Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
1dVtYIvfHz.exe

Overview

General Information

Sample name:1dVtYIvfHz.exe
renamed because original name is a hash value
Original sample name:d0508d226f04b0503cfdc31bf103ac1f3cab29dc82a491563c4f2445205f54b9.exe
Analysis ID:1588686
MD5:dd166953bab4ff2e913a184718bd62e9
SHA1:000643ef1830df120c108554f96f0c0118686940
SHA256:d0508d226f04b0503cfdc31bf103ac1f3cab29dc82a491563c4f2445205f54b9
Tags:exeuser-adrian__luca
Infos:

Detection

Score:64
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Machine Learning detection for sample
Allocates memory with a write watch (potentially for evading sandboxes)
Contains long sleeps (>= 3 min)
Detected potential crypto function
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • 1dVtYIvfHz.exe (PID: 7312 cmdline: "C:\Users\user\Desktop\1dVtYIvfHz.exe" MD5: DD166953BAB4FF2E913A184718BD62E9)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: 1dVtYIvfHz.exeAvira: detected
Source: 1dVtYIvfHz.exeReversingLabs: Detection: 57%
Source: 1dVtYIvfHz.exeVirustotal: Detection: 37%Perma Link
Source: Submited SampleIntegrated Neural Analysis Model: Matched 98.6% probability
Source: 1dVtYIvfHz.exeJoe Sandbox ML: detected
Source: 1dVtYIvfHz.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: 1dVtYIvfHz.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: global trafficHTTP traffic detected: GET /salad/Cxjokei.dat HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /salad/Cxjokei.dat HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /salad/Cxjokei.dat HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /salad/Cxjokei.dat HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /salad/Cxjokei.dat HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /salad/Cxjokei.dat HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /salad/Cxjokei.dat HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /salad/Cxjokei.dat HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /salad/Cxjokei.dat HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: Joe Sandbox ViewIP Address: 45.9.191.182 45.9.191.182
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET /salad/Cxjokei.dat HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /salad/Cxjokei.dat HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /salad/Cxjokei.dat HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /salad/Cxjokei.dat HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /salad/Cxjokei.dat HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /salad/Cxjokei.dat HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /salad/Cxjokei.dat HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /salad/Cxjokei.dat HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /salad/Cxjokei.dat HTTP/1.1Host: xianggrhen.comConnection: Keep-Alive
Source: global trafficDNS traffic detected: DNS query: xianggrhen.com
Source: 1dVtYIvfHz.exeString found in binary or memory: http://crl.globalsign.com/ca/gstsacasha384g4.crl0
Source: 1dVtYIvfHz.exeString found in binary or memory: http://crl.globalsign.com/codesigningrootr45.crl0U
Source: 1dVtYIvfHz.exeString found in binary or memory: http://crl.globalsign.com/gsgccr45evcodesignca2020.crl0
Source: 1dVtYIvfHz.exeString found in binary or memory: http://crl.globalsign.com/root-r3.crl0G
Source: 1dVtYIvfHz.exeString found in binary or memory: http://crl.globalsign.com/root-r6.crl0G
Source: 1dVtYIvfHz.exeString found in binary or memory: http://crl.globalsign.com/root.crl0G
Source: 1dVtYIvfHz.exeString found in binary or memory: http://ocsp.globalsign.com/ca/gstsacasha384g40C
Source: 1dVtYIvfHz.exeString found in binary or memory: http://ocsp.globalsign.com/codesigningrootr450F
Source: 1dVtYIvfHz.exeString found in binary or memory: http://ocsp.globalsign.com/gsgccr45evcodesignca20200U
Source: 1dVtYIvfHz.exeString found in binary or memory: http://ocsp.globalsign.com/rootr103
Source: 1dVtYIvfHz.exeString found in binary or memory: http://ocsp.globalsign.com/rootr30;
Source: 1dVtYIvfHz.exeString found in binary or memory: http://ocsp2.globalsign.com/rootr606
Source: 1dVtYIvfHz.exe, 00000000.00000002.3216503548.0000000003136000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: 1dVtYIvfHz.exeString found in binary or memory: http://secure.globalsign.com/cacert/codesigningrootr45.crt0A
Source: 1dVtYIvfHz.exeString found in binary or memory: http://secure.globalsign.com/cacert/gsgccr45evcodesignca2020.crt0?
Source: 1dVtYIvfHz.exeString found in binary or memory: http://secure.globalsign.com/cacert/gstsacasha384g4.crt0
Source: 1dVtYIvfHz.exeString found in binary or memory: http://secure.globalsign.com/cacert/root-r3.crt06
Source: 1dVtYIvfHz.exe, 00000000.00000002.3216503548.0000000003151000.00000004.00000800.00020000.00000000.sdmp, 1dVtYIvfHz.exe, 00000000.00000002.3216503548.000000000318C000.00000004.00000800.00020000.00000000.sdmp, 1dVtYIvfHz.exe, 00000000.00000002.3216503548.0000000003136000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://xianggrhen.com
Source: 1dVtYIvfHz.exe, 00000000.00000002.3216503548.00000000030E1000.00000004.00000800.00020000.00000000.sdmp, 1dVtYIvfHz.exe, 00000000.00000002.3216503548.00000000030D9000.00000004.00000800.00020000.00000000.sdmp, 1dVtYIvfHz.exe, 00000000.00000002.3216503548.00000000030C5000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://xianggrhen.com/salad/Cxjokei.dat
Source: 1dVtYIvfHz.exe, 00000000.00000002.3216503548.0000000003180000.00000004.00000800.00020000.00000000.sdmp, 1dVtYIvfHz.exe, 00000000.00000002.3216503548.0000000003136000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://xianggrhen.com/salad/Cxjokei.datl
Source: 1dVtYIvfHz.exe, 00000000.00000002.3216503548.0000000003186000.00000004.00000800.00020000.00000000.sdmp, 1dVtYIvfHz.exe, 00000000.00000002.3216503548.0000000003178000.00000004.00000800.00020000.00000000.sdmp, 1dVtYIvfHz.exe, 00000000.00000002.3216503548.0000000003196000.00000004.00000800.00020000.00000000.sdmp, 1dVtYIvfHz.exe, 00000000.00000002.3216503548.000000000315A000.00000004.00000800.00020000.00000000.sdmp, 1dVtYIvfHz.exe, 00000000.00000002.3216503548.0000000003180000.00000004.00000800.00020000.00000000.sdmp, 1dVtYIvfHz.exe, 00000000.00000002.3216503548.000000000318C000.00000004.00000800.00020000.00000000.sdmp, 1dVtYIvfHz.exe, 00000000.00000002.3216503548.000000000317A000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://xianggrhen.comD
Source: 1dVtYIvfHz.exe, 00000000.00000002.3216503548.0000000003151000.00000004.00000800.00020000.00000000.sdmp, 1dVtYIvfHz.exe, 00000000.00000002.3216503548.000000000318C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://xianggrhen.comd
Source: 1dVtYIvfHz.exeString found in binary or memory: https://www.globalsign.com/repository/0
Source: C:\Users\user\Desktop\1dVtYIvfHz.exeCode function: 0_2_02F5E5F40_2_02F5E5F4
Source: C:\Users\user\Desktop\1dVtYIvfHz.exeCode function: 0_2_02F5F4F80_2_02F5F4F8
Source: C:\Users\user\Desktop\1dVtYIvfHz.exeCode function: 0_2_02F5F4E80_2_02F5F4E8
Source: 1dVtYIvfHz.exeStatic PE information: invalid certificate
Source: 1dVtYIvfHz.exe, 00000000.00000002.3216006053.000000000143E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs 1dVtYIvfHz.exe
Source: 1dVtYIvfHz.exe, 00000000.00000000.1368042891.0000000000D3A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameYbkkuyi.exe vs 1dVtYIvfHz.exe
Source: 1dVtYIvfHz.exeBinary or memory string: OriginalFilenameYbkkuyi.exe vs 1dVtYIvfHz.exe
Source: 1dVtYIvfHz.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: classification engineClassification label: mal64.winEXE@1/0@1/1
