Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Win64.MalwareX-gen.20172.29195.exe

Overview

General Information

Sample name:SecuriteInfo.com.Win64.MalwareX-gen.20172.29195.exe
Analysis ID:1501347
MD5:b4058ae5bcba18dfc8928ef170a6e718
SHA1:4be4709fdec8ac308b84dcf7c551a2210f65a964
SHA256:fcfa5ee7cd4c0addaf13587e94377fb9bf2501636a3be72027c52c98105293e6
Tags:exe
Errors
  • Corrupt sample or wrongly selected analyzer. Details: The %1 application cannot be run in Win32 mode.

Detection

Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Contains functionality to call native functions
Contains functionality to query CPU information (cpuid)
PE / OLE file has an invalid certificate
Program does not show much activity (idle)

Classification

  • System is w10x64
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: SecuriteInfo.com.Win64.MalwareX-gen.20172.29195.exeReversingLabs: Detection: 50%
Source: SecuriteInfo.com.Win64.MalwareX-gen.20172.29195.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF
Source: Binary string: E:\BRONKZ BACKUP 16 02 2024\Loaders C# Bronkz Private Store\Cheat Fortnite\Driver Fortnite Private Store\payson-ioctl-cheat-driver-main\build\driver\driver.pdb source: SecuriteInfo.com.Win64.MalwareX-gen.20172.29195.exe
Source: Binary string: E:\BRONKZ BACKUP 16 02 2024\Loaders C# Bronkz Private Store\Cheat Fortnite\Driver Fortnite Private Store\payson-ioctl-cheat-driver-main\build\driver\driver.pdb source: SecuriteInfo.com.Win64.MalwareX-gen.20172.29195.exe
Source: SecuriteInfo.com.Win64.MalwareX-gen.20172.29195.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0E
Source: SecuriteInfo.com.Win64.MalwareX-gen.20172.29195.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crt0
Source: SecuriteInfo.com.Win64.MalwareX-gen.20172.29195.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertTrustedRootG4.crt0C
Source: SecuriteInfo.com.Win64.MalwareX-gen.20172.29195.exeString found in binary or memory: http://certs.apple.com/wwdrg3.der01
Source: SecuriteInfo.com.Win64.MalwareX-gen.20172.29195.exeString found in binary or memory: http://crl.apple.com/root.crl0
Source: SecuriteInfo.com.Win64.MalwareX-gen.20172.29195.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0
Source: SecuriteInfo.com.Win64.MalwareX-gen.20172.29195.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedG4RSA4096SHA256TimeStampingCA.crl0
Source: SecuriteInfo.com.Win64.MalwareX-gen.20172.29195.exeString found in binary or memory: http://crl3.digicert.com/DigiCertTrustedRootG4.crl0
Source: SecuriteInfo.com.Win64.MalwareX-gen.20172.29195.exeString found in binary or memory: http://ocsp.apple.com/ocsp03-applerootca0.
Source: SecuriteInfo.com.Win64.MalwareX-gen.20172.29195.exeString found in binary or memory: http://ocsp.apple.com/ocsp03-wwdrg3010
Source: SecuriteInfo.com.Win64.MalwareX-gen.20172.29195.exeString found in binary or memory: http://ocsp.digicert.com0A
Source: SecuriteInfo.com.Win64.MalwareX-gen.20172.29195.exeString found in binary or memory: http://ocsp.digicert.com0C
Source: SecuriteInfo.com.Win64.MalwareX-gen.20172.29195.exeString found in binary or memory: http://ocsp.digicert.com0X
Source: SecuriteInfo.com.Win64.MalwareX-gen.20172.29195.exeString found in binary or memory: https://www.apple.com/certificateauthority/0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.20172.29195.exeCode function: 0_2_00007FF603631094 ExFreePoolWithTag,ExAllocatePool,ZwQuerySystemInformation,ExFreePoolWithTag,0_2_00007FF603631094
Source: SecuriteInfo.com.Win64.MalwareX-gen.20172.29195.exeStatic PE information: invalid certificate
Source: SecuriteInfo.com.Win64.MalwareX-gen.20172.29195.exeBinary string: \Device\microsoftedge
Source: classification engineClassification label: mal48.winEXE@1/0@0/0
Source: SecuriteInfo.com.Win64.MalwareX-gen.20172.29195.exeReversingLabs: Detection: 50%
Source: SecuriteInfo.com.Win64.MalwareX-gen.20172.29195.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: SecuriteInfo.com.Win64.MalwareX-gen.20172.29195.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF
Source: SecuriteInfo.com.Win64.MalwareX-gen.20172.29195.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: E:\BRONKZ BACKUP 16 02 2024\Loaders C# Bronkz Private Store\Cheat Fortnite\Driver Fortnite Private Store\payson-ioctl-cheat-driver-main\build\driver\driver.pdb source: SecuriteInfo.com.Win64.MalwareX-gen.20172.29195.exe
Source: Binary string: E:\BRONKZ BACKUP 16 02 2024\Loaders C# Bronkz Private Store\Cheat Fortnite\Driver Fortnite Private Store\payson-ioctl-cheat-driver-main\build\driver\driver.pdb source: SecuriteInfo.com.Win64.MalwareX-gen.20172.29195.exe
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.20172.29195.exeCode function: 0_2_00007FF603631700 cpuid 0_2_00007FF603631700
Source: C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.20172.29195.exeCode function: 0_2_00007FF60363128C RtlGetVersion,0_2_00007FF60363128C
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management InstrumentationPath InterceptionPath InterceptionDirect Volume AccessOS Credential Dumping11
System Information Discovery
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SecuriteInfo.com.Win64.MalwareX-gen.20172.29195.exe50%ReversingLabsWin64.Trojan.Generic
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
No contacted IP infos
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1501347
Start date and time:2024-08-29 19:23:27 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 2m 7s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:2
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:SecuriteInfo.com.Win64.MalwareX-gen.20172.29195.exe
Detection:MAL
Classification:mal48.winEXE@1/0@0/0
EGA Information:Failed
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 0
  • Number of non-executed functions: 5
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Unable to launch sample, stop analysis
  • Corrupt sample or wrongly selected analyzer. Details: The %1 application cannot be run in Win32 mode.
  • Exclude process from analysis (whitelisted): dllhost.exe
  • Execution Graph export aborted for target SecuriteInfo.com.Win64.MalwareX-gen.20172.29195.exe, PID 5244 because there are no executed function
  • VT rate limit hit for: SecuriteInfo.com.Win64.MalwareX-gen.20172.29195.exe
No simulations
No context
No context
No context
No context
No context
No created / dropped files found
File type:PE32+ executable (native) x86-64, for MS Windows
Entropy (8bit):6.4710582738492155
TrID:
  • Win64 Device Driver (generic) (12004/3) 74.95%
  • Generic Win/DOS Executable (2004/3) 12.51%
  • DOS Executable Generic (2002/1) 12.50%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.04%
File name:SecuriteInfo.com.Win64.MalwareX-gen.20172.29195.exe
File size:17'680 bytes
MD5:b4058ae5bcba18dfc8928ef170a6e718
SHA1:4be4709fdec8ac308b84dcf7c551a2210f65a964
SHA256:fcfa5ee7cd4c0addaf13587e94377fb9bf2501636a3be72027c52c98105293e6
SHA512:633f0e83ede3f8cd3c97b569caacda3dd12ae0a63f36e78f207b4ddffd4f1ddeffba99985d57ed32c1d567d8cc0a13d4f09b05916cb99e443bc125fd1d40e11b
SSDEEP:384:kOtO3J6DIX5qk/DTeNycu9g58E9VF3AM+oLPdrFpO:K5HDNe+ENAMxrdRc
TLSH:82827CF156143C8AEE5B483872C9993AFC71F2472B62C5EB5159C1244F82BC27D3E3A9
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........y..W...W...W...W...V....`..T...W...F....`..Q....`..R...8...V...8...V...RichW...........PE..d......f.........."....&...........
Icon Hash:00928e8e8686b000
Entrypoint:0x140001000
Entrypoint Section:.text
Digitally signed:true
Imagebase:0x140000000
Subsystem:native
Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, GUARD_CF
Time Stamp:0x669AD613 [Fri Jul 19 21:09:39 2024 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:10
OS Version Minor:0
File Version Major:10
File Version Minor:0
Subsystem Version Major:10
Subsystem Version Minor:0
Import Hash:48aab8b485505e39221c6ac40909a9cb
Signature Valid:false
