Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
17303071876386e352212a6fcbe671f992a5355b5429aa9e8a123b07340d12981e86c28206748.dat-decoded.exe

Overview

General Information

Sample name:17303071876386e352212a6fcbe671f992a5355b5429aa9e8a123b07340d12981e86c28206748.dat-decoded.exe
Analysis ID:1545600
MD5:b129cb1b9d3dcb2bcea9a5a836070070
SHA1:e4d9174aff0a87c95c108d961d34dc3c791a580b
SHA256:4c40d639d5f18b16a519e4be04c75440c02ab871a143ec2a27feed3392dc0ec5
Tags:base64-decodedexeuser-abuse_ch
Infos:

Detection

LummaC
Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Found malware configuration
Multi AV Scanner detection for submitted file
Yara detected LummaC Stealer
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
LummaC encrypted strings found
Machine Learning detection for sample
Sample uses string decryption to hide its real strings
AV process strings found (often used to terminate AV products)
Checks if the current process is being debugged
Detected potential crypto function
Found inlined nop instructions (likely shell or obfuscated code)
One or more processes crash
PE file does not import any functions
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Lumma Stealer, LummaC2 StealerLumma Stealer (aka LummaC2 Stealer) is an information stealer written in C language that has been available through a Malware-as-a-Service (MaaS) model on Russian-speaking forums since at least August 2022. It is believed to have been developed by the threat actor "Shamel", who goes by the alias "Lumma". Lumma Stealer primarily targets cryptocurrency wallets and two-factor authentication (2FA) browser extensions, before ultimately stealing sensitive information from the victim's machine. Once the targeted data is obtained, it is exfiltrated to a C2 server via HTTP POST requests using the user agent "TeslaBrowser/5.5"." The stealer also features a non-resident loader that is capable of delivering additional payloads via EXE, DLL, and PowerShell.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.lumma
{"C2 url": ["forbidstow.site", "dilemmadu.site", "seallysl.site", "goalyfeastz.site", "faulteyotk.site", "authorisev.site", "opposezmny.site", "servicedny.site", "contemteny.site"], "Build id": "1AsNN2--5148330480"}
SourceRuleDescriptionAuthorStrings
decrypted.binstrJoeSecurity_LummaCStealer_2Yara detected LummaC StealerJoe Security
    No Sigma rule has matched
    No Suricata rule has matched

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: 17303071876386e352212a6fcbe671f992a5355b5429aa9e8a123b07340d12981e86c28206748.dat-decoded.exeMalware Configuration Extractor: LummaC {"C2 url": ["forbidstow.site", "dilemmadu.site", "seallysl.site", "goalyfeastz.site", "faulteyotk.site", "authorisev.site", "opposezmny.site", "servicedny.site", "contemteny.site"], "Build id": "1AsNN2--5148330480"}
    Source: 17303071876386e352212a6fcbe671f992a5355b5429aa9e8a123b07340d12981e86c28206748.dat-decoded.exeReversingLabs: Detection: 31%
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.7% probability
    Source: 17303071876386e352212a6fcbe671f992a5355b5429aa9e8a123b07340d12981e86c28206748.dat-decoded.exeJoe Sandbox ML: detected
    Source: 17303071876386e352212a6fcbe671f992a5355b5429aa9e8a123b07340d12981e86c28206748.dat-decoded.exeString decryptor: servicedny.site
    Source: 17303071876386e352212a6fcbe671f992a5355b5429aa9e8a123b07340d12981e86c28206748.dat-decoded.exeString decryptor: authorisev.site
    Source: 17303071876386e352212a6fcbe671f992a5355b5429aa9e8a123b07340d12981e86c28206748.dat-decoded.exeString decryptor: faulteyotk.site
    Source: 17303071876386e352212a6fcbe671f992a5355b5429aa9e8a123b07340d12981e86c28206748.dat-decoded.exeString decryptor: dilemmadu.site
    Source: 17303071876386e352212a6fcbe671f992a5355b5429aa9e8a123b07340d12981e86c28206748.dat-decoded.exeString decryptor: contemteny.site
    Source: 17303071876386e352212a6fcbe671f992a5355b5429aa9e8a123b07340d12981e86c28206748.dat-decoded.exeString decryptor: goalyfeastz.site
    Source: 17303071876386e352212a6fcbe671f992a5355b5429aa9e8a123b07340d12981e86c28206748.dat-decoded.exeString decryptor: opposezmny.site
    Source: 17303071876386e352212a6fcbe671f992a5355b5429aa9e8a123b07340d12981e86c28206748.dat-decoded.exeString decryptor: seallysl.site
    Source: 17303071876386e352212a6fcbe671f992a5355b5429aa9e8a123b07340d12981e86c28206748.dat-decoded.exeString decryptor: forbidstow.site
    Source: 17303071876386e352212a6fcbe671f992a5355b5429aa9e8a123b07340d12981e86c28206748.dat-decoded.exeString decryptor: lid=%s&j=%s&ver=4.0
    Source: 17303071876386e352212a6fcbe671f992a5355b5429aa9e8a123b07340d12981e86c28206748.dat-decoded.exeString decryptor: TeslaBrowser/5.5
    Source: 17303071876386e352212a6fcbe671f992a5355b5429aa9e8a123b07340d12981e86c28206748.dat-decoded.exeString decryptor: - Screen Resoluton:
    Source: 17303071876386e352212a6fcbe671f992a5355b5429aa9e8a123b07340d12981e86c28206748.dat-decoded.exeString decryptor: - Physical Installed Memory:
    Source: 17303071876386e352212a6fcbe671f992a5355b5429aa9e8a123b07340d12981e86c28206748.dat-decoded.exeString decryptor: Workgroup: -
    Source: 17303071876386e352212a6fcbe671f992a5355b5429aa9e8a123b07340d12981e86c28206748.dat-decoded.exeString decryptor: 1AsNN2--5148330480
    Source: 17303071876386e352212a6fcbe671f992a5355b5429aa9e8a123b07340d12981e86c28206748.dat-decoded.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: 17303071876386e352212a6fcbe671f992a5355b5429aa9e8a123b07340d12981e86c28206748.dat-decoded.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Source: C:\Users\user\Desktop\17303071876386e352212a6fcbe671f992a5355b5429aa9e8a123b07340d12981e86c28206748.dat-decoded.exeCode function: 4x nop then mov dword ptr [eax+ebx], 20202020h1_2_00401000
    Source: C:\Users\user\Desktop\17303071876386e352212a6fcbe671f992a5355b5429aa9e8a123b07340d12981e86c28206748.dat-decoded.exeCode function: 4x nop then mov dword ptr [eax+ebx], 20202020h1_2_0040111D
    Source: C:\Users\user\Desktop\17303071876386e352212a6fcbe671f992a5355b5429aa9e8a123b07340d12981e86c28206748.dat-decoded.exeCode function: 4x nop then mov dword ptr [eax+ebx], 20202020h1_2_0040392F
    Source: C:\Users\user\Desktop\17303071876386e352212a6fcbe671f992a5355b5429aa9e8a123b07340d12981e86c28206748.dat-decoded.exeCode function: 4x nop then mov dword ptr [eax+ebx], 20202020h1_2_00403933
    Source: C:\Users\user\Desktop\17303071876386e352212a6fcbe671f992a5355b5429aa9e8a123b07340d12981e86c28206748.dat-decoded.exeCode function: 4x nop then mov dword ptr [eax+ebx], 20202020h1_2_0040393A
    Source: C:\Users\user\Desktop\17303071876386e352212a6fcbe671f992a5355b5429aa9e8a123b07340d12981e86c28206748.dat-decoded.exeCode function: 4x nop then cmp dword ptr [edi+esi*8], B62B8D10h1_2_0040D33A

