Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample name:file.exe
Analysis ID:1545783
MD5:efa0b9c13bde82281933a7a8c82d7c44
SHA1:68c7e20b1c8f448a6a0c14627c657473738ad66d
SHA256:699d8d2f961ce58115ad43b6d23f10c16116d3c393968e540820ba84b8c02a46
Tags:exeuser-Bitsight
Infos:

Detection

Score:72
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
.NET source code contains potential unpacker
AI detected suspicious sample
Found potential dummy code loops (likely to delay analysis)
Machine Learning detection for sample
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Detected potential crypto function
Program does not show much activity (idle)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files

Classification

  • System is w10x64
  • file.exe (PID: 7492 cmdline: "C:\Users\user\Desktop\file.exe" MD5: EFA0B9C13BDE82281933A7A8C82D7C44)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: file.exeAvira: detected
Source: file.exeReversingLabs: Detection: 13%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 97.7% probability
Source: file.exeJoe Sandbox ML: detected
Source: file.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: file.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: C:\Users\user\Desktop\file.exeProcess Stats: CPU usage > 49%
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006918640_2_00691864
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006918510_2_00691851
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00691C390_2_00691C39
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0069181A0_2_0069181A
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006918100_2_00691810
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00691CC10_2_00691CC1
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00691C990_2_00691C99
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00691B170_2_00691B17
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_006917C80_2_006917C8
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00691BAB0_2_00691BAB
Source: file.exe, 00000000.00000000.1672379983.000000000005E000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenamehostname.exe6 vs file.exe
Source: file.exe, 00000000.00000002.4130420062.00000000006BE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs file.exe
Source: file.exeBinary or memory string: OriginalFilenamehostname.exe6 vs file.exe
Source: file.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: classification engineClassification label: mal72.evad.winEXE@1/0@0/0
Source: C:\Users\user\Desktop\file.exeMutant created: NULL
Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: file.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: file.exeReversingLabs: Detection: 13%
Source: C:\Users\user\Desktop\file.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: winnsi.dllJump to behavior
Source: file.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: file.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

Data Obfuscation

barindex
Source: file.exe, Request.cs.Net Code: EnableProduct System.Reflection.Assembly.Load(byte[])
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeMemory allocated: 690000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\file.exeMemory allocated: 24C0000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\file.exeMemory allocated: 2380000 memory reserve | memory write watchJump to behavior
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected

Anti Debugging

barindex
Source: C:\Users\user\Desktop\file.exeProcess Stats: CPU usage > 42% for more than 60s
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\file.exeMemory allocated: page read and write | page guardJump to behavior
Source: C:\Users\user\Desktop\file.exeQueries volume information: C:\Users\user\Desktop\file.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\file.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
DLL Side-Loading
111
Virtualization/Sandbox Evasion
OS Credential Dumping1
Security Software Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
Disable or Modify Tools
LSASS Memory111
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Software Packing
Security Account Manager12
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
file.exe13%ReversingLabs
file.exe100%AviraHEUR/AGEN.1323344
file.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
No contacted IP infos
Joe Sandbox version:41.0.0 Charoite
Analysis ID:1545783
Start date and time:2024-10-31 01:14:06 +01:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 5m 59s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:5
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:file.exe
Detection:MAL
Classification:mal72.evad.winEXE@1/0@0/0
EGA Information:Failed
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 9
  • Number of non-executed functions: 8
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Override analysis time to 240s for sample files taking high CPU consumption
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
  • Execution Graph export aborted for target file.exe, PID 7492 because it is empty
  • Not all processes where analyzed, report is missing behavior information
  • VT rate limit hit for: file.exe
No simulations
No context
No context
No context
No context
No context
No created / dropped files found
File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
Entropy (8bit):5.832828456379374
TrID:
  • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
  • Win32 Executable (generic) a (10002005/4) 49.97%
  • Generic Win/DOS Executable (2004/3) 0.01%
  • DOS Executable Generic (2002/1) 0.01%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:file.exe
File size:427'008 bytes
MD5:efa0b9c13bde82281933a7a8c82d7c44
SHA1:68c7e20b1c8f448a6a0c14627c657473738ad66d
SHA256:699d8d2f961ce58115ad43b6d23f10c16116d3c393968e540820ba84b8c02a46
SHA512:b25f5541963287bcda2a10fb41262fc21a5d1bb3489fbfe071390148888be6fd3d7307b4966a2faf6c87e849179c26734874a0d2c32b33684d023e30a6f85110
SSDEEP:6144:GhOq5MCoIwRcV8l6mxhRI9mLac7DSTjlzwDOF0xcm5DOZLNcly:GhOgMCoJc+6mHRI9UOq31
TLSH:1B94C503BDA6CA54EA385733D5A742701BF0ED46B6BBE60972C933D90C73B625E11227
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....."g................................. ........@.. ....................................`................................
Icon Hash:172d636864632917
Entrypoint:0x44c38e
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x400000
Subsystem:windows gui
Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Time Stamp:0x6722B484 [Wed Oct 30 22:34:44 2024 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:4
OS Version Minor:0
File Version Major:4
File Version Minor:0
Subsystem Version Major:4
Subsystem Version Minor:0
Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
Instruction
jmp dword ptr [00402000h]
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x4c3400x4b.text
IMAGE_DIRECTORY_ENTRY_RESOURCE0x4e0000x1da54.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x684000x0.rsrc
IMAGE_DIRECTORY_ENTRY_BASERELOC0x6c0000xc.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x20000x4a3940x4a40049ec64de252d37c1d1d6c36b2955fd2bFalse0.3793731586700337data5.48265482909059IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.rsrc0x4e0000x1da540x1dc00ff2ad75a7f457b91f1ee5e6535cf5424False0.2798795299369748data5.690680520317174IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0x6c0000xc0x2000f14be377827966c18d94005dffbf2d5False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_ICON0x4e2200x468Device independent bitmap graphic, 16 x 32 x 32, image size 10240.5150709219858156
RT_ICON0x4e6880x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 40960.28775797373358347
RT_ICON0x4f7300x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 92160.20923236514522822
RT_ICON0x51cd80x4228Device independent bitmap graphic, 64 x 128 x 32, image size 163840.16337978271138404
RT_ICON0x55f000x10828Device independent bitmap graphic, 128 x 256 x 32, image size 655360.09379805986040458
RT_ICON0x667280x4d81PNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9984879794365203
RT_GROUP_ICON0x6b4ac0x5adata0.7444444444444445
RT_VERSION0x6b5080x360data0.43171296296296297
RT_MANIFEST0x6b8680x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
DLLImport
mscoree.dll_CorExeMain
No network behavior found

Click to jump to process

Click to jump to process

Click to dive into process behavior distribution

Target ID:0
Start time:20:14:57
Start date:30/10/2024
Path:C:\Users\user\Desktop\file.exe
Wow64 process (32bit):true
Commandline:"C:\Users\user\Desktop\file.exe"
Imagebase:0x10000
File size:427'008 bytes
MD5 hash:EFA0B9C13BDE82281933A7A8C82D7C44
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:false

