Edit tour

Windows Analysis Report
SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exe

Overview

General Information

Sample name:SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exe
Analysis ID:1408427
MD5:598e24d51051ba5d514b89e257f6f393
SHA1:f50ce638d93d88739466fdff93b6414da94c3591
SHA256:508796ab6be3a5d09168de018b3f32914c1992ac991b3489b45cc94d2b2ca17d
Tags:exe
Infos:

Detection

Score:3
Range:0 - 100
Whitelisted:false
Confidence:60%

Signatures

Contains functionality to read the PEB
HTTP GET or POST without a user agent
JA3 SSL client fingerprint seen in connection with other malware
Monitors certain registry keys / values for changes (often done to protect autostart functionality)
PE file contains executable resources (Code or Archives)
Queries disk information (often used to detect virtual machines)
Sample file is different than original file name gathered from version info
Tries to load missing DLLs
Uses 32bit PE files

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious

Analysis Advice

Sample tries to load a library which is not present or installed on the analysis machine, adding the library might reveal more behavior
Sample may offer command line options, please run it with the 'Execute binary with arguments' cookbook (it's possible that the command line switches require additional characters like: "-", "/", "--")
  • System is w10x64
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

There are no malicious signatures, click here to show all signatures.

Source: SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exeStatic PE information: certificate valid
Source: unknownHTTPS traffic detected: 182.92.74.22:443 -> 192.168.2.4:49730 version: TLS 1.2
Source: unknownHTTPS traffic detected: 182.92.74.22:443 -> 192.168.2.4:49730 version: TLS 1.2
Source: SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: E:\work\video_clip\develop\QYMediaFormat\Output\Bin\Release\Win32\Setup.pdb source: SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exe
Source: global trafficHTTP traffic detected: POST /log/v1/api/report?request_id=66475519E28142B5AE06B9F7356A26C4&timestamp=1710343569&sign=27bad079aa4d795023176c0a5801a0a4 HTTP/1.1Content-Type: application/jsonHost: apis.pdfxd.comContent-Length: 174Connection: Keep-AliveCache-Control: no-cache
Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownDNS traffic detected: queries for: apis.pdfxd.com
Source: unknownHTTP traffic detected: POST /log/v1/api/report?request_id=66475519E28142B5AE06B9F7356A26C4&timestamp=1710343569&sign=27bad079aa4d795023176c0a5801a0a4 HTTP/1.1Content-Type: application/jsonHost: apis.pdfxd.comContent-Length: 174Connection: Keep-AliveCache-Control: no-cache
Source: SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exe, 00000000.00000002.2947561858.0000000002848000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://api.pdfxd.com/pdf-service/v1/cloud/addition
Source: SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exe, 00000000.00000002.2947561858.0000000002848000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://api.pdfxd.com/pdf-service/v1/cloud/miniNews
Source: SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exe, 00000000.00000002.2947561858.0000000002848000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exe, 00000000.00000002.2947561858.0000000002840000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://archive.pdfxd.com/xundu/cef.7z
Source: SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exeString found in binary or memory: http://archive.pdfxd.com/xundu/cef.7zhttps://dev.pdfxd.com/cloud/v1/api/upgradedev.datahttps://dev.p
Source: SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exeString found in binary or memory: http://ftp://https://&%s=%s%f%f%s.write_cachehigh%I64ufalselowType
Source: SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exe, 00000000.00000002.2947561858.000000000289B000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://apis.pdfxd.com/
Source: SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exe, 00000000.00000002.2947561858.00000000028C1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://apis.pdfxd.com/7U
Source: SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exe, 00000000.00000002.2947561858.0000000002848000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://apis.pdfxd.com/account/v1/api/passport/logout
Source: SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exe, 00000000.00000002.2947561858.0000000002840000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://apis.pdfxd.com/account/v1/api/user/info
Source: SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exe, 00000000.00000002.2947561858.0000000002848000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://apis.pdfxd.com/cloud/v1/api/action
Source: SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exe, 00000000.00000002.2947561858.0000000002840000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://apis.pdfxd.com/cloud/v1/api/upgradeUSt
Source: SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exe, 00000000.00000002.2947561858.0000000002840000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://apis.pdfxd.com/customer/cloud/activeVEt
Source: SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exe, 00000000.00000002.2947561858.0000000002848000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://apis.pdfxd.com/customer/dump/upload
Source: SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exe, 00000000.00000002.2947561858.0000000002848000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://apis.pdfxd.com/customer/support
Source: SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exe, 00000000.00000002.2947561858.0000000002840000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://apis.pdfxd.com/log/v1/api/report
Source: SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exe, 00000000.00000003.1687434773.00000000028E3000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://apis.pdfxd.com/log/v1/api/report?request_id=66475519E28142B5AE06B9F7356A26C4&timestamp=17103
Source: SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exe, 00000000.00000002.2947561858.00000000028C1000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://apis.pdfxd.com/p
Source: SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exe, 00000000.00000002.2947561858.0000000002848000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://converter.qyscreen.com/payment.html
Source: SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exe, 00000000.00000002.2947561858.0000000002840000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://converter.qyscreen.com/sign.html
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
Source: unknownHTTPS traffic detected: 182.92.74.22:443 -> 192.168.2.4:49730 version: TLS 1.2
Source: unknownHTTPS traffic detected: 182.92.74.22:443 -> 192.168.2.4:49730 version: TLS 1.2
Source: SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exeStatic PE information: Resource name: RT_RCDATA type: 7-zip archive data, version 0.4
Source: SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exe, 00000000.00000002.2945850204.0000000002419000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameSetup.exe0 vs SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exe
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exeSection loaded: msimg32.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exeSection loaded: dbghelp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exeSection loaded: wtsapi32.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exeSection loaded: userenv.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exeSection loaded: secur32.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exeSection loaded: msasn1.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exeSection loaded: windowscodecs.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exeSection loaded: atlthunk.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exeSection loaded: schannel.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exeSection loaded: mskeyprotect.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exeSection loaded: ntasn1.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exeSection loaded: dpapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exeSection loaded: gpapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exeSection loaded: ncrypt.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exeSection loaded: ncryptsslp.dllJump to behavior
Source: SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exeBinary or memory string: E.VbPZW
Source: classification engineClassification label: clean3.winEXE@1/0@1/1
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exeFile created: C:\Users\user\AppData\Roaming\QYMediaFormatDataJump to behavior
Source: SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exeFile read: C:\Users\user\AppData\Roaming\QYMediaFormatData\UserData\mfConfig.iniJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exeString found in binary or memory: SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\Data..UserDataSkinDumpUpdateDownloadsAppTpAppDownloadCache.kdDownloads\http://archive.pdfxd.com/xundu/cef.7zhttps://dev.pdfxd.com/cloud/v1/api/upgradedev.datahttps://dev.pdfxd.com/customer/cloud/activehttps://dev.pdfxd.com/log/v1/api/reporthttp://api.pdfxd.com/pdf-service/v1/cloud/additionhttps://dev.pdfxd.com/cloud/v1/api/actionhttp://api.pdfxd.com/pdf-service/v1/cloud/miniNewshttps://dev.pdfxd.com/customer/dump/uploadhttps://apis.pdfxd.com/log/v1/api/reporthttps://apis.pdfxd.com/customer/supporthttp://dev.pdfxd.com/pdf-service/v1/cloud/miniNewshttps://apis.pdfxd.com/customer/dump/uploadhttps://qyconverter.xundupdf.com/sign.htmlhttps://dev.pdfxd.com/account/v1/api/passport/logouthttps://dev.pdfxd.com/customer/supporthttps://dev.pdfxd.com/account/v1/api/user/infohttps://apis.pdfxd.com/cloud/v1/api/upgradehttp://qyconverter.xundupdf.com/payment.htmlhttps://apis.pdfxd.com/cloud/v1/api/actionhttps://apis.pdfxd.com/customer/cloud/activehttps://converter.qyscreen.com/sign.htmlhttps://apis.pdfxd.com/account/v1/api/passport/logouthttps://converter.qyscreen.com/payment.htmlhttps://apis.pdfxd.com/account/v1/api/user/infohttps://pic.pdfxd.com
Source: SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exeString found in binary or memory: </InstallEnd>
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
Source: SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exeStatic PE information: certificate valid
Source: SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
Source: SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exeStatic file information: File size 33948664 > 1048576
Source: SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x1d4a00
Source: SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exeStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x1e28200
Source: SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: E:\work\video_clip\develop\QYMediaFormat\Output\Bin\Release\Win32\Setup.pdb source: SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exe
Source: SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\AutoUpdateJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exeRegistry key monitored for changes: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRootJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exeFile opened: PhysicalDrive0Jump to behavior
Source: SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exe, 00000000.00000002.2947561858.00000000028F8000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exe, 00000000.00000002.2947561858.00000000028A7000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exeCode function: 0_2_0058672A mov eax, dword ptr fs:[00000030h]0_2_0058672A
Source: C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exeCode function: 0_2_0053CD43 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_0053CD43
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Command and Scripting Interpreter
1
DLL Side-Loading
1
DLL Side-Loading
1
Masquerading
OS Credential Dumping1
System Time Discovery
Remote ServicesData from Local System1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
Virtualization/Sandbox Evasion
LSASS Memory1
Query Registry
Remote Desktop ProtocolData from Removable Media2
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager11
Security Software Discovery
SMB/Windows Admin SharesData from Network Shared Drive3
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDS1
Virtualization/Sandbox Evasion
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets1
File and Directory Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials12
System Information Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1408427 Sample: SecuriteInfo.com.not-a-viru... Startdate: 13/03/2024 Architecture: WINDOWS Score: 3 8 apis.pdfxd.com 2->8 5 SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exe 2 26 2->5         started        process3 dnsIp4 10 apis.pdfxd.com 182.92.74.22, 443, 49730 CNNIC-ALIBABA-CN-NET-APHangzhouAlibabaAdvertisingCoLtd China 5->10

