Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Implosions.exe

Overview

General Information

Sample name:Implosions.exe
Analysis ID:1504555
MD5:a6c832c593d36e46ce1be2e4a42756cb
SHA1:40b2dea8e1768aabe422cbc345a8130c00fe851c
SHA256:62c77e82284669dd53695088dd5598e499305aff3e39e63428527094892c0259
Tags:exe
Infos:

Detection

RedLine
Score:80
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected RedLine Stealer
AI detected suspicious sample
Machine Learning detection for sample
Allocates memory with a write watch (potentially for evading sandboxes)
Contains long sleeps (>= 3 min)
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Yara detected Credential Stealer
Yara signature match

Classification

  • System is w10x64
  • Implosions.exe (PID: 7840 cmdline: "C:\Users\user\Desktop\Implosions.exe" MD5: A6C832C593D36E46CE1BE2E4A42756CB)
    • conhost.exe (PID: 7848 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
RedLine StealerRedLine Stealer is a malware available on underground forums for sale apparently as a standalone ($100/$150 depending on the version) or also on a subscription basis ($100/month). This malware harvests information from browsers such as saved credentials, autocomplete data, and credit card information. A system inventory is also taken when running on a target machine, to include details such as the username, location data, hardware configuration, and information regarding installed security software. More recent versions of RedLine added the ability to steal cryptocurrency. FTP and IM clients are also apparently targeted by this family, and this malware has the ability to upload and download files, execute commands, and periodically send back information about the infected computer.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.redline_stealer
No configs have been found
SourceRuleDescriptionAuthorStrings
Implosions.exeJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
    Implosions.exeJoeSecurity_RedLineYara detected RedLine StealerJoe Security
      Implosions.exeMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
      • 0x1996f:$u7: RunPE
      • 0x19975:$u8: DownloadAndEx
      • 0x10d52:$pat14: , CommandLine:
      • 0x1b23f:$v2_2: get_ScanBrowsers
      • 0x1b27d:$v2_2: get_ScanFTP
      • 0x1b295:$v2_2: get_ScanWallets
      • 0x1b2b5:$v2_2: get_ScanScreen
      • 0x1b2d3:$v2_2: get_ScanTelegram
      • 0x1b2f5:$v2_2: get_ScanVPN
      • 0x1b30d:$v2_2: get_ScanSteam
      • 0x1b329:$v2_2: get_ScanDiscord
      • 0x1b3b1:$v2_2: get_ScanChromeBrowsersPaths
      • 0x1b3e9:$v2_2: get_ScanGeckoBrowsersPaths
      • 0x1b58b:$v2_2: get_ScannedWallets
      • 0x1b035:$v2_3: GetArguments
      • 0x1b064:$v2_4: VerifyUpdate
      • 0x1e35d:$v2_4: VerifyUpdate
      • 0x1b042:$v2_5: VerifyScanRequest
      • 0x1b059:$v2_6: GetUpdates
      • 0x1e346:$v2_6: GetUpdates
      SourceRuleDescriptionAuthorStrings
      00000000.00000000.1394819619.0000000000792000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
        00000000.00000000.1394819619.0000000000792000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_RedLineYara detected RedLine StealerJoe Security
          Process Memory Space: Implosions.exe PID: 7840JoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
            Process Memory Space: Implosions.exe PID: 7840JoeSecurity_RedLineYara detected RedLine StealerJoe Security
              SourceRuleDescriptionAuthorStrings
              0.0.Implosions.exe.790000.0.unpackJoeSecurity_CredentialStealerYara detected Credential StealerJoe Security
                0.0.Implosions.exe.790000.0.unpackJoeSecurity_RedLineYara detected RedLine StealerJoe Security
                  0.0.Implosions.exe.790000.0.unpackMALWARE_Win_RedLineDetects RedLine infostealerditekSHen
                  • 0x1996f:$u7: RunPE
                  • 0x19975:$u8: DownloadAndEx
                  • 0x10d52:$pat14: , CommandLine:
                  • 0x1b23f:$v2_2: get_ScanBrowsers
                  • 0x1b27d:$v2_2: get_ScanFTP
                  • 0x1b295:$v2_2: get_ScanWallets
                  • 0x1b2b5:$v2_2: get_ScanScreen
                  • 0x1b2d3:$v2_2: get_ScanTelegram
                  • 0x1b2f5:$v2_2: get_ScanVPN
                  • 0x1b30d:$v2_2: get_ScanSteam
                  • 0x1b329:$v2_2: get_ScanDiscord
                  • 0x1b3b1:$v2_2: get_ScanChromeBrowsersPaths
                  • 0x1b3e9:$v2_2: get_ScanGeckoBrowsersPaths
                  • 0x1b58b:$v2_2: get_ScannedWallets
                  • 0x1b035:$v2_3: GetArguments
                  • 0x1b064:$v2_4: VerifyUpdate
                  • 0x1e35d:$v2_4: VerifyUpdate
                  • 0x1b042:$v2_5: VerifyScanRequest
                  • 0x1b059:$v2_6: GetUpdates
                  • 0x1e346:$v2_6: GetUpdates
                  No Sigma rule has matched
                  No Suricata rule has matched

