Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
3EiPKQhNrg.exe

Overview

General Information

Sample name:3EiPKQhNrg.exe
renamed because original name is a hash value
Original sample name:03252d866d3c98caff608a29b1a6a003.bin.exe
Analysis ID:1430672
MD5:03252d866d3c98caff608a29b1a6a003
SHA1:f3b11188ba778574984ab47a4db0a8f9bafbf7b0
SHA256:ec9257a7e5347a85b1bc6b9ec2df8e2bf4a769d17db4988dc8f25a54fe766ba8
Tags:exeprg
Infos:

Detection

Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Machine Learning detection for sample
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Detected potential crypto function
Entry point lies outside standard sections
Found large amount of non-executed APIs
One or more processes crash
PE file contains sections with non-standard names
PE file does not import any functions
Uses 32bit PE files

Classification

  • System is w10x64
  • 3EiPKQhNrg.exe (PID: 1400 cmdline: "C:\Users\user\Desktop\3EiPKQhNrg.exe" MD5: 03252D866D3C98CAFF608A29B1A6A003)
    • WerFault.exe (PID: 3224 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 1400 -s 232 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: 3EiPKQhNrg.exeAvira: detected
Source: 3EiPKQhNrg.exeReversingLabs: Detection: 68%
Source: 3EiPKQhNrg.exeVirustotal: Detection: 73%Perma Link
Source: 3EiPKQhNrg.exeJoe Sandbox ML: detected
Source: 3EiPKQhNrg.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: Amcache.hve.3.drString found in binary or memory: http://upx.sf.net
Source: C:\Users\user\Desktop\3EiPKQhNrg.exeCode function: 0_2_004104FD0_2_004104FD
Source: C:\Users\user\Desktop\3EiPKQhNrg.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 1400 -s 232
Source: 3EiPKQhNrg.exeStatic PE information: No import functions for PE file found
Source: 3EiPKQhNrg.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: mal60.winEXE@2/5@0/0
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess1400
Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\a11d4694-3ffa-4896-bf98-2e5dc3e7217dJump to behavior
Source: C:\Users\user\Desktop\3EiPKQhNrg.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: 3EiPKQhNrg.exeReversingLabs: Detection: 68%
Source: 3EiPKQhNrg.exeVirustotal: Detection: 73%
Source: unknownProcess created: C:\Users\user\Desktop\3EiPKQhNrg.exe "C:\Users\user\Desktop\3EiPKQhNrg.exe"
Source: C:\Users\user\Desktop\3EiPKQhNrg.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 1400 -s 232
Source: C:\Users\user\Desktop\3EiPKQhNrg.exeSection loaded: apphelp.dllJump to behavior
Source: initial sampleStatic PE information: section where entry point is pointing to: .tqv
Source: 3EiPKQhNrg.exeStatic PE information: section name: .cxct
Source: 3EiPKQhNrg.exeStatic PE information: section name: .tqv
Source: 3EiPKQhNrg.exeStatic PE information: section name: .jmnwx
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\3EiPKQhNrg.exeAPI coverage: 0.0 %
Source: Amcache.hve.3.drBinary or memory string: VMware
Source: Amcache.hve.3.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.3.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.3.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.3.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.3.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.3.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.3.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.3.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.3.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.3.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.3.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.3.drBinary or memory string: vmci.sys
Source: Amcache.hve.3.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
Source: Amcache.hve.3.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.3.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.3.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.3.drBinary or memory string: VMware20,1
