Create Interactive Tour

Windows Analysis Report
wuauclt.exe

Overview

General Information

Sample name:wuauclt.exe
Analysis ID:1358920
MD5:4d45fa5dd472e526cdf376d077ebd61b
SHA1:61e8cd1e92549c404c3ad2570e98d81b563bcffd
SHA256:971e53c90306a7b13ac6ad1726360aab5dcab418839d4ed53735cbc1e2b40bcf
Tags:exe
Infos:

Detection

Score:22
Range:0 - 100
Whitelisted:false
Confidence:60%

Signatures

Potentially malicious time measurement code found
Contains functionality for execution timing, often used to detect debuggers
Detected potential crypto function
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious

Analysis Advice

Some HTTP requests failed (404). It is likely that the sample will exhibit less behavior.
Sample may offer command line options, please run it with the 'Execute binary with arguments' cookbook (it's possible that the command line switches require additional characters like: "-", "/", "--")
  • System is w10x64
  • wuauclt.exe (PID: 5256 cmdline: C:\Users\user\Desktop\wuauclt.exe MD5: 4D45FA5DD472E526CDF376D077EBD61B)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results
Source: unknownHTTPS traffic detected: 18.213.222.111:443 -> 192.168.2.6:49708 version: TLS 1.2
Source: unknownHTTPS traffic detected: 54.161.234.33:443 -> 192.168.2.6:49709 version: TLS 1.2
Source: wuauclt.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: C:\Users\pingu\source\repos\ICEBERG\x64\Release\ICEBERGx64.pdb source: wuauclt.exe
Source: Joe Sandbox ViewJA3 fingerprint: a0e9f5d64349fb13191bc781f81f42e1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET /midlertidig/60de5f4a2aacbe743fbd443199de7557/key.pem HTTP/1.1Connection: Keep-AliveUser-Agent: Polar Tech Inc. - Security Module V.1.22474487139Host: www.spst.no
Source: global trafficHTTP traffic detected: GET /midlertidig/60de5f4a2aacbe743fbd443199de7557/key.pem HTTP/1.1Connection: Keep-AliveUser-Agent: Polar Tech Inc. - Security Module V.1.22474487139Host: spst.no
Source: unknownDNS traffic detected: queries for: www.spst.no
Source: global trafficHTTP traffic detected: HTTP/1.1 404 Not FoundAge: 0Cache-Control: public,max-age=0,must-revalidateCache-Status: "Netlify Edge"; fwd=missContent-Type: text/html; charset=utf-8Date: Mon, 11 Dec 2023 20:30:40 GMTEtag: 1637840766-sslServer: NetlifyStrict-Transport-Security: max-age=31536000X-Nf-Request-Id: 01HHD967FFRZN8PDG409BJFPQNConnection: closeTransfer-Encoding: chunked
Source: wuauclt.exe, 00000000.00000003.2161093447.00000185DA5AC000.00000004.00000020.00020000.00000000.sdmp, wuauclt.exe, 00000000.00000003.2183310928.00000185DA5A9000.00000004.00000020.00020000.00000000.sdmp, wuauclt.exe, 00000000.00000002.2461466704.00000185DA5B2000.00000004.00000020.00020000.00000000.sdmp, wuauclt.exe, 00000000.00000003.2183664281.00000185DA5AE000.00000004.00000020.00020000.00000000.sdmp, wuauclt.exe, 00000000.00000003.2160622589.00000185DA5AF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://answers.netlify.com/t/support-guide-i-ve-deployed-my-site-but-i-still-see-page-not-found/125
Source: wuauclt.exe, 00000000.00000002.2461696769.00000185DA62C000.00000004.00000020.00020000.00000000.sdmp, wuauclt.exe, 00000000.00000003.2183209362.00000185DA629000.00000004.00000020.00020000.00000000.sdmp, wuauclt.exe, 00000000.00000003.2161093447.00000185DA5AC000.00000004.00000020.00020000.00000000.sdmp, wuauclt.exe, 00000000.00000003.2160586409.00000185DA62D000.00000004.00000020.00020000.00000000.sdmp, wuauclt.exe, 00000000.00000003.2161093447.00000185DA615000.00000004.00000020.00020000.00000000.sdmp, wuauclt.exe, 00000000.00000003.2160607865.00000185DA629000.00000004.00000020.00020000.00000000.sdmp, wuauclt.exe, 00000000.00000003.2160622589.00000185DA5AF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://fonts.googleapis.com/css?family=Roboto:400
Source: wuauclt.exe, 00000000.00000003.2161093447.00000185DA5D0000.00000004.00000020.00020000.00000000.sdmp, wuauclt.exe, 00000000.00000003.2183799723.00000185DA5E3000.00000004.00000020.00020000.00000000.sdmp, wuauclt.exe, 00000000.00000003.2183310928.00000185DA5D0000.00000004.00000020.00020000.00000000.sdmp, wuauclt.exe, 00000000.00000002.2461641118.00000185DA5E4000.00000004.00000020.00020000.00000000.sdmp, wuauclt.exe, 00000000.00000003.2160797867.00000185DA5E3000.00000004.00000020.00020000.00000000.sdmp, wuauclt.exe, 00000000.00000003.2160622589.00000185DA5D0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://spst.no
Source: wuauclt.exe, 00000000.00000003.2161093447.00000185DA5D0000.00000004.00000020.00020000.00000000.sdmp, wuauclt.exe, 00000000.00000003.2160797867.00000185DA5E3000.00000004.00000020.00020000.00000000.sdmp, wuauclt.exe, 00000000.00000003.2160622589.00000185DA5D0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://spst.no/
Source: wuauclt.exe, 00000000.00000003.2160797867.00000185DA615000.00000004.00000020.00020000.00000000.sdmp, wuauclt.exe, 00000000.00000003.2183310928.00000185DA5D0000.00000004.00000020.00020000.00000000.sdmp, wuauclt.exe, 00000000.00000003.2160622589.00000185DA591000.00000004.00000020.00020000.00000000.sdmp, wuauclt.exe, 00000000.00000003.2160622589.00000185DA5D0000.00000004.00000020.00020000.00000000.sdmp, wuauclt.exe, 00000000.00000003.2161093447.00000185DA615000.00000004.00000020.00020000.00000000.sdmp, wuauclt.exe, 00000000.00000003.2160607865.00000185DA629000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://spst.no/midlertidig/60de5f4a2aacbe743fbd443199de7557/key.pem
Source: wuauclt.exe, 00000000.00000003.2160607865.00000185DA629000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://spst.no/midlertidig/60de5f4a2aacbe743fbd443199de7557/key.pem0
Source: wuauclt.exe, 00000000.00000003.2160797867.00000185DA615000.00000004.00000020.00020000.00000000.sdmp, wuauclt.exe, 00000000.00000003.2161093447.00000185DA615000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://spst.no/midlertidig/60de5f4a2aacbe743fbd443199de7557/key.pemA
Source: wuauclt.exe, 00000000.00000003.2160607865.00000185DA629000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://spst.no/midlertidig/60de5f4a2aacbe743fbd443199de7557/key.pemLocationETagAuthentication-InfoA
Source: wuauclt.exe, 00000000.00000003.2161093447.00000185DA5D0000.00000004.00000020.00020000.00000000.sdmp, wuauclt.exe, 00000000.00000003.2160622589.00000185DA5D0000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://spst.no:443/midlertidig/60de5f4a2aacbe743fbd443199de7557/key.pem
Source: wuauclt.exe, 00000000.00000003.2160622589.00000185DA591000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.spst.no/midlertidig/60de5f4a2aacbe743fbd443199de7557/key.pem
Source: wuauclt.exe, 00000000.00000003.2160622589.00000185DA5AF000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.spst.no/midlertidig/60de5f4a2aacbe743fbd443199de7557/key.pemJ
Source: wuauclt.exe, 00000000.00000003.2160622589.00000185DA591000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.spst.no/pc6
Source: wuauclt.exe, 00000000.00000003.2160622589.00000185DA57A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.spst.no:443/midlertidig/60de5f4a2aacbe743fbd443199de7557/key.pem
Source: unknownNetwork traffic detected: HTTP traffic on port 49708 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49709 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49709
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49708
Source: unknownHTTPS traffic detected: 18.213.222.111:443 -> 192.168.2.6:49708 version: TLS 1.2
Source: unknownHTTPS traffic detected: 54.161.234.33:443 -> 192.168.2.6:49709 version: TLS 1.2
Source: C:\Users\user\Desktop\wuauclt.exeCode function: 0_2_00007FF693DB43E00_2_00007FF693DB43E0
Source: C:\Users\user\Desktop\wuauclt.exeCode function: 0_2_00007FF693DB81C00_2_00007FF693DB81C0
Source: C:\Users\user\Desktop\wuauclt.exeCode function: 0_2_00007FF693DB46A00_2_00007FF693DB46A0
Source: C:\Users\user\Desktop\wuauclt.exeCode function: 0_2_00007FF693DB5F400_2_00007FF693DB5F40
Source: classification engineClassification label: sus22.evad.winEXE@1/0@2/2
Source: wuauclt.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\wuauclt.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: wuauclt.exeString found in binary or memory: id-cmc-addExtensions
Source: wuauclt.exeString found in binary or memory: set-addPolicy
Source: wuauclt.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: wuauclt.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: wuauclt.exeStatic file information: File size 1871872 > 1048576
Source: wuauclt.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x143e00
Source: wuauclt.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: wuauclt.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: wuauclt.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: wuauclt.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: wuauclt.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: wuauclt.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: wuauclt.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: wuauclt.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: C:\Users\pingu\source\repos\ICEBERG\x64\Release\ICEBERGx64.pdb source: wuauclt.exe
Source: wuauclt.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: wuauclt.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: wuauclt.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: wuauclt.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: wuauclt.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: initial sampleStatic PE information: section name: .text entropy: 6.960538009860704
Source: C:\Users\user\Desktop\wuauclt.exeCode function: 0_2_00007FF693DB1330 rdtsc 0_2_00007FF693DB1330
Source: C:\Users\user\Desktop\wuauclt.exe TID: 3048Thread sleep time: -30000s >= -30000sJump to behavior
Source: wuauclt.exe, 00000000.00000002.2461360978.00000185DA55B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWP
Source: wuauclt.exe, 00000000.00000002.2461481180.00000185DA5D0000.00000004.00000020.00020000.00000000.sdmp, wuauclt.exe, 00000000.00000003.2161093447.00000185DA5D0000.00000004.00000020.00020000.00000000.sdmp, wuauclt.exe, 00000000.00000003.2183310928.00000185DA5D0000.00000004.00000020.00020000.00000000.sdmp, wuauclt.exe, 00000000.00000003.2160622589.00000185DA5D0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: wuauclt.exe, 00000000.00000002.2461481180.00000185DA5D0000.00000004.00000020.00020000.00000000.sdmp, wuauclt.exe, 00000000.00000003.2161093447.00000185DA5D0000.00000004.00000020.00020000.00000000.sdmp, wuauclt.exe, 00000000.00000003.2183310928.00000185DA5D0000.00000004.00000020.00020000.00000000.sdmp, wuauclt.exe, 00000000.00000003.2160622589.00000185DA5D0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW`

