3938fe5626bc0e09627662ae6e14989234e2d35bd114b
                          • Instruction Fuzzy Hash: 25F06D79A00A00EF8F24CF0AC54CC95B7F6FB9573076545A5E414DB221D3B0EE44DBA1
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004,00000000,?,?), ref: 0328031C
                            • Part of subcall function 032800A0: VirtualAlloc.KERNELBASE(00000000,00001012,00001000,00000004), ref: 032800C9
                            • Part of subcall function 032800A0: VirtualFree.KERNELBASE(00000000,00000000,00008000), ref: 03280275
                          • VirtualAlloc.KERNELBASE(00000000,00400000,00001000,00000004), ref: 0328036E
                          • VirtualProtect.KERNELBASE(0000002C,?,00000040,?), ref: 032803DD
                          • VirtualFree.KERNELBASE(00000000,00000000,00008000), ref: 032803FD
                          • MapViewOfFile.KERNELBASE(?,00000004,00000000,00000000,00000000), ref: 03280424
                          • VirtualAlloc.KERNELBASE(00000000,?,00001000,00000004), ref: 0328044C
                          • FindCloseChangeNotification.KERNELBASE(?), ref: 03280467
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000003.1687543108.0000000003280000.00000040.00000001.00020000.00000000.sdmp, Offset: 03280000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_3_3280000_dialer.jbxd
                          Similarity
                          • API ID: Virtual$Alloc$Free$ChangeCloseFileFindNotificationProtectView
                          • String ID: ,
                          • API String ID: 2870039258-3772416878
                          • Opcode ID: 82e5e3048abb205ecfbadfcc4accb215ed5bf30bd6965aeddf34148881449b51
                          • Instruction ID: ece56d5c9fd9a959a4412b79e534c6bf5d259ae3ca43458d313cc6568d060d07
                          • Opcode Fuzzy Hash: 82e5e3048abb205ecfbadfcc4accb215ed5bf30bd6965aeddf34148881449b51
                          • Instruction Fuzzy Hash: F751FE75911209FFCB20DFA5C884A9EBBB8FF08354F14C529F955A7291D770AA84CB60
                          Uniqueness

                          Uniqueness Score: -1.00%

                          APIs
                          • VirtualAlloc.KERNELBASE(00000000,00001012,00001000,00000004), ref: 032800C9
                          • VirtualFree.KERNELBASE(00000000,00000000,00008000), ref: 03280275
                          Memory Dump Source
                          • Source File: 00000001.00000003.1687543108.0000000003280000.00000040.00000001.00020000.00000000.sdmp, Offset: 03280000, based on PE: false
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_3_3280000_dialer.jbxd
                          Similarity
                          • API ID: Virtual$AllocFree
                          • String ID:
                          • API String ID: 2087232378-0
                          • Opcode ID: 7dc8e79fde86babc96161718fc4e5f80a5398d7d893a888eaa0e52eee754c683
                          • Instruction ID: 445393724c27eb0bcf0822e979eb60a3de85dddbc18e5109f29214edafa5f75e
                          • Opcode Fuzzy Hash: 7dc8e79fde86babc96161718fc4e5f80a5398d7d893a888eaa0e52eee754c683
                          • Instruction Fuzzy Hash: CB71BC71E1524AEFCB41DF98C981BEDBBF0AF09314F188095E461FB281C274AA95CF64
                          Uniqueness

                          Uniqueness Score: -1.00%