Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Variant.Lazy.606094.29765.28609.exe

Overview

General Information

Sample name:SecuriteInfo.com.Variant.Lazy.606094.29765.28609.exe
Analysis ID:1539813
MD5:b352a969814c63eb03f8771d0b61c763
SHA1:fcd849e29f057f46766738c8cd4ce91a4c7e537e
SHA256:1c4f4363a89bb180c36067da145fbc4086217bb5c55312dfa8605b127b3ac35a
Tags:exe

Detection

Score:52
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Potentially malicious time measurement code found
Contains functionality for execution timing, often used to detect debuggers
Detected potential crypto function
PE file contains sections with non-standard names

Classification

  • System is w10x64
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: SecuriteInfo.com.Variant.Lazy.606094.29765.28609.exeVirustotal: Detection: 12%Perma Link
Source: SecuriteInfo.com.Variant.Lazy.606094.29765.28609.exe, 00000000.00000002.2085346990.00007FF6C2F69000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_4c651ae1-8
Source: SecuriteInfo.com.Variant.Lazy.606094.29765.28609.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: crypto\encode_decode\decoder_meth.cossl_decoder_newossl_decoder_from_algorithminner_ossl_decoder_fetch<null>%s, Name (%s : %d), Properties (%s)OSSL_DECODER_get0_providerOSSL_DECODER_get0_propertiesossl_decoder_parsed_propertiesOSSL_DECODER_CTX_newOSSL_DECODER_from_biocrypto\encode_decode\decoder_lib.cNo decoders were found. For standard decoders you need at least one of the default or base providers available. Did you forget to load them?Input type: Input structure: No supported data to decode. %s%s%s%s%s%sOSSL_DECODER_from_dataOSSL_DECODER_CTX_set_selectionOSSL_DECODER_CTX_set_input_typeOSSL_DECODER_CTX_set_input_structureossl_decoder_instance_newthere are no property definitions with decoder %sinputthe mandatory 'input' property is missing for decoder %s (properties: %s)structureossl_decoder_ctx_add_decoder_instOSSL_DECODER_CTX_add_extraOSSL_DECODER_CTX_set_constructOSSL_DECODER_CTX_set_construct_dataOSSL_DECODER_CTX_set_cleanupdata-typedata-structuredecoder_processcrypto\encode_decode\decoder_pkey.creference1.2.840.10045.2.1ossl_decoder_ctx_setup_for_pkeyOSSL_DECODER_CTX_new_for_pkeycompiler: cl /Zi /Fdossl_static.pdb /MT /Zl /Gs0 /GF /Gy /W3 /wd4090 /nologo /O2 -DL_ENDIAN -DOPENSSL_PIC;CPUINFO: OPENSSL_ia32cap=0x%llx:0x%llxOPENSSL_ia32cap env:%sos-specificE:\NGULibraries\openssl-3.0.11\build\sslE:\NGULibraries\openssl-3.0.11\build\static_lib\x64\Release\lib\ossl-modules.dllCPUINFO: crypto\bio\bio_sock.cBIO_sock_initcalling wsastartup()BIO_socket_ioctlcalling ioctlsocket()@@@@@@@@@hHHHH@@@@@@@@@@@@@@@@@@( source: SecuriteInfo.com.Variant.Lazy.606094.29765.28609.exe
Source: Binary string: crypto\stack\stack.cOPENSSL_sk_dupOPENSSL_sk_deep_copysk_reserveOPENSSL_sk_new_reserveOPENSSL_sk_reserveOPENSSL_sk_insertOPENSSL_sk_seti=%dcompiler: cl /Zi /Fdossl_static.pdb /MT /Zl /Gs0 /GF /Gy /W3 /wd4090 /nologo /O2 -DL_ENDIAN -DOPENSSL_PICOpenSSL 3.0.11 19 Sep 20233.0.11built on: Wed May 15 23:28:32 2024 UTCplatform: VC-WIN64AOPENSSLDIR: "E:\NGULibraries\openssl-3.0.11\build\ssl"ENGINESDIR: "E:\NGULibraries\openssl-3.0.11\build\static_lib\x64\Release\lib\engines-3"MODULESDIR: "E:\NGULibraries\openssl-3.0.11\build\static_lib\x64\Release\lib\ossl-modules"CPUINFO: N/Anot availablecrypto\bio\bio_lib.cBIO_new_exbio_read_internbio_write_internBIO_putsBIO_getsBIO_ctrlBIO_callback_ctrlBIO_find_type source: SecuriteInfo.com.Variant.Lazy.606094.29765.28609.exe
Source: Binary string: E:\X\x64\Release\ActiveState.pdb source: SecuriteInfo.com.Variant.Lazy.606094.29765.28609.exe
Source: Binary string: compiler: cl /Zi /Fdossl_static.pdb /MT /Zl /Gs0 /GF /Gy /W3 /wd4090 /nologo /O2 -DL_ENDIAN -DOPENSSL_PIC source: SecuriteInfo.com.Variant.Lazy.606094.29765.28609.exe
Source: SecuriteInfo.com.Variant.Lazy.606094.29765.28609.exe, 00000000.00000002.2085008638.0000019EDF9AC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://154.53.160.19/ActiveState/
Source: SecuriteInfo.com.Variant.Lazy.606094.29765.28609.exeString found in binary or memory: https://curl.se/docs/alt-svc.html
Source: SecuriteInfo.com.Variant.Lazy.606094.29765.28609.exeString found in binary or memory: https://curl.se/docs/hsts.html
Source: SecuriteInfo.com.Variant.Lazy.606094.29765.28609.exeString found in binary or memory: https://curl.se/docs/http-cookies.html
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.606094.29765.28609.exeCode function: 0_2_00007FF6C2CB15000_2_00007FF6C2CB1500
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.606094.29765.28609.exeCode function: 0_2_00007FF6C2CCAF400_2_00007FF6C2CCAF40
Source: classification engineClassification label: mal52.evad.winEXE@1/1@0/0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.606094.29765.28609.exeFile created: C:\Users\user\Desktop\log.binJump to behavior
Source: SecuriteInfo.com.Variant.Lazy.606094.29765.28609.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.606094.29765.28609.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: SecuriteInfo.com.Variant.Lazy.606094.29765.28609.exeVirustotal: Detection: 12%