Anti Debugging

barindex
Source: C:\Users\user\Desktop\wuauclt.exeCode function: 0_2_00007FF693DB13300_2_00007FF693DB1330
Source: C:\Users\user\Desktop\wuauclt.exeCode function: 0_2_00007FF693DB13800_2_00007FF693DB1380
Source: C:\Users\user\Desktop\wuauclt.exeCode function: 0_2_00007FF693DB1330 rdtsc 0_2_00007FF693DB1330
Source: C:\Users\user\Desktop\wuauclt.exeCode function: 0_2_00007FF693EF4544 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00007FF693EF4544
Source: C:\Users\user\Desktop\wuauclt.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpactResource DevelopmentReconnaissance
Valid Accounts2
Command and Scripting Interpreter
Path InterceptionPath Interception1
Virtualization/Sandbox Evasion
OS Credential Dumping1
System Time Discovery
Remote Services1
Archive Collected Data
Exfiltration Over Other Network Medium11
Encrypted Channel
Exploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationAbuse Accessibility FeaturesAcquire InfrastructureGather Victim Identity Information
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
Software Packing
LSASS Memory11
Security Software Discovery
Remote Desktop ProtocolData from Removable MediaExfiltration Over Bluetooth3
Non-Application Layer Protocol
SIM Card SwapObtain Device Cloud BackupsNetwork Denial of ServiceDomainsCredentials
Domain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Obfuscated Files or Information
Security Account Manager1
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared DriveAutomated Exfiltration4
Application Layer Protocol
Data Encrypted for ImpactDNS ServerEmail Addresses
Local AccountsCronLogin HookLogin HookBinary PaddingNTDS3
System Information Discovery
Distributed Component Object ModelInput CaptureTraffic Duplication3
Ingress Tool Transfer
Data DestructionVirtual Private ServerEmployee Names
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1358920 Sample: wuauclt.exe Startdate: 11/12/2023 Architecture: WINDOWS Score: 22 9 www.spst.no 2->9 11 spst.no 2->11 5 wuauclt.exe 2->5         started        process3 dnsIp4 13 www.spst.no 18.213.222.111, 443, 49708 AMAZON-AESUS United States 5->13 15 spst.no 54.161.234.33, 443, 49709 AMAZON-AESUS United States 5->15 17 Potentially malicious time measurement code found 5->17 signatures5

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
https://www.spst.no/midlertidig/60de5f4a2aacbe743fbd443199de7557/key.pemJ0%Avira URL Cloudsafe
https://spst.no/midlertidig/60de5f4a2aacbe743fbd443199de7557/key.pem00%Avira URL Cloudsafe
https://spst.no/midlertidig/60de5f4a2aacbe743fbd443199de7557/key.pemA0%Avira URL Cloudsafe
https://spst.no0%Avira URL Cloudsafe
https://www.spst.no/pc60%Avira URL Cloudsafe
https://www.spst.no:443/midlertidig/60de5f4a2aacbe743fbd443199de7557/key.pem0%Avira URL Cloudsafe
https://spst.no/0%Avira URL Cloudsafe
https://spst.no/midlertidig/60de5f4a2aacbe743fbd443199de7557/key.pemLocationETagAuthentication-InfoA0%Avira URL Cloudsafe
https://answers.netlify.com/t/support-guide-i-ve-deployed-my-site-but-i-still-see-page-not-found/1250%Avira URL Cloudsafe
https://spst.no:443/midlertidig/60de5f4a2aacbe743fbd443199de7557/key.pem0%Avira URL Cloudsafe
https://www.spst.no/midlertidig/60de5f4a2aacbe743fbd443199de7557/key.pem0%Avira URL Cloudsafe
https://spst.no/midlertidig/60de5f4a2aacbe743fbd443199de7557/key.pem0%Avira URL Cloudsafe

