Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
52B9Zcz8vg.exe

Overview

General Information

Sample name:52B9Zcz8vg.exe
Analysis ID:1542943
MD5:9d80eed9593bb17dd2b0a75a39d5a40f
SHA1:7095f632db75b4417f9766e8f1adb1aef15e0dc3
SHA256:2fc0fb4f71399f85680dd803fb017a00696e6e4261f90ce98dea61e49cbec0c2
Infos:

Detection

JohnWalkerTexasLoader
Score:76
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Yara detected JohnWalkerTexasLoader
Queries memory information (via WMI often done to detect virtual machines)
Queries sensitive physical memory information (via WMI, Win32_PhysicalMemory, often done to detect virtual machines)
Uses Windows timers to delay execution
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Detected potential crypto function
PE file does not import any functions
Potential time zone aware malware
Program does not show much activity (idle)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64native
  • 52B9Zcz8vg.exe (PID: 7304 cmdline: "C:\Users\user\Desktop\52B9Zcz8vg.exe" MD5: 9D80EED9593BB17DD2B0A75A39D5A40F)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
52B9Zcz8vg.exeJoeSecurity_JohnWalkerTexasLoaderYara detected JohnWalkerTexasLoaderJoe Security
    SourceRuleDescriptionAuthorStrings
    00000000.00000000.878519821.000002392D142000.00000002.00000001.01000000.00000003.sdmpJoeSecurity_JohnWalkerTexasLoaderYara detected JohnWalkerTexasLoaderJoe Security
      Process Memory Space: 52B9Zcz8vg.exe PID: 7304JoeSecurity_JohnWalkerTexasLoaderYara detected JohnWalkerTexasLoaderJoe Security
        SourceRuleDescriptionAuthorStrings
        0.0.52B9Zcz8vg.exe.2392d140000.0.unpackJoeSecurity_JohnWalkerTexasLoaderYara detected JohnWalkerTexasLoaderJoe Security
          No Sigma rule has matched
          No Suricata rule has matched

          Click to jump to signature section

          Show All Signature Results

          AV Detection

          barindex
          Source: 52B9Zcz8vg.exeAvira: detected
          Source: 52B9Zcz8vg.exeReversingLabs: Detection: 44%
          Source: 52B9Zcz8vg.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Source: Binary string: C:\Users\Administrator\Pictures\DiffPatchWpf-main\obj\x64\Release\DiffPatchWpf.pdb source: 52B9Zcz8vg.exe
          Source: 52B9Zcz8vg.exe, 00000000.00000002.2134986003.000002392EE61000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://defaultcontainer/MainWindow.xaml
          Source: 52B9Zcz8vg.exe, 00000000.00000002.2134986003.000002392EE61000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://foo/MainWindow.xaml
          Source: 52B9Zcz8vg.exe, 00000000.00000002.2134986003.000002392EE61000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://foo/bar/mainwindow.baml
          Source: 52B9Zcz8vg.exe, 00000000.00000002.2134986003.000002392EF52000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://xilloolli.com/api-debug.php
          Source: 52B9Zcz8vg.exe, 00000000.00000002.2134986003.000002392EF52000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://xilloolli.com/api.php
          Source: 52B9Zcz8vg.exeString found in binary or memory: http://xilloolli.com/api.phpEhttp://xilloolli.com/api-debug.php
          Source: 52B9Zcz8vg.exeString found in binary or memory: https://github.com/reproteq/DiffPatchWpf3Copyright
          Source: 52B9Zcz8vg.exeString found in binary or memory: https://ipinfo.io/country
          Source: 52B9Zcz8vg.exeString found in binary or memory: https://ipinfo.io/ip
          Source: 52B9Zcz8vg.exeString found in binary or memory: https://oklibed.com
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeCode function: 0_2_00007FFB67986B820_2_00007FFB67986B82
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeCode function: 0_2_00007FFB67985DD60_2_00007FFB67985DD6
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeCode function: 0_2_00007FFB67980ED20_2_00007FFB67980ED2
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeCode function: 0_2_00007FFB67980DD20_2_00007FFB67980DD2
          Source: 52B9Zcz8vg.exeStatic PE information: No import functions for PE file found
          Source: 52B9Zcz8vg.exe, 00000000.00000000.878594498.000002392D164000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameDiffPatchWpf.exe2 vs 52B9Zcz8vg.exe
          Source: 52B9Zcz8vg.exeBinary or memory string: OriginalFilenameDiffPatchWpf.exe2 vs 52B9Zcz8vg.exe
          Source: classification engineClassification label: mal76.troj.evad.winEXE@1/0@0/0
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeMutant created: NULL
          Source: 52B9Zcz8vg.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          Source: 52B9Zcz8vg.exeStatic file information: TRID: Win64 Executable GUI Net Framework (217006/5) 49.88%
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
          Source: 52B9Zcz8vg.exeReversingLabs: Detection: 44%
          Source: 52B9Zcz8vg.exeString found in binary or memory: EHH-ADD!IJJoEHH5JKK
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeSection loaded: mscoree.dllJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeSection loaded: apphelp.dllJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeSection loaded: kernel.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeSection loaded: version.dllJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeSection loaded: edgegdi.dllJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeSection loaded: uxtheme.dllJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeSection loaded: cryptsp.dllJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeSection loaded: rsaenh.dllJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeSection loaded: cryptbase.dllJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeSection loaded: dwrite.dllJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeSection loaded: msvcp140_clr0400.dllJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeSection loaded: windows.storage.dllJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeSection loaded: wldp.dllJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeSection loaded: profapi.dllJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeSection loaded: wbemcomn.dllJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeSection loaded: amsi.dllJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeSection loaded: userenv.dllJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeSection loaded: sspicli.dllJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeSection loaded: dwmapi.dllJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeSection loaded: d3d9.dllJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeSection loaded: wtsapi32.dllJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeSection loaded: winsta.dllJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeSection loaded: powrprof.dllJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeSection loaded: umpdc.dllJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeSection loaded: dataexchange.dllJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeSection loaded: d3d11.dllJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeSection loaded: dcomp.dllJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeSection loaded: dxgi.dllJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeSection loaded: twinapi.appcore.dllJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeSection loaded: resourcepolicyclient.dllJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeSection loaded: textshaping.dllJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeSection loaded: dxcore.dllJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeSection loaded: textinputframework.dllJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeSection loaded: coreuicomponents.dllJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeSection loaded: coremessaging.dllJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeSection loaded: ntmarta.dllJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeSection loaded: wintypes.dllJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeSection loaded: msctfui.dllJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeSection loaded: uiautomationcore.dllJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeSection loaded: propsys.dllJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeSection loaded: d3dcompiler_47.dllJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{CF4CC405-E2C5-4DDD-B3CE-5E7582D8C9FA}\InprocServer32Jump to behavior
          Source: Window RecorderWindow detected: More than 3 window changes detected
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeFile opened: C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorrc.dllJump to behavior
          Source: 52B9Zcz8vg.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
          Source: 52B9Zcz8vg.exeStatic PE information: Image base 0x140000000 > 0x60000000
          Source: 52B9Zcz8vg.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
          Source: 52B9Zcz8vg.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
          Source: Binary string: C:\Users\Administrator\Pictures\DiffPatchWpf-main\obj\x64\Release\DiffPatchWpf.pdb source: 52B9Zcz8vg.exe
          Source: 52B9Zcz8vg.exeStatic PE information: 0xFD7F9319 [Thu Oct 9 11:52:57 2104 UTC]
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeCode function: 0_2_00007FFB6786D2A5 pushad ; iretd 0_2_00007FFB6786D2A6
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeCode function: 0_2_00007FFB6798C218 pushad ; retn 67A1h0_2_00007FFB6798E071
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeCode function: 0_2_00007FFB67988135 push ebx; ret 0_2_00007FFB6798814A
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