                  Click to jump to signature section

                  Show All Signature Results

                  AV Detection

                  barindex
                  Source: Implosions.exeAvira: detected
                  Source: Implosions.exeReversingLabs: Detection: 76%
                  Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.6% probability
                  Source: Implosions.exeJoe Sandbox ML: detected
                  Source: Implosions.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: Implosions.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                  Source: Implosions.exeString found in binary or memory: https://api.ip.sb/geoip%USERPEnvironmentROFILE%
                  Source: Implosions.exeString found in binary or memory: https://api.ipify.orgcookiesSaturnWalletWeb
                  Source: Implosions.exeString found in binary or memory: https://ipinfo.io/ip%appdata%

                  System Summary

                  barindex
                  Source: Implosions.exe, type: SAMPLEMatched rule: Detects RedLine infostealer Author: ditekSHen
                  Source: 0.0.Implosions.exe.790000.0.unpack, type: UNPACKEDPEMatched rule: Detects RedLine infostealer Author: ditekSHen
                  Source: Implosions.exe, 00000000.00000002.1435241827.0000000000E7E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs Implosions.exe
                  Source: Implosions.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                  Source: Implosions.exe, type: SAMPLEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                  Source: 0.0.Implosions.exe.790000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_RedLine snort2_sid = 920072-920073, author = ditekSHen, description = Detects RedLine infostealer, clamav_sig = MALWARE.Win.Trojan.RedLine-1, MALWARE.Win.Trojan.RedLine-2, snort3_sid = 920072-920073
                  Source: classification engineClassification label: mal80.troj.winEXE@2/1@0/0
                  Source: C:\Users\user\Desktop\Implosions.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\Implosions.exe.logJump to behavior
                  Source: C:\Users\user\Desktop\Implosions.exeMutant created: NULL
                  Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7848:120:WilError_03
                  Source: Implosions.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  Source: Implosions.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                  Source: C:\Users\user\Desktop\Implosions.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                  Source: Implosions.exeReversingLabs: Detection: 76%
                  Source: unknownProcess created: C:\Users\user\Desktop\Implosions.exe "C:\Users\user\Desktop\Implosions.exe"
                  Source: C:\Users\user\Desktop\Implosions.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Source: C:\Users\user\Desktop\Implosions.exeSection loaded: mscoree.dllJump to behavior
                  Source: C:\Users\user\Desktop\Implosions.exeSection loaded: apphelp.dllJump to behavior
                  Source: C:\Users\user\Desktop\Implosions.exeSection loaded: kernel.appcore.dllJump to behavior
                  Source: C:\Users\user\Desktop\Implosions.exeSection loaded: version.dllJump to behavior
                  Source: C:\Users\user\Desktop\Implosions.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\Implosions.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
                  Source: C:\Users\user\Desktop\Implosions.exeSection loaded: windows.storage.dllJump to behavior
                  Source: C:\Users\user\Desktop\Implosions.exeSection loaded: wldp.dllJump to behavior
                  Source: C:\Users\user\Desktop\Implosions.exeSection loaded: profapi.dllJump to behavior
                  Source: C:\Users\user\Desktop\Implosions.exeSection loaded: cryptsp.dllJump to behavior
                  Source: C:\Users\user\Desktop\Implosions.exeSection loaded: rsaenh.dllJump to behavior
                  Source: C:\Users\user\Desktop\Implosions.exeSection loaded: cryptbase.dllJump to behavior
                  Source: C:\Users\user\Desktop\Implosions.exeSection loaded: uxtheme.dllJump to behavior
                  Source: C:\Users\user\Desktop\Implosions.exeSection loaded: windowscodecs.dllJump to behavior
                  Source: C:\Users\user\Desktop\Implosions.exeSection loaded: dwrite.dllJump to behavior
                  Source: C:\Users\user\Desktop\Implosions.exeSection loaded: textinputframework.dllJump to behavior
                  Source: C:\Users\user\Desktop\Implosions.exeSection loaded: coreuicomponents.dllJump to behavior
                  Source: C:\Users\user\Desktop\Implosions.exeSection loaded: coremessaging.dllJump to behavior
                  Source: C:\Users\user\Desktop\Implosions.exeSection loaded: ntmarta.dllJump to behavior
                  Source: C:\Users\user\Desktop\Implosions.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\Desktop\Implosions.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\Desktop\Implosions.exeSection loaded: wintypes.dllJump to behavior
                  Source: C:\Users\user\Desktop\Implosions.exeSection loaded: textshaping.dllJump to behavior
                  Source: Window RecorderWindow detected: More than 3 window changes detected
                  Source: Implosions.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                  Source: Implosions.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                  Source: C:\Users\user\Desktop\Implosions.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Implosions.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Implosions.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Implosions.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Implosions.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Implosions.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Implosions.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Implosions.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Implosions.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Implosions.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Implosions.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Implosions.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Implosions.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Implosions.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Implosions.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Implosions.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Implosions.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Implosions.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Implosions.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Implosions.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Implosions.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Implosions.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Implosions.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Implosions.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Implosions.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Implosions.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Implosions.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Implosions.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Implosions.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Implosions.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Implosions.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Implosions.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Implosions.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Implosions.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Implosions.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Implosions.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Implosions.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Implosions.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                  Source: C:\Users\user\Desktop\Implosions.exeMemory allocated: 10E0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\Implosions.exeMemory allocated: 2AD0000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\Implosions.exeMemory allocated: 1160000 memory reserve | memory write watchJump to behavior
                  Source: C:\Users\user\Desktop\Implosions.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\Desktop\Implosions.exe TID: 7896Thread sleep time: -922337203685477s >= -30000sJump to behavior
                  Source: C:\Users\user\Desktop\Implosions.exeThread delayed: delay time: 922337203685477Jump to behavior
                  Source: C:\Users\user\Desktop\Implosions.exeMemory allocated: page read and write | page guardJump to behavior
                  Source: C:\Users\user\Desktop\Implosions.exeQueries volume information: C:\Users\user\Desktop\Implosions.exe VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Implosions.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Implosions.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Implosions.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceModel\v4.0_4.0.0.0__b77a5c561934e089\System.ServiceModel.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Implosions.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Implosions.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
                  Source: C:\Users\user\Desktop\Implosions.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                  Stealing of Sensitive Information

                  barindex
                  Source: Yara matchFile source: Implosions.exe, type: SAMPLE
                  Source: Yara matchFile source: 0.0.Implosions.exe.790000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000000.1394819619.0000000000792000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: Implosions.exe PID: 7840, type: MEMORYSTR
                  Source: Yara matchFile source: Implosions.exe, type: SAMPLE
                  Source: Yara matchFile source: 0.0.Implosions.exe.790000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000000.1394819619.0000000000792000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: Implosions.exe PID: 7840, type: MEMORYSTR

