Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
je9t0bDEVN.exe

Overview

General Information

Sample name:je9t0bDEVN.exe
(renamed file extension from none to exe, renamed because original name is a hash value)
Original sample name:4dc3d7a6e1bef7cabd6e5e6681f3640628887a6beea0e096416baff784df7a3b
Analysis ID:1436381
MD5:0df8abbbbc63aa2e171466a6cf93b172
SHA1:fb8e1da97308f5466ce438222a0ea1c28efaaf01
SHA256:4dc3d7a6e1bef7cabd6e5e6681f3640628887a6beea0e096416baff784df7a3b
Infos:

Detection

LummaC
Score:96
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Found malware configuration
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
Yara detected LummaC Stealer
C2 URLs / IPs found in malware configuration
LummaC encrypted strings found
Machine Learning detection for sample
Sample uses string decryption to hide its real strings
AV process strings found (often used to terminate AV products)
Contains functionality to read the PEB
Detected potential crypto function
Entry point lies outside standard sections
Found potential string decryption / allocating functions
One or more processes crash
PE file contains an invalid checksum
PE file contains sections with non-standard names
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • je9t0bDEVN.exe (PID: 5992 cmdline: "C:\Users\user\Desktop\je9t0bDEVN.exe" MD5: 0DF8ABBBBC63AA2E171466A6CF93B172)
    • WerFault.exe (PID: 3808 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 5992 -s 356 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Lumma Stealer, LummaC2 StealerLumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
{"C2 url": ["barbecueappledos.pw", "killredls.pw", "keewoolas.pw", "moskhoods.pw", "dayzilons.pw", "revivalsecularas.pw", "steycools.pw", "bloockflad.pw", "bookgames.pw"], "Build id": "KjGtqi--Zinfandel"}
SourceRuleDescriptionAuthorStrings
decrypted.binstrJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
    No Sigma rule has matched
    No Snort rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: revivalsecularas.pwAvira URL Cloud: Label: malware
    Source: bloockflad.pwAvira URL Cloud: Label: malware
    Source: barbecueappledos.pwAvira URL Cloud: Label: malware
    Source: keewoolas.pwAvira URL Cloud: Label: malware
    Source: killredls.pwAvira URL Cloud: Label: malware
    Source: steycools.pwAvira URL Cloud: Label: malware
    Source: bookgames.pwAvira URL Cloud: Label: malware
    Source: moskhoods.pwAvira URL Cloud: Label: malware
    Source: dayzilons.pwAvira URL Cloud: Label: malware
    Source: je9t0bDEVN.exeMalware Configuration Extractor: LummaC {"C2 url": ["barbecueappledos.pw", "killredls.pw", "keewoolas.pw", "moskhoods.pw", "dayzilons.pw", "revivalsecularas.pw", "steycools.pw", "bloockflad.pw", "bookgames.pw"], "Build id": "KjGtqi--Zinfandel"}
    Source: bookgames.pwVirustotal: Detection: 15%Perma Link
    Source: bloockflad.pwVirustotal: Detection: 14%Perma Link
    Source: barbecueappledos.pwVirustotal: Detection: 11%Perma Link
    Source: revivalsecularas.pwVirustotal: Detection: 15%Perma Link
    Source: killredls.pwVirustotal: Detection: 15%Perma Link
    Source: keewoolas.pwVirustotal: Detection: 15%Perma Link
    Source: moskhoods.pwVirustotal: Detection: 16%Perma Link
    Source: steycools.pwVirustotal: Detection: 14%Perma Link
    Source: dayzilons.pwVirustotal: Detection: 12%Perma Link
    Source: je9t0bDEVN.exeReversingLabs: Detection: 70%
    Source: je9t0bDEVN.exeVirustotal: Detection: 48%Perma Link
    Source: je9t0bDEVN.exeJoe Sandbox ML: detected
    Source: je9t0bDEVN.exeString decryptor: barbecueappledos.pw
    Source: je9t0bDEVN.exeString decryptor: killredls.pw
    Source: je9t0bDEVN.exeString decryptor: keewoolas.pw
    Source: je9t0bDEVN.exeString decryptor: moskhoods.pw
    Source: je9t0bDEVN.exeString decryptor: dayzilons.pw
    Source: je9t0bDEVN.exeString decryptor: revivalsecularas.pw
    Source: je9t0bDEVN.exeString decryptor: steycools.pw
    Source: je9t0bDEVN.exeString decryptor: bloockflad.pw
    Source: je9t0bDEVN.exeString decryptor: bookgames.pw
    Source: je9t0bDEVN.exeString decryptor: lid=%s&j=%s&ver=4.0
    Source: je9t0bDEVN.exeString decryptor: TeslaBrowser/5.5
    Source: je9t0bDEVN.exeString decryptor: - Screen Resoluton:
    Source: je9t0bDEVN.exeString decryptor: - Physical Installed Memory:
    Source: je9t0bDEVN.exeString decryptor: Workgroup: -
    Source: je9t0bDEVN.exeString decryptor: KjGtqi--Zinfandel
    Source: je9t0bDEVN.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE

    Networking

    barindex
    Source: Malware configuration extractorURLs: barbecueappledos.pw
    Source: Malware configuration extractorURLs: killredls.pw
    Source: Malware configuration extractorURLs: keewoolas.pw
    Source: Malware configuration extractorURLs: moskhoods.pw
    Source: Malware configuration extractorURLs: dayzilons.pw
    Source: Malware configuration extractorURLs: revivalsecularas.pw
    Source: Malware configuration extractorURLs: steycools.pw
    Source: Malware configuration extractorURLs: bloockflad.pw
    Source: Malware configuration extractorURLs: bookgames.pw
    Source: Amcache.hve.4.drString found in binary or memory: http://upx.sf.net
    Source: C:\Users\user\Desktop\je9t0bDEVN.exeCode function: 0_2_0041C04D0_2_0041C04D
    Source: C:\Users\user\Desktop\je9t0bDEVN.exeCode function: 0_2_004518040_2_00451804
    Source: C:\Users\user\Desktop\je9t0bDEVN.exeCode function: 0_2_004188AD0_2_004188AD
    Source: C:\Users\user\Desktop\je9t0bDEVN.exeCode function: 0_2_004281720_2_00428172
    Source: C:\Users\user\Desktop\je9t0bDEVN.exeCode function: 0_2_0041D97A0_2_0041D97A
    Source: C:\Users\user\Desktop\je9t0bDEVN.exeCode function: 0_2_004272D80_2_004272D8
    Source: C:\Users\user\Desktop\je9t0bDEVN.exeCode function: 0_2_00409B600_2_00409B60
    Source: C:\Users\user\Desktop\je9t0bDEVN.exeCode function: 0_2_0040F3C40_2_0040F3C4
    Source: C:\Users\user\Desktop\je9t0bDEVN.exeCode function: 0_2_0041DB990_2_0041DB99
    Source: C:\Users\user\Desktop\je9t0bDEVN.exeCode function: 0_2_00404BAE0_2_00404BAE
    Source: C:\Users\user\Desktop\je9t0bDEVN.exeCode function: 0_2_0044A4390_2_0044A439
    Source: C:\Users\user\Desktop\je9t0bDEVN.exeCode function: 0_2_0044DDD00_2_0044DDD0
    Source: C:\Users\user\Desktop\je9t0bDEVN.exeCode function: 0_2_0040C5DC0_2_0040C5DC
    Source: C:\Users\user\Desktop\je9t0bDEVN.exeCode function: 0_2_0041F5E40_2_0041F5E4
    Source: C:\Users\user\Desktop\je9t0bDEVN.exeCode function: 0_2_0040CF580_2_0040CF58
    Source: C:\Users\user\Desktop\je9t0bDEVN.exeCode function: 0_2_0040DF6A0_2_0040DF6A
    Source: C:\Users\user\Desktop\je9t0bDEVN.exeCode function: 0_2_004137770_2_00413777
    Source: C:\Users\user\Desktop\je9t0bDEVN.exeCode function: 0_2_0041BF070_2_0041BF07
    Source: C:\Users\user\Desktop\je9t0bDEVN.exeCode function: 0_2_00418F190_2_00418F19
    Source: C:\Users\user\Desktop\je9t0bDEVN.exeCode function: String function: 0044D690 appears 34 times
    Source: C:\Users\user\Desktop\je9t0bDEVN.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5992 -s 356
    Source: je9t0bDEVN.exe, 00000000.00000000.1177490614.00000000007D7000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameQvConnect32.EXEZ vs je9t0bDEVN.exe
    Source: je9t0bDEVN.exeBinary or memory string: OriginalFilenameQvConnect32.EXEZ vs je9t0bDEVN.exe
    Source: je9t0bDEVN.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: classification engineClassification label: mal96.troj.evad.winEXE@2/5@0/0
    Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess5992
    Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\3e0d1180-cd5c-4327-90da-ccd17a8cd4f7Jump to behavior
    Source: C:\Users\user\Desktop\je9t0bDEVN.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: je9t0bDEVN.exeReversingLabs: Detection: 70%
    Source: je9t0bDEVN.exeVirustotal: Detection: 48%
    Source: unknownProcess created: C:\Users\user\Desktop\je9t0bDEVN.exe "C:\Users\user\Desktop\je9t0bDEVN.exe"
    Source: C:\Users\user\Desktop\je9t0bDEVN.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5992 -s 356
    Source: C:\Users\user\Desktop\je9t0bDEVN.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\Desktop\je9t0bDEVN.exeSection loaded: winhttp.dllJump to behavior
    Source: C:\Users\user\Desktop\je9t0bDEVN.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Users\user\Desktop\je9t0bDEVN.exeSection loaded: wininet.dllJump to behavior
    Source: je9t0bDEVN.exeStatic file information: File size 4132864 > 1048576
    Source: je9t0bDEVN.exeStatic PE information: Raw size of ./PING/2 is bigger than: 0x100000 < 0x262000
    Source: initial sampleStatic PE information: section where entry point is pointing to: ./PING/2
    Source: je9t0bDEVN.exeStatic PE information: real checksum: 0x284eca should be: 0x3f6de3
    Source: je9t0bDEVN.exeStatic PE information: section name: ./PING/0
    Source: je9t0bDEVN.exeStatic PE information: section name: ./PING/1
    Source: je9t0bDEVN.exeStatic PE information: section name: ./PING/2
    Source: C:\Users\user\Desktop\je9t0bDEVN.exeCode function: 0_2_00412B0A push ebx; retf 0004h0_2_00412B0D
    Source: C:\Users\user\Desktop\je9t0bDEVN.exeCode function: 0_2_00776574 push 0F370C96h; mov dword ptr [esp], esi0_2_0077657C
    Source: C:\Users\user\Desktop\je9t0bDEVN.exeCode function: 0_2_00401DCF push eax; mov dword ptr [esp], 00000000h0_2_00401DD4
    Source: C:\Users\user\Desktop\je9t0bDEVN.exeCode function: 0_2_004686B1 push ecx; ret 0_2_004686C4
    Source: C:\Users\user\Desktop\je9t0bDEVN.exeCode function: 0_2_00415F5D push eax; ret 0_2_00415F5E
    Source: je9t0bDEVN.exeStatic PE information: section name: .text entropy: 6.8060853503210135
    Source: je9t0bDEVN.exeStatic PE information: section name: ./PING/0 entropy: 7.837674875091487
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: Amcache.hve.4.drBinary or memory string: VMware
    Source: Amcache.hve.4.drBinary or memory string: VMware Virtual USB Mouse
    Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin
    Source: Amcache.hve.4.drBinary or memory string: VMware, Inc.
    Source: Amcache.hve.4.drBinary or memory string: VMware20,1hbin@
    Source: Amcache.hve.4.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
    Source: Amcache.hve.4.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
    Source: Amcache.hve.4.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
    Source: Amcache.hve.4.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
    Source: Amcache.hve.4.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
    Source: Amcache.hve.4.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
    Source: Amcache.hve.4.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
    Source: Amcache.hve.4.drBinary or memory string: vmci.sys
    Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin`
    Source: Amcache.hve.4.drBinary or memory string: \driver\vmci,\driver\pci
    Source: Amcache.hve.4.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
    Source: Amcache.hve.4.drBinary or memory string: VMware20,1
    Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Generation Counter
    Source: Amcache.hve.4.drBinary or memory string: NECVMWar VMware SATA CD00
    Source: Amcache.hve.4.drBinary or memory string: VMware Virtual disk SCSI Disk Device
    Source: Amcache.hve.4.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
    Source: Amcache.hve.4.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
    Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
    Source: Amcache.hve.4.drBinary or memory string: VMware PCI VMCI Bus Device
    Source: Amcache.hve.4.drBinary or memory string: VMware VMCI Bus Device
    Source: Amcache.hve.4.drBinary or memory string: VMware Virtual RAM
    Source: Amcache.hve.4.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
    Source: Amcache.hve.4.drBinary or memory string: VMware-42 27 88 19 56 cc 59 1a-97 79 fb 8c bf a1 e2 9d
    Source: Amcache.hve.4.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
    Source: C:\Users\user\Desktop\je9t0bDEVN.exeCode function: 0_2_00465ADF mov eax, dword ptr fs:[00000030h]0_2_00465ADF
    Source: C:\Users\user\Desktop\je9t0bDEVN.exeCode function: 0_2_0045BEE6 mov ecx, dword ptr fs:[00000030h]0_2_0045BEE6

    HIPS / PFW / Operating System Protection Evasion

    barindex
    Source: je9t0bDEVN.exe, 00000000.00000000.1177245730.0000000000481000.00000008.00000001.01000000.00000003.sdmpString found in binary or memory: barbecueappledos.pw
    Source: je9t0bDEVN.exe, 00000000.00000000.1177245730.0000000000481000.00000008.00000001.01000000.00000003.sdmpString found in binary or memory: killredls.pw
    Source: je9t0bDEVN.exe, 00000000.00000000.1177245730.0000000000481000.00000008.00000001.01000000.00000003.sdmpString found in binary or memory: keewoolas.pw
    Source: je9t0bDEVN.exe, 00000000.00000000.1177245730.0000000000481000.00000008.00000001.01000000.00000003.sdmpString found in binary or memory: moskhoods.pw
    Source: je9t0bDEVN.exe, 00000000.00000000.1177245730.0000000000481000.00000008.00000001.01000000.00000003.sdmpString found in binary or memory: dayzilons.pw
    Source: je9t0bDEVN.exe, 00000000.00000000.1177245730.0000000000481000.00000008.00000001.01000000.00000003.sdmpString found in binary or memory: revivalsecularas.pw
    Source: je9t0bDEVN.exe, 00000000.00000000.1177245730.0000000000481000.00000008.00000001.01000000.00000003.sdmpString found in binary or memory: steycools.pw
    Source: je9t0bDEVN.exe, 00000000.00000000.1177245730.0000000000481000.00000008.00000001.01000000.00000003.sdmpString found in binary or memory: bloockflad.pw
    Source: je9t0bDEVN.exe, 00000000.00000000.1177245730.0000000000481000.00000008.00000001.01000000.00000003.sdmpString found in binary or memory: bookgames.pw
    Source: Amcache.hve.4.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
    Source: Amcache.hve.4.drBinary or memory string: msmpeng.exe
    Source: Amcache.hve.4.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
    Source: Amcache.hve.4.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
    Source: Amcache.hve.4.drBinary or memory string: MsMpEng.exe

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: decrypted.binstr, type: MEMORYSTR