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exe9%ReversingLabs
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://archive.pdfxd.com/xundu/cef.7z0%Avira URL Cloudsafe
http://api.pdfxd.com/pdf-service/v1/cloud/addition0%Avira URL Cloudsafe
https://apis.pdfxd.com/customer/cloud/activeVEt0%Avira URL Cloudsafe
http://ftp://https://&%s=%s%f%f%s.write_cachehigh%I64ufalselowType0%Avira URL Cloudsafe
https://apis.pdfxd.com/account/v1/api/user/info0%Avira URL Cloudsafe
http://archive.pdfxd.com/xundu/cef.7zhttps://dev.pdfxd.com/cloud/v1/api/upgradedev.datahttps://dev.p0%Avira URL Cloudsafe
https://apis.pdfxd.com/account/v1/api/passport/logout0%Avira URL Cloudsafe
https://apis.pdfxd.com/log/v1/api/report0%Avira URL Cloudsafe
https://apis.pdfxd.com/p0%Avira URL Cloudsafe
https://apis.pdfxd.com/customer/support0%Avira URL Cloudsafe
https://apis.pdfxd.com/0%Avira URL Cloudsafe
https://apis.pdfxd.com/customer/dump/upload0%Avira URL Cloudsafe
http://api.pdfxd.com/pdf-service/v1/cloud/miniNews0%Avira URL Cloudsafe
https://converter.qyscreen.com/sign.html0%Avira URL Cloudsafe
https://converter.qyscreen.com/payment.html0%Avira URL Cloudsafe
https://apis.pdfxd.com/cloud/v1/api/upgradeUSt0%Avira URL Cloudsafe
https://apis.pdfxd.com/cloud/v1/api/action0%Avira URL Cloudsafe
https://apis.pdfxd.com/7U0%Avira URL Cloudsafe
https://apis.pdfxd.com/log/v1/api/report?request_id=66475519E28142B5AE06B9F7356A26C4&timestamp=171030%Avira URL Cloudsafe
https://apis.pdfxd.com/log/v1/api/report?request_id=66475519E28142B5AE06B9F7356A26C4&timestamp=1710343569&sign=27bad079aa4d795023176c0a5801a0a40%Avira URL Cloudsafe