Source: SecuriteInfo.com.Variant.Lazy.606094.29765.28609.exeString found in binary or memory: iphlpapi.dllif_nametoindexkernel32LoadLibraryExA\/AddDllDirectoryh1h2h3%10s %512s %u %10s %512s %u "%64[^"]" %u %urt%s %s%s%s %u %s %s%s%s %u "%d%02d%02d %02d:%02d:%02d" %u %d
Source: SecuriteInfo.com.Variant.Lazy.606094.29765.28609.exeString found in binary or memory: id-cmc-addExtensions
Source: SecuriteInfo.com.Variant.Lazy.606094.29765.28609.exeString found in binary or memory: set-addPolicy
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.606094.29765.28609.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.606094.29765.28609.exeSection loaded: msvcp140.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.606094.29765.28609.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.606094.29765.28609.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.606094.29765.28609.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.606094.29765.28609.exeSection loaded: vcruntime140_1.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.606094.29765.28609.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.606094.29765.28609.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.606094.29765.28609.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.606094.29765.28609.exeSection loaded: kernel.appcore.dllJump to behavior
Source: SecuriteInfo.com.Variant.Lazy.606094.29765.28609.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: SecuriteInfo.com.Variant.Lazy.606094.29765.28609.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: SecuriteInfo.com.Variant.Lazy.606094.29765.28609.exeStatic file information: File size 3981312 > 1048576
Source: SecuriteInfo.com.Variant.Lazy.606094.29765.28609.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x2b8000
Source: SecuriteInfo.com.Variant.Lazy.606094.29765.28609.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: SecuriteInfo.com.Variant.Lazy.606094.29765.28609.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: SecuriteInfo.com.Variant.Lazy.606094.29765.28609.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: SecuriteInfo.com.Variant.Lazy.606094.29765.28609.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: SecuriteInfo.com.Variant.Lazy.606094.29765.28609.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: SecuriteInfo.com.Variant.Lazy.606094.29765.28609.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: SecuriteInfo.com.Variant.Lazy.606094.29765.28609.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: SecuriteInfo.com.Variant.Lazy.606094.29765.28609.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: crypto\encode_decode\decoder_meth.cossl_decoder_newossl_decoder_from_algorithminner_ossl_decoder_fetch<null>%s, Name (%s : %d), Properties (%s)OSSL_DECODER_get0_providerOSSL_DECODER_get0_propertiesossl_decoder_parsed_propertiesOSSL_DECODER_CTX_newOSSL_DECODER_from_biocrypto\encode_decode\decoder_lib.cNo decoders were found. For standard decoders you need at least one of the default or base providers available. Did you forget to load them?Input type: Input structure: No supported data to decode. %s%s%s%s%s%sOSSL_DECODER_from_dataOSSL_DECODER_CTX_set_selectionOSSL_DECODER_CTX_set_input_typeOSSL_DECODER_CTX_set_input_structureossl_decoder_instance_newthere are no property definitions with decoder %sinputthe mandatory 'input' property is missing for decoder %s (properties: %s)structureossl_decoder_ctx_add_decoder_instOSSL_DECODER_CTX_add_extraOSSL_DECODER_CTX_set_constructOSSL_DECODER_CTX_set_construct_dataOSSL_DECODER_CTX_set_cleanupdata-typedata-structuredecoder_processcrypto\encode_decode\decoder_pkey.creference1.2.840.10045.2.1ossl_decoder_ctx_setup_for_pkeyOSSL_DECODER_CTX_new_for_pkeycompiler: cl /Zi /Fdossl_static.pdb /MT /Zl /Gs0 /GF /Gy /W3 /wd4090 /nologo /O2 -DL_ENDIAN -DOPENSSL_PIC;CPUINFO: OPENSSL_ia32cap=0x%llx:0x%llxOPENSSL_ia32cap env:%sos-specificE:\NGULibraries\openssl-3.0.11\build\sslE:\NGULibraries\openssl-3.0.11\build\static_lib\x64\Release\lib\ossl-modules.dllCPUINFO: crypto\bio\bio_sock.cBIO_sock_initcalling wsastartup()BIO_socket_ioctlcalling ioctlsocket()@@@@@@@@@hHHHH@@@@@@@@@@@@@@@@@@( source: SecuriteInfo.com.Variant.Lazy.606094.29765.28609.exe
Source: Binary string: crypto\stack\stack.cOPENSSL_sk_dupOPENSSL_sk_deep_copysk_reserveOPENSSL_sk_new_reserveOPENSSL_sk_reserveOPENSSL_sk_insertOPENSSL_sk_seti=%dcompiler: cl /Zi /Fdossl_static.pdb /MT /Zl /Gs0 /GF /Gy /W3 /wd4090 /nologo /O2 -DL_ENDIAN -DOPENSSL_PICOpenSSL 3.0.11 19 Sep 20233.0.11built on: Wed May 15 23:28:32 2024 UTCplatform: VC-WIN64AOPENSSLDIR: "E:\NGULibraries\openssl-3.0.11\build\ssl"ENGINESDIR: "E:\NGULibraries\openssl-3.0.11\build\static_lib\x64\Release\lib\engines-3"MODULESDIR: "E:\NGULibraries\openssl-3.0.11\build\static_lib\x64\Release\lib\ossl-modules"CPUINFO: N/Anot availablecrypto\bio\bio_lib.cBIO_new_exbio_read_internbio_write_internBIO_putsBIO_getsBIO_ctrlBIO_callback_ctrlBIO_find_type source: SecuriteInfo.com.Variant.Lazy.606094.29765.28609.exe
