Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
RUMMY.EXE

Overview

General Information

Sample name:RUMMY.EXE
Analysis ID:1528654
MD5:d228499e249b66190ed130b1d27790ec
SHA1:9f6d842edacd83dabc8a548d7d8eb47d5df66f3f
SHA256:77032f475fe4d87f065ae038ebbd230e4281884040a28f8745dde73e4d33c067
Infos:

Detection

Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Sample file is different than original file name gathered from version info
Uses 32bit PE files

Classification

  • System is w10x64
  • RUMMY.EXE (PID: 7092 cmdline: "C:\Users\user\Desktop\RUMMY.EXE" MD5: D228499E249B66190ED130B1D27790EC)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: RUMMY.EXEReversingLabs: Detection: 18%
Source: RUMMY.EXEVirustotal: Detection: 22%Perma Link
Source: RUMMY.EXEStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: RUMMY.EXEString found in binary or memory: http://unni.web.com
Source: RUMMY.EXE, 00000000.00000000.2024488436.0000000000407000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameSOL.EXE@ vs RUMMY.EXE
Source: RUMMY.EXEBinary or memory string: OriginalFilenameSOL.EXE@ vs RUMMY.EXE
Source: RUMMY.EXEStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
Source: classification engineClassification label: mal48.winEXE@1/0@0/0
Source: RUMMY.EXEStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\RUMMY.EXEKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: RUMMY.EXEReversingLabs: Detection: 18%
Source: RUMMY.EXEVirustotal: Detection: 22%
Source: C:\Users\user\Desktop\RUMMY.EXESection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\RUMMY.EXESection loaded: mfc42.dllJump to behavior
Source: C:\Users\user\Desktop\RUMMY.EXESection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\RUMMY.EXESection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\RUMMY.EXESection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\RUMMY.EXESection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\RUMMY.EXESection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\RUMMY.EXESection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\RUMMY.EXESection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\RUMMY.EXESection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\RUMMY.EXESection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\RUMMY.EXESection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\RUMMY.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\RUMMY.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\RUMMY.EXEProcess information set: NOOPENFILEERRORBOXJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
DLL Side-Loading
1
DLL Side-Loading
OS Credential Dumping1
System Information Discovery
Remote ServicesData from Local SystemData ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
RUMMY.EXE19%ReversingLabsWin32.Trojan.Generic
RUMMY.EXE22%VirustotalBrowse
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://unni.web.com0%VirustotalBrowse
No contacted domains info
NameSourceMaliciousAntivirus DetectionReputation
http://unni.web.comRUMMY.EXEfalseunknown
No contacted IP infos
Joe Sandbox version:41.0.0 Charoite
Analysis ID:1528654
Start date and time:2024-10-08 07:42:45 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 3m 47s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Number of analysed new started processes analysed:4
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:RUMMY.EXE
Detection:MAL
Classification:mal48.winEXE@1/0@0/0
EGA Information:
  • Successful, ratio: 100%
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 4
  • Number of non-executed functions: 7
Cookbook Comments:
  • Found application associated with file extension: .EXE
  • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, dns.msftncsi.com, fe3cr.delivery.mp.microsoft.com
No simulations
No context
No context
No context
No context
No context
No created / dropped files found
File type:PE32 executable (GUI) Intel 80386, for MS Windows
Entropy (8bit):4.383599727985923
TrID:
  • Win32 Executable (generic) a (10002005/4) 99.96%
  • Generic Win/DOS Executable (2004/3) 0.02%
  • DOS Executable Generic (2002/1) 0.02%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:RUMMY.EXE
File size:151'552 bytes
MD5:d228499e249b66190ed130b1d27790ec
SHA1:9f6d842edacd83dabc8a548d7d8eb47d5df66f3f
SHA256:77032f475fe4d87f065ae038ebbd230e4281884040a28f8745dde73e4d33c067
SHA512:0b536da26e1dc87356f697be96d2a3a7c25d472259fb5cc3274e2fb8abf184b34ddbc3700879dd3af23b15da34d5c45504ad7ba19cd0c01f4209472c115ced60
SSDEEP:768:qCYcoX561rQJDbsQxgvcqgA4JswkXpTFMWCQrvTace+0PhnMKT7cd:qE6pRVgcwwkXpTFMWCQK6mVc
TLSH:3EE3A833F025C84AF56999728CD099F8E2D3BD309E141523B644FBAEFAB7A409B14375
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........M...M...M...6...L.../...K.......L.......F.......H...M...........E.......L...RichM...........................PE..L......8...
Icon Hash:b21edeb8b5cecdff
Entrypoint:0x4033de
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x400000
Subsystem:windows gui
Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
DLL Characteristics:
Time Stamp:0x38F296E3 [Tue Apr 11 03:07:15 2000 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:4
OS Version Minor:0
File Version Major:4
File Version Minor:0
Subsystem Version Major:4
Subsystem Version Minor:0
Import Hash:8f11bca1acc579591031ff47d7ad4c47
Instruction
push ebp
mov ebp, esp
push FFFFFFFFh
push 00404A90h
push 00403564h
mov eax, dword ptr fs:[00000000h]
push eax
mov dword ptr fs:[00000000h], esp
sub esp, 68h
push ebx
