Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample name:file.exe
Analysis ID:1500933
MD5:b7a66864aedc3fa7a4686498eaf2b251
SHA1:045154b73c8c25e29c5db10d297d44e5371af940
SHA256:d51fbbda89b717b798dc784dbe3eb4aa151e9ef095c054e19368698fe923317e
Tags:exe
Infos:

Detection

Score:60
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected unpacking (creates a PE file in dynamic memory)
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Detected potential crypto function
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE file contains more sections than normal
PE file contains sections with non-standard names
Queries keyboard layouts
Queries the installation date of Windows
Sample file is different than original file name gathered from version info
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • file.exe (PID: 6728 cmdline: "C:\Users\user\Desktop\file.exe" MD5: B7A66864AEDC3FA7A4686498EAF2B251)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: file.exeVirustotal: Detection: 8%Perma Link
Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.8% probability

Compliance

barindex
Source: C:\Users\user\Desktop\file.exeUnpacked PE file: 0.2.file.exe.3820000.2.unpack
Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:49715 version: TLS 1.2
Source: Binary string: ntdll.pdb source: file.exe, 00000000.00000002.2348716551.000000000462A000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: ntdll.pdbUGP source: file.exe, 00000000.00000002.2348716551.000000000462A000.00000004.00000020.00020000.00000000.sdmp
Source: Joe Sandbox ViewIP Address: 188.114.96.3 188.114.96.3
Source: Joe Sandbox ViewIP Address: 188.114.96.3 188.114.96.3
Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
Source: global trafficHTTP traffic detected: POST /shopexd.asp?bz6lc4t394br=eFhwIFemrMF%2FVQdnWgR2UbCKGWfZtBWZRJvXMMLoeVpaAXHaE0GBuUMO5s2rsXKU HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36Content-Length: 96Host: jirafasaltas.fun
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: jirafasaltas.fun
Source: unknownHTTP traffic detected: POST /shopexd.asp?bz6lc4t394br=eFhwIFemrMF%2FVQdnWgR2UbCKGWfZtBWZRJvXMMLoeVpaAXHaE0GBuUMO5s2rsXKU HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36Content-Length: 96Host: jirafasaltas.fun
Source: file.exe, 00000000.00000003.2329160540.0000000000D03000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.2342581353.0000000000D12000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://jirafasaltas.fun/:
Source: file.exe, 00000000.00000002.2343551941.0000000002AD7000.00000004.00001000.00020000.00000000.sdmp, file.exe, 00000000.00000003.2328751588.0000000000D24000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.2342581353.0000000000D24000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.2343551941.0000000002AE3000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: https://jirafasaltas.fun/shopexd.asp?bz6lc4t394br=eFhwIFemrMF%2FVQdnWgR2UbCKGWfZtBWZRJvXMMLoeVpaAXHa
Source: file.exe, 00000000.00000002.2342409553.0000000000CAC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://jirafasaltas.fun:443/shopexd.asp?bz6lc4t394br=eFhwIFemrMF%2FVQdnWgR2UbCKGWfZtBWZRJvXMMLoeVpa
Source: unknownNetwork traffic detected: HTTP traffic on port 49715 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49715
Source: unknownHTTPS traffic detected: 188.114.96.3:443 -> 192.168.2.6:49715 version: TLS 1.2
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_033F11350_2_033F1135
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_033F517A0_2_033F517A
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_033F776A0_2_033F776A
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_033F57660_2_033F5766
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_033F4FDF0_2_033F4FDF
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_033F1E120_2_033F1E12
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_033F1CB00_2_033F1CB0
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0340448A0_2_0340448A
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_033F20EA0_2_033F20EA
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_0348C6AA0_2_0348C6AA
Source: file.exeStatic PE information: Number of sections : 11 > 10
Source: file.exe, 00000000.00000000.2149262379.00000000009E3000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilename1StepDVDCopy.exeB vs file.exe
Source: file.exe, 00000000.00000002.2348716551.00000000047A2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenamentdll.dllj% vs file.exe
Source: file.exe, 00000000.00000002.2343092662.00000000028A5000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: OriginalFilenameCOMCTL32.DLL.MUIj% vs file.exe
Source: file.exeBinary or memory string: OriginalFilename1StepDVDCopy.exeB vs file.exe
Source: classification engineClassification label: mal60.evad.winEXE@1/0@1/1
Source: file.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: file.exeVirustotal: Detection: 8%
Source: file.exeString found in binary or memory: NATS-SEFI-ADD
Source: file.exeString found in binary or memory: NATS-DANO-ADD
Source: file.exeString found in binary or memory: JIS_C6229-1984-b-add
Source: file.exeString found in binary or memory: jp-ocr-b-add
Source: file.exeString found in binary or memory: JIS_C6229-1984-hand-add
Source: file.exeString found in binary or memory: jp-ocr-hand-add
Source: file.exeString found in binary or memory: ISO_6937-2-add
Source: C:\Users\user\Desktop\file.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: wtsapi32.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: winsta.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: webio.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: schannel.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: ncryptsslp.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Users\user\Desktop\file.exeSection loaded: dpapi.dllJump to behavior
Source: file.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: file.exeStatic file information: File size 8751104 > 1048576
Source: file.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x4c4000
Source: file.exeStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x2a0400
Source: Binary string: ntdll.pdb source: file.exe, 00000000.00000002.2348716551.000000000462A000.00000004.00000020.00020000.00000000.sdmp
Source: Binary string: ntdll.pdbUGP source: file.exe, 00000000.00000002.2348716551.000000000462A000.00000004.00000020.00020000.00000000.sdmp

Data Obfuscation

barindex
Source: C:\Users\user\Desktop\file.exeUnpacked PE file: 0.2.file.exe.3820000.2.unpack