Reset < >
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4130378275.0000000000690000.00000040.00000800.00020000.00000000.sdmp, Offset: 00690000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_690000_file.jbxd
    Similarity
    • API ID:
    • String ID: <duq
    • API String ID: 0-2704095200
    • Opcode ID: b09a177254f950bd7fe5df53d1ab086fa53fe6252cbe9f0e5c6cab904e205103
    • Instruction ID: dd92092218396785d485d7e3b032753a2675617ea125c6e324069aa46b360983
    • Opcode Fuzzy Hash: b09a177254f950bd7fe5df53d1ab086fa53fe6252cbe9f0e5c6cab904e205103
    • Instruction Fuzzy Hash: 77A12534A00106CFDB49DF68D558BA9B7E7FB8A314F25C5A5E006AF7A5CB749C82CB40
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4130378275.0000000000690000.00000040.00000800.00020000.00000000.sdmp, Offset: 00690000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_690000_file.jbxd
    Similarity
    • API ID:
    • String ID: <duq
    • API String ID: 0-2704095200
    • Opcode ID: 00aa3f7c000f16c7cf0dd4a6bae3461408e0b460be2817deaceaf3bcbac59089
    • Instruction ID: ca47732c9118fb6eeab48550be0840af65470855a058cb12495d030226502b33
    • Opcode Fuzzy Hash: 00aa3f7c000f16c7cf0dd4a6bae3461408e0b460be2817deaceaf3bcbac59089
    • Instruction Fuzzy Hash: 0C912434A00106CFDB45DF69D598BA9B7F7FB8A300F25C5A6E0069F6A5CB349C82CB40
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.4130378275.0000000000690000.00000040.00000800.00020000.00000000.sdmp, Offset: 00690000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_690000_file.jbxd
    Similarity
    • API ID:
    • String ID: 4Td
    • API String ID: 0-1210820943
    • Opcode ID: bd6e2fb81afd015138bdde97f7be5085a178a4f6e95ef14f175ef62cc184e352
    • Instruction ID: 85ab45ee166633e88b8695f4ebddd73350c6a0d06fd8fd58631f062f39587860
    • Opcode Fuzzy Hash: bd6e2fb81afd015138bdde97f7be5085a178a4f6e95ef14f175ef62cc184e352
    • Instruction Fuzzy Hash: D7D01730A01108EF8B84EFA8EA4159DBBFAEB45301F1046A8D409EB312EB316F009B91
    Memory Dump Source
    • Source File: 00000000.00000002.4130236331.000000000063D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0063D000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_63d000_file.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 4008c3cb7e7af72347dce74fba9d603198b49f33af2159cde2e0904c0a946d96
    • Instruction ID: c0fa5fa8aa9f847b132daaaf6e4641afad3fdc4c4ac60e78f21036254d0c6c8a
    • Opcode Fuzzy Hash: 4008c3cb7e7af72347dce74fba9d603198b49f33af2159cde2e0904c0a946d96
    • Instruction Fuzzy Hash: DD210072504200DFCB05DF14E9C4B2BBFA6FB88314F20C6A9EE090B256C336D916CBA1
    Memory Dump Source
    • Source File: 00000000.00000002.4130236331.000000000063D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0063D000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_63d000_file.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: d4a9c2a4520ad29cc5014b186a1537c42efb92585eeaa8902cc1b22a323ac8e1
    • Instruction ID: 7fd3067d43a497b6a9fda03ebab56d1c55184f62724c7f9a0cd4ad7d69285e90
    • Opcode Fuzzy Hash: d4a9c2a4520ad29cc5014b186a1537c42efb92585eeaa8902cc1b22a323ac8e1
    • Instruction Fuzzy Hash: 71219D76504240DFDB06CF50D9C4B56BF72FB94314F24C5A9DD090A656C33AD92ACBA1
    Memory Dump Source
    • Source File: 00000000.00000002.4130378275.0000000000690000.00000040.00000800.00020000.00000000.sdmp, Offset: 00690000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_690000_file.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 032220a73404c074688defe881a397fef292c7e339f588276025006b3820ed58
