Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
file.exe

Overview

General Information

Sample name:file.exe
Analysis ID:1522737
MD5:bbdd170edb9becc98d5e123bf0e85b8d
SHA1:587eb2df5401bcc774bf9b109be06aab5ce2543c
SHA256:c59f859937ad8ab492f45153fa9699fc760f5123cf4946b48d66040fdbe95ae1
Tags:exeuser-jstrosch
Infos:

Detection

Mofksys
Score:64
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Yara detected Mofksys
Machine Learning detection for sample
PE file has nameless sections
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Contains functionality to detect virtual machines (SGDT)
One or more processes crash
PE file contains an invalid checksum
PE file contains sections with non-standard names
PE file does not import any functions
Sample file is different than original file name gathered from version info
Uses 32bit PE files

Classification

  • System is w10x64
  • file.exe (PID: 1372 cmdline: "C:\Users\user\Desktop\file.exe" MD5: BBDD170EDB9BECC98D5E123BF0E85B8D)
    • WerFault.exe (PID: 6640 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 1372 -s 244 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
file.exeJoeSecurity_MofksysYara detected MofksysJoe Security
    SourceRuleDescriptionAuthorStrings
    00000000.00000000.2337397060.0000000000401000.00000080.00000001.01000000.00000003.sdmpJoeSecurity_MofksysYara detected MofksysJoe Security
      00000000.00000002.2400376261.0000000000401000.00000080.00000001.01000000.00000003.sdmpJoeSecurity_MofksysYara detected MofksysJoe Security
        Process Memory Space: file.exe PID: 1372JoeSecurity_MofksysYara detected MofksysJoe Security
          SourceRuleDescriptionAuthorStrings
          0.2.file.exe.400000.0.unpackJoeSecurity_MofksysYara detected MofksysJoe Security
            0.0.file.exe.400000.0.unpackJoeSecurity_MofksysYara detected MofksysJoe Security
              No Sigma rule has matched
              No Suricata rule has matched

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: file.exeReversingLabs: Detection: 65%
              Source: file.exeJoe Sandbox ML: detected
              Source: file.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE

              Spreading

              barindex
              Source: Yara matchFile source: file.exe, type: SAMPLE
              Source: Yara matchFile source: 0.2.file.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.0.file.exe.400000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000000.2337397060.0000000000401000.00000080.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000002.2400376261.0000000000401000.00000080.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: file.exe PID: 1372, type: MEMORYSTR
              Source: Amcache.hve.4.drString found in binary or memory: http://upx.sf.net
              Source: file.exeString found in binary or memory: http://www.enigmaprotector.com/