Source: C:\Users\user\Desktop\1dVtYIvfHz.exeMutant created: NULL
Source: 1dVtYIvfHz.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: 1dVtYIvfHz.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
Source: C:\Users\user\Desktop\1dVtYIvfHz.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: 1dVtYIvfHz.exeReversingLabs: Detection: 57%
Source: 1dVtYIvfHz.exeVirustotal: Detection: 37%
Source: C:\Users\user\Desktop\1dVtYIvfHz.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Users\user\Desktop\1dVtYIvfHz.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\1dVtYIvfHz.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\1dVtYIvfHz.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\1dVtYIvfHz.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\1dVtYIvfHz.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\1dVtYIvfHz.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\1dVtYIvfHz.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\1dVtYIvfHz.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\1dVtYIvfHz.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\1dVtYIvfHz.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\1dVtYIvfHz.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\1dVtYIvfHz.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\1dVtYIvfHz.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\1dVtYIvfHz.exeSection loaded: amsi.dllJump to behavior
Source: C:\Users\user\Desktop\1dVtYIvfHz.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\1dVtYIvfHz.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Users\user\Desktop\1dVtYIvfHz.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Users\user\Desktop\1dVtYIvfHz.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\1dVtYIvfHz.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\1dVtYIvfHz.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Users\user\Desktop\1dVtYIvfHz.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Users\user\Desktop\1dVtYIvfHz.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\1dVtYIvfHz.exeSection loaded: rasapi32.dllJump to behavior
Source: C:\Users\user\Desktop\1dVtYIvfHz.exeSection loaded: rasman.dllJump to behavior
Source: C:\Users\user\Desktop\1dVtYIvfHz.exeSection loaded: rtutils.dllJump to behavior
Source: C:\Users\user\Desktop\1dVtYIvfHz.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\1dVtYIvfHz.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\1dVtYIvfHz.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\1dVtYIvfHz.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\1dVtYIvfHz.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\1dVtYIvfHz.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0EE7644B-1BAD-48B1-9889-0281C206EB85}\InprocServer32Jump to behavior
Source: 1dVtYIvfHz.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: 1dVtYIvfHz.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: C:\Users\user\Desktop\1dVtYIvfHz.exeCode function: 0_2_02F5EFC0 pushfd ; retf 0_2_02F5EFC1
Source: C:\Users\user\Desktop\1dVtYIvfHz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\1dVtYIvfHz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\1dVtYIvfHz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\1dVtYIvfHz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\1dVtYIvfHz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\1dVtYIvfHz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\1dVtYIvfHz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\1dVtYIvfHz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\1dVtYIvfHz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\1dVtYIvfHz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\1dVtYIvfHz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\1dVtYIvfHz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\1dVtYIvfHz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\1dVtYIvfHz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\1dVtYIvfHz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\1dVtYIvfHz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\1dVtYIvfHz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\1dVtYIvfHz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\1dVtYIvfHz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\1dVtYIvfHz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\1dVtYIvfHz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\1dVtYIvfHz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\1dVtYIvfHz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\1dVtYIvfHz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\1dVtYIvfHz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\1dVtYIvfHz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\1dVtYIvfHz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\1dVtYIvfHz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\1dVtYIvfHz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\1dVtYIvfHz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\1dVtYIvfHz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\1dVtYIvfHz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\1dVtYIvfHz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\1dVtYIvfHz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\1dVtYIvfHz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\1dVtYIvfHz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\1dVtYIvfHz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\1dVtYIvfHz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\1dVtYIvfHz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\1dVtYIvfHz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\1dVtYIvfHz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\1dVtYIvfHz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\1dVtYIvfHz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\1dVtYIvfHz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\1dVtYIvfHz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\1dVtYIvfHz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\1dVtYIvfHz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\1dVtYIvfHz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\1dVtYIvfHz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\1dVtYIvfHz.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\1dVtYIvfHz.exeMemory allocated: 2E90000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\1dVtYIvfHz.exeMemory allocated: 3070000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\1dVtYIvfHz.exeMemory allocated: 2E90000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\1dVtYIvfHz.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\1dVtYIvfHz.exeWindow / User API: threadDelayed 886Jump to behavior
Source: C:\Users\user\Desktop\1dVtYIvfHz.exeWindow / User API: threadDelayed 1019Jump to behavior
Source: C:\Users\user\Desktop\1dVtYIvfHz.exe TID: 7384Thread sleep time: -922337203685477s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\1dVtYIvfHz.exe TID: 7384Thread sleep time: -100000s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\1dVtYIvfHz.exe TID: 7412Thread sleep count: 886 > 30Jump to behavior
Source: C:\Users\user\Desktop\1dVtYIvfHz.exe TID: 7836Thread sleep count: 1019 > 30Jump to behavior
Source: C:\Users\user\Desktop\1dVtYIvfHz.exe TID: 7384Thread sleep time: -85656s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\1dVtYIvfHz.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\1dVtYIvfHz.exeThread delayed: delay time: 100000Jump to behavior
Source: C:\Users\user\Desktop\1dVtYIvfHz.exeThread delayed: delay time: 85656Jump to behavior
Source: 1dVtYIvfHz.exe, 00000000.00000002.3216006053.000000000148C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Users\user\Desktop\1dVtYIvfHz.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\1dVtYIvfHz.exeMemory allocated: page read and write | page guardJump to behavior
Source: C:\Users\user\Desktop\1dVtYIvfHz.exeQueries volume information: C:\Users\user\Desktop\1dVtYIvfHz.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\1dVtYIvfHz.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\1dVtYIvfHz.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\1dVtYIvfHz.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\1dVtYIvfHz.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
DLL Side-Loading
1
Disable or Modify Tools
OS Credential Dumping1
Security Software Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts31
Virtualization/Sandbox Evasion
LSASS Memory31
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable Media2
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager1
Application Window Discovery
SMB/Windows Admin SharesData from Network Shared Drive2
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Obfuscated Files or Information
NTDS12
System Information Discovery
Distributed Component Object ModelInput Capture1
Ingress Tool Transfer
Traffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
1dVtYIvfHz.exe58%ReversingLabsWin32.Trojan.Jalapeno
1dVtYIvfHz.exe38%VirustotalBrowse
1dVtYIvfHz.exe100%AviraTR/Dropper.Gen7
1dVtYIvfHz.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://xianggrhen.com/salad/Cxjokei.datl0%Avira URL Cloudsafe
http://xianggrhen.com/salad/Cxjokei.dat0%Avira URL Cloudsafe
http://xianggrhen.comD0%Avira URL Cloudsafe
http://xianggrhen.com0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
s-part-0017.t-0009.t-msedge.net
13.107.246.45
truefalse
    high
    xianggrhen.com
    45.9.191.182
    truefalse
      high
      NameMaliciousAntivirus DetectionReputation
      http://xianggrhen.com/salad/Cxjokei.datfalse
      • Avira URL Cloud: safe
      unknown
      NameSourceMaliciousAntivirus DetectionReputation
      http://xianggrhen.com/salad/Cxjokei.datl1dVtYIvfHz.exe, 00000000.00000002.3216503548.0000000003180000.00000004.00000800.00020000.00000000.sdmp, 1dVtYIvfHz.exe, 00000000.00000002.3216503548.0000000003136000.00000004.00000800.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://xianggrhen.com1dVtYIvfHz.exe, 00000000.00000002.3216503548.0000000003151000.00000004.00000800.00020000.00000000.sdmp, 1dVtYIvfHz.exe, 00000000.00000002.3216503548.000000000318C000.00000004.00000800.00020000.00000000.sdmp, 1dVtYIvfHz.exe, 00000000.00000002.3216503548.0000000003136000.00000004.00000800.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name1dVtYIvfHz.exe, 00000000.00000002.3216503548.0000000003136000.00000004.00000800.00020000.00000000.sdmpfalse
        high
        http://xianggrhen.comD1dVtYIvfHz.exe, 00000000.00000002.3216503548.0000000003186000.00000004.00000800.00020000.00000000.sdmp, 1dVtYIvfHz.exe, 00000000.00000002.3216503548.0000000003178000.00000004.00000800.00020000.00000000.sdmp, 1dVtYIvfHz.exe, 00000000.00000002.3216503548.0000000003196000.00000004.00000800.00020000.00000000.sdmp, 1dVtYIvfHz.exe, 00000000.00000002.3216503548.000000000315A000.00000004.00000800.00020000.00000000.sdmp, 1dVtYIvfHz.exe, 00000000.00000002.3216503548.0000000003180000.00000004.00000800.00020000.00000000.sdmp, 1dVtYIvfHz.exe, 00000000.00000002.3216503548.000000000318C000.00000004.00000800.00020000.00000000.sdmp, 1dVtYIvfHz.exe, 00000000.00000002.3216503548.000000000317A000.00000004.00000800.00020000.00000000.sdmpfalse
        • Avira URL Cloud: safe
        unknown
        http://xianggrhen.comd1dVtYIvfHz.exe, 00000000.00000002.3216503548.0000000003151000.00000004.00000800.00020000.00000000.sdmp, 1dVtYIvfHz.exe, 00000000.00000002.3216503548.000000000318C000.00000004.00000800.00020000.00000000.sdmpfalse
          unknown
          • No. of IPs < 25%
          • 25% < No. of IPs < 50%
          • 50% < No. of IPs < 75%
          • 75% < No. of IPs
          IPDomainCountryFlagASNASN NameMalicious
          45.9.191.182
          xianggrhen.comGermany
          47583AS-HOSTINGERLTfalse
          Joe Sandbox version:42.0.0 Malachite
          Analysis ID:1588686
          Start date and time:2025-01-11 04:17:08 +01:00
          Joe Sandbox product:CloudBasic
          Overall analysis duration:0h 5m 37s
          Hypervisor based Inspection enabled:false
          Report type:full
          Cookbook file name:default.jbs
          Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
          Run name:Run with higher sleep bypass
          Number of analysed new started processes analysed:8
          Number of new started drivers analysed:0
          Number of existing processes analysed:0
          Number of existing drivers analysed:0
          Number of injected processes analysed:0
          Technologies:
          • HCA enabled
          • EGA enabled
          • AMSI enabled
          Analysis Mode:default
          Analysis stop reason:Timeout
          Sample name:1dVtYIvfHz.exe
          renamed because original name is a hash value
          Original Sample Name:d0508d226f04b0503cfdc31bf103ac1f3cab29dc82a491563c4f2445205f54b9.exe
          Detection:MAL
          Classification:mal64.winEXE@1/0@1/1
          EGA Information:
          • Successful, ratio: 100%
          HCA Information:
          • Successful, ratio: 98%
          • Number of executed functions: 10
          • Number of non-executed functions: 3
          Cookbook Comments:
          • Found application associated with file extension: .exe
          • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
          • Sleep loops longer than 100000000ms are bypassed. Single calls with delay of 100000000ms and higher are ignored
          • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
          • Excluded IPs from analysis (whitelisted): 13.107.246.45, 4.175.87.197
          • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, otelrules.afd.azureedge.net, azureedge-t-prod.trafficmanager.net, fe3cr.delivery.mp.microsoft.com
          • Not all processes where analyzed, report is missing behavior information
          • Report size getting too big, too many NtQueryValueKey calls found.
          • Report size getting too big, too many NtReadVirtualMemory calls found.
          No simulations
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          45.9.191.182oe8KMVNFEG.exeGet hashmaliciousUnknownBrowse
          • xianggrhen.com/salad/Ekaopt.mp4
          oe8KMVNFEG.exeGet hashmaliciousUnknownBrowse
          • xianggrhen.com/salad/Ekaopt.mp4
          PqJockhBoA.exeGet hashmaliciousUnknownBrowse
          • xianggrhen.com/basket/Snobzw.vdf
          PqJockhBoA.exeGet hashmaliciousUnknownBrowse
          • xianggrhen.com/basket/Snobzw.vdf
          EZ9o9I0iW9.exeGet hashmaliciousUnknownBrowse
          • xianggrhen.com/book/Fvrbzpfzrm.vdf
          EZ9o9I0iW9.exeGet hashmaliciousUnknownBrowse
          • xianggrhen.com/book/Fvrbzpfzrm.vdf
          rDecPayment_Swi.exeGet hashmaliciousUnknownBrowse
          • xianggrhen.com/book/Netnoyfq.mp3
          10thDecember2024SWIFT-40111-34000-5410-24532-10477-65011-239605.exeGet hashmaliciousUnknownBrowse
          • xianggrhen.com/composure/Emmaj.vdf
          LE-Y5029-D3948-W3029-K4302-Q20930-R4039-Y4938-E3028-LA3829-D300.exeGet hashmaliciousUnknownBrowse
          • xianggrhen.com/composure/Vuglyxyuvio.pdf
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          s-part-0017.t-0009.t-msedge.netFJRUb5lb9m.exeGet hashmaliciousFormBookBrowse