Download Network PCAP: filteredfull

NameIPActiveMaliciousAntivirus DetectionReputation
spst.no
54.161.234.33
truefalse
    unknown
    www.spst.no
    18.213.222.111
    truefalse
      unknown
      NameMaliciousAntivirus DetectionReputation
      https://spst.no/midlertidig/60de5f4a2aacbe743fbd443199de7557/key.pemfalse
      • Avira URL Cloud: safe
      unknown
      https://www.spst.no/midlertidig/60de5f4a2aacbe743fbd443199de7557/key.pemfalse
      • Avira URL Cloud: safe
      unknown
      NameSourceMaliciousAntivirus DetectionReputation
      https://www.spst.no/midlertidig/60de5f4a2aacbe743fbd443199de7557/key.pemJwuauclt.exe, 00000000.00000003.2160622589.00000185DA5AF000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://www.spst.no:443/midlertidig/60de5f4a2aacbe743fbd443199de7557/key.pemwuauclt.exe, 00000000.00000003.2160622589.00000185DA57A000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://spst.no/midlertidig/60de5f4a2aacbe743fbd443199de7557/key.pem0wuauclt.exe, 00000000.00000003.2160607865.00000185DA629000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://spst.no/midlertidig/60de5f4a2aacbe743fbd443199de7557/key.pemAwuauclt.exe, 00000000.00000003.2160797867.00000185DA615000.00000004.00000020.00020000.00000000.sdmp, wuauclt.exe, 00000000.00000003.2161093447.00000185DA615000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://spst.nowuauclt.exe, 00000000.00000003.2161093447.00000185DA5D0000.00000004.00000020.00020000.00000000.sdmp, wuauclt.exe, 00000000.00000003.2183799723.00000185DA5E3000.00000004.00000020.00020000.00000000.sdmp, wuauclt.exe, 00000000.00000003.2183310928.00000185DA5D0000.00000004.00000020.00020000.00000000.sdmp, wuauclt.exe, 00000000.00000002.2461641118.00000185DA5E4000.00000004.00000020.00020000.00000000.sdmp, wuauclt.exe, 00000000.00000003.2160797867.00000185DA5E3000.00000004.00000020.00020000.00000000.sdmp, wuauclt.exe, 00000000.00000003.2160622589.00000185DA5D0000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://spst.no:443/midlertidig/60de5f4a2aacbe743fbd443199de7557/key.pemwuauclt.exe, 00000000.00000003.2161093447.00000185DA5D0000.00000004.00000020.00020000.00000000.sdmp, wuauclt.exe, 00000000.00000003.2160622589.00000185DA5D0000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://spst.no/midlertidig/60de5f4a2aacbe743fbd443199de7557/key.pemLocationETagAuthentication-InfoAwuauclt.exe, 00000000.00000003.2160607865.00000185DA629000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://answers.netlify.com/t/support-guide-i-ve-deployed-my-site-but-i-still-see-page-not-found/125wuauclt.exe, 00000000.00000003.2161093447.00000185DA5AC000.00000004.00000020.00020000.00000000.sdmp, wuauclt.exe, 00000000.00000003.2183310928.00000185DA5A9000.00000004.00000020.00020000.00000000.sdmp, wuauclt.exe, 00000000.00000002.2461466704.00000185DA5B2000.00000004.00000020.00020000.00000000.sdmp, wuauclt.exe, 00000000.00000003.2183664281.00000185DA5AE000.00000004.00000020.00020000.00000000.sdmp, wuauclt.exe, 00000000.00000003.2160622589.00000185DA5AF000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://spst.no/wuauclt.exe, 00000000.00000003.2161093447.00000185DA5D0000.00000004.00000020.00020000.00000000.sdmp, wuauclt.exe, 00000000.00000003.2160797867.00000185DA5E3000.00000004.00000020.00020000.00000000.sdmp, wuauclt.exe, 00000000.00000003.2160622589.00000185DA5D0000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://www.spst.no/pc6wuauclt.exe, 00000000.00000003.2160622589.00000185DA591000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs
      IPDomainCountryFlagASNASN NameMalicious
      54.161.234.33
      spst.noUnited States
      14618AMAZON-AESUSfalse
      18.213.222.111
      www.spst.noUnited States
      14618AMAZON-AESUSfalse
      Joe Sandbox version:38.0.0 Ammolite
      Analysis ID:1358920
      Start date and time:2023-12-11 21:29:44 +01:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 5m 29s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Run name:Run with higher sleep bypass
      Number of analysed new started processes analysed:8
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Sample name:wuauclt.exe
      Detection:SUS
      Classification:sus22.evad.winEXE@1/0@2/2
      EGA Information:Failed
      HCA Information:Failed
      Cookbook Comments:
      • Found application associated with file extension: .exe
      • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
      • Exclude process from analysis (whitelisted): dllhost.exe, RuntimeBroker.exe, WMIADAP.exe, SIHClient.exe, backgroundTaskHost.exe
      • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
      • Execution Graph export aborted for target wuauclt.exe, PID 5256 because there are no executed function
      • Report size getting too big, too many NtQueryValueKey calls found.
      • VT rate limit hit for: wuauclt.exe
      No simulations
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      54.161.234.33https://go.exkursiv.de/a/p/iTvrZGet hashmaliciousUnknownBrowse
        18.213.222.111rock990ro0.exeGet hashmaliciousFormBook, NSISDropperBrowse
        • www.josephpetrasek.com/r08c/?EDH=DJwva5IjdVw9YquAY8BXAav9HwtDH0sMtOV2EPkFmxDXv5+WXm3wSKYni4p83Zv7LlBm&0VNTa2=zRipo8OXZt
        No context
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        AMAZON-AESUSComplete with Doc.Sgn Escrow - #306064854.pdf December 11, 2023 18 55 04 PM.emlGet hashmaliciousHTMLPhisherBrowse
        • 75.101.131.185
        https://streamstv.org/soccerGet hashmaliciousUnknownBrowse
        • 54.145.255.200
        https://spaces.hightail.com/receive/Z4BNlNUQd3/dXMtOThkYmJlNjktYjQ2MC00NWQ0LTgxODAtZTAyMmRhNGJkNmM3Get hashmaliciousHTMLPhisherBrowse
        • 3.216.175.78
        https://labest.com/hits_banner_redirect.php?cat=55&redirect=http://chemungcanal.sipnoosh.com/eWZyYW5jaXNjb0BjaGVtdW5nY2FuYWwuY29tGet hashmaliciousHTMLPhisherBrowse
        • 75.101.131.185
        https://d12stx04.na1.hubspotlinks.com/Ctc/2M+113/d12sTx04/VX0mdC4-Qc5BW68BT1T7K2VPXW2XSKgS56XSWBN65wGVW3qn9gW7Y8-PT6lZ3kPW35xn0N16kk_GN5DymrV5KMdkVwgc966Trhw4W4dJV-G1bDY2jN5smG_Qkl7-FW2sN0nQ7MG-WJVRZLZ52qXkw3W8N07kG2S1f6cW58f5TH3CW-kvW3jyNJM4rPZJsW1PmCK16Fl7p6W68TccB8wqdmlW7RVCbK7RzdDBW96XtC04NkrtDW244Y9t16ZwKmV2tnQq3MvfJFW1WFH8K605VG2W626BpF50CVCyN2Sv-cMqxtNXW99CxzN8C5YvqN31k68KZCRTCN7QjhrClTBrMVzVX326mxxnKW9l1YD72J5QJtW1yDP9q6KmNqrN7Bq3_pSt_Pxf83D_gj04Get hashmaliciousHTMLPhisherBrowse
        • 54.81.64.212
        https://acrobat.adobe.com/id/urn:aaid:sc:us:017842a5-a13a-4022-a03e-af8d86316b9cGet hashmaliciousHTMLPhisherBrowse
        • 34.197.224.31
        https://rjtlawfirm.sharefile.com/d-44ef16dfd11b4e1bGet hashmaliciousHTMLPhisherBrowse
        • 3.5.21.127
        https://rjtlawfirm.sharefile.com/d-44ef16dfd11b4e1bGet hashmaliciousHTMLPhisherBrowse
        • 34.228.93.186
        https://vanbebbers.comGet hashmaliciousUnknownBrowse
        • 3.210.93.214
        INQ_4419-R1.exeGet hashmaliciousFormBook, NSISDropperBrowse
        • 18.205.222.128
        https://trk.klclick3.com/ls/click?upn=Vtrs3xURK-2Bc2pVdHID18VGDevbtnzEVjNom3JLkRvGYN4hcNbkboJn9k-2F0JVcEj0i-2FCLQ5Y2qCRaQ2mK7wXdc71bz9QNw-2FqdfrZ-2BSbAkhBVrEiEddva0TRt43nP-2Fexs03tzN0tS99mOkz00UFItjfTLdGgRgDvJu9o-2FA3wwapVU-2BfpYXndP9X-2BcTqtkFQQDGvNk0WYgl1cOy4RK4-2FFGKQ0GsHGgP4JmBKC9UF8iRCh8gIh-2B3pRHTRSVgqq-2FlTDteJ4HEf-2BFqDF1jHtDWy571vaWnWAHMgBapDZvggHq7chPuh2D68L7ykOMbmhg07ebRML8D-2BfzuFVBgY-2BNZD0RRo8FD5h2BaRalMeOmdIWin4A-3DdUkn_-2FtrkJYtssUveXERYVbGgKpodoStjimyExhfM3ejAfzuVlFsd2sMyrjZ3RyQMoa-2BVsLNT-2FwykvHuxKNblO8W3QfKNLBgwj5HYzLjPX1cqiFuFrbnKos9Q5vLrgulUGAZlQnjeIt8YF4EWgroh4QfLcUcfPS3ADuMYgW-2B-2BrQUSZInieIZPKhKWUThpHOF85J7hMXK-2FrY17T8UuZ7JxspKi6gdu00iHbVdGmxMUaR9YMwzJMIOxPvwMohVHTtNfI8emx-2BeS0EhD7q5qrs-2Fi4-2FZPBF-2FGzFn9hstsw7tUhigCqIMQ1JhgjXYPDj-2FLJD3-2Fa5Y72nHeA5xnfhu14tFxk-2Fv8zY8bgpL01Q-2FYmy58l1WXVTvWNyZ-2BKi36uqRVIg6X999jVJBVFtTiDbDGfqLTGYzpsSD-2FNT7-2FjXT3ORfDuJJMs7-2Fc4Q8NsK2J1oLOILpQ6dKxOeUXqDWsm6a4MliEcG7UwA-3D-3D&__-/kaxpj/#dGVzdEBteWRvbWFpbi5jb20=Get hashmaliciousUnknownBrowse
