Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dll

Overview

General Information

Sample name:SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dll
Analysis ID:1427301
MD5:bca3b499bf4edf8590ad273592fc411b
SHA1:c18679cda189f68f8d7022055a7e5d6aff8d1e58
SHA256:6fb6dc7049299c3172ee60c3f0a0319bd33d0c6b2c9836bf0051e59084e6fce0
Tags:dll
Infos:

Detection

Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Drops PE files
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found evasive API chain (may stop execution after checking a module file name)
Found large amount of non-executed APIs
PE file contains executable resources (Code or Archives)
Sample execution stops while process was sleeping (likely an evasion)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • loaddll32.exe (PID: 6892 cmdline: loaddll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dll" MD5: 51E6071F9CBA48E79F10C84515AAE618)
    • conhost.exe (PID: 6916 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 7028 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dll",#1 MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
      • rundll32.exe (PID: 7124 cmdline: rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dll",#1 MD5: 889B99C52A60DD49227C5E485A016679)
        • clink410.exe (PID: 3272 cmdline: clink410.exe MD5: F91DD2C9AB406FCA3F15680779305DCC)
    • rundll32.exe (PID: 7056 cmdline: rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dll,LoginPro MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 4108 cmdline: rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dll,LoginTYFw MD5: 889B99C52A60DD49227C5E485A016679)
      • clink410.exe (PID: 7136 cmdline: clink410.exe MD5: F91DD2C9AB406FCA3F15680779305DCC)
    • rundll32.exe (PID: 5264 cmdline: rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dll,getXuhaoVal MD5: 889B99C52A60DD49227C5E485A016679)
      • clink410.exe (PID: 4124 cmdline: clink410.exe MD5: F91DD2C9AB406FCA3F15680779305DCC)
    • rundll32.exe (PID: 1668 cmdline: rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dll",LoginPro MD5: 889B99C52A60DD49227C5E485A016679)
    • clink410.exe (PID: 5844 cmdline: clink410.exe MD5: F91DD2C9AB406FCA3F15680779305DCC)
    • rundll32.exe (PID: 4412 cmdline: rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dll",LoginTYFw MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 7128 cmdline: rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dll",getXuhaoVal MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 6548 cmdline: rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dll",xtLoginTYFw MD5: 889B99C52A60DD49227C5E485A016679)
    • rundll32.exe (PID: 6848 cmdline: rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dll",getXuhaoVal2 MD5: 889B99C52A60DD49227C5E485A016679)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dllReversingLabs: Detection: 42%
Source: SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dllVirustotal: Detection: 57%Perma Link
Source: SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dllStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL
Source: SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT
Source: global trafficTCP traffic: 192.168.2.4:49730 -> 103.192.208.126:511
Source: global trafficTCP traffic: 192.168.2.4:49731 -> 103.192.208.9:300
Source: global trafficTCP traffic: 192.168.2.4:49732 -> 101.71.135.228:300
Source: global trafficTCP traffic: 192.168.2.4:49734 -> 103.192.208.83:300
Source: global trafficTCP traffic: 192.168.2.4:49733 -> 101.71.135.233:300
Source: global trafficTCP traffic: 192.168.2.4:49735 -> 115.236.153.239:300
Source: global trafficTCP traffic: 192.168.2.4:49737 -> 115.236.153.233:300
Source: global trafficTCP traffic: 192.168.2.4:49736 -> 45.124.76.226:300
Source: global trafficTCP traffic: 192.168.2.4:49738 -> 103.192.208.102:300
Source: unknownTCP traffic detected without corresponding DNS query: 103.192.208.9
Source: unknownTCP traffic detected without corresponding DNS query: 101.71.135.228
Source: unknownTCP traffic detected without corresponding DNS query: 103.192.208.83
Source: unknownTCP traffic detected without corresponding DNS query: 101.71.135.233
Source: unknownTCP traffic detected without corresponding DNS query: 115.236.153.239
Source: unknownTCP traffic detected without corresponding DNS query: 115.236.153.233
Source: unknownTCP traffic detected without corresponding DNS query: 45.124.76.226
Source: unknownTCP traffic detected without corresponding DNS query: 103.192.208.102
Source: unknownTCP traffic detected without corresponding DNS query: 103.192.208.9
Source: unknownTCP traffic detected without corresponding DNS query: 45.124.76.226
Source: unknownTCP traffic detected without corresponding DNS query: 103.192.208.102
Source: unknownTCP traffic detected without corresponding DNS query: 103.192.208.83
Source: unknownTCP traffic detected without corresponding DNS query: 115.236.153.233
Source: unknownTCP traffic detected without corresponding DNS query: 115.236.153.239
Source: unknownTCP traffic detected without corresponding DNS query: 103.192.208.9
Source: unknownTCP traffic detected without corresponding DNS query: 103.192.208.102
Source: unknownTCP traffic detected without corresponding DNS query: 45.124.76.226
Source: unknownTCP traffic detected without corresponding DNS query: 103.192.208.83
Source: unknownTCP traffic detected without corresponding DNS query: 115.236.153.239
Source: unknownTCP traffic detected without corresponding DNS query: 101.71.135.228
Source: unknownTCP traffic detected without corresponding DNS query: 103.192.208.9
Source: unknownTCP traffic detected without corresponding DNS query: 103.192.208.102
Source: unknownTCP traffic detected without corresponding DNS query: 101.71.135.233
Source: unknownTCP traffic detected without corresponding DNS query: 103.192.208.9
Source: unknownTCP traffic detected without corresponding DNS query: 45.124.76.226
Source: unknownTCP traffic detected without corresponding DNS query: 103.192.208.102
Source: unknownTCP traffic detected without corresponding DNS query: 45.124.76.226
Source: unknownTCP traffic detected without corresponding DNS query: 103.192.208.83
Source: unknownTCP traffic detected without corresponding DNS query: 103.192.208.83
Source: unknownTCP traffic detected without corresponding DNS query: 115.236.153.239
Source: unknownTCP traffic detected without corresponding DNS query: 115.236.153.239
Source: unknownTCP traffic detected without corresponding DNS query: 115.236.153.233
Source: unknownTCP traffic detected without corresponding DNS query: 101.71.135.233
Source: unknownTCP traffic detected without corresponding DNS query: 115.236.153.233
Source: unknownTCP traffic detected without corresponding DNS query: 115.236.153.233
Source: unknownTCP traffic detected without corresponding DNS query: 115.236.153.233
Source: unknownTCP traffic detected without corresponding DNS query: 115.236.153.233
Source: unknownTCP traffic detected without corresponding DNS query: 115.236.153.233
Source: unknownTCP traffic detected without corresponding DNS query: 101.71.135.233
Source: unknownTCP traffic detected without corresponding DNS query: 101.71.135.233
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownDNS traffic detected: queries for: res3.csasnet.net
Source: loaddll32.exe, 00000000.00000003.1773920494.0000000003456000.00000004.00000020.00020000.00000000.sdmp, loaddll32.exe, 00000000.00000003.1774376123.0000000002FDD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.1686864599.0000000004BFD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.1687946403.000000000423D000.00000004.00000020.00020000.00000000.sdmp, clink410.exe, 00000005.00000000.1689393916.000000000059E000.00000002.00000001.01000000.00000005.sdmp, rundll32.exe, 00000006.00000003.1713610500.0000000005032000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1713918850.0000000004BBE000.00000004.00000020.00020000.00000000.sdmp, clink410.exe, 00000007.00000000.1714940304.000000000059E000.00000002.00000001.01000000.00000005.sdmp, rundll32.exe, 00000008.00000003.1743938197.0000000004CE9000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000008.00000003.1744254343.000000000486C000.00000004.00000020.00020000.00000000.sdmp, clink410.exe, 00000009.00000002.1746131392.000000000059E000.00000002.00000001.01000000.00000005.sdmp, rundll32.exe, 0000000A.00000003.1777754019.0000000004234000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000A.00000003.1776342658.00000000046A8000.00000004.00000020.00020000.00000000.sdmp, clink410.exe, 0000000B.00000000.1778533242.000000000059E000.00000002.00000001.01000000.00000005.sdmp, rundll32.exe, 0000000C.00000003.1781322106.000000000423F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000003.1777423633.00000000046BE000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000D.00000003.1778715442.00000000048A5000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000D.00000003.1779752930.0000000004432000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.1778966447.0000000005066000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.1780620634.0000000004BEA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000F.00000003.1779829623.00000000046AE000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.anweishi.com
Source: clink410.exe.3.drStatic PE information: Resource name: MYDATA type: DOS executable (COM)
Source: SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dllStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL
Source: classification engineClassification label: mal48.winDLL@31/3@4/9
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\Desktop\clink410.exeJump to behavior
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6916:120:WilError_03
Source: SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dll,LoginPro
Source: SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dllReversingLabs: Detection: 42%
Source: SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dllVirustotal: Detection: 57%
Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dll"
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dll",#1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dll,LoginPro
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dll",#1
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Users\user\Desktop\clink410.exe clink410.exe
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dll,LoginTYFw
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Users\user\Desktop\clink410.exe clink410.exe
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dll,getXuhaoVal
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Users\user\Desktop\clink410.exe clink410.exe
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dll",LoginPro
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Users\user\Desktop\clink410.exe clink410.exe
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dll",LoginTYFw
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dll",getXuhaoVal
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dll",xtLoginTYFw
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dll",getXuhaoVal2
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dll",#1Jump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dll,LoginProJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dll,LoginTYFwJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dll,getXuhaoValJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dll",LoginProJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Users\user\Desktop\clink410.exe clink410.exeJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dll",LoginTYFwJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dll",getXuhaoValJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dll",xtLoginTYFwJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dll",getXuhaoVal2Jump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dll",#1Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Users\user\Desktop\clink410.exe clink410.exeJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Users\user\Desktop\clink410.exe clink410.exeJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Users\user\Desktop\clink410.exe clink410.exeJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: wldp.dllJump to behavior
Source: C:\Windows\System32\loaddll32.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\clink410.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\clink410.exeSection loaded: msimg32.dllJump to behavior
Source: C:\Users\user\Desktop\clink410.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\clink410.exeSection loaded: oledlg.dllJump to behavior
Source: C:\Users\user\Desktop\clink410.exeSection loaded: oleacc.dllJump to behavior
Source: C:\Users\user\Desktop\clink410.exeSection loaded: winmm.dllJump to behavior
Source: C:\Users\user\Desktop\clink410.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\clink410.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\clink410.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\clink410.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\clink410.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\clink410.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\clink410.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\clink410.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\clink410.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\clink410.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\clink410.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\clink410.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\clink410.exeSection loaded: napinsp.dllJump to behavior
Source: C:\Users\user\Desktop\clink410.exeSection loaded: pnrpnsp.dllJump to behavior
Source: C:\Users\user\Desktop\clink410.exeSection loaded: wshbth.dllJump to behavior
Source: C:\Users\user\Desktop\clink410.exeSection loaded: nlaapi.dllJump to behavior
Source: C:\Users\user\Desktop\clink410.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\clink410.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\clink410.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\clink410.exeSection loaded: winrnr.dllJump to behavior
Source: C:\Users\user\Desktop\clink410.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\clink410.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\clink410.exeAutomated click: OK
Source: C:\Users\user\Desktop\clink410.exeAutomated click: OK
Source: C:\Users\user\Desktop\clink410.exeAutomated click: OK
Source: C:\Users\user\Desktop\clink410.exeAutomated click: OK
Source: C:\Users\user\Desktop\clink410.exeAutomated click: OK
Source: C:\Users\user\Desktop\clink410.exeAutomated click: OK
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dllStatic file information: File size 4792832 > 1048576
Source: SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dllStatic PE information: Raw size of .rsrc is bigger than: 0x100000 < 0x466e00
Source: SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dllStatic PE information: DYNAMIC_BASE, NX_COMPAT
Source: SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dllStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Users\user\Desktop\clink410.exeCode function: 11_2_004DC155 push ecx; ret 11_2_004DC168
Source: C:\Windows\SysWOW64\rundll32.exeFile created: C:\Users\user\Desktop\clink410.exeJump to dropped file
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\clink410.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\clink410.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\clink410.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\clink410.exeWindow / User API: threadDelayed 400Jump to behavior
Source: C:\Users\user\Desktop\clink410.exeWindow / User API: threadDelayed 358Jump to behavior
Source: C:\Users\user\Desktop\clink410.exeEvasive API call chain: GetModuleFileName,DecisionNodes,ExitProcessgraph_11-864
Source: C:\Users\user\Desktop\clink410.exeAPI coverage: 9.1 %
Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
Source: C:\Windows\System32\loaddll32.exeThread delayed: delay time: 120000Jump to behavior
Source: clink410.exe, 0000000B.00000002.3534735405.0000000000FBD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Users\user\Desktop\clink410.exeAPI call chain: ExitProcess graph end nodegraph_11-865
Source: C:\Windows\System32\loaddll32.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\Desktop\clink410.exeCode function: 11_2_004EE6F5 EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,11_2_004EE6F5
Source: C:\Users\user\Desktop\clink410.exeCode function: 11_2_004EE6F5 EncodePointer,EncodePointer,___crtIsPackagedApp,LoadLibraryExW,GetLastError,LoadLibraryExW,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,GetProcAddress,EncodePointer,IsDebuggerPresent,OutputDebugStringW,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,DecodePointer,11_2_004EE6F5
Source: C:\Users\user\Desktop\clink410.exeCode function: 11_2_004E1AE2 SetUnhandledExceptionFilter,UnhandledExceptionFilter,11_2_004E1AE2
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Users\user\Desktop\clink410.exe clink410.exeJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dll",#1Jump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Users\user\Desktop\clink410.exe clink410.exeJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Users\user\Desktop\clink410.exe clink410.exeJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess created: C:\Users\user\Desktop\clink410.exe clink410.exeJump to behavior
Source: loaddll32.exe, 00000000.00000003.1773920494.0000000003456000.00000004.00000020.00020000.00000000.sdmp, loaddll32.exe, 00000000.00000003.1774376123.0000000002FDD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.1686864599.0000000004BFD000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: resNu=ProgmanSHELLDLL_DefViewSysListView32\pro.nlp.lnk\.lnk.lnk\.lnk\\pro.nlp ierr=FindResource err
Source: SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dllBinary or memory string: USER32.DLLMessageBoxWGetActiveWindowGetLastActivePopupGetUserObjectInformationWGetProcessWindowStationCreateFile2CONOUT$1#SNAN1#IND1#INF1#QNANgenericunknown erroriostreamiostream stream errorsystem%dMYDATA.execlinkclinkMsgProgmanSHELLDLL_DefViewSysListView32string too longinvalid string positionbad locale name: ios_base::badbit setios_base::failbit setios_base::eofbit set><vector<T> too longbad cast
Source: C:\Users\user\Desktop\clink410.exeCode function: 5_2_004E144D GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,5_2_004E144D
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
Native API
1
DLL Side-Loading
12
Process Injection
1
Masquerading
OS Credential Dumping1
System Time Discovery
Remote ServicesData from Local System1
Non-Standard Port
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Virtualization/Sandbox Evasion
LSASS Memory21
Security Software Discovery
Remote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)12
Process Injection
Security Account Manager2
Process Discovery
SMB/Windows Admin SharesData from Network Shared Drive1
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
Obfuscated Files or Information
NTDS1
Virtualization/Sandbox Evasion
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Rundll32
LSA Secrets1
Application Window Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
DLL Side-Loading
Cached Domain Credentials2
System Information Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1427301 Sample: SecuriteInfo.com.Win32.Drop... Startdate: 17/04/2024 Architecture: WINDOWS Score: 48 31 res3.csasnet.net 2->31 33 res1.csasnet.com 2->33 41 Multi AV Scanner detection for submitted file 2->41 9 loaddll32.exe 1 2->9         started        signatures3 process4 process5 11 cmd.exe 1 9->11         started        13 clink410.exe 3 9->13         started        16 rundll32.exe 9->16         started        19 8 other processes 9->19 dnsIp6 21 rundll32.exe 1 11->21         started        35 103.192.208.102, 300, 49738 NUSKOPENuSkopePtyLtdAU China 13->35 37 103.192.208.126, 49730, 511 NUSKOPENuSkopePtyLtdAU China 13->37 39 7 other IPs or domains 13->39 29 C:\Users\user\Desktop\clink410.exe, PE32 16->29 dropped 23 clink410.exe 19->23         started        25 clink410.exe 19->25         started        file7 process8 process9 27 clink410.exe 21->27         started       