push esi
push edi
mov dword ptr [ebp-18h], esp
xor ebx, ebx
mov dword ptr [ebp-04h], ebx
push 00000002h
call dword ptr [00404394h]
pop ecx
or dword ptr [0040616Ch], FFFFFFFFh
or dword ptr [00406170h], FFFFFFFFh
call dword ptr [00404390h]
mov ecx, dword ptr [00406160h]
mov dword ptr [eax], ecx
call dword ptr [00404388h]
mov ecx, dword ptr [0040615Ch]
mov dword ptr [eax], ecx
mov eax, dword ptr [00404384h]
mov eax, dword ptr [eax]
mov dword ptr [00406168h], eax
call 00007F11D52C519Bh
cmp dword ptr [00406080h], ebx
jne 00007F11D52C508Eh
push 00403560h
call dword ptr [00404380h]
pop ecx
call 00007F11D52C516Dh
push 00406014h
push 00406010h
call 00007F11D52C5158h
mov eax, dword ptr [00406158h]
mov dword ptr [ebp-6Ch], eax
lea eax, dword ptr [ebp-6Ch]
push eax
push dword ptr [00406154h]
lea eax, dword ptr [ebp-64h]
push eax
lea eax, dword ptr [ebp-70h]
push eax
lea eax, dword ptr [ebp-60h]
push eax
call dword ptr [00404378h]
push 0040600Ch
push 00406000h
call 00007F11D52C5125h
Programming Language:
  • [ C ] VS98 (6.0) build 8168
  • [LNK] VS98 (6.0) imp/exp build 8168
  • [C++] VS98 (6.0) build 8168
  • [RES] VS98 (6.0) cvtres build 1720
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x4d580x78.rdata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x70000x1d5c0.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x40000x3ec.rdata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x27d20x3000468532419e1cd526c2644200ff28280fFalse0.4298502604166667data5.273158969972959IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.rdata0x40000x13c20x20006831063698e3b0bf2ed903fd016cbb98False0.2271728515625data3.389820039460895IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.data0x60000x1740x1000106642e33387622d7775bbb8b97d547cFalse0.029541015625data0.21884890496450699IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.rsrc0x70000x1d5c00x1e0007bb5b156ce988e592517c9c788051fbfFalse0.21956380208333334data4.230447840036496IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountryZLIB Complexity
RT_BITMAP0x133100x4b0Device independent bitmap graphic, 71 x 96 x 1, image size 1152EnglishUnited States0.32
RT_BITMAP0x10d900x4b0Device independent bitmap graphic, 71 x 96 x 1, image size 1152EnglishUnited States0.3
RT_BITMAP0x112400x4b0Device independent bitmap graphic, 71 x 96 x 1, image size 1152EnglishUnited States0.37416666666666665
RT_BITMAP0x116f00x4b0Device independent bitmap graphic, 71 x 96 x 1, image size 1152EnglishUnited States0.3825
RT_BITMAP0x11ba00x4b0Device independent bitmap graphic, 71 x 96 x 1, image size 1152EnglishUnited States0.41
RT_BITMAP0x120500x4b0Device independent bitmap graphic, 71 x 96 x 1, image size 1152EnglishUnited States0.4
RT_BITMAP0x125000x4b0Device independent bitmap graphic, 71 x 96 x 1, image size 1152EnglishUnited States0.41583333333333333
RT_BITMAP0x129b00x4b0Device independent bitmap graphic, 71 x 96 x 1, image size 1152EnglishUnited States0.4141666666666667
RT_BITMAP0x12e600x4b0Device independent bitmap graphic, 71 x 96 x 1, image size 1152EnglishUnited States0.4483333333333333
RT_BITMAP0x108e00x4b0Device independent bitmap graphic, 71 x 96 x 1, image size 1152EnglishUnited States0.3925
RT_BITMAP0x137c00xde8Device independent bitmap graphic, 71 x 96 x 4, image size 3456EnglishUnited States0.275561797752809
RT_BITMAP0x153900xde8Device independent bitmap graphic, 71 x 96 x 4, image size 3456EnglishUnited States0.29943820224719103
RT_BITMAP0x145a80xde8Device independent bitmap graphic, 71 x 96 x 4, image size 3456EnglishUnited States0.2581460674157303
RT_BITMAP0x1e4400x4b0Device independent bitmap graphic, 71 x 96 x 1, image size 1152EnglishUnited States0.43833333333333335
RT_BITMAP0x1bec00x4b0Device independent bitmap graphic, 71 x 96 x 1, image size 1152EnglishUnited States0.3416666666666667
RT_BITMAP0x1c3700x4b0Device independent bitmap graphic, 71 x 96 x 1, image size 1152EnglishUnited States0.38
RT_BITMAP0x1c8200x4b0Device independent bitmap graphic, 71 x 96 x 1, image size 1152EnglishUnited States0.38416666666666666
RT_BITMAP0x1ccd00x4b0Device independent bitmap graphic, 71 x 96 x 1, image size 1152EnglishUnited States0.4041666666666667
RT_BITMAP0x1d1800x4b0Device independent bitmap graphic, 71 x 96 x 1, image size 1152EnglishUnited States0.3975
RT_BITMAP0x1d6300x4b0Device independent bitmap graphic, 71 x 96 x 1, image size 1152EnglishUnited States0.36833333333333335
RT_BITMAP0x1dae00x4b0Device independent bitmap graphic, 71 x 96 x 1, image size 1152EnglishUnited States0.4058333333333333
RT_BITMAP0x1df900x4b0Device independent bitmap graphic, 71 x 96 x 1, image size 1152EnglishUnited States0.4375
RT_BITMAP0x1ba100x4b0Device independent bitmap graphic, 71 x 96 x 1, image size 1152EnglishUnited States0.4483333333333333
RT_BITMAP0x1e8f00xde8Device independent bitmap graphic, 71 x 96 x 4, image size 3456EnglishUnited States0.273876404494382
RT_BITMAP0x86b80xde8Device independent bitmap graphic, 71 x 96 x 4, image size 3456EnglishUnited States0.30168539325842697
RT_BITMAP0x1f6d80xde8Device independent bitmap graphic, 71 x 96 x 4, image size 3456EnglishUnited States0.26825842696629215
RT_BITMAP0xb0c00x4b0Device independent bitmap graphic, 71 x 96 x 1, image size 1152EnglishUnited States0.32416666666666666
RT_BITMAP0x229f00x4b0Device independent bitmap graphic, 71 x 96 x 1, image size 1152EnglishUnited States0.4075
RT_BITMAP0x204c00x4b0Device independent bitmap graphic, 71 x 96 x 1, image size 1152EnglishUnited States0.35833333333333334