        • 3.94.218.138
        6lt1Zt1.exeGet hashmaliciousUnknownBrowse
        • 52.201.120.2
        https://tropical-shorthaired-trillium.glitch.me/liaks29sksj.htmlGet hashmaliciousHTMLPhisherBrowse
        • 34.197.54.83
        https://walnut-imported-contraption.glitch.me/comx7132un882t.htmlGet hashmaliciousHTMLPhisherBrowse
        • 34.197.54.83
        Reserva_Advogados_Associados.ppamGet hashmaliciousUnknownBrowse
        • 34.233.146.242
        RqrQG7s66x.dllGet hashmaliciousUnknownBrowse
        • 52.21.201.77
        Mg26cnzn88.elfGet hashmaliciousMiraiBrowse
        • 54.132.236.214
        p34XVUW8pN.elfGet hashmaliciousMiraiBrowse
        • 54.135.181.82
        loligang.arm7.elfGet hashmaliciousMiraiBrowse
        • 44.210.53.48
        SamFwFRPTool.exeGet hashmaliciousUnknownBrowse
        • 3.213.224.199
        AMAZON-AESUSComplete with Doc.Sgn Escrow - #306064854.pdf December 11, 2023 18 55 04 PM.emlGet hashmaliciousHTMLPhisherBrowse
        • 75.101.131.185
        https://streamstv.org/soccerGet hashmaliciousUnknownBrowse
        • 54.145.255.200
        https://spaces.hightail.com/receive/Z4BNlNUQd3/dXMtOThkYmJlNjktYjQ2MC00NWQ0LTgxODAtZTAyMmRhNGJkNmM3Get hashmaliciousHTMLPhisherBrowse
        • 3.216.175.78
        https://labest.com/hits_banner_redirect.php?cat=55&redirect=http://chemungcanal.sipnoosh.com/eWZyYW5jaXNjb0BjaGVtdW5nY2FuYWwuY29tGet hashmaliciousHTMLPhisherBrowse
        • 75.101.131.185
        https://d12stx04.na1.hubspotlinks.com/Ctc/2M+113/d12sTx04/VX0mdC4-Qc5BW68BT1T7K2VPXW2XSKgS56XSWBN65wGVW3qn9gW7Y8-PT6lZ3kPW35xn0N16kk_GN5DymrV5KMdkVwgc966Trhw4W4dJV-G1bDY2jN5smG_Qkl7-FW2sN0nQ7MG-WJVRZLZ52qXkw3W8N07kG2S1f6cW58f5TH3CW-kvW3jyNJM4rPZJsW1PmCK16Fl7p6W68TccB8wqdmlW7RVCbK7RzdDBW96XtC04NkrtDW244Y9t16ZwKmV2tnQq3MvfJFW1WFH8K605VG2W626BpF50CVCyN2Sv-cMqxtNXW99CxzN8C5YvqN31k68KZCRTCN7QjhrClTBrMVzVX326mxxnKW9l1YD72J5QJtW1yDP9q6KmNqrN7Bq3_pSt_Pxf83D_gj04Get hashmaliciousHTMLPhisherBrowse
        • 54.81.64.212
        https://acrobat.adobe.com/id/urn:aaid:sc:us:017842a5-a13a-4022-a03e-af8d86316b9cGet hashmaliciousHTMLPhisherBrowse
        • 34.197.224.31
        https://rjtlawfirm.sharefile.com/d-44ef16dfd11b4e1bGet hashmaliciousHTMLPhisherBrowse
        • 3.5.21.127
        https://rjtlawfirm.sharefile.com/d-44ef16dfd11b4e1bGet hashmaliciousHTMLPhisherBrowse
        • 34.228.93.186
        https://vanbebbers.comGet hashmaliciousUnknownBrowse
        • 3.210.93.214
        INQ_4419-R1.exeGet hashmaliciousFormBook, NSISDropperBrowse
        • 18.205.222.128
        https://trk.klclick3.com/ls/click?upn=Vtrs3xURK-2Bc2pVdHID18VGDevbtnzEVjNom3JLkRvGYN4hcNbkboJn9k-2F0JVcEj0i-2FCLQ5Y2qCRaQ2mK7wXdc71bz9QNw-2FqdfrZ-2BSbAkhBVrEiEddva0TRt43nP-2Fexs03tzN0tS99mOkz00UFItjfTLdGgRgDvJu9o-2FA3wwapVU-2BfpYXndP9X-2BcTqtkFQQDGvNk0WYgl1cOy4RK4-2FFGKQ0GsHGgP4JmBKC9UF8iRCh8gIh-2B3pRHTRSVgqq-2FlTDteJ4HEf-2BFqDF1jHtDWy571vaWnWAHMgBapDZvggHq7chPuh2D68L7ykOMbmhg07ebRML8D-2BfzuFVBgY-2BNZD0RRo8FD5h2BaRalMeOmdIWin4A-3DdUkn_-2FtrkJYtssUveXERYVbGgKpodoStjimyExhfM3ejAfzuVlFsd2sMyrjZ3RyQMoa-2BVsLNT-2FwykvHuxKNblO8W3QfKNLBgwj5HYzLjPX1cqiFuFrbnKos9Q5vLrgulUGAZlQnjeIt8YF4EWgroh4QfLcUcfPS3ADuMYgW-2B-2BrQUSZInieIZPKhKWUThpHOF85J7hMXK-2FrY17T8UuZ7JxspKi6gdu00iHbVdGmxMUaR9YMwzJMIOxPvwMohVHTtNfI8emx-2BeS0EhD7q5qrs-2Fi4-2FZPBF-2FGzFn9hstsw7tUhigCqIMQ1JhgjXYPDj-2FLJD3-2Fa5Y72nHeA5xnfhu14tFxk-2Fv8zY8bgpL01Q-2FYmy58l1WXVTvWNyZ-2BKi36uqRVIg6X999jVJBVFtTiDbDGfqLTGYzpsSD-2FNT7-2FjXT3ORfDuJJMs7-2Fc4Q8NsK2J1oLOILpQ6dKxOeUXqDWsm6a4MliEcG7UwA-3D-3D&__-/kaxpj/#dGVzdEBteWRvbWFpbi5jb20=Get hashmaliciousUnknownBrowse
        • 3.94.218.138
        6lt1Zt1.exeGet hashmaliciousUnknownBrowse
        • 52.201.120.2
        https://tropical-shorthaired-trillium.glitch.me/liaks29sksj.htmlGet hashmaliciousHTMLPhisherBrowse
        • 34.197.54.83
        https://walnut-imported-contraption.glitch.me/comx7132un882t.htmlGet hashmaliciousHTMLPhisherBrowse
        • 34.197.54.83
        Reserva_Advogados_Associados.ppamGet hashmaliciousUnknownBrowse
        • 34.233.146.242
        RqrQG7s66x.dllGet hashmaliciousUnknownBrowse
        • 52.21.201.77
        Mg26cnzn88.elfGet hashmaliciousMiraiBrowse
        • 54.132.236.214
        p34XVUW8pN.elfGet hashmaliciousMiraiBrowse
        • 54.135.181.82
        loligang.arm7.elfGet hashmaliciousMiraiBrowse
        • 44.210.53.48
        SamFwFRPTool.exeGet hashmaliciousUnknownBrowse
        • 3.213.224.199
        MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
        a0e9f5d64349fb13191bc781f81f42e164XaB6OYHm.exeGet hashmaliciousPrivateLoader, RedLine, RisePro Stealer, SmokeLoader, zgRATBrowse
        • 54.161.234.33
        • 18.213.222.111
        good.exeGet hashmaliciousPrivateLoader, RisePro StealerBrowse
        • 54.161.234.33
        • 18.213.222.111
        good.exeGet hashmaliciousPrivateLoader, RisePro StealerBrowse
        • 54.161.234.33
        • 18.213.222.111
        https://rjtlawfirm.sharefile.com/d-44ef16dfd11b4e1bGet hashmaliciousHTMLPhisherBrowse
        • 54.161.234.33
        • 18.213.222.111
        20231205090640_36550_CA_S4.xlsGet hashmaliciousUnknownBrowse
        • 54.161.234.33
        • 18.213.222.111
        Update_browser_17.645327.jsGet hashmaliciousNetSupport RATBrowse
        • 54.161.234.33
        • 18.213.222.111
        Update_browser_17.645329.jsGet hashmaliciousNetSupport RATBrowse
        • 54.161.234.33
        • 18.213.222.111
        Update_browser_17.6436.jsGet hashmaliciousNetSupport RATBrowse
        • 54.161.234.33
        • 18.213.222.111
        Update_browser_17.645330.jsGet hashmaliciousNetSupport RATBrowse
        • 54.161.234.33
        • 18.213.222.111
        Update_browser_17.645328.jsGet hashmaliciousNetSupport RATBrowse
        • 54.161.234.33
        • 18.213.222.111
        RFQ006119236.xlsxGet hashmaliciousUnknownBrowse
        • 54.161.234.33
        • 18.213.222.111
        ATT00001.htmGet hashmaliciousHTMLPhisherBrowse
        • 54.161.234.33
        • 18.213.222.111
        PYMNT_ADVICE.xlsGet hashmaliciousUnknownBrowse
        • 54.161.234.33
        • 18.213.222.111
        good.exeGet hashmaliciousPrivateLoader, RisePro StealerBrowse
        • 54.161.234.33
        • 18.213.222.111
        https://bafybeicnpejtwcpw5zimsqj6lvbtjzdkxadyo4eetgzrv4g25lohph4exu.ipfs.cf-ipfs.com/?linkId=casalgrande@cert.provincia.re.itGet hashmaliciousUnknownBrowse
        • 54.161.234.33
        • 18.213.222.111
        RVUfb4bIt5.exeGet hashmaliciousPrivateLoader, RedLine, RisePro Stealer, SmokeLoader, XmrigBrowse
        • 54.161.234.33
        • 18.213.222.111
        KOL FCL INDIA 20231208FF.xlsxGet hashmaliciousUnknownBrowse
        • 54.161.234.33
        • 18.213.222.111
        1vo8l5ZqSr.exeGet hashmaliciousGlupteba, PrivateLoader, RedLine, RisePro Stealer, SmokeLoaderBrowse
        • 54.161.234.33
        • 18.213.222.111
        XO0UY05.exeGet hashmaliciousGlupteba, LummaC Stealer, PrivateLoader, RedLine, RisePro Stealer, SmokeLoaderBrowse
        • 54.161.234.33
        • 18.213.222.111
        1VN46DW0.exeGet hashmaliciousPrivateLoader, RisePro StealerBrowse
        • 54.161.234.33
        • 18.213.222.111
        No context
        No created / dropped files found
        File type:PE32+ executable (GUI) x86-64, for MS Windows
        Entropy (8bit):6.840413953413756
        TrID:
        • Win64 Executable GUI (202006/5) 92.65%
        • Win64 Executable (generic) (12005/4) 5.51%