                  Remote Access Functionality

                  barindex
                  Source: Yara matchFile source: Implosions.exe, type: SAMPLE
                  Source: Yara matchFile source: 0.0.Implosions.exe.790000.0.unpack, type: UNPACKEDPE
                  Source: Yara matchFile source: 00000000.00000000.1394819619.0000000000792000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                  Source: Yara matchFile source: Process Memory Space: Implosions.exe PID: 7840, type: MEMORYSTR
                  ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                  Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
                  DLL Side-Loading
                  1
                  Process Injection
                  1
                  Masquerading
                  OS Credential Dumping31
                  Virtualization/Sandbox Evasion
                  Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
                  CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
                  DLL Side-Loading
                  1
                  Disable or Modify Tools
                  LSASS Memory12
                  System Information Discovery
                  Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
                  Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)31
                  Virtualization/Sandbox Evasion
                  Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
                  Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
                  Process Injection
                  NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
                  Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
                  DLL Side-Loading
                  LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
                  Hide Legend

                  Legend:

                  • Process
                  • Signature
                  • Created File
                  • DNS/IP Info
                  • Is Dropped
                  • Is Windows Process
                  • Number of created Registry Values
                  • Number of created Files
                  • Visual Basic
                  • Delphi
                  • Java
                  • .Net C# or VB.NET
                  • C, C++ or other language
                  • Is malicious
                  • Internet