    • Instruction ID: 06b854a4fc1bad793a56b934250c8aa18af2671baf172d10361ad990aa729f57
    • Opcode Fuzzy Hash: 032220a73404c074688defe881a397fef292c7e339f588276025006b3820ed58
    • Instruction Fuzzy Hash: D001D2353002038FCB55EA69D5007AA72DFE7C2751F348439D0198FB58DB78DC068B81
    Memory Dump Source
    • Source File: 00000000.00000002.4130378275.0000000000690000.00000040.00000800.00020000.00000000.sdmp, Offset: 00690000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_690000_file.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: ffee27f4ad60be159f039d7e7fb4750b882e43895b75f584b180c1af3fdca2e9
    • Instruction ID: fc3cf18e17219bb754577733e3a5a9b86c912c9a981dc1f80ccc841b999523b5
    • Opcode Fuzzy Hash: ffee27f4ad60be159f039d7e7fb4750b882e43895b75f584b180c1af3fdca2e9
    • Instruction Fuzzy Hash: 1AF082347005208FCB4EAB78D1192AC72D7ABCA302B64842CD006DF394DFB95D06C799
    Memory Dump Source
    • Source File: 00000000.00000002.4130378275.0000000000690000.00000040.00000800.00020000.00000000.sdmp, Offset: 00690000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_690000_file.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: c6f9efc2f25904c6c430d6c556e8df2bda1357922a7cc3fc2827b4bc581ce22d
    • Instruction ID: cd176d3a47773c7b6c8e17a38e340c341b50463ff7a7846288a62d69d3b826a7
    • Opcode Fuzzy Hash: c6f9efc2f25904c6c430d6c556e8df2bda1357922a7cc3fc2827b4bc581ce22d
    • Instruction Fuzzy Hash: 50D0A7359014B0DFFF40AF10DC402A87297FB41321FC19564C81327717CB204C0A8A96
    Memory Dump Source
    • Source File: 00000000.00000002.4130378275.0000000000690000.00000040.00000800.00020000.00000000.sdmp, Offset: 00690000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_690000_file.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 041f0ba806b6bd8504db1bcc373eda28c642829002c1b84ad2555316e7fefa20
    • Instruction ID: 40061c952e1446f38d5f41b7d992a834a612034aaf7ea8a5257ffd9fbc2f1fcc
    • Opcode Fuzzy Hash: 041f0ba806b6bd8504db1bcc373eda28c642829002c1b84ad2555316e7fefa20
    • Instruction Fuzzy Hash: 12C08C69829380CFCB020B105850300BF70BF0A263F8942CB9001CA1A3E22884068322
    Memory Dump Source
    • Source File: 00000000.00000002.4130378275.0000000000690000.00000040.00000800.00020000.00000000.sdmp, Offset: 00690000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_690000_file.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: eee320ae2699f81efd518512f9e18c62af08888c9ff8a54b2bc2ebfda7a877fa
    • Instruction ID: b338b5dab0749135460eba0e9ea46b51b7cce90b401d9b74675817289023bd84
    • Opcode Fuzzy Hash: eee320ae2699f81efd518512f9e18c62af08888c9ff8a54b2bc2ebfda7a877fa
    • Instruction Fuzzy Hash: D9712434A00506CFEB45DF68D598BA9B7E7FB8A300F25C5A5D006AF765CB749D82CB40
    Memory Dump Source
    • Source File: 00000000.00000002.4130378275.0000000000690000.00000040.00000800.00020000.00000000.sdmp, Offset: 00690000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_690000_file.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 0d78d73ca12979d62acc7b7ab648c6b08c4186e462cc58818a8de0dc8d84411e
    • Instruction ID: 621faea6433772b51894028d66a596aff24168a9be404d8ef5c32fa7b5cfea19
    • Opcode Fuzzy Hash: 0d78d73ca12979d62acc7b7ab648c6b08c4186e462cc58818a8de0dc8d84411e
    • Instruction Fuzzy Hash: 71711434A00106CFEB44DF69D958BA9B7E7FB8A300F25C5A6D006AF765CB749C81DB40
    Memory Dump Source