        • Generic Win/DOS Executable (2004/3) 0.92%
        • DOS Executable Generic (2002/1) 0.92%
        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
        File name:wuauclt.exe
        File size:1'871'872 bytes
        MD5:4d45fa5dd472e526cdf376d077ebd61b
        SHA1:61e8cd1e92549c404c3ad2570e98d81b563bcffd
        SHA256:971e53c90306a7b13ac6ad1726360aab5dcab418839d4ed53735cbc1e2b40bcf
        SHA512:a303326b80a3a778e6caa210c3baccab3619fa91fd3c5a89802a7072081a6ef093a18146e504321e14580b0b19635775b9648468961c1870ca084d137570849f
        SSDEEP:49152:WOIU6iMGtlqfVwASO9Jj7v4+AHAoJK4dZhqZwdPrg:w+yKHDdXqwlg
        TLSH:8B85AE66A2A401E4D976D23CC8569137E7F1B42D13B09BDF0AA5C9A90F13BE16F3E740
        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........)...H.W.H.W.H.W.0aW.H.W.7.V.H.W.7.V.H.W.7.V.H.W.7.V.H.W.0.V.H.W.H.W8H.W.H.W.H.W9=.V.I.W...V.H.W...W.H.W...V.H.WRich.H.W.......
        Icon Hash:00928e8e8686b000
        Entrypoint:0x140143f28
        Entrypoint Section:.text
        Digitally signed:false
        Imagebase:0x140000000
        Subsystem:windows gui
        Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
        DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
        Time Stamp:0x654CDD01 [Thu Nov 9 13:22:09 2023 UTC]
        TLS Callbacks:
        CLR (.Net) Version:
        OS Version Major:6
        OS Version Minor:0
        File Version Major:6
        File Version Minor:0
        Subsystem Version Major:6
        Subsystem Version Minor:0
        Import Hash:e28e4e32012deb9923a5cada46a7cbd9
        Instruction
        dec eax
        sub esp, 28h
        call 00007F8C88D6BD68h
        dec eax
        add esp, 28h
        jmp 00007F8C88D6B5C7h
        int3
        int3
        int3
        int3
        int3
        int3
        int3
        int3
        int3
        int3
        int3
        int3
        nop word ptr [eax+eax+00000000h]
        dec eax
        sub esp, 10h
        dec esp
        mov dword ptr [esp], edx
        dec esp
        mov dword ptr [esp+08h], ebx
        dec ebp
        xor ebx, ebx
        dec esp
        lea edx, dword ptr [esp+18h]
        dec esp
        sub edx, eax
        dec ebp
        cmovb edx, ebx
        dec esp
        mov ebx, dword ptr [00000010h]
        dec ebp
        cmp edx, ebx
        jnc 00007F8C88D6B768h
        inc cx
        and edx, 8D4DF000h
        wait
        add al, dh
        Programming Language:
        • [IMP] VS2008 SP1 build 30729
        NameVirtual AddressVirtual Size Is in Section
        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IMPORT0x1b61340x190.rdata
        IMAGE_DIRECTORY_ENTRY_RESOURCE0x1ca0000x1e0.rsrc
        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x1be0000xbc94.pdata
        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
        IMAGE_DIRECTORY_ENTRY_BASERELOC0x1cb0000x4b18.reloc
        IMAGE_DIRECTORY_ENTRY_DEBUG0x1aa0500x70.rdata
        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
        IMAGE_DIRECTORY_ENTRY_TLS0x1aa1000x28.rdata
        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x1a9f100x140.rdata
        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_IAT0x1450000x618.rdata
        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
        NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
        .text0x10000x143ddc0x143e00False0.5158413438344268data6.960538009860704IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        .rdata0x1450000x725f80x72600False0.43719689207650275data5.704278871182318IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        .data0x1b80000x54500x1c00False0.2699497767857143data3.106513262267233IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
        .pdata0x1be0000xbc940xbe00False0.47569901315789476data6.07921670477847IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        .rsrc0x1ca0000x1e00x200False0.533203125data4.7176788329467545IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
        .reloc0x1cb0000x4b180x4c00False0.28793174342105265data5.427328695251215IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
        NameRVASizeTypeLanguageCountryZLIB Complexity
        RT_MANIFEST0x1ca0600x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
        DLLImport
        KERNEL32.dllWaitForMultipleObjects, CreateFileW, GetCurrentThreadId, Sleep, DeleteFileW, CloseHandle, LoadLibraryW, CreateThread, HeapAlloc, GetCurrentDirectoryW, Beep, GetProcAddress, GetCurrentProcessId, GetProcessHeap, IsDebuggerPresent, GetLastError, SetLastError, EnterCriticalSection, LeaveCriticalSection, InitializeCriticalSectionAndSpinCount, DeleteCriticalSection, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetModuleHandleExW, GetCurrentProcess, GetStdHandle, GetEnvironmentVariableW, GetFileType, GetModuleHandleW, DeleteFiber, TerminateProcess, RtlVirtualUnwind, QueryPerformanceCounter, GetSystemTimeAsFileTime, ConvertFiberToThread, WideCharToMultiByte, GetConsoleMode, SetConsoleMode, ReadConsoleA, ReadConsoleW, FreeLibrary, LoadLibraryA, FindClose, InitializeSListHead, IsProcessorFeaturePresent, SetUnhandledExceptionFilter, UnhandledExceptionFilter, RtlLookupFunctionEntry, RtlCaptureContext, WriteFile, FindNextFileW, HeapFree, GetFileSizeEx, FindFirstFileW, MultiByteToWideChar, ReadFile
        USER32.dllExitWindowsEx, GetWindowLongPtrW, SetWindowPos, UnhookWinEvent, GetProcessWindowStation, GetSystemMetrics, GetUserObjectInformationW, MessageBoxW, SetWinEventHook, MessageBoxA
        ADVAPI32.dllAdjustTokenPrivileges, LookupPrivilegeValueW, DeregisterEventSource, RegisterEventSourceW, ReportEventW, OpenProcessToken
        WINHTTP.dllWinHttpCloseHandle, WinHttpReadData, WinHttpSendRequest, WinHttpConnect, WinHttpQueryDataAvailable, WinHttpOpen, WinHttpReceiveResponse, WinHttpOpenRequest
        SHLWAPI.dllStrCmpW, PathRemoveExtensionW, PathFindExtensionW
        WS2_32.dllclosesocket, WSASetLastError, send, recv, WSAGetLastError, WSACleanup
        bcrypt.dllBCryptGenRandom
        VCRUNTIME140.dllmemcmp, memcpy, memmove, memset, strchr, memchr, strrchr, _CxxThrowException, __std_exception_destroy, __std_exception_copy, __current_exception_context, __current_exception, __C_specific_handler, strstr, wcsstr
        api-ms-win-crt-utility-l1-1-0.dllqsort, rand, srand
        api-ms-win-crt-runtime-l1-1-0.dll_initialize_onexit_table, _invalid_parameter_noinfo, _register_onexit_function, _c_exit, _cexit, __p___argv, __p___argc, _exit, exit, raise, _register_thread_local_exe_atexit_callback, _initterm_e, _initterm, terminate, _get_initial_narrow_environment, _initialize_narrow_environment, strerror_s, _configure_narrow_argv, _errno, _crt_atexit, signal, _seh_filter_exe, _set_app_type
        api-ms-win-crt-stdio-l1-1-0.dll__acrt_iob_func, fclose, __stdio_common_vfprintf, __stdio_common_vsscanf, fputs, __stdio_common_vsprintf, _set_fmode, feof, ferror, fflush, fgets, fopen, _wfopen, _fileno, __p__commode, fread, fseek, _setmode, fwrite, __stdio_common_vswprintf, ftell
        api-ms-win-crt-heap-l1-1-0.dllfree, realloc, malloc, _set_new_mode, _callnewh
        api-ms-win-crt-string-l1-1-0.dllstrcspn, isspace, _stricmp, _strnicmp, strspn, strncpy, strncmp, strcmp
        api-ms-win-crt-convert-l1-1-0.dllstrtoul, strtol, atoi
        api-ms-win-crt-time-l1-1-0.dll_time64, _gmtime64_s
        api-ms-win-crt-environment-l1-1-0.dllgetenv
        api-ms-win-crt-filesystem-l1-1-0.dll_stat64i32
        api-ms-win-crt-math-l1-1-0.dll__setusermatherr
        api-ms-win-crt-locale-l1-1-0.dll_configthreadlocale
        Language of compilation systemCountry where language is spokenMap
        EnglishUnited States