Source: Amcache.hve.3.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.3.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.3.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.3.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.3.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.3.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.3.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.3.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.3.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.3.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.3.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Users\user\Desktop\3EiPKQhNrg.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\3EiPKQhNrg.exeCode function: 0_2_00410344 EntryPoint,LdrInitializeThunk,0_2_00410344
Source: Amcache.hve.3.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.3.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.3.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.3.drBinary or memory string: MsMpEng.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
1
Virtualization/Sandbox Evasion
OS Credential Dumping21
Security Software Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Process Injection
LSASS Memory1
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager1
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
3EiPKQhNrg.exe68%ReversingLabsWin32.Trojan.Zeus
3EiPKQhNrg.exe73%VirustotalBrowse
3EiPKQhNrg.exe100%AviraTR/Crypt.XPACK.Gen
3EiPKQhNrg.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://upx.sf.netAmcache.hve.3.drfalse
    high
    No contacted IP infos
    Joe Sandbox version:40.0.0 Tourmaline
    Analysis ID:1430672
    Start date and time:2024-04-24 02:35:05 +02:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 4m 0s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:9
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:3EiPKQhNrg.exe
    renamed because original name is a hash value
    Original Sample Name:03252d866d3c98caff608a29b1a6a003.bin.exe
    Detection:MAL
    Classification:mal60.winEXE@2/5@0/0
    EGA Information:
    • Successful, ratio: 100%
    HCA Information:
    • Successful, ratio: 100%
    • Number of executed functions: 3
    • Number of non-executed functions: 3
    Cookbook Comments:
    • Found application associated with file extension: .exe
    • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
    • Excluded IPs from analysis (whitelisted): 20.189.173.22
    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, onedsblobprdwus17.westus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
    TimeTypeDescription
    02:36:14API Interceptor1x Sleep call for process: WerFault.exe modified
    No context
    No context
    No context
    No context
    No context
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
    Category:dropped
    Size (bytes):65536
    Entropy (8bit):0.6370077496609501
    Encrypted:false
    SSDEEP:96:aWFrywsrhDFoI7JfdQXIDcQvc6QcEVcw3cE/3+HbHg6ZAX/d5FMT2SlPkpXmTApg:Vxywg40BU/QjEzuiFhZ24IO8bb
    MD5:2BFD0D849EAE5505161CD7B027E56037
    SHA1:466AAFCE6EB5DBC0C0A877EBD055272D95761B70
    SHA-256:F35367C393EE7F93815F1E22E63F9150028CDE0B99EF79A363422B5860D3A74F
    SHA-512:7E7580E9D735729BE3787D56626C4DC33D480DB7E3CAF75965A77FEBD55C37F26E4D66865370456968B99F7A008052F41DABE66312A879C94339D285C1A6B332
    Malicious:false
    Reputation:low
    Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.5.8.3.9.2.5.5.1.7.2.6.4.4.7.8.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.5.8.3.9.2.5.5.2.1.4.8.3.2.0.0.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.4.b.c.8.8.4.9.1.-.1.2.3.e.-.4.c.2.0.-.b.e.0.f.-.f.f.1.3.d.8.a.1.7.3.1.7.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.c.a.d.4.5.d.2.5.-.c.e.7.9.-.4.3.9.f.-.9.1.0.c.-.f.1.a.f.9.3.3.8.d.d.4.1.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.3.E.i.P.K.Q.h.N.r.g...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.5.7.8.-.0.0.0.1.-.0.0.1.4.-.4.6.6.3.-.f.1.5.b.d.f.9.5.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.6.7.5.3.7.d.0.5.3.e.2.c.d.5.2.a.1.d.4.3.a.a.7.6.a.c.0.c.1.8.0.3.0.0.0.0.f.f.f.f.!.0.0.0.0.f.3.b.1.1.1.8.8.b.a.7.7.8.5.7.4.9.8.4.a.b.4.7.a.4.d.b.0.a.8.f.9.b.a.f.b.f.7.b.0.!.3.E.i.P.K.Q.h.N.r.g...e.x.e.....T.a.r.g.e.t.A.p.p.