Source: file.exeStatic PE information: section name: .didata
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_033F4DC8 push esp; retf 0_2_033F4DC9
Source: C:\Users\user\Desktop\file.exeCode function: 0_2_033F6640 push eax; ret 0_2_033F6649
Source: C:\Users\user\Desktop\file.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exeProcess information set: FAILCRITICALERRORS | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\file.exe TID: 64Thread sleep time: -40880s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\file.exe TID: 2548Thread sleep time: -30000s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Keyboard Layouts\08070809Jump to behavior
Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_LOCAL_MACHINE\System\CurrentControlSet\Control\Keyboard Layouts\04070809Jump to behavior
Source: file.exe, 00000000.00000003.2328751588.0000000000D42000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.2342581353.0000000000D44000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.2342409553.0000000000CAC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: C:\Users\user\Desktop\file.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion InstallDateJump to behavior
Source: C:\Users\user\Desktop\file.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
1
DLL Side-Loading
1
DLL Side-Loading
1
Virtualization/Sandbox Evasion
OS Credential Dumping1
Security Software Discovery
Remote Services1
Archive Collected Data
11
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
Software Packing
LSASS Memory1
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable Media2
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager22
System Information Discovery
SMB/Windows Admin SharesData from Network Shared Drive13
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Obfuscated Files or Information
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
file.exe8%ReversingLabsWin64.Dropper.Generic
file.exe8%VirustotalBrowse
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
jirafasaltas.fun3%VirustotalBrowse
SourceDetectionScannerLabelLink
https://jirafasaltas.fun:443/shopexd.asp?bz6lc4t394br=eFhwIFemrMF%2FVQdnWgR2UbCKGWfZtBWZRJvXMMLoeVpa0%Avira URL Cloudsafe
https://jirafasaltas.fun/:0%Avira URL Cloudsafe
https://jirafasaltas.fun/shopexd.asp?bz6lc4t394br=eFhwIFemrMF%2FVQdnWgR2UbCKGWfZtBWZRJvXMMLoeVpaAXHaE0GBuUMO5s2rsXKU0%Avira URL Cloudsafe
https://jirafasaltas.fun/shopexd.asp?bz6lc4t394br=eFhwIFemrMF%2FVQdnWgR2UbCKGWfZtBWZRJvXMMLoeVpaAXHa0%Avira URL Cloudsafe
https://jirafasaltas.fun:443/shopexd.asp?bz6lc4t394br=eFhwIFemrMF%2FVQdnWgR2UbCKGWfZtBWZRJvXMMLoeVpa1%VirustotalBrowse
https://jirafasaltas.fun/shopexd.asp?bz6lc4t394br=eFhwIFemrMF%2FVQdnWgR2UbCKGWfZtBWZRJvXMMLoeVpaAXHaE0GBuUMO5s2rsXKU0%VirustotalBrowse
https://jirafasaltas.fun/shopexd.asp?bz6lc4t394br=eFhwIFemrMF%2FVQdnWgR2UbCKGWfZtBWZRJvXMMLoeVpaAXHa0%VirustotalBrowse
NameIPActiveMaliciousAntivirus DetectionReputation
jirafasaltas.fun
188.114.96.3
truefalseunknown
NameMaliciousAntivirus DetectionReputation
https://jirafasaltas.fun/shopexd.asp?bz6lc4t394br=eFhwIFemrMF%2FVQdnWgR2UbCKGWfZtBWZRJvXMMLoeVpaAXHaE0GBuUMO5s2rsXKUfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
NameSourceMaliciousAntivirus DetectionReputation
https://jirafasaltas.fun/shopexd.asp?bz6lc4t394br=eFhwIFemrMF%2FVQdnWgR2UbCKGWfZtBWZRJvXMMLoeVpaAXHafile.exe, 00000000.00000002.2343551941.0000000002AD7000.00000004.00001000.00020000.00000000.sdmp, file.exe, 00000000.00000003.2328751588.0000000000D24000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.2342581353.0000000000D24000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.2343551941.0000000002AE3000.00000004.00001000.00020000.00000000.sdmpfalse
  • 0%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://jirafasaltas.fun:443/shopexd.asp?bz6lc4t394br=eFhwIFemrMF%2FVQdnWgR2UbCKGWfZtBWZRJvXMMLoeVpafile.exe, 00000000.00000002.2342409553.0000000000CAC000.00000004.00000020.00020000.00000000.sdmpfalse
  • 1%, Virustotal, Browse
  • Avira URL Cloud: safe
unknown
https://jirafasaltas.fun/:file.exe, 00000000.00000003.2329160540.0000000000D03000.00000004.00000020.00020000.00000000.sdmp, file.exe, 00000000.00000002.2342581353.0000000000D12000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs
IPDomainCountryFlagASNASN NameMalicious
188.114.96.3
jirafasaltas.funEuropean Union
13335CLOUDFLARENETUSfalse
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1500933
Start date and time:2024-08-29 06:23:09 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 4m 54s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:6
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:file.exe
Detection:MAL
Classification:mal60.evad.winEXE@1/0@1/1
EGA Information:Failed
HCA Information:Failed
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
  • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
  • Execution Graph export aborted for target file.exe, PID 6728 because there are no executed function
  • Report size getting too big, too many NtQueryValueKey calls found.
TimeTypeDescription
00:24:18API Interceptor11x Sleep call for process: file.exe modified
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
188.114.96.3PO_GM_list_28082024202003180817418280824_purchase_doc_00000(991KB).batGet hashmaliciousFormBook, GuLoader, RemcosBrowse
  • www.katasoo.com/7qad/
709876765465.exeGet hashmaliciousDBatLoader, FormBookBrowse
  • www.coinwab.com/kqqj/
http://allegro-8888.com/Get hashmaliciousUnknownBrowse
  • allegro-8888.com/xml/index.html
PO_112234525626823775.jsGet hashmaliciousLokibotBrowse
  • werdotx.shop/Devil/PWS/fre.php
nOyswc9ly2.dllGet hashmaliciousUnknownBrowse
  • web.ad87h92j.com/4/t.bmp
pXm5oVO3Go.exeGet hashmaliciousNitolBrowse
  • web.ad87h92j.com/4/t.bmp
QUOTATION_JULQTRA071244#U00faPDF.scr.exeGet hashmaliciousUnknownBrowse
  • filetransfer.io/data-package/0U9QqTZ6/download
FedEx Shipping Document.scr.exeGet hashmaliciousAzorultBrowse
  • l0h5.shop/CM341/index.php
Quote 1T PN40 082624.exeGet hashmaliciousFormBookBrowse
  • www.lampgm.pro/em9t/
weave.exeGet hashmaliciousDCRat, PureLog Stealer, zgRATBrowse
  • 671893cm.n9shka.top/eternalpipeLowProcessDbDatalifewpPublicCdn.php
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
jirafasaltas.funfile.exeGet hashmaliciousUnknownBrowse
  • 188.114.96.3
file.exeGet hashmaliciousUnknownBrowse
  • 188.114.96.3
PQ2AUndsdb.exeGet hashmaliciousAmadey, AsyncRAT, Cryptbot, PureLog Stealer, RedLine, SmokeLoader, StealcBrowse