    Networking

    barindex
    Source: Malware configuration extractorURLs: forbidstow.site
    Source: Malware configuration extractorURLs: dilemmadu.site
    Source: Malware configuration extractorURLs: seallysl.site
    Source: Malware configuration extractorURLs: goalyfeastz.site
    Source: Malware configuration extractorURLs: faulteyotk.site
    Source: Malware configuration extractorURLs: authorisev.site
    Source: Malware configuration extractorURLs: opposezmny.site
    Source: Malware configuration extractorURLs: servicedny.site
    Source: Malware configuration extractorURLs: contemteny.site
    Source: unknownDNS traffic detected: query: 241.42.69.40.in-addr.arpa replaycode: Name error (3)
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: global trafficDNS traffic detected: DNS query: 241.42.69.40.in-addr.arpa
    Source: Amcache.hve.4.drString found in binary or memory: http://upx.sf.net
    Source: C:\Users\user\Desktop\17303071876386e352212a6fcbe671f992a5355b5429aa9e8a123b07340d12981e86c28206748.dat-decoded.exeCode function: 1_2_00441AE51_2_00441AE5
    Source: C:\Users\user\Desktop\17303071876386e352212a6fcbe671f992a5355b5429aa9e8a123b07340d12981e86c28206748.dat-decoded.exeCode function: 1_2_0040B17B1_2_0040B17B
    Source: C:\Users\user\Desktop\17303071876386e352212a6fcbe671f992a5355b5429aa9e8a123b07340d12981e86c28206748.dat-decoded.exeCode function: 1_2_0040B1811_2_0040B181
    Source: C:\Users\user\Desktop\17303071876386e352212a6fcbe671f992a5355b5429aa9e8a123b07340d12981e86c28206748.dat-decoded.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6520 -s 224
    Source: 17303071876386e352212a6fcbe671f992a5355b5429aa9e8a123b07340d12981e86c28206748.dat-decoded.exeStatic PE information: No import functions for PE file found
    Source: 17303071876386e352212a6fcbe671f992a5355b5429aa9e8a123b07340d12981e86c28206748.dat-decoded.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: classification engineClassification label: mal84.troj.evad.winEXE@2/5@1/0
    Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6520
    Source: C:\Windows\SysWOW64\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\b3fc588e-2e1f-4e95-a06f-b3be1d605f71Jump to behavior
    Source: 17303071876386e352212a6fcbe671f992a5355b5429aa9e8a123b07340d12981e86c28206748.dat-decoded.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    Source: C:\Users\user\Desktop\17303071876386e352212a6fcbe671f992a5355b5429aa9e8a123b07340d12981e86c28206748.dat-decoded.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: 17303071876386e352212a6fcbe671f992a5355b5429aa9e8a123b07340d12981e86c28206748.dat-decoded.exeReversingLabs: Detection: 31%
    Source: unknownProcess created: C:\Users\user\Desktop\17303071876386e352212a6fcbe671f992a5355b5429aa9e8a123b07340d12981e86c28206748.dat-decoded.exe "C:\Users\user\Desktop\17303071876386e352212a6fcbe671f992a5355b5429aa9e8a123b07340d12981e86c28206748.dat-decoded.exe"
    Source: C:\Users\user\Desktop\17303071876386e352212a6fcbe671f992a5355b5429aa9e8a123b07340d12981e86c28206748.dat-decoded.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 6520 -s 224
    Source: C:\Users\user\Desktop\17303071876386e352212a6fcbe671f992a5355b5429aa9e8a123b07340d12981e86c28206748.dat-decoded.exeSection loaded: apphelp.dllJump to behavior
    Source: 17303071876386e352212a6fcbe671f992a5355b5429aa9e8a123b07340d12981e86c28206748.dat-decoded.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Source: C:\Users\user\Desktop\17303071876386e352212a6fcbe671f992a5355b5429aa9e8a123b07340d12981e86c28206748.dat-decoded.exeCode function: 1_2_00401525 push dword ptr [edx+eax-77h]; ret 1_2_0040152A
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: Amcache.hve.4.drBinary or memory string: VMware
    Source: Amcache.hve.4.drBinary or memory string: VMware Virtual USB Mouse
    Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin
    Source: Amcache.hve.4.drBinary or memory string: VMware-42 27 c5 9a 47 85 d6 84-53 49 ec ec 87 a6 6d 67
    Source: Amcache.hve.4.drBinary or memory string: VMware, Inc.
    Source: Amcache.hve.4.drBinary or memory string: VMware20,1hbin@
    Source: Amcache.hve.4.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
    Source: Amcache.hve.4.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
    Source: Amcache.hve.4.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
    Source: Amcache.hve.4.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
    Source: Amcache.hve.4.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
    Source: Amcache.hve.4.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
    Source: Amcache.hve.4.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
    Source: Amcache.hve.4.drBinary or memory string: vmci.sys
    Source: Amcache.hve.4.drBinary or memory string: vmci.syshbin`
    Source: Amcache.hve.4.drBinary or memory string: \driver\vmci,\driver\pci
    Source: Amcache.hve.4.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
    Source: Amcache.hve.4.drBinary or memory string: VMware20,1
    Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Generation Counter
    Source: Amcache.hve.4.drBinary or memory string: NECVMWar VMware SATA CD00
    Source: Amcache.hve.4.drBinary or memory string: VMware Virtual disk SCSI Disk Device
    Source: Amcache.hve.4.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
    Source: Amcache.hve.4.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
    Source: Amcache.hve.4.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
    Source: Amcache.hve.4.drBinary or memory string: VMware PCI VMCI Bus Device
    Source: Amcache.hve.4.drBinary or memory string: VMware VMCI Bus Device
    Source: Amcache.hve.4.drBinary or memory string: VMware Virtual RAM
    Source: Amcache.hve.4.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
    Source: Amcache.hve.4.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
    Source: C:\Users\user\Desktop\17303071876386e352212a6fcbe671f992a5355b5429aa9e8a123b07340d12981e86c28206748.dat-decoded.exeProcess queried: DebugPortJump to behavior
    Source: C:\Users\user\Desktop\17303071876386e352212a6fcbe671f992a5355b5429aa9e8a123b07340d12981e86c28206748.dat-decoded.exeProcess queried: DebugPortJump to behavior