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:Mini DuMP crash report, 14 streams, Wed Apr 24 00:35:51 2024, 0x1205a4 type
    Category:dropped
    Size (bytes):18488
    Entropy (8bit):1.9372077310240774
    Encrypted:false
    SSDEEP:96:5v83E3pN5Plt+/lUi7nwz45HQwsHSsWIXWIeoI4nrCT:GlmO0ioyOn+T
    MD5:DC3A443A3BBA05CBC99780B622C2BA2C
    SHA1:C8F1CF10588C7BBE283732F733FE4DF028190223
    SHA-256:5031EEE63F77DE87D22D99677C3BE1F277A1C0B9031D477F05F878A51CB418FA
    SHA-512:7948AD8767BD7B7E580F9860AA35BDBE0AE4F46BB864941FABB6AA517827D3C606549E9899443C91D77B3D121C288306C6FD9D6938EFAC81BEBE2BD181811F8A
    Malicious:false
    Reputation:low
    Preview:MDMP..a..... ........S(f............4...............<.......T...............T.......8...........T................>......................................................................................................eJ......L.......GenuineIntel............T.......x....S(f.............................0..2...............W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .S.u.m.m.e.r. .T.i.m.e...........................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
    Category:dropped
    Size (bytes):8324
    Entropy (8bit):3.7021290908307565
    Encrypted:false
    SSDEEP:192:R6l7wVeJyU6/w6YEI/SU9TBgmfgoSprM89bmVsffim:R6lXJ56/w6YEQSU9TBgmfgoemufb
    MD5:656129EDAD006BABB45CA67E74283AE9
    SHA1:7442A6DD7169386971446C70890DEDE79F38DA5E
    SHA-256:595A24C241AEF865C399DE424EFE1388778A30092EC8DD12BBC1766C018811DD
    SHA-512:EE254CD5CDD30F806A02637B78A8325C7F0FD5721E6F02298F4042DE55AEC909C12E5AB9579910AD85FF2EB96CA2840E00F0AAC62B3A263E737222F3ACFDC6D0
    Malicious:false
    Reputation:low
    Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.1.4.0.0.<./.P.i.
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
    Category:dropped
    Size (bytes):4619
    Entropy (8bit):4.507189911595661
    Encrypted:false
    SSDEEP:48:cvIwWl8zsrJg77aI9n6DBWpW8VY+Ym8M4JCgFg+q8jn3WdGK1Sgd:uIjfFI7cU7VqJ6c3W/1Sgd
    MD5:B7082FB32068B1C3BF215E411661EAA8
    SHA1:F059EC9963119B8596DDE3ABF651C826DC9D1D6B
    SHA-256:71F23B40374A4A0ECBD7CE70CBED5B00C25C87B8420CC034FCB52CE0BA93EC34
    SHA-512:41D72AFCE5E24838034817741DCC305FDE4F758717F6DEADBE6B981C260DE33366B11B4D94BA5073129CF08EA07E55D3D4BA05F38E807FB97234E91DEC793D85
    Malicious:false
    Reputation:low
    Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="293258" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
    Process:C:\Windows\SysWOW64\WerFault.exe
    File Type:MS Windows registry file, NT/2000 or above
    Category:dropped
    Size (bytes):1835008
    Entropy (8bit):4.421574269363965
    Encrypted:false
    SSDEEP:6144:USvfpi6ceLP/9skLmb0OTMWSPHaJG8nAgeMZMMhA2fX4WABlEnNg0uhiTw:fvloTMW+EZMM6DFy+03w
    MD5:1DA20A578CD8629BAF70953BA394418A
    SHA1:6B216F5C1652DDB3D7F051378B475BAFF5EB97C0
    SHA-256:E7838FA30561806BD73C5B9A08C4BD942D78AD603CF4CA7CD68486B4563ACEFD
    SHA-512:AEA6488114A53E00EB5D44E754C48E984365941FD5D11FE8C40D94549AE083944FE61245EA380EC5A688AFA9C4996129CD50827DDC45E867E89DFB219E430B28
    Malicious:false
    Reputation:low
    Preview:regf>...>....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm...\..................................................................................................................................................................................................................................................................................................................................................h........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