  • 188.114.97.3
SecuriteInfo.com.Win64.DropperX-gen.21682.4890.exeGet hashmaliciousUnknownBrowse
  • 188.114.97.3
SecuriteInfo.com.Win64.CrypterX-gen.4166.17445.exeGet hashmaliciousUnknownBrowse
  • 188.114.97.3
SecuriteInfo.com.Win64.DropperX-gen.4383.5748.exeGet hashmaliciousUnknownBrowse
  • 188.114.96.3
SecuriteInfo.com.Win64.CrypterX-gen.4166.17445.exeGet hashmaliciousUnknownBrowse
  • 188.114.96.3
SecuriteInfo.com.Win64.MalwareX-gen.19968.21519.exeGet hashmaliciousUnknownBrowse
  • 188.114.97.3
SecuriteInfo.com.Win64.MalwareX-gen.19968.21519.exeGet hashmaliciousUnknownBrowse
  • 188.114.97.3
file.exeGet hashmaliciousLummaC, Amadey, Cryptbot, PureLog Stealer, RedLine, SmokeLoader, StealcBrowse
  • 188.114.97.3
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
CLOUDFLARENETUSSecuriteInfo.com.BackDoor.SpyBotNET.62.13095.12836.exeGet hashmaliciousAgentTeslaBrowse
  • 104.26.12.205
file.exeGet hashmaliciousUnknownBrowse
  • 172.64.41.3
Payment Advice.exeGet hashmaliciousFormBookBrowse
  • 172.67.210.102
SecuriteInfo.com.W32.MSIL_Kryptik.KTU.gen.Eldorado.3036.13101.exeGet hashmaliciousSnake Keylogger, VIP KeyloggerBrowse
  • 188.114.97.3
Spec sheet.exeGet hashmaliciousSnake KeyloggerBrowse
  • 188.114.96.3
file.exeGet hashmaliciousUnknownBrowse
  • 172.64.41.3
file.exeGet hashmaliciousUnknownBrowse
  • 172.64.41.3
vYhaKbJF08.exeGet hashmaliciousLummaCBrowse
  • 104.21.16.74
file.exeGet hashmaliciousLummaC, VidarBrowse
  • 172.67.146.35
file.exeGet hashmaliciousUnknownBrowse
  • 172.64.41.3
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
a0e9f5d64349fb13191bc781f81f42e1vYhaKbJF08.exeGet hashmaliciousLummaCBrowse
  • 188.114.96.3
file.exeGet hashmaliciousLummaC, VidarBrowse
  • 188.114.96.3
PDF To Excel Converter.exeGet hashmaliciousLummaC, MicroClipBrowse
  • 188.114.96.3
z1209627360293827.exeGet hashmaliciousDBatLoader, FormBookBrowse
  • 188.114.96.3
file.exeGet hashmaliciousLummaC, VidarBrowse
  • 188.114.96.3
file.exeGet hashmaliciousLummaC, Stealc, VidarBrowse
  • 188.114.96.3
August Shipment - Inv No. 041.xlsGet hashmaliciousUnknownBrowse
  • 188.114.96.3
file.exeGet hashmaliciousLummaC, VidarBrowse
  • 188.114.96.3
Setup.exeGet hashmaliciousLummaCBrowse
  • 188.114.96.3
Setup.exeGet hashmaliciousLummaCBrowse
  • 188.114.96.3
No context
No created / dropped files found
File type:PE32+ executable (GUI) x86-64, for MS Windows
Entropy (8bit):6.574678275475394
TrID:
  • Win64 Executable GUI (202006/5) 92.64%
  • Win64 Executable (generic) (12005/4) 5.51%
  • Generic Win/DOS Executable (2004/3) 0.92%
  • DOS Executable Generic (2002/1) 0.92%
  • VXD Driver (31/22) 0.01%
File name:file.exe
File size:8'751'104 bytes
MD5:b7a66864aedc3fa7a4686498eaf2b251
SHA1:045154b73c8c25e29c5db10d297d44e5371af940
SHA256:d51fbbda89b717b798dc784dbe3eb4aa151e9ef095c054e19368698fe923317e
SHA512:f1ffab89f395247c69121fe3a700798c8cd5a9af94f33674995642471160f428c2931fa86c6686558ba75e0d6a20131854b987790160cae19a533a7f40862957
SSDEEP:98304:qAlUumHHsfNHU/J1vD3NSPUv3KWQSy+Bk:Dquh+RlfKkhBk
TLSH:EB968DFB22E6462DC12D923BC093CF01C437B9794737C6D702915A38DA6AAC15E7EA35
File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win64..$7.......................................................................................................................................
Icon Hash:0f71e969e9f96117
Entrypoint:0x8c4e30
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x400000
Subsystem:windows gui
Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
DLL Characteristics:
Time Stamp:0x66CF1D1A [Wed Aug 28 12:50:34 2024 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:5
OS Version Minor:2
File Version Major:5
File Version Minor:2
Subsystem Version Major:5
Subsystem Version Minor:2
Import Hash:937ab3e955faac33827861f288cec9e5
Instruction
push ebp
dec eax
sub esp, 20h
dec eax
mov ebp, esp
nop
dec eax
lea ecx, dword ptr [FFFEE388h]
call 00007FCE84AC5540h
dec eax
mov eax, dword ptr [00063B94h]
dec eax
mov ecx, dword ptr [eax]
call 00007FCE84D5FBF1h
dec eax
mov eax, dword ptr [00063B85h]
dec eax
mov ecx, dword ptr [eax]
mov dl, 01h
call 00007FCE84D628A0h
dec eax
mov eax, dword ptr [00063B74h]
dec eax
mov ecx, dword ptr [eax]
dec eax
mov edx, dword ptr [FFFEDCDAh]
dec esp
mov eax, dword ptr [0006387Bh]
call 00007FCE84D5FBF3h
dec eax
mov eax, dword ptr [00063B57h]
dec eax
mov ecx, dword ptr [eax]
call 00007FCE84D5FE04h
call 00007FCE84ABD49Fh
jmp 00007FCE84F72D4Ah
nop
nop
call 00007FCE84ABD696h
nop
dec eax
lea esp, dword ptr [ebp+20h]
pop ebp
ret
dec eax
nop
dec eax
lea eax, dword ptr [00000000h+eax]
dec eax
sub esp, 28h
call 00007FCE84ABCC2Ch
dec eax
add esp, 28h
ret
int3
int3
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
add byte ptr [eax], al
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x5440000x9c.edata
IMAGE_DIRECTORY_ENTRY_IMPORT0x5360000x4c44.idata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x5ca0000x2a0400.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x5880000x410dc.pdata
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x5470000x4083c.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x5460000x28.rdata
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x5373980x1208.idata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x53b0000x8d6a.didata
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x4c3ec00x4c4000eb6f3eec577ce0124d0cb6c66b3e6b81unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.data0x4c50000x642c80x64400487de922e1e42c249aa1bbd78953f0b0False0.2396377221009975data4.708144578377961IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.bss0x52a0000xb75c0x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.idata0x5360000x4c440x4e0029fbdd4e74c9683ef29e7a67a8b2df87False0.23913261217948717data4.289813206389611IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.didata0x53b0000x8d6a0x8e002845d3f12a4110b85b14963d477f5351False0.17058208626760563data3.981325083586943IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.edata0x5440000x9c0x2007fa7ebcc509ab4bfbae6047d77b9249eFalse0.26171875data1.8963699670102752IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.tls0x5450000x1e40x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.rdata0x5460000x6d0x20013c41f6a7226e3b091416c6c3aca58eeFalse0.1953125data1.3902637598484393IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.reloc0x5470000x4083c0x40a00dbf93e541c6d8fdf42f95373c32760e7False0.4654481987427466data6.447929463732892IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
