Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
I281zhTj3J.exe

Overview

General Information

Sample name:I281zhTj3J.exe
renamed because original name is a hash value
Original sample name:666a2246258daa97ba8c2ecaec9981ebb1a3e8312eb08d9718be0be135ae4078.exe
Analysis ID:1640836
MD5:2326964f20a0168ca99a2d66b19f5c0d
SHA1:587e1dc32c8ad0623ade4401a0ca31714f871482
SHA256:666a2246258daa97ba8c2ecaec9981ebb1a3e8312eb08d9718be0be135ae4078
Tags:46-4-119-125exeuser-JAMESWT_MHT
Infos:

Detection

Score:60
Range:0 - 100
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Potentially malicious time measurement code found
Contains functionality for execution timing, often used to detect debuggers
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Enables debug privileges
Enables security privileges
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May check the online IP address of the machine

Classification

  • System is w10x64
  • I281zhTj3J.exe (PID: 8868 cmdline: "C:\Users\user\Desktop\I281zhTj3J.exe" MD5: 2326964F20A0168CA99A2D66B19F5C0D)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: I281zhTj3J.exeAvira: detected
Source: I281zhTj3J.exeReversingLabs: Detection: 33%
Source: I281zhTj3J.exeVirustotal: Detection: 32%Perma Link
Source: I281zhTj3J.exe, 00000000.00000002.2600516665.00007FF72A53F000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_fd0836b9-e
Source: unknownHTTPS traffic detected: 104.26.13.205:443 -> 192.168.2.5:49724 version: TLS 1.2
Source: I281zhTj3J.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: global trafficTCP traffic: 192.168.2.5:49721 -> 46.4.119.125:7712
Source: Joe Sandbox ViewIP Address: 46.4.119.125 46.4.119.125
Source: Joe Sandbox ViewIP Address: 104.26.13.205 104.26.13.205
Source: Joe Sandbox ViewIP Address: 104.26.13.205 104.26.13.205
Source: Joe Sandbox ViewJA3 fingerprint: bd0bf25947d4a37404f0424edf4db9ad
Source: unknownDNS query: name: api.ipify.org
Source: unknownDNS query: name: api.ipify.org
Source: unknownTCP traffic detected without corresponding DNS query: 46.4.119.125
Source: unknownTCP traffic detected without corresponding DNS query: 46.4.119.125
Source: unknownTCP traffic detected without corresponding DNS query: 46.4.119.125
Source: unknownTCP traffic detected without corresponding DNS query: 46.4.119.125
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: api.ipify.org
Source: I281zhTj3J.exe, 00000000.00000002.2600011336.000001FD67E61000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org
Source: I281zhTj3J.exe, 00000000.00000002.2600011336.000001FD67E61000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/
Source: I281zhTj3J.exe, 00000000.00000002.2600011336.000001FD67E61000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.org/INTk
Source: I281zhTj3J.exe, 00000000.00000002.2600011336.000001FD67E61000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.orghRB6
Source: I281zhTj3J.exe, 00000000.00000002.2600011336.000001FD67E61000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://api.ipify.orgptography
Source: I281zhTj3J.exeString found in binary or memory: https://curl.se/docs/alt-svc.html
Source: I281zhTj3J.exeString found in binary or memory: https://curl.se/docs/hsts.html
Source: I281zhTj3J.exeString found in binary or memory: https://curl.se/docs/http-cookies.html
Source: unknownNetwork traffic detected: HTTP traffic on port 49724 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49724
Source: unknownHTTPS traffic detected: 104.26.13.205:443 -> 192.168.2.5:49724 version: TLS 1.2
Source: C:\Users\user\Desktop\I281zhTj3J.exeCode function: 0_2_00007FF729BDC6C00_2_00007FF729BDC6C0
Source: C:\Users\user\Desktop\I281zhTj3J.exeCode function: 0_2_00007FF729BA61400_2_00007FF729BA6140
Source: C:\Users\user\Desktop\I281zhTj3J.exeProcess token adjusted: SecurityJump to behavior
Source: classification engineClassification label: mal60.evad.winEXE@1/0@1/3
Source: I281zhTj3J.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\I281zhTj3J.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: I281zhTj3J.exe, 00000000.00000000.1340765764.00007FF72A3B9000.00000002.00000001.01000000.00000003.sdmp, I281zhTj3J.exe, 00000000.00000002.2600516665.00007FF72A3B9000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: UPDATE %Q.sqlite_master SET tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqliteX_autoindex%%' ESCAPE 'X' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q COLLATE nocase AND (type='table' OR type='index' OR type='trigger');
Source: I281zhTj3J.exe, 00000000.00000000.1340765764.00007FF72A3B9000.00000002.00000001.01000000.00000003.sdmp, I281zhTj3J.exe, 00000000.00000002.2600516665.00007FF72A3B9000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: INSERT INTO %Q.sqlite_master VALUES('index',%Q,%Q,#%d,%Q);
Source: I281zhTj3J.exeReversingLabs: Detection: 33%
Source: I281zhTj3J.exeVirustotal: Detection: 32%
Source: I281zhTj3J.exeString found in binary or memory: Accept-Additions
Source: I281zhTj3J.exeString found in binary or memory: List-Help
Source: I281zhTj3J.exeString found in binary or memory: MMHS-Exempted-Address
Source: I281zhTj3J.exeString found in binary or memory: Originator-Return-Address
Source: I281zhTj3J.exeString found in binary or memory: id-cmc-addExtensions
Source: I281zhTj3J.exeString found in binary or memory: set-addPolicy
Source: I281zhTj3J.exeString found in binary or memory: iphlpapi.dllif_nametoindexkernel32LoadLibraryExW\/AddDllDirectorycw-outbodyheadercw_out, wrote %zu %s bytes -> %zuWrite callback asked for PAUSE when not supportedcw_out, PAUSE requested by clientclient returned ERROR on write of %zu bytesFailure writing output to destination, passed %zu returned %zd notcw-out is%spausedcw-out done--:--:--%2lld:%02lld:%02lld%3lldd %02lldh%7lldd%5lld%4lldk%2lld.%0lldM%4lldM%2lld.%0lldG%4lldG%4lldT%4lldP** Resuming transfer from byte position %lld