Signature Issuer:C=US, O=Apple Inc., OU=G3, CN=Apple Worldwide Developer Relations Certification Authority
Signature Validation Error:A certificate chain could not be built to a trusted root authority
Error Number:-2146762486
Not Before, Not After
  • 22/09/2021 04:21:00 21/09/2024 04:20:59
Subject Chain
  • C=US, O=Capinfo Company Limited, OU=Z33AYFK3S6, CN=iPhone Distribution: Capinfo Company Limited, OID.0.9.2342.19200300.100.1.1=Z33AYFK3S6
Version:3
Thumbprint MD5:083C1CB32136155E99F80E6B64F262B2
Thumbprint SHA-1:36BA5A94A93D26EE3B7E23ED58070B97EFC7A6DF
Thumbprint SHA-256:BD74109D187D47BCFA8FD123BDF7CF20A461D90499D4D8BD8BB7AFA6B0C9657D
Serial:6BC29E86CB3FBB6DFAEE6F3C2BE2F9C5
Instruction
dec eax
lea edx, dword ptr [000002E9h]
xor ecx, ecx
jmp 00007FB480B34A1Fh
int3
int3
inc eax
push ebx
dec eax
sub esp, 20h
dec eax
mov ebx, edx
xor edx, edx
dec eax
mov ecx, ebx
call dword ptr [0000100Ch]
mov eax, dword ptr [ebx+30h]
dec eax
add esp, 20h
pop ebx
ret
int3
int3
int3
inc eax
push ebx
dec eax
sub esp, 20h
cmp dword ptr [ecx], 09CC4AD7h
dec eax
mov ebx, ecx
jne 00007FB480B34388h
dec eax
arpl word ptr [ecx+04h], ax
test eax, eax
je 00007FB480B34380h
dec eax
and dword ptr [esp+30h], 00000000h
dec eax
lea edx, dword ptr [esp+30h]
dec eax
mov ecx, eax
call dword ptr [0000100Bh]
dec eax
mov ecx, dword ptr [esp+30h]
dec eax
test ecx, ecx
je 00007FB480B34362h
call 00007FB480B349C7h
dec eax
test eax, eax
je 00007FB480B34358h
dec eax
mov ecx, dword ptr [ebx+08h]
dec eax
mov dword ptr [ecx], eax
dec eax
mov ecx, dword ptr [esp+30h]
call dword ptr [00000FD5h]
xor eax, eax
jmp 00007FB480B34347h
mov eax, C0000001h
dec eax
add esp, 20h
pop ebx
ret
int3
int3
dec eax
mov dword ptr [esp+10h], ebx
dec eax
mov dword ptr [esp+18h], esi
push edi
dec eax
sub esp, 20h
cmp dword ptr [ecx], 09CC4AD7h
dec eax
mov esi, ecx
je 00007FB480B3434Ch
mov eax, C0000001h
jmp 00007FB480B343FAh
xor ebx, ebx
dec esp
lea ecx, dword ptr [esp+30h]
inc ebp
xor eax, eax
mov dword ptr [esp+30h], ebx
dec eax
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x50000x28INIT
IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x40000xe4.pdata
IMAGE_DIRECTORY_ENTRY_SECURITY0x22000x2310
IMAGE_DIRECTORY_ENTRY_BASERELOC0x60000x24.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x22300x38.rdata
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x20f00x140.rdata
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x20000x90.rdata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000xd340xe00a4f3787bcfaeec4d99498d97161950a4False0.5873325892857143data5.907000556729478IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_NOT_PAGED, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.rdata0x20000x57c0x600636b45725b6480e42128454d586aafa9False0.419921875COM executable for DOS3.570454251668763IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_NOT_PAGED, IMAGE_SCN_MEM_READ
.data0x30000x400x200cbb748dee567c4d5bf81dbe930f4b320False0.044921875Matlab v4 mat-file (little endian) \231+, sparse, rows 0, columns 00.14263576814887827IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_NOT_PAGED, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.pdata0x40000xe40x2009a215d8501afc3458f249d57a4e6d177False0.314453125PEX Binary Archive1.861521584530323IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_NOT_PAGED, IMAGE_SCN_MEM_READ
INIT0x50000x2380x4005ae7b6b5e0712cb96ca9db29ab0a3a7aFalse0.3466796875data2.9939354875697997IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.reloc0x60000x240x2001f4efc9ecfe0db769e417c46c3d0da6eFalse0.095703125data0.5034383167085339IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
DLLImport
ntoskrnl.exeRtlInitUnicodeString, RtlGetVersion, ExAllocatePool, ExFreePoolWithTag, MmUnmapIoSpace, MmMapIoSpaceEx, IofCompleteRequest, IoCreateDevice, IoCreateSymbolicLink, IoDeleteDevice, IoDeleteSymbolicLink, ObfDereferenceObject, MmCopyMemory, PsLookupProcessByProcessId, IoCreateDriver, PsGetProcessSectionBaseAddress, ZwQuerySystemInformation
No network behavior found

Click to jump to process

Click to jump to process

Target ID:0
Start time:13:24:48
Start date:29/08/2024
Path:C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.20172.29195.exe
Wow64 process (32bit):false
Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Win64.MalwareX-gen.20172.29195.exe"
Imagebase:0x7ff603630000
File size:17'680 bytes
MD5 hash:B4058AE5BCBA18DFC8928EF170A6E718
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:true

Reset < >
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1625326921.00007FF603631000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF603630000, based on PE: true
    • Associated: 00000000.00000002.1625309660.00007FF603630000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1625342125.00007FF603632000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1625358895.00007FF603634000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1625374775.00007FF603635000.00000020.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff603630000_SecuriteInfo.jbxd
    Similarity
    • API ID: FreePoolTag.With$AllocateInformation.Pool.QuerySystem
    • String ID: TnoC
    • API String ID: 270286560-718456449
    • Opcode ID: 6ea8cb5e01ced0ba7c181966e5ef3746f268ec657b8b6bdb8a6ac9af38b76aa3
    • Instruction ID: ca65b8abfda6e76729e046c1689d859cd1d8d3f6a183d454a898ef7f43854f32
    • Opcode Fuzzy Hash: 6ea8cb5e01ced0ba7c181966e5ef3746f268ec657b8b6bdb8a6ac9af38b76aa3
    • Instruction Fuzzy Hash: E7210671F3C64542FB649B26D0826B967A1FB4AB81F248435FA4E93B44CF3DE890DB00
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1625326921.00007FF603631000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF603630000, based on PE: true
    • Associated: 00000000.00000002.1625309660.00007FF603630000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1625342125.00007FF603632000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1625358895.00007FF603634000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1625374775.00007FF603635000.00000020.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff603630000_SecuriteInfo.jbxd
    Similarity
    • API ID: Version.
    • String ID:
    • API String ID: 4117761997-0
    • Opcode ID: a504fe3e7332e3f595242ad3ee69ec368ad003783d483382a79f66b4f4c13d97
    • Instruction ID: c4ff5d694120ba314cab84a92baaecdc739b679a7bfbd03b43067ce42c75c728
    • Opcode Fuzzy Hash: a504fe3e7332e3f595242ad3ee69ec368ad003783d483382a79f66b4f4c13d97
    • Instruction Fuzzy Hash: EBF0F826E2C14246F7B06769D04A3B81150AF96302FA45231F55DE15D4CD1CEB84AB1D
    Memory Dump Source
    • Source File: 00000000.00000002.1625326921.00007FF603631000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF603630000, based on PE: true
    • Associated: 00000000.00000002.1625309660.00007FF603630000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1625342125.00007FF603632000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1625358895.00007FF603634000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1625374775.00007FF603635000.00000020.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff603630000_SecuriteInfo.jbxd
    Similarity
    • API ID:
    • String ID:
    • API String ID:
    • Opcode ID: 5871cc722dc03c176e77e1eee76a988c3731cc8a4ffdaaf5c98dfd6c20a69ed6
    • Instruction ID: 53e757becc910c5d161fc0a69f1cdf88374bc17978e5dd275fe07d8204ae0944
    • Opcode Fuzzy Hash: 5871cc722dc03c176e77e1eee76a988c3731cc8a4ffdaaf5c98dfd6c20a69ed6
    • Instruction Fuzzy Hash: 4701D472B1C2828EF7198F29A086B367ED1E365311F60D03DE58EC3685D93DD0905F04
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.1625326921.00007FF603631000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF603630000, based on PE: true
    • Associated: 00000000.00000002.1625309660.00007FF603630000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1625342125.00007FF603632000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1625358895.00007FF603634000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1625374775.00007FF603635000.00000020.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff603630000_SecuriteInfo.jbxd
    Similarity
    • API ID: CreateDevice.InitString.Unicode$DeleteLink.Symbolic
    • String ID: \Device\microsoftedge$\DosDevices\microsoftedge
    • API String ID: 1055650502-1368548172
    • Opcode ID: e401287dfdd1ea83126ebf4e1eaeb051637359655d44e9bd7b0611466d1b92b9
    • Instruction ID: b6bfc65ac72387bb00aa6b3903ce347d3dd23d5619116e7ab8d8e2f119d7ebc8
    • Opcode Fuzzy Hash: e401287dfdd1ea83126ebf4e1eaeb051637359655d44e9bd7b0611466d1b92b9
    • Instruction Fuzzy Hash: 51212B32628B8292FB108F15F88539977A4FB85785F504135E78D93B24DF7CE509D740
    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.1625326921.00007FF603631000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF603630000, based on PE: true
    • Associated: 00000000.00000002.1625309660.00007FF603630000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1625342125.00007FF603632000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1625358895.00007FF603634000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.1625374775.00007FF603635000.00000020.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_7ff603630000_SecuriteInfo.jbxd
    Similarity
    • API ID: CopyMemory.
    • String ID:
    • API String ID: 1294038310-0
    • Opcode ID: 9b30d3826514b3acac7b14ce90094d97fa10d693872eb120fa5c5a0264eefb49
    • Instruction ID: b43aa4fbcf06a149145957a759ee9f3ebd216855189122e3f6692827f7ac7664
    • Opcode Fuzzy Hash: 9b30d3826514b3acac7b14ce90094d97fa10d693872eb120fa5c5a0264eefb49
    • Instruction Fuzzy Hash: 9441CCA3760B4596EB118F51E8413E927A1FB167E9F105A31EE1D9BB98EF3DC10AD300