                  This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                  windows-stand
                  SourceDetectionScannerLabelLink
                  Implosions.exe76%ReversingLabsByteCode-MSIL.Infostealer.RedLine
                  Implosions.exe100%AviraHEUR/AGEN.1305758
                  Implosions.exe100%Joe Sandbox ML
                  No Antivirus matches
                  No Antivirus matches
                  No Antivirus matches
                  SourceDetectionScannerLabelLink
                  https://ipinfo.io/ip%appdata%0%URL Reputationsafe
                  https://api.ip.sb/geoip%USERPEnvironmentROFILE%0%URL Reputationsafe
                  https://api.ipify.orgcookiesSaturnWalletWeb0%Avira URL Cloudsafe
                  No contacted domains info
                  NameSourceMaliciousAntivirus DetectionReputation
                  https://ipinfo.io/ip%appdata%Implosions.exefalse
                  • URL Reputation: safe
                  unknown
                  https://api.ipify.orgcookiesSaturnWalletWebImplosions.exefalse
                  • Avira URL Cloud: safe
                  unknown
                  https://api.ip.sb/geoip%USERPEnvironmentROFILE%Implosions.exefalse
                  • URL Reputation: safe
                  unknown
                  No contacted IP infos
                  Joe Sandbox version:40.0.0 Tourmaline
                  Analysis ID:1504555
                  Start date and time:2024-09-05 00:58:03 +02:00
                  Joe Sandbox product:CloudBasic
                  Overall analysis duration:0h 4m 10s
                  Hypervisor based Inspection enabled:false
                  Report type:full
                  Cookbook file name:default.jbs
                  Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                  Number of analysed new started processes analysed:8
                  Number of new started drivers analysed:0
                  Number of existing processes analysed:0
                  Number of existing drivers analysed:0
                  Number of injected processes analysed:0
                  Technologies:
                  • HCA enabled
                  • EGA enabled
                  • AMSI enabled
                  Analysis Mode:default
                  Analysis stop reason:Timeout
                  Sample name:Implosions.exe
                  Detection:MAL
                  Classification:mal80.troj.winEXE@2/1@0/0
                  EGA Information:
                  • Successful, ratio: 100%
                  HCA Information:
                  • Successful, ratio: 97%
                  • Number of executed functions: 10
                  • Number of non-executed functions: 0
                  Cookbook Comments:
                  • Found application associated with file extension: .exe
                  • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                  • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, fe3cr.delivery.mp.microsoft.com
                  • Not all processes where analyzed, report is missing behavior information
                  • VT rate limit hit for: Implosions.exe
                  No simulations
                  No context
                  No context
                  No context
                  No context
                  No context
                  Process:C:\Users\user\Desktop\Implosions.exe
                  File Type:ASCII text, with CRLF line terminators
                  Category:dropped
                  Size (bytes):1213
                  Entropy (8bit):5.341585082917285
                  Encrypted:false
                  SSDEEP:24:MLUE4K5E4KH1qE4DfE4KnKDE4KhKiKhPKIE4oKNzKoZAE4Kze0E4j:MIHK5HKH1qHDfHKnYHKh3oPtHo6hAHKl
                  MD5:76703F4A90D4A2CD7C34F415B51E3E12
                  SHA1:F39BC1EB37DBF02AF18B3F7BD825033BD3AFA63F
                  SHA-256:E38328DF86D795AF8496B4E704D31FFABBF1FF26648EA79F83C9BB6612B9FB1D
                  SHA-512:75AE335216D9A3F4BF18150205C5CCBE93E7E547552D3BE9B56AB72AA9B23BBE55ED34958DA0F4A442B78D46DE17519F6A12A2A2D73A85A272CFD91E3923A629
                  Malicious:true
                  Reputation:low
                  Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..2,"System.Windows.Forms, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System\920e3d1d70447c3c10e69e6df0766568\System.ni.dll",0..2,"System.Drawing, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a",0..2,"System.ServiceModel, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089",0..3,"System.Core, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c561934e089","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Core\8b2c1203fd20aea8260bfbc518004720\System.Core.ni.dll",0..3,"System.Configuration, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b03f5f7f11d50a3a","C:\Windows\assembly\NativeImages_v4.0.30319_32\System.Configuration\2192b0d5aa4aa14486ae08118d3b9fcc\System.Configuration.ni.dll",0..3,"System.Xml, Version=4.0.0.0, Culture=neutral, PublicKeyToken=b77a5c5
