Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
6TAV5gMNBX.exe

Overview

General Information

Sample name:6TAV5gMNBX.exe
renamed because original name is a hash value
Original sample name:32d333f7b733072c50f7b04988938d910c7f076eb5da0cdbfbab2fd31f98e438.exe
Analysis ID:1467025
MD5:048952d8b1eaba09adb0e0893fd0c718
SHA1:a7d9a7e891ff5b74b7f572f43fc055fbf11cd4f2
SHA256:32d333f7b733072c50f7b04988938d910c7f076eb5da0cdbfbab2fd31f98e438
Tags:exe
Infos:

Detection

Score:56
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
.NET source code references suspicious native API functions
Machine Learning detection for sample
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Checks if the current process is being debugged
One or more processes crash
PE file does not import any functions
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • 6TAV5gMNBX.exe (PID: 7116 cmdline: "C:\Users\user\Desktop\6TAV5gMNBX.exe" MD5: 048952D8B1EABA09ADB0E0893FD0C718)
    • WerFault.exe (PID: 5784 cmdline: C:\Windows\system32\WerFault.exe -u -p 7116 -s 808 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: 6TAV5gMNBX.exeReversingLabs: Detection: 70%
Source: 6TAV5gMNBX.exeJoe Sandbox ML: detected
Source: 6TAV5gMNBX.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Binary string: emsc.0.0__.tex `orlib.pdb source: 6TAV5gMNBX.exe, 00000000.00000002.2147480645.00000071D23F7000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: mscorlib.pdb source: 6TAV5gMNBX.exe, 00000000.00000002.2147678313.00000226882A0000.00000004.00000020.00020000.00000000.sdmp, 6TAV5gMNBX.exe, 00000000.00000002.2147678313.0000022688284000.00000004.00000020.00020000.00000000.sdmp, WER11BB.tmp.dmp.4.dr
Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdb source: 6TAV5gMNBX.exe, 00000000.00000002.2147678313.0000022688263000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Users\user\Desktop\6TAV5gMNBX.PDB source: 6TAV5gMNBX.exe, 00000000.00000002.2147678313.0000022688263000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Desktop\6TAV5gMNBX.PDB source: 6TAV5gMNBX.exe, 00000000.00000002.2147480645.00000071D23F7000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: lib.pdb source: 6TAV5gMNBX.exe, 00000000.00000002.2147678313.0000022688263000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: mscorlib.pdbpH source: WER11BB.tmp.dmp.4.dr
Source: Binary string: mscorlib.ni.pdb source: WER11BB.tmp.dmp.4.dr
Source: Binary string: \??\C:\Windows\mscorlib.pdb source: 6TAV5gMNBX.exe, 00000000.00000002.2147678313.0000022688263000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: qindoC:\Windows\mscorlib.pdb source: 6TAV5gMNBX.exe, 00000000.00000002.2147480645.00000071D23F7000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: mscorlib.ni.pdbRSDS7^3l source: WER11BB.tmp.dmp.4.dr
Source: Binary string: \??\C:\Windows\mscorlib.pdbk7 source: 6TAV5gMNBX.exe, 00000000.00000002.2147678313.0000022688263000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: 6TAV5gMNBX.PDB0 source: 6TAV5gMNBX.exe, 00000000.00000002.2147480645.00000071D23F7000.00000004.00000010.00020000.00000000.sdmp
Source: Amcache.hve.4.drString found in binary or memory: http://upx.sf.net
Source: C:\Users\user\Desktop\6TAV5gMNBX.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 7116 -s 808
Source: 6TAV5gMNBX.exeStatic PE information: No import functions for PE file found
Source: 6TAV5gMNBX.exe, 00000000.00000000.2007298631.00000226880A2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameAyijotefeceniduJ vs 6TAV5gMNBX.exe
Source: 6TAV5gMNBX.exeBinary or memory string: OriginalFilenameAyijotefeceniduJ vs 6TAV5gMNBX.exe
Source: classification engineClassification label: mal56.evad.winEXE@2/5@0/0
Source: C:\Users\user\Desktop\6TAV5gMNBX.exeMutant created: NULL
Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess7116
Source: C:\Windows\System32\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\ce267428-0e5a-480b-b3c8-35a840d619fcJump to behavior
Source: 6TAV5gMNBX.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\6TAV5gMNBX.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: 6TAV5gMNBX.exeReversingLabs: Detection: 70%
Source: C:\Users\user\Desktop\6TAV5gMNBX.exeFile read: C:\Users\user\Desktop\6TAV5gMNBX.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\6TAV5gMNBX.exe "C:\Users\user\Desktop\6TAV5gMNBX.exe"
Source: C:\Users\user\Desktop\6TAV5gMNBX.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 7116 -s 808
Source: C:\Users\user\Desktop\6TAV5gMNBX.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Users\user\Desktop\6TAV5gMNBX.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\6TAV5gMNBX.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\6TAV5gMNBX.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\6TAV5gMNBX.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\6TAV5gMNBX.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\6TAV5gMNBX.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\6TAV5gMNBX.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0A29FF9E-7F9C-4437-8B11-F424491E3931}\InprocServer32Jump to behavior
Source: C:\Users\user\Desktop\6TAV5gMNBX.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