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dll42%ReversingLabsWin32.Trojan.Znyonm
SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dll57%VirustotalBrowse
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
res1.csasnet.com0%VirustotalBrowse
res3.csasnet.net0%VirustotalBrowse
SourceDetectionScannerLabelLink
https://www.anweishi.com1%VirustotalBrowse
NameIPActiveMaliciousAntivirus DetectionReputation
res1.csasnet.com
124.221.138.85
truefalseunknown
res3.csasnet.net
124.221.138.85
truefalseunknown
NameSourceMaliciousAntivirus DetectionReputation
https://www.anweishi.comloaddll32.exe, 00000000.00000003.1773920494.0000000003456000.00000004.00000020.00020000.00000000.sdmp, loaddll32.exe, 00000000.00000003.1774376123.0000000002FDD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000003.00000003.1686864599.0000000004BFD000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000004.00000003.1687946403.000000000423D000.00000004.00000020.00020000.00000000.sdmp, clink410.exe, 00000005.00000000.1689393916.000000000059E000.00000002.00000001.01000000.00000005.sdmp, rundll32.exe, 00000006.00000003.1713610500.0000000005032000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000006.00000003.1713918850.0000000004BBE000.00000004.00000020.00020000.00000000.sdmp, clink410.exe, 00000007.00000000.1714940304.000000000059E000.00000002.00000001.01000000.00000005.sdmp, rundll32.exe, 00000008.00000003.1743938197.0000000004CE9000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 00000008.00000003.1744254343.000000000486C000.00000004.00000020.00020000.00000000.sdmp, clink410.exe, 00000009.00000002.1746131392.000000000059E000.00000002.00000001.01000000.00000005.sdmp, rundll32.exe, 0000000A.00000003.1777754019.0000000004234000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000A.00000003.1776342658.00000000046A8000.00000004.00000020.00020000.00000000.sdmp, clink410.exe, 0000000B.00000000.1778533242.000000000059E000.00000002.00000001.01000000.00000005.sdmp, rundll32.exe, 0000000C.00000003.1781322106.000000000423F000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000C.00000003.1777423633.00000000046BE000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000D.00000003.1778715442.00000000048A5000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000D.00000003.1779752930.0000000004432000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.1778966447.0000000005066000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000E.00000003.1780620634.0000000004BEA000.00000004.00000020.00020000.00000000.sdmp, rundll32.exe, 0000000F.00000003.1779829623.00000000046AE000.00000004.00000020.00020000.00000000.sdmpfalseunknown
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs
IPDomainCountryFlagASNASN NameMalicious
115.236.153.239
unknownChina
58461CT-HANGZHOU-IDCNo288Fu-chunRoadCNfalse
101.71.135.233
unknownChina
4837CHINA169-BACKBONECHINAUNICOMChina169BackboneCNfalse
45.124.76.226
unknownChina
55720GIGABIT-MYGigabitHostingSdnBhdMYfalse
115.236.153.233
unknownChina
58461CT-HANGZHOU-IDCNo288Fu-chunRoadCNfalse
103.192.208.9
unknownChina
17907NUSKOPENuSkopePtyLtdAUfalse
101.71.135.228
unknownChina
4837CHINA169-BACKBONECHINAUNICOMChina169BackboneCNfalse
103.192.208.126
unknownChina
17907NUSKOPENuSkopePtyLtdAUfalse
103.192.208.83
unknownChina
17907NUSKOPENuSkopePtyLtdAUfalse
103.192.208.102
unknownChina
17907NUSKOPENuSkopePtyLtdAUfalse
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1427301
Start date and time:2024-04-17 12:55:35 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 7m 49s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Run name:Run with higher sleep bypass
Number of analysed new started processes analysed:20
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dll
Detection:MAL
Classification:mal48.winDLL@31/3@4/9
EGA Information:
  • Successful, ratio: 50%
HCA Information:Failed
Cookbook Comments:
  • Found application associated with file extension: .dll
  • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
  • Execution Graph export aborted for target clink410.exe, PID 3272 because there are no executed function
  • Not all processes where analyzed, report is missing behavior information
No simulations
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
115.236.153.2331zDbKSIQpy.exeGet hashmaliciousUnknownBrowse
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    res3.csasnet.net1zDbKSIQpy.exeGet hashmaliciousUnknownBrowse
    • 115.236.153.254
    res1.csasnet.com1zDbKSIQpy.exeGet hashmaliciousUnknownBrowse
    • 45.124.76.254
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    CHINA169-BACKBONECHINAUNICOMChina169BackboneCNRAV6MYlZkN.elfGet hashmaliciousGafgyt, MiraiBrowse
    • 157.8.101.250
    lNd2199wA7.elfGet hashmaliciousGafgyt, MiraiBrowse
    • 157.0.158.215
    xexngqLbiY.elfGet hashmaliciousGafgyt, MiraiBrowse
    • 175.151.199.164
    nYoGq0v7bV.elfGet hashmaliciousGafgyt, MiraiBrowse
    • 157.9.162.58
    4jSjfucaEg.elfGet hashmaliciousMiraiBrowse
    • 116.177.3.110
    SecuriteInfo.com.Trojan.Inject4.54824.15312.17403.exeGet hashmaliciousUnknownBrowse
    • 101.72.233.169
    2024#U5e74#U4e8c#U5b63#U5ea6#U5458#U5de5#U8865#U52a9#U6d41#U7a0b.docx.docGet hashmaliciousUnknownBrowse
    • 211.93.212.129
    zfehGxWbb4.elfGet hashmaliciousMiraiBrowse
    • 182.122.239.165
    CT-HANGZHOU-IDCNo288Fu-chunRoadCNOuJmSE9GcF.elfGet hashmaliciousGafgyt, MiraiBrowse
    • 115.239.80.230
    DqbYZ8Ns4k.elfGet hashmaliciousMiraiBrowse
    • 60.190.221.181
    sEzW1OZkw1.elfGet hashmaliciousGafgyt, MiraiBrowse
    • 115.220.100.229
    SPe0uXr3N3.elfGet hashmaliciousGafgyt, MiraiBrowse
    • 115.220.65.231
    SO8J3K15us.elfGet hashmaliciousGafgytBrowse
    • 115.220.147.232
    dVbrHqaCf1.elfGet hashmaliciousGafgytBrowse
    • 115.220.147.211
    21whXUKd06.elfGet hashmaliciousGafgyt, MiraiBrowse
    • 115.220.147.243
    eiHXI8khyb.elfGet hashmaliciousMiraiBrowse
    • 183.131.107.149
    SecuriteInfo.com.Trojan.Siggen13.11902.1474.19881.exeGet hashmaliciousUnknownBrowse
    • 202.91.251.58
    GIGABIT-MYGigabitHostingSdnBhdMYP5uKPY120j.elfGet hashmaliciousMiraiBrowse
    • 103.21.89.48
    x86Get hashmaliciousUnknownBrowse
    • 103.229.227.51
    http://18255.comGet hashmaliciousUnknownBrowse
    • 103.232.84.252
    11068-1106811068-11068.lnkGet hashmaliciousNetSupport RAT, NetSupport Downloader, MalLnkBrowse
    • 45.121.147.137
    5kh7DYQuRs.elfGet hashmaliciousUnknownBrowse
    • 103.85.108.56
    r8S55MyrFG.elfGet hashmaliciousMiraiBrowse
    • 103.71.179.248
    vyl0vd4LaO.elfGet hashmaliciousMiraiBrowse
    • 103.21.90.35
    9AMYQBwspv.elfGet hashmaliciousMiraiBrowse
    • 103.21.90.32
    CT-HANGZHOU-IDCNo288Fu-chunRoadCNOuJmSE9GcF.elfGet hashmaliciousGafgyt, MiraiBrowse
    • 115.239.80.230
    DqbYZ8Ns4k.elfGet hashmaliciousMiraiBrowse
    • 60.190.221.181
    sEzW1OZkw1.elfGet hashmaliciousGafgyt, MiraiBrowse
    • 115.220.100.229
    SPe0uXr3N3.elfGet hashmaliciousGafgyt, MiraiBrowse
    • 115.220.65.231
    SO8J3K15us.elfGet hashmaliciousGafgytBrowse
    • 115.220.147.232
    dVbrHqaCf1.elfGet hashmaliciousGafgytBrowse
    • 115.220.147.211
    21whXUKd06.elfGet hashmaliciousGafgyt, MiraiBrowse
    • 115.220.147.243
    eiHXI8khyb.elfGet hashmaliciousMiraiBrowse
    • 183.131.107.149
    SecuriteInfo.com.Trojan.Siggen13.11902.1474.19881.exeGet hashmaliciousUnknownBrowse
    • 202.91.251.58
    No context
    No context
    Process:C:\Users\user\Desktop\clink410.exe
    File Type:data
    Category:dropped
    Size (bytes):852
    Entropy (8bit):7.7767617232232285
    Encrypted:false
    SSDEEP:24:X2M71RpVqtCe5YTjLADkmQHqvDCKuRkSP9:ma1RLqcTXXmQK0RVP9
    MD5:018AB155EB16AED6DDFD346099F8A565
    SHA1:5DF872AA1C17ECB2215D20A7752AD921CDD9D034
    SHA-256:E97EBA2D034713B61C3985DF444118E71F1CB1C28FC92ABB93DCD5703FEC4688
    SHA-512:E1E9CA0AD5AEF365BE1C089761BE0A9E4453A9384E42AF1BC9F2DCBAD9955B47A35EA321CF22B4EE5A583534B8F0B38F8924D468AB12E0FAFE408DB53C850E6B
    Malicious:false
    Preview:P........u.5.U&3.W\;2.l.R.p.\-.*....?EsM.....5.}.sf2n...F....u..=."... ...q......`i........!....bY5[...z.R'."..M.2.=..G..O.....0IDII-.._.%.. ..YK...x*s.|.&ct..]..l.Nk.*/Ee(r..$......j..V.:.......,Q..|..w.^....iy.{.t(M........x...4cb>G.Q...D{.A.\f.r....(g.K..7...<@Z.F....&75+.h..s.Jb...B...(...-3.[).~..2..r..f6...........Eh.%.uC...s.UrfS.N..-d......cK.............p....X.[.9XC.....E...I..:.a@..k....\.....;..q..a....C.&.o.W3.:.`A...J.2W.....'....a.adL.ev..P.....r..f.?........H.YD..y.eGe.@.v,9......t.^...u.U..w.=...Ks.s....H.=.7....L].KI.F.C.'.f.'...[|vp..V[.m.S......sX.Z.V.'.4.W-.Z....s...."C.x..........:..J.B...H..F..&..)x.,+.wW......s\....^.5..q......e.._..z...L..h.d..~o...l.uY..8gb.[..F.s...&v...a$-.y.!.LJ........V.....}..s]..o.]EF....'...x+g. ...v.*(.....tn*~..!b..$...+...0..$.%6>.Cm.O.Z.tG.Y.2p..
    Process:C:\Users\user\Desktop\clink410.exe
    File Type:data
    Category:dropped
    Size (bytes):4096
    Entropy (8bit):0.10459074006210621
    Encrypted:false
    SSDEEP:3:WloQPkAxpVGXf:WlhJx7A
    MD5:9516D6570BE8077D083DCB800B1EF936