    File type:MS-DOS executable PE32 executable (GUI) Intel 80386, for MS Windows
    Entropy (8bit):2.7984279411996145
    TrID:
    • Win32 Executable (generic) a (10002005/4) 99.96%
    • Generic Win/DOS Executable (2004/3) 0.02%
    • DOS Executable Generic (2002/1) 0.02%
    • Sybase iAnywhere database files (19/3) 0.00%
    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
    File name:3EiPKQhNrg.exe
    File size:147'456 bytes
    MD5:03252d866d3c98caff608a29b1a6a003
    SHA1:f3b11188ba778574984ab47a4db0a8f9bafbf7b0
    SHA256:ec9257a7e5347a85b1bc6b9ec2df8e2bf4a769d17db4988dc8f25a54fe766ba8
    SHA512:68c109ffc8f0f9de65d6ad1bd61dad72bf69c6e84f3c420c0fbb73079da603d8da97c0930454514f11a7fdd9eb356674afdbcd00ad4bb587db6e4daa9df86ce6
    SSDEEP:1536:kYovupkpMB7iF5tdraQ2JY4ViFaUdypKwKJ7YkwW:qpRFLdGQdeLKFYA
    TLSH:97E39C2735E1CDF2C97180322AAABB75277FF83329169C47D32449916861CD29A1BF47
    File Content Preview:MZ..........................................................\.......nz6......'..`...`............'..........^}f}(@..K.C.U.L...A...0...+.^}f}(@.._.RKP.......$.......'.................,[.u._.......'j.....P....3F......{n. .b......G...........S.-X.Z.l.......T
    Icon Hash:00928e8e8686b000
    Entrypoint:0x410344
    Entrypoint Section:.tqv
    Digitally signed:false
    Imagebase:0x400000
    Subsystem:windows gui
    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
    DLL Characteristics:
    Time Stamp:0x3A3246F2 [Sat Dec 9 14:51:30 2000 UTC]
    TLS Callbacks:
    CLR (.Net) Version:
    OS Version Major:5
    OS Version Minor:0
    File Version Major:5
    File Version Minor:0
    Subsystem Version Major:5
    Subsystem Version Minor:0
    Import Hash:
    Instruction
    add byte ptr [edi-01h], dl
    jbe 00007F661CD77486h
    call dword ptr [00410E78h]
    test eax, eax
    jne 00007F661CD77359h
    pop ebx
    push dword ptr [ebp-10h]
    call dword ptr [00410E6Ch]
    push dword ptr [esi+08h]
    call dword ptr [00410E7Ch]
    pop edi
    xor eax, eax
    pop esi
    leave
    retn 0004h
    push dword ptr [esp+04h]
    push 00000000h
    push 001F0001h
    call dword ptr [00410E40h]
    test eax, eax
    jne 00007F661CD77485h
    xor al, al
    ret
    push eax
    call dword ptr [00410E6Ch]
    mov al, 01h
    ret
    push ebp
    mov ebp, esp
    sub esp, 00000218h
    or dword ptr [ebp-10h], FFFFFFFFh
    push ebx
    push esi
    push edi
    push dword ptr [ebp+08h]
    lea eax, dword ptr [ebp-00000218h]
    mov byte ptr [ebp-01h], 00000001h
    call 00007F661CD77294h
    pop ecx
    xor ebx, ebx
    mov esi, C0000000h
    jmp 00007F661CD7749Dh
    cmp byte ptr [ebp-01h], bl
    je 00007F661CD775B2h
    push FFFFFFFFh
    lea eax, dword ptr [ebp-00000218h]
    push eax
    call dword ptr [00410E9Ch]
    mov byte ptr [ebp-01h], bl
    push ebx
    push ebx
    push 00000003h
    push ebx
    push 00000003h
    push esi
    lea eax, dword ptr [ebp-00000218h]
    push eax
    call dword ptr [00410E80h]
    mov edi, eax
    cmp edi, FFFFFFFFh
    je 00007F661CD7744Bh
    push ebx
    push ebx
    lea eax, dword ptr [ebp-08h]
    push eax
    push edi
    mov dword ptr [ebp-08h], 00000002h
    call dword ptr [00410EA0h]
    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
    IMAGE_DIRECTORY_ENTRY_BASERELOC0x120000x12d8.jmnwx
    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IAT0x00x0
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
    .cxct0x10000xeba20x9600f0cb0a2e93cc9c137b21c5e9d555f2f6False0.5951822916666667data6.39491232337106IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .tqv0x100000x14480xa0062e582d3b0db9e989568eb0bbd14bdf3False0.68359375data6.427938614429585IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .jmnwx0x120000x120000x14000274273c7ba36eb3289646c2cd5703adFalse0.0875data0.9692834506981859IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    No network behavior found