Source: C:\Users\user\Desktop\I281zhTj3J.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\I281zhTj3J.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\I281zhTj3J.exeSection loaded: rstrtmgr.dllJump to behavior
Source: C:\Users\user\Desktop\I281zhTj3J.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Users\user\Desktop\I281zhTj3J.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Users\user\Desktop\I281zhTj3J.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\I281zhTj3J.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\I281zhTj3J.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\Desktop\I281zhTj3J.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\I281zhTj3J.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\I281zhTj3J.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\I281zhTj3J.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\I281zhTj3J.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\I281zhTj3J.exeSection loaded: schannel.dllJump to behavior
Source: I281zhTj3J.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: I281zhTj3J.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: I281zhTj3J.exeStatic file information: File size 11443712 > 1048576
Source: I281zhTj3J.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x818000
Source: I281zhTj3J.exeStatic PE information: Raw size of .rdata is bigger than: 0x100000 < 0x257600
Source: I281zhTj3J.exeStatic PE information: More than 200 imports for KERNEL32.dll
Source: I281zhTj3J.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: I281zhTj3J.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: I281zhTj3J.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: I281zhTj3J.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: I281zhTj3J.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: I281zhTj3J.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: I281zhTj3J.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: I281zhTj3J.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: I281zhTj3J.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: I281zhTj3J.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: I281zhTj3J.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: I281zhTj3J.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: I281zhTj3J.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Users\user\Desktop\I281zhTj3J.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\I281zhTj3J.exeCode function: 0_2_00007FF729BA13B0 rdtsc 0_2_00007FF729BA13B0
Source: I281zhTj3J.exe, 00000000.00000002.2600011336.000001FD67E61000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll

Anti Debugging

barindex
Source: C:\Users\user\Desktop\I281zhTj3J.exeCode function: 0_2_00007FF729BA13B00_2_00007FF729BA13B0
Source: C:\Users\user\Desktop\I281zhTj3J.exeCode function: 0_2_00007FF729BA13500_2_00007FF729BA1350
Source: C:\Users\user\Desktop\I281zhTj3J.exeCode function: 0_2_00007FF729BA13B0 rdtsc 0_2_00007FF729BA13B0
Source: C:\Users\user\Desktop\I281zhTj3J.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\I281zhTj3J.exeCode function: 0_2_00007FF72A33BCF8 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00007FF72A33BCF8
Source: C:\Users\user\Desktop\I281zhTj3J.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
1
DLL Side-Loading
1
DLL Side-Loading
1
DLL Side-Loading
OS Credential Dumping1
System Time Discovery
Remote Services11
Archive Collected Data
12
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsRootkitLSASS Memory11
Security Software Discovery
Remote Desktop ProtocolData from Removable Media1
Non-Standard Port
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account Manager3
System Information Discovery
SMB/Windows Admin SharesData from Network Shared Drive1
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDS1
System Network Configuration Discovery
Distributed Component Object ModelInput Capture2
Application Layer Protocol
Traffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
I281zhTj3J.exe33%ReversingLabsWin64.Trojan.SpywareX
I281zhTj3J.exe33%VirustotalBrowse
I281zhTj3J.exe100%AviraTR/Spy.Agent.qyefb
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://api.ipify.orghRB60%Avira URL Cloudsafe
https://api.ipify.orgptography0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
api.ipify.org
104.26.13.205
truefalse
    high
    NameSourceMaliciousAntivirus DetectionReputation
    https://api.ipify.org/I281zhTj3J.exe, 00000000.00000002.2600011336.000001FD67E61000.00000004.00000020.00020000.00000000.sdmpfalse
      high
      https://api.ipify.org/INTkI281zhTj3J.exe, 00000000.00000002.2600011336.000001FD67E61000.00000004.00000020.00020000.00000000.sdmpfalse
        high
        https://curl.se/docs/hsts.htmlI281zhTj3J.exefalse
          high
          https://api.ipify.orgI281zhTj3J.exe, 00000000.00000002.2600011336.000001FD67E61000.00000004.00000020.00020000.00000000.sdmpfalse
            high
            https://api.ipify.orghRB6I281zhTj3J.exe, 00000000.00000002.2600011336.000001FD67E61000.00000004.00000020.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://curl.se/docs/alt-svc.htmlI281zhTj3J.exefalse
              high
              https://api.ipify.orgptographyI281zhTj3J.exe, 00000000.00000002.2600011336.000001FD67E61000.00000004.00000020.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              https://curl.se/docs/http-cookies.htmlI281zhTj3J.exefalse
                high