.pdata0x5880000x410dc0x41200d26c09bdff615edc673d4a34c3090b93False0.49405065379078694data6.382261050809335IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.rsrc0x5ca0000x2a04000x2a04008b007c0da5ccf8180a13a8503df917ecunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_CURSOR0x5cbd0c0x134dataEnglishUnited States0.38636363636363635
RT_CURSOR0x5cbe400x134dataEnglishUnited States0.4642857142857143
RT_CURSOR0x5cbf740x134dataEnglishUnited States0.4805194805194805
RT_CURSOR0x5cc0a80x134dataEnglishUnited States0.38311688311688313
RT_CURSOR0x5cc1dc0x134dataEnglishUnited States0.36038961038961037
RT_CURSOR0x5cc3100x134dataEnglishUnited States0.4090909090909091
RT_CURSOR0x5cc4440x134Targa image data - RGB 64 x 65536 x 1 +32 "\001"EnglishUnited States0.4967532467532468
RT_CURSOR0x5cc5780x134Targa image data - Map 64 x 65536 x 1 +32 "\001"EnglishUnited States0.38636363636363635
RT_BITMAP0x5cc6ac0x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.43103448275862066
RT_BITMAP0x5cc87c0x1e4Device independent bitmap graphic, 36 x 19 x 4, image size 380EnglishUnited States0.46487603305785125
RT_BITMAP0x5cca600x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.43103448275862066
RT_BITMAP0x5ccc300x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.39870689655172414
RT_BITMAP0x5cce000x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.4245689655172414
RT_BITMAP0x5ccfd00x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.5021551724137931
RT_BITMAP0x5cd1a00x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.5064655172413793
RT_BITMAP0x5cd3700x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.39655172413793105
RT_BITMAP0x5cd5400x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.5344827586206896
RT_BITMAP0x5cd7100x1d0Device independent bitmap graphic, 36 x 18 x 4, image size 360EnglishUnited States0.39655172413793105
RT_BITMAP0x5cd8e00xc0Device independent bitmap graphic, 16 x 11 x 4, image size 88, 16 important colorsEnglishUnited States0.5208333333333334
RT_BITMAP0x5cd9a00xe0Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colorsEnglishUnited States0.42857142857142855
RT_BITMAP0x5cda800xe0Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colorsEnglishUnited States0.4955357142857143
RT_BITMAP0x5cdb600xe0Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colorsEnglishUnited States0.38392857142857145
RT_BITMAP0x5cdc400xc0Device independent bitmap graphic, 16 x 11 x 4, image size 88, 16 important colorsEnglishUnited States0.4947916666666667
RT_BITMAP0x5cdd000xc0Device independent bitmap graphic, 16 x 11 x 4, image size 88, 16 important colorsEnglishUnited States0.484375
RT_BITMAP0x5cddc00xe0Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colorsEnglishUnited States0.42410714285714285
RT_BITMAP0x5cdea00xc0Device independent bitmap graphic, 16 x 11 x 4, image size 88, 16 important colorsEnglishUnited States0.5104166666666666
RT_BITMAP0x5cdf600xe0Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colorsEnglishUnited States0.5
RT_BITMAP0x5ce0400xe8Device independent bitmap graphic, 16 x 16 x 4, image size 128EnglishUnited States0.4870689655172414
RT_BITMAP0x5ce1280xc0Device independent bitmap graphic, 16 x 11 x 4, image size 88, 16 important colorsEnglishUnited States0.4895833333333333
RT_BITMAP0x5ce1e80x188Device independent bitmap graphic, 24 x 24 x 4, image size 288EnglishUnited States0.34438775510204084
RT_BITMAP0x5ce3700x188Device independent bitmap graphic, 24 x 24 x 4, image size 288, 16 important colorsEnglishUnited States0.45918367346938777
RT_BITMAP0x5ce4f80x188Device independent bitmap graphic, 24 x 24 x 4, image size 288, 16 important colorsEnglishUnited States0.30357142857142855
RT_BITMAP0x5ce6800x188Device independent bitmap graphic, 24 x 24 x 4, image size 288, 16 important colorsEnglishUnited States0.3392857142857143
RT_BITMAP0x5ce8080x668Device independent bitmap graphic, 24 x 24 x 8, image size 576, 256 important colorsEnglishUnited States0.3829268292682927
RT_BITMAP0x5cee700x668Device independent bitmap graphic, 24 x 24 x 8, image size 576, 256 important colorsEnglishUnited States0.39146341463414636
RT_BITMAP0x5cf4d80x668Device independent bitmap graphic, 24 x 24 x 8, image size 576, 256 important colorsEnglishUnited States0.3853658536585366
RT_BITMAP0x5cfb400x188Device independent bitmap graphic, 24 x 24 x 4, image size 288, 16 important colorsEnglishUnited States0.42857142857142855
RT_BITMAP0x5cfcc80x668Device independent bitmap graphic, 24 x 24 x 8, image size 576, 256 important colorsEnglishUnited States0.39207317073170733
RT_BITMAP0x5d03300x110Device independent bitmap graphic, 24 x 14 x 4, image size 168EnglishUnited States0.40808823529411764
RT_BITMAP0x5d04400x110Device independent bitmap graphic, 24 x 14 x 4, image size 168EnglishUnited States0.4117647058823529
RT_BITMAP0x5d05500x70Device independent bitmap graphic, 16 x 16 x 1, image size 64EnglishUnited States0.3125
RT_BITMAP0x5d05c00x70Device independent bitmap graphic, 16 x 16 x 1, image size 64EnglishUnited States0.41964285714285715
RT_BITMAP0x5d06300x70Device independent bitmap graphic, 16 x 16 x 1, image size 64EnglishUnited States0.3482142857142857
RT_BITMAP0x5d06a00x70Device independent bitmap graphic, 16 x 16 x 1, image size 64EnglishUnited States0.38392857142857145
RT_BITMAP0x5d07100x70Device independent bitmap graphic, 16 x 16 x 1, image size 64EnglishUnited States0.3392857142857143
RT_BITMAP0x5d07800x70Device independent bitmap graphic, 16 x 16 x 1, image size 64EnglishUnited States0.32142857142857145
RT_BITMAP0x5d07f00x70Device independent bitmap graphic, 16 x 16 x 1, image size 64EnglishUnited States0.36607142857142855
RT_BITMAP0x5d08600x70Device independent bitmap graphic, 16 x 16 x 1, image size 64EnglishUnited States0.33035714285714285
RT_BITMAP0x5d08d00x70Device independent bitmap graphic, 16 x 16 x 1, image size 64EnglishUnited States0.41964285714285715
RT_BITMAP0x5d09400x70Device independent bitmap graphic, 16 x 16 x 1, image size 64EnglishUnited States0.30357142857142855
RT_BITMAP0x5d09b00x70Device independent bitmap graphic, 16 x 16 x 1, image size 64EnglishUnited States0.33035714285714285
RT_BITMAP0x5d0a200x70Device independent bitmap graphic, 16 x 16 x 1, image size 64EnglishUnited States0.41964285714285715
RT_BITMAP0x5d0a900x188Device independent bitmap graphic, 24 x 24 x 4, image size 288, 16 important colorsEnglishUnited States0.4107142857142857
RT_BITMAP0x5d0c180x188Device independent bitmap graphic, 24 x 24 x 4, image size 288, 16 important colorsEnglishUnited States0.3239795918367347
