Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
oaVCXidWzb.exe

Overview

General Information

Sample name:oaVCXidWzb.exe
renamed because original name is a hash value
Original sample name:05dfe9789248ddc56a6926a7169e0fc3.bin.exe
Analysis ID:1430692
MD5:05dfe9789248ddc56a6926a7169e0fc3
SHA1:781f0db7a59dc7592319970ba6fa999b65a3e607
SHA256:335b483be1df507c97be0d3d55105898dd86fb067b673f64cfe5817e1538c79c
Tags:exeprg
Infos:

Detection

Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Machine Learning detection for sample
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Detected potential crypto function
Entry point lies outside standard sections
One or more processes crash
PE file contains sections with non-standard names
PE file does not import any functions
Sample file is different than original file name gathered from version info
Uses 32bit PE files

Classification

  • System is w10x64
  • oaVCXidWzb.exe (PID: 7364 cmdline: "C:\Users\user\Desktop\oaVCXidWzb.exe" MD5: 05DFE9789248DDC56A6926A7169E0FC3)
    • WerFault.exe (PID: 7464 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 7364 -s 232 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: oaVCXidWzb.exeAvira: detected
Source: oaVCXidWzb.exeReversingLabs: Detection: 84%
Source: oaVCXidWzb.exeVirustotal: Detection: 77%Perma Link
Source: oaVCXidWzb.exeJoe Sandbox ML: detected
Source: oaVCXidWzb.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: Amcache.hve.4.drString found in binary or memory: http://upx.sf.net
Source: oaVCXidWzb.exeString found in binary or memory: https://bc.nsk.
Source: oaVCXidWzb.exeString found in binary or memory: https://www.faktura.ru/enter.jsp?site=
Source: oaVCXidWzb.exeString found in binary or memory: https://www.faktura.ru/enter.jsp?site=https://bc.nsk.
Source: C:\Users\user\Desktop\oaVCXidWzb.exeCode function: 0_2_0041133B0_2_0041133B
Source: C:\Users\user\Desktop\oaVCXidWzb.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7364 -s 232
Source: oaVCXidWzb.exeStatic PE information: No import functions for PE file found
Source: oaVCXidWzb.exe, 00000000.00000000.1229483153.0000000000427000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilename vs oaVCXidWzb.exe
Source: oaVCXidWzb.exeBinary or memory string: OriginalFilename vs oaVCXidWzb.exe
Source: oaVCXidWzb.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: mal60.winEXE@2/5@0/0
Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7364
Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\87d0ab80-acab-43fe-99e0-248b67edcf14Jump to behavior
Source: C:\Users\user\Desktop\oaVCXidWzb.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: oaVCXidWzb.exeReversingLabs: Detection: 84%
Source: oaVCXidWzb.exeVirustotal: Detection: 77%
Source: unknownProcess created: C:\Users\user\Desktop\oaVCXidWzb.exe "C:\Users\user\Desktop\oaVCXidWzb.exe"
Source: C:\Users\user\Desktop\oaVCXidWzb.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 7364 -s 232
Source: C:\Users\user\Desktop\oaVCXidWzb.exeSection loaded: apphelp.dllJump to behavior
Source: initial sampleStatic PE information: section where entry point is pointing to: .ngjsx
Source: oaVCXidWzb.exeStatic PE information: section name: .ebcj
Source: oaVCXidWzb.exeStatic PE information: section name: .ngjsx
Source: oaVCXidWzb.exeStatic PE information: section name: .kpqb
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: Amcache.hve.4.drBinary or memory string: VMware
