Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
MMoIKWJ6fF.exe

Overview

General Information

Sample name:MMoIKWJ6fF.exe
renamed because original name is a hash value
Original sample name:000424bf6c24a428df613c61ad96bbf9.bin.exe
Analysis ID:1430691
MD5:000424bf6c24a428df613c61ad96bbf9
SHA1:d96e8c35c28a9f083a60a2460a0607e38e552991
SHA256:b91e55cb98ab74532100bd9f70384d41f6b878317e86f0b0325aa0b928dc95c5
Tags:exeprg
Infos:

Detection

Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Machine Learning detection for sample
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Entry point lies outside standard sections
One or more processes crash
PE file contains sections with non-standard names
PE file does not import any functions
Sample file is different than original file name gathered from version info
Uses 32bit PE files

Classification

  • System is w10x64
  • MMoIKWJ6fF.exe (PID: 2444 cmdline: "C:\Users\user\Desktop\MMoIKWJ6fF.exe" MD5: 000424BF6C24A428DF613C61AD96BBF9)
    • WerFault.exe (PID: 4944 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 2444 -s 232 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: MMoIKWJ6fF.exeAvira: detected
Source: MMoIKWJ6fF.exeReversingLabs: Detection: 73%
Source: MMoIKWJ6fF.exeVirustotal: Detection: 61%Perma Link
Source: MMoIKWJ6fF.exeJoe Sandbox ML: detected
Source: MMoIKWJ6fF.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: Amcache.hve.4.drString found in binary or memory: http://upx.sf.net
Source: MMoIKWJ6fF.exeString found in binary or memory: https://bc.nsk.
Source: MMoIKWJ6fF.exeString found in binary or memory: https://www.faktura.ru/enter.jsp?site=
Source: MMoIKWJ6fF.exeString found in binary or memory: https://www.faktura.ru/enter.jsp?site=https://bc.nsk.
Source: C:\Users\user\Desktop\MMoIKWJ6fF.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 2444 -s 232
Source: MMoIKWJ6fF.exeStatic PE information: No import functions for PE file found
Source: MMoIKWJ6fF.exe, 00000001.00000002.1475118918.0000000000425000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamePxl7fhp37t8 vs MMoIKWJ6fF.exe
Source: MMoIKWJ6fF.exeBinary or memory string: OriginalFilenamePxl7fhp37t8 vs MMoIKWJ6fF.exe
Source: MMoIKWJ6fF.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: mal60.winEXE@2/5@0/0
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess2444
Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\02fe071b-dee5-4b50-a158-59051d43ec6dJump to behavior
Source: C:\Users\user\Desktop\MMoIKWJ6fF.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: MMoIKWJ6fF.exeReversingLabs: Detection: 73%
Source: MMoIKWJ6fF.exeVirustotal: Detection: 61%
Source: unknownProcess created: C:\Users\user\Desktop\MMoIKWJ6fF.exe "C:\Users\user\Desktop\MMoIKWJ6fF.exe"
Source: C:\Users\user\Desktop\MMoIKWJ6fF.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 2444 -s 232
Source: C:\Users\user\Desktop\MMoIKWJ6fF.exeSection loaded: apphelp.dllJump to behavior
Source: initial sampleStatic PE information: section where entry point is pointing to: .huh
Source: MMoIKWJ6fF.exeStatic PE information: section name: .edyx
Source: MMoIKWJ6fF.exeStatic PE information: section name: .huh
Source: MMoIKWJ6fF.exeStatic PE information: section name: .jiv
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: Amcache.hve.4.drBinary or memory string: VMware
Source: Amcache.hve.4.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.4.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.4.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.4.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.4.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.4.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.4.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.4.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.4.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.4.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.4.drBinary or memory string: vmci.sys
Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.4.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.4.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.4.drBinary or memory string: VMware20,1
Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.4.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.4.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.4.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.4.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.4.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.4.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.4.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.4.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.4.drBinary or memory string: VMware-42 27 88 19 56 cc 59 1a-97 79 fb 8c bf a1 e2 9d