    HIPS / PFW / Operating System Protection Evasion

    barindex
    Source: 17303071876386e352212a6fcbe671f992a5355b5429aa9e8a123b07340d12981e86c28206748.dat-decoded.exe, 00000001.00000000.1503201494.0000000000449000.00000008.00000001.01000000.00000003.sdmpString found in binary or memory: servicedny.site
    Source: 17303071876386e352212a6fcbe671f992a5355b5429aa9e8a123b07340d12981e86c28206748.dat-decoded.exe, 00000001.00000000.1503201494.0000000000449000.00000008.00000001.01000000.00000003.sdmpString found in binary or memory: authorisev.site
    Source: 17303071876386e352212a6fcbe671f992a5355b5429aa9e8a123b07340d12981e86c28206748.dat-decoded.exe, 00000001.00000000.1503201494.0000000000449000.00000008.00000001.01000000.00000003.sdmpString found in binary or memory: faulteyotk.site
    Source: 17303071876386e352212a6fcbe671f992a5355b5429aa9e8a123b07340d12981e86c28206748.dat-decoded.exe, 00000001.00000000.1503201494.0000000000449000.00000008.00000001.01000000.00000003.sdmpString found in binary or memory: dilemmadu.site
    Source: 17303071876386e352212a6fcbe671f992a5355b5429aa9e8a123b07340d12981e86c28206748.dat-decoded.exe, 00000001.00000000.1503201494.0000000000449000.00000008.00000001.01000000.00000003.sdmpString found in binary or memory: contemteny.site
    Source: 17303071876386e352212a6fcbe671f992a5355b5429aa9e8a123b07340d12981e86c28206748.dat-decoded.exe, 00000001.00000000.1503201494.0000000000449000.00000008.00000001.01000000.00000003.sdmpString found in binary or memory: goalyfeastz.site
    Source: 17303071876386e352212a6fcbe671f992a5355b5429aa9e8a123b07340d12981e86c28206748.dat-decoded.exe, 00000001.00000000.1503201494.0000000000449000.00000008.00000001.01000000.00000003.sdmpString found in binary or memory: opposezmny.site
    Source: 17303071876386e352212a6fcbe671f992a5355b5429aa9e8a123b07340d12981e86c28206748.dat-decoded.exe, 00000001.00000000.1503201494.0000000000449000.00000008.00000001.01000000.00000003.sdmpString found in binary or memory: seallysl.site
    Source: 17303071876386e352212a6fcbe671f992a5355b5429aa9e8a123b07340d12981e86c28206748.dat-decoded.exe, 00000001.00000000.1503201494.0000000000449000.00000008.00000001.01000000.00000003.sdmpString found in binary or memory: forbidstow.site
    Source: Amcache.hve.4.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
    Source: Amcache.hve.4.drBinary or memory string: msmpeng.exe
    Source: Amcache.hve.4.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
    Source: Amcache.hve.4.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
    Source: Amcache.hve.4.drBinary or memory string: MsMpEng.exe

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: decrypted.binstr, type: MEMORYSTR