Source: Amcache.hve.4.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.4.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.4.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.4.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.4.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.4.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.4.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.4.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.4.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.4.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.4.drBinary or memory string: vmci.sys
Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.4.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.4.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.4.drBinary or memory string: VMware-42 27 ae 88 8c 2b 21 02-a5 86 22 5b 84 51 ac f0
Source: Amcache.hve.4.drBinary or memory string: VMware20,1
Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.4.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.4.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.4.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.4.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.4.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.4.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.4.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.4.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.4.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Users\user\Desktop\oaVCXidWzb.exeProcess queried: DebugPortJump to behavior
Source: Amcache.hve.4.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: MsMpEng.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
1
Virtualization/Sandbox Evasion
OS Credential Dumping21
Security Software Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Process Injection
LSASS Memory1
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager1
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
oaVCXidWzb.exe84%ReversingLabsWin32.Backdoor.Paproxy
oaVCXidWzb.exe77%VirustotalBrowse
oaVCXidWzb.exe100%AviraTR/Crypt.XPACK.Gen
oaVCXidWzb.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://bc.nsk.0%Avira URL Cloudsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
https://www.faktura.ru/enter.jsp?site=oaVCXidWzb.exefalse
    high
    http://upx.sf.netAmcache.hve.4.drfalse
      high
      https://www.faktura.ru/enter.jsp?site=https://bc.nsk.oaVCXidWzb.exefalse
        high
        https://bc.nsk.oaVCXidWzb.exefalse
        • Avira URL Cloud: safe
        unknown
        No contacted IP infos
        Joe Sandbox version:40.0.0 Tourmaline
        Analysis ID:1430692
        Start date and time:2024-04-24 02:56:01 +02:00
        Joe Sandbox product:CloudBasic
        Overall analysis duration:0h 4m 2s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
        Number of analysed new started processes analysed:16
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Sample name:oaVCXidWzb.exe
        renamed because original name is a hash value
        Original Sample Name:05dfe9789248ddc56a6926a7169e0fc3.bin.exe
        Detection:MAL
        Classification:mal60.winEXE@2/5@0/0
        EGA Information:Failed
        HCA Information:
        • Successful, ratio: 100%
        • Number of executed functions: 0
        • Number of non-executed functions: 8
        Cookbook Comments:
        • Found application associated with file extension: .exe
        • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, Sgrmuserer.exe, conhost.exe, svchost.exe
        • Excluded IPs from analysis (whitelisted): 13.89.179.12
        • Excluded domains from analysis (whitelisted): login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, onedsblobprdcus17.centralus.cloudapp.azure.com, fe3cr.delivery.mp.microsoft.com