Download Network PCAP: filteredfull

NameIPActiveMaliciousAntivirus DetectionReputation
apis.pdfxd.com
182.92.74.22
truefalse
    unknown
    NameMaliciousAntivirus DetectionReputation
    https://apis.pdfxd.com/log/v1/api/report?request_id=66475519E28142B5AE06B9F7356A26C4&timestamp=1710343569&sign=27bad079aa4d795023176c0a5801a0a4false
    • Avira URL Cloud: safe
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    https://apis.pdfxd.com/pSecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exe, 00000000.00000002.2947561858.00000000028C1000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://archive.pdfxd.com/xundu/cef.7zhttps://dev.pdfxd.com/cloud/v1/api/upgradedev.datahttps://dev.pSecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exefalse
    • Avira URL Cloud: safe
    unknown
    https://apis.pdfxd.com/log/v1/api/reportSecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exe, 00000000.00000002.2947561858.0000000002840000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://ftp://https://&%s=%s%f%f%s.write_cachehigh%I64ufalselowTypeSecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exefalse
    • Avira URL Cloud: safe
    low
    http://archive.pdfxd.com/xundu/cef.7zSecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exe, 00000000.00000002.2947561858.0000000002848000.00000004.00000020.00020000.00000000.sdmp, SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exe, 00000000.00000002.2947561858.0000000002840000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://apis.pdfxd.com/account/v1/api/user/infoSecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exe, 00000000.00000002.2947561858.0000000002840000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://api.pdfxd.com/pdf-service/v1/cloud/additionSecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exe, 00000000.00000002.2947561858.0000000002848000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://apis.pdfxd.com/customer/cloud/activeVEtSecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exe, 00000000.00000002.2947561858.0000000002840000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://apis.pdfxd.com/customer/supportSecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exe, 00000000.00000002.2947561858.0000000002848000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://apis.pdfxd.com/account/v1/api/passport/logoutSecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exe, 00000000.00000002.2947561858.0000000002848000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://apis.pdfxd.com/SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exe, 00000000.00000002.2947561858.000000000289B000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://apis.pdfxd.com/cloud/v1/api/upgradeUStSecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exe, 00000000.00000002.2947561858.0000000002840000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://apis.pdfxd.com/customer/dump/uploadSecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exe, 00000000.00000002.2947561858.0000000002848000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://api.pdfxd.com/pdf-service/v1/cloud/miniNewsSecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exe, 00000000.00000002.2947561858.0000000002848000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://apis.pdfxd.com/7USecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exe, 00000000.00000002.2947561858.00000000028C1000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://converter.qyscreen.com/sign.htmlSecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exe, 00000000.00000002.2947561858.0000000002840000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://converter.qyscreen.com/payment.htmlSecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exe, 00000000.00000002.2947561858.0000000002848000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://apis.pdfxd.com/cloud/v1/api/actionSecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exe, 00000000.00000002.2947561858.0000000002848000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    https://apis.pdfxd.com/log/v1/api/report?request_id=66475519E28142B5AE06B9F7356A26C4&timestamp=17103SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exe, 00000000.00000003.1687434773.00000000028E3000.00000004.00000020.00020000.00000000.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    182.92.74.22
    apis.pdfxd.comChina
    37963CNNIC-ALIBABA-CN-NET-APHangzhouAlibabaAdvertisingCoLtdfalse
    Joe Sandbox version:40.0.0 Tourmaline
    Analysis ID:1408427
    Start date and time:2024-03-13 16:25:17 +01:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 4m 48s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:5
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exe
    Detection:CLEAN
    Classification:clean3.winEXE@1/0@1/1
    EGA Information:
    • Successful, ratio: 100%
    HCA Information:Failed
    Cookbook Comments:
    • Found application associated with file extension: .exe
    • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
    • Not all processes where analyzed, report is missing behavior information
    • Report size getting too big, too many NtOpenKeyEx calls found.
    • Report size getting too big, too many NtProtectVirtualMemory calls found.
    • Report size getting too big, too many NtQueryValueKey calls found.
    • VT rate limit hit for: SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exe
    No simulations
    No context
    No context
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    CNNIC-ALIBABA-CN-NET-APHangzhouAlibabaAdvertisingCoLtd7YYJZyLPiX.elfGet hashmaliciousMiraiBrowse
    • 8.183.78.85
    cCQ8OCNYwd.elfGet hashmaliciousMiraiBrowse
    • 106.14.214.119
    pUQL9ZI8ks.elfGet hashmaliciousMiraiBrowse
    • 8.147.250.77
    isWhefjqVA.elfGet hashmaliciousMiraiBrowse
    • 39.99.214.37
    x86_64-20240313-0840.elfGet hashmaliciousMirai, MoobotBrowse
    • 47.114.228.131
    TJoFRT42dh.elfGet hashmaliciousMiraiBrowse
    • 8.128.58.217
    vb75H26uOr.elfGet hashmaliciousMiraiBrowse
    • 182.94.124.108
    jDK4KtkjAq.elfGet hashmaliciousMirai, MoobotBrowse
    • 47.118.42.196
    TfpwQ763RO.elfGet hashmaliciousMirai, MoobotBrowse
    • 120.78.240.215
    5m6jbTvemR.elfGet hashmaliciousMiraiBrowse
    • 121.197.114.199
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    37f463bf4616ecd445d4a1937da06e19E-dekont.exeGet hashmaliciousAgentTeslaBrowse