        Download Network PCAP: filteredfull

        • Total Packets: 20
        • 443 (HTTPS)
        • 53 (DNS)
        TimestampSource PortDest PortSource IPDest IP
        Dec 11, 2023 21:30:38.711590052 CET49708443192.168.2.618.213.222.111
        Dec 11, 2023 21:30:38.711621046 CET4434970818.213.222.111192.168.2.6
        Dec 11, 2023 21:30:38.711716890 CET49708443192.168.2.618.213.222.111
        Dec 11, 2023 21:30:38.714252949 CET49708443192.168.2.618.213.222.111
        Dec 11, 2023 21:30:38.714267015 CET4434970818.213.222.111192.168.2.6
        Dec 11, 2023 21:30:39.063301086 CET4434970818.213.222.111192.168.2.6
        Dec 11, 2023 21:30:39.063445091 CET49708443192.168.2.618.213.222.111
        Dec 11, 2023 21:30:39.076747894 CET49708443192.168.2.618.213.222.111
        Dec 11, 2023 21:30:39.076787949 CET4434970818.213.222.111192.168.2.6
        Dec 11, 2023 21:30:39.077152014 CET4434970818.213.222.111192.168.2.6
        Dec 11, 2023 21:30:39.119666100 CET49708443192.168.2.618.213.222.111
        Dec 11, 2023 21:30:39.197904110 CET49708443192.168.2.618.213.222.111
        Dec 11, 2023 21:30:39.240746975 CET4434970818.213.222.111192.168.2.6
        Dec 11, 2023 21:30:39.376461983 CET4434970818.213.222.111192.168.2.6
        Dec 11, 2023 21:30:39.376523972 CET4434970818.213.222.111192.168.2.6
        Dec 11, 2023 21:30:39.376586914 CET49708443192.168.2.618.213.222.111
        Dec 11, 2023 21:30:39.377806902 CET49708443192.168.2.618.213.222.111
        Dec 11, 2023 21:30:39.377824068 CET4434970818.213.222.111192.168.2.6
        Dec 11, 2023 21:30:39.513242960 CET49709443192.168.2.654.161.234.33
        Dec 11, 2023 21:30:39.513277054 CET4434970954.161.234.33192.168.2.6
        Dec 11, 2023 21:30:39.513354063 CET49709443192.168.2.654.161.234.33
        Dec 11, 2023 21:30:39.513936996 CET49709443192.168.2.654.161.234.33
        Dec 11, 2023 21:30:39.513946056 CET4434970954.161.234.33192.168.2.6
        Dec 11, 2023 21:30:39.849845886 CET4434970954.161.234.33192.168.2.6
        Dec 11, 2023 21:30:39.850148916 CET49709443192.168.2.654.161.234.33
        Dec 11, 2023 21:30:39.851576090 CET49709443192.168.2.654.161.234.33
        Dec 11, 2023 21:30:39.851588011 CET4434970954.161.234.33192.168.2.6
        Dec 11, 2023 21:30:39.851938009 CET4434970954.161.234.33192.168.2.6
        Dec 11, 2023 21:30:39.853787899 CET49709443192.168.2.654.161.234.33
        Dec 11, 2023 21:30:39.896750927 CET4434970954.161.234.33192.168.2.6
        Dec 11, 2023 21:30:40.221400023 CET4434970954.161.234.33192.168.2.6
        Dec 11, 2023 21:30:40.221486092 CET4434970954.161.234.33192.168.2.6
        Dec 11, 2023 21:30:40.221512079 CET4434970954.161.234.33192.168.2.6
        Dec 11, 2023 21:30:40.221724987 CET49709443192.168.2.654.161.234.33
        Dec 11, 2023 21:30:40.221740007 CET4434970954.161.234.33192.168.2.6
        Dec 11, 2023 21:30:40.221801996 CET49709443192.168.2.654.161.234.33
        Dec 11, 2023 21:30:40.222532988 CET49709443192.168.2.654.161.234.33
        Dec 11, 2023 21:30:40.222549915 CET4434970954.161.234.33192.168.2.6
        TimestampSource PortDest PortSource IPDest IP
        Dec 11, 2023 21:30:38.420778990 CET5944753192.168.2.61.1.1.1
        Dec 11, 2023 21:30:38.703227043 CET53594471.1.1.1192.168.2.6
        Dec 11, 2023 21:30:39.379086971 CET6548253192.168.2.61.1.1.1
        Dec 11, 2023 21:30:39.508213043 CET53654821.1.1.1192.168.2.6
        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
        Dec 11, 2023 21:30:38.420778990 CET192.168.2.61.1.1.10x285fStandard query (0)www.spst.noA (IP address)IN (0x0001)false
        Dec 11, 2023 21:30:39.379086971 CET192.168.2.61.1.1.10xad5aStandard query (0)spst.noA (IP address)IN (0x0001)false
        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
        Dec 11, 2023 21:30:38.703227043 CET1.1.1.1192.168.2.60x285fNo error (0)www.spst.no18.213.222.111A (IP address)IN (0x0001)false
        Dec 11, 2023 21:30:38.703227043 CET1.1.1.1192.168.2.60x285fNo error (0)www.spst.no54.161.234.33A (IP address)IN (0x0001)false
        Dec 11, 2023 21:30:39.508213043 CET1.1.1.1192.168.2.60xad5aNo error (0)spst.no54.161.234.33A (IP address)IN (0x0001)false
        Dec 11, 2023 21:30:39.508213043 CET1.1.1.1192.168.2.60xad5aNo error (0)spst.no35.169.59.174A (IP address)IN (0x0001)false
        • www.spst.no
        • spst.no
        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        0192.168.2.64970818.213.222.1114435256C:\Users\user\Desktop\wuauclt.exe
        TimestampBytes transferredDirectionData
        2023-12-11 20:30:39 UTC176OUTGET /midlertidig/60de5f4a2aacbe743fbd443199de7557/key.pem HTTP/1.1
        Connection: Keep-Alive
        User-Agent: Polar Tech Inc. - Security Module V.1.22474487139
        Host: www.spst.no
        2023-12-11 20:30:39 UTC338INHTTP/1.1 301 Moved Permanently
        Content-Type: text/plain; charset=utf-8
        Date: Mon, 11 Dec 2023 20:30:39 GMT
        Location: https://spst.no/midlertidig/60de5f4a2aacbe743fbd443199de7557/key.pem
        Server: Netlify
        Strict-Transport-Security: max-age=31536000
        X-Nf-Request-Id: 01HHD966NP6JE41PY08KPT8X1F
        Content-Length: 83
        Connection: close
        2023-12-11 20:30:39 UTC83INData Raw: 52 65 64 69 72 65 63 74 69 6e 67 20 74 6f 20 68 74 74 70 73 3a 2f 2f 73 70 73 74 2e 6e 6f 2f 6d 69 64 6c 65 72 74 69 64 69 67 2f 36 30 64 65 35 66 34 61 32 61 61 63 62 65 37 34 33 66 62 64 34 34 33 31 39 39 64 65 37 35 35 37 2f 6b 65 79 2e 70 65 6d
        Data Ascii: Redirecting to https://spst.no/midlertidig/60de5f4a2aacbe743fbd443199de7557/key.pem


        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
        1192.168.2.64970954.161.234.334435256C:\Users\user\Desktop\wuauclt.exe
        TimestampBytes transferredDirectionData
        2023-12-11 20:30:39 UTC172OUTGET /midlertidig/60de5f4a2aacbe743fbd443199de7557/key.pem HTTP/1.1
        Connection: Keep-Alive
        User-Agent: Polar Tech Inc. - Security Module V.1.22474487139
        Host: spst.no
        2023-12-11 20:30:40 UTC376INHTTP/1.1 404 Not Found
        Age: 0
        Cache-Control: public,max-age=0,must-revalidate
        Cache-Status: "Netlify Edge"; fwd=miss
        Content-Type: text/html; charset=utf-8
        Date: Mon, 11 Dec 2023 20:30:40 GMT
        Etag: 1637840766-ssl
        Server: Netlify
        Strict-Transport-Security: max-age=31536000
        X-Nf-Request-Id: 01HHD967FFRZN8PDG409BJFPQN
        Connection: close
        Transfer-Encoding: chunked
        2023-12-11 20:30:40 UTC2372INData Raw: 63 30 61 0d 0a 3c 21 44 4f 43 54 59 50 45 20 68 74 6d 6c 3e 0a 3c 68 74 6d 6c 3e 0a 20 20 3c 68 65 61 64 3e 0a 20 20 20 20 3c 6d 65 74 61 20 63 68 61 72 73 65 74 3d 22 75 74 66 2d 38 22 3e 0a 20 20 20 20 3c 6d 65 74 61 20 6e 61 6d 65 3d 22 76 69 65 77 70 6f 72 74 22 20 63 6f 6e 74 65 6e 74 3d 22 77 69 64 74 68 3d 64 65 76 69 63 65 2d 77 69 64 74 68 2c 20 69 6e 69 74 69 61 6c 2d 73 63 61 6c 65 3d 31 2e 30 2c 20 6d 61 78 69 6d 75 6d 2d 73 63 61 6c 65 3d 31 2e 30 2c 20 75 73 65 72 2d 73 63 61 6c 61 62 6c 65 3d 6e 6f 22 3e 0a 0a 20 20 20 20 3c 74 69 74 6c 65 3e 50 61 67 65 20 4e 6f 74 20 46 6f 75 6e 64 3c 2f 74 69 74 6c 65 3e 0a 20 20 20 20 3c 6c 69 6e 6b 20 68 72 65 66 3d 27 68 74 74 70 73 3a 2f 2f 66 6f 6e 74 73 2e 67 6f 6f 67 6c 65 61 70 69 73 2e 63 6f 6d
        Data Ascii: c0a<!DOCTYPE html><html> <head> <meta charset="utf-8"> <meta name="viewport" content="width=device-width, initial-scale=1.0, maximum-scale=1.0, user-scalable=no"> <title>Page Not Found</title> <link href='https://fonts.googleapis.com
        2023-12-11 20:30:40 UTC717INData Raw: 3e 0a 20 20 20 20 20 20 20 20 20 20 3c 2f 70 3e 0a 20 20 20 20 20 20 20 20 20 20 3c 68 72 3e 3c 70 3e 49 66 20 74 68 69 73 20 69 73 20 79 6f 75 72 20 73 69 74 65 2c 20 61 6e 64 20 79 6f 75 20 77 65 72 65 6e 27 74 20 65 78 70 65 63 74 69 6e 67 20 61 20 34 30 34 20 66 6f 72 20 74 68 69 73 20 70 61 74 68 2c 20 70 6c 65 61 73 65 20 76 69 73 69 74 20 4e 65 74 6c 69 66 79 27 73 20 3c 61 20 68 72 65 66 3d 22 68 74 74 70 73 3a 2f 2f 61 6e 73 77 65 72 73 2e 6e 65 74 6c 69 66 79 2e 63 6f 6d 2f 74 2f 73 75 70 70 6f 72 74 2d 67 75 69 64 65 2d 69 2d 76 65 2d 64 65 70 6c 6f 79 65 64 2d 6d 79 2d 73 69 74 65 2d 62 75 74 2d 69 2d 73 74 69 6c 6c 2d 73 65 65 2d 70 61 67 65 2d 6e 6f 74 2d 66 6f 75 6e 64 2f 31 32 35 3f 75 74 6d 5f 73 6f 75 72 63 65 3d 34 30 34 70 61 67 65 26
        Data Ascii: > </p> <hr><p>If this is your site, and you weren't expecting a 404 for this path, please visit Netlify's <a href="https://answers.netlify.com/t/support-guide-i-ve-deployed-my-site-but-i-still-see-page-not-found/125?utm_source=404page&
        2023-12-11 20:30:40 UTC5INData Raw: 30 0d 0a 0d 0a
        Data Ascii: 0


        050100150s020406080100

        Click to jump to process

        050100150s0.0051015MB

        Click to jump to process

        Target ID:0
        Start time:21:30:37
        Start date:11/12/2023
        Path:C:\Users\user\Desktop\wuauclt.exe
        Wow64 process (32bit):false
        Commandline:C:\Users\user\Desktop\wuauclt.exe
        Imagebase:0x7ff693db0000
        File size:1'871'872 bytes
        MD5 hash:4D45FA5DD472E526CDF376D077EBD61B
        Has elevated privileges:true
        Has administrator privileges:true
        Programmed in:C, C++ or other language
        Reputation:low
        Has exited:true
        There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
        There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
        There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
        There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
        There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
        There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
        There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
        There is hidden Windows Behavior. Click on Show Windows Behavior to show it.