                  File type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
                  Entropy (8bit):6.168132286684968
                  TrID:
                  • Win32 Executable (generic) Net Framework (10011505/4) 49.80%
                  • Win32 Executable (generic) a (10002005/4) 49.75%
                  • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                  • Windows Screen Saver (13104/52) 0.07%
                  • Generic Win/DOS Executable (2004/3) 0.01%
                  File name:Implosions.exe
                  File size:138'240 bytes
                  MD5:a6c832c593d36e46ce1be2e4a42756cb
                  SHA1:40b2dea8e1768aabe422cbc345a8130c00fe851c
                  SHA256:62c77e82284669dd53695088dd5598e499305aff3e39e63428527094892c0259
                  SHA512:0d0dcd754c35692ca5fc72e6c9e0cd3726291c7432590075943e65493e9f5949510f12c895cfd1a4356bdd9c3942ab3c54e02ed941b7a1251751433fdbf0f0fe
                  SSDEEP:3072:iVRtM0xZO67GqT3SgQCZlWLVRfXT8yonK6W9ODL:cRuyPGqmgQCrWTD8yCKJE
                  TLSH:2AD36C7CA38A5F6DE7BD0B31D0E0A70442F0F64A1FA6D75F1D9008E69E55BA37C81A81
                  File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....9.f.............................1... ...@....@.. ....................................@................................
                  Icon Hash:00928e8e8686b000
                  Entrypoint:0x42318f
                  Entrypoint Section:.text
                  Digitally signed:false
                  Imagebase:0x400000
                  Subsystem:windows cui
                  Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                  DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                  Time Stamp:0x66D5398C [Mon Sep 2 04:05:32 2024 UTC]
                  TLS Callbacks:
                  CLR (.Net) Version:
                  OS Version Major:4
                  OS Version Minor:0
                  File Version Major:4
                  File Version Minor:0
                  Subsystem Version Major:4
                  Subsystem Version Minor:0
                  Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                  Instruction
                  jmp dword ptr [00402000h]
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  add byte ptr [eax], al
                  NameVirtual AddressVirtual Size Is in Section
                  IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IMPORT0x231450x4a.text
                  IMAGE_DIRECTORY_ENTRY_RESOURCE0x240000x4d6.rsrc
                  IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                  IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                  IMAGE_DIRECTORY_ENTRY_BASERELOC0x260000xc.reloc
                  IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                  IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                  IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                  IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                  IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                  IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                  IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                  IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                  IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                  NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                  .text0x20000x211950x21200e6386fe3fd11633168cadf6a22e3c765False0.47717423349056604data6.206623430184373IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                  .rsrc0x240000x4d60x600e6ee45b4cffa2c86931c34f9ea1ef638False0.37890625data3.74507970631731IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                  .reloc0x260000xc0x200d98c79eee18f47971fda8714b3874bb8False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                  NameRVASizeTypeLanguageCountryZLIB Complexity
                  RT_VERSION0x2405c0x254data0.4597315436241611
                  RT_MANIFEST0x242ec0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                  DLLImport
                  mscoree.dll_CorExeMain
                  No network behavior found