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: decrypted.binstr, type: MEMORYSTR
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
    PowerShell
    1
    DLL Side-Loading
    1
    Process Injection
    1
    Software Packing
    OS Credential Dumping11
    Security Software Discovery
    Remote Services1
    Archive Collected Data
    1
    Encrypted Channel
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
    DLL Side-Loading
    1
    Process Injection
    LSASS Memory1
    System Information Discovery
    Remote Desktop ProtocolData from Removable Media1
    Application Layer Protocol
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)11
    Deobfuscate/Decode Files or Information
    Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
    DLL Side-Loading
    NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script3
    Obfuscated Files or Information
    LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    je9t0bDEVN.exe71%ReversingLabsWin32.Trojan.SpywareX
    je9t0bDEVN.exe48%VirustotalBrowse
    je9t0bDEVN.exe100%Joe Sandbox ML
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    revivalsecularas.pw100%Avira URL Cloudmalware
    bloockflad.pw100%Avira URL Cloudmalware
    barbecueappledos.pw100%Avira URL Cloudmalware
    keewoolas.pw100%Avira URL Cloudmalware
    killredls.pw100%Avira URL Cloudmalware
    steycools.pw100%Avira URL Cloudmalware
    bookgames.pw100%Avira URL Cloudmalware
    moskhoods.pw100%Avira URL Cloudmalware
    dayzilons.pw100%Avira URL Cloudmalware
    bookgames.pw15%VirustotalBrowse
    bloockflad.pw14%VirustotalBrowse
    barbecueappledos.pw12%VirustotalBrowse
    revivalsecularas.pw15%VirustotalBrowse
    killredls.pw15%VirustotalBrowse
    keewoolas.pw15%VirustotalBrowse
    moskhoods.pw16%VirustotalBrowse
    steycools.pw14%VirustotalBrowse
    dayzilons.pw13%VirustotalBrowse
    No contacted domains info
    NameMaliciousAntivirus DetectionReputation
    keewoolas.pwtrue
    • 15%, Virustotal, Browse
    • Avira URL Cloud: malware
    unknown
    revivalsecularas.pwtrue
    • 15%, Virustotal, Browse
    • Avira URL Cloud: malware
    unknown
    killredls.pwtrue
    • 15%, Virustotal, Browse
    • Avira URL Cloud: malware
    unknown
    bloockflad.pwtrue
    • 14%, Virustotal, Browse
    • Avira URL Cloud: malware
    unknown
    barbecueappledos.pwtrue
    • 12%, Virustotal, Browse
    • Avira URL Cloud: malware
    unknown
    steycools.pwtrue
    • 14%, Virustotal, Browse
    • Avira URL Cloud: malware
    unknown
    bookgames.pwtrue
    • 15%, Virustotal, Browse
    • Avira URL Cloud: malware
    unknown
    moskhoods.pwtrue
    • 16%, Virustotal, Browse
    • Avira URL Cloud: malware
    unknown
    dayzilons.pwtrue
    • 13%, Virustotal, Browse
    • Avira URL Cloud: malware
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://upx.sf.netAmcache.hve.4.drfalse
      high
      No contacted IP infos
      Joe Sandbox version:40.0.0 Tourmaline
      Analysis ID:1436381
      Start date and time:2024-05-05 00:01:04 +02:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 4m 22s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Number of analysed new started processes analysed:21
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Sample name:je9t0bDEVN.exe
      (renamed file extension from none to exe, renamed because original name is a hash value)
      Original Sample Name:4dc3d7a6e1bef7cabd6e5e6681f3640628887a6beea0e096416baff784df7a3b
      Detection:MAL
      Classification:mal96.troj.evad.winEXE@2/5@0/0
      EGA Information:Failed
      HCA Information:
      • Successful, ratio: 100%
      • Number of executed functions: 0
      • Number of non-executed functions: 28
      • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WerFault.exe, SIHClient.exe, SgrmBroker.exe, MoUsoCoreWorker.exe, conhost.exe, svchost.exe
      • Excluded IPs from analysis (whitelisted): 20.42.65.92
      • Excluded domains from analysis (whitelisted): onedsblobprdeus17.eastus.cloudapp.azure.com, ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
      • Execution Graph export aborted for target je9t0bDEVN.exe, PID 5992 because there are no executed function
      • Not all processes where analyzed, report is missing behavior information
      TimeTypeDescription
      00:02:03API Interceptor1x Sleep call for process: WerFault.exe modified
      No context
      No context
      No context
      No context
      No context
      Process:C:\Windows\SysWOW64\WerFault.exe
      File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
      Category:dropped
      Size (bytes):65536
      Entropy (8bit):0.7636333072448882
      Encrypted:false
      SSDEEP:192:UN3HCOVHyqtlli054EPJ2JYj+qzuiFqZ24IO87SJ0Y:iyOV5tZ54ELjrzuiFqY4IO87H
      MD5:05D5C8CEF43CB932CC5ED4B848FB836E
      SHA1:44F21C588EF341B2BB67E93BFF3C567B78F5A390
      SHA-256:D4359C3A21DA46521306438E2C8B02022B1C5CA1577B9C61B9A607101ED73B66
      SHA-512:362860C0AB92743280BFD4D1945240E26D5253536F2E4CA98795507521A49102CF32F4F502F41B529FAC00F0AA7989F56F8C9DA564909FFF20F4C0BC440CAB09
      Malicious:false
      Reputation:low
      Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.5.9.3.3.3.7.1.0.6.8.0.6.7.4.1.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.5.9.3.3.3.7.1.4.4.1.5.0.4.7.5.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.d.8.4.b.6.5.e.4.-.a.e.8.6.-.4.c.b.4.-.b.0.9.9.-.e.9.f.0.7.2.2.5.f.6.b.b.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.2.e.7.e.2.e.f.3.-.4.f.b.a.-.4.2.3.7.-.8.1.6.a.-.6.6.4.9.6.a.1.b.e.f.2.2.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.j.e.9.t.0.b.D.E.V.N...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.Q.v.C.o.n.n.e.c.t.3.2...E.X.E.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.7.6.8.-.0.0.0.1.-.0.0.1.4.-.3.c.7.6.-.5.0.a.a.6.e.9.e.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.e.8.9.f.1.2.0.1.9.2.f.2.4.c.2.3.c.0.9.1.9.e.c.9.0.5.3.6.6.5.a.f.0.0.0.0.0.9.0.4.!.0.0.0.0.f.b.8.e.1.d.a.9.7.3.0.8.f.5.4.6.6.c.e.4.3.8.2.2.2.a.0.e.a.1.c.2.
      Process:C:\Windows\SysWOW64\WerFault.exe
      File Type:Mini DuMP crash report, 14 streams, Sat May 4 22:01:50 2024, 0x1205a4 type
      Category:dropped
      Size (bytes):1073042
      Entropy (8bit):0.9056013693006205
      Encrypted:false
      SSDEEP:1536:+FhhfLnTfqEHzfLnTfrH+GXKPefv0Gk1r8keeqzFsrEVJ33g:DYKPefyQkeLn33g
      MD5:23B7FBD390F1E2A4ED0AA00027BA54AE
      SHA1:0D2E3B3F477B5AD96992F23080DD19B20EB5B0B1
      SHA-256:2DBAE63C1DA21F7B0AA1ED8F074FAE31FE936366373DFE0AF9B956D95EC53B14
      SHA-512:66E6E21079A4B3BAAF01854FFCF123C0AD3D4EF0022E990BAF6A3E61B53D90A91F4857ABAD8A59E74A613E63D2BD05BBABB778057FAF7EEAF795750CAA706AF0
      Malicious:false
      Reputation:low
      Preview:MDMP..a..... .......N.6f........................L................!..........T.......8...........T................Q......................................................................................................eJ......l.......GenuineIntel............T.......h...N.6f.............................0..2...............W... .E.u.r.o.p.e. .S.t.a.n.d.a.r.d. .T.i.m.e.......................................W... .E.u.r.o.p.e. .S.u.m.m.e.r. .T.i.m.e...........................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
      Process:C:\Windows\SysWOW64\WerFault.exe
      File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
      Category:dropped
      Size (bytes):8332
      Entropy (8bit):3.700139085902334
      Encrypted:false
      SSDEEP:192:R6l7wVeJp5Xk6Wm86YNISUmJ9gmfbBYmpDM89bwasfS3Bwm:R6lXJpa686YSSUO9gmfeCw5fST
      MD5:20CC278C32BC50BDEF18FFBD7F26D3D9
      SHA1:F08D51AC9095716B628B9F42BF4D494807BE8495
      SHA-256:9E6218AF948FC949027BD9ACEF9AE870307308649418040638CE78E93F2571B3
      SHA-512:28B0FA064AA89EE6DCF972BFBEF9E258738B17D1612CBCAD844A2105C925A498DFA870D59BA896616F2CB126E5A62F33CEE509B8DD5FC25E33E34EB8B5DB5666
      Malicious:false
      Reputation:low
      Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.9.9.2.<./.P.i.
      Process:C:\Windows\SysWOW64\WerFault.exe
      File Type:XML 1.0 document, ASCII text, with CRLF line terminators
      Category:dropped
      Size (bytes):4674
      Entropy (8bit):4.492190833546438
      Encrypted:false
      SSDEEP:48:cvIwWl8zsuRMiJg77aI9orWpW8VYxYm8M4JUiumM6F3+q8qbFoM7hughQNd:uIjfu+wI72a7VdJCYN7hughQNd
      MD5:97B151E0B756D738B5E00DB2358583EF
      SHA1:86CAAA71F35E64C42C5B62B003669A4331A2AC48
      SHA-256:15F1CEEF5201269D6EE0975ECADECCD87A3C54C0978EB6B748A40160B0B3C2E0
      SHA-512:E6D41F0448A5BC19FE300170BC070640F50D390F3FA94F607BD5C86F76EDA9C6EB3BC2AC8E49D80F0B371E4EF4215DCE1EDEB29A125864CCCDDA8918DD0066FC
      Malicious:false
      Reputation:low
      Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="308944" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
      Process:C:\Windows\SysWOW64\WerFault.exe
      File Type:MS Windows registry file, NT/2000 or above
      Category:dropped
      Size (bytes):1835008
      Entropy (8bit):4.4172338628001535
      Encrypted:false
      SSDEEP:6144:Dcifpi6ceLPL9skLmb0mDSWSPtaJG8nAgex285i2MMhA20X4WABlGuNs5+:4i58DSWIZBk2MM6AFBqo
      MD5:5469CCC6628BA00A624F970F05166FF2
      SHA1:9937C9A36CB228960B6A9D7B091B5892A6E56C0D
      SHA-256:1FB4999B66C9510BAF0E6700BF758DDB6A3043284E1274EF164BDB889D5256A1
      SHA-512:A817E586523B632D0D4D89B30E2E9457EF26D9149B17846DA644A43F8DAE4E4ED2F2BD3831E7238AE41165A54FB1CF736BBF057588EA2418C04F27A166311D3E
      Malicious:false
      Reputation:low
      Preview:regfE...E....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm*..n.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
      File type:PE32 executable (GUI) Intel 80386, for MS Windows
      Entropy (8bit):7.821181029934212
      TrID:
      • Win32 Executable (generic) a (10002005/4) 99.96%
      • Generic Win/DOS Executable (2004/3) 0.02%
      • DOS Executable Generic (2002/1) 0.02%
      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
      File name:je9t0bDEVN.exe
      File size:4'132'864 bytes
      MD5:0df8abbbbc63aa2e171466a6cf93b172
      SHA1:fb8e1da97308f5466ce438222a0ea1c28efaaf01
      SHA256:4dc3d7a6e1bef7cabd6e5e6681f3640628887a6beea0e096416baff784df7a3b
      SHA512:ea42a729b56ba8063a29d97bcbcc0cbbc8428e939aae3fa483e605551525dbf66a8c8ca1e8ea3f0ddde68d561c8babe8168d376acbe43b22f37d80d18e8309e1
      SSDEEP:98304:D3dhinxWxbC7HKMKI1gnwXrPljNaliok+PPxJ2U18b/Db1esOD:D2ou7KFnwbljNalioBOU18b/Ne3
      TLSH:A71612113DC120F8D8A635B002A3EE3E75B47E3685358CCBB7D4BE6BD932650763526A
      File Content Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L.....Oe.................(..........~T*...........@...........................?......N(.....................................|-<....
      Icon Hash:01931b3979490c1d
      Entrypoint:0x6a547e
      Entrypoint Section:./PING/2
      Digitally signed:false
      Imagebase:0x400000
      Subsystem:windows gui
      Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
      DLL Characteristics:TERMINAL_SERVER_AWARE
      Time Stamp:0x654F9392 [Sat Nov 11 14:45:38 2023 UTC]
      TLS Callbacks:
      CLR (.Net) Version:
      OS Version Major:6