Source: Amcache.hve.4.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Users\user\Desktop\MMoIKWJ6fF.exeProcess queried: DebugPortJump to behavior
Source: Amcache.hve.4.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: MsMpEng.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
1
Virtualization/Sandbox Evasion
OS Credential Dumping21
Security Software Discovery
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Process Injection
LSASS Memory1
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager1
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
MMoIKWJ6fF.exe74%ReversingLabsWin32.Trojan.Zeus
MMoIKWJ6fF.exe62%VirustotalBrowse
MMoIKWJ6fF.exe100%AviraTR/Crypt.XPACK.Gen
MMoIKWJ6fF.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://bc.nsk.0%Avira URL Cloudsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
https://www.faktura.ru/enter.jsp?site=MMoIKWJ6fF.exefalse
    high
    http://upx.sf.netAmcache.hve.4.drfalse
      high
      https://www.faktura.ru/enter.jsp?site=https://bc.nsk.MMoIKWJ6fF.exefalse
        high
        https://bc.nsk.MMoIKWJ6fF.exefalse
        • Avira URL Cloud: safe
        unknown
        No contacted IP infos
        Joe Sandbox version:40.0.0 Tourmaline
        Analysis ID:1430691
        Start date and time:2024-04-24 02:54:59 +02:00
        Joe Sandbox product:CloudBasic
        Overall analysis duration:0h 4m 5s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
        Number of analysed new started processes analysed:21
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Sample name:MMoIKWJ6fF.exe
        renamed because original name is a hash value
        Original Sample Name:000424bf6c24a428df613c61ad96bbf9.bin.exe
        Detection:MAL
        Classification:mal60.winEXE@2/5@0/0
        EGA Information:Failed
        HCA Information:
        • Successful, ratio: 100%
        • Number of executed functions: 0
        • Number of non-executed functions: 6
        Cookbook Comments:
        • Found application associated with file extension: .exe
        • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, MoUsoCoreWorker.exe, conhost.exe, backgroundTaskHost.exe, svchost.exe
        • Excluded IPs from analysis (whitelisted): 20.42.73.29
        • Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, onedsblobprdeus15.eastus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
        • Execution Graph export aborted for target MMoIKWJ6fF.exe, PID 2444 because there are no executed function
        • Not all processes where analyzed, report is missing behavior information
        TimeTypeDescription
        04:39:56API Interceptor1x Sleep call for process: WerFault.exe modified
        No context
        No context
        No context
        No context
        No context
        Process:C:\Windows\SysWOW64\WerFault.exe
        File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
        Category:dropped
        Size (bytes):65536
        Entropy (8bit):0.6348415138089393
        Encrypted:false
        SSDEEP:96:WImFgYfavBs7hYp79fKQXIDcQvc6QcEVcw3cE/9P9+HbHg6ZAX/d5FMT2SlPkpXT:WfGBT0BU/QjEzuiFbZ24IO8i
        MD5:F0047FC234E5D3CA14A68D4B16EFA5AF
        SHA1:A4A03B6D2EA7CA628C662C89259F8C2780C48F04
        SHA-256:73502312DFE03BC45BF635070DEBD53E9FF97A8FDC6F52BB532C6CDB177F606E
        SHA-512:4546B733B1EB019A8AA9287B580FB5EF01935469441C1BBCEBE81B4E64F5A22376E64ACFC322A0FCB4569368A7BD6A100268820312F2B134DC0C4D4865DD3896
        Malicious:false
        Reputation:low
        Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.5.8.3.9.3.7.5.2.5.5.7.4.9.8.5.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.5.8.3.9.3.7.5.2.9.6.3.7.4.6.6.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.a.8.7.6.e.b.9.4.-.1.1.2.b.-.4.c.9.b.-.b.4.8.5.-.b.0.4.3.e.f.7.1.c.5.d.c.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.7.0.7.f.9.7.9.a.-.7.1.2.f.-.4.d.1.f.-.a.4.0.d.-.d.4.5.9.1.b.4.1.2.7.8.1.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.M.M.o.I.K.W.J.6.f.F...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.9.8.c.-.0.0.0.1.-.0.0.1.4.-.f.6.5.a.-.f.a.2.6.e.2.9.5.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.6.f.e.8.b.b.7.9.1.f.8.5.5.d.e.c.9.8.7.c.f.e.5.d.d.7.7.2.e.f.a.9.0.0.0.0.f.f.f.f.!.0.0.0.0.d.9.6.e.8.c.3.5.c.2.8.a.9.f.0.8.3.a.6.0.a.2.4.6.0.a.0.6.0.7.e.3.8.e.5.5.2.9.9.1.!.M.M.o.I.K.W.J.6.f.F...e.x.e.....T.a.r.g.e.t.A.p.p.