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                46.4.119.125
                unknownGermany
                24940HETZNER-ASDEfalse
                104.26.13.205
                api.ipify.orgUnited States
                13335CLOUDFLARENETUSfalse
                IP
                127.0.0.1
                Joe Sandbox version:42.0.0 Malachite
                Analysis ID:1640836
                Start date and time:2025-03-17 19:18:45 +01:00
                Joe Sandbox product:CloudBasic
                Overall analysis duration:0h 5m 40s
                Hypervisor based Inspection enabled:false
                Report type:full
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                Number of analysed new started processes analysed:8
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Sample name:I281zhTj3J.exe
                renamed because original name is a hash value
                Original Sample Name:666a2246258daa97ba8c2ecaec9981ebb1a3e8312eb08d9718be0be135ae4078.exe
                Detection:MAL
                Classification:mal60.evad.winEXE@1/0@1/3
                EGA Information:Failed
                HCA Information:Failed
                Cookbook Comments:
                • Found application associated with file extension: .exe
                • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, WMIADAP.exe, SIHClient.exe, backgroundTaskHost.exe, conhost.exe
                • Excluded IPs from analysis (whitelisted): 2.16.185.191, 52.149.20.212, 20.31.169.57, 150.171.28.10, 23.15.178.147
                • Excluded domains from analysis (whitelisted): www.bing.com, fs.microsoft.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, g.bing.com, arc.msn.com, fe3cr.delivery.mp.microsoft.com
                • Execution Graph export aborted for target I281zhTj3J.exe, PID 8868 because there are no executed function
                • Not all processes where analyzed, report is missing behavior information
                No simulations
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                46.4.119.125EoN1VzwYYa.exeGet hashmaliciousUnknownBrowse
                  LHU6yozPyx.exeGet hashmaliciousUnknownBrowse
                    12ss323fcw8gsd4bvd.exeGet hashmaliciousUnknownBrowse
                      ykshuami.ps1Get hashmaliciousUnknownBrowse
                        12ss323fcw8gsd4bvd.exeGet hashmaliciousUnknownBrowse
                          104.26.13.205nn1jUU3YSs.msiGet hashmaliciousUnknownBrowse
                          • api.ipify.org/
                          Software Installer.exeGet hashmaliciousUnknownBrowse
                          • api.ipify.org/
                          Catch Me If You Can (2002) 1080p.BluRay.x264.Full 744MB.exeGet hashmaliciousUnknownBrowse
                          • api.ipify.org/?format=xml
                          Catch Me If You Can (2002) 1080p.BluRay.x264.Full 744MB.exeGet hashmaliciousUnknownBrowse
                          • api.ipify.org/?format=xml
                          get_txt.ps1Get hashmaliciousLummaC StealerBrowse
                          • api.ipify.org/
                          XkgoE6Yb52.ps1Get hashmaliciousUnknownBrowse
                          • api.ipify.org/
                          R1TftmQpuQ.batGet hashmaliciousTargeted RansomwareBrowse
                          • api.ipify.org/
                          SpacesVoid Setup 1.0.0.exeGet hashmaliciousUnknownBrowse
                          • api.ipify.org/
                          Yoranis Setup.exeGet hashmaliciousUnknownBrowse
                          • api.ipify.org/
                          BiXS3FRoLe.exeGet hashmaliciousTrojanRansomBrowse
                          • api.ipify.org/
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          api.ipify.orgEoN1VzwYYa.exeGet hashmaliciousUnknownBrowse
                          • 104.26.12.205
                          LHU6yozPyx.exeGet hashmaliciousUnknownBrowse
                          • 104.26.13.205
                          SOA - HUAFENG (JAN INVOICE OVERDUE).exeGet hashmaliciousAgentTeslaBrowse
                          • 172.67.74.152
                          New requirement Orders.exeGet hashmaliciousAgentTeslaBrowse
                          • 104.26.12.205
                          ue8Q3DCbNG.exeGet hashmaliciousUnknownBrowse
                          • 172.67.74.152
                          eR2hECroRD.exeGet hashmaliciousUnknownBrowse
                          • 172.67.74.152
                          K9PwdfoVnG.exeGet hashmaliciousAgentTeslaBrowse
                          • 104.26.13.205
                          ue8Q3DCbNG.exeGet hashmaliciousUnknownBrowse
                          • 104.26.12.205
                          eR2hECroRD.exeGet hashmaliciousUnknownBrowse
                          • 172.67.74.152
                          nn1jUU3YSs.msiGet hashmaliciousUnknownBrowse
                          • 104.26.13.205
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          CLOUDFLARENETUSEoN1VzwYYa.exeGet hashmaliciousUnknownBrowse
                          • 104.26.12.205
                          Emarine System Contact Update.pdfGet hashmaliciousHTMLPhisherBrowse
                          • 104.18.95.41
                          LHU6yozPyx.exeGet hashmaliciousUnknownBrowse
                          • 104.26.13.205
                          https://analytics.zoho.com/open-view/3062125000000006086Get hashmaliciousUnknownBrowse
                          • 104.21.112.1