    SHA1:171B93385508DA32653F340CD64FC12AF66659A5
    SHA-256:7FBF06AEBF30AB57D2338DF5EBAEF2E64A0A4A755AB576D087091299B86867BC
    SHA-512:E13EBCD8D41D28512580FCEC0AC1D5AB9ED80C095192405E6689125290DA15C77DA189EB0E60A8F880BED920F0EB2351AB156EA3AF5506CF1CF303A5C7E2E9A2
    Malicious:false
    Preview:.S..b4f799d5ac2441ee98dfbaa92a0c2ba3....................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
    Process:C:\Windows\SysWOW64\rundll32.exe
    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
    Category:dropped
    Size (bytes):4613632
    Entropy (8bit):7.043550339564266
    Encrypted:false
    SSDEEP:98304:tRdbR/SYR9T+fuJ4bB8qXmsNAGWN7Bo1xXXyIuBoPMFLOAkGkzdnEVomFHKnPc:tnhSfXrXio1xXXyBoPMFLOyomFHKnP
    MD5:F91DD2C9AB406FCA3F15680779305DCC
    SHA1:8EA7C1AA10A68211715E4363E11E915670DB33CF
    SHA-256:C2A193BC5741545E27EBBF7A728EA5629D48E0B73BD4112083497458F39E71FC
    SHA-512:F0413FB35AE79D81428BDB8B6CA96A1A9DE6A9601A49BABCF56DD94AC098C0DE4B04D06EDF816F633E32CD8CA7C59AA3A38A4A648937D959E33220604A1BF41C
    Malicious:false
    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........NL^./"../"../"..W.../"..W.../"..W.../"../#..,"..~.../"..~...."..~..Z."..}.../"..}.../"../.../"..}.../".Rich./".........PE..L....{.e.................b....*......q............@..........................@G...........@..................................k".......#.x*!...................E..(...................................9 .@............................................text....`.......b.................. ..`.rdata..(%.......&...f..............@..@.data....(....".......".............@....rsrc...x*!...#..,!...#.............@..@.reloc...(....E..*...<D.............@..B................................................................................................................................................................................................................................................................................................................
    File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
    Entropy (8bit):7.089134093158391
    TrID:
    • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
    • Generic Win/DOS Executable (2004/3) 0.20%
    • DOS Executable Generic (2002/1) 0.20%
    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
    File name:SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dll
    File size:4'792'832 bytes
    MD5:bca3b499bf4edf8590ad273592fc411b
    SHA1:c18679cda189f68f8d7022055a7e5d6aff8d1e58
    SHA256:6fb6dc7049299c3172ee60c3f0a0319bd33d0c6b2c9836bf0051e59084e6fce0
    SHA512:3935e1936d1b909a9719dcd5f3ee0526c8e840d04e6617ad1fa1b7f876046f5fa0f1e48a9a56d68d7a2ca87572030ea3df666af3e1a804a211375596ba1256ae
    SSDEEP:49152:pAkKo7fIMLsI7eAJceXxl5h7+JF3HYgijO6WDZwdKYQgf3RjFkhDa+nRk2H8d:pP37fIceAJLkvCO6WDZwdKggh2
    TLSH:2926BF6E97E45E4DAB1B4BE59C3BA7E81942CF01656F86CF15C1CA44E3E8FCA104B390
    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........_.S.>i..>i..>i..o...>i..o...>i..o..p>i..F...>i..>h..>i..l...>i..l...>i..l...>i..>...>i..l...>i.Rich.>i.........PE..L....{.e...
    Icon Hash:7ae282899bbab082
    Entrypoint:0x1000981f
    Entrypoint Section:.text
    Digitally signed:false
    Imagebase:0x10000000
    Subsystem:windows gui
    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL
    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT
    Time Stamp:0x650E7BCA [Sat Sep 23 05:46:50 2023 UTC]
    TLS Callbacks:
    CLR (.Net) Version:
    OS Version Major:5
    OS Version Minor:1
    File Version Major:5
    File Version Minor:1
    Subsystem Version Major:5
    Subsystem Version Minor:1
    Import Hash:702466d805e925a74c5b750dae64fa7a
    Instruction
    push ebp
    mov ebp, esp
    cmp dword ptr [ebp+0Ch], 01h
    jne 00007F160450FD67h
    call 00007F1604519EC1h
    push dword ptr [ebp+10h]
    push dword ptr [ebp+0Ch]
    push dword ptr [ebp+08h]
    call 00007F160450FD6Ch
    add esp, 0Ch
    pop ebp
    retn 000Ch
    push 0000000Ch
    push 10027FB8h
    call 00007F1604515C67h
    xor eax, eax
    inc eax
    mov esi, dword ptr [ebp+0Ch]
    test esi, esi
    jne 00007F160450FD6Eh
    cmp dword ptr [1002B0C8h], esi
    je 00007F160450FE4Ah
    and dword ptr [ebp-04h], 00000000h
    cmp esi, 01h
    je 00007F160450FD67h
    cmp esi, 02h
    jne 00007F160450FD97h
    mov ecx, dword ptr [100213A0h]
    test ecx, ecx
    je 00007F160450FD6Eh
    push dword ptr [ebp+10h]
    push esi
    push dword ptr [ebp+08h]
    call ecx
    mov dword ptr [ebp-1Ch], eax
    test eax, eax
    je 00007F160450FE17h
    push dword ptr [ebp+10h]
    push esi
    push dword ptr [ebp+08h]
    call 00007F160450FB76h
    mov dword ptr [ebp-1Ch], eax
    test eax, eax
    je 00007F160450FE00h
    mov ebx, dword ptr [ebp+10h]
    push ebx
    push esi
    push dword ptr [ebp+08h]
    call 00007F160450AB71h
    mov edi, eax
    mov dword ptr [ebp-1Ch], edi
    cmp esi, 01h
    jne 00007F160450FD8Ah
    test edi, edi
    jne 00007F160450FD86h
    push ebx
    push eax
    push dword ptr [ebp+08h]
    call 00007F160450AB59h
    push ebx
    push edi
    push dword ptr [ebp+08h]
    call 00007F160450FB3Ch
    mov eax, dword ptr [100213A0h]
    test eax, eax
    je 00007F160450FD69h
    push ebx
    push edi
    push dword ptr [ebp+08h]
    call eax
    Programming Language:
    • [IMP] VS2008 SP1 build 30729
    • [EXP] VS2013 build 21005
    • [RES] VS2013 build 21005
    • [LNK] VS2013 build 21005
    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0x286100x9f.rdata
    IMAGE_DIRECTORY_ENTRY_IMPORT0x286b00x50.rdata
    IMAGE_DIRECTORY_ENTRY_RESOURCE0x2d0000x466d78.rsrc
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
    IMAGE_DIRECTORY_ENTRY_BASERELOC0x4940000x1d58.reloc
    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x269d00x40.rdata
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IAT0x200000x164.rdata
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
    .text0x10000x1e51a0x1e600fdfd327103d4c6b5f1ae2c9f8e5277d7False0.5533773791152263data6.6333240223790195IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    .rdata0x200000x8eae0x900082b586034e377c629f0798945d0aac6cFalse0.3738606770833333data4.70691480244013IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .data0x290000x3d680x1c00784047e184693078d96818b5ef4ac95fFalse0.30398995535714285DOS executable (block device driver ght (c)3.868903672114225IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .rsrc0x2d0000x466d780x466e00ce26efbc85e994f9786410279fc316eeunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .reloc0x4940000x1d580x1e0032ba9d88e438f1d15233c557d3e4f0edFalse0.7600260416666667data6.546482667203409IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
    NameRVASizeTypeLanguageCountryZLIB Complexity
    MYDATA0x2d1000x466a14dataChineseChina0.5479860305786133
    RT_VERSION0x493b180xdcdataChineseChina0.6636363636363637
    RT_MANIFEST0x493bf80x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
    DLLImport
    KERNEL32.dllFindResourceW, GetLastError, SizeofResource, LoadResource, LockResource, CreatePipe, MultiByteToWideChar, CreateProcessW, WaitForSingleObject, CloseHandle, Sleep, CreateThread, WideCharToMultiByte, GetCurrentProcessId, GetModuleFileNameW, OpenProcess, CreateToolhelp32Snapshot, Process32FirstW, Process32NextW, TerminateProcess, InitializeCriticalSection, EnterCriticalSection, LeaveCriticalSection, SetEndOfFile, CreateFileW, OutputDebugStringW, WriteConsoleW, SetStdHandle, ReadConsoleW, LoadLibraryExW, HeapReAlloc, FreeEnvironmentStringsW, DeleteCriticalSection, EncodePointer, DecodePointer, GetStringTypeW, HeapFree, IsDebuggerPresent, IsProcessorFeaturePresent, GetSystemTimeAsFileTime, GetCommandLineA, GetCurrentThreadId, RaiseException, RtlUnwind, HeapAlloc, GetCPInfo, UnhandledExceptionFilter, SetUnhandledExceptionFilter, SetLastError, InitializeCriticalSectionAndSpinCount, GetCurrentProcess, TlsAlloc, TlsGetValue, TlsSetValue, TlsFree, GetStartupInfoW, GetModuleHandleW, GetProcAddress, LCMapStringW, GetLocaleInfoW, IsValidLocale, GetUserDefaultLCID, EnumSystemLocalesW, ExitProcess, GetModuleHandleExW, AreFileApisANSI, HeapSize, GetProcessHeap, IsValidCodePage, GetACP, GetOEMCP, GetStdHandle, GetFileType, WriteFile, GetConsoleCP, GetConsoleMode, ReadFile, SetFilePointerEx, FlushFileBuffers, GetModuleFileNameA, QueryPerformanceCounter, GetEnvironmentStringsW
    USER32.dllFindWindowW, PostMessageW, FindWindowExW
    SHELL32.dllSHChangeNotify
    NameOrdinalAddress
    LoginPro10x10003060
    LoginTYFw20x10003060
    getXuhaoVal30x10003040
    getXuhaoVal240x10003050
    xtLoginTYFw50x10003070
    Language of compilation systemCountry where language is spokenMap
    ChineseChina
    EnglishUnited States
    TimestampSource PortDest PortSource IPDest IP
    Apr 17, 2024 12:56:39.445784092 CEST49730511192.168.2.4103.192.208.126
    Apr 17, 2024 12:56:39.784666061 CEST51149730103.192.208.126192.168.2.4
    Apr 17, 2024 12:56:39.784786940 CEST49730511192.168.2.4103.192.208.126
    Apr 17, 2024 12:56:39.879141092 CEST49730511192.168.2.4103.192.208.126