    Click to jump to process

    Click to jump to process

    Click to dive into process behavior distribution

    Click to jump to process

    Target ID:0
    Start time:02:35:51
    Start date:24/04/2024
    Path:C:\Users\user\Desktop\3EiPKQhNrg.exe
    Wow64 process (32bit):true
    Commandline:"C:\Users\user\Desktop\3EiPKQhNrg.exe"
    Imagebase:0x400000
    File size:147'456 bytes
    MD5 hash:03252D866D3C98CAFF608A29B1A6A003
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:low
    Has exited:true

    Target ID:3
    Start time:02:35:51
    Start date:24/04/2024
    Path:C:\Windows\SysWOW64\WerFault.exe
    Wow64 process (32bit):true
    Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 1400 -s 232
    Imagebase:0xb70000
    File size:483'680 bytes
    MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Reset < >

      Execution Graph

      Execution Coverage:0.1%
      Dynamic/Decrypted Code Coverage:0%
      Signature Coverage:22.2%
      Total number of Nodes:18
      Total number of Limit Nodes:4
      execution_graph 3254 410344 3257 41022a 3254->3257 3255 410349 LdrInitializeThunk 3255->3257 3256 410357 3257->3254 3257->3255 3257->3256 3258 4101e4 3261 410200 3258->3261 3259 410357 3260 410349 LdrInitializeThunk 3260->3261 3261->3259 3261->3260 3262 405567 3265 405472 3262->3265 3264 40556c 3267 405482 3265->3267 3266 4054ce 3266->3264 3267->3266 3270 410232 3267->3270 3269 40551f 3269->3264 3272 41022a 3270->3272 3271 410349 LdrInitializeThunk 3271->3272 3272->3271 3273 410357 3272->3273 3273->3269