Source: Binary string: E:\X\x64\Release\ActiveState.pdb source: SecuriteInfo.com.Variant.Lazy.606094.29765.28609.exe
Source: Binary string: compiler: cl /Zi /Fdossl_static.pdb /MT /Zl /Gs0 /GF /Gy /W3 /wd4090 /nologo /O2 -DL_ENDIAN -DOPENSSL_PIC source: SecuriteInfo.com.Variant.Lazy.606094.29765.28609.exe
Source: SecuriteInfo.com.Variant.Lazy.606094.29765.28609.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: SecuriteInfo.com.Variant.Lazy.606094.29765.28609.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: SecuriteInfo.com.Variant.Lazy.606094.29765.28609.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: SecuriteInfo.com.Variant.Lazy.606094.29765.28609.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: SecuriteInfo.com.Variant.Lazy.606094.29765.28609.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: SecuriteInfo.com.Variant.Lazy.606094.29765.28609.exeStatic PE information: section name: .msvcjmc
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.606094.29765.28609.exeCode function: 0_2_00007FF6C2CB1020 rdtsc 0_2_00007FF6C2CB1020
Source: SecuriteInfo.com.Variant.Lazy.606094.29765.28609.exe, 00000000.00000003.2084368550.0000019EDF9D5000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.Variant.Lazy.606094.29765.28609.exe, 00000000.00000003.2084459984.0000019EDF9DC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllK

Anti Debugging

barindex
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.606094.29765.28609.exeCode function: 0_2_00007FF6C2CB13B00_2_00007FF6C2CB13B0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.606094.29765.28609.exeCode function: 0_2_00007FF6C2CB13500_2_00007FF6C2CB1350
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.606094.29765.28609.exeCode function: 0_2_00007FF6C2CB1020 rdtsc 0_2_00007FF6C2CB1020
Source: C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.606094.29765.28609.exeCode function: 0_2_00007FF6C2DEA854 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00007FF6C2DEA854
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
1
DLL Side-Loading
1
DLL Side-Loading
1
Masquerading
OS Credential Dumping1
System Time Discovery
Remote Services11
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
DLL Side-Loading
LSASS Memory11
Security Software Discovery
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)Obfuscated Files or InformationSecurity Account Manager2
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SecuriteInfo.com.Variant.Lazy.606094.29765.28609.exe12%VirustotalBrowse
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://curl.se/docs/hsts.html0%VirustotalBrowse
http://154.53.160.19/ActiveState/0%VirustotalBrowse
https://curl.se/docs/alt-svc.html0%VirustotalBrowse
https://curl.se/docs/http-cookies.html0%VirustotalBrowse
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
https://curl.se/docs/hsts.htmlSecuriteInfo.com.Variant.Lazy.606094.29765.28609.exefalseunknown
http://154.53.160.19/ActiveState/SecuriteInfo.com.Variant.Lazy.606094.29765.28609.exe, 00000000.00000002.2085008638.0000019EDF9AC000.00000004.00000020.00020000.00000000.sdmpfalseunknown
https://curl.se/docs/alt-svc.htmlSecuriteInfo.com.Variant.Lazy.606094.29765.28609.exefalseunknown
https://curl.se/docs/http-cookies.htmlSecuriteInfo.com.Variant.Lazy.606094.29765.28609.exefalseunknown
No contacted IP infos
Joe Sandbox version:41.0.0 Charoite
Analysis ID:1539813
Start date and time:2024-10-23 07:22:09 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 2m 35s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:2
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:SecuriteInfo.com.Variant.Lazy.606094.29765.28609.exe
Detection:MAL
Classification:mal52.evad.winEXE@1/1@0/0
EGA Information:Failed
HCA Information:Failed
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Stop behavior analysis, all processes terminated
  • Exclude process from analysis (whitelisted): dllhost.exe
  • Execution Graph export aborted for target SecuriteInfo.com.Variant.Lazy.606094.29765.28609.exe, PID 3136 because there are no executed function
No simulations
No context
No context
No context
No context
No context
Process:C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.606094.29765.28609.exe
File Type:ASCII text, with CRLF line terminators
Category:dropped
Size (bytes):173
Entropy (8bit):4.9460400385293575
Encrypted:false
SSDEEP:3:Hcb2ME80LRgeXdTVcL4AQWgUjXUvmC4DrS90bXqyEAQe4fcvMLIq:HcczLRgIzcLNQkEvmROiJE1NcvMLIq
MD5:3ABC5CBBD723C848997AEAA1AEA345EF
SHA1:7F6C6C898AA8D221E359D3F35010F598126D89C5
SHA-256:5FF0C0A20F6FAEF8F2A93D7B2E073FCCEC0D91BF93FCF2279FFD6C08CBB5A9AC
SHA-512:90B73CD67CBF13911F906D5044EFF86AF4887F78B0367269073FAF53400A39068ED4C1FD8DA75E3E3D3306414030A455B52598D4E36993C9E19EF2500CB75E5D
Malicious:false
Reputation:low
Preview:SecuriteInfo.com.Variant.Lazy.606094.29765.28609.exe Release x641.0.0Started!..Couldn't get computer name and/or username!..Couldn't get current software hash!..Exiting.....