    • Source File: 00000000.00000002.4130378275.0000000000690000.00000040.00000800.00020000.00000000.sdmp, Offset: 00690000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_690000_file.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: ec450f189f9286f0306b9a5a58ea040532451cb97af3b4802a0534ff53adb03f
    • Instruction ID: 4b5b67e213d84f3328ef03dc96f752b1ff95ee2d8e5defe42df16fcd39fd071b
    • Opcode Fuzzy Hash: ec450f189f9286f0306b9a5a58ea040532451cb97af3b4802a0534ff53adb03f
    • Instruction Fuzzy Hash: C971F334A00106CFEB45DF69D598BA9B7E7FB8A300F29C5A6D006AF665CB749D81CF00
    Memory Dump Source
    • Source File: 00000000.00000002.4130378275.0000000000690000.00000040.00000800.00020000.00000000.sdmp, Offset: 00690000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_690000_file.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 5244a38dada9704c67fcdfa716b0cb5b004fa0aec49a82c0b4a35464d585f340
    • Instruction ID: 84a3d584fa690a54de12faba5da1207f5082383750747c46764daffcf08bb439
    • Opcode Fuzzy Hash: 5244a38dada9704c67fcdfa716b0cb5b004fa0aec49a82c0b4a35464d585f340
    • Instruction Fuzzy Hash: D971F234A00106CFEB45DF69D598BA9B7F7BB8A300F25C5A6D006AF665CB749D81CF00
    Memory Dump Source
    • Source File: 00000000.00000002.4130378275.0000000000690000.00000040.00000800.00020000.00000000.sdmp, Offset: 00690000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_690000_file.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: c4b27cc14584fa2081cd370aeb0e58d4d0de08dc75bbb1da28cd6b0758b1d846
    • Instruction ID: b38432c7763d6d3a7dfba3117491eff6930ed4d4c345ee5472833268e3478f60
    • Opcode Fuzzy Hash: c4b27cc14584fa2081cd370aeb0e58d4d0de08dc75bbb1da28cd6b0758b1d846
    • Instruction Fuzzy Hash: 2A710334A00106CFEB45DF69D598BA9B7E7FB8A300F25C5A6D006AF665CB749D81CF00
    Memory Dump Source
    • Source File: 00000000.00000002.4130378275.0000000000690000.00000040.00000800.00020000.00000000.sdmp, Offset: 00690000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_690000_file.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: b99fed587a9bc0886c142896865d1ff5f4138fce24b4166ee8e98a438ba97c81
    • Instruction ID: 5165fb856dadb7e8d4907b0ea0f4fd9a074f18d339cfe1bb2e7f64e93b32c1cc
    • Opcode Fuzzy Hash: b99fed587a9bc0886c142896865d1ff5f4138fce24b4166ee8e98a438ba97c81
    • Instruction Fuzzy Hash: D971F234A00106CFEB44DF69D598BA9B7F7BB8A310F25C5A6D006AF665CB749D82CB00
    Memory Dump Source
    • Source File: 00000000.00000002.4130378275.0000000000690000.00000040.00000800.00020000.00000000.sdmp, Offset: 00690000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_690000_file.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 84e687285230ef9e2c296c1e0ef1d3e700ad30612b6b0b7f993576881030f38b
    • Instruction ID: a2cf875bcda3794b0e98db96426a83e2cdf0a8060d5e519aaa4609cbf247c207
    • Opcode Fuzzy Hash: 84e687285230ef9e2c296c1e0ef1d3e700ad30612b6b0b7f993576881030f38b
    • Instruction Fuzzy Hash: 6571F334A00106CFEB45DF69D598BA9B7F7BB8A300F25C5A6D006AF665CB749D81DF00
    Memory Dump Source
    • Source File: 00000000.00000002.4130378275.0000000000690000.00000040.00000800.00020000.00000000.sdmp, Offset: 00690000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_690000_file.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 6de38fba9965c80efe280a4425532000bcf4374e7a7127682dfc75e5c38e5530
    • Instruction ID: 1a0648a0c9ce81aa3ad471772616c7341d206e8bff185f5a143b467c202ff73b
    • Opcode Fuzzy Hash: 6de38fba9965c80efe280a4425532000bcf4374e7a7127682dfc75e5c38e5530
    • Instruction Fuzzy Hash: B3711334A00106CFEB45DF69D598BA9B7E7FB8A300F25C5A6D006AF665CB749D81CF00