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: decrypted.binstr, type: MEMORYSTR
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
    PowerShell
    1
    DLL Side-Loading
    1
    Process Injection
    1
    Virtualization/Sandbox Evasion
    OS Credential Dumping21
    Security Software Discovery
    Remote Services1
    Archive Collected Data
    1
    Encrypted Channel
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
    DLL Side-Loading
    1
    Process Injection
    LSASS Memory1
    Virtualization/Sandbox Evasion
    Remote Desktop ProtocolData from Removable Media1
    Non-Application Layer Protocol
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
    Deobfuscate/Decode Files or Information
    Security Account Manager1
    System Information Discovery
    SMB/Windows Admin SharesData from Network Shared Drive11
    Application Layer Protocol
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
    DLL Side-Loading
    NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script2
    Obfuscated Files or Information
    LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    17303071876386e352212a6fcbe671f992a5355b5429aa9e8a123b07340d12981e86c28206748.dat-decoded.exe32%ReversingLabs
    17303071876386e352212a6fcbe671f992a5355b5429aa9e8a123b07340d12981e86c28206748.dat-decoded.exe100%Joe Sandbox ML
    No Antivirus matches
    No Antivirus matches
    No Antivirus matches
    SourceDetectionScannerLabelLink
    http://upx.sf.net0%URL Reputationsafe
    NameIPActiveMaliciousAntivirus DetectionReputation
    241.42.69.40.in-addr.arpa
    unknown
    unknownfalse
      unknown
      NameMaliciousAntivirus DetectionReputation
      goalyfeastz.sitetrue
        unknown
        servicedny.sitetrue
          unknown
          contemteny.sitetrue
            unknown
            faulteyotk.sitetrue
              unknown
              opposezmny.sitetrue
                unknown
                dilemmadu.sitetrue
                  unknown
                  seallysl.sitetrue
                    unknown
                    forbidstow.sitetrue
                      unknown
                      authorisev.sitetrue
                        unknown
                        NameSourceMaliciousAntivirus DetectionReputation
                        http://upx.sf.netAmcache.hve.4.drfalse
                        • URL Reputation: safe
                        unknown
                        No contacted IP infos
                        Joe Sandbox version:41.0.0 Charoite
                        Analysis ID:1545600
                        Start date and time:2024-10-30 17:54:08 +01:00
                        Joe Sandbox product:CloudBasic
                        Overall analysis duration:0h 4m 24s
                        Hypervisor based Inspection enabled:false
                        Report type:full
                        Cookbook file name:default.jbs
                        Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
                        Number of analysed new started processes analysed:10
                        Number of new started drivers analysed:0
                        Number of existing processes analysed:0
                        Number of existing drivers analysed:0
                        Number of injected processes analysed:0
                        Technologies:
                        • HCA enabled
                        • EGA enabled
                        • AMSI enabled
                        Analysis Mode:default
                        Analysis stop reason:Timeout
                        Sample name:17303071876386e352212a6fcbe671f992a5355b5429aa9e8a123b07340d12981e86c28206748.dat-decoded.exe
                        Detection:MAL
                        Classification:mal84.troj.evad.winEXE@2/5@1/0
                        EGA Information:Failed
                        HCA Information:
                        • Successful, ratio: 100%
                        • Number of executed functions: 0
                        • Number of non-executed functions: 11
                        Cookbook Comments:
                        • Found application associated with file extension: .exe
                        • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
                        • Excluded IPs from analysis (whitelisted): 20.42.73.29
                        • Excluded domains from analysis (whitelisted): ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, otelrules.azureedge.net, blobcollector.events.data.trafficmanager.net, onedsblobprdeus15.eastus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
                        • Execution Graph export aborted for target 17303071876386e352212a6fcbe671f992a5355b5429aa9e8a123b07340d12981e86c28206748.dat-decoded.exe, PID 6520 because there are no executed function
                        • Not all processes where analyzed, report is missing behavior information
                        • VT rate limit hit for: 17303071876386e352212a6fcbe671f992a5355b5429aa9e8a123b07340d12981e86c28206748.dat-decoded.exe
                        TimeTypeDescription
                        12:55:26API Interceptor1x Sleep call for process: WerFault.exe modified
                        No context
                        No context
                        No context
                        No context
                        No context
                        Process:C:\Windows\SysWOW64\WerFault.exe
                        File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):65536
                        Entropy (8bit):0.7144704041180561
                        Encrypted:false
                        SSDEEP:96:4pF8hDDzswhA1yDf0QXIDcQzc6CmcE1cw3CX+HbHg6ZAX/d5FMT2SlPkpXmTA5fS:MmRzd0NXfHjEzuiFxZ24IO8e4
                        MD5:C15757141831704E21D22B802AFBC9E7
                        SHA1:EAF8CADF3CFC3B2CED50F9CEE42FBF2C727CF7F0
                        SHA-256:CF176E07476E0120CFB00902DAFED88FB6FDB8AC019276F175249AA1A54A648C
                        SHA-512:E558D8E16B64D5D088CD7E95B5CF97F2AEA6F7D937C10987938599FA214BFF34933F33F5A2907F63A41525ABBC1CC144FA94CEA354C47F6FE74C7C6EC723532F
                        Malicious:false
                        Reputation:low