File type:PE32+ executable (GUI) x86-64, for MS Windows
Entropy (8bit):6.562038049411947
TrID:
  • Win64 Executable GUI (202006/5) 92.65%
  • Win64 Executable (generic) (12005/4) 5.51%
  • Generic Win/DOS Executable (2004/3) 0.92%
  • DOS Executable Generic (2002/1) 0.92%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:SecuriteInfo.com.Variant.Lazy.606094.29765.28609.exe
File size:3'981'312 bytes
MD5:b352a969814c63eb03f8771d0b61c763
SHA1:fcd849e29f057f46766738c8cd4ce91a4c7e537e
SHA256:1c4f4363a89bb180c36067da145fbc4086217bb5c55312dfa8605b127b3ac35a
SHA512:9088be263ccc1523392fb862f4261a399a7e02a428ac1df0ee538b1aa9739dd59f442148f9a2939f0cf1f94cf8d67e56e86d402455ca20537c37497f3686800b
SSDEEP:49152:MGtlqZnIU6i1VwASOXajGuSm3RT1NYz9wp2m0y7xLkWKO10CB1pDAsLmYMqI51qD:n+FGJhww/gWnjh3wzk
TLSH:F4068C6AB7A800ECD4B6C138C5464223D7B1F86617B097EB16A0D6BA1F73AD55F3E700
File Content Preview:MZ......................@...................................8...........!..L.!This program cannot be run in DOS mode....$..........!...r...r...r..*r...r..Dr...r...s...r...s...r...s...r...s...r...s...r...s...r...s...r...r+..r...s...ro..sZ..r...r...r...s...
Icon Hash:00928e8e8686b000
Entrypoint:0x140139fb4
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x140000000
Subsystem:windows gui
Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Time Stamp:0x671857AE [Wed Oct 23 01:55:58 2024 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:6
OS Version Minor:0
File Version Major:6
File Version Minor:0
Subsystem Version Major:6
Subsystem Version Minor:0
Import Hash:d39e10ae211b8efcd3ba9dc362e6a9e7
Instruction
dec eax
sub esp, 28h
call 00007FCC5C6470BCh
dec eax
add esp, 28h
jmp 00007FCC5C64669Fh
int3
int3
dec eax
mov dword ptr [esp+10h], ebx
dec eax
mov dword ptr [esp+18h], esi
push edi
dec eax
sub esp, 10h
xor eax, eax
xor ecx, ecx
cpuid
inc esp
mov eax, ecx
inc ebp
xor ebx, ebx
inc esp
mov edx, edx
inc ecx
xor eax, 6C65746Eh
inc ecx
xor edx, 49656E69h
inc esp
mov ecx, ebx
mov esi, eax
xor ecx, ecx
inc ecx
lea eax, dword ptr [ebx+01h]
inc ebp
or edx, eax
cpuid
inc ecx
xor ecx, 756E6547h
mov dword ptr [esp], eax
inc ebp
or edx, ecx
mov dword ptr [esp+04h], ebx
mov edi, ecx
mov dword ptr [esp+08h], ecx
mov dword ptr [esp+0Ch], edx
jne 00007FCC5C64687Dh
dec eax
or dword ptr [0026418Fh], FFFFFFFFh
and eax, 0FFF3FF0h
dec eax
mov dword ptr [00264177h], 00008000h
cmp eax, 000106C0h
je 00007FCC5C64684Ah
cmp eax, 00020660h
je 00007FCC5C646843h
cmp eax, 00020670h
je 00007FCC5C64683Ch
add eax, FFFCF9B0h
cmp eax, 20h
jnbe 00007FCC5C646846h
dec eax
mov ecx, 00010001h
add dword ptr [eax], eax
add byte ptr [eax], al
dec eax
bt ecx, eax
jnc 00007FCC5C646836h
inc esp
mov eax, dword ptr [00D77A41h]
inc ecx
or eax, 01h
inc esp
mov dword ptr [00D77A36h], eax
jmp 00007FCC5C646829h
Programming Language:
  • [IMP] VS2008 SP1 build 30729
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x395e600x8cc.rdata
IMAGE_DIRECTORY_ENTRY_IMPORT0x39672c0x1e0.rdata
IMAGE_DIRECTORY_ENTRY_RESOURCE0xed70000x1e0.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0xeb40000x21a98.pdata
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0xed80000x9d40.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x3766700x70.rdata
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x3767000x28.rdata
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x3765300x140.rdata
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x2b90000xc28.rdata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x2b7eb30x2b8000e4ef72ee848f7ef5314dd762763263ceunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.rdata0x2b90000xe06060xe0800dd5c8fb0d4286b441532f303709e2fd6False0.3292277108853007data5.239422717213847IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.data0x39a0000xb19f140x74009f2d57ff60e75a668ebd68a046a9b983unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.pdata0xeb40000x21a980x21c00033c127d5fc6c7c3aadac9bd85ffececFalse0.4734302662037037data6.261992574655434IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.msvcjmc0xed60000x3280x400750ab9d9a21bc77d81a741153c156ca1False0.01953125Targa image data - Map (257-257) 257 x 257 x 1 +257 +257 - 1-bit alpha "\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001\001"0.7432709194035553IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.rsrc0xed70000x1e00x2006f1c1702db248598e403068006bc6ba2False0.53125data4.7176788329467545IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0xed80000x9d400x9e00ac512fd1e9d1d60042d0318ea59485f4False0.2881971914556962data5.442406663752315IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_MANIFEST0xed70600x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
DLLImport