    Apr 17, 2024 12:56:40.212502956 CEST51149730103.192.208.126192.168.2.4
    Apr 17, 2024 12:56:40.212557077 CEST51149730103.192.208.126192.168.2.4
    Apr 17, 2024 12:56:40.212793112 CEST49730511192.168.2.4103.192.208.126
    Apr 17, 2024 12:56:40.544454098 CEST51149730103.192.208.126192.168.2.4
    Apr 17, 2024 12:56:40.544749022 CEST49730511192.168.2.4103.192.208.126
    Apr 17, 2024 12:56:40.613785028 CEST49731300192.168.2.4103.192.208.9
    Apr 17, 2024 12:56:40.614008904 CEST49732300192.168.2.4101.71.135.228
    Apr 17, 2024 12:56:40.614128113 CEST49734300192.168.2.4103.192.208.83
    Apr 17, 2024 12:56:40.614128113 CEST49733300192.168.2.4101.71.135.233
    Apr 17, 2024 12:56:40.629581928 CEST49735300192.168.2.4115.236.153.239
    Apr 17, 2024 12:56:40.629662991 CEST49737300192.168.2.4115.236.153.233
    Apr 17, 2024 12:56:40.629672050 CEST49736300192.168.2.445.124.76.226
    Apr 17, 2024 12:56:40.629729033 CEST49738300192.168.2.4103.192.208.102
    Apr 17, 2024 12:56:40.950510979 CEST30049731103.192.208.9192.168.2.4
    Apr 17, 2024 12:56:40.950716019 CEST49731300192.168.2.4103.192.208.9
    Apr 17, 2024 12:56:40.960710049 CEST3004973645.124.76.226192.168.2.4
    Apr 17, 2024 12:56:40.960798979 CEST49736300192.168.2.445.124.76.226
    Apr 17, 2024 12:56:40.962286949 CEST30049738103.192.208.102192.168.2.4
    Apr 17, 2024 12:56:40.962363958 CEST49738300192.168.2.4103.192.208.102
    Apr 17, 2024 12:56:40.964205980 CEST30049734103.192.208.83192.168.2.4
    Apr 17, 2024 12:56:40.964301109 CEST49734300192.168.2.4103.192.208.83
    Apr 17, 2024 12:56:40.971519947 CEST30049737115.236.153.233192.168.2.4
    Apr 17, 2024 12:56:40.971611977 CEST49737300192.168.2.4115.236.153.233
    Apr 17, 2024 12:56:40.994245052 CEST30049735115.236.153.239192.168.2.4
    Apr 17, 2024 12:56:40.994498968 CEST49735300192.168.2.4115.236.153.239
    Apr 17, 2024 12:56:41.277040958 CEST30049731103.192.208.9192.168.2.4
    Apr 17, 2024 12:56:41.277790070 CEST49731300192.168.2.4103.192.208.9
    Apr 17, 2024 12:56:41.295011044 CEST30049738103.192.208.102192.168.2.4
    Apr 17, 2024 12:56:41.295634031 CEST3004973645.124.76.226192.168.2.4
    Apr 17, 2024 12:56:41.295702934 CEST49738300192.168.2.4103.192.208.102
    Apr 17, 2024 12:56:41.296053886 CEST49736300192.168.2.445.124.76.226
    Apr 17, 2024 12:56:41.311743975 CEST30049734103.192.208.83192.168.2.4
    Apr 17, 2024 12:56:41.312141895 CEST49734300192.168.2.4103.192.208.83
    Apr 17, 2024 12:56:41.363493919 CEST30049735115.236.153.239192.168.2.4
    Apr 17, 2024 12:56:41.363909960 CEST49735300192.168.2.4115.236.153.239
    Apr 17, 2024 12:56:41.613579035 CEST49732300192.168.2.4101.71.135.228
    Apr 17, 2024 12:56:41.613956928 CEST30049731103.192.208.9192.168.2.4
    Apr 17, 2024 12:56:41.613976955 CEST30049731103.192.208.9192.168.2.4
    Apr 17, 2024 12:56:41.613993883 CEST30049731103.192.208.9192.168.2.4
    Apr 17, 2024 12:56:41.614061117 CEST49731300192.168.2.4103.192.208.9
    Apr 17, 2024 12:56:41.628297091 CEST30049738103.192.208.102192.168.2.4
    Apr 17, 2024 12:56:41.628333092 CEST30049738103.192.208.102192.168.2.4
    Apr 17, 2024 12:56:41.628346920 CEST30049738103.192.208.102192.168.2.4
    Apr 17, 2024 12:56:41.628528118 CEST49738300192.168.2.4103.192.208.102
    Apr 17, 2024 12:56:41.628971100 CEST49733300192.168.2.4101.71.135.233
    Apr 17, 2024 12:56:41.629533052 CEST3004973645.124.76.226192.168.2.4
    Apr 17, 2024 12:56:41.629587889 CEST3004973645.124.76.226192.168.2.4
    Apr 17, 2024 12:56:41.629616976 CEST3004973645.124.76.226192.168.2.4
    Apr 17, 2024 12:56:41.629620075 CEST49731300192.168.2.4103.192.208.9
    Apr 17, 2024 12:56:41.629688978 CEST49736300192.168.2.445.124.76.226
    Apr 17, 2024 12:56:41.632885933 CEST49738300192.168.2.4103.192.208.102
    Apr 17, 2024 12:56:41.635713100 CEST49736300192.168.2.445.124.76.226
    Apr 17, 2024 12:56:41.662787914 CEST30049734103.192.208.83192.168.2.4
    Apr 17, 2024 12:56:41.662803888 CEST30049734103.192.208.83192.168.2.4
    Apr 17, 2024 12:56:41.662856102 CEST30049734103.192.208.83192.168.2.4
    Apr 17, 2024 12:56:41.662909985 CEST49734300192.168.2.4103.192.208.83
    Apr 17, 2024 12:56:41.665776968 CEST49734300192.168.2.4103.192.208.83
    Apr 17, 2024 12:56:41.748388052 CEST30049735115.236.153.239192.168.2.4
    Apr 17, 2024 12:56:41.748447895 CEST30049735115.236.153.239192.168.2.4
    Apr 17, 2024 12:56:41.748461962 CEST30049735115.236.153.239192.168.2.4
    Apr 17, 2024 12:56:41.748514891 CEST49735300192.168.2.4115.236.153.239
    Apr 17, 2024 12:56:41.751703024 CEST49735300192.168.2.4115.236.153.239
    Apr 17, 2024 12:56:41.957993031 CEST30049731103.192.208.9192.168.2.4
    Apr 17, 2024 12:56:41.965487957 CEST30049738103.192.208.102192.168.2.4
    Apr 17, 2024 12:56:41.976735115 CEST3004973645.124.76.226192.168.2.4
    Apr 17, 2024 12:56:42.018110991 CEST30049734103.192.208.83192.168.2.4
    Apr 17, 2024 12:56:42.141474962 CEST30049735115.236.153.239192.168.2.4
    Apr 17, 2024 12:56:42.356605053 CEST30049737115.236.153.233192.168.2.4
    Apr 17, 2024 12:56:42.356748104 CEST49737300192.168.2.4115.236.153.233
    Apr 17, 2024 12:56:43.628999949 CEST49733300192.168.2.4101.71.135.233
    Apr 17, 2024 12:56:44.356564999 CEST30049737115.236.153.233192.168.2.4
    Apr 17, 2024 12:56:44.356700897 CEST49737300192.168.2.4115.236.153.233
    Apr 17, 2024 12:56:44.702009916 CEST30049737115.236.153.233192.168.2.4
    Apr 17, 2024 12:56:44.754036903 CEST49737300192.168.2.4115.236.153.233
    Apr 17, 2024 12:56:44.763570070 CEST49737300192.168.2.4115.236.153.233
    Apr 17, 2024 12:56:45.116656065 CEST30049737115.236.153.233192.168.2.4
    Apr 17, 2024 12:56:45.116704941 CEST30049737115.236.153.233192.168.2.4
    Apr 17, 2024 12:56:45.116741896 CEST30049737115.236.153.233192.168.2.4
    Apr 17, 2024 12:56:45.116838932 CEST49737300192.168.2.4115.236.153.233
    Apr 17, 2024 12:56:45.121320963 CEST49737300192.168.2.4115.236.153.233
    Apr 17, 2024 12:56:45.470506907 CEST30049737115.236.153.233192.168.2.4
    Apr 17, 2024 12:56:47.644722939 CEST49733300192.168.2.4101.71.135.233
    Apr 17, 2024 12:56:55.644926071 CEST49733300192.168.2.4101.71.135.233
    TimestampSource PortDest PortSource IPDest IP
    Apr 17, 2024 12:56:39.345613003 CEST5597653192.168.2.41.1.1.1
    Apr 17, 2024 12:56:39.552988052 CEST5783653192.168.2.41.1.1.1
    Apr 17, 2024 12:56:40.109301090 CEST53578361.1.1.1192.168.2.4
    Apr 17, 2024 12:56:40.348069906 CEST5597653192.168.2.41.1.1.1
    Apr 17, 2024 12:56:41.363590956 CEST5597653192.168.2.41.1.1.1
    Apr 17, 2024 12:56:41.388843060 CEST53559761.1.1.1192.168.2.4
    Apr 17, 2024 12:56:41.388865948 CEST53559761.1.1.1192.168.2.4
    Apr 17, 2024 12:56:41.467681885 CEST53559761.1.1.1192.168.2.4
    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
    Apr 17, 2024 12:56:39.345613003 CEST192.168.2.41.1.1.10xd1d4Standard query (0)res3.csasnet.netA (IP address)IN (0x0001)false
    Apr 17, 2024 12:56:39.552988052 CEST192.168.2.41.1.1.10xa8c7Standard query (0)res1.csasnet.comA (IP address)IN (0x0001)false
    Apr 17, 2024 12:56:40.348069906 CEST192.168.2.41.1.1.10xd1d4Standard query (0)res3.csasnet.netA (IP address)IN (0x0001)false
    Apr 17, 2024 12:56:41.363590956 CEST192.168.2.41.1.1.10xd1d4Standard query (0)res3.csasnet.netA (IP address)IN (0x0001)false
    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
    Apr 17, 2024 12:56:40.109301090 CEST1.1.1.1192.168.2.40xa8c7No error (0)res1.csasnet.com124.221.138.85A (IP address)IN (0x0001)false
    Apr 17, 2024 12:56:40.109301090 CEST1.1.1.1192.168.2.40xa8c7No error (0)res1.csasnet.com45.124.76.254A (IP address)IN (0x0001)false
    Apr 17, 2024 12:56:40.109301090 CEST1.1.1.1192.168.2.40xa8c7No error (0)res1.csasnet.com115.236.153.253A (IP address)IN (0x0001)false
    Apr 17, 2024 12:56:41.388843060 CEST1.1.1.1192.168.2.40xd1d4No error (0)res3.csasnet.net124.221.138.85A (IP address)IN (0x0001)false
    Apr 17, 2024 12:56:41.388843060 CEST1.1.1.1192.168.2.40xd1d4No error (0)res3.csasnet.net103.192.208.126A (IP address)IN (0x0001)false
    Apr 17, 2024 12:56:41.388843060 CEST1.1.1.1192.168.2.40xd1d4No error (0)res3.csasnet.net115.236.153.254A (IP address)IN (0x0001)false
    Apr 17, 2024 12:56:41.388865948 CEST1.1.1.1192.168.2.40xd1d4No error (0)res3.csasnet.net124.221.138.85A (IP address)IN (0x0001)false
    Apr 17, 2024 12:56:41.388865948 CEST1.1.1.1192.168.2.40xd1d4No error (0)res3.csasnet.net103.192.208.126A (IP address)IN (0x0001)false
    Apr 17, 2024 12:56:41.388865948 CEST1.1.1.1192.168.2.40xd1d4No error (0)res3.csasnet.net115.236.153.254A (IP address)IN (0x0001)false
    Apr 17, 2024 12:56:41.467681885 CEST1.1.1.1192.168.2.40xd1d4No error (0)res3.csasnet.net103.192.208.126A (IP address)IN (0x0001)false
    Apr 17, 2024 12:56:41.467681885 CEST1.1.1.1192.168.2.40xd1d4No error (0)res3.csasnet.net115.236.153.254A (IP address)IN (0x0001)false
    Apr 17, 2024 12:56:41.467681885 CEST1.1.1.1192.168.2.40xd1d4No error (0)res3.csasnet.net124.221.138.85A (IP address)IN (0x0001)false