    • 182.92.74.22
    MT103.exeGet hashmaliciousAgentTeslaBrowse
    • 182.92.74.22
    BL copy.exeGet hashmaliciousFormBook, GuLoaderBrowse
    • 182.92.74.22
    2257HVL2300001691.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
    • 182.92.74.22
    Bibeskftigelserne221.exeGet hashmaliciousAgentTesla, GuLoaderBrowse
    • 182.92.74.22
    https://us02web.zoom.us/j/81580289193?pwd=VjdCRUE1bjQ4dEpWUkpOR0poRm12dz09Get hashmaliciousUnknownBrowse
    • 182.92.74.22
    Interviewed.exeGet hashmaliciousFormBook, GuLoaderBrowse
    • 182.92.74.22
    Scanned PO Copy.vbsGet hashmaliciousFormBook, GuLoaderBrowse
    • 182.92.74.22
    EandP_approval_0311202401266.vbsGet hashmaliciousXWormBrowse
    • 182.92.74.22
    2403131462348155_BPCT1203172627_txn_recipt.vbsGet hashmaliciousAgentTesla, GuLoaderBrowse
    • 182.92.74.22
    No context
    No created / dropped files found
    File type:PE32 executable (GUI) Intel 80386, for MS Windows
    Entropy (8bit):7.979983393450611
    TrID:
    • Win32 Executable (generic) a (10002005/4) 99.96%
    • Generic Win/DOS Executable (2004/3) 0.02%
    • DOS Executable Generic (2002/1) 0.02%
    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
    File name:SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exe
    File size:33'948'664 bytes
    MD5:598e24d51051ba5d514b89e257f6f393
    SHA1:f50ce638d93d88739466fdff93b6414da94c3591
    SHA256:508796ab6be3a5d09168de018b3f32914c1992ac991b3489b45cc94d2b2ca17d
    SHA512:84ca13295017cd0f1451fe8bd02eede5ad1fa10a9528e734853c147e5c57fc485f68dd1eb86160be3d22a84c9e149079a467cff2bb6cc694b547890e880bb9b8
    SSDEEP:786432:ei5gcuQnecUS6FREek7zJkcDBof1L7OKzoB0uCdI:eiecMcUS6FRrkBBofROQoB8I
    TLSH:BE772320390DC231EE9D003D897CAA7EC7FC93D50B2B5ED752581669DAB05F23B3199A
    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......2?.1v^.bv^.bv^.bb5.ca^.bb5.c.^.b$+.ce^.b$+.ca^.b$+.c+^.bb5.ch^.bb5.cu^.bb5.c]^.bv^.bj\.b.+.c.^.b.+.cp^.b.+vbw^.bv^.bw^.b.+.cw^.
    Icon Hash:47b969cdce74b947
    Entrypoint:0x55c53d
    Entrypoint Section:.text
    Digitally signed:true
    Imagebase:0x400000
    Subsystem:windows gui
    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
    Time Stamp:0x63898E33 [Fri Dec 2 05:33:39 2022 UTC]
    TLS Callbacks:
    CLR (.Net) Version:
    OS Version Major:6
    OS Version Minor:0
    File Version Major:6
    File Version Minor:0
    Subsystem Version Major:6
    Subsystem Version Minor:0
    Import Hash:25538d5f7561109c81d905b599931063
    Signature Valid:true
    Signature Issuer:CN=DigiCert Trusted G4 Code Signing RSA4096 SHA384 2021 CA1, O="DigiCert, Inc.", C=US
    Signature Validation Error:The operation completed successfully
    Error Number:0
    Not Before, Not After
    • 25/08/2021 01:00:00 23/08/2023 00:59:59
    Subject Chain
    • CN="Tianjin Xundu Technology Co.,Ltd", OU=IT, O="Tianjin Xundu Technology Co.,Ltd", S=\u5929\u6d25\u5e02, C=CN, SERIALNUMBER=91120116MA06R2NL3B, OID.1.3.6.1.4.1.311.60.2.1.1=\u6ee8\u6d77\u65b0\u533a, OID.1.3.6.1.4.1.311.60.2.1.2=\u5929\u6d25\u5e02, OID.1.3.6.1.4.1.311.60.2.1.3=CN, OID.2.5.4.15=Private Organization
    Version:3
    Thumbprint MD5:4656E5CDD9C06356144604A8F077EB32
    Thumbprint SHA-1:E01C5DB1AF18516729BD81AFF10A60AC90555DDA
    Thumbprint SHA-256:718D93D58808C6227B5A7BE42A5B88B7E96638FDBFB09184AA9ED8551C6E70A3
    Serial:0AE930D9D6DE2C93B10DF59D8EDD6847
    Instruction
    call 00007F10B11BED13h
    jmp 00007F10B11BE2E8h
    push ebp
    mov ebp, esp
    pop ebp
    jmp 00007F10B11BD7A6h
    retn 0000h
    push ebp
    mov ebp, esp
    mov eax, dword ptr [ebp+08h]
    mov eax, dword ptr [eax]
    pop ebp
    ret
    push ebp
    mov ebp, esp
    mov eax, dword ptr [ebp+08h]
    mov eax, dword ptr [eax]
    pop ebp
    ret
    push ebp
    mov ebp, esp
    mov eax, dword ptr [ebp+08h]
    mov edx, 005F7BC0h
    mov ecx, 005F7B84h
    sub eax, edx
    sub ecx, edx
    cmp eax, ecx
    jnbe 00007F10B11BE4C3h
    int3
    pop ebp
    ret
    push ebp
    mov ebp, esp
    mov eax, dword ptr [ebp+08h]
    mov edx, 005F7BC0h
    mov ecx, 005F7B84h
    sub eax, edx
    sub ecx, edx
    cmp eax, ecx
    jnbe 00007F10B11BE4C7h
    push 00000041h
    pop ecx
    int 29h
    pop ebp
    ret
    retn 0000h
    push ebp
    mov ebp, esp
    mov eax, dword ptr [ebp+08h]
    mov edx, 005F7BC0h
    mov ecx, 005F7B84h
    sub eax, edx
    sub ecx, edx
    cmp eax, ecx
    jnbe 00007F10B11BE4E1h
    cmp dword ptr [006240BCh], 00000000h
    je 00007F10B11BE4D8h
    push esi
    mov esi, dword ptr [006240BCh]
    mov ecx, esi
    push dword ptr [ebp+08h]
    call dword ptr [005D68C4h]
    call esi
    pop ecx
    pop esi
    pop ebp
    ret
    push ebp
    mov ebp, esp
    mov eax, dword ptr [ebp+08h]
    mov edx, 005F7BC0h
    mov ecx, 005F7B84h
    sub eax, edx
    sub ecx, edx
    cmp ecx, eax
    sbb eax, eax
    inc eax
    pop ebp
    ret
    push ebp
    mov ebp, esp
    mov ecx, dword ptr [ebp+08h]
    mov eax, ecx
    sub eax, dword ptr [ebp+0Ch]
    sub eax, 00000080h
    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IMPORT0x21b0280x1b8.rdata
    IMAGE_DIRECTORY_ENTRY_RESOURCE0x2390000x1e280e0.rsrc
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
    IMAGE_DIRECTORY_ENTRY_SECURITY0x205da000x29f8.rsrc
    IMAGE_DIRECTORY_ENTRY_BASERELOC0x20620000x13a2c.reloc
    IMAGE_DIRECTORY_ENTRY_DEBUG0x1f7a680x54.rdata
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0x1f7b880x18.rdata
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x1f7ac00x40.rdata
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IAT0x1d60000x8c4.rdata
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
    .text0x10000x1d49490x1d4a00ca31e6c05e4c3c5f0e6af1eb58116845False0.39555496048946387DOS executable (COM)6.4375229361657915IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    .rdata0x1d60000x482680x484002006a612038b303fa7e85628a561817bFalse0.3873067149653979OpenPGP Secret Key5.095132916829529IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .data0x21f0000x198200x4a00bc0aaccf3a964584345a9530a2b8c9ccFalse0.1813766891891892data4.728042018693681IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .rsrc0x2390000x1e280e00x1e282008aace049df42f19450b09e7fd812f4e5unknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .reloc0x20620000x13a2c0x13c00d05954dd7e8adf68ac4b5e8a86f52137False0.6103021162974683data6.644182702188901IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