      OS Version Minor:0
      File Version Major:6
      File Version Minor:0
      Subsystem Version Major:6
      Subsystem Version Minor:0
      Import Hash:575ffd2062645b048aa6c5e951bbd11d
      Instruction
      push 2D0C8E14h
      pushfd
      or byte ptr [esp+04h], 0000003Fh
      neg dword ptr [esp+04h]
      cmp dword ptr [esp+04h], 062D8635h
      mov dword ptr [esp+04h], 8B0A1BD6h
      push dword ptr [esp+00h]
      popfd
      lea esp, dword ptr [esp+04h]
      call 00007F490CC10EFCh
      sbb dword ptr [ecx], edx
      pop ss
      call far 7039h : D09C4902h
      daa
      jmp 00007F48F85D76E7h
      shr eax, FFFFFF87h
      imul ecx, edx, 0181EC63h
      or cl, bh
      loop 00007F490CB92D74h
      sbb dword ptr [ecx+ecx*4+41h], eax
      test eax, C34A9BB7h
      mov al, byte ptr [BA6634C8h]
      jp 00007F490CB92DCBh
      js 00007F490CB92D5Dh
      daa
      push ebp
      add ah, byte ptr [edi]
      test al, 42h
      inc esi
      push esi
      sbb esi, ecx
      NameVirtual AddressVirtual Size Is in Section
      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IMPORT0x3c2d7c0xdc./PING/2
      IMAGE_DIRECTORY_ENTRY_RESOURCE0x3d70000x1980c.rsrc
      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
      IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
      IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x3d63000xc0./PING/2
      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IAT0x1740000x274./PING/1
      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
      .text0x10000x730000x730004acee1c5db002bc1f5779666023290eaFalse0.5895316745923913data6.8060853503210135IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      .rdata0x740000xd0000xd000cf7feb91e82e5723749347eb2a641226False0.55859375data5.748204833083643IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .data0x810000x50000x50008ce4a8c6d4df0cdc15c2df928098fd41False0.22451171875data4.081107640210269IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      ./PING/00x860000xee0000xee000832ec266376e658d4cc6625e16acddc6False0.9460551798844538data7.837674875091487IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      ./PING/10x1740000x10000x1000bef779488f50c62a09b12ae4eba2b7b9False0.13671875data1.4245860605440923IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      ./PING/20x1750000x2620000x2620002e10a4226f453827bdd77de0a9e484feunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      .rsrc0x3d70000x1a0000x1a000f53d22ac46de32c3980d569206467cb0False0.6795560396634616data6.5508447870931015IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      NameRVASizeTypeLanguageCountryZLIB Complexity
      RT_CURSOR0x3ed3b80x134Targa image data - RGB 64 x 65536 x 1 +32 "\001"EnglishUnited States0.4805194805194805
      RT_CURSOR0x3ed4ec0xb4Targa image data - Map 32 x 65536 x 1 +16 "\001"EnglishUnited States0.7
      RT_CURSOR0x3ed5a00x134Targa image data 64 x 65536 x 1 +32 "\001"EnglishUnited States0.37662337662337664
      RT_CURSOR0x3ed6d40x134AmigaOS bitmap font "(", fc_YSize 4294967264, 5120 elements, 2nd "\377\360?\377\377\370\177\377\377\374\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377\377", 3rdEnglishUnited States0.36363636363636365
      RT_CURSOR0x3ed8080x134Targa image data 64 x 65536 x 1 +32 "\001"EnglishUnited States0.36688311688311687
      RT_CURSOR0x3ed93c0x134dataEnglishUnited States0.37662337662337664
      RT_CURSOR0x3eda700x134AmigaOS bitmap font "(", fc_YSize 4294966847, 3840 elements, 2nd "\377?\374\377\377\300\003\377\377\300\003\377\377\340\007\377\377\360\017\377\377\370\037\377\377\374?\377\377\376\177\377\377\377\377\377\377\377\377\377\377\377\377\377", 3rdEnglishUnited States0.5422077922077922
      RT_CURSOR0x3edba40x134dataEnglishUnited States0.37337662337662336
      RT_CURSOR0x3edcd80x134Targa image data - RGB - RLE 64 x 65536 x 1 +32 "\001"EnglishUnited States0.38636363636363635
      RT_CURSOR0x3ede0c0x134Targa image data - RLE 64 x 65536 x 1 +32 "\001"EnglishUnited States0.35714285714285715
      RT_CURSOR0x3edf400x134Targa image data - Mono - RLE 64 x 65536 x 1 +32 "\001"EnglishUnited States0.36688311688311687
      RT_CURSOR0x3ee0740x134dataEnglishUnited States0.44155844155844154
      RT_CURSOR0x3ee1a80x134dataEnglishUnited States0.4155844155844156
      RT_CURSOR0x3ee2dc0x134dataEnglishUnited States0.2662337662337662
      RT_CURSOR0x3ee4100x134dataEnglishUnited States0.2824675324675325
      RT_CURSOR0x3ee5440x134dataEnglishUnited States0.3246753246753247
      RT_BITMAP0x3ee6780xb8Device independent bitmap graphic, 12 x 10 x 4, image size 80EnglishUnited States0.44565217391304346
      RT_BITMAP0x3ee7300x144Device independent bitmap graphic, 33 x 11 x 4, image size 220EnglishUnited States0.37962962962962965
      RT_ICON0x3d7bf80x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024EnglishUnited States0.8209219858156028
      RT_ICON0x3d80600x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096EnglishUnited States0.5229831144465291
      RT_ICON0x3d91080x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216EnglishUnited States0.42489626556016596
      RT_ICON0x3db6b00x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16384EnglishUnited States0.3771846953235711
      RT_ICON0x3df8d80xd20bPNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedEnglishUnited States0.9955366275501665
      RT_DIALOG0x3ee8740x138dataEnglishUnited States0.5833333333333334
      RT_DIALOG0x3ee9ac0x106dataEnglishUnited States0.648854961832061
      RT_DIALOG0x3eeab40xe8dataEnglishUnited States0.6336206896551724
      RT_DIALOG0x3eeb9c0x34dataEnglishUnited States0.9038461538461539
      RT_STRING0x3eebd00x46dataEnglishUnited States0.6571428571428571
      RT_STRING0x3eec180x82StarOffice Gallery theme p, 536899072 objects, 1st nEnglishUnited States0.7153846153846154
      RT_STRING0x3eec9c0x2adataEnglishUnited States0.5476190476190477
      RT_STRING0x3eecc80x184dataEnglishUnited States0.48711340206185566
      RT_STRING0x3eee4c0x4eedataEnglishUnited States0.375594294770206
      RT_STRING0x3ef33c0x264dataEnglishUnited States0.3333333333333333
      RT_STRING0x3ef5a00x2dadataEnglishUnited States0.3698630136986301
      RT_STRING0x3ef87c0x8adataEnglishUnited States0.6594202898550725
      RT_STRING0x3ef9080xacdataEnglishUnited States0.45348837209302323
      RT_STRING0x3ef9b40xdedataEnglishUnited States0.536036036036036
      RT_STRING0x3efa940x4a8dataEnglishUnited States0.3221476510067114
      RT_STRING0x3eff3c0x228dataEnglishUnited States0.4003623188405797
      RT_STRING0x3f01640x2cdataEnglishUnited States0.5227272727272727
      RT_STRING0x3f01900x53edataEnglishUnited States0.2965722801788376
      RT_GROUP_CURSOR0x3f06d00x22Lotus unknown worksheet or configuration, revision 0x2EnglishUnited States0.9705882352941176
      RT_GROUP_CURSOR0x3f06f40x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
      RT_GROUP_CURSOR0x3f07080x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
      RT_GROUP_CURSOR0x3f071c0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
      RT_GROUP_CURSOR0x3f07300x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
      RT_GROUP_CURSOR0x3f07440x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
      RT_GROUP_CURSOR0x3f07580x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
      RT_GROUP_CURSOR0x3f076c0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
      RT_GROUP_CURSOR0x3f07800x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
      RT_GROUP_CURSOR0x3f07940x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
      RT_GROUP_CURSOR0x3f07a80x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
      RT_GROUP_CURSOR0x3f07bc0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
      RT_GROUP_CURSOR0x3f07d00x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
      RT_GROUP_CURSOR0x3f07e40x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
      RT_GROUP_CURSOR0x3f07f80x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
      RT_GROUP_ICON0x3ecae40x4cdataEnglishUnited States0.7631578947368421
      RT_VERSION0x3ecb300x56cdataEnglishUnited States0.3854466858789625
      RT_MANIFEST0x3ed09c0x31cXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (736), with CRLF line terminatorsEnglishUnited States0.5238693467336684
      DLLImport
      KERNEL32.dllCloseHandle, CompareStringW, CreateFileA, CreateFileW, CreateProcessW, CreateToolhelp32Snapshot, DecodePointer, DeleteCriticalSection, DeleteFileW, EncodePointer, EnterCriticalSection, ExitProcess, ExpandEnvironmentStringsW, FileTimeToSystemTime, FindClose, FindFirstFileExW, FindNextFileW, FlushFileBuffers, FreeEnvironmentStringsW, FreeLibrary, GetACP, GetCPInfo, GetCommandLineA, GetCommandLineW, GetComputerNameExA, GetComputerNameW, GetConsoleMode, GetConsoleOutputCP, GetCurrentDirectoryW, GetCurrentProcess, GetCurrentProcessId, GetCurrentThreadId, GetDriveTypeW, GetEnvironmentStringsW, GetFileInformationByHandle, GetFileSizeEx, GetFileType, GetFullPathNameW, GetLastError, GetLogicalDrives, GetModuleFileNameA, GetModuleFileNameW, GetModuleHandleA, GetModuleHandleExW, GetModuleHandleW, GetOEMCP, GetProcAddress, GetProcessHeap, GetStartupInfoW, GetStdHandle, GetStringTypeW, GetSystemDefaultLangID, GetSystemDefaultUILanguage, GetSystemTimeAsFileTime, GetTimeZoneInformation, GetUserDefaultLangID, GetUserDefaultUILanguage, GetVolumeInformationW, HeapAlloc, HeapFree, HeapReAlloc, HeapSize, InitializeCriticalSectionAndSpinCount, InitializeSListHead, IsDebuggerPresent, IsProcessorFeaturePresent, IsValidCodePage, LCMapStringW, LeaveCriticalSection, LoadLibraryA, LoadLibraryExW, LoadLibraryW, MultiByteToWideChar, PeekNamedPipe, Process32FirstW, Process32NextW, QueryPerformanceCounter, RaiseException, ReadConsoleW, ReadFile, RtlUnwind, SetEndOfFile, SetEnvironmentVariableW, SetFilePointerEx, SetFileTime, SetLastError, SetStdHandle, SetUnhandledExceptionFilter, SystemTimeToFileTime, SystemTimeToTzSpecificLocalTime, TerminateProcess, TlsAlloc, TlsFree, TlsGetValue, TlsSetValue, TzSpecificLocalTimeToSystemTime, UnhandledExceptionFilter, WideCharToMultiByte, WinExec, WriteConsoleW, WriteFile, lstrcatW, lstrcmpW, lstrcmpiW, lstrlenW
      USER32.dllEnumDisplayDevicesA, GetDC, GetDesktopWindow, GetSystemMetrics, ReleaseDC, SystemParametersInfoW, wsprintfW
      ADVAPI32.dllGetCurrentHwProfileW, RegCloseKey, RegEnumKeyExW, RegOpenKeyExW, RegQueryValueExW
      GDI32.dllBitBlt, CreateCompatibleBitmap, CreateCompatibleDC, CreateDCW, DeleteDC, DeleteObject, GetDIBits, GetObjectW, SelectObject
      SHLWAPI.dllPathFileExistsW
      WINHTTP.dllWinHttpCloseHandle, WinHttpConnect, WinHttpCrackUrl, WinHttpOpen, WinHttpOpenRequest, WinHttpQueryDataAvailable, WinHttpReadData, WinHttpReceiveResponse, WinHttpSendRequest
      IPHLPAPI.DLLGetAdaptersInfo
      WININET.dllHttpAddRequestHeadersA, InternetQueryDataAvailable, InternetReadFile
      CRYPT32.dllCryptStringToBinaryA
      KERNEL32.dllHeapAlloc, HeapFree, ExitProcess, LoadLibraryA, GetModuleHandleA, GetProcAddress
      Language of compilation systemCountry where language is spokenMap
      EnglishUnited States
      No network behavior found