    Click to jump to process

    Click to jump to process

    Click to dive into process behavior distribution

    Click to jump to process

    Target ID:0
    Start time:12:56:27
    Start date:17/04/2024
    Path:C:\Windows\System32\loaddll32.exe
    Wow64 process (32bit):true
    Commandline:loaddll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dll"
    Imagebase:0x160000
    File size:126'464 bytes
    MD5 hash:51E6071F9CBA48E79F10C84515AAE618
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:1
    Start time:12:56:27
    Start date:17/04/2024
    Path:C:\Windows\System32\conhost.exe
    Wow64 process (32bit):false
    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Imagebase:0x7ff7699e0000
    File size:862'208 bytes
    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:2
    Start time:12:56:27
    Start date:17/04/2024
    Path:C:\Windows\SysWOW64\cmd.exe
    Wow64 process (32bit):true
    Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dll",#1
    Imagebase:0x240000
    File size:236'544 bytes
    MD5 hash:D0FCE3AFA6AA1D58CE9FA336CC2B675B
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:3
    Start time:12:56:27
    Start date:17/04/2024
    Path:C:\Windows\SysWOW64\rundll32.exe
    Wow64 process (32bit):true
    Commandline:rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dll,LoginPro
    Imagebase:0xe00000
    File size:61'440 bytes
    MD5 hash:889B99C52A60DD49227C5E485A016679
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:4
    Start time:12:56:27
    Start date:17/04/2024
    Path:C:\Windows\SysWOW64\rundll32.exe
    Wow64 process (32bit):true
    Commandline:rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dll",#1
    Imagebase:0xe00000
    File size:61'440 bytes
    MD5 hash:889B99C52A60DD49227C5E485A016679
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:5
    Start time:12:56:28
    Start date:17/04/2024
    Path:C:\Users\user\Desktop\clink410.exe
    Wow64 process (32bit):false
    Commandline:clink410.exe
    Imagebase:0x360000
    File size:4'613'632 bytes
    MD5 hash:F91DD2C9AB406FCA3F15680779305DCC
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:low
    Has exited:true