    NameRVASizeTypeLanguageCountryZLIB Complexity
    PNG0x2396480x2b1PNG image data, 210 x 143, 8-bit/color RGBA, non-interlacedChineseChina0.7706821480406386
    PNG0x2398fc0x24ePNG image data, 96 x 24, 8-bit/color RGBA, non-interlacedChineseChina0.9864406779661017
    PNG0x239b4c0xb5PNG image data, 8 x 4, 8-bit/color RGBA, non-interlacedChineseChina0.994475138121547
    PNG0x239c040x357PNG image data, 72 x 24, 8-bit/color RGBA, non-interlacedChineseChina1.0128654970760234
    PNG0x239f5c0xb1PNG image data, 8 x 4, 8-bit/color RGBA, non-interlacedChineseChina0.9943502824858758
    PNG0x23a0100x320PNG image data, 96 x 24, 8-bit/color RGBA, non-interlacedChineseChina1.01375
    PNG0x23a3300x693PNG image data, 72 x 72, 8-bit colormap, non-interlacedChineseChina1.0065359477124183
    PNG0x23a9c40x187PNG image data, 56 x 14, 8-bit colormap, non-interlacedChineseChina0.9667519181585678
    PNG0x23ab4c0x6016PNG image data, 560 x 278, 8-bit colormap, non-interlacedChineseChina1.000650459386942
    PNG0x240b640x1ecPNG image data, 72 x 24, 8-bit/color RGBA, non-interlacedChineseChina0.9878048780487805
    RT_ICON0x240d500x3ef1PNG image data, 256 x 256, 8-bit/color RGBA, non-interlacedChineseChina0.9970210389126792
    RT_ICON0x244c440x10828Device independent bitmap graphic, 128 x 256 x 32, image size 0ChineseChina0.08979060688512953
    RT_ICON0x25546c0x4228Device independent bitmap graphic, 64 x 128 x 32, image size 0ChineseChina0.1516887104393009
    RT_ICON0x2596940x4228Device independent bitmap graphic, 64 x 128 x 32, image size 0ChineseChina0.1516887104393009
    RT_ICON0x25d8bc0x25a8Device independent bitmap graphic, 48 x 96 x 32, image size 0ChineseChina0.18983402489626555
    RT_ICON0x25fe640x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 0ChineseChina0.2453095684803002
    RT_ICON0x260f0c0x468Device independent bitmap graphic, 16 x 32 x 32, image size 0ChineseChina0.3484042553191489
    RT_ICON0x2613740x10a8Device independent bitmap graphic, 32 x 64 x 32, image size 4096ChineseChina0.2544559099437148
    RT_MENU0x26241c0x50dataChineseChina0.8375
    RT_DIALOG0x26246c0x114dataChineseChina0.6159420289855072
    RT_STRING0x2625800x34dataChineseChina0.6346153846153846
    RT_ACCELERATOR0x2625b40x10dataChineseChina1.25
    RT_RCDATA0x2625c40x4ccXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminatorsChineseChina0.40960912052117265
    RT_RCDATA0x262a900x1dfdefd7-zip archive data, version 0.4ChineseChina1.0002412796020508
    RT_GROUP_ICON0x20609900x68dataChineseChina0.6923076923076923
    RT_GROUP_ICON0x20609f80x14dataChineseChina1.2
    RT_VERSION0x2060a0c0x2a4dataChineseChina0.5340236686390533
    RT_MANIFEST0x2060cb00x42eXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (1010), with CRLF line terminatorsEnglishUnited States0.5037383177570094
    DLLImport
    VERSION.dllVerQueryValueW, GetFileVersionInfoW, GetFileVersionInfoSizeW
    KERNEL32.dllGetProcessId, Module32FirstW, Module32NextW, lstrcmpA, WTSGetActiveConsoleSessionId, GetThreadLocale, SetThreadLocale, GetSystemInfo, GetWindowsDirectoryW, GetSystemDirectoryW, GetEnvironmentVariableW, DeviceIoControl, GetFileAttributesExW, lstrlenA, SetFileAttributesW, MoveFileExW, lstrcpynA, FlushViewOfFile, UnmapViewOfFile, SetEndOfFile, CreateFileMappingW, MapViewOfFile, GetFileSizeEx, GetLongPathNameW, IsBadReadPtr, GetDriveTypeW, GetLogicalDriveStringsW, GetDiskFreeSpaceExW, GetVolumeInformationW, ResetEvent, SetEvent, PostQueuedCompletionStatus, GetExitCodeThread, CreateEventW, CreateIoCompletionPort, GetQueuedCompletionStatus, SetErrorMode, DecodePointer, WriteConsoleW, FlushFileBuffers, SetEnvironmentVariableW, FreeEnvironmentStringsW, GetEnvironmentStringsW, GetCommandLineW, GetCommandLineA, GetOEMCP, GetACP, IsValidCodePage, FindFirstFileExW, SetConsoleCtrlHandler, ReadProcessMemory, EnumSystemLocalesW, GetUserDefaultLCID, IsValidLocale, GetLocaleInfoW, LCMapStringW, CompareStringW, GetTimeFormatW, GetDateFormatW, GetConsoleOutputCP, VirtualFreeEx, ReadConsoleW, GetConsoleMode, SetFilePointerEx, GetFileType, GetCurrentThread, GetStdHandle, ExitProcess, GetModuleHandleExW, FreeLibraryAndExitThread, ResumeThread, ExitThread, QueryPerformanceFrequency, TlsFree, TlsSetValue, TlsGetValue, TlsAlloc, InterlockedFlushSList, RtlUnwind, GetSystemTimeAsFileTime, QueryPerformanceCounter, SetUnhandledExceptionFilter, UnhandledExceptionFilter, WaitForSingleObjectEx, InitializeCriticalSectionAndSpinCount, GetLocaleInfoEx, LCMapStringEx, GetCPInfo, CompareStringEx, FormatMessageA, GetStringTypeW, LoadLibraryExA, VirtualFree, VirtualAlloc, IsProcessorFeaturePresent, FlushInstructionCache, InterlockedPushEntrySList, InterlockedPopEntrySList, InitializeSListHead, EncodePointer, IsDebuggerPresent, lstrcpyW, GetTimeZoneInformation, CreateRemoteThread, RaiseException, GetLastError, WriteProcessMemory, VirtualAllocEx, GetCurrentProcess, Thread32Next, Thread32First, K32EnumProcessModules, HeapDestroy, HeapAlloc, GetSystemTime, GetNativeSystemInfo, LocalFileTimeToFileTime, SystemTimeToFileTime, HeapReAlloc, HeapFree, HeapSize, GetProcessHeap, InitializeCriticalSectionEx, DeleteCriticalSection, FindResourceExW, LoadResource, LockResource, SizeofResource, FindResourceW, SetLastError, EnterCriticalSection, LeaveCriticalSection, GetCurrentThreadId, GetModuleFileNameW, GetFileSize, CreateFileA, OpenEventW, LocalAlloc, K32GetModuleFileNameExW, ReadFile, GetStartupInfoW, CreatePipe, GetExitCodeProcess, CreateProcessW, CreateDirectoryW, MoveFileW, RemoveDirectoryW, FindClose, FindNextFileW, FindFirstFileW, TerminateProcess, Process32NextW, Process32FirstW, CreateToolhelp32Snapshot, LocalFree, OutputDebugStringW, SetFilePointer, GetPrivateProfileStringW, GetPrivateProfileIntW, CopyFileW, lstrlenW, GlobalSize, CreateThread, TerminateThread, WaitForSingleObject, InitializeCriticalSection, GetVersionExW, GetFileTime, SetFileTime, GlobalUnlock, DeleteFileW, GlobalLock, WriteFile, GetTempFileNameW, GetTempPathW, LoadLibraryW, GetTickCount, GetModuleHandleW, MulDiv, GetCurrentProcessId, OpenProcess, GetModuleHandleA, FreeResource, GlobalFree, GlobalAlloc, Sleep, VerSetConditionMask, VerifyVersionInfoW, WideCharToMultiByte, MultiByteToWideChar, WritePrivateProfileStringW, lstrcmpiW, LoadLibraryExW, GetProcAddress, FreeLibrary, CloseHandle, CreateFileW, GetVersion, SetStdHandle