                          https://u17065553.ct.sendgrid.net/ls/click?upn=u001.Rw-2FXpvWBRDxNoiEvv-2B0VhMl349dE-2BIxYKCLpL5-2B-2FL8px39hmRTYxAZ-2BeMH1CR7jYvsg3f7mQR-2BtgzEdpv6rWDyoEa1Isq60WafIaat9IMqfozrbRuGiDhSD5zRfw1vSUnaPfHOkeKVWyjmgPghsIl-2FnSiz3vjd-2BgNdZNW1WWi7RlhTni8jQbV4O1UkQOa0-2F2VYGlXOPUclqMwRi50Vl1PR4j2jhVrjOnUdA6E03jJF3YxTMCgxElFH-2Bjnu2oS6ZdGJGXf9TKr37Eh3pnVym0G5ilxnSN6bJyz-2FWbi47cL6vQDH-2FLX6HDdsxLQr4OiWNyplfwZIjGldJH3Oj3k-2B0Sr92pyHOs07I3QG9CN9BFC52s0blv8XoiBzACqb7MDZTgdhgx-2Fj3fdHjRUqn0E0aUxawEH-2F-2B7SQiAWk4bi4jHEXI-3DlKA5_AMa9RrBWZfrIG11ZEW0ArF1BRI9e8rcrPZr5T9DlZ7Ba2ZAvuJPwiS8cX4aFrXjFerUDwGcfFdNk6Ly7G30W-2FpJZ3vwwQM6aCBocvejnros7-2FYckwVQH02a6C13hCOZXCH6DxRozn9HOBenC-2BdqPCIwBV1vvkSKYyJjB4wo2MVyi5b4Ko6F9xhTiwowhGgTSo1JEnvhUu4BAFpCuBdmsFw-3D-3DGet hashmaliciousHTMLPhisher, Invisible JS, Tycoon2FABrowse
                          • 104.26.0.100
                          SOA - HUAFENG (JAN INVOICE OVERDUE).exeGet hashmaliciousAgentTeslaBrowse
                          • 172.67.74.152
                          1099-NEC.pdfGet hashmaliciousRHADAMANTHYSBrowse
                          • 104.17.25.14
                          http://email.shop2.wonderpark.my/c/eJwUyk1uhSAQAODTwJIM8wPzFiy68R4KYzX1iRHTprdvuv9aiRbTDN5KzIyIokp-K7YirKlWzVWAeRFKVVflF5OpSvJ7QUABijkKKVBgihmqGWBeYGnsGMbWLww__Wx2X_P9Fd6__ijb81zD0YfDyeFk80tZKK9iUJtASjaTNA2LnWO_eqj97XDyd7EWtv45n6OfjqHeNp5jP23rjx3jn_nvgn8BAAD__y9yPWoGet hashmaliciousHTMLPhisher, Invisible JS, Tycoon2FABrowse
                          • 172.67.214.184
                          2450856955_.svgGet hashmaliciousHTMLPhisher, Invisible JS, Tycoon2FABrowse
                          • 104.17.25.14
                          1099-NEC.pdfGet hashmaliciousUnknownBrowse
                          • 172.64.41.3
                          HETZNER-ASDEEoN1VzwYYa.exeGet hashmaliciousUnknownBrowse
                          • 46.4.119.125
                          LHU6yozPyx.exeGet hashmaliciousUnknownBrowse
                          • 46.4.119.125
                          Arrival Notice.exeGet hashmaliciousFormBookBrowse
                          • 213.133.99.48
                          73ybGtnYXx.exeGet hashmaliciousWhiteSnake StealerBrowse
                          • 95.216.147.179
                          na.elfGet hashmaliciousPrometeiBrowse
                          • 88.198.246.242
                          na.elfGet hashmaliciousPrometeiBrowse
                          • 88.198.246.242
                          na.elfGet hashmaliciousPrometeiBrowse
                          • 88.198.246.242
                          na.elfGet hashmaliciousPrometeiBrowse
                          • 88.198.246.242
                          Q3N5HdmTIp.exeGet hashmaliciousUnknownBrowse
                          • 148.251.198.84
                          mKv3sKQ5Q4E7waF.exeGet hashmaliciousFormBookBrowse
                          • 144.76.229.203
                          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                          bd0bf25947d4a37404f0424edf4db9adEoN1VzwYYa.exeGet hashmaliciousUnknownBrowse
                          • 104.26.13.205
                          LHU6yozPyx.exeGet hashmaliciousUnknownBrowse
                          • 104.26.13.205
                          12ss323fcw8gsd4bvd.exeGet hashmaliciousUnknownBrowse
                          • 104.26.13.205
                          ykshuami.ps1Get hashmaliciousUnknownBrowse
                          • 104.26.13.205
                          12ss323fcw8gsd4bvd.exeGet hashmaliciousUnknownBrowse
                          • 104.26.13.205
                          1.exeGet hashmaliciousUnknownBrowse
                          • 104.26.13.205
                          valorant_ESP_aimbot.exeGet hashmaliciousUnknownBrowse
                          • 104.26.13.205
                          setup.exeGet hashmaliciousUnknownBrowse
                          • 104.26.13.205
                          Cb523jmji0.exeGet hashmaliciousUnknownBrowse
                          • 104.26.13.205
                          leFhB1aYaW.exeGet hashmaliciousDCRatBrowse
                          • 104.26.13.205
                          No context
                          No created / dropped files found
                          File type:PE32+ executable (GUI) x86-64, for MS Windows
                          Entropy (8bit):6.7175022253003815
                          TrID:
                          • Win64 Executable GUI (202006/5) 92.65%
                          • Win64 Executable (generic) (12005/4) 5.51%
                          • Generic Win/DOS Executable (2004/3) 0.92%
                          • DOS Executable Generic (2002/1) 0.92%
                          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                          File name:I281zhTj3J.exe
                          File size:11'443'712 bytes
                          MD5:2326964f20a0168ca99a2d66b19f5c0d
                          SHA1:587e1dc32c8ad0623ade4401a0ca31714f871482
                          SHA256:666a2246258daa97ba8c2ecaec9981ebb1a3e8312eb08d9718be0be135ae4078
                          SHA512:f030af53fd5ff8919ab8e557ab3f9c7701931afc531b16a3175aa13f4de88908745eb96fce796361d94e795694ab7f37f34ff4f1c44a3f3b3119b53b803231a5
                          SSDEEP:196608:W6aVvjRRITvBafmICRa8PA4ciBnWWO5QUTZ9:cVv1RAvBafmI8a8PA4ciBnWWOCIP
                          TLSH:03B6AE5AA2B800D9D4BBC078CA569617E771741D13F057EF26A09AE52F23BE07E3E740
                          File Content Preview:MZ......................@...................................(...........!..L.!This program cannot be run in DOS mode....$.......1..=u..nu..nu..n...ob..n...o...nd}.n|..nd}.oa..nd}.o{..nd}.o...n...oW..n>~.o...nu..nK..n...ot..n...of..nu..n...n.}.o...n.}.o...