RT_BITMAP0x94a00x4b0Device independent bitmap graphic, 71 x 96 x 1, image size 1152EnglishUnited States0.3175
RT_BITMAP0x99500x4b0Device independent bitmap graphic, 71 x 96 x 1, image size 1152EnglishUnited States0.38916666666666666
RT_BITMAP0x9e000x4b0Device independent bitmap graphic, 71 x 96 x 1, image size 1152EnglishUnited States0.3641666666666667
RT_BITMAP0xa2b00x4b0Device independent bitmap graphic, 71 x 96 x 1, image size 1152EnglishUnited States0.37666666666666665
RT_BITMAP0xa7600x4b0Device independent bitmap graphic, 71 x 96 x 1, image size 1152EnglishUnited States0.36333333333333334
RT_BITMAP0xac100x4b0Device independent bitmap graphic, 71 x 96 x 1, image size 1152EnglishUnited States0.3925
RT_BITMAP0x22ea00x4b0Device independent bitmap graphic, 71 x 96 x 1, image size 1152EnglishUnited States0.49166666666666664
RT_BITMAP0xb5700xde8Device independent bitmap graphic, 71 x 96 x 4, image size 3456EnglishUnited States0.2800561797752809
RT_BITMAP0xd1400xde8Device independent bitmap graphic, 71 x 96 x 4, image size 3456EnglishUnited States0.30786516853932583
RT_BITMAP0xc3580xde8Device independent bitmap graphic, 71 x 96 x 4, image size 3456EnglishUnited States0.31573033707865167
RT_BITMAP0x18ba80x4b0Device independent bitmap graphic, 71 x 96 x 1, image size 1152EnglishUnited States0.29333333333333333
RT_BITMAP0x166280x4b0Device independent bitmap graphic, 71 x 96 x 1, image size 1152EnglishUnited States0.3516666666666667
RT_BITMAP0x16ad80x4b0Device independent bitmap graphic, 71 x 96 x 1, image size 1152EnglishUnited States0.36583333333333334
RT_BITMAP0x16f880x4b0Device independent bitmap graphic, 71 x 96 x 1, image size 1152EnglishUnited States0.3616666666666667
RT_BITMAP0x174380x4b0Device independent bitmap graphic, 71 x 96 x 1, image size 1152EnglishUnited States0.3825
RT_BITMAP0x178e80x4b0Device independent bitmap graphic, 71 x 96 x 1, image size 1152EnglishUnited States0.37416666666666665
RT_BITMAP0x17d980x4b0Device independent bitmap graphic, 71 x 96 x 1, image size 1152EnglishUnited States0.38916666666666666
RT_BITMAP0x182480x4b0Device independent bitmap graphic, 71 x 96 x 1, image size 1152EnglishUnited States0.4191666666666667
RT_BITMAP0x186f80x4b0Device independent bitmap graphic, 71 x 96 x 1, image size 1152EnglishUnited States0.4225
RT_BITMAP0x161780x4b0Device independent bitmap graphic, 71 x 96 x 1, image size 1152EnglishUnited States0.43333333333333335
RT_BITMAP0x190580xde8Device independent bitmap graphic, 71 x 96 x 4, image size 3456EnglishUnited States0.2648876404494382
RT_BITMAP0x1ac280xde8Device independent bitmap graphic, 71 x 96 x 4, image size 3456EnglishUnited States0.2941011235955056
RT_BITMAP0x19e400xde8Device independent bitmap graphic, 71 x 96 x 4, image size 3456EnglishUnited States0.2859550561797753
RT_BITMAP0x82900x428Device independent bitmap graphic, 128 x 15 x 4, image size 960EnglishUnited States0.3618421052631579
RT_BITMAP0xdf280xde8Device independent bitmap graphic, 71 x 96 x 4, image size 3456EnglishUnited States0.04522471910112359
RT_BITMAP0xed100xde8Device independent bitmap graphic, 71 x 96 x 4, image size 3456EnglishUnited States0.10056179775280899
RT_BITMAP0xfaf80xde8Device independent bitmap graphic, 71 x 96 x 4, image size 3456EnglishUnited States0.0550561797752809
RT_BITMAP0x209700xde8Device independent bitmap graphic, 71 x 96 x 4, image size 3456EnglishUnited States0.2606741573033708
RT_BITMAP0x217580x4b0Device independent bitmap graphic, 71 x 96 x 1, image size 1152EnglishUnited States0.29583333333333334
RT_BITMAP0x21c080xde8Device independent bitmap graphic, 71 x 96 x 4, image size 3456EnglishUnited States0.04719101123595506
RT_ICON0x7f900x2e8Device independent bitmap graphic, 32 x 64 x 4, image size 512EnglishUnited States0.36693548387096775
RT_MENU0x233700x9adataEnglishUnited States0.7402597402597403
RT_DIALOG0x234200x172dataEnglishUnited States0.5864864864864865
RT_STRING0x238400x6cdataEnglishUnited States0.4444444444444444
RT_STRING0x238b00x34dataEnglishUnited States0.5576923076923077
RT_STRING0x239300x166dataEnglishUnited States0.37988826815642457
RT_STRING0x23ba00x260dataEnglishUnited States0.0805921052631579
RT_STRING0x23f500x328dataEnglishUnited States0.34405940594059403
RT_STRING0x23ee00x70dataEnglishUnited States0.625
RT_STRING0x23a980x106dataEnglishUnited States0.5763358778625954
RT_STRING0x23e000xdadataEnglishUnited States0.43119266055045874
RT_STRING0x238e80x46dataEnglishUnited States0.7428571428571429
RT_STRING0x242780xc6dataEnglishUnited States0.41919191919191917
RT_STRING0x243400x1f8dataEnglishUnited States0.36706349206349204
RT_STRING0x245380x86dataEnglishUnited States0.6567164179104478
RT_ACCELERATOR0x234100x10dataEnglishUnited States1.3125
RT_GROUP_ICON0x82780x14dataEnglishUnited States1.2
RT_VERSION0x235980x2a8dataEnglishUnited States0.4808823529411765
None0x233500x1cdataEnglishUnited States1.25
DLLImport
MFC42.DLL
MSVCRT.dll_acmdln, __getmainargs, _initterm, __setusermatherr, _adjust_fdiv, __p__commode, exit, __p__fmode, __set_app_type, _except_handler3, _controlfp, _exit, _onexit, _XcptFilter, __dllonexit, rand, _setmbcp, _itoa, srand, time, __CxxFrameHandler
KERNEL32.dllGetModuleHandleA, GetStartupInfoA
USER32.dllSetTimer, GetClientRect, KillTimer, FillRect, LoadBitmapA, LoadCursorA, EnableWindow
GDI32.dllCreateSolidBrush, BitBlt, CreateCompatibleDC
Language of compilation systemCountry where language is spokenMap
EnglishUnited States
TimestampSource PortDest PortSource IPDest IP
Oct 8, 2024 07:43:55.673548937 CEST53509971.1.1.1192.168.2.5