          Malware Analysis System Evasion

          barindex
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PhysicalMemory
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : SELECT * FROM Win32_PhysicalMemory
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeUser Timer Set: Timeout: 1msJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeUser Timer Set: Timeout: 125msJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeUser Timer Set: Timeout: 1msJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeUser Timer Set: Timeout: 1msJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeUser Timer Set: Timeout: 1msJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeUser Timer Set: Timeout: 1msJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeMemory allocated: 2392ED50000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeMemory allocated: 23946E60000 memory reserve | memory write watchJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeSystem information queried: CurrentTimeZoneInformationJump to behavior
          Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
          Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeMemory allocated: page read and write | page guardJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeQueries volume information: C:\Users\user\Desktop\52B9Zcz8vg.exe VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\PresentationFramework-SystemXml\v4.0_4.0.0.0__b77a5c561934e089\PresentationFramework-SystemXml.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeQueries volume information: C:\Windows\Fonts\segoeuib.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeQueries volume information: C:\Windows\Fonts\segoeuib.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeQueries volume information: C:\Windows\Fonts\segoeui.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeQueries volume information: C:\Windows\Fonts\consola.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeQueries volume information: C:\Windows\Fonts\seguisb.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeQueries volume information: C:\Windows\Fonts\seguibl.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeQueries volume information: C:\Windows\Fonts\segoeuib.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeQueries volume information: C:\Windows\Fonts\segoeui.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\UIAutomationTypes\v4.0_4.0.0.0__31bf3856ad364e35\UIAutomationTypes.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\UIAutomationProvider\v4.0_4.0.0.0__31bf3856ad364e35\UIAutomationProvider.dll VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeQueries volume information: C:\Windows\Fonts\segoeuib.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeQueries volume information: C:\Windows\Fonts\segoeui.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeQueries volume information: C:\Windows\Fonts\segoeuib.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeQueries volume information: C:\Windows\Fonts\segoeuib.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeQueries volume information: C:\Windows\Fonts\segoeuib.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeQueries volume information: C:\Windows\Fonts\segoeuib.ttf VolumeInformationJump to behavior
          Source: C:\Users\user\Desktop\52B9Zcz8vg.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

          Stealing of Sensitive Information

          barindex
          Source: Yara matchFile source: 52B9Zcz8vg.exe, type: SAMPLE
          Source: Yara matchFile source: 0.0.52B9Zcz8vg.exe.2392d140000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000000.878519821.000002392D142000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: 52B9Zcz8vg.exe PID: 7304, type: MEMORYSTR