CRYPT32.dllCertGetCertificateContextProperty, CertFindCertificateInStore, CertOpenSystemStoreA, CertCloseStore, CertGetIntendedKeyUsage, CertGetEnhancedKeyUsage, CertFreeCertificateContext, CertEnumCertificatesInStore, CertDuplicateCertificateContext, CertOpenStore
WLDAP32.dll
WS2_32.dllsend, WSACloseEvent, WSACreateEvent, WSAEnumNetworkEvents, WSAEventSelect, getsockopt, WSASetEvent, WSAWaitForMultipleEvents, gethostbyaddr, closesocket, WSAGetLastError, WSAResetEvent, WSASetLastError, inet_ntop, inet_ntoa, gethostbyname, WSACleanup, inet_pton, htons, socket, setsockopt, WSAIoctl, __WSAFDIsSet, getservbyport, getservbyname, select, accept, bind, connect, getsockname, htonl, listen, recv, getaddrinfo, freeaddrinfo, recvfrom, sendto, getpeername, ioctlsocket, gethostname, shutdown, inet_addr, ntohs, WSAStartup
KERNEL32.dllFindNextFileW, FindFirstFileW, FindClose, CreateFiberEx, DeleteFiber, SwitchToFiber, VirtualFree, TlsFree, TlsSetValue, TlsGetValue, TlsAlloc, AcquireSRWLockShared, ReleaseSRWLockShared, InitializeSRWLock, ReadConsoleW, ReadConsoleA, SetConsoleMode, GetConsoleMode, GetEnvironmentVariableW, VirtualQuery, GetProcessHeap, HeapFree, HeapAlloc, InitializeSListHead, GetModuleHandleW, GetStartupInfoW, RaiseException, IsDebuggerPresent, CreateDirectoryW, GetFileAttributesW, CloseHandle, GetLastError, GetModuleHandleExW, CopyFileW, GetComputerNameW, MultiByteToWideChar, WideCharToMultiByte, ReleaseSRWLockExclusive, AcquireSRWLockExclusive, SetLastError, FormatMessageW, QueryPerformanceCounter, GetTickCount, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSectionEx, DeleteCriticalSection, QueryPerformanceFrequency, GetSystemDirectoryA, FreeLibrary, GetModuleHandleA, GetProcAddress, LoadLibraryA, Sleep, MoveFileExA, WaitForSingleObjectEx, CompareFileTime, GetSystemTimeAsFileTime, GetEnvironmentVariableA, GetCurrentProcessId, GetStdHandle, GetFileType, ReadFile, PeekNamedPipe, WaitForMultipleObjects, SleepEx, VerSetConditionMask, VerifyVersionInfoW, GetSystemTime, SystemTimeToFileTime, CreateProcessW, WriteFile, GetACP, ConvertFiberToThread, ConvertThreadToFiberEx, LoadLibraryW, GetCurrentThreadId, WakeAllConditionVariable, SleepConditionVariableSRW, IsProcessorFeaturePresent, TerminateProcess, GetCurrentProcess, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, FormatMessageA
ADVAPI32.dllCryptHashData, CryptAcquireContextA, CryptReleaseContext, CryptGetHashParam, CryptCreateHash, CryptDestroyHash, DeregisterEventSource, RegisterEventSourceW, CryptEnumProvidersW, CryptSignHashW, CryptDecrypt, CryptExportKey, CryptGetUserKey, CryptGetProvParam, CryptSetHashParam, CryptDestroyKey, CryptAcquireContextW, ReportEventW, GetUserNameW
ole32.dllCoInitialize, CoCreateInstance
MSVCP140.dll?_Xinvalid_argument@std@@YAXPEBD@Z, ??0_Lockit@std@@QEAA@H@Z, _Query_perf_counter, _Query_perf_frequency, _Thrd_sleep, ??Bid@locale@std@@QEAA_KXZ, ?_Getgloballocale@locale@std@@CAPEAV_Locimp@12@XZ, ?always_noconv@codecvt_base@std@@QEBA_NXZ, ?in@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEAD3AEAPEAD@Z, ?out@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEBD1AEAPEBDPEAD3AEAPEAD@Z, ?unshift@?$codecvt@DDU_Mbstatet@@@std@@QEBAHAEAU_Mbstatet@@PEAD1AEAPEAD@Z, ?_Getcat@?$codecvt@DDU_Mbstatet@@@std@@SA_KPEAPEBVfacet@locale@2@PEBV42@@Z, ??0?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAA@XZ, ??1?$basic_streambuf@DU?$char_traits@D@std@@@std@@UEAA@XZ, ?getloc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEBA?AVlocale@2@XZ, ?eback@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ, ?gptr@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ, ?pptr@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ, ?egptr@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ, ?gbump@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXH@Z, ?setg@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXPEAD00@Z, ?epptr@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBAPEADXZ, ?_Gndec@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAPEADXZ, ?_Gninc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAPEADXZ, ?_Gnavail@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBA_JXZ, ?pbump@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXH@Z, ?_Pninc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAPEADXZ, ?_Pnavail@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEBA_JXZ, ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXXZ, ?_Init@?$basic_streambuf@DU?$char_traits@D@std@@@std@@IEAAXPEAPEAD0PEAH001@Z, ?xsgetn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEAD_J@Z, ?xsputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JPEBD_J@Z, ??1?$basic_ios@DU?