      Click to jump to process

      Click to jump to process

      Click to dive into process behavior distribution

      Click to jump to process

      Target ID:0
      Start time:00:01:50
      Start date:05/05/2024
      Path:C:\Users\user\Desktop\je9t0bDEVN.exe
      Wow64 process (32bit):true
      Commandline:"C:\Users\user\Desktop\je9t0bDEVN.exe"
      Imagebase:0x400000
      File size:4'132'864 bytes
      MD5 hash:0DF8ABBBBC63AA2E171466A6CF93B172
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:low
      Has exited:true

      Target ID:4
      Start time:00:01:50
      Start date:05/05/2024
      Path:C:\Windows\SysWOW64\WerFault.exe
      Wow64 process (32bit):true
      Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 5992 -s 356
      Imagebase:0x550000
      File size:483'680 bytes
      MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:true

      Reset < >
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1315748414.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.1315726341.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1315797245.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1315866720.0000000000481000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1315886388.0000000000486000.00000020.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1316099028.0000000000574000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1316117567.0000000000575000.00000020.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1316302693.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_je9t0bDEVN.jbxd
        Similarity
        • API ID: _strlen
        • String ID: >{y$!>{y$._Z$4gQ$$:$I+O$J+O$J+O$L$Lz5 $M{5/$OB]$PB]$c=Z:$d=Z:$d=Z:$fFD0$f~]$f~]$gFD0$Tr;$A$A$A$:}$:}
        • API String ID: 4218353326-589277786
        • Opcode ID: 794fcb9d18ff504b5511c2f722bcd00550631823b52934e1da313babfb5f4acd
        • Instruction ID: 5d3809e6dfe8f705cd5332ef1f326025e6f1fdb557f6513615b3ca46570c5a3b
        • Opcode Fuzzy Hash: 794fcb9d18ff504b5511c2f722bcd00550631823b52934e1da313babfb5f4acd
        • Instruction Fuzzy Hash: 3DB2F8B1D002099BDF249B98DC426BF7AB4EB54300F14457BE506FB3E1E3789A519F8A
        Uniqueness

        Uniqueness Score: -1.00%

        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1315748414.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.1315726341.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1315797245.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1315866720.0000000000481000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1315886388.0000000000486000.00000020.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1316099028.0000000000574000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1316117567.0000000000575000.00000020.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1316302693.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_je9t0bDEVN.jbxd
        Similarity
        • API ID:
        • String ID: "dC4$#dC4$PE@$^&-$^&-$`$qxBK$bF=$bF=$d}W$d}W
        • API String ID: 0-1324474951
        • Opcode ID: 1cd2f1f26d43312099fa83008184cc02e2ce570a55ef3166561210e93163b009
        • Instruction ID: 9ae1ee014539eb229e6f667b79c2468e21227092eb00178d6940b0e322408a29
        • Opcode Fuzzy Hash: 1cd2f1f26d43312099fa83008184cc02e2ce570a55ef3166561210e93163b009
        • Instruction Fuzzy Hash: 9E13C3B0E00219CBDF188BA8D8D167E76B4EB54314F24457BE916FB3D1D3789E418B8A
        Uniqueness

        Uniqueness Score: -1.00%

        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1315748414.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.1315726341.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1315797245.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1315866720.0000000000481000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1315886388.0000000000486000.00000020.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1316099028.0000000000574000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1316117567.0000000000575000.00000020.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1316302693.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_je9t0bDEVN.jbxd
        Similarity
        • API ID:
        • String ID: 2Bd$>tWA$?tWA$?tWA$u?$v?$v?$O/$O/
        • API String ID: 0-3734855115
        • Opcode ID: 12677df740d71dc0350d77574daf64c628753cc828b76a092f9e037ff7120699
        • Instruction ID: 0dc2f336648daf34a222a055cc824c407d3c3b8f318190c973e7a4f95da02ae3
        • Opcode Fuzzy Hash: 12677df740d71dc0350d77574daf64c628753cc828b76a092f9e037ff7120699
        • Instruction Fuzzy Hash: 2F228471504705CBC7349F18C5C162AB6E1AB58700B345F3FE5DAFABE0DA3AE8419B4A
        Uniqueness

        Uniqueness Score: -1.00%

        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1315748414.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.1315726341.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1315797245.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1315866720.0000000000481000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1315886388.0000000000486000.00000020.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1316099028.0000000000574000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1316117567.0000000000575000.00000020.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1316302693.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_je9t0bDEVN.jbxd
        Similarity
        • API ID:
        • String ID: 7s$8s$8s$J{$K{$K{$K{$K{
        • API String ID: 0-1859021670
        • Opcode ID: bc6f48e4497b2158dd54ef4888717aa15793687addcf9017ae160e447d336c12
        • Instruction ID: 1a63d00c76e43a1dda4bc9e17c07dc65e1e607faf217156504844b5eb0150d01
        • Opcode Fuzzy Hash: bc6f48e4497b2158dd54ef4888717aa15793687addcf9017ae160e447d336c12
        • Instruction Fuzzy Hash: 7932D7B19883018FEB248F18C59567EB7E0EB94310F64891FF199CB350D67CE8A59B4B
        Uniqueness

        Uniqueness Score: -1.00%

        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1315748414.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.1315726341.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1315797245.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1315866720.0000000000481000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1315886388.0000000000486000.00000020.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1316099028.0000000000574000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1316117567.0000000000575000.00000020.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1316302693.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_je9t0bDEVN.jbxd
        Similarity
        • API ID:
        • String ID: vmz$vmz$vmz$vmz$vmz$vmz
        • API String ID: 0-2631656845
        • Opcode ID: 1afdaaae3841cfea759a3e029d5645fa2e01477f47c6c5e14a5a5b40943efff7
        • Instruction ID: 814cfd6e617f88223a1c428d37f449d9079544bee563000e8d4b46818cfec7de
        • Opcode Fuzzy Hash: 1afdaaae3841cfea759a3e029d5645fa2e01477f47c6c5e14a5a5b40943efff7
        • Instruction Fuzzy Hash: 43D27FB7B893144BD308CE59EC9129AF2D3ABD4624F1F943DE889D3301EE79D9074689
        Uniqueness

        Uniqueness Score: -1.00%

        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1315748414.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.1315726341.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1315797245.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1315866720.0000000000481000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1315886388.0000000000486000.00000020.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1316099028.0000000000574000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1316117567.0000000000575000.00000020.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1316302693.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_je9t0bDEVN.jbxd
        Similarity
        • API ID:
        • String ID: #dC4$#dC4$qxBK$d}W$d}W$d}W
        • API String ID: 0-4235130334
        • Opcode ID: 213f6a85996d746e2b968655a41a64ecb8025b25bfe4d555a7066630e50e7e69
        • Instruction ID: 676a64121991c4d043dde5ef73355aa9aafc83cfbe13ce7ee21df49902576f4b
        • Opcode Fuzzy Hash: 213f6a85996d746e2b968655a41a64ecb8025b25bfe4d555a7066630e50e7e69
        • Instruction Fuzzy Hash: CFF205F5D00219EBDF249F5888816FEBEB5AB54311F24451BE519FB390D3788AC18B8B
        Uniqueness

        Uniqueness Score: -1.00%

        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1315748414.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.1315726341.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1315797245.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1315866720.0000000000481000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1315886388.0000000000486000.00000020.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1316099028.0000000000574000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1316117567.0000000000575000.00000020.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1316302693.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_je9t0bDEVN.jbxd
        Similarity
        • API ID:
        • String ID: 8s$8s$J{$K{$K{$K{
        • API String ID: 0-1922912580
        • Opcode ID: 28a625cea988f21dafa543ac379e7c88b6ccad5ecaccd8811b4fc30d3e5b1ccc
        • Instruction ID: 4846a7e02c7e9f52c1688249f16107f52cc6d127d9912ed0093cada6fbdb1a7f
        • Opcode Fuzzy Hash: 28a625cea988f21dafa543ac379e7c88b6ccad5ecaccd8811b4fc30d3e5b1ccc
        • Instruction Fuzzy Hash: A75229B1D002099BDF349B54D9466BE7A70BB14310F24413BE915FB7D1E3BC8A85879B
        Uniqueness

        Uniqueness Score: -1.00%

        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1315748414.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.1315726341.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1315797245.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1315866720.0000000000481000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1315886388.0000000000486000.00000020.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1316099028.0000000000574000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1316117567.0000000000575000.00000020.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1316302693.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_je9t0bDEVN.jbxd
        Similarity
        • API ID:
        • String ID: Y_5$Y_5$u/6%$u/6%
        • API String ID: 0-2251755769
        • Opcode ID: d35e182d859aa6e7b5caa54c68341d2ea7da014cdd19efd988d176db141d2a8d
        • Instruction ID: 2a9da9c3dff907e962c6715099ed85bfd0e059cfe0ca38c6a9c53710f79958e0
        • Opcode Fuzzy Hash: d35e182d859aa6e7b5caa54c68341d2ea7da014cdd19efd988d176db141d2a8d
        • Instruction Fuzzy Hash: D052C470E00209CBDF18DBA8C9856BEBBB1AB08700F25453BE515FB3D1D77899458B9B
        Uniqueness

        Uniqueness Score: -1.00%

        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1315748414.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.1315726341.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1315797245.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1315866720.0000000000481000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1315886388.0000000000486000.00000020.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1316099028.0000000000574000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1316117567.0000000000575000.00000020.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1316302693.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_je9t0bDEVN.jbxd
        Similarity
        • API ID:
        • String ID: /$0$8
        • API String ID: 0-1466092297
        • Opcode ID: efdf8ca62e805c77d0302a2cf16a9820eda5af34bf0df2a868995c0e8097bff8
        • Instruction ID: f3cd5ad1a70834d29793be3a50564150e77230deba610e3d621bac35ea627184
        • Opcode Fuzzy Hash: efdf8ca62e805c77d0302a2cf16a9820eda5af34bf0df2a868995c0e8097bff8
        • Instruction Fuzzy Hash: 795235B1608340AFD714CF19C880BABBBE2BF88354F04892EF99987351D775D895CB96
        Uniqueness

        Uniqueness Score: -1.00%

        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1315748414.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.1315726341.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1315797245.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1315866720.0000000000481000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1315886388.0000000000486000.00000020.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1316099028.0000000000574000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1316117567.0000000000575000.00000020.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1316302693.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_je9t0bDEVN.jbxd
        Similarity
        • API ID:
        • String ID: 0$8
        • API String ID: 0-46163386
        • Opcode ID: 74b43cad7cd9b1140e23dc688644fc080f1e11e15ea2bf48c5110ed617963227
        • Instruction ID: 8c2dd171849d87ae402aacb3ef3fdc173ce4e5145d55191c43ffbfa02a4b3064
        • Opcode Fuzzy Hash: 74b43cad7cd9b1140e23dc688644fc080f1e11e15ea2bf48c5110ed617963227
        • Instruction Fuzzy Hash: 41D15575608340AFCB15CF59C880AAFBBE2AFD9310F08891EF98987361D775C894CB56
        Uniqueness

        Uniqueness Score: -1.00%

        Memory Dump Source
        • Source File: 00000000.00000002.1315748414.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.1315726341.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1315797245.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1315866720.0000000000481000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1315886388.0000000000486000.00000020.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1316099028.0000000000574000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1316117567.0000000000575000.00000020.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1316302693.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_je9t0bDEVN.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: d7e846ba28df3a411283894c7fa174d954b67003d694b2db4801835af3f3ff27
        • Instruction ID: d8c34c1f9918267475e0321b6939e561058c41834059ec72e27ca31b63c7b1d9
        • Opcode Fuzzy Hash: d7e846ba28df3a411283894c7fa174d954b67003d694b2db4801835af3f3ff27
        • Instruction Fuzzy Hash: A7626C316087418FC715DF19C490AAAB7E1FF89314F148A6EE4CA9B352D739EC86CB46
        Uniqueness

        Uniqueness Score: -1.00%

        Memory Dump Source
        • Source File: 00000000.00000002.1315748414.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.1315726341.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1315797245.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1315866720.0000000000481000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1315886388.0000000000486000.00000020.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1316099028.0000000000574000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1316117567.0000000000575000.00000020.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1316302693.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_je9t0bDEVN.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: e4785ae7801f28f7af1e35b2df585575f371deddc840a981f57aaaf234f6eabb
        • Instruction ID: 94b8b7208b6eea89838c508b0059370ded6ae7f30709174ec5309e8e7f017635
        • Opcode Fuzzy Hash: e4785ae7801f28f7af1e35b2df585575f371deddc840a981f57aaaf234f6eabb
        • Instruction Fuzzy Hash: A412B0706087508FC324DF28D48066BBBE2FF95314F944E2ED5D687B81E739A845CB4A
        Uniqueness

        Uniqueness Score: -1.00%

        Memory Dump Source
        • Source File: 00000000.00000002.1315748414.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.1315726341.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1315797245.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1315866720.0000000000481000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1315886388.0000000000486000.00000020.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1316099028.0000000000574000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1316117567.0000000000575000.00000020.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1316302693.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_je9t0bDEVN.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: a49a8c4fe128f161760440432f42091b6af603cedbf268e3c924fd299385812d
        • Instruction ID: c0c9e0cf1b8e68f01baed7596c2c84ca2cdba20737da6f151c7232e58b07f366
        • Opcode Fuzzy Hash: a49a8c4fe128f161760440432f42091b6af603cedbf268e3c924fd299385812d
        • Instruction Fuzzy Hash: 86126D756087459FC714CF29C4806AAFBE1FF88314F148A2EE89987351DB78EC95CB86
        Uniqueness

        Uniqueness Score: -1.00%

        Memory Dump Source
        • Source File: 00000000.00000002.1315748414.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.1315726341.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1315797245.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1315866720.0000000000481000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1315886388.0000000000486000.00000020.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1316099028.0000000000574000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1316117567.0000000000575000.00000020.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1316302693.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_je9t0bDEVN.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: fe52bac06ce16e9f08cb5d1657a55b984f032921874ae6b4bfe86344577606a7
        • Instruction ID: 5205922cf9ee8d9f830a0e4fcf4c1b84075503156c1ebedd50a4de31efcdf8aa
        • Opcode Fuzzy Hash: fe52bac06ce16e9f08cb5d1657a55b984f032921874ae6b4bfe86344577606a7
        • Instruction Fuzzy Hash: 02E101757097228FC714CF18D4C066AB3E2FB89710F95892EE9C587341DA39EC86CB95
        Uniqueness

        Uniqueness Score: -1.00%

        Memory Dump Source
        • Source File: 00000000.00000002.1315748414.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.1315726341.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1315797245.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1315866720.0000000000481000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1315886388.0000000000486000.00000020.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1316099028.0000000000574000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1316117567.0000000000575000.00000020.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1316302693.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_je9t0bDEVN.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 4e9fc56ef6744bb48b4c3c38ccdbab8253d53d42572c6af067c01885487255db
        • Instruction ID: e0e66d06acfe6e258b093be2519e273b446996cb62d5353273c87f522a2b4494
        • Opcode Fuzzy Hash: 4e9fc56ef6744bb48b4c3c38ccdbab8253d53d42572c6af067c01885487255db
        • Instruction Fuzzy Hash: C2C1DE70A006068FCB25DE68C49077BB7A2AB45316F14461FDC96973B3D738AC4ECB99
        Uniqueness

        Uniqueness Score: -1.00%

        Memory Dump Source
        • Source File: 00000000.00000002.1315748414.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.1315726341.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1315797245.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1315866720.0000000000481000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1315886388.0000000000486000.00000020.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1316099028.0000000000574000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1316117567.0000000000575000.00000020.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1316302693.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_je9t0bDEVN.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 4358f8610f6fbda932ec621b2ed0b65dbfd117fa3365be1b162c4d85e0281d35
        • Instruction ID: a1fc2d1b20459c8ea81d049da993ad82d824ca4d26c46653cd6cd777e6700130
        • Opcode Fuzzy Hash: 4358f8610f6fbda932ec621b2ed0b65dbfd117fa3365be1b162c4d85e0281d35
        • Instruction Fuzzy Hash: 3EC18E70508346AFC714CF28C84479ABFA1BF65304F04866EE8999B782D374DA69CB96
        Uniqueness

        Uniqueness Score: -1.00%

        Memory Dump Source
        • Source File: 00000000.00000002.1315748414.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.1315726341.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1315797245.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1315866720.0000000000481000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1315886388.0000000000486000.00000020.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1316099028.0000000000574000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1316117567.0000000000575000.00000020.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1316302693.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_je9t0bDEVN.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 65edce4011fe75c152e4a205463254ef5ba32a3b434c594998cae668442aa820
        • Instruction ID: b113fd61868e8aad634375436d7b03f3a17f9b9befcc20123a0a138df9498c0b
        • Opcode Fuzzy Hash: 65edce4011fe75c152e4a205463254ef5ba32a3b434c594998cae668442aa820
        • Instruction Fuzzy Hash: 91512C70648341AFD754CF19C8C469BBBE2FFC8354F14892DE9C987221D738A9868F56
        Uniqueness

        Uniqueness Score: -1.00%

        Memory Dump Source
        • Source File: 00000000.00000002.1315748414.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.1315726341.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1315797245.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1315866720.0000000000481000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1315886388.0000000000486000.00000020.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1316099028.0000000000574000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1316117567.0000000000575000.00000020.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1316302693.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_je9t0bDEVN.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
        • Instruction ID: 5ff6d5aac768553640ef89d29a0b298d9d40fe2281b5596c48f46ad3c9f4012f
        • Opcode Fuzzy Hash: 567adef0f6a617ff7e9a8750fccc1eb3e230b1b82912df90697507ac2483188c
        • Instruction Fuzzy Hash: 7B115BB7A0084283F6148A2DD8B45BBE395EBF632173C437BD1414F758D12AE9419508
        Uniqueness

        Uniqueness Score: -1.00%

        Memory Dump Source
        • Source File: 00000000.00000002.1315748414.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.1315726341.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1315797245.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1315866720.0000000000481000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1315886388.0000000000486000.00000020.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1316099028.0000000000574000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1316117567.0000000000575000.00000020.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1316302693.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_je9t0bDEVN.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 56e2ec432e3fa899e311f0d4bf150ecb1f06816256eb7586fb62822e78b002ac
        • Instruction ID: 39fcc71c70fff29e980620cb4905b6456aefe93da48e3323eb7e6c99a290b9e8
        • Opcode Fuzzy Hash: 56e2ec432e3fa899e311f0d4bf150ecb1f06816256eb7586fb62822e78b002ac
        • Instruction Fuzzy Hash: 58219375684701AFE760CE25CCC5BABB7E2EFC4300F25882DE98946611D778E8869F16
        Uniqueness

        Uniqueness Score: -1.00%

        Memory Dump Source
        • Source File: 00000000.00000002.1315748414.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.1315726341.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1315797245.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1315866720.0000000000481000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1315886388.0000000000486000.00000020.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1316099028.0000000000574000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1316117567.0000000000575000.00000020.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1316302693.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_je9t0bDEVN.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 4785b5092675942952e50f51bc592a151422f09839d74c7d7987d06ff1cfb068
        • Instruction ID: 7f87f58e43202f9dbdd5d17cc8b52db53614b1c77595f0e37707a5d43118d75e
        • Opcode Fuzzy Hash: 4785b5092675942952e50f51bc592a151422f09839d74c7d7987d06ff1cfb068
        • Instruction Fuzzy Hash: D8E08C72A11628EBCB14DB89C94498AF3FCEB49F04F1104ABB501E3200D274EE00CBD5
        Uniqueness

        Uniqueness Score: -1.00%

        Memory Dump Source
        • Source File: 00000000.00000002.1315748414.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.1315726341.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1315797245.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1315866720.0000000000481000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1315886388.0000000000486000.00000020.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1316099028.0000000000574000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1316117567.0000000000575000.00000020.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1316302693.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_je9t0bDEVN.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 6263d25f185473e444c62492c9ca946ca6fcbb170d3b03874e94b62399f4701b
        • Instruction ID: 4627635b3231aa0e87d5e69636f9b2da7e22894808ceb0a1a3ecbc1a921b1ebd
        • Opcode Fuzzy Hash: 6263d25f185473e444c62492c9ca946ca6fcbb170d3b03874e94b62399f4701b
        • Instruction Fuzzy Hash: BEC08C35000D448ACE299D1086F13A63354E391783F90058EDA038B753DF9E9C8ADB45
        Uniqueness

        Uniqueness Score: -1.00%

        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1315748414.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.1315726341.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1315797245.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1315866720.0000000000481000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1315886388.0000000000486000.00000020.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1316099028.0000000000574000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1316117567.0000000000575000.00000020.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1316302693.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_je9t0bDEVN.jbxd
        Similarity
        • API ID:
        • String ID: RDG$UDG$\u0000$\u0001$\u0002$\u0003$\u0004$\u0005$\u0006$\u0007$\u000b$\u000e$\u000f$\u0010$\u0011$\u0012$\u0013$\u0014$\u0015$\u0016$\u0017$\u0018$\u0019$\u001a$\u001b$\u001c$\u001d$\u001e$\u001f$~CG
        • API String ID: 0-1616629490
        • Opcode ID: b661657e60387a2b417b4ce597c6e72426497a9096c612e9857eece28fac1638
        • Instruction ID: da643803d9f054d67c8a4598d5ef905c0e4847a55d69c73e800997069ed3fbc8
        • Opcode Fuzzy Hash: b661657e60387a2b417b4ce597c6e72426497a9096c612e9857eece28fac1638
        • Instruction Fuzzy Hash: 3971732170855253EB18481A499417A9283E7C9315A75C93F88EFEFBCEDB3D8C4B624F
        Uniqueness

        Uniqueness Score: -1.00%

        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1315748414.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.1315726341.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1315797245.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1315866720.0000000000481000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1315886388.0000000000486000.00000020.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1316099028.0000000000574000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1316117567.0000000000575000.00000020.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1316302693.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_je9t0bDEVN.jbxd
        Similarity
        • API ID: _strlen
        • String ID: RDG$\u0000$\u0001$\u0002$\u0003$\u0004$\u0005$\u0006$\u0007$\u000b$\u000e$\u000f$\u0010$\u0011$\u0012$\u0013$\u0014$\u0015$\u0016$\u0017$\u0018$\u0019$\u001a$\u001b$\u001c$\u001d$\u001e$\u001f$~CG$~CG
        • API String ID: 4218353326-1093896964
        • Opcode ID: 92a5daf4c030202617a3710e94bc8c88b02767ab8d9d58381f46ebd3cc8abb52
        • Instruction ID: 6b181d5586dadc95d50b7be9232f44eab00bf2f558148fb080e8d5cc10165189
        • Opcode Fuzzy Hash: 92a5daf4c030202617a3710e94bc8c88b02767ab8d9d58381f46ebd3cc8abb52
        • Instruction Fuzzy Hash: 6A419F21308152A3EB14485A099857A9287B7D4304674CC3F59AFEFBCEEB7C8C0B625F
        Uniqueness

        Uniqueness Score: -1.00%

        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1315748414.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.1315726341.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1315797245.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1315866720.0000000000481000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1315886388.0000000000486000.00000020.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1316099028.0000000000574000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1316117567.0000000000575000.00000020.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1316302693.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_je9t0bDEVN.jbxd
        Similarity
        • API ID: _strlen
        • String ID: %1.17g$BCG$BCG$BCG$BCG$[,]{: }$false$kCG$mCG$null$true
        • API String ID: 4218353326-3495153165
        • Opcode ID: c05c931bb5904fad45b61dc592e633befda1343face2e9083cf1dd9c69c39443
        • Instruction ID: 3e6c3027b6cb029422fa86bedfb9045099184e97cfa2bf22ab3905086238fa14
        • Opcode Fuzzy Hash: c05c931bb5904fad45b61dc592e633befda1343face2e9083cf1dd9c69c39443
        • Instruction Fuzzy Hash: 46B1D2727042126BC701A9798E5862BA1D65FD4308F19893FEC5AE33D1FABEDC01825E
        Uniqueness

        Uniqueness Score: -1.00%

        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1315748414.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.1315726341.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1315797245.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1315866720.0000000000481000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1315886388.0000000000486000.00000020.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1316099028.0000000000574000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1316117567.0000000000575000.00000020.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1316302693.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_je9t0bDEVN.jbxd
        Similarity
        • API ID: _strlen
        • String ID: %1.17g$,]{: }$BCG$BCG$kCG$mCG$null
        • API String ID: 4218353326-649788014
        • Opcode ID: 56c1205ad8d13971891afb8da1dd074e06fdef83645ec72ebdccc6115e09c005
        • Instruction ID: cf9e310160fdbfee2f39e531065648e0fb275fee0c287c661a1c7380e378875e
        • Opcode Fuzzy Hash: 56c1205ad8d13971891afb8da1dd074e06fdef83645ec72ebdccc6115e09c005
        • Instruction Fuzzy Hash: 77B1EDB2B042115BD70066765E8A63F61DA9A94348F08443FED0AF73D2FABDDD01829F
        Uniqueness

        Uniqueness Score: -1.00%

        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1315748414.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.1315726341.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1315797245.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1315866720.0000000000481000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1315886388.0000000000486000.00000020.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1316099028.0000000000574000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1316117567.0000000000575000.00000020.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1316302693.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_je9t0bDEVN.jbxd
        Similarity
        • API ID: _wctomb_s
        • String ID: RXQ$SXQ$*[$*[
        • API String ID: 2865277502-682523798
        • Opcode ID: 5840aa146876ea4c3533823f37edeebc54f033845f5ea1b41a46b80ed5dc3808
        • Instruction ID: e225e6e02604ca249743332e38f7e562f38d4f17e491d65ad27427a622be7079
        • Opcode Fuzzy Hash: 5840aa146876ea4c3533823f37edeebc54f033845f5ea1b41a46b80ed5dc3808
        • Instruction Fuzzy Hash: 81817AB0745B28A7DB243718BDC663E7594AB10700FA5892FF145C93E0F2BECA854A4F
        Uniqueness

        Uniqueness Score: -1.00%

        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1315748414.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.1315726341.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1315797245.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1315866720.0000000000481000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1315886388.0000000000486000.00000020.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1316099028.0000000000574000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1316117567.0000000000575000.00000020.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1316302693.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_je9t0bDEVN.jbxd
        Similarity
        • API ID:
        • String ID: 1Bd$2Bd$2Bd$v?
        • API String ID: 0-2387898446
        • Opcode ID: 6c1f02026cb3473c19bc16c1edc72fe3f9d4ef045a53b2ce126227c9656bd19f
        • Instruction ID: 0bec1263e9e74890287c492917e64c1498b3282183b8f6c61483c19dd5e6f1c7
        • Opcode Fuzzy Hash: 6c1f02026cb3473c19bc16c1edc72fe3f9d4ef045a53b2ce126227c9656bd19f
        • Instruction Fuzzy Hash: D8F117B190C301AFC7249F18C4815AEBEE0AB58745F14482FF489DB395D638CEC59B5B
        Uniqueness

        Uniqueness Score: -1.00%

        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1315748414.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000000.00000002.1315726341.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1315797245.0000000000474000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1315866720.0000000000481000.00000008.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1315886388.0000000000486000.00000020.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1316099028.0000000000574000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1316117567.0000000000575000.00000020.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.1316302693.00000000007D7000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_400000_je9t0bDEVN.jbxd
        Similarity
        • API ID:
        • String ID: 1Bd$2Bd$v?$v?
        • API String ID: 0-3836783068
        • Opcode ID: d189a21a89ebebfcc92cd6fe936fda9a21cb4e1e1c2abb84037056e414036459
        • Instruction ID: 403d4f7ca9f8282439483ec99260de99c8cd5df303c45e2ea85c42a292c27855
        • Opcode Fuzzy Hash: d189a21a89ebebfcc92cd6fe936fda9a21cb4e1e1c2abb84037056e414036459
        • Instruction Fuzzy Hash: 6E9160715082418AD7288F58C48453EB6F5AB84304F65897FE8D6EBBF0D73CC9829B5B
        Uniqueness

        Uniqueness Score: -1.00%