RT_BITMAP0x5d0da00x188Device independent bitmap graphic, 24 x 24 x 4, image size 288EnglishUnited States0.31887755102040816
RT_BITMAP0x5d0f280x188Device independent bitmap graphic, 24 x 24 x 4, image size 288, 16 important colorsEnglishUnited States0.30612244897959184
RT_BITMAP0x5d10b00x188Device independent bitmap graphic, 24 x 24 x 4, image size 288EnglishUnited States0.32142857142857145
RT_BITMAP0x5d12380x668Device independent bitmap graphic, 24 x 24 x 8, image size 576, 256 important colorsEnglishUnited States0.35548780487804876
RT_BITMAP0x5d18a00x188Device independent bitmap graphic, 24 x 24 x 4, image size 288, 16 important colorsEnglishUnited States0.375
RT_BITMAP0x5d1a280x668Device independent bitmap graphic, 24 x 24 x 8, image size 576EnglishUnited States0.44939024390243903
RT_BITMAP0x5d20900x188Device independent bitmap graphic, 24 x 24 x 4, image size 288, 16 important colorsEnglishUnited States0.3826530612244898
RT_BITMAP0x5d22180x668Device independent bitmap graphic, 24 x 24 x 8, image size 576, 256 important colorsEnglishUnited States0.3853658536585366
RT_BITMAP0x5d28800x668Device independent bitmap graphic, 24 x 24 x 8, image size 576, 256 important colorsEnglishUnited States0.43902439024390244
RT_BITMAP0x5d2ee80xe0Device independent bitmap graphic, 16 x 15 x 4, image size 120, 16 important colorsEnglishUnited States0.3794642857142857
RT_ICON0x5d2fc80x10828Device independent bitmap graphic, 128 x 256 x 32, image size 65536, resolution 2953 x 2953 px/m0.059328049213297054
RT_DIALOG0x5e37f00x52data0.7682926829268293
RT_DIALOG0x5e38440x52data0.7560975609756098
RT_STRING0x5e38980x410data0.4028846153846154
RT_STRING0x5e3ca80x3d8data0.4095528455284553
RT_STRING0x5e40800x3a0data0.4040948275862069
RT_STRING0x5e44200x40cdata0.4015444015444015
RT_STRING0x5e482c0x3f8data0.42322834645669294
RT_STRING0x5e4c240x374data0.39819004524886875
RT_STRING0x5e4f980x378data0.33783783783783783
RT_STRING0x5e53100x2e0data0.4470108695652174
RT_STRING0x5e55f00x468data0.3554964539007092
RT_STRING0x5e5a580x2d0data0.3888888888888889
RT_STRING0x5e5d280x364data0.43663594470046085
RT_STRING0x5e608c0x1acdata0.5186915887850467
RT_STRING0x5e62380xccdata0.6666666666666666
RT_STRING0x5e63040x114data0.6086956521739131
RT_STRING0x5e64180x2b4data0.4638728323699422
RT_STRING0x5e66cc0x408data0.3817829457364341
RT_STRING0x5e6ad40x374data0.39705882352941174
RT_STRING0x5e6e480x4b4data0.31727574750830567
RT_STRING0x5e72fc0x308data0.38788659793814434
RT_STRING0x5e76040x3bcdata0.4006276150627615
RT_STRING0x5e79c00x4fcdata0.3785266457680251
RT_STRING0x5e7ebc0x454data0.3303249097472924
RT_STRING0x5e83100x380data0.36049107142857145
RT_STRING0x5e86900x450data0.3903985507246377
RT_STRING0x5e8ae00x17cdata0.4631578947368421
RT_STRING0x5e8c5c0xccdata0.6225490196078431
RT_STRING0x5e8d280x1d0data0.5344827586206896
RT_STRING0x5e8ef80x3dcdata0.3765182186234818
RT_STRING0x5e92d40x38cdata0.3535242290748899
RT_STRING0x5e96600x354data0.3826291079812207
RT_STRING0x5e99b40x2e4data0.40540540540540543
RT_RCDATA0x5e9c980x10data1.5
RT_RCDATA0x5e9ca80xe58data0.4863834422657952
RT_RCDATA0x5eab000x19b77Delphi compiled form 'TBrushDialog'0.6545877438648122
RT_RCDATA0x6046780x415c8TrueType Font data, 19 tables, 1st "GPOS", 16 names, Macintosh, \(g\)\252 fonts 1999\251ElektraMediumTransType 3 MAC;Elektra;001.000;18/07/06 23:22:47ElektraVerEnglishUnited States0.10237935156133274
RT_RCDATA0x645c400x5f80TrueType Font data, 15 tables, 1st "OS/2", 21 names, UnicodeEnglishUnited States0.3445271596858639
RT_RCDATA0x64bbc00x21b871dataEnglishUnited States0.8604679107666016
RT_RCDATA0x8674340x15fDelphi compiled form 'Toejtrewer'0.7293447293447294
RT_RCDATA0x8675940xc59Delphi compiled form 'TPenDialog'0.4134767478645998
RT_RCDATA0x8681f00x692Delphi compiled form 'TTeeGalleryForm'0.4768133174791914
RT_RCDATA0x8688840x1661Delphi compiled form 'TTeeGradientEditor'0.3459591551754233
RT_GROUP_CURSOR0x869ee80x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.25
RT_GROUP_CURSOR0x869efc0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
RT_GROUP_CURSOR0x869f100x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.25
RT_GROUP_CURSOR0x869f240x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
RT_GROUP_CURSOR0x869f380x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
RT_GROUP_CURSOR0x869f4c0x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
RT_GROUP_CURSOR0x869f600x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
RT_GROUP_CURSOR0x869f740x14Lotus unknown worksheet or configuration, revision 0x1EnglishUnited States1.3
RT_GROUP_ICON0x869f880x14data1.15
RT_VERSION0x869f9c0x2e4data0.4418918918918919
DLLImport
oleaut32.dllSysFreeString, SysReAllocStringLen, SysAllocStringLen
advapi32.dllRegQueryValueExW, RegOpenKeyExW, RegCloseKey
user32.dllCharNextW, LoadStringW
kernel32.dllSleep, VirtualFree, VirtualAlloc, lstrlenW, VirtualQuery, QueryPerformanceCounter, GetTickCount, GetSystemInfo, GetVersion, CompareStringW, IsValidLocale, SetThreadLocale, GetSystemDefaultUILanguage, GetUserDefaultUILanguage, GetLocaleInfoW, WideCharToMultiByte, MultiByteToWideChar, GetACP, LoadLibraryExW, GetStartupInfoW, GetProcAddress, GetModuleHandleW, GetModuleFileNameW, GetCommandLineW, FreeLibrary, GetLastError, UnhandledExceptionFilter, RtlUnwindEx, RtlUnwind, RaiseException, ExitProcess, ExitThread, SwitchToThread, GetCurrentThreadId, CreateThread, DeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, InitializeCriticalSection, FindFirstFileW, FindClose, WriteFile, GetStdHandle, CloseHandle
kernel32.dllGetProcAddress, RaiseException, LoadLibraryA, GetLastError, TlsSetValue, TlsGetValue, LocalFree, LocalAlloc, GetModuleHandleW, FreeLibrary