$char_traits@D@std@@@std@@UEAA@XZ, ?clear@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z, ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z, ??0?$basic_ios@DU?$char_traits@D@std@@@std@@IEAA@XZ, ??0?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z, ??1?$basic_ostream@DU?$char_traits@D@std@@@std@@UEAA@XZ, ?write@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@PEBD_J@Z, ??0?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA@PEAV?$basic_streambuf@DU?$char_traits@D@std@@@1@_N@Z, ??1?$basic_istream@DU?$char_traits@D@std@@@std@@UEAA@XZ, ?read@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@PEAD_J@Z, ?seekg@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@V?$fpos@U_Mbstatet@@@2@@Z, ?tellg@?$basic_istream@DU?$char_traits@D@std@@@std@@QEAA?AV?$fpos@U_Mbstatet@@@2@XZ, ?_Fiopen@std@@YAPEAU_iobuf@@PEBDHH@Z, ?showmanyc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@MEAA_JXZ, ?id@?$codecvt@DDU_Mbstatet@@@std@@2V0locale@2@A, ?_Xbad_function_call@std@@YAXXZ, ??1_Lockit@std@@QEAA@XZ, ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ, ?put@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@D@Z, ?_Xlength_error@std@@YAXPEBD@Z, ?_Xout_of_range@std@@YAXPEBD@Z, ?widen@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBADD@Z, _Xtime_get_ticks
bcrypt.dllBCryptGenRandom
VCRUNTIME140.dllstrchr, strrchr, strstr, _purecall, __std_terminate, __current_exception, memcmp, _CxxThrowException, __C_specific_handler_noexcept, __vcrt_GetModuleFileNameW, __vcrt_LoadLibraryExW, memmove, memcpy, memchr, memset, __current_exception_context, __std_exception_copy, wcsstr, __C_specific_handler, __std_exception_destroy
VCRUNTIME140_1.dll__CxxFrameHandler4
api-ms-win-crt-runtime-l1-1-0.dll__sys_nerr, __sys_errlist, _seh_filter_exe, _register_thread_local_exe_atexit_callback, raise, _exit, _initterm_e, _initterm, strerror_s, _c_exit, signal, exit, _errno, _get_narrow_winmain_command_line, _beginthreadex, _crt_atexit, _register_onexit_function, _initialize_onexit_table, _initialize_narrow_environment, _configure_narrow_argv, __p___argv, _set_app_type, _invalid_parameter_noinfo_noreturn, terminate, _cexit
api-ms-win-crt-stdio-l1-1-0.dllfputc, _set_fmode, __stdio_common_vswprintf, _wfopen, __stdio_common_vsnprintf_s, __stdio_common_vfprintf, ferror, fread, fclose, fsetpos, fopen, __p__commode, _lseeki64, _fseeki64, fwrite, _pclose, _popen, fgets, setvbuf, _open, _setmode, ungetc, __stdio_common_vsscanf, __stdio_common_vsprintf_s, __stdio_common_vsprintf, ftell, fgetpos, fputs, fgetc, fflush, feof, _get_stream_buffer_pointers, _close, __acrt_iob_func, _fileno, _write, _read, fseek
api-ms-win-crt-heap-l1-1-0.dllfree, _set_new_mode, malloc, calloc, _callnewh, realloc
api-ms-win-crt-convert-l1-1-0.dllatoi, strtoul, wcstombs, strtol, strtoll
api-ms-win-crt-filesystem-l1-1-0.dll_lock_file, _stat64i32, _unlink, _fstat64, _stat64, _access, _unlock_file
api-ms-win-crt-string-l1-1-0.dllstrncmp, strcspn, isdigit, _strdup, strspn, strcmp, strcat_s, strcpy_s, strncpy_s, strpbrk, isalpha, isspace, tolower, strncpy
api-ms-win-crt-time-l1-1-0.dll_gmtime64_s, _time64, _localtime64_s, strftime, _gmtime64
api-ms-win-crt-utility-l1-1-0.dllqsort
api-ms-win-crt-multibyte-l1-1-0.dll_mbspbrk
api-ms-win-crt-math-l1-1-0.dll_fdopen, __setusermatherr
api-ms-win-crt-locale-l1-1-0.dll_configthreadlocale
USER32.dllGetUserObjectInformationW, MessageBoxW, GetProcessWindowStation
api-ms-win-crt-environment-l1-1-0.dllgetenv
NameOrdinalAddress
curl_easy_cleanup10x140094920
curl_easy_duphandle20x140094950
curl_easy_escape30x1400dd3a0
curl_easy_getinfo40x140094d40
curl_easy_header50x1400de2f0
curl_easy_init60x140094d70
curl_easy_nextheader70x1400de4d0
curl_easy_pause80x140094de0
curl_easy_perform90x140095030
curl_easy_recv100x1400951c0
curl_easy_reset110x1400952b0
curl_easy_send120x140095340
curl_easy_setopt130x1400991a0
curl_easy_strerror140x140095900
curl_easy_unescape150x1400dd540
curl_easy_upkeep160x140095440
curl_escape170x1400dd670
curl_formadd180x1400946d0
curl_formfree190x140094700
curl_formget200x140094770
curl_free210x14009fcf0
curl_getdate220x1400c0400
curl_getenv230x1400c6c10
curl_global_cleanup240x1400954e0
curl_global_init250x140095540
curl_global_init_mem260x140095580
curl_global_sslset270x140095670
curl_global_trace280x1400956d0
curl_maprintf290x1400b1ea0
curl_mfprintf300x1400b1ed0
curl_mime_addpart310x14009a640
curl_mime_data320x14009a700
curl_mime_data_cb330x14009a7e0
curl_mime_encoder340x14009a850
curl_mime_filedata350x14009a8f0
curl_mime_filename360x14009aac0
curl_mime_free370x14009ab40
curl_mime_headers380x14009aba0
curl_mime_init390x14009ac20
curl_mime_name400x14009acc0
curl_mime_subparts410x14009ad40