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 42 410344 43 410345-410347 42->43 44 410349 LdrInitializeThunk 43->44 45 41034d-410351 43->45 44->45 46 410357-41036f 45->46 47 41022a-410236 45->47 47->43 51 41023c-41025c 47->51 54 410262-410265 51->54 55 410334-41033d call 410101 51->55 54->55 56 41026b-41027f 54->56 55->42 56->55 60 410285-410288 56->60 60->55 61 41028e-410295 60->61 62 410297 61->62 63 41029a-41029d 61->63 62->63 64 4102d0-4102fd 63->64 65 41029f-4102ad call 4100e3 63->65 71 410302-410317 64->71 72 4102ff 64->72 65->55 69 4102b3-4102c6 65->69 69->55 74 4102c8-4102ce 69->74 76 410319-410324 71->76 77 41032c 71->77 72->71 74->55 74->64 76->77 77->55
      APIs
      • LdrInitializeThunk.NTDLL(?,?,?,?,?,?,00A00000,?,?,?,00A00000,?,?,?,?,00A00000), ref: 00410349
      Memory Dump Source
      • Source File: 00000000.00000002.2220682269.0000000000410000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2220659547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2220705110.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_3EiPKQhNrg.jbxd
      Similarity
      • API ID: InitializeThunk
      • String ID:
      • API String ID: 2994545307-0
      • Opcode ID: f7215e32800e7b9d6302c73dd756a3c402ec325112ea31ccf14b0aaa274c71c5
      • Instruction ID: 35356b72055d9b158d9a5d947d7c395801ac3275d98876f33399861f2b7e69dd
      • Opcode Fuzzy Hash: f7215e32800e7b9d6302c73dd756a3c402ec325112ea31ccf14b0aaa274c71c5
      • Instruction Fuzzy Hash: 9C4106B6800208FFDB219F95DD889EEBFB9FF44340B10846AF95595120D7B69AD0DB14
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 0 4101e4-410220 5 410226-410229 0->5 6 410358-41036f 0->6 7 41022a-410236 5->7 11 410345-410347 7->11 12 41023c-41025c 7->12 13 410349 LdrInitializeThunk 11->13 14 41034d-410351 11->14 17 410262-410265 12->17 18 410334-410344 call 410101 12->18 13->14 14->7 15 410357 14->15 15->6 17->18 19 41026b-41027f 17->19 18->11 19->18 23 410285-410288 19->23 23->18 25 41028e-410295 23->25 26 410297 25->26 27 41029a-41029d 25->27 26->27 28 4102d0-4102fd 27->28 29 41029f-4102ad call 4100e3 27->29 35 410302-410317 28->35 36 4102ff 28->36 29->18 33 4102b3-4102c6 29->33 33->18 38 4102c8-4102ce 33->38 40 410319-410324 35->40 41 41032c 35->41 36->35 38->18 38->28 40->41 41->18
      APIs
      • LdrInitializeThunk.NTDLL(?,?,?,?,?,?,00A00000,?,?,?,00A00000,?,?,?,?,00A00000), ref: 00410349
      Memory Dump Source
      • Source File: 00000000.00000002.2220682269.0000000000410000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2220659547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2220705110.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_3EiPKQhNrg.jbxd
      Similarity
      • API ID: InitializeThunk
      • String ID:
      • API String ID: 2994545307-0
      • Opcode ID: c7cbbf2003c2cb05d710d9591acba03b612c0a9ceeaf1774fc30688532ce4368
      • Instruction ID: 7f3820dcd3fdb4b114d9fec09f7fede288eb889de20e564e5da55fbebb20c64b
      • Opcode Fuzzy Hash: c7cbbf2003c2cb05d710d9591acba03b612c0a9ceeaf1774fc30688532ce4368
      • Instruction Fuzzy Hash: 87511476800208FFDB219F96DD88DEEBFB9FF44341B10882AF95595120D7B29AD0DB58
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 78 410232-410251 79 41025a-41025c 78->79 80 410262-410265 79->80 81 410334-410344 call 410101 79->81 80->81 82 41026b-41027f 80->82 88 410345-410347 81->88 82->81 86 410285-410288 82->86 86->81 89 41028e-410295 86->89 90 410349 LdrInitializeThunk 88->90 91 41034d-410351 88->91 92 410297 89->92 93 41029a-41029d 89->93 90->91 94 410357-41036f 91->94 95 41022a-410236 91->95 92->93 96 4102d0-4102fd 93->96 97 41029f-4102ad call 4100e3 93->97 95->88 105 41023c-410251 95->105 107 410302-410317 96->107 108 4102ff 96->108 97->81 104 4102b3-4102c6 97->104 104->81 111 4102c8-4102ce 104->111 105->79 113 410319-410324 107->113 114 41032c 107->114 108->107 111->81 111->96 113->114 114->81
      APIs
      • LdrInitializeThunk.NTDLL(?,?,?,?,?,?,00A00000,?,?,?,00A00000,?,?,?,?,00A00000), ref: 00410349
      Memory Dump Source
      • Source File: 00000000.00000002.2220682269.0000000000410000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2220659547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2220705110.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_3EiPKQhNrg.jbxd
      Similarity
      • API ID: InitializeThunk
      • String ID:
      • API String ID: 2994545307-0
      • Opcode ID: 108cd1062add142739e9f607e2a3b5604e23af2e47e1e3510d1c329ff3f0c374
      • Instruction ID: d712fbec6a8a1cb48a7ae14a70032824a7cb875e843d0a43b37ecb9f74bc9312
      • Opcode Fuzzy Hash: 108cd1062add142739e9f607e2a3b5604e23af2e47e1e3510d1c329ff3f0c374
      • Instruction Fuzzy Hash: 894113BA800208FFDB219F95DD849EEBFB9FF44340B20846AF94595120D7B69AC0DB14
      Uniqueness