                          Icon Hash:90cececece8e8eb0
                          Entrypoint:0x14079b6a0
                          Entrypoint Section:.text
                          Digitally signed:false
                          Imagebase:0x140000000
                          Subsystem:windows gui
                          Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                          DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                          Time Stamp:0x67C9843F [Thu Mar 6 11:17:19 2025 UTC]
                          TLS Callbacks:0x4079ae20, 0x1, 0x4079b9f0, 0x1
                          CLR (.Net) Version:
                          OS Version Major:6
                          OS Version Minor:0
                          File Version Major:6
                          File Version Minor:0
                          Subsystem Version Major:6
                          Subsystem Version Minor:0
                          Import Hash:67ee4ac774d9900dff72026911f6bfe3
                          Instruction
                          dec eax
                          sub esp, 28h
                          call 00007FD870BBA584h
                          dec eax
                          add esp, 28h
                          jmp 00007FD870BB9DAFh
                          int3
                          int3
                          dec eax
                          mov dword ptr [esp+10h], ebx
                          dec eax
                          mov dword ptr [esp+18h], esi
                          push ebp
                          push edi
                          inc ecx
                          push esi
                          dec eax
                          mov ebp, esp
                          dec eax
                          sub esp, 10h
                          xor eax, eax
                          xor ecx, ecx
                          cpuid
                          inc esp
                          mov eax, ecx
                          inc esp
                          mov edx, edx
                          inc ecx
                          xor edx, 49656E69h
                          inc ecx
                          xor eax, 6C65746Eh
                          inc esp
                          mov ecx, ebx
                          inc esp
                          mov esi, eax
                          xor ecx, ecx
                          mov eax, 00000001h
                          cpuid
                          inc ebp
                          or edx, eax
                          mov dword ptr [ebp-10h], eax
                          inc ecx
                          xor ecx, 756E6547h
                          mov dword ptr [ebp-0Ch], ebx
                          inc ebp
                          or edx, ecx
                          mov dword ptr [ebp-08h], ecx
                          mov edi, ecx
                          mov dword ptr [ebp-04h], edx
                          jne 00007FD870BB9F8Dh
                          dec eax
                          or dword ptr [002DF611h], FFFFFFFFh
                          and eax, 0FFF3FF0h
                          dec eax
                          mov dword ptr [002DF5F9h], 00008000h
                          cmp eax, 000106C0h
                          je 00007FD870BB9F5Ah
                          cmp eax, 00020660h
                          je 00007FD870BB9F53h
                          cmp eax, 00020670h
                          je 00007FD870BB9F4Ch
                          add eax, FFFCF9B0h
                          cmp eax, 20h
                          jnbe 00007FD870BB9F56h
                          dec eax
                          mov ecx, 00010001h
                          add dword ptr [eax], eax
                          add byte ptr [eax], al
                          dec eax
                          bt ecx, eax
                          jnc 00007FD870BB9F46h
                          inc esp
                          mov eax, dword ptr [0031C597h]
                          inc ecx
                          or eax, 01h
                          inc esp
                          mov dword ptr [0031C58Ch], eax
                          NameVirtual AddressVirtual Size Is in Section
                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IMPORT0xa6e27c0xc8.rdata
                          IMAGE_DIRECTORY_ENTRY_RESOURCE0xb090000x1e0.rsrc
                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0xaba0000x4e51c.pdata
                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                          IMAGE_DIRECTORY_ENTRY_BASERELOC0xb0a0000xef10.reloc
                          IMAGE_DIRECTORY_ENTRY_DEBUG0x9e7a100x1c.rdata
                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                          IMAGE_DIRECTORY_ENTRY_TLS0x9e7c000x28.rdata
                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x9e78d00x140.rdata
                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_IAT0x8190000xa90.rdata
                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                          .text0x10000x817f100x818000dc591b114963c766b0c44b383dd76fb7unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                          .rdata0x8190000x2574d20x25760095e996873077f37caf1f784064a82335unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          .data0xa710000x4897c0x1cc003424b2952ff45f03a64246f74889b8baFalse0.16053838315217392data4.828970088610635IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                          .pdata0xaba0000x4e51c0x4e600aa20b8735a024b8f0845659c59986249False0.4860477721291866data6.473161873607924IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          .rsrc0xb090000x1e00x2006e81aaf2edf5962e8a94a0c5626ef755False0.53515625data4.7176788329467545IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                          .reloc0xb0a0000xef100xf000f78d7c2ab5f443f1cb31eea8a54cd4d8False0.268896484375data5.460225064690622IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                          NameRVASizeTypeLanguageCountryZLIB Complexity
                          RT_MANIFEST0xb090600x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
                          DLLImport
                          ole32.dllCoInitialize, StgCreateDocfile, CoTaskMemFree, CoCreateInstance, CoUninitialize
                          USER32.dllGetUserObjectInformationW, MessageBoxW, GetProcessWindowStation
                          WS2_32.dllgethostname, __WSAFDIsSet, inet_ntop, WSAWaitForMultipleEvents, WSAResetEvent, WSAEventSelect, WSAEnumNetworkEvents, WSACreateEvent, WSACloseEvent, WSAIoctl, inet_pton, sendto, recvfrom, getpeername, socket, listen, bind, accept, send, recv, getservbyname, getservbyport, gethostbyaddr, inet_ntoa, inet_addr, gethostbyname, getsockname, freeaddrinfo, getaddrinfo, shutdown, ntohs, WSASocketW, WSARecv, select, getsockopt, connect, WSAStringToAddressW, WSASend, WSAGetLastError, WSASetLastError, WSACleanup, WSAStartup, setsockopt, ntohl, htons, htonl, ioctlsocket, closesocket
                          bcrypt.dllBCryptGenRandom
                          ADVAPI32.dllCryptDestroyKey, RegOpenKeyExW, RegGetValueW, RegEnumKeyExW, RegQueryInfoKeyW, RegSetValueExW, RegEnumValueW, SystemFunction036, CryptAcquireContextA, CryptReleaseContext, CryptGenRandom, CryptEnumProvidersA, CryptAcquireContextW, DeregisterEventSource, RegisterEventSourceW, ReportEventW, CryptGetHashParam, CryptCreateHash, CryptHashData, CryptEncrypt, CryptImportKey, RegCloseKey, CryptDestroyHash
                          KERNEL32.dllQueryDepthSList, InterlockedFlushSList, InterlockedPushEntrySList, InterlockedPopEntrySList, DuplicateHandle, LoadLibraryExW, FreeLibraryAndExitThread, GetThreadTimes, GetCurrentThread, GetStartupInfoW, IsDebuggerPresent, InitializeSListHead, IsProcessorFeaturePresent, SetUnhandledExceptionFilter, UnhandledExceptionFilter, LCMapStringEx, GetCPInfo, CompareStringEx, DecodePointer, EncodePointer, SignalObjectAndWait, CreateThread, GetThreadPriority, GetCurrentProcessorNumberEx, GetLogicalProcessorInformationEx, GetNumaHighestNodeNumber, GetThreadGroupAffinity, SetThreadGroupAffinity, GetProcessAffinityMask, ExitThread, ResumeThread, SetConsoleCtrlHandler, ExitProcess, GetDriveTypeW, SystemTimeToTzSpecificLocalTime, FileTimeToSystemTime, SetStdHandle, GetLastError, FormatMessageA, FormatMessageW, MultiByteToWideChar, WideCharToMultiByte, LocalFree, CloseHandle, SetLastError, CreateIoCompletionPort, GetQueuedCompletionStatus, PostQueuedCompletionStatus, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, SetEvent, WaitForSingleObject, SleepEx, CreateEventW, SetWaitableTimer, WaitForMultipleObjects, QueueUserAPC, TerminateThread, InitializeCriticalSectionEx, CreateWaitableTimerW, LoadLibraryA, InitializeCriticalSection, Sleep, GetSystemInfo, VirtualFree, GetEnvironmentVariableW, GetCurrentDirectoryW, CreateFileW, DeleteFileW, FlushFileBuffers, GetFileAttributesW, GetFileInformationByHandle, GetFileTime, GetFullPathNameW, RemoveDirectoryW, SetEndOfFile, SetFileAttributesW, SetFilePointerEx, DeviceIoControl, GetWindowsDirectoryW, GetModuleHandleW, GetProcAddress, GetConsoleOutputCP, AreFileApisANSI, DeleteFileA, GetTempPathA, GetTempFileNameA, FlsAlloc, FlsGetValue, FlsSetValue, FlsFree, GetCurrentProcess, GetExitCodeProcess, GetNativeSystemInfo, GetModuleFileNameA, GetModuleFileNameW, GetModuleHandleExA, CreateFileA, GetFileAttributesExA, LockFileEx, UnlockFileEx, FreeLibrary, LoadLibraryW, FindClose, ResetEvent, CreateEventA, GetTickCount, QueryPerformanceCounter, MapViewOfFile, CreateFileMappingW, GetSystemTime, GetSystemTimeAsFileTime, SystemTimeToFileTime, GetProcessHeap, GetCurrentProcessId, GetFileSize, UnlockFile, HeapDestroy, HeapCompact, HeapAlloc, HeapReAlloc, WaitForSingleObjectEx, FlushViewOfFile, OutputDebugStringW, GetFileAttributesExW, GetFileAttributesA, GetDiskFreeSpaceA, HeapSize, HeapValidate, CloseThreadpoolWait, CreateMutexW, GetTempPathW, GetFullPathNameA, SetFilePointer, LockFile, OutputDebugStringA, GetDiskFreeSpaceW, WriteFile, HeapFree, HeapCreate, ReadFile, RaiseException, TryEnterCriticalSection, GetCurrentThreadId, RtlVirtualUnwind, GetStdHandle, GetFileType, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetModuleHandleExW, GetACP, ReleaseSemaphore, GetExitCodeThread, CreateSemaphoreA, GetSystemDirectoryA, TerminateProcess, GetConsoleMode, SetConsoleMode, ReadConsoleA, ReadConsoleW, FindFirstFileW, FindNextFileW, InitializeConditionVariable, WakeConditionVariable, SleepConditionVariableCS, SetThreadPriority, GetFileSizeEx, CreateFileMappingA, ReleaseSRWLockExclusive, AcquireSRWLockExclusive, QueryPerformanceFrequency, GetSystemDirectoryW, GetEnvironmentVariableA, VerSetConditionMask, GetModuleHandleA, VerifyVersionInfoW, PeekNamedPipe, SetThreadpoolWait, CreateThreadpoolWait, CloseThreadpoolTimer, WaitForThreadpoolTimerCallbacks, SetThreadpoolTimer, CreateThreadpoolTimer, FreeLibraryWhenCallbackReturns, FlushProcessWriteBuffers, CreateSemaphoreExW, CreateEventExW, SetEnvironmentVariableW, GetDateFormatW, GetTimeFormatW, CompareStringW, LCMapStringW, GetLocaleInfoW, IsValidLocale, GetUserDefaultLCID, EnumSystemLocalesW, GetTimeZoneInformation, IsValidCodePage, WriteConsoleW, GetOEMCP, GetCommandLineA, GetCommandLineW, GetEnvironmentStringsW, MoveFileExW, UnmapViewOfFile, SwitchToThread, ReleaseSRWLockShared, AcquireSRWLockShared, TryAcquireSRWLockExclusive, SleepConditionVariableSRW, GetTickCount64, GetStringTypeW, WakeAllConditionVariable, GetLocaleInfoEx, FindFirstFileExW, FreeEnvironmentStringsW
                          OLEAUT32.dllOleCreatePropertyFrame, SysAllocStringByteLen, SysStringByteLen, VariantClear, VariantInit, SysFreeString, SysAllocString
                          ntdll.dllRtlPcToFileHeader, RtlCaptureContext, RtlLookupFunctionEntry, RtlUnwindEx, RtlUnwind
                          CRYPT32.dllCertGetCertificateChain, CertCloseStore, CertFindCertificateInStore, CertFreeCertificateContext, CertOpenSystemStoreW, CertOpenStore, CertEnumCertificatesInStore, CryptStringToBinaryW, PFXImportCertStore, CryptDecodeObjectEx, CertAddCertificateContextToStore, CertFindExtension, CertGetNameStringW, CryptQueryObject, CertCreateCertificateChainEngine, CertFreeCertificateChainEngine, CertFreeCertificateChain
                          Language of compilation systemCountry where language is spokenMap
                          EnglishUnited States
                          TimestampSource PortDest PortSource IPDest IP
                          Mar 17, 2025 19:19:43.137065887 CET497217712192.168.2.546.4.119.125
                          Mar 17, 2025 19:19:43.141906023 CET77124972146.4.119.125192.168.2.5
                          Mar 17, 2025 19:19:43.141984940 CET497217712192.168.2.546.4.119.125
                          Mar 17, 2025 19:19:43.167259932 CET49724443192.168.2.5104.26.13.205
                          Mar 17, 2025 19:19:43.167284966 CET44349724104.26.13.205192.168.2.5
                          Mar 17, 2025 19:19:43.167398930 CET49724443192.168.2.5104.26.13.205
                          Mar 17, 2025 19:19:43.181200027 CET49724443192.168.2.5104.26.13.205
                          Mar 17, 2025 19:19:43.181211948 CET44349724104.26.13.205192.168.2.5
                          Mar 17, 2025 19:19:43.648591995 CET44349724104.26.13.205192.168.2.5
                          Mar 17, 2025 19:19:43.648664951 CET49724443192.168.2.5104.26.13.205
                          Mar 17, 2025 19:19:43.658596992 CET49724443192.168.2.5104.26.13.205
                          Mar 17, 2025 19:19:43.658698082 CET44349724104.26.13.205192.168.2.5
                          Mar 17, 2025 19:19:43.658761978 CET49724443192.168.2.5104.26.13.205
                          Mar 17, 2025 19:19:43.658979893 CET497217712192.168.2.546.4.119.125
                          Mar 17, 2025 19:19:43.663604021 CET77124972146.4.119.125192.168.2.5
                          Mar 17, 2025 19:19:43.860991001 CET77124972146.4.119.125192.168.2.5
                          Mar 17, 2025 19:19:43.906886101 CET497217712192.168.2.546.4.119.125
                          TimestampSource PortDest PortSource IPDest IP
                          Mar 17, 2025 19:19:43.153879881 CET5734953192.168.2.51.1.1.1
                          Mar 17, 2025 19:19:43.161449909 CET53573491.1.1.1192.168.2.5
                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                          Mar 17, 2025 19:19:43.153879881 CET192.168.2.51.1.1.10xb53fStandard query (0)api.ipify.orgA (IP address)IN (0x0001)false
                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                          Mar 17, 2025 19:19:43.161449909 CET1.1.1.1192.168.2.50xb53fNo error (0)api.ipify.org104.26.13.205A (IP address)IN (0x0001)false
                          Mar 17, 2025 19:19:43.161449909 CET1.1.1.1192.168.2.50xb53fNo error (0)api.ipify.org104.26.12.205A (IP address)IN (0x0001)false
                          Mar 17, 2025 19:19:43.161449909 CET1.1.1.1192.168.2.50xb53fNo error (0)api.ipify.org172.67.74.152A (IP address)IN (0x0001)false

                          Click to jump to process

                          Click to jump to process

                          Click to dive into process behavior distribution

                          Target ID:0
                          Start time:14:19:42
                          Start date:17/03/2025
                          Path:C:\Users\user\Desktop\I281zhTj3J.exe
                          Wow64 process (32bit):false
                          Commandline:"C:\Users\user\Desktop\I281zhTj3J.exe"
                          Imagebase:0x7ff729ba0000
                          File size:11'443'712 bytes
                          MD5 hash:2326964F20A0168CA99A2D66B19F5C0D
                          Has elevated privileges:true
                          Has administrator privileges:true
                          Programmed in:C, C++ or other language
                          Reputation:low
                          Has exited:false

                          Reset < >
                            APIs
                            Memory Dump Source
                            • Source File: 00000000.00000002.2600096065.00007FF729BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729BA0000, based on PE: true
                            • Associated: 00000000.00000002.2600082430.00007FF729BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2600516665.00007FF72A3B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2600516665.00007FF72A4F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2600516665.00007FF72A508000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2600516665.00007FF72A53F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2600696151.00007FF72A611000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2600710264.00007FF72A617000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2600722853.00007FF72A619000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2600735005.00007FF72A61C000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2600750405.00007FF72A62D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2600750405.00007FF72A633000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2600750405.00007FF72A650000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2600750405.00007FF72A652000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2600750405.00007FF72A656000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2600819493.00007FF72A65A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff729ba0000_I281zhTj3J.jbxd
                            Similarity
                            • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                            • String ID:
                            • API String ID: 2933794660-0
                            • Opcode ID: aac77354105e21aae839e4b90af2594968721e9107478b13b6aafcde580ed09f
                            • Instruction ID: 8250fe3ee2e2d73136cc65ed3032407dfe5883832ad2e98c513533ea8add4be1
                            • Opcode Fuzzy Hash: aac77354105e21aae839e4b90af2594968721e9107478b13b6aafcde580ed09f
                            • Instruction Fuzzy Hash: 41115E22B14F018AFB00EF60EC852B873A4FB19B68F841E35DA2D867A4DF38D1548790
                            Memory Dump Source
                            • Source File: 00000000.00000002.2600096065.00007FF729BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729BA0000, based on PE: true
                            • Associated: 00000000.00000002.2600082430.00007FF729BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2600516665.00007FF72A3B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2600516665.00007FF72A4F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2600516665.00007FF72A508000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2600516665.00007FF72A53F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2600696151.00007FF72A611000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2600710264.00007FF72A617000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2600722853.00007FF72A619000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2600735005.00007FF72A61C000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2600750405.00007FF72A62D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2600750405.00007FF72A633000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2600750405.00007FF72A650000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2600750405.00007FF72A652000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2600750405.00007FF72A656000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2600819493.00007FF72A65A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff729ba0000_I281zhTj3J.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 64c4d506d6f5baa5ddf45db93394aa0249ac63765b51e1c6f4cbb588a991aae8
                            • Instruction ID: d17febcdf7b7cbecda1e91e108fc1d443a0c10f62d6264c34a20cc5c380bdfdb
                            • Opcode Fuzzy Hash: 64c4d506d6f5baa5ddf45db93394aa0249ac63765b51e1c6f4cbb588a991aae8
                            • Instruction Fuzzy Hash: 1F3278B6F90A6596DB048F1AE90178D7B64F319BC9F898526DF8C83B54EB38E471D300
                            Memory Dump Source
                            • Source File: 00000000.00000002.2600096065.00007FF729BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729BA0000, based on PE: true
                            • Associated: 00000000.00000002.2600082430.00007FF729BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2600516665.00007FF72A3B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2600516665.00007FF72A4F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2600516665.00007FF72A508000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2600516665.00007FF72A53F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2600696151.00007FF72A611000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2600710264.00007FF72A617000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2600722853.00007FF72A619000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2600735005.00007FF72A61C000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2600750405.00007FF72A62D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2600750405.00007FF72A633000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2600750405.00007FF72A650000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2600750405.00007FF72A652000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2600750405.00007FF72A656000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2600819493.00007FF72A65A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff729ba0000_I281zhTj3J.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: e4d46452cfb9d4682878bd9a2a63c6e33e84910d21aabfe0d2a8f704dc70ab25
                            • Instruction ID: 150c2e1dcf999f506b9e7d71bfefdd9d55e207aab32a09bab9a09ae8ba85d6df
                            • Opcode Fuzzy Hash: e4d46452cfb9d4682878bd9a2a63c6e33e84910d21aabfe0d2a8f704dc70ab25
                            • Instruction Fuzzy Hash: C722BCB7A88290ABD7158F2582A05AE3FB1F7177607888312DBD543786CB3DB536DB10
                            Memory Dump Source
                            • Source File: 00000000.00000002.2600096065.00007FF729BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729BA0000, based on PE: true
                            • Associated: 00000000.00000002.2600082430.00007FF729BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2600516665.00007FF72A3B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2600516665.00007FF72A4F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2600516665.00007FF72A508000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2600516665.00007FF72A53F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2600696151.00007FF72A611000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2600710264.00007FF72A617000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2600722853.00007FF72A619000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2600735005.00007FF72A61C000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2600750405.00007FF72A62D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2600750405.00007FF72A633000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2600750405.00007FF72A650000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2600750405.00007FF72A652000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2600750405.00007FF72A656000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2600819493.00007FF72A65A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff729ba0000_I281zhTj3J.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: da4e0bef70938cbff3ddc027717a94aa642f7c83641c9a7372ad5beb682580e2
                            • Instruction ID: 1fc75bd007107b4a3b7b28d668c3097e02b267ccbd186f9a3376f660e1c76bc6
                            • Opcode Fuzzy Hash: da4e0bef70938cbff3ddc027717a94aa642f7c83641c9a7372ad5beb682580e2
                            • Instruction Fuzzy Hash: 93F0B4313243A005C796CE3A6908F5D6EE59795BC8F26D034E94CC3F54E92EC5018F00
                            Memory Dump Source
                            • Source File: 00000000.00000002.2600096065.00007FF729BA1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF729BA0000, based on PE: true
                            • Associated: 00000000.00000002.2600082430.00007FF729BA0000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2600516665.00007FF72A3B9000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2600516665.00007FF72A4F8000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2600516665.00007FF72A508000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2600516665.00007FF72A53F000.00000002.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2600696151.00007FF72A611000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2600710264.00007FF72A617000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2600722853.00007FF72A619000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2600735005.00007FF72A61C000.00000008.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2600750405.00007FF72A62D000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2600750405.00007FF72A633000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2600750405.00007FF72A650000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2600750405.00007FF72A652000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2600750405.00007FF72A656000.00000004.00000001.01000000.00000003.sdmpDownload File
                            • Associated: 00000000.00000002.2600819493.00007FF72A65A000.00000002.00000001.01000000.00000003.sdmpDownload File
                            Joe Sandbox IDA Plugin
                            • Snapshot File: hcaresult_0_2_7ff729ba0000_I281zhTj3J.jbxd
                            Similarity
                            • API ID:
                            • String ID:
                            • API String ID:
                            • Opcode ID: 08034d843012e041d9826064999ec11cfe67fa1a964a6beaae8090bac19fbb3b
                            • Instruction ID: ba9ac46036056d1ac3e38fd99a0fed0d20e8c4d7af772e3b44dc523809bfc39e
                            • Opcode Fuzzy Hash: 08034d843012e041d9826064999ec11cfe67fa1a964a6beaae8090bac19fbb3b
                            • Instruction Fuzzy Hash: 28E01A727193A845C796CE372A08EADAAE4A759BC5B42D030D90DC3A55ED2E86018F40