Click to jump to process

Click to jump to process

Target ID:0
Start time:01:43:34
Start date:08/10/2024
Path:C:\Users\user\Desktop\RUMMY.EXE
Wow64 process (32bit):true
Commandline:"C:\Users\user\Desktop\RUMMY.EXE"
Imagebase:0x400000
File size:151'552 bytes
MD5 hash:D228499E249B66190ED130B1D27790EC
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:low
Has exited:false

Reset < >

    Execution Graph

    Execution Coverage:11%
    Dynamic/Decrypted Code Coverage:0%
    Signature Coverage:0%
    Total number of Nodes:179
    Total number of Limit Nodes:10
    execution_graph 519 401940 #823 520 401973 519->520 521 401989 519->521 524 4019e0 #560 #540 #1168 LoadCursorA 520->524 523 40197a 524->523 525 401540 #823 526 401573 525->526 527 401589 525->527 530 4015e0 #338 526->530 529 40157a 530->529 531 4024c0 #2379 532 4014c0 535 401450 #324 532->535 534 4014e1 #2514 #641 535->534 591 401300 592 401308 591->592 593 401318 592->593 594 40130f #825 592->594 594->593 595 401000 #823 596 401033 595->596 597 401049 595->597 600 4010a0 #366 #529 #554 596->600 599 40103a 600->599 601 401100 606 401120 #807 #796 #674 601->606 603 401108 604 401118 603->604 605 40110f #825 603->605 605->604 606->603 607 401900 #4823 460 402cd0 #293 #2513 461 402d24 #641 460->461 462 402d16 460->462 464 402690 #470 462->464 465 4026c4 #755 464->465 466 4026e5 GetClientRect 464->466 465->461 483 401ec0 6 API calls 466->483 468 401d80 15 API calls 469 402712 468->469 469->468 470 402790 469->470 471 4027d5 470->471 484 401d80 #289 #823 470->484 476 402897 471->476 491 401ec0 6 API calls 471->491 474 40280b 475 401d80 15 API calls 474->475 477 402841 475->477 478 401d80 15 API calls 476->478 481 4028e9 #755 476->481 479 401d80 15 API calls 477->479 478->476 480 402878 479->480 482 401d80 15 API calls 480->482 481->461 482->476 483->469 485 401dba 6 API calls 484->485 487 401e1f #5785 BitBlt 485->487 489 401e71 #5785 #2414 #2405 #640 #613 487->489 490 401e6e 487->490 489->471 490->489 491->474 498 401190 #4457 499 4011a8 #2120 498->499 500 40124f 498->500 499->500 501 4011c8 #4163 499->501 501->500 502 4011d8 #2117 501->502 502->500 503 4011f4 #6000 502->503 503->500 504 401206 #5871 #2626 #2627 #2494 #6209 503->504 536 402d50 537 402d61 #825 536->537 538 402d6a 536->538 537->538 539 4035d0 542 401290 #825 539->542 541 4035d9 542->541 543 4024d0 544 402683 543->544 545 4024e0 543->545 546 40267a #2379 545->546 547 401ec0 6 API calls 545->547 548 401d80 15 API calls 545->548 546->544 547->545 548->545 549 4018d0 554 4018f0 549->554 555 403248 #652 554->555 608 402910 610 40293a 608->610 609 402baa 610->609 613 402ca0 KillTimer #4224 610->613 616 401b30 GetClientRect 613->616 615 402ba3 #2379 615->609 626 401ec0 6 API calls 616->626 618 401b6a 6 API calls 619 401c41 #6199 618->619 622 401c5d 619->622 621 401d80 15 API calls 621->622 622->621 623 401d0a 622->623 624 401d80 15 API calls 623->624 625 401d5c SetTimer 623->625 624->623 625->615 626->618 505 4033de __set_app_type __p__fmode __p__commode 506 40344d 505->506 507 403461 506->507 508 403455 __setusermatherr 506->508 517 40354e _controlfp 507->517 508->507 510 403466 _initterm __getmainargs _initterm 511 4034ba GetStartupInfoA 510->511 513 4034ee GetModuleHandleA 511->513 518 403570 #1576 513->518 516 403512 exit _XcptFilter 517->510 518->516 556 401ae0 CreateSolidBrush #1233 #860 #5260 557 401a60 562 401a80 #800 #813 557->562 559 401a68 560 401a78 559->560 561 401a6f #825 559->561 561->560 562->559 569 401260 #5252 570 4012e0 #561 631 401520 EnableWindow 632 401fa0 635 4020ee 632->635 637 401fb9 632->637 633 4024aa #2379 634 4024b1 633->634 635->633 636 4021a4 635->636 639 4022b1 636->639 640 4021af 636->640 637->634 637->635 638 401d80 15 API calls 637->638 645 402049 637->645 677 401ec0 6 API calls 637->677 638->637 683 401ec0 6 API calls 639->683 643 402363 640->643 644 4021ba 640->644 684 401ec0 6 API calls 643->684 648 4023c1 644->648 649 4021c8 644->649 678 401ec0 6 API calls 645->678 647 4022da 654 40230f 647->654 657 401d80 15 API calls 647->657 685 401ec0 6 API calls 648->685 682 401ec0 6 API calls 649->682 652 402386 656 401d80 15 API calls 652->656 655 401d80 15 API calls 654->655 658 402340 655->658 659 4023b0 656->659 657->654 660 401d80 15 API calls 658->660 665 402355 660->665 661 4022a0 663 402499 664 4023df 664->663 668 401d80 15 API calls 664->668 666 4021e6 666->661 669 401d80 15 API calls 666->669 667 402064 670 401d80 15 API calls 667->670 671 40209f 667->671 679 401ec0 6 API calls 667->679 668->664 669->666 670->667 680 401ec0 6 API calls 671->680 673 4020ba 681 401ec0 6 API calls 673->681 675 4020d5 676 401d80 15 API calls 675->676 676->635 677->637 678->667 679->667 680->673 681->675 682->666 683->647 684->652 685->664 492 401370 #2621 #4159 #823 493 4013d0 492->493 494 4013b3 #520 492->494 495 4013d2 #986 #296 #5214 #5301 493->495 494->495 496 401432 #617 495->496 497 40141c #617 495->497 691 401330 692 401335 691->692 695 4033cc 692->695 698 4033a0 695->698 697 40135a 699 4033b5 __dllonexit 698->699 700 4033a9 _onexit 698->700 699->697 700->697 701 403530 _exit 702 4035b1 703 4035b6 702->703 706 403588 #1168 703->706 707 4035a2 _setmbcp 706->707 708 4035ab 706->708 707->708 585 402d72 590 402da0 #2414 585->590 587 402d88 588 402d98 587->588 589 402d8f #825 587->589 589->588 590->587

    Callgraph

    • Executed
    • Not Executed
    • Opacity -> Relevance
    • Disassembly available
    callgraph 0 Function_00401940 77 Function_004019E0 0->77 1 Function_00401540 78 Function_004015E0 1->78 2 Function_00401340 3 Function_00403740 4 Function_00403642 5 Function_00403748 6 Function_0040354E 7 Function_00402D50 8 Function_00402C50 9 Function_00403650 10 Function_00401450 11 Function_00403658 12 Function_00401A60 89 Function_00401A80 12->89 13 Function_00402E60 87 Function_00402E80 13->87 14 Function_00401260 15 Function_00401060 16 Function_00403560 17 Function_00401360 18 Function_00403760 19 Function_00403563 20 Function_0040376B 21 Function_00401470 22 Function_00403670 96 Function_00401290 22->96 23 Function_00401070 24 Function_00401370 25 Function_00403570 26 Function_00402D72 106 Function_00402DA0 26->106 27 Function_0040367A 28 Function_00401900 29 Function_00401000 100 Function_004010A0 29->100 30 Function_00401100 42 Function_00401120 30->42 31 Function_00401300 32 Function_00403700 33 Function_00403606 34 Function_00402C10 35 Function_00402910 35->8 35->34 60 Function_00402BC0 35->60 76 Function_00402BE0 35->76 102 Function_00402CA0 35->102 36 Function_00403710 37 Function_00402E10 38 Function_00403610 39 Function_00401911 40 Function_00403618 41 Function_00403718 43 Function_00401520 44 Function_00403720 45 Function_00403626 46 Function_00403728 47 Function_00403630 47->96 48 Function_00401930 49 Function_00401530 50 Function_00401330 50->2 63 Function_004033CC 50->63 51 Function_00401B30 57 Function_00401EC0 51->57 90 Function_00401D80 51->90 52 Function_00403530 53 Function_0040363A 54 Function_004015C0 55 Function_004014C0 55->10 56 Function_004024C0 58 Function_004019C0 59 Function_004037C0 61 Function_004036C3 62 Function_004037C8 105 Function_004033A0 63->105 64 Function_004019D0 65 Function_004024D0 65->57 65->90 66 Function_004015D0 67 Function_004018D0 80 Function_004018F0 67->80 68 Function_004012D0 69 Function_004035D0 69->96 70 Function_004036D0 71 Function_00402CD0 94 Function_00402690 71->94 72 Function_004036D8 73 Function_004035DA 74 Function_004033DE 74->6 74->19 74->25 75 Function_00401AE0 79 Function_004012E0 81 Function_004036F0 82 Function_00402DF0 82->37 83 Function_004035F0 84 Function_004036F8 85 Function_004035F8 86 Function_00403780 88 Function_00401080 91 Function_00403588 92 Function_00403788 93 Function_00401190 94->57 94->90 95 Function_00401090 97 Function_00403690 97->96 98 Function_0040369A 99 Function_00401FA0 99->57 99->90 101 Function_004014A0 102->51 103 Function_004019A0 104 Function_004015A0 107 Function_004037A0 108 Function_004037A8 109 Function_004036B0 110 Function_004014B0 111 Function_004015B0 112 Function_004019B0 113 Function_004012B1 114 Function_004035B1 114->91 115 Function_004036B8

    Control-flow Graph

    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3287220274.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3287205296.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3287235507.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3287251405.0000000000406000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3287266269.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_RUMMY.jbxd
    Similarity
    • API ID: #617$#2621#296#4159#520#5214#5301#823#986
    • String ID: 0`@$<`@$D`@
    • API String ID: 3835139667-1166163548
    • Opcode ID: 3ae295d397972a5e10b439ed0f186d821bac742b7784cc7fa5b506763629e84f
    • Instruction ID: 8f3377e77405aa066e05be82c6a6b5fbe4de9d7d331fb865d51bc178ef090d20
    • Opcode Fuzzy Hash: 3ae295d397972a5e10b439ed0f186d821bac742b7784cc7fa5b506763629e84f
    • Instruction Fuzzy Hash: 0A11E770644380ABD354EF25C852B1F7ED8AB88B25F400A3EF895A73D1DB7CC601874A

    Control-flow Graph

    APIs
    • #4457.MFC42(?), ref: 0040119A
    • #2120.MFC42(?,50002800,0000E800,?), ref: 004011BB
    • #4163.MFC42(00000080,?,50002800,0000E800,?), ref: 004011CF
    • #2117.MFC42(?,50008200,0000E801,00000080,?,50002800,0000E800,?), ref: 004011EB
    • #6000.MFC42(00406020,00000004,?,50008200,0000E801,00000080,?,50002800,0000E800,?), ref: 004011FD
    • #5871.MFC42(?,00406020,00000004,?,50008200,0000E801,00000080,?,50002800,0000E800,?), ref: 00401212
    • #2626.MFC42(0000F000,?,00406020,00000004,?,50008200,0000E801,00000080,?,50002800,0000E800,?), ref: 0040121E
    • #2627.MFC42(0000F000,0000F000,?,00406020,00000004,?,50008200,0000E801,00000080,?,50002800,0000E800,?), ref: 0040122A
    • #2494.MFC42(?,00000000,00000000,0000F000,0000F000,?,00406020,00000004,?,50008200,0000E801,00000080,?,50002800,0000E800,?), ref: 00401236
    • #6209.MFC42(?,00000000,00000000,?,00000000,00000000,0000F000,0000F000,?,00406020,00000004,?,50008200,0000E801,00000080), ref: 00401242
    Memory Dump Source
    • Source File: 00000000.00000002.3287220274.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3287205296.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3287235507.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3287251405.0000000000406000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3287266269.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_RUMMY.jbxd
    Similarity
    • API ID: #2117#2120#2494#2626#2627#4163#4457#5871#6000#6209
    • String ID:
    • API String ID: 1118489726-0
    • Opcode ID: 2ad700159516505ad7e773a3d629e1d03bd935213591d9cf5613df2795bf7298
    • Instruction ID: be536de2474846b322ae670beaadc84c7819085007e49e5f4862961dc115ba7d
    • Opcode Fuzzy Hash: 2ad700159516505ad7e773a3d629e1d03bd935213591d9cf5613df2795bf7298
    • Instruction Fuzzy Hash: 45115E3134220022F624693A4D62F7F568E5FD1B25F14453FB256FA2D6DEB8A905426C

    Control-flow Graph

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3287220274.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3287205296.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3287235507.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3287251405.0000000000406000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3287266269.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_RUMMY.jbxd
    Similarity
    • API ID: #470#755ClientRect
    • String ID:
    • API String ID: 2502121321-0
    • Opcode ID: 4f46d9130ae510f0c31082474cb7453935c0a6241bd5fb5c57cdc0ec13ca2409
    • Instruction ID: 3f6a77a7beea499f63deb99d23fd2e59961f755f5db8cadf32a1abce2ca1384d
    • Opcode Fuzzy Hash: 4f46d9130ae510f0c31082474cb7453935c0a6241bd5fb5c57cdc0ec13ca2409
    • Instruction Fuzzy Hash: 2E719D75600B009FD724DF19C881F6AB7E5FF88704F10862DE6569B3D1EBB5A905CB90

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 47 403570-403585 #1576
    APIs
    • #1576.MFC42(00403512,00403512,00403512,00403512,00403512,00000000,?,0000000A), ref: 00403580
    Memory Dump Source
    • Source File: 00000000.00000002.3287220274.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3287205296.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3287235507.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3287251405.0000000000406000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3287266269.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_RUMMY.jbxd
    Similarity
    • API ID: #1576
    • String ID:
    • API String ID: 1976119259-0
    • Opcode ID: 371cf650558777b7497c1cc85ae61873b6a5021e63d3067b0ccf166c38b5e6e7
    • Instruction ID: 2045489f9ebaa0ccebf079923496baf998559f2fcb1a7899f90e8b8b5e8f5fa3
    • Opcode Fuzzy Hash: 371cf650558777b7497c1cc85ae61873b6a5021e63d3067b0ccf166c38b5e6e7
    • Instruction Fuzzy Hash: AEB00836028386ABCB02EE918C0192ABAA6BB98705F484C1DB2A1100B187668528AB16

    Control-flow Graph

    APIs
    • #289.MFC42(?,?,?), ref: 00401D9F
    • #823.MFC42(?,?,?,?,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00401DAE
    • #1146.MFC42(?,00000002,?,?), ref: 00401DDA
    • LoadBitmapA.USER32(00000000,?), ref: 00401DE0
    • #1641.MFC42(00000000), ref: 00401DE9
    • #323.MFC42(00000000), ref: 00401DF2
    • CreateCompatibleDC.GDI32(?), ref: 00401E0B
    • #1640.MFC42(00000000), ref: 00401E16
    • #5785.MFC42(?,?,00000000), ref: 00401E2C
    • BitBlt.GDI32(00000001,?,?,?,?,?,00000000,00000000,00CC0020), ref: 00401E64
    • #5785.MFC42(?,00000000), ref: 00401E77
    • #2414.MFC42(?,00000000), ref: 00401E7E
    • #2405.MFC42(?,00000000), ref: 00401E87
    • #640.MFC42(?,00000000), ref: 00401E95
    • #613.MFC42(?,00000000), ref: 00401EA6
    Memory Dump Source
    • Source File: 00000000.00000002.3287220274.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3287205296.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3287235507.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3287251405.0000000000406000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3287266269.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_RUMMY.jbxd
    Similarity
    • API ID: #5785$#1146#1640#1641#2405#2414#289#323#613#640#823BitmapCompatibleCreateLoad
    • String ID:
    • API String ID: 607866127-0
    • Opcode ID: fd5973dbc7de01c337c7303004c23c930101173b0027c025ad91d87bd578a08c
    • Instruction ID: 67e5c8633a5a039485d157fec622035c5c05163356be74be597a77d62d5b98a9
    • Opcode Fuzzy Hash: fd5973dbc7de01c337c7303004c23c930101173b0027c025ad91d87bd578a08c
    • Instruction Fuzzy Hash: 703160B2208341AFC310EF65C985F2BBBE8AB84714F04892DF956A72D1DB78E905C756

    Control-flow Graph

    APIs
    • GetClientRect.USER32(?,?), ref: 00401B49
      • Part of subcall function 00401EC0: #289.MFC42(?,?,00403728,000000FF,00401B6A,?,?,?,?), ref: 00401EE0
      • Part of subcall function 00401EC0: CreateSolidBrush.GDI32 ref: 00401F20
      • Part of subcall function 00401EC0: #1641.MFC42(00000000), ref: 00401F2B
      • Part of subcall function 00401EC0: FillRect.USER32(?,?,00404A7C), ref: 00401F49
      • Part of subcall function 00401EC0: #2414.MFC42 ref: 00401F60
      • Part of subcall function 00401EC0: #613.MFC42 ref: 00401F79
    • rand.MSVCRT ref: 00401B86
    • time.MSVCRT(00000000), ref: 00401B8B
    • srand.MSVCRT ref: 00401B92
    • rand.MSVCRT ref: 00401B98
    • _itoa.MSVCRT ref: 00401C02
    • #1175.MFC42 ref: 00401C38
    • #6199.MFC42(?), ref: 00401C53
    • SetTimer.USER32(?,00000001,000000C8,00000000), ref: 00401D69
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3287220274.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3287205296.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3287235507.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3287251405.0000000000406000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3287266269.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_RUMMY.jbxd
    Similarity
    • API ID: Rectrand$#1175#1641#2414#289#613#6199BrushClientCreateFillSolidTimer_itoasrandtime
    • String ID: Rummy #
    • API String ID: 2045690635-3068404159
    • Opcode ID: d85decf698ab465c608bfaca0c54d02d744611c3d0577a2c82d3f70c834f0685
    • Instruction ID: 12c0eb7b25bb229f6f69f8f451545bf55e46337edfe3bb877cbeb5c2afdbfed5
    • Opcode Fuzzy Hash: d85decf698ab465c608bfaca0c54d02d744611c3d0577a2c82d3f70c834f0685
    • Instruction Fuzzy Hash: A061BF716003049BD718DF69C885A6ABBE6FBC8304F14862DFA469B3D1EA74ED058B84

    Control-flow Graph

    APIs
    Memory Dump Source
    • Source File: 00000000.00000002.3287220274.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3287205296.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3287235507.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3287251405.0000000000406000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3287266269.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_RUMMY.jbxd
    Similarity
    • API ID: _initterm$FilterHandleInfoModuleStartupXcpt__getmainargs__p__commode__p__fmode__set_app_type__setusermatherrexit
    • String ID:
    • API String ID: 801014965-0
    • Opcode ID: 6eb3bed4911b60887d4ed7a770c7ed3ee2553a33c7029b092e287e621a08ffcb
    • Instruction ID: d358dbb428a00fa79a3b253f8031388de2651a2a08fc8b52a03f72944860442e
    • Opcode Fuzzy Hash: 6eb3bed4911b60887d4ed7a770c7ed3ee2553a33c7029b092e287e621a08ffcb
    • Instruction Fuzzy Hash: 87416BB0940354AFDB25DFA4DD45AAABFBCAB09711F20013EF942BB2E1D7385940CB18

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 103 401ec0-401f8f #289 CreateSolidBrush #1641 FillRect #2414 #613
    APIs
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3287220274.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3287205296.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3287235507.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3287251405.0000000000406000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3287266269.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_RUMMY.jbxd
    Similarity
    • API ID: #1641#2414#289#613BrushCreateFillRectSolid
    • String ID: TJ@
    • API String ID: 1831403058-3904813409
    • Opcode ID: cc26c9cb94c525202472281eb38bceca11511a8efa1792f10db0facdc696af0c
    • Instruction ID: 516291bd938665e5daca50e1b343290019a6091df45c07c589e304e0ff415edd
    • Opcode Fuzzy Hash: cc26c9cb94c525202472281eb38bceca11511a8efa1792f10db0facdc696af0c
    • Instruction Fuzzy Hash: 082129B5108340AFC304DF28C985A5BBBE8BBC8714F00892EF59A93290D778D944CB56

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 104 402ca0-402cc2 KillTimer #4224 105 402cc4 call 401b30 104->105 106 402cc9-402cca 105->106
    APIs
    • KillTimer.USER32(00000000,00000001,?,00402BA3,?,?,?,?,?,?,?,?,?,?,?,?), ref: 00402CA9
    • #4224.MFC42(Congratulations, You Win,Rummy,00000000,?,00402BA3,?,?,?,?,?,?,?,?,?,?,?), ref: 00402CBD
      • Part of subcall function 00401B30: GetClientRect.USER32(?,?), ref: 00401B49
      • Part of subcall function 00401B30: rand.MSVCRT ref: 00401B86
      • Part of subcall function 00401B30: time.MSVCRT(00000000), ref: 00401B8B
      • Part of subcall function 00401B30: srand.MSVCRT ref: 00401B92
      • Part of subcall function 00401B30: rand.MSVCRT ref: 00401B98
      • Part of subcall function 00401B30: _itoa.MSVCRT ref: 00401C02
      • Part of subcall function 00401B30: #1175.MFC42 ref: 00401C38
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.3287220274.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3287205296.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3287235507.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3287251405.0000000000406000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3287266269.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_RUMMY.jbxd
    Similarity
    • API ID: rand$#1175#4224ClientKillRectTimer_itoasrandtime
    • String ID: Congratulations, You Win$Rummy
    • API String ID: 1495886604-2709776976
    • Opcode ID: 019d1c1c7511780365b2e02f78435709d0c2b1b97265b046d0c86a6c3b7cebbc
    • Instruction ID: bdd2c4dade37018a9f4e7117faa277ddcdcf882978787444807aac8b9f44d5b7
    • Opcode Fuzzy Hash: 019d1c1c7511780365b2e02f78435709d0c2b1b97265b046d0c86a6c3b7cebbc
    • Instruction Fuzzy Hash: D7D0C93178062027D6147764AD17F5D21595B45B04F11012EBA02BA1C1DAF9A951038C

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 107 4019e0-401a58 #560 #540 #1168 LoadCursorA
    APIs
    • #560.MFC42(?,00000000,00000000,004036C3,000000FF,0040197A,?,?,?,?,000000FF), ref: 004019FD
    • #540.MFC42(?,00000000,00000000,004036C3,000000FF,0040197A,?,?,?,?,000000FF), ref: 00401A0D
    • #1168.MFC42(?,?,?,?,?,?,?,?,?,?,?,?,00000000,00000000,004036C3,000000FF), ref: 00401A32
    • LoadCursorA.USER32(00000000,00007F00), ref: 00401A3E
    Memory Dump Source
    • Source File: 00000000.00000002.3287220274.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3287205296.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3287235507.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3287251405.0000000000406000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3287266269.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_RUMMY.jbxd
    Similarity
    • API ID: #1168#540#560CursorLoad
    • String ID:
    • API String ID: 4175135295-0
    • Opcode ID: ab3dd0e15dde0705b78282519559052bd20409bbda27b87f8018b6f6cb0afb0a
    • Instruction ID: b711d1f2222960a7ef7d53a3cbe70342e53c6e002ec37024179a1a54a932fd65
    • Opcode Fuzzy Hash: ab3dd0e15dde0705b78282519559052bd20409bbda27b87f8018b6f6cb0afb0a
    • Instruction Fuzzy Hash: 7DF06DB0548B909FD320DF19C806756BBE4FB44B19F004A2EF58657BC1C7FDA1088B86

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 108 401ae0-401b22 CreateSolidBrush #1233 #860 #5260
    APIs
    • CreateSolidBrush.GDI32 ref: 00401AF0
    • #1233.MFC42(00000008,?,00000000,00000000), ref: 00401B02
    • #860.MFC42(00000000,00000008,?,00000000,00000000), ref: 00401B0A
    • #5260.MFC42(?,00000000,00000008,?,00000000,00000000), ref: 00401B1B
    Memory Dump Source
    • Source File: 00000000.00000002.3287220274.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
    • Associated: 00000000.00000002.3287205296.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3287235507.0000000000404000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3287251405.0000000000406000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.3287266269.0000000000407000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_400000_RUMMY.jbxd
    Similarity
    • API ID: #1233#5260#860BrushCreateSolid
    • String ID:
    • API String ID: 1786706830-0
    • Opcode ID: b1b9004ab19452716930e9659ee0e9e99c07594f1ff81ec2daf93f093de4b99b
    • Instruction ID: 1167740107a5b3485a0345d160f9e8cd61bcefda1c95246fa771a9a6d8075eb8
    • Opcode Fuzzy Hash: b1b9004ab19452716930e9659ee0e9e99c07594f1ff81ec2daf93f093de4b99b
    • Instruction Fuzzy Hash: 78E092B13006106FD250DB49D995F2F7BADEBC8705F00442EF649EB2C0CEB468058B68