user32.dllSetClassLongPtrW, GetClassLongPtrW, SetWindowLongPtrW, GetWindowLongPtrW, CreateWindowExW, WindowFromPoint, WaitMessage, UpdateWindow, UnregisterClassW, UnhookWindowsHookEx, TranslateMessage, TranslateMDISysAccel, TrackPopupMenu, SystemParametersInfoW, ShowWindow, ShowScrollBar, ShowOwnedPopups, ShowCaret, SetWindowRgn, SetWindowsHookExW, SetWindowTextW, SetWindowPos, SetWindowPlacement, SetTimer, SetScrollRange, SetScrollPos, SetScrollInfo, SetRect, SetPropW, SetParent, SetMenuItemInfoW, SetMenu, SetForegroundWindow, SetFocus, SetCursorPos, SetCursor, SetClipboardData, SetCapture, SetActiveWindow, SendMessageA, SendMessageW, ScrollWindow, ScreenToClient, RemovePropW, RemoveMenu, ReleaseDC, ReleaseCapture, RegisterWindowMessageW, RegisterClipboardFormatW, RegisterClassW, RedrawWindow, PostQuitMessage, PostMessageW, PeekMessageA, PeekMessageW, OpenClipboard, MsgWaitForMultipleObjectsEx, MsgWaitForMultipleObjects, MessageBoxW, MessageBeep, MapWindowPoints, MapVirtualKeyW, LoadStringW, LoadKeyboardLayoutW, LoadIconW, LoadCursorW, LoadBitmapW, KillTimer, IsZoomed, IsWindowVisible, IsWindowUnicode, IsWindowEnabled, IsWindow, IsIconic, IsDialogMessageA, IsDialogMessageW, IsClipboardFormatAvailable, IsChild, InvalidateRect, IntersectRect, InsertMenuItemW, InsertMenuW, HideCaret, GetWindowThreadProcessId, GetWindowTextW, GetWindowRect, GetWindowPlacement, GetWindowDC, GetTopWindow, GetSystemMetrics, GetSystemMenu, GetSysColorBrush, GetSysColor, GetSubMenu, GetScrollRange, GetScrollPos, GetScrollInfo, GetScrollBarInfo, GetPropW, GetParent, GetWindow, GetMessagePos, GetMessageExtraInfo, GetMenuStringW, GetMenuState, GetMenuItemInfoW, GetMenuItemID, GetMenuItemCount, GetMenu, GetLastActivePopup, GetKeyboardState, GetKeyboardLayoutNameW, GetKeyboardLayoutList, GetKeyboardLayout, GetKeyState, GetKeyNameTextW, GetIconInfo, GetForegroundWindow, GetFocus, GetDlgCtrlID, GetDesktopWindow, GetDCEx, GetDC, GetCursorPos, GetCursor, GetClipboardData, GetClientRect, GetClassNameW, GetClassInfoExW, GetClassInfoW, GetCapture, GetActiveWindow, FrameRect, FindWindowExW, FindWindowW, FillRect, EnumWindows, EnumThreadWindows, EnumClipboardFormats, EnumChildWindows, EndPaint, EndMenu, EnableWindow, EnableScrollBar, EnableMenuItem, EmptyClipboard, DrawTextExW, DrawTextW, DrawMenuBar, DrawIconEx, DrawIcon, DrawFrameControl, DrawFocusRect, DrawEdge, DispatchMessageA, DispatchMessageW, DestroyWindow, DestroyMenu, DestroyIcon, DestroyCursor, DeleteMenu, DefWindowProcW, DefMDIChildProcW, DefFrameProcW, CreatePopupMenu, CreateMenu, CreateIcon, CreateAcceleratorTableW, CountClipboardFormats, CopyImage, CopyIcon, CloseClipboard, ClientToScreen, CheckMenuItem, CharUpperBuffW, CharUpperW, CharNextW, CharLowerBuffW, CharLowerW, CallWindowProcW, CallNextHookEx, BeginPaint, AdjustWindowRectEx, ActivateKeyboardLayout
gdi32.dllWidenPath, UnrealizeObject, TextOutW, StrokePath, StrokeAndFillPath, StretchDIBits, StretchBlt, StartPage, StartDocW, SetWindowOrgEx, SetWindowExtEx, SetWinMetaFileBits, SetViewportOrgEx, SetViewportExtEx, SetTextCharacterExtra, SetTextColor, SetTextAlign, SetStretchBltMode, SetRectRgn, SetROP2, SetPixel, SetMapMode, SetGraphicsMode, SetEnhMetaFileBits, SetDIBits, SetDIBColorTable, SetBrushOrgEx, SetBkMode, SetBkColor, SetArcDirection, SetAbortProc, SelectPalette, SelectObject, SelectClipRgn, SelectClipPath, SaveDC, RoundRect, RestoreDC, Rectangle, RectVisible, RealizePalette, PtVisible, PolylineTo, Polyline, Polygon, PolyBezierTo, PolyBezier, PlayEnhMetaFile, Pie, PathToRegion, PatBlt, MoveToEx, MaskBlt, LineTo, LPtoDP, IntersectClipRect, GetWindowOrgEx, GetWinMetaFileBits, GetTextMetricsW, GetTextExtentPointW, GetTextExtentPoint32W, GetTextCharacterExtra, GetTextAlign, GetSystemPaletteEntries, GetStockObject, GetRgnBox, GetPixel, GetPaletteEntries, GetObjectA, GetObjectW, GetMapMode, GetEnhMetaFilePaletteEntries, GetEnhMetaFileHeader, GetEnhMetaFileDescriptionW, GetEnhMetaFileBits, GetDeviceCaps, GetDIBits, GetDIBColorTable, GetCurrentPositionEx, GetClipRgn, GetClipBox, GetBrushOrgEx, GetBkMode, GetBkColor, GetBitmapBits, GdiFlush, FrameRgn, FillPath, ExtTextOutW, ExtSelectClipRgn, ExtFloodFill, ExtCreatePen, ExcludeClipRect, EnumFontsW, EnumFontFamiliesExW, EndPath, EndPage, EndDoc, Ellipse, DeleteObject, DeleteEnhMetaFile, DeleteDC, CreateSolidBrush, CreateRoundRectRgn, CreateRectRgn, CreatePolygonRgn, CreatePenIndirect, CreatePalette, CreateICW, CreateHalftonePalette, CreateFontIndirectW, CreateEnhMetaFileW, CreateEllipticRgnIndirect, CreateDIBitmap, CreateDIBSection, CreateDCW, CreateCompatibleDC, CreateCompatibleBitmap, CreateBrushIndirect, CreateBitmap, CopyEnhMetaFileW, CloseFigure, CloseEnhMetaFile, Chord, BitBlt, BeginPath, ArcTo, Arc, AngleArc, AbortDoc
version.dllVerQueryValueW, GetFileVersionInfoSizeW, GetFileVersionInfoW
kernel32.dllWriteFile, WideCharToMultiByte, WaitForSingleObject, WaitForMultipleObjectsEx, VirtualQueryEx, VirtualQuery, VirtualProtect, VirtualFree, VirtualAlloc, VerSetConditionMask, VerifyVersionInfoW, TryEnterCriticalSection, SwitchToThread, SuspendThread, Sleep, SizeofResource, SetThreadPriority, SetThreadLocale, SetLastError, SetFilePointer, SetEvent, SetErrorMode, SetEndOfFile, ResumeThread, ResetEvent, RemoveDirectoryW, ReadFile, RaiseException, QueryPerformanceFrequency, QueryPerformanceCounter, IsDebuggerPresent, MulDiv, LockResource, LocalFree, LoadResource, LoadLibraryW, LeaveCriticalSection, IsValidLocale, InitializeCriticalSection, HeapSize, HeapFree, HeapDestroy, HeapCreate, HeapAlloc, GlobalUnlock, GlobalSize, GlobalLock, GlobalFree, GlobalFindAtomW, GlobalDeleteAtom, GlobalAlloc, GlobalAddAtomW, GetVersionExW, GetVersion, GetTimeZoneInformation, GetTickCount, GetThreadPriority, GetThreadLocale, GetTempPathW, GetStdHandle, GetProcAddress, GetModuleHandleW, GetModuleFileNameW, GetLocaleInfoW, GetLocalTime, GetLastError, GetFullPathNameW, GetFileSize, GetFileAttributesW, GetExitCodeThread, GetDiskFreeSpaceW, GetDateFormatW, GetCurrentThreadId, GetCurrentThread, GetCurrentProcessId, GetCurrentProcess, GetCPInfoExW, GetCPInfo, GetACP, FreeResource, FreeLibrary, FormatMessageW, FindResourceW, FindFirstFileW, FindClose, EnumSystemLocalesW, EnumResourceNamesW, EnumCalendarInfoW, EnterCriticalSection, DeleteFileW, DeleteCriticalSection, CreateThread, CreateFileW, CreateEventW, CopyFileW, CompareStringW, CloseHandle
advapi32.dllRegUnLoadKeyW, RegSetValueExW, RegSaveKeyW, RegRestoreKeyW, RegReplaceKeyW, RegQueryValueExW, RegQueryInfoKeyW, RegOpenKeyExW, RegLoadKeyW, RegFlushKey, RegEnumValueW, RegEnumKeyExW, RegDeleteValueW, RegDeleteKeyW, RegCreateKeyExW, RegConnectRegistryW, RegCloseKey
kernel32.dllSleep
oleaut32.dllSafeArrayPtrOfIndex, SafeArrayGetUBound, SafeArrayGetLBound, SafeArrayCreate, VariantChangeType, VariantCopy, VariantClear, VariantInit
oleaut32.dllGetErrorInfo, SysFreeString
ole32.dllOleUninitialize, OleInitialize, CoTaskMemFree, CoTaskMemAlloc, CoCreateInstance, CoUninitialize, CoInitialize, IsEqualGUID
comctl32.dllInitializeFlatSB, FlatSB_SetScrollProp, FlatSB_SetScrollPos, FlatSB_SetScrollInfo, FlatSB_GetScrollPos, FlatSB_GetScrollInfo, _TrackMouseEvent, ImageList_GetImageInfo, ImageList_SetIconSize, ImageList_GetIconSize, ImageList_Write, ImageList_Read, ImageList_GetDragImage, ImageList_DragShowNolock, ImageList_DragMove, ImageList_DragLeave, ImageList_DragEnter, ImageList_EndDrag, ImageList_BeginDrag, ImageList_Copy, ImageList_LoadImageW, ImageList_GetIcon, ImageList_Remove, ImageList_DrawEx, ImageList_Replace, ImageList_Draw, ImageList_SetOverlayImage, ImageList_GetBkColor, ImageList_SetBkColor, ImageList_ReplaceIcon, ImageList_Add, ImageList_SetImageCount, ImageList_GetImageCount, ImageList_Destroy, ImageList_Create
user32.dllEnumDisplayMonitors, GetMonitorInfoW, MonitorFromPoint, MonitorFromRect, MonitorFromWindow
shell32.dllShell_NotifyIconW
winspool.drvOpenPrinterW, EnumPrintersW, DocumentPropertiesW, ClosePrinter
winspool.drvGetDefaultPrinterW
NameOrdinalAddress
TMethodImplementationIntercept30x4977c0
__dbk_fcall_wrapper20x4172f0
dbkFCallWrapperAddr10x92ef58
Language of compilation systemCountry where language is spokenMap
EnglishUnited States
TimestampSource PortDest PortSource IPDest IP
Aug 29, 2024 06:24:21.351891994 CEST49715443192.168.2.6188.114.96.3
Aug 29, 2024 06:24:21.351926088 CEST44349715188.114.96.3192.168.2.6
Aug 29, 2024 06:24:21.352006912 CEST49715443192.168.2.6188.114.96.3
Aug 29, 2024 06:24:21.353596926 CEST49715443192.168.2.6188.114.96.3
Aug 29, 2024 06:24:21.353609085 CEST44349715188.114.96.3192.168.2.6
Aug 29, 2024 06:24:21.827838898 CEST44349715188.114.96.3192.168.2.6
Aug 29, 2024 06:24:21.827971935 CEST49715443192.168.2.6188.114.96.3
Aug 29, 2024 06:24:21.830313921 CEST49715443192.168.2.6188.114.96.3
Aug 29, 2024 06:24:21.830337048 CEST44349715188.114.96.3192.168.2.6
Aug 29, 2024 06:24:21.830656052 CEST44349715188.114.96.3192.168.2.6
Aug 29, 2024 06:24:21.875257015 CEST49715443192.168.2.6188.114.96.3
Aug 29, 2024 06:24:21.930613995 CEST49715443192.168.2.6188.114.96.3
Aug 29, 2024 06:24:21.930613995 CEST49715443192.168.2.6188.114.96.3
Aug 29, 2024 06:24:21.930803061 CEST44349715188.114.96.3192.168.2.6
Aug 29, 2024 06:24:22.274483919 CEST44349715188.114.96.3192.168.2.6
Aug 29, 2024 06:24:22.274553061 CEST44349715188.114.96.3192.168.2.6
Aug 29, 2024 06:24:22.274748087 CEST49715443192.168.2.6188.114.96.3
Aug 29, 2024 06:24:22.274780989 CEST44349715188.114.96.3192.168.2.6
Aug 29, 2024 06:24:22.274792910 CEST49715443192.168.2.6188.114.96.3
Aug 29, 2024 06:24:22.274801016 CEST44349715188.114.96.3192.168.2.6
Aug 29, 2024 06:24:22.274816990 CEST49715443192.168.2.6188.114.96.3
Aug 29, 2024 06:24:22.274821043 CEST44349715188.114.96.3192.168.2.6
TimestampSource PortDest PortSource IPDest IP
Aug 29, 2024 06:24:21.327296972 CEST5200953192.168.2.61.1.1.1
Aug 29, 2024 06:24:21.344835997 CEST53520091.1.1.1192.168.2.6
TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
Aug 29, 2024 06:24:21.327296972 CEST192.168.2.61.1.1.10x157bStandard query (0)jirafasaltas.funA (IP address)IN (0x0001)false
TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
Aug 29, 2024 06:24:21.344835997 CEST1.1.1.1192.168.2.60x157bNo error (0)jirafasaltas.fun188.114.96.3A (IP address)IN (0x0001)false
Aug 29, 2024 06:24:21.344835997 CEST1.1.1.1192.168.2.60x157bNo error (0)jirafasaltas.fun188.114.97.3A (IP address)IN (0x0001)false
  • jirafasaltas.fun
Session IDSource IPSource PortDestination IPDestination PortPIDProcess
0192.168.2.649715188.114.96.34436728C:\Users\user\Desktop\file.exe
TimestampBytes transferredDirectionData
2024-08-29 04:24:21 UTC322OUTPOST /shopexd.asp?bz6lc4t394br=eFhwIFemrMF%2FVQdnWgR2UbCKGWfZtBWZRJvXMMLoeVpaAXHaE0GBuUMO5s2rsXKU HTTP/1.1
Connection: Keep-Alive
Accept: */*
User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_15_7) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/120.0.0.0 Safari/537.36
Content-Length: 96
Host: jirafasaltas.fun
2024-08-29 04:24:21 UTC96OUTData Raw: fd ff ff ff 03 00 00 00 00 00 00 00 00 00 00 00 92 00 00 fe ff ff ff 2d 00 00 00 00 00 00 00 00 00 00 00 97 00 a0 a0 a0 ff ff d9 24 39 65 31 34 36 62 65 39 2d 63 37 36 61 2d 34 37 32 30 2d 62 63 64 62 2d 35 33 30 31 31 62 38 37 62 64 30 36 ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff ff
Data Ascii: -$9e146be9-c76a-4720-bcdb-53011b87bd06
2024-08-29 04:24:22 UTC516INHTTP/1.1 204 No Content
Date: Thu, 29 Aug 2024 04:24:22 GMT
Connection: close
CF-Cache-Status: DYNAMIC
Report-To: {"endpoints":[{"url":"https:\/\/a.nel.cloudflare.com\/report\/v4?s=8WmH3ya62I20C2lZLUjgcRyIs86TcThsIqkEQFzdr9iV8APu07DGs5DROTE6S86A0s0SGD4fO96hv%2B2hFe6YH%2FFNccSwF1kK%2FNKdkznOrdIK%2F4fcYGKcREWJre1Y%2FXPCILQI"}],"group":"cf-nel","max_age":604800}
NEL: {"success_fraction":0,"report_to":"cf-nel","max_age":604800}
Server: cloudflare
CF-RAY: 8ba9c561687ac330-EWR
alt-svc: h3=":443"; ma=86400


Click to jump to process

Click to jump to process

Click to dive into process behavior distribution

Target ID:0
Start time:00:24:03
Start date:29/08/2024
Path:C:\Users\user\Desktop\file.exe
Wow64 process (32bit):false
Commandline:"C:\Users\user\Desktop\file.exe"
Imagebase:0x400000
File size:8'751'104 bytes
MD5 hash:B7A66864AEDC3FA7A4686498EAF2B251
Has elevated privileges:true
Has administrator privileges:true
Programmed in:Borland Delphi
Reputation:low
Has exited:true

Reset < >
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2344666311.00000000033F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033F0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_33f0000_file.jbxd
    Similarity
    • API ID:
    • String ID: tTq=$2S
    • API String ID: 0-543185254
    • Opcode ID: e339baaa02422576db15edd746f3cbc4c7fcbfe3e090ede554aa3c520f7dbfae
    • Instruction ID: 3652085c6c270c2e864c9cef62d2dafdc5990f8d86414d4d372b22b7d78a490d
    • Opcode Fuzzy Hash: e339baaa02422576db15edd746f3cbc4c7fcbfe3e090ede554aa3c520f7dbfae
    • Instruction Fuzzy Hash: C06136327789854F478CC93C8C5263676C7EBCA235768DB3EA5ABC72E5D924C8438609
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2344666311.00000000033F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033F0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_33f0000_file.jbxd
    Similarity
    • API ID:
    • String ID: tTq=$2S
    • API String ID: 0-543185254
    • Opcode ID: 41587e98690bb531271f1142d322c8ffd1b5d973879c85c1fc7cde5b8bf9e366
    • Instruction ID: 28c5fbcb02a0821d9226183c442195c8a92063f54d06bb13559c030e09295e03
    • Opcode Fuzzy Hash: 41587e98690bb531271f1142d322c8ffd1b5d973879c85c1fc7cde5b8bf9e366
    • Instruction Fuzzy Hash: 0F6137327789854F878CC93C8C5263636D7DBCA235768D73EA5ABC72E5D924C8038609
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2344666311.00000000033F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033F0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_33f0000_file.jbxd
    Similarity
    • API ID:
    • String ID: Q2\!