          Remote Access Functionality

          barindex
          Source: Yara matchFile source: 52B9Zcz8vg.exe, type: SAMPLE
          Source: Yara matchFile source: 0.0.52B9Zcz8vg.exe.2392d140000.0.unpack, type: UNPACKEDPE
          Source: Yara matchFile source: 00000000.00000000.878519821.000002392D142000.00000002.00000001.01000000.00000003.sdmp, type: MEMORY
          Source: Yara matchFile source: Process Memory Space: 52B9Zcz8vg.exe PID: 7304, type: MEMORYSTR
          ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
          Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
          Windows Management Instrumentation
          1
          DLL Side-Loading
          1
          DLL Side-Loading
          21
          Virtualization/Sandbox Evasion
          OS Credential Dumping1
          System Time Discovery
          Remote Services1
          Archive Collected Data
          1
          Encrypted Channel
          Exfiltration Over Other Network MediumAbuse Accessibility Features
          CredentialsDomainsDefault Accounts2
          Command and Scripting Interpreter
          Boot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
          Disable or Modify Tools
          LSASS Memory2
          Security Software Discovery
          Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
          Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
          Timestomp
          Security Account Manager21
          Virtualization/Sandbox Evasion
          SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
          Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
          DLL Side-Loading
          NTDS12
          System Information Discovery
          Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
          Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
          Obfuscated Files or Information
          LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
          Hide Legend

          Legend:

          • Process
          • Signature
          • Created File
          • DNS/IP Info
          • Is Dropped
          • Is Windows Process
          • Number of created Registry Values
          • Number of created Files
          • Visual Basic
          • Delphi
          • Java
          • .Net C# or VB.NET
          • C, C++ or other language
          • Is malicious
          • Internet

          This section contains all screenshots as thumbnails, including those not shown in the slideshow.


          windows-stand
          SourceDetectionScannerLabelLink
          52B9Zcz8vg.exe100%AviraTR/Agent.ywsqv
          52B9Zcz8vg.exe45%ReversingLabsByteCode-MSIL.Trojan.Walgentz
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          No Antivirus matches
          No contacted domains info
          NameSourceMaliciousAntivirus DetectionReputation
          https://ipinfo.io/country52B9Zcz8vg.exefalse
            unknown
            http://xilloolli.com/api.phpEhttp://xilloolli.com/api-debug.php52B9Zcz8vg.exefalse
              unknown
              http://foo/bar/mainwindow.baml52B9Zcz8vg.exe, 00000000.00000002.2134986003.000002392EE61000.00000004.00000800.00020000.00000000.sdmpfalse
                unknown
                http://foo/MainWindow.xaml52B9Zcz8vg.exe, 00000000.00000002.2134986003.000002392EE61000.00000004.00000800.00020000.00000000.sdmpfalse
                  unknown
                  http://defaultcontainer/MainWindow.xaml52B9Zcz8vg.exe, 00000000.00000002.2134986003.000002392EE61000.00000004.00000800.00020000.00000000.sdmpfalse
                    unknown
                    http://xilloolli.com/api-debug.php52B9Zcz8vg.exe, 00000000.00000002.2134986003.000002392EF52000.00000004.00000800.00020000.00000000.sdmpfalse
                      unknown
                      http://xilloolli.com/api.php52B9Zcz8vg.exe, 00000000.00000002.2134986003.000002392EF52000.00000004.00000800.00020000.00000000.sdmpfalse
                        unknown
                        https://oklibed.com52B9Zcz8vg.exefalse
                          unknown
                          https://github.com/reproteq/DiffPatchWpf3Copyright52B9Zcz8vg.exefalse
                            unknown
                            https://ipinfo.io/ip52B9Zcz8vg.exefalse
                              unknown
                              No contacted IP infos
                              Joe Sandbox version:41.0.0 Charoite
                              Analysis ID:1542943
                              Start date and time:2024-10-26 23:18:48 +02:00
                              Joe Sandbox product:CloudBasic
                              Overall analysis duration:0h 9m 2s
                              Hypervisor based Inspection enabled:false
                              Report type:full
                              Cookbook file name:default.jbs
                              Analysis system description:Windows 10 64 bit 20H2 Native physical Machine for testing VM-aware malware (Office 2019, Chrome 128, Firefox 91, Adobe Reader DC 21, Java 8 Update 301
                              Run name:Suspected VM Detection
                              Number of analysed new started processes analysed:11
                              Number of new started drivers analysed:0
                              Number of existing processes analysed:0
                              Number of existing drivers analysed:0
                              Number of injected processes analysed:0
                              Technologies:
                              • HCA enabled
                              • EGA enabled
                              • AMSI enabled
                              Analysis Mode:default
                              Analysis stop reason:Timeout
                              Sample name:52B9Zcz8vg.exe
                              Detection:MAL
                              Classification:mal76.troj.evad.winEXE@1/0@0/0
                              EGA Information:Failed
                              HCA Information:
                              • Successful, ratio: 91%