        • Execution Graph export aborted for target oaVCXidWzb.exe, PID 7364 because there are no executed function
        • Not all processes where analyzed, report is missing behavior information
        TimeTypeDescription
        02:56:55API Interceptor1x Sleep call for process: WerFault.exe modified
        No context
        No context
        No context
        No context
        No context
        Process:C:\Windows\SysWOW64\WerFault.exe
        File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
        Category:dropped
        Size (bytes):65536
        Entropy (8bit):0.6323238407485315
        Encrypted:false
        SSDEEP:96:6MFcn6dsMhmG7jfJQXIDcQvc6QcEVcw3cE/H+HbHg6ZAX/d5FMT2SlPkpXmTAyfp:DW6dw0BU/AjEzuiFAZ24IO8O
        MD5:31052BF89E5E14244D88A747E7400A44
        SHA1:8F623ED274ECDC8B97716147B4F92EBC1BE61576
        SHA-256:86542BE91415D935F85948B5EC6BFC331FAF8B4876AF952F9DC58335515DD592
        SHA-512:A51E12EA0C7DFB22E99DD53A7DADDA7B234049D6BBD6A860F5DB5FF361DCFEA2BFECD71D47D6D0ED7BA1A66887D39ACB462C54F82C65BEB0165F50A2CBEE109B
        Malicious:false
        Reputation:low
        Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.5.8.3.9.3.8.0.8.5.8.2.1.5.7.8.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.5.8.3.9.3.8.0.8.9.2.5.9.2.2.6.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.5.7.3.c.5.2.6.a.-.f.4.d.e.-.4.0.4.a.-.9.4.8.c.-.2.0.9.d.1.9.1.5.1.f.8.e.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.a.6.f.3.0.0.a.5.-.e.0.b.2.-.4.e.e.c.-.8.b.1.2.-.7.d.f.f.0.d.8.4.8.9.1.a.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.o.a.V.C.X.i.d.W.z.b...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.c.c.4.-.0.0.0.1.-.0.0.1.3.-.7.3.e.6.-.0.4.4.9.e.2.9.5.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.4.2.d.4.3.3.e.d.a.b.8.5.8.8.d.6.e.a.e.f.d.6.e.4.1.7.2.9.7.d.0.f.0.0.0.0.f.f.f.f.!.0.0.0.0.7.8.1.f.0.d.b.7.a.5.9.d.c.7.5.9.2.3.1.9.9.7.0.b.a.6.f.a.9.9.9.b.6.5.a.3.e.6.0.7.!.o.a.V.C.X.i.d.W.z.b...e.x.e.....T.a.r.g.e.t.A.p.p.
        Process:C:\Windows\SysWOW64\WerFault.exe
        File Type:Mini DuMP crash report, 14 streams, Wed Apr 24 00:56:48 2024, 0x1205a4 type
        Category:dropped
        Size (bytes):18760
        Entropy (8bit):1.995164256204623
        Encrypted:false
        SSDEEP:96:518FE3TxEoVK+gZPi7nu4Nprj0tRqUlreiLbRWIkWI/YI4J8uKqy:QQuOu4rj0btlXnJ8rqy
        MD5:8EDF41B658315F49934DB00F7833C713
        SHA1:C121C7C80797BD414C9FBD915B3BBC169BF37143
        SHA-256:BEF44E49414698800572C09D62EB4A346DAE8350E60CF3A2E9EB7C3AE7E91038
        SHA-512:9830D670097675A96A6660C777E3E986B8B05AF55A224362975E2E7ACF2EB9F094367F6EBD8DD1CD3CBB8ECDB54EABBED8C076A1E97DA61D28E39C5A76C54D27
        Malicious:false
        Reputation:low
        Preview:MDMP..a..... ........X(f............4...............<.......d...............T.......8...........T................?......................................................................................................eJ......L.......GenuineIntel............T............X(f.............................0..2...............W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .S.u.m.m.e.r. .T.i.m.e...........................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
        Process:C:\Windows\SysWOW64\WerFault.exe
        File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
        Category:dropped
        Size (bytes):8282
        Entropy (8bit):3.697043235893377
        Encrypted:false
        SSDEEP:192:R6l7wVeJer67W6YWnSU9XPgmfGNwpr189bTgsfaRm:R6lXJ667W6YWSU9XPgmfY3Tzf1
        MD5:AB1DE728CA262D675DBB8FF714828899