                        Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.4.7.8.0.9.1.8.8.5.2.1.9.8.1.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.4.7.8.0.9.1.9.1.8.0.3.2.2.5.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.7.9.9.6.c.f.8.2.-.1.4.9.b.-.4.b.5.8.-.b.b.4.f.-.4.a.1.e.f.f.f.2.9.2.f.c.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.b.5.c.f.4.d.a.d.-.6.4.5.6.-.4.4.9.1.-.b.3.4.e.-.3.3.1.c.e.1.3.5.f.e.2.e.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.1.7.3.0.3.0.7.1.8.7.6.3.8.6.e.3.5.2.2.1.2.a.6.f.c.b.e.6.7.1.f.9.9.2.a.5.3.5.5.b.5.4.2.9.a.a.9.e.8.a.1.2.3.b.0.7.3.4.0.d.1.2.9.8.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.9.7.8.-.0.0.0.1.-.0.0.1.4.-.0.4.8.d.-.d.f.7.f.e.c.2.a.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.d.1.e.a.6.2.2.5.3.a.c.3.f.4.1.f.c.5.4.f.9.4.8.9.3.2.a.6.5.e.4.5.0.0.0.0.f.f.f.f.!.0.0.0.0.e.4.d.9.1.7.4.a.f.f.0.a.8.7.c.9.
                        Process:C:\Windows\SysWOW64\WerFault.exe
                        File Type:Mini DuMP crash report, 14 streams, Wed Oct 30 16:55:18 2024, 0x1205a4 type
                        Category:dropped
                        Size (bytes):19618
                        Entropy (8bit):2.053734717629547
                        Encrypted:false
                        SSDEEP:96:5G8y2WBkyyVfr6ZZRi7n8QepSWI/WItkIxg5v7jv:n4OrXg5Db
                        MD5:08040C4DBF4A19806DB1125CF6761FD7
                        SHA1:18C2BDBE00167BF63D08C20E09A42D61C80187AC
                        SHA-256:246023C9EA8CDACC4E52DD9C022A56D78C977D99B32FA3B5D876CB9D5AC34AF9
                        SHA-512:99BF616913969A5E560234215889CA643DF28E7093A832CEECBBA614C685FBE17AACF0210EFE82E7F0B3F481C5560B71723CCCDF7783842DA5C0E01B8FA5142E
                        Malicious:false
                        Reputation:low
                        Preview:MDMP..a..... ........d"g............4...............<.......d...<...........T.......8...........T...........H...ZC......................................................................................................eJ......L.......GenuineIntel............T.......x....d"g.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Windows\SysWOW64\WerFault.exe
                        File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):8544
                        Entropy (8bit):3.7054539763275063
                        Encrypted:false
                        SSDEEP:192:R6l7wVeJVd6AbI6YSXSU9VE93ugmf5JPWObpxr89ba3sf/hem:R6lXJf6AE6YCSU9Gtugmf5JPWO4a8f/h
                        MD5:D4755FA5A114FA9212E40C5D91851F2D
                        SHA1:5FF156BF3ADE1856658C110CC32A283060A496EE
                        SHA-256:243A06078C8E0338A6391F5D8173EBA52A2525CDC5964A35BAC510F3C5836513
                        SHA-512:B1E89C951E463908305AC720EA0B8F20CB768E998E8624C94AC2DF9E5AE59B7E30588DCB513882E7A4D860797A7D2091AD1785B7D8B3883A4CF80E12694ADDA3
                        Malicious:false
                        Reputation:low
                        Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.5.2.0.<./.P.i.
                        Process:C:\Windows\SysWOW64\WerFault.exe
                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):4893
                        Entropy (8bit):4.559126933188822
                        Encrypted:false
                        SSDEEP:48:cvIwWl8zsTJg77aI9VKWpW8VYMYm8M4JhaKKFR+q8CBmsg5fa3faId:uIjftI7Tr7VkJO2sgxavaId
                        MD5:B56865C62F599E447330DD1F761C8229
                        SHA1:2ACD848E7AE29F593547CAF6EAB48DD604AD99BF
                        SHA-256:D235F9A819F557BD961659BB334A7017843FC7B12660C69BD1FD8DCD0BE7B6C7
                        SHA-512:7169675053D17E99710F70034363D40D3510887E8B5D0178A84FAFF79EB9C8931F2915EBE79CBA3362F2B7E18710A707CE99EED7E060E87D56E4BD091FA9CD0E
                        Malicious:false
                        Reputation:low
                        Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="566398" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                        Process:C:\Windows\SysWOW64\WerFault.exe
                        File Type:MS Windows registry file, NT/2000 or above
                        Category:dropped
                        Size (bytes):1835008
                        Entropy (8bit):4.372599877157922
                        Encrypted:false
                        SSDEEP:6144:NFVfpi6ceLP/9skLmb0ayWWSPtaJG8nAge35OlMMhA2AX4WABlguNDiL:bV1QyWWI/glMM6kF7lq
                        MD5:FCAFC5736A52203687C356DE5CA18B26
                        SHA1:FADED12BC082D303A1D72D7CC0AF7A88B2B17E1A
                        SHA-256:4FF6C543D4AB03D6F89C54632D1BBEC36ED9409D5FD9145E908DAE5858717067
                        SHA-512:DC35C356150F73A3263C4C822EB5C7962276261FAC148C9B667B6589D6457FBF918E8DC6A11803761705E18C3809B1706F51514BCDCFF33184F1813ED3DC5771
                        Malicious:false
                        Reputation:low
                        Preview:regfC...C....\.Z.................... ....0......\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm.....*..............................................................................................................................................................................................................................................................................................................................................X...........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        File type:PE32 executable (GUI) Intel 80386, for MS Windows
                        Entropy (8bit):6.798205602755831
                        TrID:
                        • Win32 Executable (generic) a (10002005/4) 99.96%
                        • Generic Win/DOS Executable (2004/3) 0.02%
                        • DOS Executable Generic (2002/1) 0.02%
                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                        File name:17303071876386e352212a6fcbe671f992a5355b5429aa9e8a123b07340d12981e86c28206748.dat-decoded.exe
                        File size:352'809 bytes
                        MD5:b129cb1b9d3dcb2bcea9a5a836070070
                        SHA1:e4d9174aff0a87c95c108d961d34dc3c791a580b
                        SHA256:4c40d639d5f18b16a519e4be04c75440c02ab871a143ec2a27feed3392dc0ec5
                        SHA512:73f78a29b51c5d9fb135b82326e1ad6cb05cfbd1ff0b25729010e5f713a914f4bdb3a85b1a220c417eda0ab6f4b8f93a671a5b6d64fde2d82d3c8d0467efa8fa
                        SSDEEP:6144:7dGH3aV6ldgUHXAvgYi8w2HewuhLJcm7S3AXLyRmx6qA8gF/Idee:7yqV6ldgUHXRi4JcwKJRmx6H8yoH