              System Summary

              barindex
              Source: file.exeStatic PE information: section name:
              Source: file.exeStatic PE information: section name:
              Source: file.exeStatic PE information: section name:
              Source: file.exeStatic PE information: section name:
              Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 1372 -s 244
              Source: file.exeStatic PE information: No import functions for PE file found
              Source: file.exe, 00000000.00000000.2337415743.000000000041F000.00000080.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameTJprojMain.exe<?xml version="1.0" encoding="UTF-8" standalone="yes"?> vs file.exe
              Source: file.exeBinary or memory string: OriginalFilenameTJprojMain.exe<?xml version="1.0" encoding="UTF-8" standalone="yes"?> vs file.exe
              Source: file.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
              Source: file.exeBinary or memory string: A*\AF:\RFD\xNewCode\xNewPro\xT\trjFN\Project1.vbp
              Source: classification engineClassification label: mal64.spre.winEXE@2/5@0/0
              Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess1372
              Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\a751360a-8ba0-495c-a895-265bb63dddf7Jump to behavior
              Source: C:\Users\user\Desktop\file.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: file.exeReversingLabs: Detection: 65%
              Source: unknownProcess created: C:\Users\user\Desktop\file.exe "C:\Users\user\Desktop\file.exe"
              Source: C:\Users\user\Desktop\file.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 1372 -s 244
              Source: C:\Users\user\Desktop\file.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: version.dllJump to behavior
              Source: C:\Users\user\Desktop\file.exeSection loaded: msvbvm60.dllJump to behavior
              Source: file.exeStatic PE information: real checksum: 0x4bf451a should be: 0xaaacd
              Source: file.exeStatic PE information: section name:
              Source: file.exeStatic PE information: section name:
              Source: file.exeStatic PE information: section name:
              Source: file.exeStatic PE information: section name:
              Source: file.exeStatic PE information: section name: .data entropy: 7.9381300998575
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Users\user\Desktop\file.exeCode function: 0_2_00403A5C sgdt fword ptr [eax]0_2_00403A5C
              Source: Amcache.hve.4.drBinary or memory string: VMware
              Source: Amcache.hve.4.drBinary or memory string: VMware Virtual USB Mouse
              Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin
              Source: Amcache.hve.4.drBinary or memory string: VMware, Inc.
              Source: Amcache.hve.4.drBinary or memory string: VMware20,1hbin@
              Source: Amcache.hve.4.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
              Source: Amcache.hve.4.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
              Source: Amcache.hve.4.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
              Source: Amcache.hve.4.drBinary or memory string: VMware-42 27 80 4d 99 30 0e 9c-c1 9b 2a 23 ea 1f c4 20
              Source: Amcache.hve.4.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
              Source: Amcache.hve.4.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
              Source: Amcache.hve.4.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
              Source: Amcache.hve.4.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
              Source: Amcache.hve.4.drBinary or memory string: vmci.sys
              Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin`
              Source: Amcache.hve.4.drBinary or memory string: \driver\vmci,\driver\pci
              Source: Amcache.hve.4.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
              Source: Amcache.hve.4.drBinary or memory string: VMware20,1
              Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Generation Counter
              Source: Amcache.hve.4.drBinary or memory string: NECVMWar VMware SATA CD00
              Source: Amcache.hve.4.drBinary or memory string: VMware Virtual disk SCSI Disk Device
              Source: Amcache.hve.4.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
              Source: Amcache.hve.4.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
              Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
              Source: Amcache.hve.4.drBinary or memory string: VMware PCI VMCI Bus Device
              Source: Amcache.hve.4.drBinary or memory string: VMware VMCI Bus Device
              Source: Amcache.hve.4.drBinary or memory string: VMware Virtual RAM
              Source: Amcache.hve.4.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
              Source: Amcache.hve.4.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
              Source: C:\Users\user\Desktop\file.exeProcess queried: DebugPortJump to behavior