Source: 6TAV5gMNBX.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: 6TAV5gMNBX.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: 6TAV5gMNBX.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: emsc.0.0__.tex `orlib.pdb source: 6TAV5gMNBX.exe, 00000000.00000002.2147480645.00000071D23F7000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: mscorlib.pdb source: 6TAV5gMNBX.exe, 00000000.00000002.2147678313.00000226882A0000.00000004.00000020.00020000.00000000.sdmp, 6TAV5gMNBX.exe, 00000000.00000002.2147678313.0000022688284000.00000004.00000020.00020000.00000000.sdmp, WER11BB.tmp.dmp.4.dr
Source: Binary string: \??\C:\Windows\symbols\dll\mscorlib.pdb source: 6TAV5gMNBX.exe, 00000000.00000002.2147678313.0000022688263000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: \??\C:\Users\user\Desktop\6TAV5gMNBX.PDB source: 6TAV5gMNBX.exe, 00000000.00000002.2147678313.0000022688263000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: C:\Users\user\Desktop\6TAV5gMNBX.PDB source: 6TAV5gMNBX.exe, 00000000.00000002.2147480645.00000071D23F7000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: lib.pdb source: 6TAV5gMNBX.exe, 00000000.00000002.2147678313.0000022688263000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: mscorlib.pdbpH source: WER11BB.tmp.dmp.4.dr
Source: Binary string: mscorlib.ni.pdb source: WER11BB.tmp.dmp.4.dr
Source: Binary string: \??\C:\Windows\mscorlib.pdb source: 6TAV5gMNBX.exe, 00000000.00000002.2147678313.0000022688263000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: qindoC:\Windows\mscorlib.pdb source: 6TAV5gMNBX.exe, 00000000.00000002.2147480645.00000071D23F7000.00000004.00000010.00020000.00000000.sdmp
Source: Binary string: mscorlib.ni.pdbRSDS7^3l source: WER11BB.tmp.dmp.4.dr
Source: Binary string: \??\C:\Windows\mscorlib.pdbk7 source: 6TAV5gMNBX.exe, 00000000.00000002.2147678313.0000022688263000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: 6TAV5gMNBX.PDB0 source: 6TAV5gMNBX.exe, 00000000.00000002.2147480645.00000071D23F7000.00000004.00000010.00020000.00000000.sdmp
Source: 6TAV5gMNBX.exeStatic PE information: 0x9B9359DD [Mon Sep 16 18:47:57 2052 UTC]
Source: C:\Users\user\Desktop\6TAV5gMNBX.exeCode function: 0_2_00007FF848F300BD pushad ; iretd 0_2_00007FF848F300C1
Source: C:\Users\user\Desktop\6TAV5gMNBX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\6TAV5gMNBX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\6TAV5gMNBX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\6TAV5gMNBX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\6TAV5gMNBX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\6TAV5gMNBX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\6TAV5gMNBX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\6TAV5gMNBX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\6TAV5gMNBX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\6TAV5gMNBX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\6TAV5gMNBX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\6TAV5gMNBX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\6TAV5gMNBX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\6TAV5gMNBX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\6TAV5gMNBX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\6TAV5gMNBX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\6TAV5gMNBX.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\6TAV5gMNBX.exeMemory allocated: 226883D0000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\6TAV5gMNBX.exeMemory allocated: 226A1DC0000 memory reserve | memory write watchJump to behavior
Source: Amcache.hve.4.drBinary or memory string: VMware
Source: Amcache.hve.4.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.4.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.4.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.4.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.4.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.4.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.4.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.4.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.4.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.4.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.4.drBinary or memory string: vmci.sys
Source: Amcache.hve.4.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.4.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.4.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.4.drBinary or memory string: VMware20,1
Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.4.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.4.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.4.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.4.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.4.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.4.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.4.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.4.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.4.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Users\user\Desktop\6TAV5gMNBX.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\6TAV5gMNBX.exeProcess queried: DebugPortJump to behavior
Source: C:\Users\user\Desktop\6TAV5gMNBX.exeMemory allocated: page read and write | page guardJump to behavior

HIPS / PFW / Operating System Protection Evasion

barindex
Source: 6TAV5gMNBX.exe, ----.csReference to suspicious API methods: GetProcAddress(_FDE7_066B_FDD3_06D8_FDEA, _FDDE_FBC1_FDFF_FD49_FBC1_FBC5_FD43_0619)
Source: 6TAV5gMNBX.exe, ----.csReference to suspicious API methods: VirtualProtect(procAddress, (uint)_FBC5_FDD3.Length, 64u, out var _FDE2_0652_FDEE_0670)
Source: 6TAV5gMNBX.exe, ----.csReference to suspicious API methods: LoadLibrary(_FDDB_0600_064D_060E(_FDD4_06ED_FDCB_064D_FDC9._FDD6_065F_FD90))
Source: C:\Users\user\Desktop\6TAV5gMNBX.exeQueries volume information: C:\Users\user\Desktop\6TAV5gMNBX.exe VolumeInformationJump to behavior
Source: Amcache.hve.4.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: MsMpEng.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
Native API
1
DLL Side-Loading
1
Process Injection
2
Virtualization/Sandbox Evasion
OS Credential Dumping21
Security Software Discovery
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Disable or Modify Tools
LSASS Memory2
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Process Injection
Security Account Manager11
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Timestomp
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
DLL Side-Loading
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
Obfuscated Files or Information
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
6TAV5gMNBX.exe71%ReversingLabsByteCode-MSIL.Trojan.Zilla
6TAV5gMNBX.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://upx.sf.net0%URL Reputationsafe
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://upx.sf.netAmcache.hve.4.drfalse
  • URL Reputation: safe
unknown
No contacted IP infos
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1467025
Start date and time:2024-07-03 16:33:54 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 1s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:9
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:6TAV5gMNBX.exe
renamed because original name is a hash value
Original Sample Name:32d333f7b733072c50f7b04988938d910c7f076eb5da0cdbfbab2fd31f98e438.exe
Detection:MAL
Classification:mal56.evad.winEXE@2/5@0/0
EGA Information:Failed
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 10
  • Number of non-executed functions: 0
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
  • Excluded IPs from analysis (whitelisted): 20.189.173.20
  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, onedsblobprdwus15.westus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
  • Execution Graph export aborted for target 6TAV5gMNBX.exe, PID 7116 because it is empty
  • Report size getting too big, too many NtSetInformationFile calls found.
  • VT rate limit hit for: 6TAV5gMNBX.exe
TimeTypeDescription
10:34:54API Interceptor1x Sleep call for process: WerFault.exe modified
No context
No context
No context
No context
No context
Process:C:\Windows\System32\WerFault.exe
File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
Category:dropped
Size (bytes):65536
Entropy (8bit):0.8763977063465423
Encrypted:false
SSDEEP:96:5i0FYbjGxxIW3+a/nHsVEDlMldgxGvLcQXIDcQfc61ErcE9cw3smW+BHUHZ0ownI:bWveo6nnkD0xeHPaWQzuiFUZ24lO8kb
MD5:9BE4B7EC123DB1108D2769DE8944F493
SHA1:811D228145EFAB579DA4A2CCF12C3AEBAAE4DFAE
SHA-256:9A5BAA11B5DFA68C10BCFF9AB598145EEA7958206B32994BFAA26BFBF06D4B08
SHA-512:F6D19D5704164994362A155270938C162652C9ACF6C288AF1B3395E8E9C9B18B5C54185E967789804DC1F4CD2C2C6B2180EDA10F587594BCF7350236A7522919
Malicious:true
Reputation:low
Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.C.L.R.2.0.r.3.....E.v.e.n.t.T.i.m.e.=.1.3.3.6.4.4.9.0.8.8.1.5.7.8.0.2.1.8.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.6.4.4.9.0.8.8.2.1.4.0.5.1.9.3.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.2.a.4.0.b.3.1.a.-.c.8.2.e.-.4.1.b.a.-.8.6.7.3.-.a.a.5.c.7.5.e.e.1.3.7.5.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.b.1.1.4.a.6.7.1.-.5.b.b.f.-.4.5.f.1.-.b.b.0.b.-.8.6.7.7.9.7.9.f.e.2.8.8.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.6.T.A.V.5.g.M.N.B.X...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.A.y.i.j.o.t.e.f.e.c.e.n.i.d.u.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.b.c.c.-.0.0.0.1.-.0.0.1.4.-.1.c.6.5.-.9.c.2.3.5.6.c.d.d.a.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.a.0.0.6.5.4.3.6.a.3.7.f.4.e.a.8.8.0.f.e.7.0.a.3.f.c.9.7.0.f.a.7.0.0.0.0.0.0.0.0.!.0.0.0.0.a.7.d.9.a.7.e.8.9.1.f.f.5.b.7.4.b.7.f.5.7.2.f.4.3.f.c.0.5.5.f.b.f.1.1.c.d.4.f.2.!.6.T.A.V.5.g.M.N.
Process:C:\Windows\System32\WerFault.exe
File Type:Mini DuMP crash report, 16 streams, Wed Jul 3 14:34:41 2024, 0x1205a4 type
Category:dropped
Size (bytes):243657
Entropy (8bit):2.926390340556456
Encrypted:false
SSDEEP:1536:oy27Ozx55csodY44Vui7YuvVDZ9jCC8jH/rXJ8vmXh5+vMG:oJOznexKhYuvVV1CCqz58g3+vx
MD5:71968C6DBC79FC569D13AC383BE3999B
SHA1:697C0D36A133540B6E3A8BC19E9BA40AB61AE6B3
SHA-256:4782C62EB0924E237D1AD43CACF6DD3C41465338D8BCE7EDF4A15FA6B32E3369
SHA-512:9AB0136B8892F735D7B8956E076BCC650FD1A8C190CBFB73B5D04A339968A0BF848025F6E7EDE9F0509BC21AA573A479A22854A1D14740EC4D20BD61AEE3063F
Malicious:false
Reputation:low
Preview:MDMP..a..... ........a.f....................................$...........L...........t....O..........l.......8...........T............ ..............\...........H...............................................................................eJ..............Lw......................T............a.f.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...........................................................................................................................................................................................................................................................................................................................................................................................................................
Process:C:\Windows\System32\WerFault.exe
File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
Category:dropped
Size (bytes):8618
Entropy (8bit):3.705770593894538
Encrypted:false
SSDEEP:192:R6l7wVeJm26DsqJ6YEIbw2gmfZPdxy37prH89btcmfBvvvm:R6lXJn8sqJ6YEEw2gmfset1fpm
MD5:BE948AA4B8B44A6F4F5BCDDF4B629000
SHA1:C6CD52D8F36791A1D1D0121B6EEF22E52219B24E
SHA-256:67D78C42F6C72AFA242B52805C358D1AFBC0C5BAF3E159C5E54E0F2280DDF538
SHA-512:567A874A3A8B783B7ED9A66F35E9406E0EFA793EE5AB0ADF652DEA3DF615847FB39507E54D8085E261AF154C06703DB820BC692DC10B7DDBDC25E868E8721E3E
Malicious:false
Reputation:low
Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.7.1.1.6.<./.P.i.
Process:C:\Windows\System32\WerFault.exe
File Type:XML 1.0 document, ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):4824
Entropy (8bit):4.531393634449182
Encrypted:false
SSDEEP:48:cvIwWl8zsSJg771I9BOWpW8VY5Ym8M4Jc9SEGF3yq8v+9SExtmD7YMid:uIjfgI7Ov7V5JcJoW+JxA7YMid
MD5:9251F1E06E23A7D30845507EFB33B544
SHA1:CE0E35008BECA24DBAA2DA93DF8F51F6FB75E8B3
SHA-256:6464CADBF21A43A7330D9EC9223FF87BB0D4D8FA35150AEBAC228E025EB2BB6E
SHA-512:EE87DF36EED75B914B588BEE1C799A6E5E4A481A50902855C4628F81FB89FEDE8562A3D3E62B988281FD99A1C46BFD315E4A77F9591383AC9C397AC612F13EC2
Malicious:false
Reputation:low
Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="394897" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
Process:C:\Windows\System32\WerFault.exe
File Type:MS Windows registry file, NT/2000 or above
Category:dropped
Size (bytes):1835008
Entropy (8bit):4.4218628173750965
Encrypted:false
SSDEEP:6144:USvfpi6ceLP/9skLmb0OTbWSPHaJG8nAgeMZMMhA2fX4WABlEnNz0uhiTw:fvloTbW+EZMM6DFyx03w
MD5:A871F8164A01CE3C82E0689F7E0EE99F
SHA1:BE9F2A754BB83FBF6A6586C4B62BA646FDFC8182
SHA-256:44D259FF86353E2C5047CF988562934929F44E259BECCEC7AF80F33EA75E2CEE
SHA-512:5852906124A0942BA70C91045BB6A64B3681711C11FE33AAD7C905349C2E0C1506AD178BC16F60876E765CE2306E44AE83A025B7A05D62DD084FF09848724656
Malicious:false
Reputation:low
Preview:regf>...>....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm...#V...............................................................................................................................................................................................................................................................................................................................................F...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
File type:PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
Entropy (8bit):7.992684807441517
TrID:
  • Win64 Executable GUI (202006/5) 92.65%
  • Win64 Executable (generic) (12005/4) 5.51%
  • Generic Win/DOS Executable (2004/3) 0.92%
  • DOS Executable Generic (2002/1) 0.92%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:6TAV5gMNBX.exe
File size:617'288 bytes
MD5:048952d8b1eaba09adb0e0893fd0c718
SHA1:a7d9a7e891ff5b74b7f572f43fc055fbf11cd4f2
SHA256:32d333f7b733072c50f7b04988938d910c7f076eb5da0cdbfbab2fd31f98e438
SHA512:7c52ec9eb5f4e511766124cd9c6228f8690f37957627c36b5df4e975990fb0287a0cff6985290fcc675edbbe6c14b43e513c73a20e3ec028311982f23d201eae
SSDEEP:6144:2JSaXT/04Yw4JYUwiV4XZu3SpTUKVFPnqb2qc26GgswbJWKrggkYWVAXV7UuHHKG:eSs34UiCwsTUKFHh1RkYWOXvKgh3Of1C
TLSH:50D423ACB8B9C73DFCE601BD114F05C4A20D2F8383439B1994C696EE76641ADE6B0B5D
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d....Y............"...0.T:............... ....@...... ....................................`................................
Icon Hash:00928e8e8686b000
Entrypoint:0x400000
Entrypoint Section:
Digitally signed:false
Imagebase:0x400000
Subsystem:windows gui
Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Time Stamp:0x9B9359DD [Mon Sep 16 18:47:57 2052 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:4
OS Version Minor:0
File Version Major:4
File Version Minor:0
Subsystem Version Major:4
Subsystem Version Minor:0
Import Hash:
Instruction
dec ebp
pop edx
nop
add byte ptr [ebx], al
add byte ptr [eax], al
add byte ptr [eax+eax], al
add byte ptr [eax], al
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_RESOURCE0x60000x95c.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
IMAGE_DIRECTORY_ENTRY_DEBUG0x5a380x1c.text
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x00x0
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20000x48.text
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x20000x3a540x3c000f77674ce584ba46313419ee5e582ba2False0.6341796875data6.115539573307815IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.rsrc0x60000x95c0xa007a4948eb7297eee5b94fa02472e6bd1fFalse0.30390625data4.3308962521390715IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_VERSION0x60b80x35cdata0.49767441860465117
RT_VERSION0x64140x35cdataEnglishUnited States0.49767441860465117
RT_MANIFEST0x67700x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
Language of compilation systemCountry where language is spokenMap
EnglishUnited States
No network behavior found

Click to jump to process

Click to jump to process

Click to dive into process behavior distribution

Click to jump to process

Target ID:0
Start time:10:34:40
Start date:03/07/2024
Path:C:\Users\user\Desktop\6TAV5gMNBX.exe
Wow64 process (32bit):false
Commandline:"C:\Users\user\Desktop\6TAV5gMNBX.exe"
Imagebase:0x226880a0000
File size:617'288 bytes
MD5 hash:048952D8B1EABA09ADB0E0893FD0C718
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:true

Target ID:4
Start time:10:34:41
Start date:03/07/2024
Path:C:\Windows\System32\WerFault.exe
Wow64 process (32bit):false
Commandline:C:\Windows\system32\WerFault.exe -u -p 7116 -s 808
Imagebase:0x7ff657930000
File size:570'736 bytes
MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Has exited:true

Reset < >
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2148392948.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff848f30000_6TAV5gMNBX.jbxd
    Similarity
    • API ID:
    • String ID: 2M_H
    • API String ID: 0-1174436252
    • Opcode ID: 2342f29be111c88382862cfd908bf14ed6529cb57ad518f9c66e505d3ec3baa6
    • Instruction ID: 4f72370b09cf088a6108bc9e03e143480e17b30dfc589f88a94962e8ade834f4
    • Opcode Fuzzy Hash: 2342f29be111c88382862cfd908bf14ed6529cb57ad518f9c66e505d3ec3baa6
    • Instruction Fuzzy Hash: 5371487191E68A1FE749B77898562F9BBC1EF86350F0401FBD8CAC71D3EA1968038785
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2148392948.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff848f30000_6TAV5gMNBX.jbxd
    Similarity
    • API ID:
    • String ID: 2M_H
    • API String ID: 0-1174436252
    • Opcode ID: f7ac7a2cac869dd5d56f6578fe4f1542b2d2cb65f716d285c9833fd5b8e40189
    • Instruction ID: 594630bc8d4a9070d17bb617d0e647ea860c9da7119b054204d3630d69a55933
    • Opcode Fuzzy Hash: f7ac7a2cac869dd5d56f6578fe4f1542b2d2cb65f716d285c9833fd5b8e40189
    • Instruction Fuzzy Hash: BB01449192E5C96FDB86F77C44662A87FD1FF5A240F4804FAE48DCB1E3E91858098345
    Memory Dump Source
    • Source File: 00000000.00000002.2148392948.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff848f30000_6TAV5gMNBX.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: c62d9053f54fec998057d861eb54f30957d3ef782afa269ea011085801095086
    • Instruction ID: 401dc0bd292eb6e1e3cc834696ecab5145c7661aa1dd9a405f516aa2fc48c841
    • Opcode Fuzzy Hash: c62d9053f54fec998057d861eb54f30957d3ef782afa269ea011085801095086
    • Instruction Fuzzy Hash: CE51473091DB881FDB52EB7884656EDBFF2EF89710F0801ABD449D3293CE286802C751
    Memory Dump Source
    • Source File: 00000000.00000002.2148392948.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff848f30000_6TAV5gMNBX.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: f1863bae89ff8f59080a993f679512dbb47f5b6eefcb36202388d10c8cb77e23
    • Instruction ID: 9874279f24fc86bafd68571afc7891da478bbca91de992b0bdacd56d83ae7534
    • Opcode Fuzzy Hash: f1863bae89ff8f59080a993f679512dbb47f5b6eefcb36202388d10c8cb77e23
    • Instruction Fuzzy Hash: 11313961D1EA9A1FE71A776868161B57BC4DF53690F0402BBCCDAC71D7E908A81383C5
    Memory Dump Source
    • Source File: 00000000.00000002.2148392948.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff848f30000_6TAV5gMNBX.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: c74302ef323586b2b7113037d06f867092f3c0b9ca501b46830e2c7447851986
    • Instruction ID: 4be5c507301710aa027ee55f7ee1c46c83b4efa8b2397d0c94be8bd3c0fc55f8
    • Opcode Fuzzy Hash: c74302ef323586b2b7113037d06f867092f3c0b9ca501b46830e2c7447851986
    • Instruction Fuzzy Hash: 56110031E1D84E4FE798F79CD8526FDB2D2EB88794F50017AD50ED32D6DE2868424784
    Memory Dump Source
    • Source File: 00000000.00000002.2148392948.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff848f30000_6TAV5gMNBX.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 46b6c7e745f522096d74ca3fb5d6771571d6aef026230f8f756b505dd46bcd08
    • Instruction ID: b05aff410985ee5bda6162234b3badaaeab1d12c9f343daad4f2911420ef8603
    • Opcode Fuzzy Hash: 46b6c7e745f522096d74ca3fb5d6771571d6aef026230f8f756b505dd46bcd08
    • Instruction Fuzzy Hash: B1115E6144F2CA0FE302A7B488A56A5BFA5DF97250F0905FBD0C9CB5E3DA0C64078362
    Memory Dump Source
    • Source File: 00000000.00000002.2148392948.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff848f30000_6TAV5gMNBX.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 21c1fa634cf2b17d84b3ab4aaacd0bcf20bbb5d718500b76ea8980f823e9c5e6
    • Instruction ID: ab89adb1f5dbd16ac38faadbd82f9e46daa5074753c621de91e3dcbe2666cd05
    • Opcode Fuzzy Hash: 21c1fa634cf2b17d84b3ab4aaacd0bcf20bbb5d718500b76ea8980f823e9c5e6
    • Instruction Fuzzy Hash: 9FE0D87290DA5C5FD654BA69AC469E67BA4EB82264F40005AF44DC7182D1216812C352
    Memory Dump Source
    • Source File: 00000000.00000002.2148392948.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff848f30000_6TAV5gMNBX.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 48028f0192db14abdc4e7040f5d98c75151b3b1944015f83a63a01e6a03294f5
    • Instruction ID: b2f17edf8bd42ba5b33e7b03475d1ac2c697b6577bcae971ebaf410cec1f4ea0
    • Opcode Fuzzy Hash: 48028f0192db14abdc4e7040f5d98c75151b3b1944015f83a63a01e6a03294f5
    • Instruction Fuzzy Hash: 9DE0263690C98C4FDB40BB58A8114A57B94FAC5308F00019AE41CC7191C6115515C341
    Memory Dump Source
    • Source File: 00000000.00000002.2148392948.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff848f30000_6TAV5gMNBX.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 50622a0d4a91569cce121f995341fcdd3e4427eabd08b991575d8c7d10d1fb30
    • Instruction ID: f217b3f27912c59f0b2d5c8758e5d6444d7cd1834f30f5c9d48bc75ee9dec87b
    • Opcode Fuzzy Hash: 50622a0d4a91569cce121f995341fcdd3e4427eabd08b991575d8c7d10d1fb30
    • Instruction Fuzzy Hash: 1AE0C232C4DE4D9FDB44BB69AC410D537A8FB49308F01055AE45CC3282E7269961C786
    Memory Dump Source
    • Source File: 00000000.00000002.2148392948.00007FF848F30000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F30000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff848f30000_6TAV5gMNBX.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 3a21be44a6cba1b5d752b7a5e79305dab86b75e3be0ff203f42cc3920426df6f
    • Instruction ID: 4e285e15665aa405b381dc77aa40debd926ee2492a3077314942ba741fa56b21
    • Opcode Fuzzy Hash: 3a21be44a6cba1b5d752b7a5e79305dab86b75e3be0ff203f42cc3920426df6f
    • Instruction Fuzzy Hash: EFE0C2A210E6884FCB41E7784CA41A07B91DF6720070805FEC0899B6B2E912280BC341