                  Click to jump to process

                  Click to jump to process

                  Click to dive into process behavior distribution

                  Click to jump to process

                  Target ID:0
                  Start time:18:59:00
                  Start date:04/09/2024
                  Path:C:\Users\user\Desktop\Implosions.exe
                  Wow64 process (32bit):true
                  Commandline:"C:\Users\user\Desktop\Implosions.exe"
                  Imagebase:0x790000
                  File size:138'240 bytes
                  MD5 hash:A6C832C593D36E46CE1BE2E4A42756CB
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Yara matches:
                  • Rule: JoeSecurity_CredentialStealer, Description: Yara detected Credential Stealer, Source: 00000000.00000000.1394819619.0000000000792000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                  • Rule: JoeSecurity_RedLine, Description: Yara detected RedLine Stealer, Source: 00000000.00000000.1394819619.0000000000792000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                  Reputation:low
                  Has exited:true

                  Target ID:1
                  Start time:18:59:00
                  Start date:04/09/2024
                  Path:C:\Windows\System32\conhost.exe
                  Wow64 process (32bit):false
                  Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                  Imagebase:0x7ff70f010000
                  File size:862'208 bytes
                  MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                  Has elevated privileges:true
                  Has administrator privileges:true
                  Programmed in:C, C++ or other language
                  Reputation:high
                  Has exited:true

                  Reset < >

                    Execution Graph

                    Execution Coverage:11%
                    Dynamic/Decrypted Code Coverage:100%
                    Signature Coverage:0%
                    Total number of Nodes:38
                    Total number of Limit Nodes:3
                    execution_graph 10976 10ea9a8 10979 10ea554 10976->10979 10978 10ea9bd 10980 10ea55f 10979->10980 10983 10ea848 10980->10983 10982 10eac65 10982->10978 10984 10ea853 10983->10984 10987 10ea878 10984->10987 10986 10ead42 10986->10982 10988 10ea883 10987->10988 10991 10ea8a8 10988->10991 10990 10eae54 10990->10986 10992 10ea8b3 10991->10992 10995 10ed79c 10992->10995 10994 10edb10 10994->10990 10996 10ed7a7 10995->10996 10997 10ef182 10996->10997 10999 10ef1e0 10996->10999 10997->10994 11000 10ef223 10999->11000 11001 10ef22e KiUserCallbackDispatcher 11000->11001 11002 10ef258 11000->11002 11001->11002 11002->10997 11003 10e0ff0 11005 10e0ff6 11003->11005 11004 10e0ffa 11005->11004 11008 10e511a 11005->11008 11013 4fe0050 11005->11013 11009 10e5257 11008->11009 11010 10e5122 11008->11010 11016 10e96b8 11009->11016 11020 10e96a9 11009->11020 11010->11005 11014 4fe005c 11013->11014 11015 10e511a RegOpenKeyExW 11013->11015 11014->11005 11015->11014 11018 10e96b9 11016->11018 11017 10e96f8 11017->11010 11018->11017 11019 10e9c33 RegOpenKeyExW 11018->11019 11019->11018 11021 10e96b2 11020->11021 11022 10e96f8 11021->11022 11023 10e9c33 RegOpenKeyExW 11021->11023 11022->11010 11023->11021

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 0 10e915c-10e9ed7 3 10e9edf-10e9f1a RegOpenKeyExW 0->3 4 10e9ed9-10e9edc 0->4 5 10e9f1c-10e9f22 3->5 6 10e9f23-10e9f37 3->6 4->3 5->6
                    APIs
                    • RegOpenKeyExW.KERNELBASE(?,00000000,?,?,?), ref: 010E9F0D
                    Memory Dump Source
                    • Source File: 00000000.00000002.1435723398.00000000010E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010E0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_10e0000_Implosions.jbxd
                    Similarity
                    • API ID: Open
                    • String ID:
                    • API String ID: 71445658-0
                    • Opcode ID: 4e462b7bfb8774d754c49b546dddf3bdcc2c4bbba5bc2bd16e360b7a56d72b29
                    • Instruction ID: 0e0166db1555d185ff3af3ce90035ba763a50f465bc7347da43e8fec62ca2765
                    • Opcode Fuzzy Hash: 4e462b7bfb8774d754c49b546dddf3bdcc2c4bbba5bc2bd16e360b7a56d72b29
                    • Instruction Fuzzy Hash: C22107B5D00619AFDB04DF9AD884ADEFBF4FB48314F10812AE918A7350D375A954CFA1