      Uniqueness Score: -1.00%

      Memory Dump Source
      • Source File: 00000000.00000002.2220682269.0000000000410000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2220659547.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2220705110.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_3EiPKQhNrg.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: c15c1ee89e93c96ae34e4ef4bd20b42e19debdc84aa94c683d830ec268d23c08
      • Instruction ID: afef2d8d43b0d8761fac2ffa7c8c5689a319ecd200332d8b4acc98a5103d0a39
      • Opcode Fuzzy Hash: c15c1ee89e93c96ae34e4ef4bd20b42e19debdc84aa94c683d830ec268d23c08
      • Instruction Fuzzy Hash: 7B815F32D0552ADBDB14CE58C5402EDB7B1AB85324F15429ADC65BB381C3B4ADC1DB85
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 115 408ec5-408edb call 40a6e3 118 408ee1-408efc call 406dde 115->118 119 40919d-40919f 115->119 122 408f02-408f05 118->122 123 40917c-409197 call 40a701 118->123 125 408f12-408f18 122->125 126 408f07-408f0a 122->126 123->119 125->123 129 408f1e-408f22 125->129 126->125 128 408f0c-408f10 126->128 128->118 128->125 129->123 130 408f28-408f4d call 40a25f 129->130 135 408f8e 130->135 136 408f4f-408f5b call 40a4f7 130->136 137 408f91-408f9d call 40a4f7 135->137 141 408f61-408f65 136->141 142 40917a-40917b 136->142 137->142 146 408fa3-408fba 137->146 144 408f67-408f6b 141->144 145 408f6d-408f81 call 40a25f 141->145 142->123 144->146 145->142 152 408f87-408f8c 145->152 148 408fd2-408ff4 call 406dde 146->148 149 408fbc-408fcc 146->149 156 409150-409159 148->156 149->142 149->148 152->137 157 408ff9-408ffc 156->157 158 40915f-409167 call 40a701 156->158 159 40900d-409011 157->159 160 408ffe-409001 157->160 171 40916a-409177 call 40a701 * 2 158->171 163 409070-409075 159->163 164 409013-409016 159->164 160->159 162 409003-409007 160->162 162->159 168 4091a2-4091a6 162->168 166 409077-409089 call 40a25f 163->166 167 40908f-409093 163->167 169 409034-409037 164->169 170 409018-40901c 164->170 166->167 189 40913a-40914d call 406dde 166->189 174 409095-409097 167->174 175 4090c8-4090cb 167->175 168->158 173 4091a8-4091b8 call 40a4f7 168->173 169->163 178 409039-40903d 169->178 170->169 176 40901e-409032 call 40a25f 170->176 171->142 198 4091ba-4091ca call 40a43e 173->198 199 4091cc 173->199 174->175 183 409099-4090ac call 40a25f 174->183 179 409100-40910c 175->179 180 4090cd-4090e1 call 40a25f 175->180 176->169 201 409055-40906b call 409fed 176->201 178->163 186 40903f-409053 call 40a25f 178->186 179->168 193 409112-409122 179->193 180->179 205 4090e3-4090e6 180->205 183->175 208 4090ae-4090c2 183->208 186->163 186->201 189->156 193->168 210 409124-409137 call 40a71b 193->210 203 4091cf-4091ec 198->203 199->203 201->189 220 40920e-409225 203->220 221 4091ee-4091f9 203->221 212 4090e9-4090ec 205->212 208->158 208->175 210->189 217 4090e8 212->217 218 4090ee-4090fa call 40a43e 212->218 217->212 218->179 226 4090fc 218->226 228 409352-40936d call 40a701 220->228 229 40922b-40923a 220->229 221->220 227 4091fb-40920b call 40a71b 221->227 226->179 227->220 228->171 229->228 234 409240-409243 229->234 235 409260-409297 234->235 236 409245-40925b 234->236 248 409312-40932f call 406dde 235->248 249 409299 235->249 242 40934a-40934f call 406e24 236->242 242->228 253 409331 248->253 254 4092c8-4092cb 248->254 251 40929c-4092af 249->251 251->248 256 4092b1-4092c4 251->256 259 409345-409347 253->259 257 4092f5-4092f8 254->257 258 4092cd-4092e1 call 40a25f 254->258 256->251 267 4092c6 256->267 261 409305-409309 257->261 262 4092fa-4092fd 257->262 258->257 268 4092e3-4092e6 258->268 259->242 261->248 262->261 263 4092ff-409303 262->263 263->261 266 409333-40933c 263->266 266->259 267->248 269 4092e9-4092ec 268->269 270 4092e8 269->270 271 4092ee-4092f4 call 40a43e 269->271 270->269 271->257
