ResMed Cloud Connect-x64.exe

Sample information


0

Antivirus detections

0

IDS alerts

3

Processes

0

Http events

0

Contacted hosts

0

DNS Requests

    10


    Score

Current activity of this Sample



Blacklist timeline


First seen: Wed Jul 16 2025 15:15:04 GMT+0000
Last seen: Wed Jul 16 2025 16:00:08 GMT+0000
Period: an hour

Hashes
Filename:
ResMed Cloud Connect-x64.exe
md5:
727aade221878cf7daff0853bfe35a05
sha1:
753a7c77e9c430fe6574b79dea46f271be8f4b14
sha256:
04ff120b095ffcb561c55ee6fe6e1d94cd407216482efd95d9d69f7f9272309b

In depth details
Filetype:
PE32 executable (GUI) Intel 80386, for MS Windows, ...
Size (Bytes):
89630312
Classification:
malicious

Dates
Indexed:
Wed Jul 16 2025 14:53:56 GMT+0000 (2 months ago)
Last modified:
Wed Jul 16 2025 16:00:09 GMT+0000 (2 months ago)

Developers can check API Specification here:


Request:

          
curl -H "Authorization: Bearer <API_KEY>" https://api.maltiverse.com/sample/04ff120b095ffcb561c55ee6fe6e1d94cd407216482efd95d9d69f7f9272309b
        

Request:

Alternatively you can use Maltiverse Python3 Library:
          
import requests
import json

url = 'https://api.maltiverse.com/sample/04ff120b095ffcb561c55ee6fe6e1d94cd407216482efd95d9d69f7f9272309b'
response = requests.get(url)
print(json.dumps(response.json(), indent=4, sort_keys=True))
        

Request:

          
$url = 'https://api.maltiverse.com/sample/04ff120b095ffcb561c55ee6fe6e1d94cd407216482efd95d9d69f7f9272309b'
$headers =  @{Authorization=("Bearer {0}" -f "<API_KEY>")}
$response = Invoke-RestMethod $url -Headers $headers
Write-Output $response
        

Response:

      
{
    "blacklist": [
        {
            "count": 5,
            "description": "Generic Malware",
            "first_seen": "2025-07-16 15:15:04",
            "last_seen": "2025-07-16 16:00:08",
            "ref": [
                21745
            ],
            "source": "Hybrid-Analysis"
        }
    ],
    "classification": "malicious",
    "creation_time": "2025-07-16 14:53:56",
    "filename": [
        "ResMed Cloud Connect-x64.exe"
    ],
    "filetype": "PE32 executable (GUI) Intel 80386, for MS Windows, ...",
    "is_alive": false,
    "is_cdn": false,
    "is_cnc": false,
    "is_distributing_malware": false,
    "is_hosting": false,
    "is_iot_threat": false,
    "is_known_attacker": false,
    "is_known_scanner": false,
    "is_mining_pool": false,
    "is_open_proxy": false,
    "is_phishing": false,
    "is_sinkhole": false,
    "is_storing_phishing": false,
    "is_tor_node": false,
    "is_vpn_node": false,
    "md5": "727aade221878cf7daff0853bfe35a05",
    "modification_time": "2025-07-16 16:00:09",
    "process_list": [
        {
            "name": "ResMedCloudConnect-x64.exe",
            "normalizedpath": "C:\\ResMedCloudConnect-x64.exe",
            "sha256": "04ff120b095ffcb561c55ee6fe6e1d94cd407216482efd95d9d69f7f9272309b",
            "uid": "00000000-00002140"
        },
        {
            "name": "c2c.exe",
            "normalizedpath": "%PROGRAMFILES%\\(x86)\\ResMed Cloud Connect\\c2c.exe",
            "sha256": "41dbe6a68c36bbfa6f95dfdff1a5aa6fad6cfed5228f76103ec355d648033ff0",
            "uid": "00000000-00004192"
        },
        {
            "commandline": "-classpath \"%PROGRAMFILES%\\(x86)\\ResMed Cloud Connect\\c2c.exe\" easycare.application.ApplicationInitializer",
            "name": "javaw.exe",
            "normalizedpath": "%PROGRAMFILES%\\(x86)\\ResMed Cloud Connect\\jre\\bin\\javaw.exe",
            "sha256": "fad9efe72c515149082b102e8ac3b4e328df470ce83d0bd69c352b8365aa6662",
            "uid": "00000000-00002840"
        }
    ],
    "score": 10,
    "scoring_executed_time": "2025-07-16 15:15:05",
    "sha1": "753a7c77e9c430fe6574b79dea46f271be8f4b14",
    "sha256": "04ff120b095ffcb561c55ee6fe6e1d94cd407216482efd95d9d69f7f9272309b",
    "size": 89630312,
    "type": "sample"
}
    
Process list
uid
00000000-00002140
commandline
name
ResMedCloudConnect-x64.exe
normalizedpath
C:\ResMedCloudConnect-x64.exe
sha256
04ff120b095ffcb561c55ee6fe6e1d94cd407216482efd95d9d69f7f9272309b
uid
00000000-00004192
commandline
name
c2c.exe
normalizedpath
%PROGRAMFILES%\(x86)\ResMed Cloud Connect\c2c.exe
sha256
41dbe6a68c36bbfa6f95dfdff1a5aa6fad6cfed5228f76103ec355d648033ff0
uid
00000000-00002840
commandline
-classpath "%PROGRAMFILES%\(x86)\ResMed Cloud Connect\c2c.exe" easycare.application.ApplicationInitializer
name
javaw.exe
normalizedpath
%PROGRAMFILES%\(x86)\ResMed Cloud Connect\jre\bin\javaw.exe
sha256
fad9efe72c515149082b102e8ac3b4e328df470ce83d0bd69c352b8365aa6662