        SHA1:522B826614033C01488FDC088EBF1E8F50653611
        SHA-256:96F5F78A82CF4E9FBFCF762033E7E30CF76F07A983C59E02189A714BD858448E
        SHA-512:2B07CAA3869B4F65D706A9A4AF949353B232FB179E286432BACD228A66232B390C868171F1F98FC8E6607E7F95E3ADB88044A9BCE090BFEF68F1BEE778360A9C
        Malicious:false
        Reputation:low
        Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.3.6.4.<./.P.i.
        Process:C:\Windows\SysWOW64\WerFault.exe
        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
        Category:dropped
        Size (bytes):4579
        Entropy (8bit):4.464043311165204
        Encrypted:false
        SSDEEP:48:cvIwWl8zsOJg77aI9J+WpW8VYKYm8M4J+m8MFG+q8MDNLb2bYd:uIjfEI77/7VeJkNb2bYd
        MD5:DF832135F37F323CE3CBEC6F03C6E652
        SHA1:B0AA5D4559157FA53DAE14441F76990CFE220FA7
        SHA-256:20C3B175CDB6E0A7627E60443C40AFC88B12DB050F5B1777B16E956F8D506FF7
        SHA-512:6C5CCC40A22A49A8346A894E0C3768798C0616B3FAA7AA5025EAA4944040EE6E9C534783388E5D47AE35211528AAAB66AB6D1367B63286A67D4F977A253B9021
        Malicious:false
        Reputation:low
        Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="293279" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
        Process:C:\Windows\SysWOW64\WerFault.exe
        File Type:MS Windows registry file, NT/2000 or above
        Category:dropped
        Size (bytes):1835008
        Entropy (8bit):4.2959633126958385
        Encrypted:false
        SSDEEP:6144:541fWRYkg7Di2vXoy00lWZgiWaaKxC44Q0NbuDs+vQmBMZJh1Vjb:u1/YCW2AoQ0NiNQwMHrVn
        MD5:21436199FF6C07019E97CF2AB2BD93FF
        SHA1:292F53AA46DA7A1D4014BE5CEFB969EC292B997C
        SHA-256:3A0B24B8D301E838E7095012063D8CC3F77D528E3183665EFE617837B82CFB84
        SHA-512:B7E93A8ED8212BC44B679F7DB26775F98470452FF1DF7269137C78B7FB2998B9AAA11DADA09AED226DB55F932961355EDDFE18A85AF7CE87C046A6855FAA1CF0
        Malicious:false
        Reputation:low
        Preview:regfG...G....\.Z.................... ....`......\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm.BDI.................................................................................................................................................................................................................................................................................................................................................Q}........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
        File type:PE32 executable (GUI) Intel 80386, for MS Windows
        Entropy (8bit):6.7033439151271565
        TrID:
        • Win32 Executable (generic) a (10002005/4) 99.96%
        • Generic Win/DOS Executable (2004/3) 0.02%
        • DOS Executable Generic (2002/1) 0.02%
        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
        File name:oaVCXidWzb.exe
        File size:54'784 bytes
        MD5:05dfe9789248ddc56a6926a7169e0fc3
        SHA1:781f0db7a59dc7592319970ba6fa999b65a3e607
        SHA256:335b483be1df507c97be0d3d55105898dd86fb067b673f64cfe5817e1538c79c
        SHA512:61d188d14eea47e15d77b040f49e121c3c05216cc18f6752458cdc6d42753b63d9e3db269fe2ea1d282e4ec4796e61364da95f1651f075eab32e10594419aa09
        SSDEEP:1536:Q7FzuGotNKyVSMNf4xH0chFQSJG5aij21l0GrAhSXj0mE/3h:JNKK1avz2kc2I8j0mE/R
        TLSH:99336C4232D0DCB2DAA3803237697F3673BFE9718E159947833409C96BA19F28519E5B
        File Content Preview:MZ......................@...........................................bn01......6...6.`...`....O..`..."............................o.....z...z...zF..z...zF..z...z.......z....................................................................^}f}(@.L.G.Q.R.X.\.
        Icon Hash:90cececece8e8eb0
        Entrypoint:0x41133b
        Entrypoint Section:.ngjsx
        Digitally signed:false
        Imagebase:0x400000
        Subsystem:windows gui
        Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
        DLL Characteristics:
        Time Stamp:0x417ED91A [Tue Oct 26 23:09:14 2004 UTC]
        TLS Callbacks:
        CLR (.Net) Version:
        OS Version Major:5
        OS Version Minor:0
        File Version Major:5
        File Version Minor:0
        Subsystem Version Major:5
        Subsystem Version Minor:0
        Import Hash:
        Instruction
        add al, bl
        and eax, 40103C00h
        add byte ptr [eax], dl
        and byte ptr [ecx+00h], al
        jo 00007F3964E9A8B4h
        inc ecx
        add byte ptr [eax], bh
        and ax, 00002C00h
        adc byte ptr [eax+00h], al
        enter 4121h, 00h
        aam 12h
        inc ecx
        add al, al
        and ax, 00000000h
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [ebp+00h], al
        add dword ptr [ecx], eax
        mov ch, 87h
        inc eax
        add byte ptr [esi+00h], al
        add dword ptr [ecx], eax
        rol dword ptr [edi+00430040h], 1
        add dword ptr [ecx], eax
        int1
        xchg dword ptr [eax+00h], eax
        inc esp
        add byte ptr [ecx], al
        add dword ptr [67004088h], ecx
        add byte ptr [eax], al
        add byte ptr [68004088h], ch
        add byte ptr [eax], al
        add byte ptr [66004088h], ch
        add byte ptr [ecx], al
        add dword ptr [ecx-78h], ebx
        inc eax
        add byte ptr [edi], bh
        add byte ptr [eax], al
        add byte ptr [edx], dl
        mov dword ptr [eax+00h], eax
        cmp eax, dword ptr [eax]
        add byte ptr [eax], al
        cmp byte ptr [ecx+003C0040h], cl
        add byte ptr [ecx], al
        jo 00007F3964E9A82Bh
        inc eax
        add byte ptr [00000000h], bh
        add byte ptr [eax], al
        add byte ptr [esi], bh
        add byte ptr [ecx], al
        add dword ptr [eax+40004089h], ecx
        add byte ptr [eax], al
        add byte ptr [edi+41004089h], bh
        add byte ptr [eax], al
        add bl, ah
        mov dword ptr [eax+00h], eax
        inc edx
        add byte ptr [ecx], al
        add dword ptr [edx+ecx*4], eax
        inc eax
        add byte ptr [edi+00h], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        cmp dword ptr [eax], eax
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        cmp al, byte ptr [eax]
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        dec eax
        add byte ptr [ecx], al
        NameVirtual AddressVirtual Size Is in Section
        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
        IMAGE_DIRECTORY_ENTRY_BASERELOC0x130000x13bc.kpqb
        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IAT0x00x0
        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
        .ebcj0x10000xfe160xae00fdc05a66f69e2d3bd0f71e55eccb2eb0False0.6364718031609196data6.705630058562217IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        .ngjsx0x110000x14750x800966357a7fbd0608d723dda1d3880bab9False0.40869140625data3.8377999772436384IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        .kpqb0x130000x140000x18009d2ea51caec2f60835eaa7e21414d5bfFalse0.7374674479166666data6.584776573381875IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        .rsrc0x270000x10000x400d48610a4f58aee23bfb8e261a7cf3f64False0.4111328125data2.857017964498472IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        No network behavior found