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 8 10e9e83-10e9ed7 11 10e9edf-10e9f1a RegOpenKeyExW 8->11 12 10e9ed9-10e9edc 8->12 13 10e9f1c-10e9f22 11->13 14 10e9f23-10e9f37 11->14 12->11 13->14
                    APIs
                    • RegOpenKeyExW.KERNELBASE(?,00000000,?,?,?), ref: 010E9F0D
                    Memory Dump Source
                    • Source File: 00000000.00000002.1435723398.00000000010E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010E0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_10e0000_Implosions.jbxd
                    Similarity
                    • API ID: Open
                    • String ID:
                    • API String ID: 71445658-0
                    • Opcode ID: ca2888b153c3f2e7a54e2d0b6ea2078c34879e237db6aa275630662b73af1daa
                    • Instruction ID: cd05c156aa3b810b5be1b18e4e3a1856a389586603c3969a7b8273d81e40e81e
                    • Opcode Fuzzy Hash: ca2888b153c3f2e7a54e2d0b6ea2078c34879e237db6aa275630662b73af1daa
                    • Instruction Fuzzy Hash: 202104B6C00659AFDB04DF9AD884ADEFBF4FB08314F10812AE918A7350C374A954CFA1

                    Control-flow Graph

                    • Executed
                    • Not Executed
                    control_flow_graph 16 10ef1e0-10ef22c 18 10ef22e-10ef256 KiUserCallbackDispatcher 16->18 19 10ef27a-10ef293 16->19 20 10ef25f-10ef273 18->20 21 10ef258-10ef25e 18->21 20->19 21->20
                    APIs
                    • KiUserCallbackDispatcher.NTDLL(0000004B), ref: 010EF245
                    Memory Dump Source
                    • Source File: 00000000.00000002.1435723398.00000000010E0000.00000040.00000800.00020000.00000000.sdmp, Offset: 010E0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_10e0000_Implosions.jbxd
                    Similarity
                    • API ID: CallbackDispatcherUser
                    • String ID:
                    • API String ID: 2492992576-0
                    • Opcode ID: 1d2cffbcb1fef58a45147bac0cf9fb424543be50659a740a000ac6261a58877a
                    • Instruction ID: 9f129cc6cf558f2e2e475622e4005bba86bf3ec936d64bbab03bc8ce4e6e2df6
                    • Opcode Fuzzy Hash: 1d2cffbcb1fef58a45147bac0cf9fb424543be50659a740a000ac6261a58877a
                    • Instruction Fuzzy Hash: E1116DB5800389DFEB11DF9AD4047DEBFF8EB15314F14409AD599A7282C379AA04CFA6
                    Memory Dump Source
                    • Source File: 00000000.00000002.1435491714.000000000107D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0107D000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_107d000_Implosions.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 4a4a00315271b3fe0234c67c8e93b30803e4af4df83e6ac6a1d6d17db07924e6
                    • Instruction ID: 85c3f2dd6c5e0805e6e7fe78abbb6fed2762f8e5ed62d68e782bdc2745ae1d60
                    • Opcode Fuzzy Hash: 4a4a00315271b3fe0234c67c8e93b30803e4af4df83e6ac6a1d6d17db07924e6
                    • Instruction Fuzzy Hash: C72125B1900340DFDB15DF54D9C0B2ABFA5FF88328F24C5A9E8490B246C336D456CBA6
                    Memory Dump Source
                    • Source File: 00000000.00000002.1435543998.000000000108D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0108D000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_108d000_Implosions.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 8e100b7667b88d791eb0bf68f88323906b87707d541a97db3dd113221376886a
                    • Instruction ID: 2333eed5f7e3dbf346fb94e2111da27f3b65c1d99fe72b3f42f797f33c2b83c6
                    • Opcode Fuzzy Hash: 8e100b7667b88d791eb0bf68f88323906b87707d541a97db3dd113221376886a