    • API String ID: 0-796754979
    • Opcode ID: fda47437f6fc69074cd0fc07c01b764f0c4e6b28e09a02de8376cadca83ae7d7
    • Instruction ID: 1ff79a9f05b153abc184747888508a71803f1535d6c7c8be5ebb9850393b042c
    • Opcode Fuzzy Hash: fda47437f6fc69074cd0fc07c01b764f0c4e6b28e09a02de8376cadca83ae7d7
    • Instruction Fuzzy Hash: 78416931F2890C8F9B5CEF7C9C856AA77E2F758315720462DE46ED7691EA30C8928741
    Memory Dump Source
    • Source File: 00000000.00000002.2344666311.00000000033F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033F0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_33f0000_file.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 1ec9987ff25aeb479eb36b507c5c683234566d5a86e04e2d98dd650034a1728d
    • Instruction ID: 33860df8ba22ccf4bc58e9da5834815951acd953c0717c5afb50b5891dc5f70c
    • Opcode Fuzzy Hash: 1ec9987ff25aeb479eb36b507c5c683234566d5a86e04e2d98dd650034a1728d
    • Instruction Fuzzy Hash: 1051E635B249444FC78CDB3CCC9666A76D2EB99324B98863EA457C77E4EA38C8428705
    Memory Dump Source
    • Source File: 00000000.00000002.2344666311.00000000033F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033F0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_33f0000_file.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 220653a4a4cadc53af8c6ce3f2ed5cfd7c41420154ef4ebc40cdd6e9d1e327c8
    • Instruction ID: 14decec85f3b4daa9b426b69f004b569182ac2e7c271680fa9c12c1fbbe00d06
    • Opcode Fuzzy Hash: 220653a4a4cadc53af8c6ce3f2ed5cfd7c41420154ef4ebc40cdd6e9d1e327c8
    • Instruction Fuzzy Hash: 2C51C274E2490C8FEB48EFBCD885A797BF1FB58304F54015AD419D73A0DA349981CB86
    Memory Dump Source
    • Source File: 00000000.00000002.2344666311.00000000033F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033F0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_33f0000_file.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 91d8fec66991a5c8e682263c7a6966a27c6db31d7d277340809bc3aa0dc81e15
    • Instruction ID: 3acb43b021cf886c2fbbb89215ba7ac4618d4fd2d91bfbece7812479e900444f
    • Opcode Fuzzy Hash: 91d8fec66991a5c8e682263c7a6966a27c6db31d7d277340809bc3aa0dc81e15
    • Instruction Fuzzy Hash: B0412636728A848FC74CEB3CCC9276A77D2EB99324B94467DE197C77E0DA24D8428705
    Memory Dump Source
    • Source File: 00000000.00000002.2344666311.00000000033F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033F0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_33f0000_file.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 43cc3ec64853b02de629e73a996ee7555fd754326a9f568214bb8f52e9565089
    • Instruction ID: f1c47df0074bafedb10868b256b03facb4ff827f8de872407cfe1e70c1cd6cef
    • Opcode Fuzzy Hash: 43cc3ec64853b02de629e73a996ee7555fd754326a9f568214bb8f52e9565089
    • Instruction Fuzzy Hash: 6131E331629A844FD388DB3C8C957167AD2FB9A334FA4875DF17AD62E0C735C8528705
    Memory Dump Source
    • Source File: 00000000.00000002.2344666311.00000000033F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033F0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_33f0000_file.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 0641690a1ae636139eb6951a2d31bd3edaeb7558592d072d685aa54fb1f8d80b
    • Instruction ID: 57f69d0d548626b3fd931da4ca5b3aac4144e2f648f725d2be012ba132fd7699
    • Opcode Fuzzy Hash: 0641690a1ae636139eb6951a2d31bd3edaeb7558592d072d685aa54fb1f8d80b
    • Instruction Fuzzy Hash: 8E11B131228D084F9A4CDB3C886956576D2FB993313A4D32EF43AC73F2DE2494828745
    Memory Dump Source
    • Source File: 00000000.00000002.2344666311.00000000033F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033F0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_33f0000_file.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 5e46f8872fe86965cf683b4701ffd3a3878fad5ff4cacc2713877e57eb621fb6
    • Instruction ID: 62dd5091ebf045b5c2e8b77a6af4e5c144646ec931d54b7b260df1ec5f40dc08
    • Opcode Fuzzy Hash: 5e46f8872fe86965cf683b4701ffd3a3878fad5ff4cacc2713877e57eb621fb6
    • Instruction Fuzzy Hash: 452137367385454B430CCA3DDCA252676C7FB88324B64CB2DE5A7CB7D5C638C8838A09
    Memory Dump Source
    • Source File: 00000000.00000002.2344666311.00000000033F0000.00000040.00001000.00020000.00000000.sdmp, Offset: 033F0000, based on PE: false
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_33f0000_file.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 93f280d876108d5ac1d030dcc799272a7c6417004d295da9cfc2e65303c059e4
    • Instruction ID: 26afa63451c2d47c6b11a6a8b5742d776f96237e224df8896cb48d52d3df0e17
    • Opcode Fuzzy Hash: 93f280d876108d5ac1d030dcc799272a7c6417004d295da9cfc2e65303c059e4
    • Instruction Fuzzy Hash: 02214332714A094B579CEA7C9C6223B37E2EB88320314462FF23BCB3E4ED21C9824705