        Click to jump to process

        Click to jump to process

        Click to dive into process behavior distribution

        Click to jump to process

        Target ID:0
        Start time:02:56:48
        Start date:24/04/2024
        Path:C:\Users\user\Desktop\oaVCXidWzb.exe
        Wow64 process (32bit):true
        Commandline:"C:\Users\user\Desktop\oaVCXidWzb.exe"
        Imagebase:0x400000
        File size:54'784 bytes
        MD5 hash:05DFE9789248DDC56A6926A7169E0FC3
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:low
        Has exited:true

        Target ID:4
        Start time:02:56:48
        Start date:24/04/2024
        Path:C:\Windows\SysWOW64\WerFault.exe
        Wow64 process (32bit):true
        Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 7364 -s 232
        Imagebase:0x6e0000
        File size:483'680 bytes
        MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:high
        Has exited:true

        Reset < >
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1301241856.0000000000411000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.1301223277.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1301295160.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1301295160.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_oaVCXidWzb.jbxd
          Similarity
          • API ID:
          • String ID: (@
          • API String ID: 0-1784217029
          • Opcode ID: 1398eb5562d283908b662f38b4dc2cdbc468db82e1a6b56e58ff0e346185519f
          • Instruction ID: b1626643c4952bea3b9cdd6c7e71078ed494b70bb96d5d72573a48429d1d301c
          • Opcode Fuzzy Hash: 1398eb5562d283908b662f38b4dc2cdbc468db82e1a6b56e58ff0e346185519f
          • Instruction Fuzzy Hash: 7ED1EF6148E3C24FD7139BB048695D17FA0EE1312472E96DFC4EACB8A3D29D948BC716
          Uniqueness

          Uniqueness Score: -1.00%

          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1301223277.0000000000400000.00000002.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.1301241856.0000000000411000.00000080.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1301295160.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1301295160.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_oaVCXidWzb.jbxd
          Similarity
          • API ID:
          • String ID: *keep-alive*$/$CONNECT $Connection: $Connection: close$Content-Length: $HTTP/1.0 200 Connection established$Host: $P$Proxy-$Proxy-Connection: $http://
          • API String ID: 0-737691513
          • Opcode ID: dff6b07de356e1359676b5af457bd52af456b4ef77888ebf0c2b738e534b100e
          • Instruction ID: 32e6bcd1850a229efd3a9184015467c43b51c499b181f89e3469a998ca3ba823
          • Opcode Fuzzy Hash: dff6b07de356e1359676b5af457bd52af456b4ef77888ebf0c2b738e534b100e
          • Instruction Fuzzy Hash: A1D11571D083057AEB206B65CC46FAF3EA9EF00304F14847BF900B52D2E6BDA951975E
          Uniqueness

          Uniqueness Score: -1.00%

          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1301223277.0000000000400000.00000002.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.1301241856.0000000000411000.00000080.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1301295160.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1301295160.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_oaVCXidWzb.jbxd
          Similarity
          • API ID:
          • String ID: *.dat$*.p12$*.pem$\??\$faktura$ibank$prv_key.pfx$sign.cer
          • API String ID: 0-3785069218
          • Opcode ID: 3bb7f41a2c8523c56ccd0ff8e7b20bde904b2edc3d347b6d64e14773ff37ad8d
          • Instruction ID: b697b1d13315b66542e774acf74a545802b1e1298cae670addfd783988bee631
          • Opcode Fuzzy Hash: 3bb7f41a2c8523c56ccd0ff8e7b20bde904b2edc3d347b6d64e14773ff37ad8d
          • Instruction Fuzzy Hash: 4E418472900659ABDF109F94DD84ADF7BB8EB04304F0481B6FE14B72A0D3799A90DF98
          Uniqueness

          Uniqueness Score: -1.00%

          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1301223277.0000000000400000.00000002.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.1301241856.0000000000411000.00000080.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1301295160.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1301295160.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_oaVCXidWzb.jbxd
          Similarity
          • API ID:
          • String ID: GetProcAddress$L$A$LoadLibraryA$Start Page$osl2sks.exe$rsldps$software\microsoft\internet explorer\main
          • API String ID: 0-138766429
          • Opcode ID: 3ccee0f09d03d7f0c0e1f5742b927c93783f7ca62f93342d16347b0cbda20eed
          • Instruction ID: ec24457d0a7226c45e521ec15ad99e13f827fcdcc384197e9ad81a43d22c6f33
          • Opcode Fuzzy Hash: 3ccee0f09d03d7f0c0e1f5742b927c93783f7ca62f93342d16347b0cbda20eed
          • Instruction Fuzzy Hash: 1661F5B1D01204AADB10BBA69D46DAF7BB8EF45314F14447BF914F32D2E77C8A108A6D
          Uniqueness