    USER32.dllRegisterClipboardFormatW, GetSysColor, SetCaretPos, CreateCaret, GetCaretBlinkTime, wsprintfW, UpdateWindow, CloseClipboard, SetClipboardData, FindWindowW, FindWindowExW, WaitForInputIdle, ReleaseDC, SetWindowPos, MoveWindow, PostQuitMessage, LoadCursorW, KillTimer, SetTimer, ShowWindow, DestroyWindow, IsWindow, CreateWindowExW, GetClassInfoExW, RegisterClassExW, SetWindowLongW, GetWindowLongW, GetDlgItem, UnregisterClassW, CallWindowProcW, DefWindowProcW, SendMessageW, GetDC, GetIconInfo, IsClipboardFormatAvailable, UpdateLayeredWindow, SetActiveWindow, BringWindowToTop, AttachThreadInput, GetWindowThreadProcessId, MonitorFromPoint, GetClientRect, GetWindowRect, MapWindowPoints, GetParent, OpenClipboard, LoadIconW, MonitorFromWindow, GetMonitorInfoW, MessageBoxW, GetMessageW, TranslateMessage, DispatchMessageW, PeekMessageW, CharNextW, SetRectEmpty, EqualRect, SetCursor, ClientToScreen, GetCursorPos, PtInRect, ScreenToClient, GetDoubleClickTime, CopyRect, IntersectRect, PostMessageW, SystemParametersInfoW, BeginPaint, EndPaint, IsIconic, InvalidateRect, TrackMouseEvent, SetFocus, GetCursor, SetCapture, ReleaseCapture, SetWindowRgn, EnableWindow, GetForegroundWindow, GetWindowTextW, SetForegroundWindow, IsWindowVisible, GetFocus, GetWindowTextLengthW, SetWindowTextW, IsRectEmpty, LoadImageW, FillRect, IsZoomed, MonitorFromRect, OffsetRect, SetLayeredWindowAttributes, GetWindow, EmptyClipboard, DrawTextW
    GDI32.dllRectangle, CreatePen, RestoreDC, ExtSelectClipRgn, CreateRectRgnIndirect, SaveDC, GetDeviceCaps, GetStockObject, SetBkColor, GetBitmapBits, StretchBlt, SetStretchBltMode, SetPixel, CreateFontIndirectW, CreateSolidBrush, GetTextExtentPointW, GetObjectW, SetTextColor, SetBkMode, CreateRectRgn, CombineRgn, CreateRoundRectRgn, DeleteDC, BitBlt, SelectObject, CreateCompatibleDC, DeleteObject, SetBitmapBits, GetTextColor, GetCurrentObject, SetTextCharacterExtra, GetViewportOrgEx, CopyMetaFileW, SelectPalette, RealizePalette, CreateDIBSection, GetDIBits
    ADVAPI32.dllRegOpenKeyExW, AccessCheck, MapGenericMask, DuplicateToken, GetFileSecurityW, RegNotifyChangeKeyValue, RegConnectRegistryW, ConvertStringSecurityDescriptorToSecurityDescriptorW, ConvertSidToStringSidW, LookupAccountNameW, GetUserNameW, GetUserNameA, LookupAccountNameA, GetSidIdentifierAuthority, IsValidSid, GetLengthSid, SetTokenInformation, FreeSid, CheckTokenMembership, AllocateAndInitializeSid, AdjustTokenPrivileges, LookupPrivilegeValueW, EnumServicesStatusExW, CreateProcessAsUserW, DuplicateTokenEx, GetSidSubAuthorityCount, GetSidSubAuthority, GetTokenInformation, OpenProcessToken, RegSetKeySecurity, SetSecurityDescriptorDacl, InitializeSecurityDescriptor, DeleteService, ControlService, ChangeServiceConfigW, QueryServiceConfigW, QueryServiceStatus, RegEnumKeyW, CloseServiceHandle, CreateServiceW, StartServiceW, OpenServiceW, OpenSCManagerW, RegQueryValueExW, RegSetValueExW, RegQueryInfoKeyW, RegEnumKeyExW, RegDeleteValueW, RegDeleteKeyW, RegCreateKeyExW, RegCloseKey
    SHELL32.dllSHGetSpecialFolderLocation, SHBrowseForFolderW, ShellExecuteW, SHGetFolderPathW, SHCreateDirectoryExW, CommandLineToArgvW, SHChangeNotify, SHGetSpecialFolderPathW, SHGetMalloc, ShellExecuteExW, SHGetKnownFolderPath, SHGetPathFromIDListW
    ole32.dllCoInitializeSecurity, CoInitializeEx, CoCreateGuid, OleRun, OleDuplicateData, RegisterDragDrop, RevokeDragDrop, OleSetContainedObject, CoSetProxyBlanket, StgCreateDocfileOnILockBytes, CreateILockBytesOnHGlobal, ReleaseStgMedium, CreateStreamOnHGlobal, CoInitialize, CoTaskMemRealloc, CoTaskMemAlloc, CoCreateInstance, OleCreateStaticFromData, CoUninitialize, CoTaskMemFree
    OLEAUT32.dllSysAllocString, SysAllocStringLen, VarBstrCmp, SysAllocStringByteLen, SysStringByteLen, VarUI4FromStr, VariantCopy, VariantClear, VariantTimeToSystemTime, SystemTimeToVariantTime, VarDateFromStr, LoadRegTypeLib, LoadTypeLib, SysFreeString, SysStringLen, VariantInit, GetErrorInfo, VariantChangeType, SetErrorInfo, CreateErrorInfo
    SHLWAPI.dllPathCommonPrefixW, PathIsPrefixW, PathCanonicalizeW, PathIsRootW, PathRelativePathToW, StrFormatByteSizeW, UrlGetPartW, StrToIntExW, SHDeleteValueW, SHGetValueW, PathIsDirectoryW, PathSearchAndQualifyW, AssocQueryStringW, SHDeleteKeyW, SHSetValueW, PathRemoveBackslashW, StrCmpIW, PathCombineW, PathAppendW, PathAddBackslashW, PathRemoveFileSpecW, PathRemoveExtensionW, PathFindFileNameW, PathFileExistsW, StrCpyNW
    COMCTL32.dllDrawShadowText, InitCommonControlsEx
    MSIMG32.dllAlphaBlend
    gdiplus.dllGdiplusStartup, GdipDeleteFont, GdipCreateFont, GdipDeleteFontFamily, GdipCreateFontFamilyFromName, GdipDrawString, GdipSetTextRenderingHint, GdipCloneBrush, GdipDeleteBrush, GdipGetImageEncoders, GdipGetImageEncodersSize, GdipBitmapLockBits, GdipCreateHBITMAPFromBitmap, GdipCreateBitmapFromHICON, GdipCreateBitmapFromHBITMAP, GdipCreateBitmapFromScan0, GdipCreateBitmapFromStream, GdipCreateBitmapFromStreamICM, GdipCreateBitmapFromFile, GdipCreateBitmapFromFileICM, GdipGetImagePixelFormat, GdipGetImageHeight, GdipGetImageWidth, GdipSaveImageToFile, GdipCloneImage, GdipLoadImageFromStream, GdipLoadImageFromStreamICM, GdipLoadImageFromFile, GdipLoadImageFromFileICM, GdipDrawImageRectRectI, GdipDrawImageRectI, GdipSetSmoothingMode, GdipSetInterpolationMode, GdipDeleteGraphics, GdipGetImageGraphicsContext, GdipCreateFromHDC, GdipDisposeImage, GdipAlloc, GdipFree, GdipCreateSolidFill
    CRYPT32.dllCertGetNameStringW, CryptBinaryToStringA, CryptBinaryToStringW, CryptStringToBinaryA, CryptStringToBinaryW
    WININET.dllInternetReadFile, InternetSetFilePointer, HttpQueryInfoW, InternetCrackUrlW, InternetSetOptionW, InternetCloseHandle, HttpSendRequestW, HttpOpenRequestW, InternetConnectW, InternetOpenW
    dbghelp.dllImageNtHeader, ImageDirectoryEntryToData
    WTSAPI32.dllWTSQueryUserToken
    USERENV.dllDestroyEnvironmentBlock, CreateEnvironmentBlock
    NETAPI32.dllNetbios
    IPHLPAPI.DLLGetAdaptersInfo, GetIpAddrTable
    Secur32.dllGetUserNameExW
    WINTRUST.dllWinVerifyTrust, WTHelperProvDataFromStateData, CryptCATAdminAcquireContext, CryptCATAdminCalcHashFromFileHandle, CryptCATAdminEnumCatalogFromHash, CryptCATCatalogInfoFromContext, CryptCATAdminReleaseCatalogContext, CryptCATAdminReleaseContext
    Language of compilation systemCountry where language is spokenMap
    ChineseChina
    EnglishUnited States

    Download Network PCAP: filteredfull

    • Total Packets: 13
    • 443 (HTTPS)
    • 53 (DNS)
    TimestampSource PortDest PortSource IPDest IP
    Mar 13, 2024 16:26:11.051578999 CET49730443192.168.2.4182.92.74.22
    Mar 13, 2024 16:26:11.051621914 CET44349730182.92.74.22192.168.2.4
    Mar 13, 2024 16:26:11.051702023 CET49730443192.168.2.4182.92.74.22
    Mar 13, 2024 16:26:11.067748070 CET49730443192.168.2.4182.92.74.22
    Mar 13, 2024 16:26:11.067764044 CET44349730182.92.74.22192.168.2.4
    Mar 13, 2024 16:26:11.715728998 CET44349730182.92.74.22192.168.2.4
    Mar 13, 2024 16:26:11.715838909 CET49730443192.168.2.4182.92.74.22
    Mar 13, 2024 16:26:11.827014923 CET49730443192.168.2.4182.92.74.22
    Mar 13, 2024 16:26:11.827055931 CET44349730182.92.74.22192.168.2.4
    Mar 13, 2024 16:26:11.828747034 CET44349730182.92.74.22192.168.2.4
    Mar 13, 2024 16:26:11.828811884 CET49730443192.168.2.4182.92.74.22
    Mar 13, 2024 16:26:11.833408117 CET49730443192.168.2.4182.92.74.22
    Mar 13, 2024 16:26:11.876240969 CET44349730182.92.74.22192.168.2.4
    Mar 13, 2024 16:26:12.321440935 CET44349730182.92.74.22192.168.2.4
    Mar 13, 2024 16:26:12.321516037 CET49730443192.168.2.4182.92.74.22
    Mar 13, 2024 16:26:12.321542978 CET44349730182.92.74.22192.168.2.4
    Mar 13, 2024 16:26:12.321592093 CET49730443192.168.2.4182.92.74.22
    Mar 13, 2024 16:26:12.321600914 CET44349730182.92.74.22192.168.2.4
    Mar 13, 2024 16:26:12.321643114 CET49730443192.168.2.4182.92.74.22
    Mar 13, 2024 16:26:12.321674109 CET44349730182.92.74.22192.168.2.4
    Mar 13, 2024 16:26:12.321722031 CET49730443192.168.2.4182.92.74.22
    Mar 13, 2024 16:26:12.321995974 CET49730443192.168.2.4182.92.74.22
    Mar 13, 2024 16:26:12.322011948 CET44349730182.92.74.22192.168.2.4
    TimestampSource PortDest PortSource IPDest IP
    Mar 13, 2024 16:26:10.865418911 CET6180453192.168.2.41.1.1.1
    Mar 13, 2024 16:26:11.042277098 CET53618041.1.1.1192.168.2.4
    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
    Mar 13, 2024 16:26:10.865418911 CET192.168.2.41.1.1.10x646dStandard query (0)apis.pdfxd.comA (IP address)IN (0x0001)false
    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
    Mar 13, 2024 16:26:11.042277098 CET1.1.1.1192.168.2.40x646dNo error (0)apis.pdfxd.com182.92.74.22A (IP address)IN (0x0001)false
    • apis.pdfxd.com
    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
    0192.168.2.449730182.92.74.224437332C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exe
    TimestampBytes transferredDirectionData
    2024-03-13 15:26:11 UTC263OUTPOST /log/v1/api/report?request_id=66475519E28142B5AE06B9F7356A26C4&timestamp=1710343569&sign=27bad079aa4d795023176c0a5801a0a4 HTTP/1.1
    Content-Type: application/json
    Host: apis.pdfxd.com
    Content-Length: 174
    Connection: Keep-Alive
    Cache-Control: no-cache
    2024-03-13 15:26:11 UTC174OUTData Raw: 7b 22 61 63 74 69 6f 6e 22 3a 22 69 6e 73 74 61 6c 6c 22 2c 22 64 65 76 69 63 65 5f 69 64 22 3a 22 63 65 33 61 32 32 34 66 63 37 37 64 65 63 32 37 39 37 63 35 64 33 37 61 39 64 63 35 66 33 30 65 22 2c 22 6f 73 22 3a 22 31 36 33 38 34 32 22 2c 22 70 72 6f 64 75 63 74 22 3a 22 71 79 63 6f 6e 76 65 72 74 65 72 22 2c 22 71 64 22 3a 22 48 6f 6d 65 22 2c 22 72 61 6e 64 6f 6d 22 3a 22 34 31 36 35 31 34 30 22 2c 22 73 74 61 74 75 73 22 3a 22 73 74 61 72 74 22 2c 22 76 65 72 73 69 6f 6e 22 3a 22 31 2e 30 2e 32 2e 30 22 7d 0a
    Data Ascii: {"action":"install","device_id":"ce3a224fc77dec2797c5d37a9dc5f30e","os":"163842","product":"qyconverter","qd":"Home","random":"4165140","status":"start","version":"1.0.2.0"}
    2024-03-13 15:26:12 UTC206INHTTP/1.1 200 OK
    Date: Wed, 13 Mar 2024 15:26:12 GMT
    Content-Type: application/json; charset=utf-8
    Content-Length: 33
    Connection: close
    Strict-Transport-Security: max-age=15724800; includeSubDomains
    2024-03-13 15:26:12 UTC33INData Raw: 7b 22 63 6f 64 65 22 3a 30 2c 22 64 61 74 61 22 3a 22 22 2c 22 6d 65 73 73 61 67 65 22 3a 22 22 7d
    Data Ascii: {"code":0,"data":"","message":""}


    • File
    • Registry

    Click to dive into process behavior distribution

    Target ID:0
    Start time:16:26:09
    Start date:13/03/2024
    Path:C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exe
    Wow64 process (32bit):true
    Commandline:C:\Users\user\Desktop\SecuriteInfo.com.not-a-virus.HEUR.AdWare.Win32.PolarWind.gen.16518.27074.exe
    Imagebase:0x3e0000
    File size:33'948'664 bytes
    MD5 hash:598E24D51051BA5D514B89E257F6F393
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:low
    Has exited:false
    There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
    There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
    There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
    There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
    There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
    There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
    There is hidden Windows Behavior. Click on Show Windows Behavior to show it.