        Process:C:\Windows\SysWOW64\WerFault.exe
        File Type:Mini DuMP crash report, 14 streams, Wed Apr 24 00:55:52 2024, 0x1205a4 type
        Category:dropped
        Size (bytes):18760
        Entropy (8bit):1.9984906392984734
        Encrypted:false
        SSDEEP:96:598wE3jysWyIU4ZQi7n+kzLmXaPEL43Y1WIkWI/F+I4s8uDGy:INhlO+iLmqgL8is8eGy
        MD5:5059E533A6ACA4F44424CDB363E39352
        SHA1:C25E13EDB3836C12D6C06D008D580E2CB7774CE0
        SHA-256:BED0AB51F8B348E3AED84A92DD95CD2C82549A3C3AD2676049434CC58A003060
        SHA-512:D3E4272768A7F33666C36F4E90D1ECF1E9C824F2D54ABEFDBA4B6BFCF958AD8B03E49BCDE0913B6EADE3573277D810E21AD6D6B3915EDA904D46B777483AD497
        Malicious:false
        Reputation:low
        Preview:MDMP..a..... ........X(f............4...............<.......d...............T.......8...........T................?......................................................................................................eJ......L.......GenuineIntel............T............X(f.............................0..2...............W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .S.u.m.m.e.r. .T.i.m.e...........................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
        Process:C:\Windows\SysWOW64\WerFault.exe
        File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
        Category:dropped
        Size (bytes):8286
        Entropy (8bit):3.7048061568826336
        Encrypted:false
        SSDEEP:192:R6l7wVeJB36qzJ6YNBSU96WrgmfZwprj89bLrsf0qvZm:R6lXJx6sJ6Y7SU96WrgmfZ5Lwfs
        MD5:60798321C0C5416D65C68DFAA49C066D
        SHA1:55D30A0019375C157CE46E98FA2C462BAF95F58F
        SHA-256:7E16A22B04BB4CB48507D6146AA59B495B4B6689B52226BB7034334D18EE0EBF
        SHA-512:90520B89B306AB0BBD89FEDB7AF61D99346850B93D6CC7A177C19AEA7AF0F46C89BBE9C4A77F687E19F7B714404C09698644CC237136911C7E2FE5084E7A5601
        Malicious:false
        Reputation:low
        Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.2.4.4.4.<./.P.i.
        Process:C:\Windows\SysWOW64\WerFault.exe
        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
        Category:dropped
        Size (bytes):4579
        Entropy (8bit):4.487340896403653
        Encrypted:false
        SSDEEP:48:cvIwWl8zsvNJg77aI9eZWpW8VYYKYm8M4Ja+5Fko+q8CS+kvtU1d:uIjfvnI7go7VTjJaAW+kvtU1d
        MD5:B75D9324DC6A096DECC28CE25E210DA6
        SHA1:DDEEF4C122727BD12E721D266458BE0D14EE3BDB
        SHA-256:12F4C990E73DA20D190C32A580D2E1D22CDA7AF441759F7095A744368B44E85C
        SHA-512:246EC0BB228F21F28AA50A7468CA3EA30D73026E209CA43D537CFB518062D539A105A594F371BD4476CE2CF3BD2A356A21EC78A5BA20FC892580B786AD06AF40
        Malicious:false
        Reputation:low
        Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="293278" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
        Process:C:\Windows\SysWOW64\WerFault.exe
        File Type:MS Windows registry file, NT/2000 or above
        Category:dropped
        Size (bytes):1835008
        Entropy (8bit):4.416690696510126
        Encrypted:false
        SSDEEP:6144:Ecifpi6ceLPL9skLmb0moSWSPtaJG8nAgex285i2MMhA20X4WABlGuND5+:pi58oSWIZBk2MM6AFBRo
        MD5:3741A7E4B3350E59F3CD6F0292FCCB83
        SHA1:D550840360D398BED2ABDAD98F49CCAA90B34737
        SHA-256:B3589B9759B83C44F1663F6F6179237498658247214EB103F208CB2DC50BEC9D
        SHA-512:C4700B37BBAA06E1FE2027D498D625D6DB515054787025450B6F7B20D64F2C3A0B96C7A5E5E3363A7C3BCCADAC22233F6A85FF55E297835EF3D7E337544BBBFB
        Malicious:false
        Reputation:low
        Preview:regfE...E....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtmj..'...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
        File type:PE32 executable (GUI) Intel 80386, for MS Windows
        Entropy (8bit):6.676017060367445
        TrID:
        • Win32 Executable (generic) a (10002005/4) 99.96%
        • Generic Win/DOS Executable (2004/3) 0.02%
        • DOS Executable Generic (2002/1) 0.02%
        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
        File name:MMoIKWJ6fF.exe
        File size:51'200 bytes
        MD5:000424bf6c24a428df613c61ad96bbf9
        SHA1:d96e8c35c28a9f083a60a2460a0607e38e552991
        SHA256:b91e55cb98ab74532100bd9f70384d41f6b878317e86f0b0325aa0b928dc95c5