                        TLSH:F4748D05EB7380A1CCC78C7561DEB77F997A6A0447384ED7CB5CDEA428A36E13839906
                        File Content Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..L......g.................D........................@.......................................@.................................R......
                        Icon Hash:00928e8e8686b000
                        Entrypoint:0x40d0b0
                        Entrypoint Section:.text
                        Digitally signed:false
                        Imagebase:0x400000
                        Subsystem:windows gui
                        Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                        DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
                        Time Stamp:0x6715CDA7 [Mon Oct 21 03:42:31 2024 UTC]
                        TLS Callbacks:
                        CLR (.Net) Version:
                        OS Version Major:6
                        OS Version Minor:0
                        File Version Major:6
                        File Version Minor:0
                        Subsystem Version Major:6
                        Subsystem Version Minor:0
                        Import Hash:
                        Instruction
                        nop
                        nop
                        nop
                        nop
                        nop
                        add eax, dword ptr [esp+edx*4+34h]
                        add eax, eax
                        mov dword ptr [esp+edx*4+0000093Ch], eax
                        add eax, dword ptr [esp+edx*4+38h]
                        add eax, eax
                        mov dword ptr [esp+edx*4+00000940h], eax
                        add edx, 02h
                        cmp ebx, edx
                        jne 00007FC62CCE4FA2h
                        loopne 00007FC62CCE5020h
                        mov bh, 83h
                        retn F602h
                        rol dword ptr [ecx], FFFFFF8Bh
                        mov word ptr [eax+ecx*8], fs
                        adc eax, 0D740000h
                        add eax, dword ptr [esp+edx*4+2Ch]
                        add eax, eax
                        mov dword ptr [esp+edx*4+00000934h], eax
                        test ecx, ecx
                        jng 00007FC62CCE50A3h
                        xor eax, eax
                        mov edx, dword ptr [esp+20h]
                        lea edi, dword ptr [edx+edx*8]
                        mov dword ptr [esi], ecx
                        add al, EBh
                        jp 00007FC62CCE4F93h
                        loop 00007FC62CCE4FD7h
                        mov esi, dword ptr [esp+10h]
                        add edx, esi
                        shl edi, 06h
                        add edi, esi
                        mov dword ptr [esp+04h], edi
                        jmp 00007FC62CCE4FFAh
                        nop
                        nop
                        nop
                        nop
                        nop
                        nop
                        nop
                        nop
                        nop
                        nop
                        nop
                        nop
                        mov ecx, dword ptr [esp+04h]
                        mov word ptr [ecx+eax*2+00008852h], di
                        mov ecx, dword ptr [esp+000015C8h]
                        inc eax
                        cmp eax, ecx
                        add al, ah
                        dec esi
                        mov bh, 84h
                        xchg byte ptr [eax], al
                        add byte ptr [eax], al
                        add al, ah
                        dec esi
                        mov bh, B6h
                        pushfd
                        adc byte ptr [edx], dl
                        pop dword ptr [eax]
                        add byte ptr [ebp-74148B25h], al
                        mov word ptr [esp+esi-72FFFFF7h], ds
                        jns 00007FC62CCE4FD3h
                        mov dword ptr [esp+ebx*4+00000934h], edi
                        xor eax, esi
                        loopne 00007FC62CCE5020h
                        mov bh, 80h
                        push cs
                        add al, EBh
                        jnp 00007FC62CCE4FD6h
                        jc 00007FC62CCE5011h
                        NameVirtual AddressVirtual Size Is in Section
                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IMPORT0x480520x8c.rdata
                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x590000x4b80.reloc
                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IAT0x4819c0xbc.rdata
                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                        .text0x10000x442b80x444002cd4ae25ebdaee6c85ce1315e56eabcfFalse0.5441170157967034data6.641637773832036IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        .rdata0x460000x25270x26009175939b333ffddb8594b46408474ea6False0.6291118421052632data6.741066085511267IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .data0x490000xf5180x6200a96b0289e7e747db1c5b957a9871e7aeFalse0.5073740433673469data6.801200860672732IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        .reloc0x590000x4b800x4c00155d78560b0a79f1f694bfbcf31380faFalse0.527086759868421data6.221406643507071IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                        TimestampSource PortDest PortSource IPDest IP
                        Oct 30, 2024 17:55:49.158371925 CET5362373162.159.36.2192.168.2.8
                        Oct 30, 2024 17:55:49.804605007 CET5634953192.168.2.81.1.1.1
                        Oct 30, 2024 17:55:49.813277006 CET53563491.1.1.1192.168.2.8
                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                        Oct 30, 2024 17:55:49.804605007 CET192.168.2.81.1.1.10xd861Standard query (0)241.42.69.40.in-addr.arpaPTR (Pointer record)IN (0x0001)false
                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                        Oct 30, 2024 17:55:49.813277006 CET1.1.1.1192.168.2.80xd861Name error (3)241.42.69.40.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false