        Non-executed Functions

        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.2461964456.00007FF693DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF693DB0000, based on PE: true
        • Associated: 00000000.00000002.2461948718.00007FF693DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2462062634.00007FF693EF5000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2462108544.00007FF693F68000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2462124795.00007FF693F6E000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff693db0000_wuauclt.jbxd
        Similarity
        • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
        • String ID:
        • API String ID: 2933794660-0
        • Opcode ID: e73f54c139ca21a54634e6e37a9d15b386fd20d5e930fff0b28ed5730784cd42
        • Instruction ID: 78d65f0584f6e3164386705a0ee46f4a007eba9a0c5cd654da2eaa5a55a89a1e
        • Opcode Fuzzy Hash: e73f54c139ca21a54634e6e37a9d15b386fd20d5e930fff0b28ed5730784cd42
        • Instruction Fuzzy Hash: 7B113022B14F058AEB10DF60F8552B933A8FB19B58F441D31DA6D97BA4DF7CD1988380
        Uniqueness

        Uniqueness Score: -1.00%

        Memory Dump Source
        • Source File: 00000000.00000002.2461964456.00007FF693DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF693DB0000, based on PE: true
        • Associated: 00000000.00000002.2461948718.00007FF693DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2462062634.00007FF693EF5000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2462108544.00007FF693F68000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2462124795.00007FF693F6E000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff693db0000_wuauclt.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 64c4d506d6f5baa5ddf45db93394aa0249ac63765b51e1c6f4cbb588a991aae8
        • Instruction ID: bf7a7da0176b519ca943950848d7aa5e3883fc071413d0610558cb37e17c0dc5
        • Opcode Fuzzy Hash: 64c4d506d6f5baa5ddf45db93394aa0249ac63765b51e1c6f4cbb588a991aae8
        • Instruction Fuzzy Hash: 333267B6F90A6596DB048F16EA4178D7B64F319BC8F898526DF8C93B54EB38E471C300
        Uniqueness

        Uniqueness Score: -1.00%

        Memory Dump Source
        • Source File: 00000000.00000002.2461964456.00007FF693DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF693DB0000, based on PE: true
        • Associated: 00000000.00000002.2461948718.00007FF693DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2462062634.00007FF693EF5000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2462108544.00007FF693F68000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2462124795.00007FF693F6E000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff693db0000_wuauclt.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 66699973dfe7cc70c50a44c833f49aa9d261886ecd82fa8c202db35618552ba6
        • Instruction ID: 0d389d6acff0e247d9ffa5c44ed66b9e6d2572fb2528efdcd41cb25a8b910791
        • Opcode Fuzzy Hash: 66699973dfe7cc70c50a44c833f49aa9d261886ecd82fa8c202db35618552ba6
        • Instruction Fuzzy Hash: D022BEB7948290ABD7158F25C2A05AE3FA1F7177607848352DBC593786CB3DB53ACB10
        Uniqueness

        Uniqueness Score: -1.00%

        Memory Dump Source
        • Source File: 00000000.00000002.2461964456.00007FF693DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF693DB0000, based on PE: true
        • Associated: 00000000.00000002.2461948718.00007FF693DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2462062634.00007FF693EF5000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2462108544.00007FF693F68000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2462124795.00007FF693F6E000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff693db0000_wuauclt.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 62c896b165bee841353e084f092889a1030893982b008f4c74ca1992a7d0fb31
        • Instruction ID: c8177c1b62c4ec46396949775648fbc46cf736d601b52b8ff2c4f539682f36b3
        • Opcode Fuzzy Hash: 62c896b165bee841353e084f092889a1030893982b008f4c74ca1992a7d0fb31
        • Instruction Fuzzy Hash: 4F6108E6F50F9883DB548B9EA402B886760F719FC5F555116EE2C67301EA3DE9A3C340
        Uniqueness

        Uniqueness Score: -1.00%

        Memory Dump Source
        • Source File: 00000000.00000002.2461964456.00007FF693DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF693DB0000, based on PE: true
        • Associated: 00000000.00000002.2461948718.00007FF693DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2462062634.00007FF693EF5000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2462108544.00007FF693F68000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2462124795.00007FF693F6E000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff693db0000_wuauclt.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 1583fc4380149df1d5a870887669e61a0c3312119f0743ce0ef37bbf07f2c6f4
        • Instruction ID: c5b843ac3fd229a28f7170dedecaf7103ba53ce347b8abc8035863f8ae3c0fb6
        • Opcode Fuzzy Hash: 1583fc4380149df1d5a870887669e61a0c3312119f0743ce0ef37bbf07f2c6f4
        • Instruction Fuzzy Hash: EF51BAF3B62B9485D7918FA9E444BC837A8F329F95F215115EB4C6B351DB328A62C301
        Uniqueness

        Uniqueness Score: -1.00%

        Memory Dump Source
        • Source File: 00000000.00000002.2461964456.00007FF693DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF693DB0000, based on PE: true
        • Associated: 00000000.00000002.2461948718.00007FF693DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2462062634.00007FF693EF5000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2462108544.00007FF693F68000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2462124795.00007FF693F6E000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff693db0000_wuauclt.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 00041c4d9b6021bd7268743e75341ac9f422d742c08481849cac6ad422316a98
        • Instruction ID: 2bd766f6e4650a9b6c2893df5faed3b18821b6447e388f9568e7dbbc969314eb
        • Opcode Fuzzy Hash: 00041c4d9b6021bd7268743e75341ac9f422d742c08481849cac6ad422316a98
        • Instruction Fuzzy Hash: 15F0E2327283E005CBA5CA76A408F5D2DE59391BC8F12D130E90CC3F44F92EC6018B00
        Uniqueness

        Uniqueness Score: -1.00%

        Memory Dump Source
        • Source File: 00000000.00000002.2461964456.00007FF693DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF693DB0000, based on PE: true
        • Associated: 00000000.00000002.2461948718.00007FF693DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2462062634.00007FF693EF5000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2462108544.00007FF693F68000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2462124795.00007FF693F6E000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff693db0000_wuauclt.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 2c83208bef4d752e21eecc982e00e41a7b9bb589477a0b7ed4897396d2cb2cab
        • Instruction ID: d390dec673d5d3d25034a18b552e8d440bf12e5803d82bb45ebfef47dda33872
        • Opcode Fuzzy Hash: 2c83208bef4d752e21eecc982e00e41a7b9bb589477a0b7ed4897396d2cb2cab
        • Instruction Fuzzy Hash: ADE0DF727083A405C766CA332118E592AA4A314BC5F03D130D90DD3F01FC2FD6008B40
        Uniqueness

        Uniqueness Score: -1.00%

        APIs
          • Part of subcall function 00007FF693E6B800: __stdio_common_vswprintf.API-MS-WIN-CRT-STDIO-L1-1-0 ref: 00007FF693E6B84C
        • GetModuleHandleW.KERNEL32(?,00007FF693DB14E9), ref: 00007FF693E6B6E6
        • GetProcAddress.KERNEL32(?,00007FF693DB14E9), ref: 00007FF693E6B74E
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.2461964456.00007FF693DB1000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF693DB0000, based on PE: true
        • Associated: 00000000.00000002.2461948718.00007FF693DB0000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2462062634.00007FF693EF5000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2462108544.00007FF693F68000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.2462124795.00007FF693F6E000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff693db0000_wuauclt.jbxd
        Similarity
        • API ID: AddressHandleModuleProc__stdio_common_vswprintf
        • String ID: OPENSSL_Applink$OPENSSL_Uplink(%p,%02X):
        • API String ID: 2805472909-2538489275
        • Opcode ID: 13ae417d33661df069f36909d2526c7ba9bdf24f04b1ee1fe29026d7fc7513ca
        • Instruction ID: 13c207ff111440c0c0e710965aba411f1119ab04e0b1719e01e93732962c9adf
        • Opcode Fuzzy Hash: 13ae417d33661df069f36909d2526c7ba9bdf24f04b1ee1fe29026d7fc7513ca
        • Instruction Fuzzy Hash: 58512E75D18B4681E7218F65E85217473B8FB587A8F045376EAADA36E6EF3CB1809300
        Uniqueness

        Uniqueness Score: -1.00%