        SHA512:c35c0789041d339dc28e2156572c8046bd904508be41ea5e3daa6f864ffefefe59a16733d68045eb741d677234703e8eef1d6adbe71e67f83c13a39943396f89
        SSDEEP:1536:P7ZzuYozDBUF4mAdXPEJuJtKTHnRMMQ0EYW7I6qMv:eDK4xyUKrRpW0xMv
        TLSH:27338D5326D4BCB2DAA2487177652BB163BFEC340E225D47836009C949379C3DA67F4B
        File Content Preview:MZ......................@...................................0.......pizd.............'...'..................^}f}(@.F.N.V.O.V.W.^..9..j..'.^}f}(@..]...W.JSH..x....3.] ..!...%...i.Cn*'*'e....=..=.......=....=^...~>=v...=.....=?e~..=.....=...=.~.....?=..=~=.
        Icon Hash:00928e8e8686b000
        Entrypoint:0x410358
        Entrypoint Section:.huh
        Digitally signed:false
        Imagebase:0x400000
        Subsystem:windows gui
        Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
        DLL Characteristics:
        Time Stamp:0x437D9BAB [Fri Nov 18 09:15:23 2005 UTC]
        TLS Callbacks:
        CLR (.Net) Version:
        OS Version Major:5
        OS Version Minor:0
        File Version Major:5
        File Version Minor:0
        Subsystem Version Major:5
        Subsystem Version Minor:0
        Import Hash:
        Instruction
        add byte ptr [bx+si], al
        add byte ptr [eax], ah
        jl 00007FCFECC52B92h
        add byte ptr [ebp+00h], ah
        add dword ptr [ecx], eax
        dec esp
        jl 00007FCFECC52B92h
        add byte ptr [edi], bh
        add byte ptr [eax], al
        add byte ptr [3B00407Dh], al
        add byte ptr [eax], al
        add byte ptr [ebx], ch
        jnl 00007FCFECC52B92h
        add byte ptr [eax+eax], bh
        add byte ptr [ecx], al
        arpl word ptr [ebp+40h], di
        add byte ptr [00000000h], bh
        add byte ptr [eax], al
        add byte ptr [esi], bh
        add byte ptr [ecx], al
        add dword ptr [ebx+7Dh], edi
        inc eax
        add byte ptr [eax+00h], al
        add byte ptr [eax], al
        mov dl, 7Dh
        inc eax
        add byte ptr [ecx+00h], al
        add byte ptr [eax], al
        salc
        jnl 00007FCFECC52B92h
        add byte ptr [edx+00h], al
        add dword ptr [ecx], eax
        idiv dword ptr [ebp+40h]
        add byte ptr [edi+00h], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        cmp dword ptr [eax], eax
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        cmp al, byte ptr [eax]
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        dec eax
        add byte ptr [ecx], al
        add dword ptr [edx], ebx
        jle 00007FCFECC52B92h
        add byte ptr [ecx+00h], cl
        add dword ptr [ecx], eax
        sbb bh, byte ptr [esi+40h]
        add byte ptr [edx+00h], cl
        add dword ptr [ecx], eax
        sbb bh, byte ptr [esi+40h]
        add byte ptr [ebx+00h], cl
        add dword ptr [ecx], eax
        sbb bh, byte ptr [esi+40h]
        add byte ptr [esi+ebp+40h], bl
        add byte ptr [eax+2Eh], dl
        inc eax
        add byte ptr [esi+ebp+40h], al
        add byte ptr [eax], bh
        inc eax
        add byte ptr [eax], ch
        inc eax
        add byte ptr [eax], bl
        inc eax
        add byte ptr [eax], cl
        inc eax
        add byte ptr [eax], al
        inc eax
        add ah, dh
        sub eax, 2DDC0040h
        inc eax
        add ah, al
        sub eax, 2DAC0040h
        inc eax
        add byte ptr [ebp+ebp+2D7C0040h], dl
        inc eax
        add byte ptr [ebp+ebp+40h], al
        add byte ptr [00000040h+ebp], cl
        NameVirtual AddressVirtual Size Is in Section
        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
        IMAGE_DIRECTORY_ENTRY_BASERELOC0x120000x1290.jiv
        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IAT0x00x0
        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
        .edyx0x10000xedfc0xa200a89057c3e37f0c78dde3908641011866False0.6389130015432098data6.693907477941491IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        .huh0x100000x139d0x800bf7cf528caf1e473669086af0cb87c2aFalse0.41552734375data3.9374278475679176IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        .jiv0x120000x130000x16003138e1e0506382e6b1c194f042b194b6False0.7278053977272727GLS_BINARY_LSB_FIRST6.509525209330832IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        .rsrc0x250000x10000x4009a9b0ebeb1e92ab51280518c0258b682False0.4169921875data2.9184911440870183IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        No network behavior found