          Uniqueness Score: -1.00%

          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1301223277.0000000000400000.00000002.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.1301241856.0000000000411000.00000080.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1301295160.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1301295160.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_oaVCXidWzb.jbxd
          Similarity
          • API ID:
          • String ID: | $-$-$SysListView32$software\webmoney$version
          • API String ID: 0-4020775617
          • Opcode ID: 2ef3e0368122f4a1e01058c182c443501f27c28e9efaaf1dbaca4211f6da6866
          • Instruction ID: 6b3e68623f2441b6c9efe595eac2169cc3000afc4379cc35838fe4641ea31de6
          • Opcode Fuzzy Hash: 2ef3e0368122f4a1e01058c182c443501f27c28e9efaaf1dbaca4211f6da6866
          • Instruction Fuzzy Hash: 9FA18F71C00219ABCF20EBA4CD449DEBBB8EF08310F21427AF521F61E0D7794AA5CB59
          Uniqueness

          Uniqueness Score: -1.00%

          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1301223277.0000000000400000.00000002.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.1301241856.0000000000411000.00000080.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1301295160.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1301295160.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_oaVCXidWzb.jbxd
          Similarity
          • API ID:
          • String ID: -$1$https://bc.nsk.*.ru/*$https://ibank*.ru/*$https://www.faktura.ru/enter.jsp?site=
          • API String ID: 0-618060329
          • Opcode ID: 0595e56c1a9e68f2d5d2cb5000ffa24c0ada4b351ca6c3f0c4f6a81f5a84e4fe
          • Instruction ID: de45dd9646f3b59a9449b17a9f2b477f020dcbcf197b6acf4068be21c3599dec
          • Opcode Fuzzy Hash: 0595e56c1a9e68f2d5d2cb5000ffa24c0ada4b351ca6c3f0c4f6a81f5a84e4fe
          • Instruction Fuzzy Hash: 43B106B1904309AEEB21DBA0CC45BEBBBF8EF00304F14807AE651B62D1D7785A55CB6D
          Uniqueness

          Uniqueness Score: -1.00%

          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1301223277.0000000000400000.00000002.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.1301241856.0000000000411000.00000080.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1301295160.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1301295160.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_oaVCXidWzb.jbxd
          Similarity
          • API ID:
          • String ID: IE Cookies:$PStoreCreateInstance$Z%a$pstorec.dll
          • API String ID: 0-471104514
          • Opcode ID: 290ee39cd9a447a4642421c4f34957fc400e1289976a7dfbe736e2b999157432
          • Instruction ID: 0b5fde39bf8ed59f49cadd90677a66f844177a4ef27b47ef312fd6e8101439d0
          • Opcode Fuzzy Hash: 290ee39cd9a447a4642421c4f34957fc400e1289976a7dfbe736e2b999157432
          • Instruction Fuzzy Hash: FAC18DB1D00209AFDF11DFA4CC84EEEBBB9EF48304F15846AE406B7291D6399E15CB64
          Uniqueness

          Uniqueness Score: -1.00%

          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.1301223277.0000000000400000.00000002.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
          • Associated: 00000000.00000002.1301241856.0000000000411000.00000080.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1301295160.0000000000413000.00000002.00000001.01000000.00000003.sdmpDownload File
          • Associated: 00000000.00000002.1301295160.0000000000427000.00000002.00000001.01000000.00000003.sdmpDownload File
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_400000_oaVCXidWzb.jbxd
          Similarity
          • API ID:
          • String ID: *<input *value="$*<option selected$*<select $/
          • API String ID: 0-2404899240
          • Opcode ID: be19307860cd218758573d731d5ca3dfd1dee97b11d57235d856b2ee03d14dd4
          • Instruction ID: 45c00446261abf15b958ff9d0f2b0b11855fd9ec25423989fc995fb71cf22184
          • Opcode Fuzzy Hash: be19307860cd218758573d731d5ca3dfd1dee97b11d57235d856b2ee03d14dd4
          • Instruction Fuzzy Hash: BF61C6B1A0020A6FEF119BA4CC85FEE7BB9EF04304F1440BAE605BB2D2D6795D55CB58
          Uniqueness

          Uniqueness Score: -1.00%