                              • Number of executed functions: 26
                              • Number of non-executed functions: 5
                              Cookbook Comments:
                              • Found application associated with file extension: .exe
                              • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, sppsvc.exe, SgrmBroker.exe, conhost.exe, svchost.exe
                              • Excluded domains from analysis (whitelisted): fs.microsoft.com, ctldl.windowsupdate.com, c.pki.goog
                              • Execution Graph export aborted for target 52B9Zcz8vg.exe, PID 7304 because it is empty
                              • Not all processes where analyzed, report is missing behavior information
                              • VT rate limit hit for: 52B9Zcz8vg.exe
                              No simulations
                              No context
                              No context
                              No context
                              No context
                              No context
                              No created / dropped files found
                              File type:PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
                              Entropy (8bit):3.8537576403046545
                              TrID:
                              • Win64 Executable GUI Net Framework (217006/5) 49.88%
                              • Win64 Executable GUI (202006/5) 46.43%
                              • Win64 Executable (generic) (12005/4) 2.76%
                              • Generic Win/DOS Executable (2004/3) 0.46%
                              • DOS Executable Generic (2002/1) 0.46%
                              File name:52B9Zcz8vg.exe
                              File size:236'032 bytes
                              MD5:9d80eed9593bb17dd2b0a75a39d5a40f
                              SHA1:7095f632db75b4417f9766e8f1adb1aef15e0dc3
                              SHA256:2fc0fb4f71399f85680dd803fb017a00696e6e4261f90ce98dea61e49cbec0c2
                              SHA512:5dfef880c0ecbdff2c2746a74e42339203ff5af29a041690fe065b45ea1cb8600f15b439d497e4e9b9f2fbe480b0aa1bd4cc3358cf7c81c3d804349f60882801
                              SSDEEP:768:b4dTqU/CCEui6TWcyU6GRIkOPugg0Apk/OIaEyEb3GOd53BRnW2i38SmFhczgg0X:Wn/CpB82YN5zApoePZzhpmy
                              TLSH:6434D4ABE32F6809CD2A32F1C8E443B45E615F116E10D6F964B9F2C5123499FFD189AC
                              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..d................."...0.................. .....@..... ....................................`...@......@............... .....
                              Icon Hash:1761174505056997
                              Entrypoint:0x140000000
                              Entrypoint Section:
                              Digitally signed:false
                              Imagebase:0x140000000
                              Subsystem:windows gui
                              Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                              DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                              Time Stamp:0xFD7F9319 [Thu Oct 9 11:52:57 2104 UTC]
                              TLS Callbacks:
                              CLR (.Net) Version:
                              OS Version Major:4
                              OS Version Minor:0
                              File Version Major:4
                              File Version Minor:0
                              Subsystem Version Major:4
                              Subsystem Version Minor:0
                              Import Hash:
                              Instruction
                              dec ebp
                              pop edx
                              nop
                              add byte ptr [ebx], al
                              add byte ptr [eax], al
                              add byte ptr [eax+eax], al
                              add byte ptr [eax], al
                              NameVirtual AddressVirtual Size Is in Section
                              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_RESOURCE0x240000x18ca8.rsrc
                              IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                              IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                              IMAGE_DIRECTORY_ENTRY_DEBUG0x227e80x38.text
                              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20000x48.text
                              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                              .text0x20000x2088b0x20a004ace5cd094fdd8bead6e13407654d5aeFalse0.17820581896551724data4.282451580915917IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                              .rsrc0x240000x18ca80x18e00d46f216a7dfee89a5dd1ba2c032f2ffeFalse0.10476209170854271data3.1344838579936667IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                              NameRVASizeTypeLanguageCountryZLIB Complexity
                              RT_ICON0x241800x468Device independent bitmap graphic, 16 x 32 x 32, image size 10880.3962765957446808
                              RT_ICON0x245f80x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 42240.23381801125703564
                              RT_ICON0x256b00x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 96000.23278008298755187
                              RT_ICON0x27c680x4228Device independent bitmap graphic, 64 x 128 x 32, image size 168960.12133915918752952
                              RT_ICON0x2bea00x10828Device independent bitmap graphic, 128 x 256 x 32, image size 675840.06113214243463859
                              RT_GROUP_ICON0x3c6d80x4cdata0.75
                              RT_VERSION0x3c7340x374data0.416289592760181
                              RT_MANIFEST0x3cab80x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
                              No network behavior found

                              Click to jump to process

                              Click to jump to process

                              Click to dive into process behavior distribution

                              Target ID:0
                              Start time:17:24:29
                              Start date:26/10/2024
                              Path:C:\Users\user\Desktop\52B9Zcz8vg.exe
                              Wow64 process (32bit):false
                              Commandline:"C:\Users\user\Desktop\52B9Zcz8vg.exe"
                              Imagebase:0x2392d140000
                              File size:236'032 bytes
                              MD5 hash:9D80EED9593BB17DD2B0A75A39D5A40F
                              Has elevated privileges:true
                              Has administrator privileges:true
                              Programmed in:C, C++ or other language
                              Yara matches:
                              • Rule: JoeSecurity_JohnWalkerTexasLoader, Description: Yara detected JohnWalkerTexasLoader, Source: 00000000.00000000.878519821.000002392D142000.00000002.00000001.01000000.00000003.sdmp, Author: Joe Security
                              Reputation:low
                              Has exited:false

                              Reset < >
                                Memory Dump Source
                                • Source File: 00000000.00000002.2140193314.00007FFB67980000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB67980000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ffb67980000_52B9Zcz8vg.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: d89f188c105b808451559f4102968367fa29ab91549a454a220ecc773a8cdab3
                                • Instruction ID: 0eb5cee2e74944a731e5c5a15d7b98ced955d7e70502efc8241a789c05054c88
                                • Opcode Fuzzy Hash: d89f188c105b808451559f4102968367fa29ab91549a454a220ecc773a8cdab3
                                • Instruction Fuzzy Hash: 8DF1B470918A4E8FEBA8DF28C8557E937E1FF54300F1446AAE84DC7292DF349945CB82
                                Memory Dump Source
                                • Source File: 00000000.00000002.2140193314.00007FFB67980000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB67980000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ffb67980000_52B9Zcz8vg.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 42d6e3102ce72520ed9a4a089e5bdd47fe2d3286cc2e18569b490859b02d3d82
                                • Instruction ID: d54973006cac8fcb9e9dcc4c9433cce48b6224239db22a6b4094be5c6b8c9bba
                                • Opcode Fuzzy Hash: 42d6e3102ce72520ed9a4a089e5bdd47fe2d3286cc2e18569b490859b02d3d82
                                • Instruction Fuzzy Hash: 33E1E470918A4E8FEBA8DF28C8557E937D1FF54310F1446AEE84DC7292DE34A944CB81
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2140193314.00007FFB67980000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB67980000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ffb67980000_52B9Zcz8vg.jbxd
                                Similarity
                                • API ID:
                                • String ID: [>$Z>$Z>
                                • API String ID: 0-291734385
                                • Opcode ID: cf2d52b37df9acccec3fd2b043bfebecb56162b045c9eca4c99fadf1225b60af
                                • Instruction ID: 3b0b44147e03cf5ed46d846aa2bf9746750ce1d5d6d789816e54a98caf469398
                                • Opcode Fuzzy Hash: cf2d52b37df9acccec3fd2b043bfebecb56162b045c9eca4c99fadf1225b60af
                                • Instruction Fuzzy Hash: E8418E30E4978B8FDB46AF7888215AABBF1EF4634571544F3C44CCB296DA3898C9C711
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2140193314.00007FFB67980000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB67980000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ffb67980000_52B9Zcz8vg.jbxd
                                Similarity
                                • API ID:
                                • String ID: S{?I
                                • API String ID: 0-4152765417
                                • Opcode ID: 73c92eebf83d20620516c5118f055bf901f1b87768e5b58cae040c155029f1cb
                                • Instruction ID: bcb1a4bc22244512deb0c62f852810644a240143bf54d0ffe179746e8b7d57d9
                                • Opcode Fuzzy Hash: 73c92eebf83d20620516c5118f055bf901f1b87768e5b58cae040c155029f1cb
                                • Instruction Fuzzy Hash: 1E8173D2C0E6D3BAE7166674E4761B97FE06F17210B740AFBE0D94A1D3DD0CA8089396
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2140193314.00007FFB67980000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB67980000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ffb67980000_52B9Zcz8vg.jbxd
                                Similarity
                                • API ID:
                                • String ID: S{?I
                                • API String ID: 0-4152765417
                                • Opcode ID: 5109655888197e176733b05de66e1f78d78a828c6353be1d89b596211bab459a
                                • Instruction ID: d629351925b96f5af9a582e12615dcf210a1f4ad1f55371390914029811359c7
                                • Opcode Fuzzy Hash: 5109655888197e176733b05de66e1f78d78a828c6353be1d89b596211bab459a
                                • Instruction Fuzzy Hash: 4241DCD1C0E597BAE61677B5E4721B93AD15F13241BB40BFBF0D95A1C3DC0CA80892A6
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2140193314.00007FFB67980000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB67980000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ffb67980000_52B9Zcz8vg.jbxd
                                Similarity
                                • API ID:
                                • String ID: [>
                                • API String ID: 0-700022610
                                • Opcode ID: 3ee0387b9c866481219ad3f4f8eb05cd61a4654e74690c73f0185e423f3968a5
                                • Instruction ID: 7eb3418bf0a6fe0d913259078265667aa5f292cafdd3b98e40cc0c32ee9c3da7
                                • Opcode Fuzzy Hash: 3ee0387b9c866481219ad3f4f8eb05cd61a4654e74690c73f0185e423f3968a5
                                • Instruction Fuzzy Hash: 0BF0E261E1D64B8FEB56AF74C4228FA7BE0EF41354B6009F3D41DC70C3ED2868848261
                                Memory Dump Source
                                • Source File: 00000000.00000002.2140193314.00007FFB67980000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB67980000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ffb67980000_52B9Zcz8vg.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 5c7a1c8cb85933dd5a9389eff6ffdde403ac23abdad003cd314609d509f23337
                                • Instruction ID: e8f472b2dd12f82e91f9a26a1ddb508ccfaab81a7e11df5bee3be859dfa4a2b0
                                • Opcode Fuzzy Hash: 5c7a1c8cb85933dd5a9389eff6ffdde403ac23abdad003cd314609d509f23337
                                • Instruction Fuzzy Hash: AAB1E370518A4E8FEB69DF28C8557E93BE1FF59310F1042AAE84DC7292DE349945CB82
                                Memory Dump Source
                                • Source File: 00000000.00000002.2140193314.00007FFB67980000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB67980000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ffb67980000_52B9Zcz8vg.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 5477664551e24d535c50a8ec811aac7a5a4d32f8a0e4479fa4788d6aa691928a
                                • Instruction ID: 6cffd683be4f1262b02d7fa10bce39f2b9bb27f7d87d07014c2042d7b704f0be
                                • Opcode Fuzzy Hash: 5477664551e24d535c50a8ec811aac7a5a4d32f8a0e4479fa4788d6aa691928a
                                • Instruction Fuzzy Hash: ED61E671A0CA4B9FEB95EF38C8656B977E1EF99340B1404FAD409C72D2DE38A8428741
                                Memory Dump Source
                                • Source File: 00000000.00000002.2140193314.00007FFB67980000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB67980000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ffb67980000_52B9Zcz8vg.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 73eaf62ef79444ebef6cde983356f07a9e257f498a6da97d88a37a999f8efe9d
                                • Instruction ID: ca1a86e95b7786151fd52027075ba9067767bd6e0661273be68b33a749bfb44f
                                • Opcode Fuzzy Hash: 73eaf62ef79444ebef6cde983356f07a9e257f498a6da97d88a37a999f8efe9d
                                • Instruction Fuzzy Hash: 8A51E262A0D6A79BE312BE7CF4654FA3BE0DF9637471402F7D08CCA493CC08644A8395
                                Memory Dump Source
                                • Source File: 00000000.00000002.2140193314.00007FFB67980000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB67980000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ffb67980000_52B9Zcz8vg.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: d43c30ef0ec34864c047f8e93b1d8212b3ca2c1da1ec443a865845bec7c6d783
                                • Instruction ID: af34e36f0f2b5cd86c9c01f761b3584dd141dab53be5e36ae618790d89619fee
                                • Opcode Fuzzy Hash: d43c30ef0ec34864c047f8e93b1d8212b3ca2c1da1ec443a865845bec7c6d783
                                • Instruction Fuzzy Hash: C1518071918A0C8FDB59DF68D845BE9BBF1FF59310F1082AAD00DD3292CE34A9858F81
                                Memory Dump Source
                                • Source File: 00000000.00000002.2140193314.00007FFB67980000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB67980000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ffb67980000_52B9Zcz8vg.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: cdadb6639cfad642ce0f8492b96ce03cd32d92f6fd889c9bc3a68cc24c4754be
                                • Instruction ID: 3c6f10f93647c7598766d67381d0f379e21fcbf62d73106b762d98ddb777aa84
                                • Opcode Fuzzy Hash: cdadb6639cfad642ce0f8492b96ce03cd32d92f6fd889c9bc3a68cc24c4754be
                                • Instruction Fuzzy Hash: F951487190CB4E9FEB59DB7CC8596E97BE0EF99321F1442BBD04CC3292CE24A8058781
                                Memory Dump Source
                                • Source File: 00000000.00000002.2140193314.00007FFB67980000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB67980000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ffb67980000_52B9Zcz8vg.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 082cc7fa404981667148b6198518ac6eac008673fe1175c0a7eb510eb089f981
                                • Instruction ID: 140008bed8e09ade67bc62acdf4547aef08a87b205b959ba7dfa944cc0e6f3f2
                                • Opcode Fuzzy Hash: 082cc7fa404981667148b6198518ac6eac008673fe1175c0a7eb510eb089f981
                                • Instruction Fuzzy Hash: 9851CAA1B5CB478FE746AB7CC4656A9B7D2EF96300B1405FBD04DC72C2DD28AC468352
                                Memory Dump Source
                                • Source File: 00000000.00000002.2140193314.00007FFB67980000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB67980000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ffb67980000_52B9Zcz8vg.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: fa38cb284a55ca347a8a8b81ff0b30dba058b1625f12233fd489585d537b30d7
                                • Instruction ID: b346e40aa9204179e9424f48b8f32f0f438acaca9d2c175b461419657aad0e09
                                • Opcode Fuzzy Hash: fa38cb284a55ca347a8a8b81ff0b30dba058b1625f12233fd489585d537b30d7
                                • Instruction Fuzzy Hash: 595118B2E08A1A9FEB94EF7CC8545A977E1EF5D710B1403FAE00CD7292DE24AC418780
                                Memory Dump Source
                                • Source File: 00000000.00000002.2140193314.00007FFB67980000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB67980000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ffb67980000_52B9Zcz8vg.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 7dd52850c02e56bcd5bd5b049ae38d1964807d336cc4ecddd7c2226569bed24c
                                • Instruction ID: 759655f1fa8101f34473e4807e8e58df8a0fcdb55507dc68d3c9b14c03e011f4
                                • Opcode Fuzzy Hash: 7dd52850c02e56bcd5bd5b049ae38d1964807d336cc4ecddd7c2226569bed24c
                                • Instruction Fuzzy Hash: 4651C071A0DA8A8FDB86EB38C8251B97BF1EF5A201B1500F7D449C72E2DE389C468751
                                Memory Dump Source
                                • Source File: 00000000.00000002.2140193314.00007FFB67980000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB67980000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ffb67980000_52B9Zcz8vg.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 2f967601a65642175e0659f69ed99609bf412f4a12b4daa48e92332a11e55204
                                • Instruction ID: bf67cc0582d68705e26426b3dd097ef5b3f9ac468bd4072697ed9416b6f4ae33
                                • Opcode Fuzzy Hash: 2f967601a65642175e0659f69ed99609bf412f4a12b4daa48e92332a11e55204
                                • Instruction Fuzzy Hash: F3512E7090CB8D8FDB58DF58D889AA9BBE0FB69311F14412EE14DC3662CB74A845CB91
                                Memory Dump Source
                                • Source File: 00000000.00000002.2139670574.00007FFB6786D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB6786D000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ffb6786d000_52B9Zcz8vg.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 19de112f124fd28f93581e6d6cdd22b2d34282153ecba447ae6fa04f58fedf30
                                • Instruction ID: 579d77590006226484d2ea5819a025ea8e471693d75a3bc3bd23fc42ed651c41
                                • Opcode Fuzzy Hash: 19de112f124fd28f93581e6d6cdd22b2d34282153ecba447ae6fa04f58fedf30
                                • Instruction Fuzzy Hash: 7941CFB180DB849FE356CB39D8559523FA1EF56320B2501EFE088CB1A7DA25AC46C792
                                Memory Dump Source
                                • Source File: 00000000.00000002.2140193314.00007FFB67980000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB67980000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ffb67980000_52B9Zcz8vg.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 8536de392d347a163dfaaf3444cab5f4800c8b8ffb479cc7f68108ff539141de
                                • Instruction ID: 4e756177245b12306e6ac11ee6dc8d9243acc094cda3645bf09c3e190e490c1b
                                • Opcode Fuzzy Hash: 8536de392d347a163dfaaf3444cab5f4800c8b8ffb479cc7f68108ff539141de
                                • Instruction Fuzzy Hash: 68415D71908A4C8FDB58EFA8D455BEEBBB1FB69311F00426ED009D7251CB749485CF41
                                Memory Dump Source
                                • Source File: 00000000.00000002.2140193314.00007FFB67980000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB67980000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ffb67980000_52B9Zcz8vg.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 987bee73b41db170bfe3bbf822a04bfac512174a2f93e2656775bf459e9042b0
                                • Instruction ID: de55a124d33963c3683b8ff529761a1de6730e92009ccc9bbac85eb05794b50b
                                • Opcode Fuzzy Hash: 987bee73b41db170bfe3bbf822a04bfac512174a2f93e2656775bf459e9042b0
                                • Instruction Fuzzy Hash: 6A312B70A08A4D8FDB58EFA8D445BEEBBB1EB59311F10826ED00ED3255CB74A485CF41
                                Memory Dump Source
                                • Source File: 00000000.00000002.2140193314.00007FFB67980000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB67980000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ffb67980000_52B9Zcz8vg.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 8bf0853994149224e09059374ee8ba612cfc6454248345beea557c8f8dadd35e
                                • Instruction ID: 3c9d38144c396e9cec79e1881fd403c91030f2e694ed2fc32e7920000ef5ab6e
                                • Opcode Fuzzy Hash: 8bf0853994149224e09059374ee8ba612cfc6454248345beea557c8f8dadd35e
                                • Instruction Fuzzy Hash: 20313B70A0CA0B8FFB99AB74D1257A967E1AF95341F1500F6D80CCB293ED295CC68761
                                Memory Dump Source
                                • Source File: 00000000.00000002.2140193314.00007FFB67980000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB67980000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ffb67980000_52B9Zcz8vg.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 1574258ea7134bf043c184a5ad7f793e028ad3fe93c831367c33b480f8e315d4
                                • Instruction ID: d5dfefea7f055a8cd2f6ebb3ef5a41bdcab77f809852669115cb6f89aaf75ce4
                                • Opcode Fuzzy Hash: 1574258ea7134bf043c184a5ad7f793e028ad3fe93c831367c33b480f8e315d4
                                • Instruction Fuzzy Hash: 6D01D8B2B0CA19DFDB54D66CEC525A873D1EB4AB1031503FBD009C7292DD24AC4287C1
                                Memory Dump Source
                                • Source File: 00000000.00000002.2140193314.00007FFB67980000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB67980000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ffb67980000_52B9Zcz8vg.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 1b3b559b320eb62ce5e180263c7a9ca6ddf4697b92beab836890984370ec724f
                                • Instruction ID: 17a3448a8e6d64d8eea10c6db43922dc1662fbd3c53d16e9a5a78ff129a02483
                                • Opcode Fuzzy Hash: 1b3b559b320eb62ce5e180263c7a9ca6ddf4697b92beab836890984370ec724f
                                • Instruction Fuzzy Hash: 4A01B1B1B08A19DFDB64DAACE8515A873E0EB5E71071102EBD00AD7392EE24AC4287C1
                                Memory Dump Source
                                • Source File: 00000000.00000002.2140193314.00007FFB67980000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB67980000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ffb67980000_52B9Zcz8vg.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: d62ddc238098a73ef12b7a1c422bcc95de586f77ded0013ce95dc8e755906089
                                • Instruction ID: a3c2a1d53d4fc4e602b9fc771d9dd1e4c9a7274b8ab3418925940870bf9191e0
                                • Opcode Fuzzy Hash: d62ddc238098a73ef12b7a1c422bcc95de586f77ded0013ce95dc8e755906089
                                • Instruction Fuzzy Hash: 1BF0179280E7D25FE32B5A7858755A03FB05B17110B1E0AEBD8C8DE0E7D80C5C8893A3
                                Memory Dump Source
                                • Source File: 00000000.00000002.2140193314.00007FFB67980000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB67980000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ffb67980000_52B9Zcz8vg.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: ffaa4247795cd76335967c61b15cd0f49ade9387eaa3099ccd2483c4ca832db8
                                • Instruction ID: f9f50d36c34a0e27e444a7b76bc1a11456aa94cdc7af11b2acc163ba4f3a4b4c
                                • Opcode Fuzzy Hash: ffaa4247795cd76335967c61b15cd0f49ade9387eaa3099ccd2483c4ca832db8
                                • Instruction Fuzzy Hash: BEF0B482A0E6C65FE796963C98741A82EC1AF97221B9907FEC049CB1E3DC0998498241
                                Memory Dump Source
                                • Source File: 00000000.00000002.2140193314.00007FFB67980000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB67980000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ffb67980000_52B9Zcz8vg.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: f66d6c069e305560c8f9ec4a69c1fed492764faa48a1bf084124a158efdbf083
                                • Instruction ID: 499d4a6d0085bd60713e5ffd34b6dc1d6e23345f6675069be59f009a201d4e3c
                                • Opcode Fuzzy Hash: f66d6c069e305560c8f9ec4a69c1fed492764faa48a1bf084124a158efdbf083
                                • Instruction Fuzzy Hash: 0FF0B48290CA539BF768997C98652B429C0D745510F190BF6D48C9A5D6DC4D9CC45381
                                Memory Dump Source
                                • Source File: 00000000.00000002.2140193314.00007FFB67980000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB67980000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ffb67980000_52B9Zcz8vg.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 3b5c3e34c0ebb66e843e13388f4d14944ba6d3ca21c0e7cce09149c07c9ea1c5
                                • Instruction ID: 83df134c0c9f5c5a7cae7a43ed4128969f70a874012ae329720e54490187d750
                                • Opcode Fuzzy Hash: 3b5c3e34c0ebb66e843e13388f4d14944ba6d3ca21c0e7cce09149c07c9ea1c5
                                • Instruction Fuzzy Hash: 4FE02640B0DD4BA6E789517DDC2423538C2EB8A250FA807F4900EC22D2DC08DC844181
                                Memory Dump Source
                                • Source File: 00000000.00000002.2140193314.00007FFB67980000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB67980000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ffb67980000_52B9Zcz8vg.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: e8c68aca1a3808a50a26175d11c1118001f73a20f608dde3f7efe13522a654cb
                                • Instruction ID: 9bbdcf19fb50bdcab4caef853e23e084b06645c68f32f2e898d17ab614fdec1e
                                • Opcode Fuzzy Hash: e8c68aca1a3808a50a26175d11c1118001f73a20f608dde3f7efe13522a654cb
                                • Instruction Fuzzy Hash: 28E09B71C1C68DAFDF15EB74C8654ED7FE0EF59300F5505E7E444C6092EE2496588741
                                Memory Dump Source
                                • Source File: 00000000.00000002.2140193314.00007FFB67980000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB67980000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ffb67980000_52B9Zcz8vg.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: cb796c2fd515b8cec2daad61368ff46a349e1ad7aab028df08d38c34fbe087f2
                                • Instruction ID: f61529894489d05bef51422b177d34c6808236f204cd688e40aac4b649f6d7b4
                                • Opcode Fuzzy Hash: cb796c2fd515b8cec2daad61368ff46a349e1ad7aab028df08d38c34fbe087f2
                                • Instruction Fuzzy Hash: 53A1C893A0D6A39BE3126F7CE8620FA7BE0DF522B576544F7C1D89E0D3DD18240B8291
                                Memory Dump Source
                                • Source File: 00000000.00000002.2140193314.00007FFB67980000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB67980000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ffb67980000_52B9Zcz8vg.jbxd
                                Similarity
                                • API ID:
                                • String ID:
                                • API String ID:
                                • Opcode ID: 8e079de701837acf544a76b2519bed82ced50b8180a8ab3b43d53dd1840ceafa
                                • Instruction ID: b7831ae8298c1e29c6b47ef6b293e368b9368a7478b9d581eb53c4c9ef992472
                                • Opcode Fuzzy Hash: 8e079de701837acf544a76b2519bed82ced50b8180a8ab3b43d53dd1840ceafa
                                • Instruction Fuzzy Hash: 5C5194D391D7D39EE3125E7CE8B50E92FE09F63264B6944F7C1A89E1D3DD08680A8291
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2140193314.00007FFB67980000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB67980000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ffb67980000_52B9Zcz8vg.jbxd
                                Similarity
                                • API ID:
                                • String ID: @&>$H&>$P&>$X&>$`&>$h&>$p&>
                                • API String ID: 0-2471632238
                                • Opcode ID: a9f3fe99c55d6da0eea68558f9f96663cb697545f1260c834c4e0820ddac3e8e
                                • Instruction ID: 34dedc17a8d149b3bc411094bca2498eb284bf577146d94ed90ab931d5a56d78
                                • Opcode Fuzzy Hash: a9f3fe99c55d6da0eea68558f9f96663cb697545f1260c834c4e0820ddac3e8e
                                • Instruction Fuzzy Hash: 01417D60E09B478FD746ABB8C9215A97BE2EF8A341B5044F3C50CCB296DD3C58C6C712
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2140193314.00007FFB67980000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB67980000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ffb67980000_52B9Zcz8vg.jbxd
                                Similarity
                                • API ID:
                                • String ID: 8'>$@'>$H'>$P'>$X'>$`'>
                                • API String ID: 0-301695758
                                • Opcode ID: f25fa341aa4cf506e3d95c5a29ff6a6a2b7277e2b3ea4b908c48803b3e6259ff
                                • Instruction ID: 46eac777b5f60eb9414c333dfd9a7dbd65641fbef31930130d8567366281f7b8
                                • Opcode Fuzzy Hash: f25fa341aa4cf506e3d95c5a29ff6a6a2b7277e2b3ea4b908c48803b3e6259ff
                                • Instruction Fuzzy Hash: 06315E60A4D7878FE746AFB8C9215957BE2EF4A34072145F3C54CCB297DA3858C68322
                                Strings
                                Memory Dump Source
                                • Source File: 00000000.00000002.2140193314.00007FFB67980000.00000040.00000800.00020000.00000000.sdmp, Offset: 00007FFB67980000, based on PE: false
                                Joe Sandbox IDA Plugin
                                • Snapshot File: hcaresult_0_2_7ffb67980000_52B9Zcz8vg.jbxd
                                Similarity
                                • API ID:
                                • String ID: &>$(&>$0&>$8&>
                                • API String ID: 0-1225604037
                                • Opcode ID: 758ff53ab6d5124928fcbc01ae90ab828a3eb50c325072fb7f9cfd9a3482aaba
                                • Instruction ID: 2fabf39be5728707f5308d98f7ca72244a1642edbd169c8416a239af06e8866c
                                • Opcode Fuzzy Hash: 758ff53ab6d5124928fcbc01ae90ab828a3eb50c325072fb7f9cfd9a3482aaba
                                • Instruction Fuzzy Hash: 7C413C60E49B8B8FE746AB78C9215A57BE2EF8A34171045F3C50CCB297DD3C58C68712