curl_mime_type420x14009adf0
curl_mprintf430x1400b1f00
curl_msnprintf440x1400b1f50
curl_msprintf450x1400b1fc0
curl_multi_add_handle460x14009c9e0
curl_multi_assign470x14009cc20
curl_multi_cleanup480x14009cc70
curl_multi_fdset490x14009cdb0
curl_multi_info_read500x14009cf20
curl_multi_init510x14009cfb0
curl_multi_perform520x14009d110
curl_multi_poll530x14009d230
curl_multi_remove_handle540x14009d260
curl_multi_setopt550x14009d480
curl_multi_socket560x14009d640
curl_multi_socket_action570x14009d690
curl_multi_socket_all580x14009d6e0
curl_multi_strerror590x140095d70
curl_multi_timeout600x14009d760
curl_multi_wait610x14009d790
curl_multi_wakeup620x14009d7c0
curl_mvaprintf630x1400b2000
curl_mvfprintf640x1400b20a0
curl_mvprintf650x1400b20c0
curl_mvsnprintf660x1400b2100
curl_mvsprintf670x1400b2160
curl_share_cleanup680x1400b3e00
curl_share_init690x1400b3f40
curl_share_setopt700x1400b3f90
curl_share_strerror710x140095e50
curl_slist_append720x14009bf00
curl_slist_free_all730x14009bfa0
curl_strequal740x1400b3670
curl_strnequal750x1400b36e0
curl_unescape760x1400dd680
curl_url770x1400da6a0
curl_url_cleanup780x1400da6b0
curl_url_dup790x1400da6e0
curl_url_get800x1400da840
curl_url_set810x1400db050
curl_url_strerror820x140095ec0
Language of compilation systemCountry where language is spokenMap
EnglishUnited States
No network behavior found

Click to jump to process

Click to jump to process

Target ID:0
Start time:01:23:02
Start date:23/10/2024
Path:C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.606094.29765.28609.exe
Wow64 process (32bit):false
Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Variant.Lazy.606094.29765.28609.exe"
Imagebase:0x7ff6c2cb0000
File size:3'981'312 bytes
MD5 hash:B352A969814C63EB03F8771D0B61C763
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:true

Reset < >
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.2085165869.00007FF6C2CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C2CB0000, based on PE: true
    • Associated: 00000000.00000002.2085149502.00007FF6C2CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2085346990.00007FF6C2F69000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2085412476.00007FF6C304A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2085431470.00007FF6C3050000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2085449632.00007FF6C3051000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2085449632.00007FF6C3B61000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2085730685.00007FF6C3B64000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2085755611.00007FF6C3B87000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6c2cb0000_SecuriteInfo.jbxd
    Similarity
    • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
    • String ID:
    • API String ID: 2933794660-0
    • Opcode ID: 544660ef1adda2d0d3465b46f70e1f5bad1ab980ae675daa52b1b844dfe20aed
    • Instruction ID: 928e7eeab497201c8e0c0f26e92772dcdf7d7ee48cb9434570022d1d9cc2d24f
    • Opcode Fuzzy Hash: 544660ef1adda2d0d3465b46f70e1f5bad1ab980ae675daa52b1b844dfe20aed
    • Instruction Fuzzy Hash: E5111832B54B058AEB00DF64E8952B833A4FB19B59F441E31DEAD877A4DF78D198C340
    Memory Dump Source
    • Source File: 00000000.00000002.2085165869.00007FF6C2CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C2CB0000, based on PE: true
    • Associated: 00000000.00000002.2085149502.00007FF6C2CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2085346990.00007FF6C2F69000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2085412476.00007FF6C304A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2085431470.00007FF6C3050000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2085449632.00007FF6C3051000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2085449632.00007FF6C3B61000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2085730685.00007FF6C3B64000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2085755611.00007FF6C3B87000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6c2cb0000_SecuriteInfo.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: ce9f9c2d38e9315b76ebff0ecb0babbfd6debcdf9fdbde13dbfd29e63910a9b1
    • Instruction ID: 6a9e3912bce0d61b31a29766b48d6367eafb8462161866da0784ea79eee18311
    • Opcode Fuzzy Hash: ce9f9c2d38e9315b76ebff0ecb0babbfd6debcdf9fdbde13dbfd29e63910a9b1
    • Instruction Fuzzy Hash: 0D324D730746404BD31F8F2EE99168AB291F748AA2749B238FE57C7B54F67CEE158600
    Memory Dump Source
    • Source File: 00000000.00000002.2085165869.00007FF6C2CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C2CB0000, based on PE: true