          • 13.107.246.45
          5hD3Yjf7xD.exeGet hashmaliciousAgentTeslaBrowse
          • 13.107.246.45
          02Eh1ah35H.exeGet hashmaliciousGuLoaderBrowse
          • 13.107.246.45
          AJ5zYYsisA.exeGet hashmaliciousUnknownBrowse
          • 13.107.246.45
          suBpo1g13Q.exeGet hashmaliciousFormBookBrowse
          • 13.107.246.45
          1297823757234143258.jsGet hashmaliciousStrela DownloaderBrowse
          • 13.107.246.45
          4N4nldx1wW.exeGet hashmaliciousFormBookBrowse
          • 13.107.246.45
          1487427797195518826.jsGet hashmaliciousStrela DownloaderBrowse
          • 13.107.246.45
          5by4QM3v89.exeGet hashmaliciousFormBookBrowse
          • 13.107.246.45
          uEuTtkxAqq.exeGet hashmaliciousAgentTeslaBrowse
          • 13.107.246.45
          xianggrhen.comoe8KMVNFEG.exeGet hashmaliciousUnknownBrowse
          • 45.9.191.182
          oe8KMVNFEG.exeGet hashmaliciousUnknownBrowse
          • 45.9.191.182
          PqJockhBoA.exeGet hashmaliciousUnknownBrowse
          • 45.9.191.182
          PqJockhBoA.exeGet hashmaliciousUnknownBrowse
          • 45.9.191.182
          EZ9o9I0iW9.exeGet hashmaliciousUnknownBrowse
          • 45.9.191.182
          EZ9o9I0iW9.exeGet hashmaliciousUnknownBrowse
          • 45.9.191.182
          rDecPayment_Swi.exeGet hashmaliciousUnknownBrowse
          • 45.9.191.182
          10thDecember2024SWIFT-40111-34000-5410-24532-10477-65011-239605.exeGet hashmaliciousUnknownBrowse
          • 45.9.191.182
          LE-Y5029-D3948-W3029-K4302-Q20930-R4039-Y4938-E3028-LA3829-D300.exeGet hashmaliciousUnknownBrowse
          • 45.9.191.182
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          AS-HOSTINGERLToe8KMVNFEG.exeGet hashmaliciousUnknownBrowse
          • 45.9.191.182
          oe8KMVNFEG.exeGet hashmaliciousUnknownBrowse
          • 45.9.191.182
          PqJockhBoA.exeGet hashmaliciousUnknownBrowse
          • 45.9.191.182
          PqJockhBoA.exeGet hashmaliciousUnknownBrowse
          • 45.9.191.182
          EZ9o9I0iW9.exeGet hashmaliciousUnknownBrowse
          • 45.9.191.182
          EZ9o9I0iW9.exeGet hashmaliciousUnknownBrowse
          • 45.9.191.182
          Employee_Letter.pdfGet hashmaliciousHTMLPhisherBrowse
          • 92.249.45.121
          rDecPayment_Swi.exeGet hashmaliciousUnknownBrowse
          • 45.9.191.182
          10thDecember2024SWIFT-40111-34000-5410-24532-10477-65011-239605.exeGet hashmaliciousUnknownBrowse
          • 45.9.191.182
          No context
          No context
          No created / dropped files found
          File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
          Entropy (8bit):5.671888719535908
          TrID:
          • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
          • Win32 Executable (generic) a (10002005/4) 49.97%
          • Generic Win/DOS Executable (2004/3) 0.01%
          • DOS Executable Generic (2002/1) 0.01%
          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
          File name:1dVtYIvfHz.exe
          File size:351'976 bytes
          MD5:dd166953bab4ff2e913a184718bd62e9
          SHA1:000643ef1830df120c108554f96f0c0118686940
          SHA256:d0508d226f04b0503cfdc31bf103ac1f3cab29dc82a491563c4f2445205f54b9
          SHA512:3b50152dc512a3512e9ec4db1abeb3664cfe8157062d6ee31f79b4285b71e352e498e24871f97a3b08226874cc100b3b79537d6cb625cb8f59ef575da80bf933
          SSDEEP:6144:yPswcSsJbPusU/NRaHreSnX7beS/bCfgH4e5:yEJbbUnqtygYy
          TLSH:3E7408C4EFD5C46AC69801F4E05D1A05D2B0A0C963B38F462AAB97BC16E774DDCCE2E5
          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...U.Og.................j............... ........@.. ....................................`................................
          Icon Hash:3b5bdb2b1b0b0b0b
          Entrypoint:0x42888e
          Entrypoint Section:.text
          Digitally signed:true
          Imagebase:0x400000
          Subsystem:windows gui
          Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
          DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Time Stamp:0x674FDA55 [Wed Dec 4 04:28:05 2024 UTC]
          TLS Callbacks:
          CLR (.Net) Version:
          OS Version Major:4
          OS Version Minor:0
          File Version Major:4
          File Version Minor:0
          Subsystem Version Major:4
          Subsystem Version Minor:0
          Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
          Signature Valid:false
          Signature Issuer:CN=GlobalSign GCC R45 EV CodeSigning CA 2020, O=GlobalSign nv-sa, C=BE
          Signature Validation Error:The digital signature of the object did not verify
          Error Number:-2146869232
          Not Before, Not After
          • 24/08/2022 15:29:13 06/11/2025 13:58:18
          Subject Chain
          • E=info@globosoft.it, CN=Globosoft S.R.L., O=Globosoft S.R.L., STREET=VIA CARLO BERNARI 87, L=Roma, S=Roma, C=IT, OID.1.3.6.1.4.1.311.60.2.1.3=IT, SERIALNUMBER=12054021006, OID.2.5.4.15=Private Organization
          Version:3
          Thumbprint MD5:7CCFAD288E8558FC98E706899C386B07
          Thumbprint SHA-1:71613B85A7BED5AA589F5F6E24D5283BDAEA4766
          Thumbprint SHA-256:B70F6F6379A71B36BB4D65649E37F9B5D3C8208E54DCFDF4AB540983B6A42B76
          Serial:58342CE46C494F63BA76D6CA
          Instruction
          jmp dword ptr [00402000h]
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          add byte ptr [eax], al
          NameVirtual AddressVirtual Size Is in Section
          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IMPORT0x2883c0x4f.text
          IMAGE_DIRECTORY_ENTRY_RESOURCE0x2a0000x2be00.rsrc
          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
          IMAGE_DIRECTORY_ENTRY_SECURITY0x52c000x32e8
          IMAGE_DIRECTORY_ENTRY_BASERELOC0x560000xc.reloc
          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
          .text0x20000x268940x26a00fd7428a84afc2861092516c164797326False0.4367604672330097data6.04358717296077IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          .rsrc0x2a0000x2be000x2be00607bbc1e956ba482122f1658cc6c19c0False0.20788817663817663data4.316122179837868IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          .reloc0x560000xc0x2009fe0d546fed06858ee5710f8c2133575False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
          NameRVASizeTypeLanguageCountryZLIB Complexity
          RT_ICON0x2a2b00x468Device independent bitmap graphic, 16 x 32 x 32, image size 1024, resolution 11811 x 11811 px/m0.4698581560283688
          RT_ICON0x2a7180x988Device independent bitmap graphic, 24 x 48 x 32, image size 2304, resolution 11811 x 11811 px/m0.34098360655737703
          RT_ICON0x2b0a00x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096, resolution 11811 x 11811 px/m0.2701688555347092
          RT_ICON0x2c1480x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 9216, resolution 11811 x 11811 px/m0.199896265560166
          RT_ICON0x2e6f00x4228Device independent bitmap graphic, 64 x 128 x 32, image size 16384, resolution 11811 x 11811 px/m0.16219886632026453
          RT_ICON0x329180x5488Device independent bitmap graphic, 72 x 144 x 32, image size 20736, resolution 11811 x 11811 px/m0.14852125693160814
          RT_ICON0x37da00x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 36864, resolution 11811 x 11811 px/m0.11598696657557284
          RT_ICON0x412480x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536, resolution 11811 x 11811 px/m0.0959718443156276
          RT_ICON0x51a700x3abfPNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9932841279340382
          RT_GROUP_ICON0x555300x84data0.7272727272727273
          RT_VERSION0x555b40x57cdata0.27136752136752135
          RT_MANIFEST0x55b300x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
          DLLImport
          mscoree.dll_CorExeMain
          TimestampSource PortDest PortSource IPDest IP
          Jan 11, 2025 04:18:03.966133118 CET4974080192.168.2.945.9.191.182
          Jan 11, 2025 04:18:03.971066952 CET804974045.9.191.182192.168.2.9
          Jan 11, 2025 04:18:03.971143961 CET4974080192.168.2.945.9.191.182
          Jan 11, 2025 04:18:03.972212076 CET4974080192.168.2.945.9.191.182
          Jan 11, 2025 04:18:03.977015972 CET804974045.9.191.182192.168.2.9
          Jan 11, 2025 04:18:25.336638927 CET804974045.9.191.182192.168.2.9
          Jan 11, 2025 04:18:25.336757898 CET4974080192.168.2.945.9.191.182
          Jan 11, 2025 04:18:25.378597021 CET4974080192.168.2.945.9.191.182
          Jan 11, 2025 04:18:25.382755041 CET4988080192.168.2.945.9.191.182
          Jan 11, 2025 04:18:25.383548021 CET804974045.9.191.182192.168.2.9
          Jan 11, 2025 04:18:25.387703896 CET804988045.9.191.182192.168.2.9
          Jan 11, 2025 04:18:25.387957096 CET4988080192.168.2.945.9.191.182
          Jan 11, 2025 04:18:25.387957096 CET4988080192.168.2.945.9.191.182
          Jan 11, 2025 04:18:25.392811060 CET804988045.9.191.182192.168.2.9
          Jan 11, 2025 04:18:46.776443958 CET804988045.9.191.182192.168.2.9
          Jan 11, 2025 04:18:46.776546955 CET4988080192.168.2.945.9.191.182
          Jan 11, 2025 04:18:46.777363062 CET4988080192.168.2.945.9.191.182
          Jan 11, 2025 04:18:46.782262087 CET804988045.9.191.182192.168.2.9
          Jan 11, 2025 04:18:46.788254023 CET4997780192.168.2.945.9.191.182
          Jan 11, 2025 04:18:46.793387890 CET804997745.9.191.182192.168.2.9
          Jan 11, 2025 04:18:46.793483973 CET4997780192.168.2.945.9.191.182
          Jan 11, 2025 04:18:46.793664932 CET4997780192.168.2.945.9.191.182
          Jan 11, 2025 04:18:46.798552036 CET804997745.9.191.182192.168.2.9
          Jan 11, 2025 04:19:08.178216934 CET804997745.9.191.182192.168.2.9
          Jan 11, 2025 04:19:08.178334951 CET4997780192.168.2.945.9.191.182
          Jan 11, 2025 04:19:08.179230928 CET4997780192.168.2.945.9.191.182
          Jan 11, 2025 04:19:08.179898024 CET4997980192.168.2.945.9.191.182
          Jan 11, 2025 04:19:08.184047937 CET804997745.9.191.182192.168.2.9
          Jan 11, 2025 04:19:08.184802055 CET804997945.9.191.182192.168.2.9
          Jan 11, 2025 04:19:08.184901953 CET4997980192.168.2.945.9.191.182
          Jan 11, 2025 04:19:08.185122967 CET4997980192.168.2.945.9.191.182
          Jan 11, 2025 04:19:08.189902067 CET804997945.9.191.182192.168.2.9
          Jan 11, 2025 04:19:29.558516026 CET804997945.9.191.182192.168.2.9
          Jan 11, 2025 04:19:29.558598042 CET4997980192.168.2.945.9.191.182
          Jan 11, 2025 04:19:29.559590101 CET4997980192.168.2.945.9.191.182
          Jan 11, 2025 04:19:29.562326908 CET4998080192.168.2.945.9.191.182
          Jan 11, 2025 04:19:29.564378023 CET804997945.9.191.182192.168.2.9
          Jan 11, 2025 04:19:29.567212105 CET804998045.9.191.182192.168.2.9
          Jan 11, 2025 04:19:29.567295074 CET4998080192.168.2.945.9.191.182
          Jan 11, 2025 04:19:29.567584991 CET4998080192.168.2.945.9.191.182
          Jan 11, 2025 04:19:29.572384119 CET804998045.9.191.182192.168.2.9
          Jan 11, 2025 04:19:50.912497044 CET804998045.9.191.182192.168.2.9
          Jan 11, 2025 04:19:50.912576914 CET4998080192.168.2.945.9.191.182
          Jan 11, 2025 04:19:50.913225889 CET4998080192.168.2.945.9.191.182
          Jan 11, 2025 04:19:50.914338112 CET4998180192.168.2.945.9.191.182
          Jan 11, 2025 04:19:50.918097973 CET804998045.9.191.182192.168.2.9
          Jan 11, 2025 04:19:50.919255972 CET804998145.9.191.182192.168.2.9
          Jan 11, 2025 04:19:50.919460058 CET4998180192.168.2.945.9.191.182
          Jan 11, 2025 04:19:50.919572115 CET4998180192.168.2.945.9.191.182
          Jan 11, 2025 04:19:50.924366951 CET804998145.9.191.182192.168.2.9
          Jan 11, 2025 04:20:12.291785955 CET804998145.9.191.182192.168.2.9
          Jan 11, 2025 04:20:12.291852951 CET4998180192.168.2.945.9.191.182
          Jan 11, 2025 04:20:12.292489052 CET4998180192.168.2.945.9.191.182
          Jan 11, 2025 04:20:12.296214104 CET4998280192.168.2.945.9.191.182
          Jan 11, 2025 04:20:12.297276974 CET804998145.9.191.182192.168.2.9
          Jan 11, 2025 04:20:12.301098108 CET804998245.9.191.182192.168.2.9
          Jan 11, 2025 04:20:12.301199913 CET4998280192.168.2.945.9.191.182
          Jan 11, 2025 04:20:12.301425934 CET4998280192.168.2.945.9.191.182
          Jan 11, 2025 04:20:12.306246996 CET804998245.9.191.182192.168.2.9
          Jan 11, 2025 04:20:33.680649996 CET804998245.9.191.182192.168.2.9
          Jan 11, 2025 04:20:33.680747032 CET4998280192.168.2.945.9.191.182
          Jan 11, 2025 04:20:33.681672096 CET4998280192.168.2.945.9.191.182
          Jan 11, 2025 04:20:33.682825089 CET4998380192.168.2.945.9.191.182
          Jan 11, 2025 04:20:33.686552048 CET804998245.9.191.182192.168.2.9
          Jan 11, 2025 04:20:33.687849998 CET804998345.9.191.182192.168.2.9
          Jan 11, 2025 04:20:33.687951088 CET4998380192.168.2.945.9.191.182
          Jan 11, 2025 04:20:33.688123941 CET4998380192.168.2.945.9.191.182
          Jan 11, 2025 04:20:33.693042994 CET804998345.9.191.182192.168.2.9
          Jan 11, 2025 04:20:55.069922924 CET804998345.9.191.182192.168.2.9
          Jan 11, 2025 04:20:55.070218086 CET4998380192.168.2.945.9.191.182
          Jan 11, 2025 04:20:55.071000099 CET4998380192.168.2.945.9.191.182
          Jan 11, 2025 04:20:55.073896885 CET4998480192.168.2.945.9.191.182
          Jan 11, 2025 04:20:55.075881958 CET804998345.9.191.182192.168.2.9
          Jan 11, 2025 04:20:55.078820944 CET804998445.9.191.182192.168.2.9
          Jan 11, 2025 04:20:55.078910112 CET4998480192.168.2.945.9.191.182
          Jan 11, 2025 04:20:55.079094887 CET4998480192.168.2.945.9.191.182
          Jan 11, 2025 04:20:55.083940983 CET804998445.9.191.182192.168.2.9
          TimestampSource PortDest PortSource IPDest IP
          Jan 11, 2025 04:18:03.943640947 CET6260153192.168.2.91.1.1.1
          Jan 11, 2025 04:18:03.953931093 CET53626011.1.1.1192.168.2.9
          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
          Jan 11, 2025 04:18:03.943640947 CET192.168.2.91.1.1.10xa7feStandard query (0)xianggrhen.comA (IP address)IN (0x0001)false
          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
          Jan 11, 2025 04:17:57.522486925 CET1.1.1.1192.168.2.90x858cNo error (0)shed.dual-low.s-part-0017.t-0009.t-msedge.nets-part-0017.t-0009.t-msedge.netCNAME (Canonical name)IN (0x0001)false
          Jan 11, 2025 04:17:57.522486925 CET1.1.1.1192.168.2.90x858cNo error (0)s-part-0017.t-0009.t-msedge.net13.107.246.45A (IP address)IN (0x0001)false
          Jan 11, 2025 04:18:03.953931093 CET1.1.1.1192.168.2.90xa7feNo error (0)xianggrhen.com45.9.191.182A (IP address)IN (0x0001)false
          • xianggrhen.com
          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          0192.168.2.94974045.9.191.182807312C:\Users\user\Desktop\1dVtYIvfHz.exe
          TimestampBytes transferredDirectionData
          Jan 11, 2025 04:18:03.972212076 CET81OUTGET /salad/Cxjokei.dat HTTP/1.1
          Host: xianggrhen.com
          Connection: Keep-Alive


          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          1192.168.2.94988045.9.191.182807312C:\Users\user\Desktop\1dVtYIvfHz.exe
          TimestampBytes transferredDirectionData
          Jan 11, 2025 04:18:25.387957096 CET81OUTGET /salad/Cxjokei.dat HTTP/1.1
          Host: xianggrhen.com
          Connection: Keep-Alive


          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          2192.168.2.94997745.9.191.182807312C:\Users\user\Desktop\1dVtYIvfHz.exe
          TimestampBytes transferredDirectionData
          Jan 11, 2025 04:18:46.793664932 CET81OUTGET /salad/Cxjokei.dat HTTP/1.1
          Host: xianggrhen.com
          Connection: Keep-Alive


          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          3192.168.2.94997945.9.191.182807312C:\Users\user\Desktop\1dVtYIvfHz.exe
          TimestampBytes transferredDirectionData
          Jan 11, 2025 04:19:08.185122967 CET81OUTGET /salad/Cxjokei.dat HTTP/1.1
          Host: xianggrhen.com
          Connection: Keep-Alive


          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          4192.168.2.94998045.9.191.182807312C:\Users\user\Desktop\1dVtYIvfHz.exe
          TimestampBytes transferredDirectionData
          Jan 11, 2025 04:19:29.567584991 CET81OUTGET /salad/Cxjokei.dat HTTP/1.1
          Host: xianggrhen.com
          Connection: Keep-Alive


          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          5192.168.2.94998145.9.191.182807312C:\Users\user\Desktop\1dVtYIvfHz.exe
          TimestampBytes transferredDirectionData
          Jan 11, 2025 04:19:50.919572115 CET81OUTGET /salad/Cxjokei.dat HTTP/1.1
          Host: xianggrhen.com
          Connection: Keep-Alive


          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          6192.168.2.94998245.9.191.182807312C:\Users\user\Desktop\1dVtYIvfHz.exe
          TimestampBytes transferredDirectionData
          Jan 11, 2025 04:20:12.301425934 CET81OUTGET /salad/Cxjokei.dat HTTP/1.1
          Host: xianggrhen.com
          Connection: Keep-Alive


          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          7192.168.2.94998345.9.191.182807312C:\Users\user\Desktop\1dVtYIvfHz.exe
          TimestampBytes transferredDirectionData
          Jan 11, 2025 04:20:33.688123941 CET81OUTGET /salad/Cxjokei.dat HTTP/1.1
          Host: xianggrhen.com
          Connection: Keep-Alive


          Session IDSource IPSource PortDestination IPDestination PortPIDProcess
          8192.168.2.94998445.9.191.182807312C:\Users\user\Desktop\1dVtYIvfHz.exe
          TimestampBytes transferredDirectionData
          Jan 11, 2025 04:20:55.079094887 CET81OUTGET /salad/Cxjokei.dat HTTP/1.1
          Host: xianggrhen.com
          Connection: Keep-Alive


          Click to jump to process

          Click to jump to process

          Click to dive into process behavior distribution

          Target ID:0
          Start time:22:18:02
          Start date:10/01/2025
          Path:C:\Users\user\Desktop\1dVtYIvfHz.exe
          Wow64 process (32bit):true
          Commandline:"C:\Users\user\Desktop\1dVtYIvfHz.exe"
          Imagebase:0xd10000
          File size:351'976 bytes
          MD5 hash:DD166953BAB4FF2E913A184718BD62E9
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:low
          Has exited:false

          Reset < >

            Execution Graph

            Execution Coverage:7.3%
            Dynamic/Decrypted Code Coverage:100%
            Signature Coverage:0%
            Total number of Nodes:70
            Total number of Limit Nodes:2
            execution_graph 15860 2f546c0 15861 2f546d0 15860->15861 15864 2f54260 15861->15864 15863 2f546d5 15865 2f5426b 15864->15865 15868 2f54270 15865->15868 15867 2f5476d 15867->15863 15869 2f5427b 15868->15869 15872 2f54408 15869->15872 15871 2f54842 15871->15867 15873 2f54413 15872->15873 15876 2f54438 15873->15876 15875 2f54954 15875->15871 15877 2f54443 15876->15877 15879 2f5793b 15877->15879 15883 2f5a358 15877->15883 15878 2f57979 15878->15875 15879->15878 15887 2f5c450 15879->15887 15892 2f5c441 15879->15892 15897 2f5a390 15883->15897 15900 2f5a37f 15883->15900 15884 2f5a36e 15884->15879 15888 2f5c471 15887->15888 15889 2f5c495 15888->15889 15909 2f5c600 15888->15909 15913 2f5c5f2 15888->15913 15889->15878 15894 2f5c450 15892->15894 15893 2f5c495 15893->15878 15894->15893 15895 2f5c600 GetModuleHandleW 15894->15895 15896 2f5c5f2 GetModuleHandleW 15894->15896 15895->15893 15896->15893 15904 2f5a488 15897->15904 15898 2f5a39f 15898->15884 15901 2f5a390 15900->15901 15903 2f5a488 GetModuleHandleW 15901->15903 15902 2f5a39f 15902->15884 15903->15902 15905 2f5a4bc 15904->15905 15906 2f5a499 15904->15906 15905->15898 15906->15905 15907 2f5a6c0 GetModuleHandleW 15906->15907 15908 2f5a6ed 15907->15908 15908->15898 15910 2f5c60d 15909->15910 15911 2f5c647 15910->15911 15917 2f5ace0 15910->15917 15911->15889 15914 2f5c600 15913->15914 15915 2f5c647 15914->15915 15916 2f5ace0 GetModuleHandleW 15914->15916 15915->15889 15916->15915 15918 2f5aceb 15917->15918 15920 2f5d358 15918->15920 15921 2f5c774 15918->15921 15920->15920 15922 2f5c77f 15921->15922 15923 2f54438 GetModuleHandleW 15922->15923 15924 2f5d3c7 15923->15924 15924->15920 15925 2f54698 15926 2f546a6 15925->15926 15929 2f53e70 15926->15929 15928 2f546af 15930 2f53e7b 15929->15930 15931 2f54260 GetModuleHandleW 15930->15931 15932 2f546d5 15931->15932 15932->15928 15933 2f5cb18 15934 2f5cb5e 15933->15934 15938 2f5cce7 15934->15938 15943 2f5ccf8 15934->15943 15935 2f5cc4b 15939 2f5ccf2 15938->15939 15942 2f5cca6 15938->15942 15946 2f5c710 15939->15946 15942->15935 15944 2f5c710 DuplicateHandle 15943->15944 15945 2f5cd26 15944->15945 15945->15935 15947 2f5cd60 DuplicateHandle 15946->15947 15948 2f5cd26 15947->15948 15948->15935

            Control-flow Graph

            APIs
            • GetModuleHandleW.KERNEL32(00000000), ref: 02F5A6DE
            Memory Dump Source
            • Source File: 00000000.00000002.3216458535.0000000002F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F50000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2f50000_1dVtYIvfHz.jbxd
            Similarity
            • API ID: HandleModule
            • String ID:
            • API String ID: 4139908857-0
            • Opcode ID: 3bbfbfb528fd638472507c205880fff87aaff163d8dd2ca26a81db58f6ae7f7e
            • Instruction ID: d449c5e8e9b33fecea04e35386c19e3993c63e663286d840c4fe911158e9ad14
            • Opcode Fuzzy Hash: 3bbfbfb528fd638472507c205880fff87aaff163d8dd2ca26a81db58f6ae7f7e
            • Instruction Fuzzy Hash: DB814470A00B158FD724CF69D454B5ABBF2BF88244F008A2EDA86DBB40DB74E855CF91

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 61 2f5c710-2f5cdf4 DuplicateHandle 63 2f5cdf6-2f5cdfc 61->63 64 2f5cdfd-2f5ce1a 61->64 63->64
            APIs
            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,02F5CD26,?,?,?,?,?), ref: 02F5CDE7
            Memory Dump Source
            • Source File: 00000000.00000002.3216458535.0000000002F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F50000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2f50000_1dVtYIvfHz.jbxd
            Similarity
            • API ID: DuplicateHandle
            • String ID:
            • API String ID: 3793708945-0
            • Opcode ID: d90d5f6e3acac36621508a61ebedfd7849c598401dfb3aa474ecc16339055c69
            • Instruction ID: f3d14341d9d1b716d8ddd18329336d320ecb3dcbf83d91559182fe889c3e3fad
            • Opcode Fuzzy Hash: d90d5f6e3acac36621508a61ebedfd7849c598401dfb3aa474ecc16339055c69
            • Instruction Fuzzy Hash: 8921E3B5900358AFDB10CF9AD884AEEBFF4FB48310F14806AE955A7350D374A954CFA5

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 67 2f5cd58-2f5cdf4 DuplicateHandle 68 2f5cdf6-2f5cdfc 67->68 69 2f5cdfd-2f5ce1a 67->69 68->69
            APIs
            • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?,?,?,?,02F5CD26,?,?,?,?,?), ref: 02F5CDE7
            Memory Dump Source
            • Source File: 00000000.00000002.3216458535.0000000002F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F50000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2f50000_1dVtYIvfHz.jbxd
            Similarity
            • API ID: DuplicateHandle
            • String ID:
            • API String ID: 3793708945-0
            • Opcode ID: 9103f5585cd3b92fe29a256ae48b1608842a190c9e9dfac1f6464c7e7ce43c90
            • Instruction ID: 8a218b3b3eb5bb8c11857a1f8bed410f8c01a7ef722f4b5c5a6a05ba864f64e4
            • Opcode Fuzzy Hash: 9103f5585cd3b92fe29a256ae48b1608842a190c9e9dfac1f6464c7e7ce43c90
            • Instruction Fuzzy Hash: DD2103B5D00208DFDB10CF99D984ADEBBF4EB08320F14802AE914A7210D378A944CFA0

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 72 2f5a678-2f5a6b8 73 2f5a6c0-2f5a6eb GetModuleHandleW 72->73 74 2f5a6ba-2f5a6bd 72->74 75 2f5a6f4-2f5a708 73->75 76 2f5a6ed-2f5a6f3 73->76 74->73 76->75
            APIs
            • GetModuleHandleW.KERNEL32(00000000), ref: 02F5A6DE
            Memory Dump Source
            • Source File: 00000000.00000002.3216458535.0000000002F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F50000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2f50000_1dVtYIvfHz.jbxd
            Similarity
            • API ID: HandleModule
            • String ID:
            • API String ID: 4139908857-0
            • Opcode ID: 19902fa74f9ec2a1b29c74b4b0cae9efbb0a49a1657e4e33809bad01f19b592b
            • Instruction ID: ede46dfc73006f4ccb46fc1e56311be54487a79d9ba473f2ec3c9dbf99aad6c8
            • Opcode Fuzzy Hash: 19902fa74f9ec2a1b29c74b4b0cae9efbb0a49a1657e4e33809bad01f19b592b
            • Instruction Fuzzy Hash: A81110B5C006498FCB10CF9AC844BDEFBF4AB88314F10852AD968A7310C379A545CFA1
            Memory Dump Source
            • Source File: 00000000.00000002.3216226456.000000000163D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0163D000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_163d000_1dVtYIvfHz.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: eaecba610117cd8af3141b151b7a7bf85d000a6d291bdfdae4d31e6f812d6a4b
            • Instruction ID: 64a1c590cda194db5c600062f7bd91d9a5cf459951465beff4eb0061e44cc4e0
            • Opcode Fuzzy Hash: eaecba610117cd8af3141b151b7a7bf85d000a6d291bdfdae4d31e6f812d6a4b
            • Instruction Fuzzy Hash: FE21F1B1544200EFDB05DF94D9C0B26BF65FBC8328F60C169E90A0A297C336D456CBA2
            Memory Dump Source
            • Source File: 00000000.00000002.3216257821.000000000164D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0164D000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_164d000_1dVtYIvfHz.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: ab2223449b67492b214b1992c830feda72ad5933201c36602d012273d08b1cfa
            • Instruction ID: d5ccd679f1f5b602aa14121f462a0526c88750532e7e7c3f3391cf4f1fc6650c
            • Opcode Fuzzy Hash: ab2223449b67492b214b1992c830feda72ad5933201c36602d012273d08b1cfa
            • Instruction Fuzzy Hash: 59213471A04300DFDB15DF94D8C4B26BB61FB98B14F20C56DD80A0B382C33AD447CA62
            Memory Dump Source
            • Source File: 00000000.00000002.3216226456.000000000163D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0163D000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_163d000_1dVtYIvfHz.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 8a9223d17f0c59b9928f2445ae754a3689dedab5288f4c6dbc5edc2f4224d076
            • Instruction ID: 685b7c187fc622ed98c73801cc018067d6f0f339accf4869bb8a3dddaa2684f3
            • Opcode Fuzzy Hash: 8a9223d17f0c59b9928f2445ae754a3689dedab5288f4c6dbc5edc2f4224d076
            • Instruction Fuzzy Hash: 6B11AF76904240DFDB16CF54D9C4B16BF72FB84324F24C5A9D9090B657C336D45ACBA2
            Memory Dump Source
            • Source File: 00000000.00000002.3216257821.000000000164D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0164D000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_164d000_1dVtYIvfHz.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 04b342587f02f4df216fd9fa4589941a60fabf0b5787ec5e4e812599987ae7f8
            • Instruction ID: 8bbcdf8f0ff8f5ad5442e634d67f1b195862174169dad54986788a7c9fdd8102
            • Opcode Fuzzy Hash: 04b342587f02f4df216fd9fa4589941a60fabf0b5787ec5e4e812599987ae7f8
            • Instruction Fuzzy Hash: 9D11BB75904280CFCB16CF54D9C4B15BBA2FB84714F24C6AAD8494B796C33AD44ACBA2
            Memory Dump Source
            • Source File: 00000000.00000002.3216226456.000000000163D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0163D000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_163d000_1dVtYIvfHz.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 1c840b7f12a97d97013cc55913555576ef1a6456cd309180ae6b9eb3d4a79263
            • Instruction ID: d2781fb6afa46b477f20d011758b97b75c57e68d4723b878e1c9646bb19ad6e6
            • Opcode Fuzzy Hash: 1c840b7f12a97d97013cc55913555576ef1a6456cd309180ae6b9eb3d4a79263
            • Instruction Fuzzy Hash: 3501DB31508384DFE7164A95DC84B76FBE8DF81624F54C459ED490A282C7789941CA72
            Memory Dump Source
            • Source File: 00000000.00000002.3216226456.000000000163D000.00000040.00000800.00020000.00000000.sdmp, Offset: 0163D000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_163d000_1dVtYIvfHz.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 8bb03a705281e9befa94e4f9eeee46a6230cc6c441071207613d02b70f0bd3c3
            • Instruction ID: 50e92a0f6d8bb5c8eac103f56763b9a005666dc52bb70223f1b2edb36035fe9a
            • Opcode Fuzzy Hash: 8bb03a705281e9befa94e4f9eeee46a6230cc6c441071207613d02b70f0bd3c3
            • Instruction Fuzzy Hash: E6F06D71408384AEE7128A1ADC84B62FFA8EF81624F18C45AED484B287C3799844CAB1
            Memory Dump Source
            • Source File: 00000000.00000002.3216458535.0000000002F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F50000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2f50000_1dVtYIvfHz.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 116fbc64e0ee1248f0426ad9cfc2769b386eb950fb78267afe3208ad92c9ad97
            • Instruction ID: 294c9c860250851ae365172aa92a2e7cb73138bab2155cfb2799370c74e856c0
            • Opcode Fuzzy Hash: 116fbc64e0ee1248f0426ad9cfc2769b386eb950fb78267afe3208ad92c9ad97
            • Instruction Fuzzy Hash: 241287B24227458BD710CF65E86E189BFB1BB45318F90421AE2612F2E1FFB4164EEF44
            Memory Dump Source
            • Source File: 00000000.00000002.3216458535.0000000002F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F50000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2f50000_1dVtYIvfHz.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 16549a418184939bb188139aa067e3fb051ed669e65e39fa1801fa17bc772223
            • Instruction ID: c47e5a97b0587f8f127368fb49327caa3e0b9b499807963e2d7d53196a559813
            • Opcode Fuzzy Hash: 16549a418184939bb188139aa067e3fb051ed669e65e39fa1801fa17bc772223
            • Instruction Fuzzy Hash: F0A16F32E10219CFCF05DFA4C85459EBBF2FF89340B15456AEA06AB261DB31EA56CF50
            Memory Dump Source
            • Source File: 00000000.00000002.3216458535.0000000002F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 02F50000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_2f50000_1dVtYIvfHz.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 7d861b32d435532935be2e4f76dea318eaa6d6b90a5bd425099046e20347180d
            • Instruction ID: 32c8440d9b6a07300a626513b5e24a63bf62924540c6c9a5641648d1eee24b79
            • Opcode Fuzzy Hash: 7d861b32d435532935be2e4f76dea318eaa6d6b90a5bd425099046e20347180d
            • Instruction Fuzzy Hash: B7C1EBB28217458BD710CF65E86A299BFB1BB85324F50421AF1612F2D0FFB4264EEF44