                    • Instruction Fuzzy Hash: AF210371508344DFDB15EF94D8C0B1ABBA5EB84214F24C6A9E88A4B2C2C736D407CB62
                    Memory Dump Source
                    • Source File: 00000000.00000002.1435543998.000000000108D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0108D000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_108d000_Implosions.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: ec6000b9a55df89c1d3712cde38456945f5e1f6f4993af09ce7b91a20cefd8ff
                    • Instruction ID: ffd18e49d036a11d399ce5baf109a8be5e1876505cbd57c43bd1b8a9136fafb0
                    • Opcode Fuzzy Hash: ec6000b9a55df89c1d3712cde38456945f5e1f6f4993af09ce7b91a20cefd8ff
                    • Instruction Fuzzy Hash: BF21F571508344EFDB45EF94D5C0B29BBA5FB94324F24C6ADD8894B2D2C336D846CB61
                    Memory Dump Source
                    • Source File: 00000000.00000002.1435491714.000000000107D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0107D000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_107d000_Implosions.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: f4ddf6aab7a4ec5fdcafc4d9db3305c30ac7726daeb53e4266b93089bec5e780
                    • Instruction ID: c17b665a6460ed746a822dd884b49408f1be7f7dae082696e59efaed4a061341
                    • Opcode Fuzzy Hash: f4ddf6aab7a4ec5fdcafc4d9db3305c30ac7726daeb53e4266b93089bec5e780
                    • Instruction Fuzzy Hash: 4411AF76904280CFCB16CF54D9C4B56BFB2FB84328F24C6A9D8490B656C336D456CBA1
                    Memory Dump Source
                    • Source File: 00000000.00000002.1435543998.000000000108D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0108D000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_108d000_Implosions.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 0571d9b095afed8b546122286ae05565a289416437c47d1601190cbee81fcf2c
                    • Instruction ID: 9e2a0c772be6d4ec6fc66e8f7496af8c52c37ef234613bbaf22f93bc205dfa68
                    • Opcode Fuzzy Hash: 0571d9b095afed8b546122286ae05565a289416437c47d1601190cbee81fcf2c
                    • Instruction Fuzzy Hash: E111BB75508280DFCB02DF54C5C0B15BBA1FB84324F28C6AAD8894B696C33AD44ACB61
                    Memory Dump Source
                    • Source File: 00000000.00000002.1435543998.000000000108D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0108D000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_108d000_Implosions.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 0571d9b095afed8b546122286ae05565a289416437c47d1601190cbee81fcf2c
                    • Instruction ID: 123cb638a674e16f96c1cdf7c9ffca0f456ab582a7ce3d2ffa9e938f1e37ee94
                    • Opcode Fuzzy Hash: 0571d9b095afed8b546122286ae05565a289416437c47d1601190cbee81fcf2c
                    • Instruction Fuzzy Hash: C211BE75508280CFDB12DF54D5C4B15BBA2FB44314F24C6AAE8894B696C33AD44BCF61
                    Memory Dump Source
                    • Source File: 00000000.00000002.1436308144.0000000004FE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 04FE0000, based on PE: false
                    Joe Sandbox IDA Plugin
                    • Snapshot File: hcaresult_0_2_4fe0000_Implosions.jbxd
                    Similarity
                    • API ID:
                    • String ID:
                    • API String ID:
                    • Opcode ID: 997b3aff36e1e5f22b1fe43286f95181049882395d602ef2dd32ff0995b7b7c2
                    • Instruction ID: 865417153d5da4e0ee93b8ed32e09382fd1c9846c11b7db45c6f0c2670fd8933
                    • Opcode Fuzzy Hash: 997b3aff36e1e5f22b1fe43286f95181049882395d602ef2dd32ff0995b7b7c2
                    • Instruction Fuzzy Hash: