Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
ranger.exe

Overview

General Information

Sample name:ranger.exe
Analysis ID:1446995
MD5:b3ba78b4f562d45a5bda794b03f2e214
SHA1:720608bd51cdf1f346b0abf3eb8bc226780a34ec
SHA256:948a274743d75bf229fe26ad36fb41d64914e349341513aa2f5fb6b48e5c1eeb
Tags:exemetasploitrozenashellcode
Infos:

Detection

Metasploit
Score:96
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected Metasploit Payload
AI detected suspicious sample
Machine Learning detection for sample
Found inlined nop instructions (likely shell or obfuscated code)
Internet Provider seen in connection with other malware
Program does not show much activity (idle)
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • ranger.exe (PID: 5916 cmdline: "C:\Users\user\Desktop\ranger.exe" MD5: B3BA78B4F562D45A5BDA794B03F2E214)
  • cleanup
{"Type": "Metasploit Connect", "IP": "185.228.139.123", "Port": 80}
SourceRuleDescriptionAuthorStrings
ranger.exeJoeSecurity_MetasploitPayload_3Yara detected Metasploit PayloadJoe Security
    ranger.exeJoeSecurity_MetasploitPayloadYara detected Metasploit PayloadJoe Security
      ranger.exeWindows_Trojan_Metasploit_4a1c4da8Identifies Metasploit 64 bit reverse tcp shellcode.unknown
      • 0x7a02:$a: 6A 10 56 57 68 99 A5 74 61 FF D5 85 C0 74 0A FF 4E 08
      SourceRuleDescriptionAuthorStrings
      00000000.00000000.1296152055.0000000000401000.00000020.00000001.01000000.00000003.sdmpJoeSecurity_MetasploitPayload_3Yara detected Metasploit PayloadJoe Security
        00000000.00000000.1296152055.0000000000401000.00000020.00000001.01000000.00000003.sdmpWindows_Trojan_Metasploit_4a1c4da8Identifies Metasploit 64 bit reverse tcp shellcode.unknown
        • 0x6a02:$a: 6A 10 56 57 68 99 A5 74 61 FF D5 85 C0 74 0A FF 4E 08
        00000000.00000002.2538018061.0000000000470000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_MetasploitPayload_3Yara detected Metasploit PayloadJoe Security
          00000000.00000002.2538018061.0000000000470000.00000040.00001000.00020000.00000000.sdmpWindows_Trojan_Metasploit_4a1c4da8Identifies Metasploit 64 bit reverse tcp shellcode.unknown
          • 0xd8:$a: 6A 10 56 57 68 99 A5 74 61 FF D5 85 C0 74 0A FF 4E 08
          00000000.00000002.2537923110.0000000000401000.00000020.00000001.01000000.00000003.sdmpJoeSecurity_MetasploitPayload_3Yara detected Metasploit PayloadJoe Security
            Click to see the 1 entries
            SourceRuleDescriptionAuthorStrings
            0.0.ranger.exe.400000.0.unpackJoeSecurity_MetasploitPayload_3Yara detected Metasploit PayloadJoe Security
              0.0.ranger.exe.400000.0.unpackJoeSecurity_MetasploitPayloadYara detected Metasploit PayloadJoe Security
                0.0.ranger.exe.400000.0.unpackWindows_Trojan_Metasploit_4a1c4da8Identifies Metasploit 64 bit reverse tcp shellcode.unknown
                • 0x7a02:$a: 6A 10 56 57 68 99 A5 74 61 FF D5 85 C0 74 0A FF 4E 08
                0.2.ranger.exe.400000.0.unpackJoeSecurity_MetasploitPayload_3Yara detected Metasploit PayloadJoe Security
                  0.2.ranger.exe.400000.0.unpackJoeSecurity_MetasploitPayloadYara detected Metasploit PayloadJoe Security
                    Click to see the 1 entries
                    No Sigma rule has matched
                    No Snort rule has matched

                    Click to jump to signature section

                    Show All Signature Results

                    AV Detection

                    barindex
                    Source: ranger.exeAvira: detected
                    Source: ranger.exeMalware Configuration Extractor: Metasploit {"Type": "Metasploit Connect", "IP": "185.228.139.123", "Port": 80}
                    Source: ranger.exeReversingLabs: Detection: 86%
                    Source: ranger.exeVirustotal: Detection: 86%Perma Link
                    Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.6% probability
                    Source: ranger.exeJoe Sandbox ML: detected
                    Source: ranger.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                    Source: Binary string: C:\local0\asf\release\build-2.2.14\support\Release\ab.pdb source: ranger.exe
                    Source: C:\Users\user\Desktop\ranger.exeCode function: 4x nop then stc 0_2_00408340
                    Source: C:\Users\user\Desktop\ranger.exeCode function: 4x nop then cmp al, 0Dh0_2_00406D47
                    Source: C:\Users\user\Desktop\ranger.exeCode function: 4x nop then push ebp0_2_00406D8A
                    Source: Joe Sandbox ViewASN Name: NETCUP-ASnetcupGmbHDE NETCUP-ASnetcupGmbHDE
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.228.139.123
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.228.139.123
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.228.139.123
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.228.139.123
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.228.139.123
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.228.139.123
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.228.139.123
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.228.139.123
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.228.139.123
                    Source: unknownTCP traffic detected without corresponding DNS query: 185.228.139.123
                    Source: C:\Users\user\Desktop\ranger.exeCode function: 0_2_00470095 WSASocketA,connect,recv,closesocket,0_2_00470095
                    Source: ranger.exeString found in binary or memory: http://www.apache.org/
                    Source: ranger.exeString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0
                    Source: ranger.exeString found in binary or memory: http://www.zeustech.net/

                    System Summary

                    barindex
                    Source: ranger.exe, type: SAMPLEMatched rule: Identifies Metasploit 64 bit reverse tcp shellcode. Author: unknown
                    Source: 0.0.ranger.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Identifies Metasploit 64 bit reverse tcp shellcode. Author: unknown
                    Source: 0.2.ranger.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Identifies Metasploit 64 bit reverse tcp shellcode. Author: unknown
                    Source: 00000000.00000000.1296152055.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Identifies Metasploit 64 bit reverse tcp shellcode. Author: unknown
                    Source: 00000000.00000002.2538018061.0000000000470000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies Metasploit 64 bit reverse tcp shellcode. Author: unknown
                    Source: 00000000.00000002.2537923110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Identifies Metasploit 64 bit reverse tcp shellcode. Author: unknown
                    Source: ranger.exe, 00000000.00000000.1296199197.0000000000415000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameab.exeF vs ranger.exe
                    Source: ranger.exeBinary or memory string: OriginalFilenameab.exeF vs ranger.exe
                    Source: ranger.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                    Source: ranger.exe, type: SAMPLEMatched rule: Windows_Trojan_Metasploit_4a1c4da8 reference_sample = 9582d37ed9de522472abe615dedef69282a40cfd58185813c1215249c24bbf22, os = windows, severity = x86, description = Identifies Metasploit 64 bit reverse tcp shellcode., creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 7a31ce858215f0a8732ce6314bfdbc3975f1321e3f87d7f4dc5a525f15766987, id = 4a1c4da8-837d-4ad1-a672-ddb8ba074936, last_modified = 2021-08-23
                    Source: 0.0.ranger.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Metasploit_4a1c4da8 reference_sample = 9582d37ed9de522472abe615dedef69282a40cfd58185813c1215249c24bbf22, os = windows, severity = x86, description = Identifies Metasploit 64 bit reverse tcp shellcode., creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 7a31ce858215f0a8732ce6314bfdbc3975f1321e3f87d7f4dc5a525f15766987, id = 4a1c4da8-837d-4ad1-a672-ddb8ba074936, last_modified = 2021-08-23
                    Source: 0.2.ranger.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Metasploit_4a1c4da8 reference_sample = 9582d37ed9de522472abe615dedef69282a40cfd58185813c1215249c24bbf22, os = windows, severity = x86, description = Identifies Metasploit 64 bit reverse tcp shellcode., creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 7a31ce858215f0a8732ce6314bfdbc3975f1321e3f87d7f4dc5a525f15766987, id = 4a1c4da8-837d-4ad1-a672-ddb8ba074936, last_modified = 2021-08-23
                    Source: 00000000.00000000.1296152055.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_4a1c4da8 reference_sample = 9582d37ed9de522472abe615dedef69282a40cfd58185813c1215249c24bbf22, os = windows, severity = x86, description = Identifies Metasploit 64 bit reverse tcp shellcode., creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 7a31ce858215f0a8732ce6314bfdbc3975f1321e3f87d7f4dc5a525f15766987, id = 4a1c4da8-837d-4ad1-a672-ddb8ba074936, last_modified = 2021-08-23
                    Source: 00000000.00000002.2538018061.0000000000470000.00000040.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_4a1c4da8 reference_sample = 9582d37ed9de522472abe615dedef69282a40cfd58185813c1215249c24bbf22, os = windows, severity = x86, description = Identifies Metasploit 64 bit reverse tcp shellcode., creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 7a31ce858215f0a8732ce6314bfdbc3975f1321e3f87d7f4dc5a525f15766987, id = 4a1c4da8-837d-4ad1-a672-ddb8ba074936, last_modified = 2021-08-23
                    Source: 00000000.00000002.2537923110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_4a1c4da8 reference_sample = 9582d37ed9de522472abe615dedef69282a40cfd58185813c1215249c24bbf22, os = windows, severity = x86, description = Identifies Metasploit 64 bit reverse tcp shellcode., creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = 7a31ce858215f0a8732ce6314bfdbc3975f1321e3f87d7f4dc5a525f15766987, id = 4a1c4da8-837d-4ad1-a672-ddb8ba074936, last_modified = 2021-08-23
                    Source: ranger.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: classification engineClassification label: mal96.troj.winEXE@1/0@0/1
                    Source: ranger.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    Source: C:\Users\user\Desktop\ranger.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                    Source: ranger.exeReversingLabs: Detection: 86%
                    Source: ranger.exeVirustotal: Detection: 86%
                    Source: C:\Users\user\Desktop\ranger.exeSection loaded: apphelp.dllJump to behavior
                    Source: C:\Users\user\Desktop\ranger.exeSection loaded: wsock32.dllJump to behavior
                    Source: C:\Users\user\Desktop\ranger.exeSection loaded: mswsock.dllJump to behavior
                    Source: ranger.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                    Source: Binary string: C:\local0\asf\release\build-2.2.14\support\Release\ab.pdb source: ranger.exe
                    Source: C:\Users\user\Desktop\ranger.exeCode function: 0_2_00404A48 pushfd ; ret 0_2_00404A51
                    Source: C:\Users\user\Desktop\ranger.exeCode function: 0_2_00405450 push eax; ret 0_2_00405505
                    Source: C:\Users\user\Desktop\ranger.exeCode function: 0_2_00401234 push eax; ret 0_2_00401253
                    Source: C:\Users\user\Desktop\ranger.exeCode function: 0_2_004010C7 push 3B04C483h; ret 0_2_004010CD
                    Source: C:\Users\user\Desktop\ranger.exeCode function: 0_2_00403890 push edx; ret 0_2_00403898
                    Source: C:\Users\user\Desktop\ranger.exeCode function: 0_2_00403494 push dword ptr [ecx-74h]; retn 0040h0_2_004034AA
                    Source: C:\Users\user\Desktop\ranger.exeCode function: 0_2_00404AB7 push ebx; retf 0_2_00404C8F
                    Source: C:\Users\user\Desktop\ranger.exeCode function: 0_2_00404B1B push ebx; retf 0_2_00404C8F
                    Source: C:\Users\user\Desktop\ranger.exeCode function: 0_2_00404B3D push ebx; retf 0_2_00404C8F
                    Source: C:\Users\user\Desktop\ranger.exeCode function: 0_2_0040753D push esi; ret 0_2_0040753E
                    Source: C:\Users\user\Desktop\ranger.exeCode function: 0_2_0040458C push ebx; iretd 0_2_0040459E
                    Source: C:\Users\user\Desktop\ranger.exeCode function: 0_2_00404BA5 push ebx; retf 0_2_00404C8F
                    Source: C:\Users\user\Desktop\ranger.exeCode function: 0_2_004031BF push ebp; retf 0_2_004031C1
                    Source: ranger.exeStatic PE information: section name: .text entropy: 7.007255130754283
                    Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
                    Source: ranger.exe, 00000000.00000002.2538097549.000000000069E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
                    Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
                    Source: C:\Users\user\Desktop\ranger.exeCode function: 0_2_004096C0 AllocateAndInitializeSid,0_2_004096C0

                    Remote Access Functionality

                    barindex
                    Source: Yara matchFile source: ranger.exe, type: SAMPLE
                    Source: Yara matchFile source: 0.0.ranger.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 0.2.ranger.exe.400000.0.unpack, type: UNPACKEDPE
                    Source: Yara matchFile source: 00000000.00000000.1296152055.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2538018061.0000000000470000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
                    Source: Yara matchFile source: 00000000.00000002.2537923110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
                    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                    Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
                    DLL Side-Loading
                    1
                    DLL Side-Loading
                    2
                    Software Packing
                    OS Credential Dumping1
                    Security Software Discovery
                    Remote ServicesData from Local System1
                    Ingress Tool Transfer
                    Exfiltration Over Other Network MediumAbuse Accessibility Features
                    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
                    DLL Side-Loading
                    LSASS Memory1
                    System Information Discovery
                    Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
                    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)3
                    Obfuscated Files or Information
                    Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
                    Hide Legend

                    Legend:

                    • Process
                    • Signature
                    • Created File
                    • DNS/IP Info
                    • Is Dropped
                    • Is Windows Process
                    • Number of created Registry Values
                    • Number of created Files
                    • Visual Basic
                    • Delphi
                    • Java
                    • .Net C# or VB.NET
                    • C, C++ or other language
                    • Is malicious
                    • Internet

                    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                    windows-stand
                    SourceDetectionScannerLabelLink
                    ranger.exe87%ReversingLabsWin32.Backdoor.Meterpreter
                    ranger.exe86%VirustotalBrowse
                    ranger.exe100%AviraTR/Patched.Gen2
                    ranger.exe100%Joe Sandbox ML
                    No Antivirus matches
                    No Antivirus matches
                    SourceDetectionScannerLabelLink
                    bg.microsoft.map.fastly.net0%VirustotalBrowse
                    SourceDetectionScannerLabelLink
                    http://www.apache.org/licenses/LICENSE-2.00%URL Reputationsafe
                    http://www.apache.org/0%URL Reputationsafe
                    http://www.zeustech.net/0%Avira URL Cloudsafe
                    http://www.zeustech.net/0%VirustotalBrowse
                    NameIPActiveMaliciousAntivirus DetectionReputation
                    bg.microsoft.map.fastly.net
                    199.232.210.172
                    truefalseunknown
                    NameSourceMaliciousAntivirus DetectionReputation
                    http://www.apache.org/licenses/LICENSE-2.0ranger.exefalse
                    • URL Reputation: safe
                    unknown
                    http://www.apache.org/ranger.exefalse
                    • URL Reputation: safe
                    unknown
                    http://www.zeustech.net/ranger.exefalse
                    • 0%, Virustotal, Browse
                    • Avira URL Cloud: safe
                    unknown
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    185.228.139.123
                    unknownGermany
                    197540NETCUP-ASnetcupGmbHDEtrue
                    Joe Sandbox version:40.0.0 Tourmaline
                    Analysis ID:1446995
                    Start date and time:2024-05-24 07:43:20 +02:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:0h 3m 52s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Number of analysed new started processes analysed:7
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample name:ranger.exe
                    Detection:MAL
                    Classification:mal96.troj.winEXE@1/0@0/1
                    EGA Information:
                    • Successful, ratio: 100%
                    HCA Information:
                    • Successful, ratio: 100%
                    • Number of executed functions: 2
                    • Number of non-executed functions: 4
                    Cookbook Comments:
                    • Found application associated with file extension: .exe
                    • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, ctldl.windowsupdate.com, wu-b-net.trafficmanager.net, fe3cr.delivery.mp.microsoft.com
                    • Not all processes where analyzed, report is missing behavior information
                    No simulations
                    No context
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    bg.microsoft.map.fastly.netrun.jsGet hashmaliciousUnknownBrowse
                    • 199.232.210.172
                    http://qyt8pi.krestologs.comGet hashmaliciousUnknownBrowse
                    • 199.232.210.172
                    http://birchflarechurch.comGet hashmaliciousUnknownBrowse
                    • 199.232.210.172
                    https://url.au.m.mimecastprotect.com/s/uuv2CgZowrsOpyOOc26VTV?domain=in.xero.comGet hashmaliciousUnknownBrowse
                    • 199.232.214.172
                    https://shop.ketochow.xyz/Get hashmaliciousUnknownBrowse
                    • 199.232.214.172
                    http://cctv.hotmail.cloudns.org/Get hashmaliciousUnknownBrowse
                    • 199.232.210.172
                    http://toenpocket.pro/Get hashmaliciousHTMLPhisherBrowse
                    • 199.232.210.172
                    http://ssl4837289ssl24663521542877.searchmarketingservices.dev/Get hashmaliciousUnknownBrowse
                    • 199.232.210.172
                    http://advanceweb-netzero-2023.square.site/Get hashmaliciousUnknownBrowse
                    • 199.232.214.172
                    http://095485843.weebly.com/Get hashmaliciousHTMLPhisherBrowse
                    • 199.232.214.172
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    NETCUP-ASnetcupGmbHDEfile.exeGet hashmaliciousCMSBruteBrowse
                    • 37.120.171.230
                    gtKVgxrJ22.exeGet hashmaliciousGurcu Stealer, WhiteSnake StealerBrowse
                    • 195.128.101.64
                    jXBjxhHQgR.exeGet hashmaliciousCMSBruteBrowse
                    • 5.45.98.188
                    INVOICE087667899.exeGet hashmaliciousUnknownBrowse
                    • 93.177.67.178
                    z8s945rPmZ.exeGet hashmaliciousSystemBCBrowse
                    • 185.243.11.41
                    does virginia have a no chase law for motorcycles 62848.jsGet hashmaliciousUnknownBrowse
                    • 46.38.249.148
                    http://92.60.39.76:9993/wr.exeGet hashmaliciousXmrigBrowse
                    • 92.60.39.76
                    http://92.60.39.76:9993/wr.exeGet hashmaliciousUnknownBrowse
                    • 92.60.39.76
                    http://92.60.39.76:9993/wr.exeGet hashmaliciousXmrigBrowse
                    • 92.60.39.76
                    c8sDO7umrx.exeGet hashmaliciousCMSBruteBrowse
                    • 92.60.37.105
                    No context
                    No context
                    No created / dropped files found
                    File type:PE32 executable (GUI) Intel 80386, for MS Windows
                    Entropy (8bit):6.315674186815128
                    TrID:
                    • Win32 Executable (generic) a (10002005/4) 99.96%
                    • Generic Win/DOS Executable (2004/3) 0.02%
                    • DOS Executable Generic (2002/1) 0.02%
                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                    File name:ranger.exe
                    File size:73'802 bytes
                    MD5:b3ba78b4f562d45a5bda794b03f2e214
                    SHA1:720608bd51cdf1f346b0abf3eb8bc226780a34ec
                    SHA256:948a274743d75bf229fe26ad36fb41d64914e349341513aa2f5fb6b48e5c1eeb
                    SHA512:0f98b51fb3ef7e08962a66827444387b3612f97e78c1261e3c3283f84a35c0693c56188297731b3dafc5532afe60f49f5f13d351aa1ce3372797088d248bef6d
                    SSDEEP:1536:IDNVZReFTL19sE42CAYIgWlAlQtMb+KR0Nc8QsJq39:KRU39DwQte0Nc8QsC9
                    TLSH:8873BF83D9C41122D295123D63763A76A970E5F63705D1AB3ACCCDE5DBC18B0A72A3C7
                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........8...Y...Y...Y...E...Y..TE...Y...F...Y...F...Y...Y...Y..TQ...Y...z...Y..._...Y..Rich.Y..................PE..L...8..J...........
                    Icon Hash:00928e8e8686b000
                    Entrypoint:0x4035c7
                    Entrypoint Section:.text
                    Digitally signed:false
                    Imagebase:0x400000
                    Subsystem:windows gui
                    Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                    DLL Characteristics:
                    Time Stamp:0x4AB6DF38 [Mon Sep 21 02:04:40 2009 UTC]
                    TLS Callbacks:
                    CLR (.Net) Version:
                    OS Version Major:4
                    OS Version Minor:0
                    File Version Major:4
                    File Version Minor:0
                    Subsystem Version Major:4
                    Subsystem Version Minor:0
                    Import Hash:481f47bbb2c9c21e108d65f52b04c448
                    Instruction
                    std
                    inc edx
                    cwde
                    xchg eax, edx
                    std
                    inc ebx
                    dec edx
                    inc ebx
                    aas
                    inc ecx
                    inc eax
                    xchg eax, ebx
                    clc
                    salc
                    dec edx
                    cmc
                    dec ebx
                    std
                    dec ecx
                    xchg eax, ecx
                    lahf
                    dec eax
                    stc
                    cld
                    stc
                    xchg eax, edx
                    xchg eax, ecx
                    std
                    dec ecx
                    dec eax
                    dec edx
                    stc
                    xchg eax, edx
                    cdq
                    aas
                    das
                    stc
                    inc eax
                    cld
                    dec edx
                    lahf
                    wait
                    dec ebx
                    xchg eax, ebx
                    daa
                    aaa
                    cld
                    wait
                    cdq
                    cdq
                    inc eax
                    inc ebx
                    cdq
                    nop
                    inc eax
                    aas
                    inc ecx
                    inc ecx
                    lahf
                    cdq
                    stc
                    lahf
                    stc
                    inc edx
                    dec ecx
                    aas
                    nop
                    salc
                    cdq
                    xchg eax, edx
                    cld
                    cwde
                    cmc
                    cmc
                    nop
                    lahf
                    clc
                    das
                    dec ebx
                    cld
                    cwde
                    aaa
                    cld
                    cdq
                    xchg eax, ecx
                    dec ebx
                    cdq
                    dec ebx
                    aas
                    nop
                    cld
                    inc ecx
                    cwde
                    aas
                    cld
                    inc ecx
                    dec ecx
                    das
                    inc eax
                    cwde
                    dec ecx
                    aaa
                    cdq
                    dec edx
                    inc ebx
                    nop
                    dec ebx
                    cdq
                    daa
                    daa
                    cld
                    lahf
                    cmc
                    inc ebx
                    dec ecx
                    aaa
                    dec edx
                    cwde
                    inc eax
                    clc
                    aaa
                    xchg eax, edx
                    inc ecx
                    aas
                    dec eax
                    nop
                    inc ebx
                    inc edx
                    dec eax
                    inc ebx
                    clc
                    cwde
                    std
                    dec ebx
                    inc eax
                    cmc
                    inc ebx
                    xchg eax, edx
                    xchg eax, ecx
                    inc ebx
                    cwde
                    daa
                    aaa
                    wait
                    dec eax
                    wait
                    stc
                    jmp 00007F3B38AF9201h
                    Programming Language:
                    • [EXP] VC++ 6.0 SP5 build 8804
                    NameVirtual AddressVirtual Size Is in Section
                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IMPORT0xc76c0x78.rdata
                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x150000x7c8.rsrc
                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                    IMAGE_DIRECTORY_ENTRY_DEBUG0xc1e00x1c.rdata
                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IAT0xc0000x1e0.rdata
                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                    .text0x10000xa9660xb0001209e3b964314a392bcca8a1d3c1b919False0.81494140625data7.007255130754283IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    .rdata0xc0000xfe60x100025d7ceee3aa85bb3e8c5174736f6f830False0.46142578125DOS executable (COM, 0x8C-variant)5.318390353744998IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    .data0xd0000x705c0x4000283b5f792323d57b9db4d2bcc46580f8False0.25634765625Matlab v4 mat-file (little endian) d, numeric, rows 0, columns 04.407841023203495IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    .rsrc0x150000x7c80x1000c13a9413aea7291b6fc85d75bfcde381False0.197998046875data1.958296025171192IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    NameRVASizeTypeLanguageCountryZLIB Complexity
                    RT_VERSION0x150600x768dataEnglishUnited States0.40189873417721517
                    DLLImport
                    MSVCRT.dll_iob, _except_handler3, __set_app_type, __p__fmode, __p__commode, _adjust_fdiv, __setusermatherr, _initterm, __getmainargs, __p___initenv, _XcptFilter, _exit, _onexit, __dllonexit, strrchr, wcsncmp, _close, wcslen, wcscpy, strerror, modf, strspn, realloc, __p__environ, __p__wenviron, _errno, free, strncmp, strstr, strncpy, _ftol, qsort, fopen, perror, fclose, fflush, calloc, malloc, signal, printf, _isctype, atoi, exit, __mb_cur_max, _pctype, strchr, fprintf, _controlfp, _strdup, _strnicmp
                    KERNEL32.dllPeekNamedPipe, ReadFile, WriteFile, LoadLibraryA, GetProcAddress, GetVersionExA, GetExitCodeProcess, TerminateProcess, LeaveCriticalSection, SetEvent, ReleaseMutex, EnterCriticalSection, DeleteCriticalSection, InitializeCriticalSection, CreateMutexA, GetFileType, SetLastError, FreeEnvironmentStringsW, GetEnvironmentStringsW, GlobalFree, GetCommandLineW, TlsAlloc, TlsFree, DuplicateHandle, GetCurrentProcess, SetHandleInformation, CloseHandle, GetSystemTimeAsFileTime, FileTimeToSystemTime, GetTimeZoneInformation, FileTimeToLocalFileTime, SystemTimeToFileTime, SystemTimeToTzSpecificLocalTime, Sleep, FormatMessageA, GetLastError, WaitForSingleObject, CreateEventA, SetStdHandle, SetFilePointer, CreateFileA, CreateFileW, GetOverlappedResult, DeviceIoControl, GetFileInformationByHandle, LocalFree
                    ADVAPI32.dllFreeSid, AllocateAndInitializeSid
                    WSOCK32.dllgetsockopt, connect, htons, gethostbyname, ntohl, inet_ntoa, setsockopt, socket, closesocket, select, ioctlsocket, __WSAFDIsSet, WSAStartup, WSACleanup, WSAGetLastError
                    WS2_32.dllWSARecv, WSASend
                    Language of compilation systemCountry where language is spokenMap
                    EnglishUnited States
                    TimestampSource PortDest PortSource IPDest IP
                    May 24, 2024 07:44:07.787215948 CEST4970680192.168.2.9185.228.139.123
                    May 24, 2024 07:44:07.875349998 CEST8049706185.228.139.123192.168.2.9
                    May 24, 2024 07:44:07.875422955 CEST4970680192.168.2.9185.228.139.123
                    May 24, 2024 07:44:59.939393044 CEST8049706185.228.139.123192.168.2.9
                    May 24, 2024 07:44:59.939517021 CEST4970680192.168.2.9185.228.139.123
                    May 24, 2024 07:44:59.940028906 CEST4970680192.168.2.9185.228.139.123
                    May 24, 2024 07:44:59.940944910 CEST4970980192.168.2.9185.228.139.123
                    May 24, 2024 07:44:59.987313986 CEST8049706185.228.139.123192.168.2.9
                    May 24, 2024 07:44:59.987328053 CEST8049709185.228.139.123192.168.2.9
                    May 24, 2024 07:44:59.987426996 CEST4970980192.168.2.9185.228.139.123
                    May 24, 2024 07:45:52.136352062 CEST8049709185.228.139.123192.168.2.9
                    May 24, 2024 07:45:52.136459112 CEST4970980192.168.2.9185.228.139.123
                    May 24, 2024 07:45:52.136852980 CEST4970980192.168.2.9185.228.139.123
                    May 24, 2024 07:45:52.137639999 CEST4971180192.168.2.9185.228.139.123
                    May 24, 2024 07:45:52.187855959 CEST8049709185.228.139.123192.168.2.9
                    May 24, 2024 07:45:52.239345074 CEST8049711185.228.139.123192.168.2.9
                    May 24, 2024 07:45:52.239440918 CEST4971180192.168.2.9185.228.139.123
                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                    May 24, 2024 07:44:04.014894962 CEST1.1.1.1192.168.2.90xffe1No error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false
                    May 24, 2024 07:44:04.014894962 CEST1.1.1.1192.168.2.90xffe1No error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false

                    Click to jump to process

                    Click to jump to process

                    Click to dive into process behavior distribution

                    Target ID:0
                    Start time:01:44:07
                    Start date:24/05/2024
                    Path:C:\Users\user\Desktop\ranger.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\Desktop\ranger.exe"
                    Imagebase:0x400000
                    File size:73'802 bytes
                    MD5 hash:B3BA78B4F562D45A5BDA794B03F2E214
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_MetasploitPayload_3, Description: Yara detected Metasploit Payload, Source: 00000000.00000000.1296152055.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Author: Joe Security
                    • Rule: Windows_Trojan_Metasploit_4a1c4da8, Description: Identifies Metasploit 64 bit reverse tcp shellcode., Source: 00000000.00000000.1296152055.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Author: unknown
                    • Rule: JoeSecurity_MetasploitPayload_3, Description: Yara detected Metasploit Payload, Source: 00000000.00000002.2538018061.0000000000470000.00000040.00001000.00020000.00000000.sdmp, Author: Joe Security
                    • Rule: Windows_Trojan_Metasploit_4a1c4da8, Description: Identifies Metasploit 64 bit reverse tcp shellcode., Source: 00000000.00000002.2538018061.0000000000470000.00000040.00001000.00020000.00000000.sdmp, Author: unknown
                    • Rule: JoeSecurity_MetasploitPayload_3, Description: Yara detected Metasploit Payload, Source: 00000000.00000002.2537923110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Author: Joe Security
                    • Rule: Windows_Trojan_Metasploit_4a1c4da8, Description: Identifies Metasploit 64 bit reverse tcp shellcode., Source: 00000000.00000002.2537923110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Author: unknown
                    Reputation:low
                    Has exited:false

                    Reset < >

                      Execution Graph

                      Execution Coverage:1%
                      Dynamic/Decrypted Code Coverage:19.6%
                      Signature Coverage:28.3%
                      Total number of Nodes:46
                      Total number of Limit Nodes:3
                      execution_graph 2125 4096c0 2129 4096df 2125->2129 2126 409715 AllocateAndInitializeSid 2128 40972e 2126->2128 2127 4096eb 2129->2126 2129->2127 2129->2129 2153 403583 2154 403585 2153->2154 2155 4077a9 VirtualAlloc 2154->2155 2156 40746d 2155->2156 2107 470000 2110 470095 2107->2110 2111 4700aa 2110->2111 2112 4700bc WSASocketA 2111->2112 2113 4700d8 connect 2112->2113 2114 4700f1 recv 2113->2114 2116 4700e7 2113->2116 2115 470139 closesocket 2114->2115 2114->2116 2115->2112 2115->2116 2116->2113 2116->2114 2116->2115 2117 470006 2116->2117 2145 4035c7 2146 4035c8 2145->2146 2149 4077a9 2146->2149 2150 4077b8 VirtualAlloc 2149->2150 2152 407814 2150->2152 2118 4077a9 2119 4077b8 VirtualAlloc 2118->2119 2121 407814 2119->2121 2133 40450e 2134 404554 exit 2133->2134 2135 404576 2134->2135 2122 40b64f 2124 40b664 _initterm 2122->2124 2157 40b590 2158 40b572 _ftol 2157->2158 2159 40b59d 2157->2159 2158->2157 2131 404551 exit 2132 404576 2131->2132 2130 4072b4 _isctype 2136 404b1b 2137 404b39 2136->2137 2138 404be2 realloc 2137->2138 2139 404bf7 2137->2139 2138->2139 2140 404b3d 2141 404b39 2140->2141 2142 404b0a 2140->2142 2143 404be2 realloc 2141->2143 2144 404bf7 2141->2144 2143->2144

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 0 470095-4700ba 3 4700bc-4700d7 WSASocketA 0->3 4 4700d8-4700e5 connect 3->4 5 4700e7-4700ea 4->5 6 4700f1-470101 recv 4->6 5->4 7 4700ec call 470158 5->7 8 470103-470117 6->8 9 470139-470146 closesocket 6->9 7->6 13 470118-470127 8->13 9->3 10 47014c 9->10 10->7 15 470151-470155 13->15 16 470129-470132 13->16 15->13 17 470157 15->17 16->9
                      APIs
                      • WSASocketA.WS2_32(E0DF0FEA,00000002,00000001,00000000,00000000,00000000,00000000,50000002,7B8BE4B9,0000000A,?,?,5F327377,00003233), ref: 004700D5
                      • connect.WS2_32(6174A599,?,?,00000010,?,?,5F327377,00003233), ref: 004700E1
                      • recv.WS2_32(5FC8D902,?,?,00000004,00000000,?,?,00000010,?,?,5F327377,00003233), ref: 004700FC
                      • closesocket.WS2_32(614D6E75,?,?,?,00000004,00000000,?,?,00000010,?,?,5F327377,00003233), ref: 0047013F
                      Memory Dump Source
                      • Source File: 00000000.00000002.2538018061.0000000000470000.00000040.00001000.00020000.00000000.sdmp, Offset: 00470000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_470000_ranger.jbxd
                      Yara matches
                      Similarity
                      • API ID: Socketclosesocketconnectrecv
                      • String ID:
                      • API String ID: 2083937939-0
                      • Opcode ID: 78a240933ab96728c5dc9555bb345a70a4f1775fe54495d84d48129fbbead5a6
                      • Instruction ID: 7d42c354ee123352bcc468e80ac63d3c8d6f2b90c996041e6eb53b869f462182
                      • Opcode Fuzzy Hash: 78a240933ab96728c5dc9555bb345a70a4f1775fe54495d84d48129fbbead5a6
                      • Instruction Fuzzy Hash: FF11C8B07812987EF53022629C07FBB391CCF427A4F508026BB49F91C1C596DC4081FE

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 18 4077a9-407806 VirtualAlloc 23 407814-407845 call 407925 18->23
                      APIs
                      • VirtualAlloc.KERNELBASE(E553A458,00000000,00000162,00001000,00000040), ref: 00407803
                      Memory Dump Source
                      • Source File: 00000000.00000002.2537923110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2537906977.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2537943554.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2537961298.000000000040D000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2537981590.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_ranger.jbxd
                      Yara matches
                      Similarity
                      • API ID: AllocVirtual
                      • String ID:
                      • API String ID: 4275171209-0
                      • Opcode ID: 8b4dda9d6e0752d71d6664b0e069297d8a983438b00fdef7484f8a6a88b6c0c5
                      • Instruction ID: ff6af022c30de7bc80645e6e4b0b047e52d8d7662dd4623266d3d6426063f488
                      • Opcode Fuzzy Hash: 8b4dda9d6e0752d71d6664b0e069297d8a983438b00fdef7484f8a6a88b6c0c5
                      • Instruction Fuzzy Hash: 3AD01726ECE144E6D81020502846BF4918E034FB82E2070B3A60A7B2C288BC7443726F

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 33 4096c0-4096e1 35 4096e3-4096e9 33->35 36 409715-40972c AllocateAndInitializeSid 33->36 37 4096f2 35->37 38 4096eb-4096f1 35->38 39 409736-409747 36->39 40 40972e-409735 36->40 41 4096f3-4096f4 37->41 41->41 42 4096f6-409714 41->42 42->36
                      APIs
                      • AllocateAndInitializeSid.ADVAPI32(000900C4,00000000,00000070,00000000,00000000), ref: 00409724
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.2537923110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2537906977.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2537943554.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2537961298.000000000040D000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2537981590.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_ranger.jbxd
                      Yara matches
                      Similarity
                      • API ID: AllocateInitialize
                      • String ID: $
                      • API String ID: 220217950-3993045852
                      • Opcode ID: b30f44a9c9545fb3e479613e7327a38c57f85cac3884b8f2074f27e003ce26d5
                      • Instruction ID: 9f21f2f8e28f9ba7ef0fd2d82806be0fd7f9991288bbf82db597968e6d322ebe
                      • Opcode Fuzzy Hash: b30f44a9c9545fb3e479613e7327a38c57f85cac3884b8f2074f27e003ce26d5
                      • Instruction Fuzzy Hash: 6D1126366043449FEB21CFA9CC82F9A7BA8EB41704F14016BEA45E7182E671AC06C799
                      Memory Dump Source
                      • Source File: 00000000.00000002.2537923110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2537906977.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2537943554.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2537961298.000000000040D000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2537981590.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_ranger.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 2ce21ad22f33cc97a5a66f1301cbd641d783eb70cd54a9315f7d3277d8151030
                      • Instruction ID: dcd29f07c6a451617191007dccec63cc218651642a74e631b6768df39110a1f8
                      • Opcode Fuzzy Hash: 2ce21ad22f33cc97a5a66f1301cbd641d783eb70cd54a9315f7d3277d8151030
                      • Instruction Fuzzy Hash: 0431C0725142058FC710DF28C8C2DA6BBF9FB46724B544299F9449B292CB75EC52CBA8
                      Memory Dump Source
                      • Source File: 00000000.00000002.2537923110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2537906977.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2537943554.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2537961298.000000000040D000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2537981590.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_ranger.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 955aed8223413d61c5448d5edc77541c6b6e5371e51ae8a21f456e9c8e41af11
                      • Instruction ID: d56f87a32a3bb9f789b357cd7f83a5475cae1e9904d69be73ccd2b2d2030c661
                      • Opcode Fuzzy Hash: 955aed8223413d61c5448d5edc77541c6b6e5371e51ae8a21f456e9c8e41af11
                      • Instruction Fuzzy Hash: 35E04F32501254ABDB149F899C00CE7F77CAE5A620B08506AF9449B2119171E8018BA4
                      Memory Dump Source
                      • Source File: 00000000.00000002.2537923110.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2537906977.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2537943554.000000000040C000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2537961298.000000000040D000.00000008.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2537981590.0000000000415000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_ranger.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 9ef6088ec42da2dd6fc2d43064fc6a9d7740cb6c3a057b789b9b0e23482d8fc2
                      • Instruction ID: f3f9175a962bf1d30adb7ca8c1d6f22e00b0b18df68a86f6f4808072faeb2077
                      • Opcode Fuzzy Hash: 9ef6088ec42da2dd6fc2d43064fc6a9d7740cb6c3a057b789b9b0e23482d8fc2
                      • Instruction Fuzzy Hash: BBE0DF3194C2888FDB01DFA4AC49FA4BBB8BB4A304F088066F908AB142C735D419DB84