    • Associated: 00000000.00000002.2085149502.00007FF6C2CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2085346990.00007FF6C2F69000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2085412476.00007FF6C304A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2085431470.00007FF6C3050000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2085449632.00007FF6C3051000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2085449632.00007FF6C3B61000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2085730685.00007FF6C3B64000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2085755611.00007FF6C3B87000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6c2cb0000_SecuriteInfo.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 64c4d506d6f5baa5ddf45db93394aa0249ac63765b51e1c6f4cbb588a991aae8
    • Instruction ID: d421682990757b21f96da440c686f297c44132811b3019abdbc8e79101ba4398
    • Opcode Fuzzy Hash: 64c4d506d6f5baa5ddf45db93394aa0249ac63765b51e1c6f4cbb588a991aae8
    • Instruction Fuzzy Hash: 8F3257F6B90A6596DB048F16E94178D7B64F319BC9F898526DF8C83B54EB38E472C300
    Memory Dump Source
    • Source File: 00000000.00000002.2085165869.00007FF6C2CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C2CB0000, based on PE: true
    • Associated: 00000000.00000002.2085149502.00007FF6C2CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2085346990.00007FF6C2F69000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2085412476.00007FF6C304A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2085431470.00007FF6C3050000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2085449632.00007FF6C3051000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2085449632.00007FF6C3B61000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2085730685.00007FF6C3B64000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2085755611.00007FF6C3B87000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6c2cb0000_SecuriteInfo.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: da4e0bef70938cbff3ddc027717a94aa642f7c83641c9a7372ad5beb682580e2
    • Instruction ID: 785a28f7c18957084dd2479ea630a1827c0365b4013d5e944545ea9c4204b593
    • Opcode Fuzzy Hash: da4e0bef70938cbff3ddc027717a94aa642f7c83641c9a7372ad5beb682580e2
    • Instruction Fuzzy Hash: 1CF0BE323683A045CB95CA3AA508F596EE19796BC9F22D030EA4CC3F14F92EC6118B00
    Memory Dump Source
    • Source File: 00000000.00000002.2085165869.00007FF6C2CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C2CB0000, based on PE: true
    • Associated: 00000000.00000002.2085149502.00007FF6C2CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2085346990.00007FF6C2F69000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2085412476.00007FF6C304A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2085431470.00007FF6C3050000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2085449632.00007FF6C3051000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2085449632.00007FF6C3B61000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2085730685.00007FF6C3B64000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2085755611.00007FF6C3B87000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6c2cb0000_SecuriteInfo.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 08034d843012e041d9826064999ec11cfe67fa1a964a6beaae8090bac19fbb3b
    • Instruction ID: bc357a5f053f667943e306a0d30d28b98f9f1f1203cb8868fc832bda2988fd1a
    • Opcode Fuzzy Hash: 08034d843012e041d9826064999ec11cfe67fa1a964a6beaae8090bac19fbb3b
    • Instruction Fuzzy Hash: E2E04F727193A445CB96CE3B2608EA96AE4A759BCAF43D030DE4DC3F55FD6EC6018B40
    Memory Dump Source
    • Source File: 00000000.00000002.2085165869.00007FF6C2CB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF6C2CB0000, based on PE: true
    • Associated: 00000000.00000002.2085149502.00007FF6C2CB0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2085346990.00007FF6C2F69000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2085412476.00007FF6C304A000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2085431470.00007FF6C3050000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2085449632.00007FF6C3051000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2085449632.00007FF6C3B61000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2085730685.00007FF6C3B64000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2085755611.00007FF6C3B87000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff6c2cb0000_SecuriteInfo.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: b0a9a5407497fd1e8d7d80731b49a5348b77e3e96a071c0c0590965096a0236e
    • Instruction ID: 24d7d5f9e2fdc4ea6cf4ec70f68949aa10aa42849ddc196fc5a09aa766b230b2
    • Opcode Fuzzy Hash: b0a9a5407497fd1e8d7d80731b49a5348b77e3e96a071c0c0590965096a0236e
    • Instruction Fuzzy Hash: