Loading ...

Play interactive tourEdit tour

Windows Analysis Report oYIQVnvsyG.exe

Overview

General Information

Sample Name:oYIQVnvsyG.exe
Analysis ID:483803
MD5:43c573966b2b1d5d87ecd57eb2a81c33
SHA1:a08966162e39fa04e39d93b1d121f1bef6b3ec86
SHA256:d062fa8446a39adb2182c2a506e96801792855bbb0da2a9f278134630a5e5de2
Infos:

Most interesting Screenshot:

Detection

Score:2
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Uses 32bit PE files
Sample file is different than original file name gathered from version info
PE file contains strange resources
May sleep (evasive loops) to hinder dynamic analysis
Contains long sleeps (>= 3 min)

Classification

Process Tree

  • System is w10x64
  • oYIQVnvsyG.exe (PID: 6364 cmdline: 'C:\Users\user\Desktop\oYIQVnvsyG.exe' MD5: 43C573966B2B1D5D87ECD57EB2A81C33)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

No Sigma rule has matched

Jbx Signature Overview

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: oYIQVnvsyG.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
Source: C:\Users\user\Desktop\oYIQVnvsyG.exeFile opened: C:\Windows\WinSxS\amd64_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_88df21dd2faf7c49\MSVCR80.dllJump to behavior
Source: oYIQVnvsyG.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
Source: oYIQVnvsyG.exe, 00000000.00000002.239893622.00000000014B2000.00000004.00000020.sdmpString found in binary or memory: http://go.microsz.R
Source: oYIQVnvsyG.exeStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE
Source: oYIQVnvsyG.exe, 00000000.00000000.229505995.0000000000F6A000.00000002.00020000.sdmpBinary or memory string: OriginalFilenamePWCRLauncher.exe4 vs oYIQVnvsyG.exe
Source: oYIQVnvsyG.exe, 00000000.00000002.239887172.00000000014A9000.00000004.00000020.sdmpBinary or memory string: OriginalFilenamemscorwks.dllT vs oYIQVnvsyG.exe
Source: oYIQVnvsyG.exeBinary or memory string: OriginalFilenamePWCRLauncher.exe4 vs oYIQVnvsyG.exe
Source: oYIQVnvsyG.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: oYIQVnvsyG.exeStatic PE information: Resource name: RT_ICON type: GLS_BINARY_LSB_FIRST
Source: C:\Users\user\Desktop\oYIQVnvsyG.exeFile read: C:\Users\user\Desktop\oYIQVnvsyG.exeJump to behavior
Source: oYIQVnvsyG.exeStatic PE information: Section: .text IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\oYIQVnvsyG.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Users\user\Desktop\oYIQVnvsyG.exeSection loaded: C:\Windows\assembly\NativeImages_v2.0.50727_64\mscorlib\077cf2bd55145d691314f0889d7a1997\mscorlib.ni.dllJump to behavior
Source: C:\Users\user\Desktop\oYIQVnvsyG.exeSection loaded: C:\Windows\assembly\GAC_64\mscorlib\2.0.0.0__b77a5c561934e089\sorttbls.nlpJump to behavior
Source: C:\Users\user\Desktop\oYIQVnvsyG.exeSection loaded: C:\Windows\assembly\GAC_64\mscorlib\2.0.0.0__b77a5c561934e089\sortkey.nlpJump to behavior
Source: classification engineClassification label: clean2.winEXE@1/1@0/0
Source: C:\Users\user\Desktop\oYIQVnvsyG.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32Jump to behavior
Source: C:\Users\user\Desktop\oYIQVnvsyG.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v2.0\UsageLogs\oYIQVnvsyG.exe.logJump to behavior
Source: oYIQVnvsyG.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: C:\Users\user\Desktop\oYIQVnvsyG.exeFile opened: C:\Windows\WinSxS\amd64_microsoft.vc80.crt_1fc8b3b9a1e18e3b_8.0.50727.9445_none_88df21dd2faf7c49\MSVCR80.dllJump to behavior
Source: oYIQVnvsyG.exeStatic PE information: NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
Source: C:\Users\user\Desktop\oYIQVnvsyG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oYIQVnvsyG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oYIQVnvsyG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oYIQVnvsyG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oYIQVnvsyG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oYIQVnvsyG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oYIQVnvsyG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oYIQVnvsyG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oYIQVnvsyG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oYIQVnvsyG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oYIQVnvsyG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oYIQVnvsyG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oYIQVnvsyG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oYIQVnvsyG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oYIQVnvsyG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oYIQVnvsyG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oYIQVnvsyG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oYIQVnvsyG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oYIQVnvsyG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oYIQVnvsyG.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\oYIQVnvsyG.exe TID: 6396Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\oYIQVnvsyG.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\oYIQVnvsyG.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\oYIQVnvsyG.exeMemory allocated: page read and write | page guardJump to behavior

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsWindows Management InstrumentationPath InterceptionPath InterceptionMasquerading1OS Credential DumpingVirtualization/Sandbox Evasion21Remote ServicesData from Local SystemExfiltration Over Other Network MediumData ObfuscationEavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsDisable or Modify Tools1LSASS MemorySystem Information Discovery1Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Virtualization/Sandbox Evasion21Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data

Behavior Graph

Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

Screenshots

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand

Antivirus, Machine Learning and Genetic Malware Detection

Initial Sample

SourceDetectionScannerLabelLink
oYIQVnvsyG.exe2%VirustotalBrowse
oYIQVnvsyG.exe0%ReversingLabs

Dropped Files

No Antivirus matches

Unpacked PE Files

No Antivirus matches

Domains

No Antivirus matches

URLs

SourceDetectionScannerLabelLink
http://go.microsz.R0%Avira URL Cloudsafe

Domains and IPs

Contacted Domains

No contacted domains info

URLs from Memory and Binaries

NameSourceMaliciousAntivirus DetectionReputation
http://go.microsz.RoYIQVnvsyG.exe, 00000000.00000002.239893622.00000000014B2000.00000004.00000020.sdmpfalse
  • Avira URL Cloud: safe
unknown

Contacted IPs

No contacted IP infos

General Information

Joe Sandbox Version:33.0.0 White Diamond
Analysis ID:483803
Start date:15.09.2021
Start time:14:05:02
Joe Sandbox Product:CloudBasic
Overall analysis duration:0h 5m 12s
Hypervisor based Inspection enabled:false
Report type:full
Sample file name:oYIQVnvsyG.exe
Cookbook file name:default.jbs
Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
Number of analysed new started processes analysed:28
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • HDC enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Detection:CLEAN
Classification:clean2.winEXE@1/1@0/0
EGA Information:Failed
HDC Information:
  • Successful, ratio: 27.3% (good quality ratio 27.3%)
  • Quality average: 86.3%
  • Quality standard deviation: 13.5%
HCA Information:
  • Successful, ratio: 83%
  • Number of executed functions: 3
  • Number of non-executed functions: 0
Cookbook Comments:
  • Adjust boot time
  • Enable AMSI
  • Found application associated with file extension: .exe
Warnings:
Show All
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, BackgroundTransferHost.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, UsoClient.exe, wuapihost.exe
  • Execution Graph export aborted for target oYIQVnvsyG.exe, PID 6364 because it is empty
  • Not all processes where analyzed, report is missing behavior information

Simulations

Behavior and APIs

No simulations

Joe Sandbox View / Context

IPs

No context

Domains

No context

ASN

No context

JA3 Fingerprints

No context

Dropped Files

No context

Created / dropped Files

C:\Users\user\AppData\Local\Microsoft\CLR_v2.0\UsageLogs\oYIQVnvsyG.exe.log
Process:C:\Users\user\Desktop\oYIQVnvsyG.exe
File Type:ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):388
Entropy (8bit):5.23028103270434
Encrypted:false
SSDEEP:6:Q3LadLCDDXTg+Q+OLC/7OHHHYyVLS71OiOLCMM3RUVb52RsM3RLWJiv:Q3LaJcP0kaHYGLi1B01kKVdisk7v
MD5:1BD2C34B7EABD73D2C0CDDE3CEE7FDCF
SHA1:BF6B01758B557773ED227763B3BEC9DA78470DCE
SHA-256:EC866DF47E958210640D673E172656EE8F000C284FD7EAF60A309F7B4759FCD0
SHA-512:7A00F54FDBC9E30F53CA8032A1E84599AC943B544E941569763E35BE0BEAC863AEE7E260158B512C2DCF080414173B66E948DD244B579E5EAB0AA14315260945
Malicious:false
Reputation:moderate, very likely benign file
Preview: 1,"fusion","GAC",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_64\System\1201f26cb986c93f55044bb4fa22b294\System.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_64\System.Drawing\b12bbcf27f41d96fe44360ae0b566f9b\System.Drawing.ni.dll",0..3,"C:\Windows\assembly\NativeImages_v2.0.50727_64\System.Windows.Forms\454c09ea87bde1d5f545d60232083b79\System.Windows.Forms.ni.dll",0..

Static File Info

General

File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
Entropy (8bit):2.7837838503558805
TrID:
  • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
  • Win32 Executable (generic) a (10002005/4) 49.78%
  • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
  • Win16/32 Executable Delphi generic (2074/23) 0.01%
  • Generic Win/DOS Executable (2004/3) 0.01%
File name:oYIQVnvsyG.exe
File size:77824
MD5:43c573966b2b1d5d87ecd57eb2a81c33
SHA1:a08966162e39fa04e39d93b1d121f1bef6b3ec86
SHA256:d062fa8446a39adb2182c2a506e96801792855bbb0da2a9f278134630a5e5de2
SHA512:89c260ac4a42a9b706ed71b6a617d54980a09db5124160149126f3ebdd9d6165903828bf0e253acab04454ead0f58357c2893edb8174b0d11c5f9487d1af29ab
SSDEEP:384:rvcXSvb3A9/96uiJII+Fv2chVzlzlzlzZehyik9WUZcXVJII+FXwQ5:rvDiF2ac09DZcXViJH
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....5.\.................p............... ........... .......................`............@................................

File Icon

Icon Hash:daae97d9c8f6c6c6

Static PE Info

General

Entrypoint:0x1100880e
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x11000000
Subsystem:windows gui
Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE
DLL Characteristics:NO_SEH, TERMINAL_SERVER_AWARE, DYNAMIC_BASE, NX_COMPAT
Time Stamp:0x5C12350C [Thu Dec 13 10:31:40 2018 UTC]
TLS Callbacks:
CLR (.Net) Version:v2.0.50727
OS Version Major:4
OS Version Minor:0
File Version Major:4
File Version Minor:0
Subsystem Version Major:4
Subsystem Version Minor:0
Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744

Entrypoint Preview

Instruction
jmp dword ptr [11002000h]
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al

Data Directories

NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x87bc0x4f.text
IMAGE_DIRECTORY_ENTRY_RESOURCE0xa0000x9528.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x140000xc.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0

Sections

NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x20000x68140x7000False0.231689453125data4.02819798601IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
.rsrc0xa0000x95280xa000False0.0977783203125data2.04158250876IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0x140000xc0x1000False0.008544921875data0.0131269437212IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ

Resources

NameRVASizeTypeLanguageCountry
RT_ICON0xa5680x3228dBase IV DBT of \200.DBF, blocks size 0, block length 12800, next free block index 40, next free block 4294967295, next used block 4294967295
RT_ICON0xd7900x2e8data
RT_ICON0xda780x128GLS_BINARY_LSB_FIRST
RT_ICON0xdba00x468GLS_BINARY_LSB_FIRST
RT_ICON0xe0080x10a8data
RT_ICON0xf0b00x4228dBase IV DBT of \200.DBF, blocks size 0, block length 16896, next free block index 40, next free block 4294967295, next used block 4294967295
RT_GROUP_ICON0x132d80x5adata
RT_VERSION0xa2200x344data
RT_MANIFEST0x133380x1eaXML 1.0 document, UTF-8 Unicode (with BOM) text, with CRLF line terminators

Imports

DLLImport
mscoree.dll_CorExeMain

Version Infos

DescriptionData
Translation0x0000 0x04b0
LegalCopyrightCopyright Honeywell 2017
Assembly Version4.5.0.11810
InternalNamePWCRLauncher.exe
FileVersion4.5.0.11810
CompanyNameHoneywell
ProductNameProWatch
ProductVersion4.5.0.11810
FileDescriptionComplaince Reports Launcher
OriginalFilenamePWCRLauncher.exe

Network Behavior

No network behavior found

Code Manipulations

Statistics

CPU Usage

Click to jump to process

Memory Usage

Click to jump to process

High Level Behavior Distribution

Click to dive into process behavior distribution

System Behavior

General

Start time:14:06:02
Start date:15/09/2021
Path:C:\Users\user\Desktop\oYIQVnvsyG.exe
Wow64 process (32bit):false
Commandline:'C:\Users\user\Desktop\oYIQVnvsyG.exe'
Imagebase:0xf60000
File size:77824 bytes
MD5 hash:43C573966B2B1D5D87ECD57EB2A81C33
Has elevated privileges:true
Has administrator privileges:true
Programmed in:.Net C# or VB.NET
Reputation:low

Disassembly

Code Analysis

Reset < >

    Executed Functions

    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.240977023.00007FFAEEE70000.00000040.00000001.sdmp, Offset: 00007FFAEEE70000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ffaeee70000_oYIQVnvsyG.jbxd
    Similarity
    • API ID:
    • String ID: z#ZM
    • API String ID: 0-1475669934
    • Opcode ID: 96bcd3288067113fec105c3de4cb5ed48fde70cbfc1caaa535391fe68b5bfbc6
    • Instruction ID: fa4d9335739d6fa3b0e0ce38f2ec0a52260f315e7bf8da28cad363f50f692db1
    • Opcode Fuzzy Hash: 96bcd3288067113fec105c3de4cb5ed48fde70cbfc1caaa535391fe68b5bfbc6
    • Instruction Fuzzy Hash: 1261C161B0DB8D4FE786AB3C54957647BE1DF5B250B9A40FAD48DCB2D3DC58AC088322
    Uniqueness

    Uniqueness Score: -1.00%

    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.240977023.00007FFAEEE70000.00000040.00000001.sdmp, Offset: 00007FFAEEE70000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ffaeee70000_oYIQVnvsyG.jbxd
    Similarity
    • API ID:
    • String ID: _
    • API String ID: 0-701932520
    • Opcode ID: 49aa483f6860ca0bd80008f893aa13875499cb309c594a717ec5faa71ece5160
    • Instruction ID: 50416f03714c790cbcbf1a7ab8a7f2ee2d61331ecda18bade1730daa3c12e659
    • Opcode Fuzzy Hash: 49aa483f6860ca0bd80008f893aa13875499cb309c594a717ec5faa71ece5160
    • Instruction Fuzzy Hash: 9121C362B0DBCE5FE787972898A02787FA0EF57340B4600F7E48CCB2D3D95899048312
    Uniqueness

    Uniqueness Score: -1.00%

    Memory Dump Source
    • Source File: 00000000.00000002.240977023.00007FFAEEE70000.00000040.00000001.sdmp, Offset: 00007FFAEEE70000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ffaeee70000_oYIQVnvsyG.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: f095cec3c289c13664ecd00f0e41fd4c473092c8f267c3bf39779c8d99bc4e3d
    • Instruction ID: e882c74fe6b7b57ced0f84fa2dcd1719b97abc9e4cc9d8a59672be8145833012
    • Opcode Fuzzy Hash: f095cec3c289c13664ecd00f0e41fd4c473092c8f267c3bf39779c8d99bc4e3d
    • Instruction Fuzzy Hash: EBF08270608B4C8FCF44FF2898846A83BE5FB5D315B0542E7D84DCB293DA35D9588711
    Uniqueness

    Uniqueness Score: -1.00%

    Non-executed Functions