              Source: Amcache.hve.4.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
              Source: Amcache.hve.4.drBinary or memory string: msmpeng.exe
              Source: Amcache.hve.4.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
              Source: Amcache.hve.4.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
              Source: Amcache.hve.4.drBinary or memory string: MsMpEng.exe
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
              DLL Side-Loading
              1
              Process Injection
              2
              Virtualization/Sandbox Evasion
              OS Credential Dumping21
              Security Software Discovery
              Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
              DLL Side-Loading
              1
              Software Packing
              LSASS Memory2
              Virtualization/Sandbox Evasion
              Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
              Process Injection
              Security Account Manager1
              System Information Discovery
              SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
              DLL Side-Loading
              NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
              Obfuscated Files or Information
              LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              file.exe66%ReversingLabsWin32.Trojan.Strictor
              file.exe100%Joe Sandbox ML
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              SourceDetectionScannerLabelLink
              http://upx.sf.net0%URL Reputationsafe
              NameIPActiveMaliciousAntivirus DetectionReputation
              bg.microsoft.map.fastly.net
              199.232.214.172
              truefalse
                unknown
                ax-0001.ax-msedge.net
                150.171.28.10
                truefalse
                  unknown
                  NameSourceMaliciousAntivirus DetectionReputation
                  http://upx.sf.netAmcache.hve.4.drfalse
                  • URL Reputation: safe
                  unknown
                  http://www.enigmaprotector.com/file.exefalse
                    unknown
                    No contacted IP infos
                    Joe Sandbox version:41.0.0 Charoite
                    Analysis ID:1522737
                    Start date and time:2024-09-30 16:17:09 +02:00
                    Joe Sandbox product:CloudBasic
                    Overall analysis duration:0h 4m 24s
                    Hypervisor based Inspection enabled:false
                    Report type:full
                    Cookbook file name:default.jbs
                    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                    Number of analysed new started processes analysed:15
                    Number of new started drivers analysed:0
                    Number of existing processes analysed:0
                    Number of existing drivers analysed:0
                    Number of injected processes analysed:0
                    Technologies:
                    • HCA enabled
                    • EGA enabled
                    • AMSI enabled
                    Analysis Mode:default
                    Analysis stop reason:Timeout
                    Sample name:file.exe
                    Detection:MAL
                    Classification:mal64.spre.winEXE@2/5@0/0
                    EGA Information:Failed
                    HCA Information:
                    • Successful, ratio: 100%
                    • Number of executed functions: 0
                    • Number of non-executed functions: 1
                    Cookbook Comments:
                    • Found application associated with file extension: .exe
                    • Exclude process from analysis (whitelisted): dllhost.exe, BackgroundTransferHost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, backgroundTaskHost.exe, svchost.exe
                    • Excluded IPs from analysis (whitelisted): 20.42.65.92, 184.28.90.27
                    • Excluded domains from analysis (whitelisted): www.bing.com, client.wns.windows.com, fs.microsoft.com, slscr.update.microsoft.com, ctldl.windowsupdate.com.delivery.microsoft.com, tse1.mm.bing.net, ctldl.windowsupdate.com, g.bing.com, fs-wildcard.microsoft.com.edgekey.net, fs-wildcard.microsoft.com.edgekey.net.globalredir.akadns.net, arc.msn.com, fe3cr.delivery.mp.microsoft.com, onedsblobprdeus17.eastus.cloudapp.azure.com, login.live.com, e16604.g.akamaiedge.net, blobcollector.events.data.trafficmanager.net, umwatson.events.data.microsoft.com, prod.fs.microsoft.com.akadns.net, wu-b-net.trafficmanager.net
                    • Execution Graph export aborted for target file.exe, PID 1372 because there are no executed function
                    • VT rate limit hit for: file.exe
                    TimeTypeDescription
                    10:18:29API Interceptor1x Sleep call for process: WerFault.exe modified
                    No context