    Target ID:6
    Start time:12:56:30
    Start date:17/04/2024
    Path:C:\Windows\SysWOW64\rundll32.exe
    Wow64 process (32bit):true
    Commandline:rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dll,LoginTYFw
    Imagebase:0xe00000
    File size:61'440 bytes
    MD5 hash:889B99C52A60DD49227C5E485A016679
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:7
    Start time:12:56:30
    Start date:17/04/2024
    Path:C:\Users\user\Desktop\clink410.exe
    Wow64 process (32bit):false
    Commandline:clink410.exe
    Imagebase:0x360000
    File size:4'613'632 bytes
    MD5 hash:F91DD2C9AB406FCA3F15680779305DCC
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:low
    Has exited:true

    Target ID:8
    Start time:12:56:33
    Start date:17/04/2024
    Path:C:\Windows\SysWOW64\rundll32.exe
    Wow64 process (32bit):true
    Commandline:rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dll,getXuhaoVal
    Imagebase:0x7ff7699e0000
    File size:61'440 bytes
    MD5 hash:889B99C52A60DD49227C5E485A016679
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:9
    Start time:12:56:33
    Start date:17/04/2024
    Path:C:\Users\user\Desktop\clink410.exe
    Wow64 process (32bit):false
    Commandline:clink410.exe
    Imagebase:0x360000
    File size:4'613'632 bytes
    MD5 hash:F91DD2C9AB406FCA3F15680779305DCC
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:low
    Has exited:true

    Target ID:10
    Start time:12:56:36
    Start date:17/04/2024
    Path:C:\Windows\SysWOW64\rundll32.exe
    Wow64 process (32bit):true
    Commandline:rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dll",LoginPro
    Imagebase:0xe00000
    File size:61'440 bytes
    MD5 hash:889B99C52A60DD49227C5E485A016679
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:11
    Start time:12:56:36
    Start date:17/04/2024
    Path:C:\Users\user\Desktop\clink410.exe
    Wow64 process (32bit):true
    Commandline:clink410.exe
    Imagebase:0x360000
    File size:4'613'632 bytes
    MD5 hash:F91DD2C9AB406FCA3F15680779305DCC
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:low
    Has exited:false

    Target ID:12
    Start time:12:56:36
    Start date:17/04/2024
    Path:C:\Windows\SysWOW64\rundll32.exe
    Wow64 process (32bit):true
    Commandline:rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dll",LoginTYFw
    Imagebase:0xe00000
    File size:61'440 bytes
    MD5 hash:889B99C52A60DD49227C5E485A016679
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Target ID:13
    Start time:12:56:37
    Start date:17/04/2024
    Path:C:\Windows\SysWOW64\rundll32.exe
    Wow64 process (32bit):true
    Commandline:rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dll",getXuhaoVal
    Imagebase:0xe00000
    File size:61'440 bytes
    MD5 hash:889B99C52A60DD49227C5E485A016679
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:14
    Start time:12:56:37
    Start date:17/04/2024
    Path:C:\Windows\SysWOW64\rundll32.exe
    Wow64 process (32bit):true
    Commandline:rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dll",xtLoginTYFw
    Imagebase:0xe00000
    File size:61'440 bytes
    MD5 hash:889B99C52A60DD49227C5E485A016679
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Target ID:15
    Start time:12:56:37
    Start date:17/04/2024
    Path:C:\Windows\SysWOW64\rundll32.exe
    Wow64 process (32bit):true
    Commandline:rundll32.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.DropperX-gen.16918.1810.dll",getXuhaoVal2
    Imagebase:0xe00000
    File size:61'440 bytes
    MD5 hash:889B99C52A60DD49227C5E485A016679
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Has exited:true

    Reset < >

      Execution Graph

      Execution Coverage:11.2%
      Dynamic/Decrypted Code Coverage:0%
      Signature Coverage:11.4%
      Total number of Nodes:219
      Total number of Limit Nodes:3
      execution_graph 878 4d710b 881 4e144d 878->881 880 4d7110 880->880 882 4e147d GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 881->882 883 4e1470 881->883 884 4e1474 882->884 883->882 883->884 884->880 606 4ddd97 607 4ddda0 __threadstartex@4 606->607 619 4e16a8 607->619 609 4ddda6 __threadstartex@4 611 4dddd9 ___crtIsPackagedApp 609->611 636 4e16c7 609->636 613 4dde08 611->613 622 4ddd3f 611->622 612 4dddbc 614 4dddcf GetCurrentThreadId 612->614 615 4dddc2 GetLastError ExitThread 612->615 628 4ddcd0 613->628 614->611 620 4e16bf TlsGetValue 619->620 621 4e16bb 619->621 620->609 621->609 623 4ddd48 LoadLibraryExW GetProcAddress 622->623 624 4ddd81 DecodePointer 622->624 625 4ddd6b EncodePointer 623->625 626 4ddd6a 623->626 627 4ddd91 624->627 625->624 626->613 627->613 629 4ddcdc _doexit 628->629 639 4e0a31 629->639 633 4ddcf1 634 4e0765 __XcptFilter 9 API calls 633->634 635 4ddd02 634->635 637 4e16dd 636->637 638 4e16e1 TlsSetValue 636->638 637->612 638->612 653 4e0a49 GetLastError 639->653 641 4e0a37 642 4ddce1 641->642 667 4d8299 641->667 644 4ddd11 642->644 645 4e0a49 __getptd_noexit 9 API calls 644->645 646 4ddd1a 645->646 647 4ddd35 ExitThread 646->647 648 4ddd2e 646->648 649 4ddd29 646->649 872 4e09fb 648->872 867 4dde14 649->867 652 4ddd34 652->647 654 4e16a8 __threadstartex@4 TlsGetValue 653->654 655 4e0a5e 654->655 656 4e0aac SetLastError 655->656 676 4e26ad 655->676 656->641 659 4e16c7 __threadstartex@4 TlsSetValue 660 4e0a85 659->660 661 4e0a8b 660->661 662 4e0aa3 660->662 687 4e0ab8 661->687 681 4d7954 662->681 665 4e0aa9 665->656 666 4e0a93 GetCurrentThreadId 666->656 705 4e11e6 667->705 671 4d82a9 744 4d8357 671->744 675 4d82c0 675->642 678 4e26b4 676->678 677 4e0a71 677->656 677->659 678->677 680 4e26d2 678->680 680->677 680->678 693 4e1abf Sleep 680->693 682 4d795d RtlFreeHeap 681->682 683 4d7986 _free 681->683 682->683 684 4d7972 682->684 683->665 694 4dadb3 684->694 688 4e0ac4 _doexit 687->688 697 4e0b59 688->697 690 4e0b1b ___addlocaleref 700 4e0b62 690->700 692 4e0b4d _doexit 692->666 693->680 695 4e0a49 __getptd_noexit 9 API calls 694->695 696 4d7978 GetLastError 695->696 696->683 703 4e44a3 LeaveCriticalSection 697->703 699 4e0b60 699->690 704 4e44a3 LeaveCriticalSection 700->704 702 4e0b69 702->692 703->699 704->702 765 4e140d 705->765 707 4e11ed 708 4e11fa 707->708 709 4e140d __NMSG_WRITE 18 API calls 707->709 710 4e1243 __NMSG_WRITE 43 API calls 708->710 712 4d82a1 708->712 709->708 711 4e1212 710->711 713 4e1243 __NMSG_WRITE 43 API calls 711->713 714 4e1243 712->714 713->712 715 4e1261 __NMSG_WRITE 714->715 716 4e1388 715->716 717 4e140d __NMSG_WRITE 18 API calls 715->717 718 4d7115 ___crtMessageBoxW 6 API calls 716->718 719 4e1274 717->719 720 4e13f1 718->720 721 4e138d GetStdHandle 719->721 722 4e140d __NMSG_WRITE 18 API calls 719->722 720->671 721->716 725 4e139b _strlen 721->725 723 4e1285 722->723 723->721 724 4e1297 723->724 724->716 803 4dde64 724->803 725->716 727 4e13d4 WriteFile 725->727 727->716 729 4e12c4 GetModuleFileNameW 732 4e12e4 729->732 736 4e12f4 __NMSG_WRITE 729->736 730 4e13f5 731 4e22f4 __invoke_watson 8 API calls 730->731 734 4e13ff 731->734 733 4dde64 __NMSG_WRITE 18 API calls 732->733 733->736 734->671 735 4e133a 735->730 821 4daa48 735->821 736->730 736->735 812 4ddec0 736->812 740 4daa48 __NMSG_WRITE 18 API calls 741 4e1371 740->741 741->730 742 4e1378 741->742 830 4ee6f5 EncodePointer 742->830 745 4d840d _doexit 11 API calls 744->745 746 4d82b4 745->746 747 4d840d 746->747 748 4d8419 _doexit 747->748 749 4d84d9 __initterm 748->749 750 4d844e DecodePointer 748->750 855 4d8527 749->855 750->749 752 4d8465 DecodePointer 750->752 758 4d8475 752->758 754 4d8536 _doexit 754->675 756 4d8482 EncodePointer 756->758 757 4d851e 860 4d8283 757->860 758->749 758->756 760 4d8492 DecodePointer EncodePointer 758->760 763 4d84a4 DecodePointer DecodePointer 760->763 763->758 766 4e1417 765->766 767 4dadb3 _free 9 API calls 766->767 768 4e1421 766->768 769 4e143d 767->769 768->707 772 4e22e4 769->772 775 4e22b9 DecodePointer 772->775 776 4e22cc 775->776 781 4e22f4 IsProcessorFeaturePresent 776->781 779 4e22b9 __NMSG_WRITE 8 API calls 780 4e1448 779->780 780->707 782 4e22ff 781->782 787 4e2187 782->787 786 4e22e3 786->779 788 4e21a1 _memset __call_reportfault 787->788 789 4e21c1 IsDebuggerPresent 788->789 795 4e1ae2 SetUnhandledExceptionFilter UnhandledExceptionFilter 789->795 791 4e2285 __call_reportfault 796 4d7115 791->796 793 4e22a8 794 4e1acd GetCurrentProcess TerminateProcess 793->794 794->786 795->791 797 4d711d 796->797 798 4d711f IsProcessorFeaturePresent 796->798 797->793 800 4d85d2 798->800 801 4d8581 ___raise_securityfailure 5 API calls 800->801 802 4d86b5 801->802 802->793 804 4dde6f 803->804 806 4dde7d 803->806 804->806 810 4dde96 804->810 805 4dadb3 _free 9 API calls 807 4dde87 805->807 806->805 808 4e22e4 __NMSG_WRITE 9 API calls 807->808 809 4dde91 808->809 809->729 809->730 810->809 811 4dadb3 _free 9 API calls 810->811 811->807 816 4ddece 812->816 813 4dded2 814 4dadb3 _free 9 API calls 813->814 815 4dded7 813->815 817 4ddf02 814->817 815->735 816->813 816->815 819 4ddf11 816->819 818 4e22e4 __NMSG_WRITE 9 API calls 817->818 818->815 819->815 820 4dadb3 _free 9 API calls 819->820 820->817 822 4daa62 821->822 824 4daa54 821->824 823 4dadb3 _free 9 API calls 822->823 829 4daa6c 823->829 824->822 827 4daa8e 824->827 825 4e22e4 __NMSG_WRITE 9 API calls 826 4daa76 825->826 826->730 826->740 827->826 828 4dadb3 _free 9 API calls 827->828 828->829 829->825 831 4ee729 ___crtIsPackagedApp 830->831 832 4ee7e8 IsDebuggerPresent 831->832 833 4ee738 LoadLibraryExW 831->833 834 4ee80d 832->834 835 4ee7f2 832->835 836 4ee74f GetLastError 833->836 837 4ee775 GetProcAddress 833->837 839 4ee800 834->839 840 4ee812 DecodePointer 834->840 838 4ee7f9 OutputDebugStringW 835->838 835->839 841 4ee75e LoadLibraryExW 836->841 843 4ee805 836->843 842 4ee789 7 API calls 837->842 837->843 838->839 839->843 849 4ee839 DecodePointer DecodePointer 839->849 853 4ee851 839->853 840->843 841->837 841->843 844 4ee7e5 842->844 845 4ee7d1 GetProcAddress EncodePointer 842->845 846 4d7115 ___crtMessageBoxW 6 API calls 843->846 844->832 845->844 850 4ee8d7 846->850 847 4ee875 DecodePointer 847->843 848 4ee889 DecodePointer 848->847 851 4ee890 848->851 849->853 850->716 851->847 854 4ee8a1 DecodePointer 851->854 853->847 853->848 854->847 856 4d852d 855->856 857 4d8507 855->857 863 4e44a3 LeaveCriticalSection 856->863 857->754 859 4e44a3 LeaveCriticalSection 857->859 859->757 864 4d824f GetModuleHandleExW 860->864 863->857 865 4d827a ExitProcess 864->865 866 4d8268 GetProcAddress 864->866 866->865 868 4dde1d LoadLibraryExW GetProcAddress 867->868 869 4dde55 DecodePointer 867->869 870 4dde3f EncodePointer 868->870 871 4dde63 868->871 869->871 870->869 871->648 873 4e0a08 872->873 877 4e0a26 872->877 874 4e0a16 873->874 875 4e16a8 __threadstartex@4 TlsGetValue 873->875 876 4e16c7 __threadstartex@4 TlsSetValue 874->876 875->874 876->877 877->652

      Callgraph

      • Executed
      • Not Executed
      • Opacity -> Relevance
      • Disassembly available
      callgraph 0 Function_004D824F 1 Function_004E144D 2 Function_004E1ACD 3 Function_004DAA48 18 Function_004E22E4 3->18 52 Function_004DADB3 3->52 4 Function_004E0A49 5 Function_004E16C7 4->5 12 Function_004D7954 4->12 41 Function_004E26AD 4->41 43 Function_004E16A8 4->43 49 Function_004E0AB8 4->49 6 Function_004DADC6 7 Function_004E1243 7->3 8 Function_004DDEC0 7->8 17 Function_004DDE64 7->17 23 Function_004E22F4 7->23 24 Function_004EE6F5 7->24 27 Function_004E140D 7->27 31 Function_004DDF80 7->31 34 Function_004E121F 7->34 36 Function_004D7115 7->36 51 Function_004DAAB4 7->51 8->18 8->52 9 Function_004E08C0 10 Function_004E0B59 45 Function_004E44A3 10->45 11 Function_004DC155 12->6 12->52 13 Function_004D8357 26 Function_004D840D 13->26 14 Function_004DDCD0 19 Function_004E0765 14->19 39 Function_004DDD11 14->39 40 Function_004DC110 14->40 53 Function_004E0A31 14->53 15 Function_004E4F6E 16 Function_004E11E6 16->7 16->27 17->18 17->52 50 Function_004E22B9 18->50 19->4 20 Function_004E0B62 20->45 21 Function_004E1AE2 22 Function_004E09FB 22->5 22->43 23->2 29 Function_004E2187 23->29 25 Function_004E178E 24->25 24->36 26->11 33 Function_004D8283 26->33 26->40 44 Function_004D8527 26->44 26->45 46 Function_004D83A3 26->46 27->18 27->52 28 Function_004D710B 28->1 29->15 29->21 32 Function_004DB300 29->32 29->36 30 Function_004D8581 30->2 30->15 30->21 33->0 35 Function_004D8299 35->7 35->13 35->16 35->26 36->30 37 Function_004DDE14 38 Function_004DDD97 38->5 38->9 38->14 38->25 38->43 48 Function_004DDD3F 38->48 39->4 39->22 39->37 47 Function_004E1ABF 41->47 42 Function_004E1E2D 44->45 49->10 49->11 49->20 49->40 49->42 50->23 50->50 52->4 53->4 53->35

      Control-flow Graph

      APIs
      • __getptd_noexit.LIBCMT ref: 004DDD15
        • Part of subcall function 004E0A49: GetLastError.KERNEL32(?,00000000,004E0A37,00000000,004DDCE1,00584EE8,0000000C,004DDE13,?), ref: 004E0A4B
        • Part of subcall function 004E0A49: __calloc_crt.LIBCMT ref: 004E0A6C
        • Part of subcall function 004E0A49: __initptd.LIBCMT ref: 004E0A8E
        • Part of subcall function 004E0A49: GetCurrentThreadId.KERNEL32 ref: 004E0A95
        • Part of subcall function 004E0A49: SetLastError.KERNEL32(00000000,00000000,004E0A37,00000000,004DDCE1,00584EE8,0000000C,004DDE13,?), ref: 004E0AAD
      • __freeptd.LIBCMT ref: 004DDD2F
        • Part of subcall function 004DDE14: LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,004DDD2E), ref: 004DDE2E
        • Part of subcall function 004DDE14: GetProcAddress.KERNEL32(00000000), ref: 004DDE35
        • Part of subcall function 004DDE14: EncodePointer.KERNEL32(00000000), ref: 004DDE40
        • Part of subcall function 004DDE14: DecodePointer.KERNEL32(004DDD2E), ref: 004DDE5B
      • ExitThread.KERNEL32 ref: 004DDD38
      Memory Dump Source
      • Source File: 0000000B.00000002.3533861385.0000000000361000.00000020.00000001.01000000.00000005.sdmp, Offset: 00360000, based on PE: true
      • Associated: 0000000B.00000002.3533815261.0000000000360000.00000002.00000001.01000000.00000005.sdmpDownload File
      • Associated: 0000000B.00000002.3534071818.0000000000528000.00000002.00000001.01000000.00000005.sdmpDownload File
      • Associated: 0000000B.00000002.3534139520.000000000058B000.00000004.00000001.01000000.00000005.sdmpDownload File
      • Associated: 0000000B.00000002.3534161247.000000000058E000.00000008.00000001.01000000.00000005.sdmpDownload File
      • Associated: 0000000B.00000002.3534184831.0000000000593000.00000004.00000001.01000000.00000005.sdmpDownload File
      • Associated: 0000000B.00000002.3534184831.000000000059B000.00000004.00000001.01000000.00000005.sdmpDownload File
      • Associated: 0000000B.00000002.3534231482.000000000059E000.00000002.00000001.01000000.00000005.sdmpDownload File
      • Associated: 0000000B.00000002.3534231482.0000000000791000.00000002.00000001.01000000.00000005.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_11_2_360000_clink410.jbxd
      Similarity
      • API ID: ErrorLastPointerThread$AddressCurrentDecodeEncodeExitLibraryLoadProc__calloc_crt__freeptd__getptd_noexit__initptd
      • String ID:
      • API String ID: 21986956-0
      • Opcode ID: 5f48a4bedb46a658b025ece92cb18b82e9a216479d160d5d608265e08e6532c3
      • Instruction ID: 53d92ab33bd0006188f60e1ea9f8a1b2d9af8c871e6f84e13f628ca424753828
      • Opcode Fuzzy Hash: 5f48a4bedb46a658b025ece92cb18b82e9a216479d160d5d608265e08e6532c3
      • Instruction Fuzzy Hash: A2D0A735802A14ABDA323BA7C81565F765C4F01709F00011FF410053178F7C5D8181DD
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 10 4ddcd0-4ddd04 call 4dc110 call 4e0a31 call 4ddd11 call 4e0765
      APIs
        • Part of subcall function 004E0A31: __getptd_noexit.LIBCMT ref: 004E0A32
        • Part of subcall function 004DDD11: __getptd_noexit.LIBCMT ref: 004DDD15
        • Part of subcall function 004DDD11: __freeptd.LIBCMT ref: 004DDD2F
        • Part of subcall function 004DDD11: ExitThread.KERNEL32 ref: 004DDD38
      • __XcptFilter.LIBCMT ref: 004DDCFD
        • Part of subcall function 004E0765: __getptd_noexit.LIBCMT ref: 004E0769
      Memory Dump Source
      • Source File: 0000000B.00000002.3533861385.0000000000361000.00000020.00000001.01000000.00000005.sdmp, Offset: 00360000, based on PE: true
      • Associated: 0000000B.00000002.3533815261.0000000000360000.00000002.00000001.01000000.00000005.sdmpDownload File
      • Associated: 0000000B.00000002.3534071818.0000000000528000.00000002.00000001.01000000.00000005.sdmpDownload File
      • Associated: 0000000B.00000002.3534139520.000000000058B000.00000004.00000001.01000000.00000005.sdmpDownload File
      • Associated: 0000000B.00000002.3534161247.000000000058E000.00000008.00000001.01000000.00000005.sdmpDownload File
      • Associated: 0000000B.00000002.3534184831.0000000000593000.00000004.00000001.01000000.00000005.sdmpDownload File
      • Associated: 0000000B.00000002.3534184831.000000000059B000.00000004.00000001.01000000.00000005.sdmpDownload File
      • Associated: 0000000B.00000002.3534231482.000000000059E000.00000002.00000001.01000000.00000005.sdmpDownload File
      • Associated: 0000000B.00000002.3534231482.0000000000791000.00000002.00000001.01000000.00000005.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_11_2_360000_clink410.jbxd
      Similarity
      • API ID: __getptd_noexit$ExitFilterThreadXcpt__freeptd
      • String ID:
      • API String ID: 1337255599-0
      • Opcode ID: 0a1b56a9515b403454bd4287503ee2b5bf97d2a8a3c973b267bdd78434f1b1f4
      • Instruction ID: 27c59cde59c640088924ba1440ea116e1bb169912a094d6b070fe71c05b12a9b
      • Opcode Fuzzy Hash: 0a1b56a9515b403454bd4287503ee2b5bf97d2a8a3c973b267bdd78434f1b1f4
      • Instruction Fuzzy Hash: 97E0ECB59406059FDB04FBA2C946E2D77B9FF44705F20045EF501AB2A2DABCAD40DF25
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      APIs
      • SetUnhandledExceptionFilter.KERNEL32(00000000,?,004E2285,?), ref: 004E1AE7
      • UnhandledExceptionFilter.KERNEL32(?), ref: 004E1AF0
      Memory Dump Source
      • Source File: 0000000B.00000002.3533861385.0000000000361000.00000020.00000001.01000000.00000005.sdmp, Offset: 00360000, based on PE: true
      • Associated: 0000000B.00000002.3533815261.0000000000360000.00000002.00000001.01000000.00000005.sdmpDownload File
      • Associated: 0000000B.00000002.3534071818.0000000000528000.00000002.00000001.01000000.00000005.sdmpDownload File
      • Associated: 0000000B.00000002.3534139520.000000000058B000.00000004.00000001.01000000.00000005.sdmpDownload File
      • Associated: 0000000B.00000002.3534161247.000000000058E000.00000008.00000001.01000000.00000005.sdmpDownload File
      • Associated: 0000000B.00000002.3534184831.0000000000593000.00000004.00000001.01000000.00000005.sdmpDownload File
      • Associated: 0000000B.00000002.3534184831.000000000059B000.00000004.00000001.01000000.00000005.sdmpDownload File
      • Associated: 0000000B.00000002.3534231482.000000000059E000.00000002.00000001.01000000.00000005.sdmpDownload File
      • Associated: 0000000B.00000002.3534231482.0000000000791000.00000002.00000001.01000000.00000005.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_11_2_360000_clink410.jbxd
      Similarity
      • API ID: ExceptionFilterUnhandled
      • String ID:
      • API String ID: 3192549508-0
      • Opcode ID: b47f8b8abcf030dec42e471ac009773a182a3456f182ac44e48270b9396cfd2c
      • Instruction ID: 496489b4fc01ab837b0c6f58ca4c04b89e0b82e39411f546e6e76f9ba957ca13
      • Opcode Fuzzy Hash: b47f8b8abcf030dec42e471ac009773a182a3456f182ac44e48270b9396cfd2c
      • Instruction Fuzzy Hash: A9B09231045208ABDB112BD1EC09B687F2CEF26656F004010F60D440A18F725527EA99
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 62 4ddd3f-4ddd46 63 4ddd48-4ddd68 LoadLibraryExW GetProcAddress 62->63 64 4ddd81-4ddd96 DecodePointer 62->64 65 4ddd6b-4ddd77 EncodePointer 63->65 66 4ddd6a 63->66 65->64
      APIs
      • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoInitialize,004DDE08,?), ref: 004DDD59
      • GetProcAddress.KERNEL32(00000000), ref: 004DDD60
      • EncodePointer.KERNEL32(00000000), ref: 004DDD6C
      • DecodePointer.KERNEL32(00000001,004DDE08,?), ref: 004DDD89
      Strings
      Memory Dump Source
      • Source File: 0000000B.00000002.3533861385.0000000000361000.00000020.00000001.01000000.00000005.sdmp, Offset: 00360000, based on PE: true
      • Associated: 0000000B.00000002.3533815261.0000000000360000.00000002.00000001.01000000.00000005.sdmpDownload File
      • Associated: 0000000B.00000002.3534071818.0000000000528000.00000002.00000001.01000000.00000005.sdmpDownload File
      • Associated: 0000000B.00000002.3534139520.000000000058B000.00000004.00000001.01000000.00000005.sdmpDownload File
      • Associated: 0000000B.00000002.3534161247.000000000058E000.00000008.00000001.01000000.00000005.sdmpDownload File
      • Associated: 0000000B.00000002.3534184831.0000000000593000.00000004.00000001.01000000.00000005.sdmpDownload File
      • Associated: 0000000B.00000002.3534184831.000000000059B000.00000004.00000001.01000000.00000005.sdmpDownload File
      • Associated: 0000000B.00000002.3534231482.000000000059E000.00000002.00000001.01000000.00000005.sdmpDownload File
      • Associated: 0000000B.00000002.3534231482.0000000000791000.00000002.00000001.01000000.00000005.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_11_2_360000_clink410.jbxd
      Similarity
      • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
      • String ID: RoInitialize$combase.dll
      • API String ID: 3489934621-340411864
      • Opcode ID: 1bd91ccdc51594f32f53b0fba1f76854bd9ef94fcefaaee4fe0d7b67dd71958c
      • Instruction ID: 9f8db4984c1b52b1df6c215c4f21e913134c62d4b2fdf927276cd66b2dfcdb4e
      • Opcode Fuzzy Hash: 1bd91ccdc51594f32f53b0fba1f76854bd9ef94fcefaaee4fe0d7b67dd71958c
      • Instruction Fuzzy Hash: A4E0ED70A922019BDF745BB49C09B253A69AB76B0BF429426B501D52B0CEB4448EAF10
      Uniqueness

      Uniqueness Score: -1.00%

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 68 4dde14-4dde1b 69 4dde1d-4dde3d LoadLibraryExW GetProcAddress 68->69 70 4dde55-4dde5b DecodePointer 68->70 71 4dde3f-4dde4b EncodePointer 69->71 72 4dde63 69->72 70->72 71->70
      APIs
      • LoadLibraryExW.KERNEL32(combase.dll,00000000,00000800,RoUninitialize,004DDD2E), ref: 004DDE2E
      • GetProcAddress.KERNEL32(00000000), ref: 004DDE35
      • EncodePointer.KERNEL32(00000000), ref: 004DDE40
      • DecodePointer.KERNEL32(004DDD2E), ref: 004DDE5B
      Strings
      Memory Dump Source
      • Source File: 0000000B.00000002.3533861385.0000000000361000.00000020.00000001.01000000.00000005.sdmp, Offset: 00360000, based on PE: true
      • Associated: 0000000B.00000002.3533815261.0000000000360000.00000002.00000001.01000000.00000005.sdmpDownload File
      • Associated: 0000000B.00000002.3534071818.0000000000528000.00000002.00000001.01000000.00000005.sdmpDownload File
      • Associated: 0000000B.00000002.3534139520.000000000058B000.00000004.00000001.01000000.00000005.sdmpDownload File
      • Associated: 0000000B.00000002.3534161247.000000000058E000.00000008.00000001.01000000.00000005.sdmpDownload File
      • Associated: 0000000B.00000002.3534184831.0000000000593000.00000004.00000001.01000000.00000005.sdmpDownload File
      • Associated: 0000000B.00000002.3534184831.000000000059B000.00000004.00000001.01000000.00000005.sdmpDownload File
      • Associated: 0000000B.00000002.3534231482.000000000059E000.00000002.00000001.01000000.00000005.sdmpDownload File
      • Associated: 0000000B.00000002.3534231482.0000000000791000.00000002.00000001.01000000.00000005.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_11_2_360000_clink410.jbxd
      Similarity
      • API ID: Pointer$AddressDecodeEncodeLibraryLoadProc
      • String ID: RoUninitialize$combase.dll
      • API String ID: 3489934621-2819208100
      • Opcode ID: 1915ff07d943316b20a1c63fbbaf3ea7781e7e846304b3d36903c5f2fbad095b
      • Instruction ID: 3784bb97daacec316ca2cb53095cae8d32cb318c7ca690071286b12aeb81a5a6
      • Opcode Fuzzy Hash: 1915ff07d943316b20a1c63fbbaf3ea7781e7e846304b3d36903c5f2fbad095b
      • Instruction Fuzzy Hash: E2E09AB054B201ABDF655FA0AD1D7263B68BB36B06F124816B501D91A0CFB8484DAB64
      Uniqueness

      Uniqueness Score: -1.00%