                        Click to jump to process

                        Click to jump to process

                        Click to dive into process behavior distribution

                        Click to jump to process

                        Target ID:1
                        Start time:12:55:18
                        Start date:30/10/2024
                        Path:C:\Users\user\Desktop\17303071876386e352212a6fcbe671f992a5355b5429aa9e8a123b07340d12981e86c28206748.dat-decoded.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Users\user\Desktop\17303071876386e352212a6fcbe671f992a5355b5429aa9e8a123b07340d12981e86c28206748.dat-decoded.exe"
                        Imagebase:0x400000
                        File size:352'809 bytes
                        MD5 hash:B129CB1B9D3DCB2BCEA9A5A836070070
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:low
                        Has exited:false

                        Target ID:4
                        Start time:12:55:18
                        Start date:30/10/2024
                        Path:C:\Windows\SysWOW64\WerFault.exe
                        Wow64 process (32bit):true
                        Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 6520 -s 224
                        Imagebase:0xa0000
                        File size:483'680 bytes
                        MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Reset < >
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.2751872691.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.2751851359.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.2751918788.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.2751941761.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.2751970048.0000000000449000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.2751996538.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_17303071876386e352212a6fcbe671f992a5355b5429aa9e8a123b07340d12981e86c2.jbxd
                          Similarity
                          • API ID:
                          • String ID: $ $ $ $ $ $
                          • API String ID: 0-935225467
                          • Opcode ID: 17752df14cf231cf3a5cad0906fa8ff63b9da85ee2eadaf2473d63c7884d176f
                          • Instruction ID: 50ea3f66718b9f0aec2dde1cafbd8e4c0de0bc4ea73b4abfd2f3b225e7e50961
                          • Opcode Fuzzy Hash: 17752df14cf231cf3a5cad0906fa8ff63b9da85ee2eadaf2473d63c7884d176f
                          • Instruction Fuzzy Hash: AC515CB16047418FD32A8F28C8947A67F96EF62305F1941AFD0825B3A1D7B89E4AC7C5
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.2751872691.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.2751851359.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.2751918788.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.2751941761.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.2751970048.0000000000449000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.2751996538.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_17303071876386e352212a6fcbe671f992a5355b5429aa9e8a123b07340d12981e86c2.jbxd
                          Similarity
                          • API ID:
                          • String ID: $ $ $ $ $ $
                          • API String ID: 0-935225467
                          • Opcode ID: 2e33b8012afffd382324786de6161d5ed95be3f34b664e05fdb18cb1236f322f
                          • Instruction ID: f7c5b6151606094664de1af60f9128b8343ad51cb9d90a512a25ca090a2e4e3f
                          • Opcode Fuzzy Hash: 2e33b8012afffd382324786de6161d5ed95be3f34b664e05fdb18cb1236f322f
                          • Instruction Fuzzy Hash: 333109B15047419FD32A8F24889862B7F57AB62305B1982BFC4511B3E2D3F8DA19C7C5
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.2751872691.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.2751851359.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.2751918788.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.2751941761.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.2751970048.0000000000449000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.2751996538.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_17303071876386e352212a6fcbe671f992a5355b5429aa9e8a123b07340d12981e86c2.jbxd
                          Similarity
                          • API ID:
                          • String ID: $ $ $ $ $ $
                          • API String ID: 0-935225467
                          • Opcode ID: 49c2affa5c4a782c1c689248716a00831cc040758001de74c681f77671d11f2d
                          • Instruction ID: 8d1535539f6c5361cf9dca1fd3e7e74b7c3d02e9c21871ba0092eb5ffd02d52e
                          • Opcode Fuzzy Hash: 49c2affa5c4a782c1c689248716a00831cc040758001de74c681f77671d11f2d
                          • Instruction Fuzzy Hash: 6131A3B1A047115ED32A8F14889862BBE97AB62315F1982BBC0516B3E1D3F8DA1DC7C5
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.2751872691.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.2751851359.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.2751918788.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.2751941761.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.2751970048.0000000000449000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.2751996538.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_17303071876386e352212a6fcbe671f992a5355b5429aa9e8a123b07340d12981e86c2.jbxd
                          Similarity
                          • API ID:
                          • String ID: $ $ $ $ $ $
                          • API String ID: 0-935225467
                          • Opcode ID: c7c0a1906e0768bdf90a7f9c399730e58ad1ac733ee80ebb865cf0bd2198ee2e
                          • Instruction ID: 667a8602ed86c8e57a971cd8e4128e82d883590cc2420ca462f20316beda6c97
                          • Opcode Fuzzy Hash: c7c0a1906e0768bdf90a7f9c399730e58ad1ac733ee80ebb865cf0bd2198ee2e
                          • Instruction Fuzzy Hash: 8A31B2B19047115ED32A8F14889872BBE57AB62315F1982BBC0516B3E1D3F89A1DC7C5
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.2751872691.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.2751851359.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.2751918788.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.2751941761.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.2751970048.0000000000449000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.2751996538.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_17303071876386e352212a6fcbe671f992a5355b5429aa9e8a123b07340d12981e86c2.jbxd
                          Similarity
                          • API ID:
                          • String ID: $ $ $ $ $ $
                          • API String ID: 0-935225467
                          • Opcode ID: 8d3796677ec12c3e82e6e6b8a7962ee428d6520e226334f5d02b582e22b1f71c
                          • Instruction ID: a3f89da26ddce334d935fd876fc161bfabed00f9a58923f1678de83345a9f44d
                          • Opcode Fuzzy Hash: 8d3796677ec12c3e82e6e6b8a7962ee428d6520e226334f5d02b582e22b1f71c
                          • Instruction Fuzzy Hash: 1E015EF25113008FC32E8F41D8D493BBF27A6B2314326A2AFC0402B261D3B5C62DCB88
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.2751872691.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.2751851359.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.2751918788.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.2751941761.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.2751970048.0000000000449000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.2751996538.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_17303071876386e352212a6fcbe671f992a5355b5429aa9e8a123b07340d12981e86c2.jbxd
                          Similarity
                          • API ID:
                          • String ID: ;:54
                          • API String ID: 0-2887251705
                          • Opcode ID: 9ffb4b5fc311a7ea9b3c9a52ab1c4950dd35392c164d49bdf607f4ad9d3b4da4
                          • Instruction ID: c9837bf11cf4ad60dd6dd8dd9122ae42f90ca62632c53ad74a67825a83bc24ac
                          • Opcode Fuzzy Hash: 9ffb4b5fc311a7ea9b3c9a52ab1c4950dd35392c164d49bdf607f4ad9d3b4da4
                          • Instruction Fuzzy Hash: F5A1BE72B153809FE715DA29DC807A6BF93EB96300F1D84AFD481DB322E6399C81C345
                          Memory Dump Source
                          • Source File: 00000001.00000002.2751872691.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.2751851359.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.2751918788.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.2751941761.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.2751970048.0000000000449000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.2751996538.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_17303071876386e352212a6fcbe671f992a5355b5429aa9e8a123b07340d12981e86c2.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 715d7916b224c39307e0617a062feb3ddebb362834602855e4efd5692a3746ef
                          • Instruction ID: b7764c4af62fa0c2d5b5ef5cd1ab6a06a14ec5ca4f1d67a2cca15874c182747d
                          • Opcode Fuzzy Hash: 715d7916b224c39307e0617a062feb3ddebb362834602855e4efd5692a3746ef
                          • Instruction Fuzzy Hash: 64414D7110D3809FD3258B68884065FBFE0AFAA604F480D5DF5C5AB383C665E619CBAB
                          Memory Dump Source
                          • Source File: 00000001.00000002.2751872691.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.2751851359.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.2751918788.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.2751941761.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.2751970048.0000000000449000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.2751996538.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_17303071876386e352212a6fcbe671f992a5355b5429aa9e8a123b07340d12981e86c2.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: e854304da8fa9dae1a0fad74b231f64dd279c4c28cf09559f9af3042c2b94788
                          • Instruction ID: 15271058e7cda56ff3f9a36a900eb8e385046b1bc0e6906e50e720d0b9c466b1
                          • Opcode Fuzzy Hash: e854304da8fa9dae1a0fad74b231f64dd279c4c28cf09559f9af3042c2b94788
                          • Instruction Fuzzy Hash: 6F414C7110D3808FD3158B6C884165FBFE0AFAA604F480D5DF5C5AB383C665E619CBAB
                          Memory Dump Source
                          • Source File: 00000001.00000002.2751872691.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.2751851359.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.2751918788.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.2751941761.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.2751970048.0000000000449000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.2751996538.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_17303071876386e352212a6fcbe671f992a5355b5429aa9e8a123b07340d12981e86c2.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: d11eec9fd47ec1b78fe6c8e8cf6956651b435ef2a06d35e7a1a25cb7d39ead52
                          • Instruction ID: 4efda905ac7a41cadf9716579617f48ebd0f1d3c79b6496c68504865d56f4ba9
                          • Opcode Fuzzy Hash: d11eec9fd47ec1b78fe6c8e8cf6956651b435ef2a06d35e7a1a25cb7d39ead52
                          • Instruction Fuzzy Hash: 7F11023390635087EB144B7258912BEB7629BBE310F4D116FC851277C3D26A8C41C3C8
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.2751872691.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.2751851359.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.2751918788.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.2751941761.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.2751970048.0000000000449000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.2751996538.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_17303071876386e352212a6fcbe671f992a5355b5429aa9e8a123b07340d12981e86c2.jbxd
                          Similarity
                          • API ID:
                          • String ID: I$K$L$N$V$V$X$Y$Y$]$_$q
                          • API String ID: 0-2073889574
                          • Opcode ID: b165176244f22e35e2e3b90bdc6271b02760ab0f0694d20f600af0625ece2cfe
                          • Instruction ID: 43827593aa6497e58040c952b9477bc89a4bd2f44540a878b620f7f54beaff88
                          • Opcode Fuzzy Hash: b165176244f22e35e2e3b90bdc6271b02760ab0f0694d20f600af0625ece2cfe
                          • Instruction Fuzzy Hash: A8613C7150C3C18FD3219F2888843AABFD19B57324F185AAFD4D54B382C67D894B9797
                          Strings
                          Memory Dump Source
                          • Source File: 00000001.00000002.2751872691.0000000000401000.00000020.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                          • Associated: 00000001.00000002.2751851359.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.2751918788.0000000000446000.00000002.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.2751941761.0000000000448000.00000004.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.2751970048.0000000000449000.00000008.00000001.01000000.00000003.sdmpDownload File
                          • Associated: 00000001.00000002.2751996538.0000000000459000.00000002.00000001.01000000.00000003.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_1_2_400000_17303071876386e352212a6fcbe671f992a5355b5429aa9e8a123b07340d12981e86c2.jbxd
                          Similarity
                          • API ID:
                          • String ID: 9tWU$<194$JHz~$UW$^
                          • API String ID: 0-831947292
                          • Opcode ID: 5610f1f6036bc3f1d17eeeceb877d1041e662c19a944b10d508c4df94d2e4234
                          • Instruction ID: 3abd27d06bb50cb3e07a1f710ed1dcbcc1a7b5c52bb8c7ac571728cc573a4b06
                          • Opcode Fuzzy Hash: 5610f1f6036bc3f1d17eeeceb877d1041e662c19a944b10d508c4df94d2e4234
                          • Instruction Fuzzy Hash: CB4119311083919FD726CF25885076BBFE0AFA7304F084DAED4D65B392D739891AC766