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    bg.microsoft.map.fastly.netfile.exeGet hashmaliciousNoCryBrowse
                    • 199.232.214.172
                    140AEcuVy7.lnkGet hashmaliciousLonePageBrowse
                    • 199.232.214.172
                    Purchase Order IBT LPO-2320.emlGet hashmaliciousUnknownBrowse
                    • 199.232.210.172
                    https://timetraveltv.com/actions/cart_update.php?currency=GBP&return_url=https://blog.acelyaokcu.com/m/?c3Y9bzM2NV8xX29uZSZyYW5kPVdrcFNRMHM9JnVpZD1VU0VSMDkwOTIwMjRVMTIwOTA5MDE=N0123N%5BEMAILGet hashmaliciousUnknownBrowse
                    • 199.232.214.172
                    SCAN_Client_No_XP9739270128398468932393.pdfGet hashmaliciousHTMLPhisherBrowse
                    • 199.232.214.172
                    https://cganet.com/Get hashmaliciousUnknownBrowse
                    • 199.232.214.172
                    UhkzPftQIt.exeGet hashmaliciousScreenConnect ToolBrowse
                    • 199.232.214.172
                    7LC2izrr9u.exeGet hashmaliciousScreenConnect ToolBrowse
                    • 199.232.214.172
                    UhkzPftQIt.exeGet hashmaliciousScreenConnect ToolBrowse
                    • 199.232.214.172
                    7LC2izrr9u.exeGet hashmaliciousScreenConnect ToolBrowse
                    • 199.232.214.172
                    ax-0001.ax-msedge.netTonincasa Updated Employee sheet .pdfGet hashmaliciousHTMLPhisherBrowse
                    • 150.171.28.10
                    https://en.softonic.comGet hashmaliciousUnknownBrowse
                    • 150.171.27.10
                    https://mx1.margarettaphilomena.net/Get hashmaliciousUnknownBrowse
                    • 150.171.27.10
                    https://kaisonfhtr.pages.dev/Get hashmaliciousAnonymous ProxyBrowse
                    • 150.171.28.10
                    https://jogosderobloxdematazumbie.blogspot.com/Get hashmaliciousUnknownBrowse
                    • 150.171.27.10
                    Installer_w5.msiGet hashmaliciousUnknownBrowse
                    • 150.171.28.10
                    http://hdelm7ye84n38d9lvch0ev4c0.js.wpuserpowered.com/Get hashmaliciousUnknownBrowse
                    • 150.171.28.10
                    https://kevinbeilgard.wixsite.com/my-site-1Get hashmaliciousUnknownBrowse
                    • 150.171.28.10
                    https://elderly-same-archeology.glitch.me/public/nfcu703553.HTMLGet hashmaliciousHTMLPhisherBrowse
                    • 150.171.28.10
                    https://gemmni-lgi.godaddysites.com/Get hashmaliciousHTMLPhisherBrowse
                    • 150.171.27.10
                    No context
                    No context
                    No context
                    Process:C:\Windows\SysWOW64\WerFault.exe
                    File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):65536
                    Entropy (8bit):0.7462040617560636
                    Encrypted:false
                    SSDEEP:192:PZsBpr9fisvOPv04Jqe03jTzuiFnZ24IO8pB:h2pr9qOOE4JqBjTzuiFnY4IO8f
                    MD5:866F0A6F965DA87066C8C1ECE1F1C601
                    SHA1:47E607D54D21FDCB65E8C62C4042C324E8EF9746
                    SHA-256:F5580E9A4788FFDD8E964C99DB4013E94A73011B62F9E1FB124889AC8AD84A3B
                    SHA-512:A50DB2C1CE9F93340DC3285F1397E9E704855C5B807377E43197216C167BF0FA3831E6EEFEDCC3CC7A5480D5C34132285FE2223C500CE8E16164B661A365380D
                    Malicious:true
                    Reputation:low
                    Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.2.1.7.9.5.0.3.5.5.1.5.7.4.2.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.2.1.7.9.5.0.3.8.6.4.0.7.4.5.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.6.3.5.5.5.0.5.f.-.0.9.c.a.-.4.5.c.6.-.9.9.3.b.-.7.8.6.9.5.a.e.5.b.d.3.b.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.f.a.2.b.4.1.8.f.-.4.e.d.8.-.4.7.f.f.-.9.2.7.a.-.e.f.6.a.9.c.c.3.a.b.6.4.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.f.i.l.e...e.x.e.....O.r.i.g.i.n.a.l.F.i.l.e.n.a.m.e.=.T.J.p.r.o.j.M.a.i.n...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.0.5.5.c.-.0.0.0.1.-.0.0.1.5.-.a.c.b.7.-.8.6.9.b.4.3.1.3.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.c.8.5.f.6.d.c.b.f.e.d.5.2.4.e.b.4.4.d.2.0.f.8.1.1.3.1.2.6.6.c.a.0.0.0.0.0.9.0.4.!.0.0.0.0.5.8.7.e.b.2.d.f.5.4.0.1.b.c.c.7.7.4.b.f.9.b.1.0.9.b.e.0.6.a.a.b.5.c.e.2.5.4.3.
                    Process:C:\Windows\SysWOW64\WerFault.exe
                    File Type:Mini DuMP crash report, 14 streams, Mon Sep 30 14:18:23 2024, 0x1205a4 type
                    Category:dropped
                    Size (bytes):29848
                    Entropy (8bit):2.034916736730961
                    Encrypted:false
                    SSDEEP:96:558bE8CaxX5BMRTElSPoDnlIE04X0Sti7M8ZFoC5rpTJrHnZq6GaWfQcXkEa/SZk:oXqFEn0StOFhdhHnZfZEf96RjR5bL
                    MD5:CACC421A5A3C22AC3E566FFCEB4B3256
                    SHA1:3841B774CB6792AF7E26E105EDDE6C581B3DC81D
                    SHA-256:8ED8CD8AD6D3C61BDAB9F2326CE3A475D7DF7C88B7B37A1C548DE91348D53B58
                    SHA-512:2387A6A34539F0E64A46EE79B21FEBDF9C2F4DC8EFC2430728A933A61DE994D597CFEBF7C656C17DBC502E85FA4EFB7BB0F24F9E15FBE494CC4D8BCBC33860F8
                    Malicious:false
                    Reputation:low
                    Preview:MDMP..a..... ......./..f........................L................!..........T.......8...........T...........H...Pk......................................................................................................eJ......l.......GenuineIntel............T.......\.../..f.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                    Process:C:\Windows\SysWOW64\WerFault.exe
                    File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):8272
                    Entropy (8bit):3.6917349890125313
                    Encrypted:false
                    SSDEEP:192:R6l7wVeJNCW6jc6Y2DPSU9bBGgmfBmJ4tpDp89bBBsflLm:R6lXJJ6Y6YiSU9sgmf8J4uB6fE
                    MD5:5542A5EAFC6D28443DAA8753F0034F12
                    SHA1:1A69B063434A9628416F6148B57C39B9BDA930DF
                    SHA-256:E17A75ECDEBA9399183B8267955D6178C41610125BBD6A96DA288B4C84D281F7
                    SHA-512:3D35D25A7D9A86CA4D2D68A2DECD6948877B3324B2615D25B0353977F42C96A654F19AD1EB14A523D2F854EA942D72F38E27A80FC233C47AA617BB4BF1DFC2E4
                    Malicious:false
                    Reputation:low
                    Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.1.3.7.2.<./.P.i.
                    Process:C:\Windows\SysWOW64\WerFault.exe
                    File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                    Category:dropped
                    Size (bytes):4626
                    Entropy (8bit):4.440281476008409
                    Encrypted:false
                    SSDEEP:48:cvIwWl8zs5Jg77aI9ncWpW8VY3Ym8M4JQSNFvZ+q81/+x7f5WId:uIjfLI7NV7V/JQgcGx7f5Rd
                    MD5:8F282ED9FF02E17D45AE8E6E8DDDD686
                    SHA1:D0A84E740704834F0B811DB555B5C00EF1FC8651
                    SHA-256:1AC1463A56B67D9B233C9132FD33C7CF14095E949A01C6A531788E53616EF13D
                    SHA-512:B6A1CE23AA2D3EC23EB96A336034AF8C3F451A1AC92BA9432D7EA0D5EAB0899CE8B6F88FFC2A417D61EE962368E144AC564BE7B1720FC7197AD77CDDAEB6CFB3
                    Malicious:false
                    Reputation:low
                    Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="523041" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                    Process:C:\Windows\SysWOW64\WerFault.exe
                    File Type:MS Windows registry file, NT/2000 or above
                    Category:dropped
                    Size (bytes):1835008
                    Entropy (8bit):4.46849609998896
                    Encrypted:false
                    SSDEEP:6144:VzZfpi6ceLPx9skLmb0fjZWSP3aJG8nAgeiJRMMhA2zX4WABluuNbjDH5S:tZHtjZWOKnMM6bFp9j4
                    MD5:7135639FBB2A8D742A3E55F082FFA2C5
                    SHA1:EC32B4DE1E8195C313CA890AE13CD1A8DDF39613
                    SHA-256:21745A89B755E5C8B6A59B8FCA5FA0F392B9A20366EE0CBFB223A56818080839
                    SHA-512:5871F8FBE1B25EA92664EAFFA000BB34DFF34B8083220F41A044AD082C4EA0BAE44702208A2F577D13064FFE5A7FDE8C954CFA35524EFA703494453B3EB88269
                    Malicious:false
                    Reputation:low
                    Preview:regfH...H....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm...C..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                    File type:MS-DOS executable PE32 executable (GUI) Intel 80386, for MS Windows, MZ for MS-DOS
                    Entropy (8bit):7.834322630649494
                    TrID:
                    • Win32 Executable (generic) a (10002005/4) 99.96%
                    • Generic Win/DOS Executable (2004/3) 0.02%
                    • DOS Executable Generic (2002/1) 0.02%
                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                    File name:file.exe
                    File size:675'840 bytes
                    MD5:bbdd170edb9becc98d5e123bf0e85b8d
                    SHA1:587eb2df5401bcc774bf9b109be06aab5ce2543c
                    SHA256:c59f859937ad8ab492f45153fa9699fc760f5123cf4946b48d66040fdbe95ae1
                    SHA512:2de1f5a542d3e910ebed79dfe4f265789caa4f750c5ca395776807b9b04526c55b43c037f6e4ed6ceaa7506043a1f3c2d1ed480b6a1ccfc5aa8d77d768e3bf99
                    SSDEEP:12288:x545I8jWtJ8OgL27rd69bk5NCgGhSFB79gYhLIf6EQ9EYcw1F:x54kt0Kd6F6CNzYhUiEWEYcw
                    TLSH:13E412997F010449F51A82F6697386A93663BD7F03416E13381F7F864A7721A3F82A1F
                    File Content Preview:MZ......................................................................!..L.!This program cannot be run in DOS mode....$........t..............z.......................Rich............PE..L...f2YQ.....................0....................@................
                    Icon Hash:666b25252d0b4e31
                    Entrypoint:0x409eac
                    Entrypoint Section:
                    Digitally signed:false
                    Imagebase:0x400000
                    Subsystem:windows gui
                    Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
                    DLL Characteristics:
                    Time Stamp:0x51593266 [Mon Apr 1 07:08:22 2013 UTC]
                    TLS Callbacks:
                    CLR (.Net) Version:
                    OS Version Major:4
                    OS Version Minor:0
                    File Version Major:4
                    File Version Minor:0
                    Subsystem Version Major:4
                    Subsystem Version Minor:0
                    Import Hash:
                    Instruction
                    mov dword ptr [ebp-04h], 00000078h
                    mov dword ptr [ebp-00000098h], 0041B078h
                    mov dword ptr [ebp-000000A0h], 00004008h
                    push 00000000h
                    lea edx, dword ptr [ebp-000000A0h]
                    push edx
                    call dword ptr [00401124h]
                    fstp qword ptr [ebp-000000ACh]
                    mov dword ptr [ebp-04h], 00000079h
                    call dword ptr [00401028h]
                    mov dword ptr [ebp-04h], 0000007Bh
                    mov eax, dword ptr [0041B078h]
                    push eax
                    push 00406360h
                    call dword ptr [0040105Ch]
                    mov edx, eax
                    lea ecx, dword ptr [ebp-34h]
                    call dword ptr [004011E8h]
                    push eax
                    mov ecx, dword ptr [0041B07Ch]
                    push ecx
                    mov edx, dword ptr [0041B0A0h]
                    push edx
                    push 00406350h
                    call dword ptr [0040105Ch]
                    mov edx, eax
                    lea ecx, dword ptr [ebp-30h]
                    call dword ptr [004011E8h]
                    push eax
                    push 80000002h
                    call 00007F402915A919h
                    lea eax, dword ptr [ebp-34h]
                    push eax
                    lea ecx, dword ptr [ebp-30h]
                    push ecx
                    push 00000002h
                    call dword ptr [004011A0h]
                    add esp, 0Ch
                    mov dword ptr [ebp-04h], 0000007Ch
                    mov edx, dword ptr [0041B080h]
                    push edx
                    push 00406360h
                    call dword ptr [0040105Ch]
                    mov edx, eax
                    lea ecx, dword ptr [ebp-34h]
                    call dword ptr [004011E8h]
                    NameVirtual AddressVirtual Size Is in Section
                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IMPORT0x2d90000x244.data
                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x1f0000x13e8.rsrc
                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                    0x10000x1a0000x9000e88738d6750c50ac2d8b8151e7a11919False0.3883192274305556data5.100129282039833IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    0x1b0000x20000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    0x1d0000x20000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    .rsrc0x1f0000x20000x20004114c78b393d070eb343f5e4c4b3bdbeFalse0.2745361328125data3.1881047866122456IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    0x210000x2b80000x0d41d8cd98f00b204e9800998ecf8427eunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    .data0x2d90000x990000x99000304242c133d1bf413f518a1fcfe58a83False0.9859531377655228data7.9381300998575IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    NameRVASizeTypeLanguageCountryZLIB Complexity
                    RT_ICON0x1f1300xcd0Device independent bitmap graphic, 32 x 64 x 24, image size 30720.4292682926829268
                    RT_GROUP_ICON0x1fe000x14data1.15
                    RT_VERSION0x1fe140x1ecdataEnglishUnited States0.5020325203252033
                    RT_MANIFEST0x200000x3e7XML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.42542542542542544
                    Language of compilation systemCountry where language is spokenMap
                    EnglishUnited States
                    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                    Sep 30, 2024 16:18:54.304918051 CEST1.1.1.1192.168.2.60xcca5No error (0)g-bing-com.ax-0001.ax-msedge.netax-0001.ax-msedge.netCNAME (Canonical name)IN (0x0001)false
                    Sep 30, 2024 16:18:54.304918051 CEST1.1.1.1192.168.2.60xcca5No error (0)ax-0001.ax-msedge.net150.171.28.10A (IP address)IN (0x0001)false
                    Sep 30, 2024 16:18:54.304918051 CEST1.1.1.1192.168.2.60xcca5No error (0)ax-0001.ax-msedge.net150.171.27.10A (IP address)IN (0x0001)false
                    Sep 30, 2024 16:19:13.675045967 CEST1.1.1.1192.168.2.60x7c1fNo error (0)bg.microsoft.map.fastly.net199.232.214.172A (IP address)IN (0x0001)false
                    Sep 30, 2024 16:19:13.675045967 CEST1.1.1.1192.168.2.60x7c1fNo error (0)bg.microsoft.map.fastly.net199.232.210.172A (IP address)IN (0x0001)false

                    Click to jump to process

                    Click to jump to process

                    Click to dive into process behavior distribution

                    Click to jump to process

                    Target ID:0
                    Start time:10:18:23
                    Start date:30/09/2024
                    Path:C:\Users\user\Desktop\file.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\Desktop\file.exe"
                    Imagebase:0x400000
                    File size:675'840 bytes
                    MD5 hash:BBDD170EDB9BECC98D5E123BF0E85B8D
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Yara matches:
                    • Rule: JoeSecurity_Mofksys, Description: Yara detected Mofksys, Source: 00000000.00000000.2337397060.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Author: Joe Security
                    • Rule: JoeSecurity_Mofksys, Description: Yara detected Mofksys, Source: 00000000.00000002.2400376261.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Author: Joe Security
                    Reputation:low
                    Has exited:true

                    Target ID:4
                    Start time:10:18:23
                    Start date:30/09/2024
                    Path:C:\Windows\SysWOW64\WerFault.exe
                    Wow64 process (32bit):true
                    Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 1372 -s 244
                    Imagebase:0x370000
                    File size:483'680 bytes
                    MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:high
                    Has exited:true

                    Reset < >
                      Memory Dump Source
                      • Source File: 00000000.00000002.2400376261.0000000000401000.00000080.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.2400363087.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2400393260.000000000041F000.00000080.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.2400474917.00000000006D9000.00000004.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_file.jbxd
                      Yara matches
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 9c9b5fadcff6fc1b6333f2045a5fcfbe11ec3f7d18c2f0a438c4e6aacca40780
                      • Instruction ID: 082b4fd57fed1769b9006e205b6e9b322f4e6cb11cfcb06b4efda431eea04361
                      • Opcode Fuzzy Hash: 9c9b5fadcff6fc1b6333f2045a5fcfbe11ec3f7d18c2f0a438c4e6aacca40780
                      • Instruction Fuzzy Hash: 85014FA644E3D24FC31387344CA49917FB0AD2311534A02DBC581CB1A3E208994AD762