        Click to jump to process

        Click to jump to process

        Click to dive into process behavior distribution

        Click to jump to process

        Target ID:1
        Start time:02:55:50
        Start date:24/04/2024
        Path:C:\Users\user\Desktop\MMoIKWJ6fF.exe
        Wow64 process (32bit):true
        Commandline:"C:\Users\user\Desktop\MMoIKWJ6fF.exe"
        Imagebase:0x400000
        File size:51'200 bytes
        MD5 hash:000424BF6C24A428DF613C61AD96BBF9
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:low
        Has exited:true

        Target ID:4
        Start time:02:55:51
        Start date:24/04/2024
        Path:C:\Windows\SysWOW64\WerFault.exe
        Wow64 process (32bit):true
        Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 2444 -s 232
        Imagebase:0xd10000
        File size:483'680 bytes
        MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high
        Has exited:true

        Reset < >
          Strings
          Memory Dump Source
          • Source File: 00000001.00000002.1475091146.0000000000400000.00000002.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000001.00000002.1475106226.0000000000410000.00000080.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000001.00000002.1475118918.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000001.00000002.1475118918.0000000000425000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_1_2_400000_MMoIKWJ6fF.jbxd
          Similarity
          • API ID:
          • String ID: *keep-alive*$/$CONNECT $Connection: $Connection: close$Content-Length: $HTTP/1.0 200 Connection established$Host: $P$Proxy-$Proxy-Connection: $http://
          • API String ID: 0-737691513
          • Opcode ID: 258ad319e84b29832fc190804c319eb58fc718c243ad9d27b4d6d88a1184dade
          • Instruction ID: 03e3a1467374cfa778c4695df5259f3a2b7a55a4c2b045de885f70d119553934
          • Opcode Fuzzy Hash: 258ad319e84b29832fc190804c319eb58fc718c243ad9d27b4d6d88a1184dade
          • Instruction Fuzzy Hash: 59D10671D00305BAEF206BB58C4AFAF7EA89F05314F15843BF606B52E2E67D8964871D
          Uniqueness

          Uniqueness Score: -1.00%

          Strings
          Memory Dump Source
          • Source File: 00000001.00000002.1475091146.0000000000400000.00000002.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000001.00000002.1475106226.0000000000410000.00000080.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000001.00000002.1475118918.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000001.00000002.1475118918.0000000000425000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_1_2_400000_MMoIKWJ6fF.jbxd
          Similarity
          • API ID:
          • String ID: *.dat$*.p12$*.pem$\??\$faktura$ibank$prv_key.pfx$sign.cer
          • API String ID: 0-3785069218
          • Opcode ID: b752a3ff0c9178a48be06cad5e6f99ccb264981bf1c5722fed17a762ee3226bb
          • Instruction ID: d74ff7b0c4cb6cce33707e4b78304e97e0b1656ece000152391dddcbd670f948
          • Opcode Fuzzy Hash: b752a3ff0c9178a48be06cad5e6f99ccb264981bf1c5722fed17a762ee3226bb
          • Instruction Fuzzy Hash: 164182B194024CABDF209F94DC84ADE7BB8AF44304F0441B6FB14B72A0D7789A94CB98
          Uniqueness