    Execution Graph

    Execution Coverage

    Dynamic/Packed Code Coverage

    Signature Coverage

    Execution Coverage:10.1%
    Dynamic/Decrypted Code Coverage:0%
    Signature Coverage:9.6%
    Total number of Nodes:52
    Total number of Limit Nodes:2
    Show Legend
    Hide Nodes/Edges
    execution_graph 234 583daa 235 5839bd GetProcAddress 234->235 236 583dc6 235->236 237 583dcf 236->237 238 583de4 TlsSetValue 236->238 195 576712 196 57671e 195->196 197 576725 GetLastError ExitThread 196->197 198 576732 196->198 205 58672a 198->205 201 57674e 213 576a56 201->213 206 58673c GetPEB 205->206 209 576742 205->209 207 58674f 206->207 206->209 216 583b9d 207->216 209->201 210 584199 209->210 211 5839bd GetProcAddress 210->211 212 5841b5 211->212 212->201 223 576837 213->223 219 5839bd 216->219 218 583bb9 218->209 220 5839eb 219->220 222 5839e7 219->222 221 583a05 GetProcAddress 220->221 220->222 221->222 222->218 225 576842 223->225 224 576884 ExitThread 225->224 226 57685b 225->226 231 5841d4 225->231 228 57686e 226->228 229 576867 CloseHandle 226->229 228->224 230 57687a FreeLibraryAndExitThread 228->230 229->228 230->224 232 5839bd GetProcAddress 231->232 233 5841ed 232->233 233->226 239 577aca 244 588b0f 239->244 241 577acf 242 577ae4 IsProcessorFeaturePresent 241->242 243 577af0 241->243 242->243 247 588865 244->247 248 588871 247->248 253 576c9b EnterCriticalSection 248->253 250 58887f 254 5888bd 250->254 253->250 257 576ce3 LeaveCriticalSection 254->257 256 5888a6 256->241 257->256 258 53c53d 261 53cd90 258->261 260 53c542 260->260 262 53cda6 261->262 264 53cdaf 262->264 265 53cd43 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 262->265 264->260 265->264

    Callgraph

    Hide Legend
    • Executed
    • Not Executed
    • Opacity -> Relevance
    • Disassembly available
    callgraph 0 Function_00576837 10 Function_005841D4 0->10 1 Function_00576A56 1->0 2 Function_00584199 5 Function_005839BD 2->5 3 Function_0053CD90 12 Function_0053CD43 3->12 4 Function_00576712 4->1 4->2 8 Function_00578472 4->8 14 Function_0058672A 4->14 15 Function_0053C8C0 4->15 16 Function_00579F83 5->16 6 Function_005888BD 17 Function_00576CE3 6->17 7 Function_00583B9D 7->5 9 Function_00576C9B 10->5 11 Function_0053C53D 11->3 13 Function_00583DAA 13->5 14->7 18 Function_00588B0F 20 Function_00588865 18->20 19 Function_005789CB 20->6 20->9 20->15 21 Function_00577ACA 21->18 21->19

    Executed Functions

    Control-flow Graph

    APIs
    • GetLastError.KERNEL32(005FA548,0000000C), ref: 00576725
    • ExitThread.KERNEL32 ref: 0057672C
    Memory Dump Source
    • Source File: 00000000.00000002.2945621352.00000000003E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
    • Associated: 00000000.00000002.2945605113.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2945753893.00000000005B6000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2945786740.00000000005FF000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2945802810.0000000000600000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2945818075.0000000000603000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2945818075.0000000000615000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2945850204.0000000000619000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2945850204.0000000001019000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2945850204.0000000001A19000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2945850204.0000000002419000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_3e0000_SecuriteInfo.jbxd
    Similarity
    • API ID: ErrorExitLastThread
    • String ID:
    • API String ID: 1611280651-0
    • Opcode ID: b4022be2305db8ffbf00021f773981445017a2a0e6e05c3345ddd8b8fda22888
    • Instruction ID: f57be2286070df80ef39f6513406f328a0258e9f61513f287dc9743bb3f119b6
    • Opcode Fuzzy Hash: b4022be2305db8ffbf00021f773981445017a2a0e6e05c3345ddd8b8fda22888
    • Instruction Fuzzy Hash: EAF0C871940606DFDB04BB70D80EA2E7F74FF80300F148548F409A7262CB746944EB91
    Uniqueness

    Uniqueness Score: -1.00%

    Non-executed Functions

    Control-flow Graph

    • Executed
    • Not Executed
    control_flow_graph 68 58672a-58673a 69 586769-58676d 68->69 70 58673c-58674d GetPEB 68->70 71 58674f-58675b call 583b9d 70->71 72 586760-586767 70->72 71->72 75 58675d-58675f 71->75 72->69 75->72
    Strings
    Memory Dump Source
    • Source File: 00000000.00000002.2945621352.00000000003E1000.00000020.00000001.01000000.00000003.sdmp, Offset: 003E0000, based on PE: true
    • Associated: 00000000.00000002.2945605113.00000000003E0000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2945753893.00000000005B6000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2945786740.00000000005FF000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2945802810.0000000000600000.00000008.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2945818075.0000000000603000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2945818075.0000000000615000.00000004.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2945850204.0000000000619000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2945850204.0000000001019000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2945850204.0000000001A19000.00000002.00000001.01000000.00000003.sdmpDownload File
    • Associated: 00000000.00000002.2945850204.0000000002419000.00000002.00000001.01000000.00000003.sdmpDownload File
    Joe Sandbox IDA Plugin
    • Snapshot File: hcaresult_0_2_3e0000_SecuriteInfo.jbxd
    Similarity
    • API ID:
    • String ID: dP`
    • API String ID: 0-1201047266
    • Opcode ID: 4fa0342f6d2faf069ef7674612771c8316c5a57c27f06a5d5c362e6e682dcb61
    • Instruction ID: bd4e257aab62139eaa8a2ec5bc4959d2d1dc782b78581b8ac06ae6598c801d09
    • Opcode Fuzzy Hash: 4fa0342f6d2faf069ef7674612771c8316c5a57c27f06a5d5c362e6e682dcb61
    • Instruction Fuzzy Hash: 6DF06531650324DBCF16EB4CD649B5A77ADFB45B55F110096F902EB151D6B0EE40CBD0
    Uniqueness

    Uniqueness Score: -1.00%