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2220659547.0000000000400000.00000002.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2220682269.0000000000410000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2220705110.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_3EiPKQhNrg.jbxd
      Similarity
      • API ID: __common_dcos_data
      • String ID: /$P
      • API String ID: 1949606188-1456695453
      • Opcode ID: 2888e022ce9f9bf3a8cbef741902d2dfe7633207110b87612b315cc40a14cbdb
      • Instruction ID: f6aeb7a40ab844e83b4a859c2a797a10f62a571f1ef5fd5256098e57cabc9d5d
      • Opcode Fuzzy Hash: 2888e022ce9f9bf3a8cbef741902d2dfe7633207110b87612b315cc40a14cbdb
      • Instruction Fuzzy Hash: ACD10571A44306BAEF206BA58C4AFAF7AA9AF41304F10403BF505B62D3E67D8D80875D
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 274 406029-406041 276 406043-406045 274->276 277 40604a-406089 274->277 278 4063e0-4063e2 276->278 281 406320-40633a call 405ecd 277->281 282 40608f-40609a 277->282 286 406392-40639f 281->286 287 40633c-406341 281->287 282->281 288 4060a0-4060a5 282->288 289 4063a1 286->289 290 4063a7-4063de call 40a701 286->290 287->286 291 406343-406359 287->291 288->281 292 4060ab-4060b9 288->292 289->290 290->278 296 406389-406391 call 40a701 291->296 297 40635b-406386 call 40a71b * 2 291->297 298 406317-40631c 292->298 299 4060bf 292->299 296->286 297->296 298->281 303 4062f6-406308 299->303 311 4060c4-4060cb 303->311 312 40630e-406313 303->312 311->303 313 4060d1-4060e6 311->313 312->298 313->303 315 4060ec 313->315 316 4062d5-4062e7 315->316 318 4060f1-40610a 316->318 319 4062ed-4062f2 316->319 318->316 321 406110-406116 318->321 319->303 322 4062b4-4062c6 321->322 324 40611b-406133 322->324 325 4062cc-4062d1 322->325 324->322 327 406139-40613d 324->327 325->316 327->322 328 406143-406146 327->328 328->322 329 40614c-406171 328->329 329->322 331 406177-40617b 329->331 331->322 332 406181-406191 call 40a6e3 331->332 332->322 335 406197-4061a9 332->335 336 4061f4-4061f6 335->336 337 4061ab-4061ae 335->337 338 406214-406219 336->338 339 4061f8-406200 336->339 337->336 340 4061b0-4061b2 337->340 344 40621b 338->344 345 40621c-406243 338->345 341 406202-406205 339->341 342 406207 339->342 340->338 343 4061b4-4061bd 340->343 346 40620a-406212 341->346 342->346 347 4061ca 343->347 348 4061bf-4061c2 343->348 344->345 358 406245-4062a8 call 40a71b 345->358 359 4062ab-4062b3 call 40a701 345->359 346->338 346->339 350 4061cd 347->350 349 4061c4-4061c8 348->349 348->350 354 4061ea-4061f0 349->354 352 4061e7 350->352 353 4061cf-4061e5 350->353 352->354 353->354 354->343 356 4061f2 354->356 356->338 358->359 359->322
      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2220659547.0000000000400000.00000002.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
      • Associated: 00000000.00000002.2220682269.0000000000410000.00000040.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2220705110.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_400000_3EiPKQhNrg.jbxd
      Similarity
      • API ID: __common_dcos_data
      • String ID: Z%a
      • API String ID: 1949606188-3797897467
      • Opcode ID: bde53f2729763bbb80e9f8f6fbc34bbb1e4ab1794b96fde82b95227c8f624892
      • Instruction ID: e167d8234c001b7bbf4d0acd7e47300afaa796947d3fc9486c940172c1f1bbc9
      • Opcode Fuzzy Hash: bde53f2729763bbb80e9f8f6fbc34bbb1e4ab1794b96fde82b95227c8f624892
      • Instruction Fuzzy Hash: 3FD14B71900209AFDB10DF94C884EEEBBB9FF48304F1584AEE402BB291D779AD55CB64
      Uniqueness

      Uniqueness Score: -1.00%