          Uniqueness Score: -1.00%

          Strings
          Memory Dump Source
          • Source File: 00000001.00000002.1475091146.0000000000400000.00000002.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000001.00000002.1475106226.0000000000410000.00000080.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000001.00000002.1475118918.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000001.00000002.1475118918.0000000000425000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_1_2_400000_MMoIKWJ6fF.jbxd
          Similarity
          • API ID:
          • String ID: GetProcAddress$LoadLibraryA$Start Page$osl2sks.exe$rsldps$software\microsoft\internet explorer\main
          • API String ID: 0-966181252
          • Opcode ID: 1b6a4c06c2935de5a777f909fae1ae7178a48346a609e8ad3f791e1e101a39a6
          • Instruction ID: f78b724700d703acca1e7d2dfb9f45d753caddb857eab697be415e932ea284b5
          • Opcode Fuzzy Hash: 1b6a4c06c2935de5a777f909fae1ae7178a48346a609e8ad3f791e1e101a39a6
          • Instruction Fuzzy Hash: 3261C9B1C00104BADB10BBA59C86DAF7BBCDF45314F14457BF904B22E2D77D595086AD
          Uniqueness

          Uniqueness Score: -1.00%

          Strings
          Memory Dump Source
          • Source File: 00000001.00000002.1475091146.0000000000400000.00000002.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000001.00000002.1475106226.0000000000410000.00000080.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000001.00000002.1475118918.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000001.00000002.1475118918.0000000000425000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_1_2_400000_MMoIKWJ6fF.jbxd
          Similarity
          • API ID:
          • String ID: -$1$https://bc.nsk.*.ru/*$https://ibank*.ru/*$https://www.faktura.ru/enter.jsp?site=
          • API String ID: 0-618060329
          • Opcode ID: 7eae39f129516f035699c697973e29b96699168eca8e313fb5ed191f2f009d29
          • Instruction ID: 23f2f3a30b9857b8e49964c8d67acb843de0c5d668417138742e90887ea420ce
          • Opcode Fuzzy Hash: 7eae39f129516f035699c697973e29b96699168eca8e313fb5ed191f2f009d29
          • Instruction Fuzzy Hash: F4B1E471904348AEEB21DBA0CC45BEF7BF8AB01304F1440BEE540B62D1D7B95A99CB5A
          Uniqueness

          Uniqueness Score: -1.00%

          Strings
          Memory Dump Source
          • Source File: 00000001.00000002.1475091146.0000000000400000.00000002.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000001.00000002.1475106226.0000000000410000.00000080.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000001.00000002.1475118918.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000001.00000002.1475118918.0000000000425000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_1_2_400000_MMoIKWJ6fF.jbxd
          Similarity
          • API ID:
          • String ID: IE Cookies:$PStoreCreateInstance$Z%a$pstorec.dll
          • API String ID: 0-471104514
          • Opcode ID: 3b1b4c3cb7ec75bc9f9087cb2a31ec4488c37df8b01e7a5a44f472936c5eae02
          • Instruction ID: 45efa8acaf008de781d4bf8afba4c30c10eb1ddafc0b95cafa111ed77eae2115
          • Opcode Fuzzy Hash: 3b1b4c3cb7ec75bc9f9087cb2a31ec4488c37df8b01e7a5a44f472936c5eae02
          • Instruction Fuzzy Hash: 8EC16BB1D00209EFDB10DFD4C884EEEBBB9EF48304F15846AE502BB291D6399E55CB64
          Uniqueness

          Uniqueness Score: -1.00%

          Strings
          Memory Dump Source
          • Source File: 00000001.00000002.1475091146.0000000000400000.00000002.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000001.00000002.1475106226.0000000000410000.00000080.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000001.00000002.1475118918.0000000000412000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000001.00000002.1475118918.0000000000425000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_1_2_400000_MMoIKWJ6fF.jbxd
          Similarity
          • API ID:
          • String ID: *<input *value="$*<option selected$*<select $/
          • API String ID: 0-2404899240
          • Opcode ID: 60961a0cc3b0bf4f87a7d1a32fd68a5cadd949489c25cc058c9387a4d67b3717
          • Instruction ID: ea8cbcbb5c47d3f9743c7a147252469f87f56a65e4e4dcdd5f331af1204fe3a4
          • Opcode Fuzzy Hash: 60961a0cc3b0bf4f87a7d1a32fd68a5cadd949489c25cc058c9387a4d67b3717
          • Instruction Fuzzy Hash: 12613172900209BFDF119BA4CD84BEE7B78EB44304F1440BEE685B72D2DB795E458B68
          Uniqueness

          Uniqueness Score: -1.00%