Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
mG31YklE0k.exe

Overview

General Information

Sample name:mG31YklE0k.exe
(renamed file extension from none to exe, renamed because original name is a hash value)
Original sample name:a63073dc84ad47517f9b50c4270b274888fda0536381f04259418b25e96407c9
Analysis ID:1467030
MD5:8b6caa03bd794cf1d3d61493383414f0
SHA1:a15fa197e0c22aad50b20dacb48abf6d6f81ed9c
SHA256:a63073dc84ad47517f9b50c4270b274888fda0536381f04259418b25e96407c9
Infos:

Detection

Score:56
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Malicious sample detected (through community Yara rule)
AI detected suspicious sample
Contains functionality to compare user and computer (likely to detect sandboxes)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to dynamically determine API calls
Contains functionality to launch a control a shell (cmd.exe)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Found decision node followed by non-executed suspicious APIs
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses Microsoft's Enhanced Cryptographic Provider
Yara detected Suspicious PDB
Yara signature match

Classification

  • System is w10x64
  • mG31YklE0k.exe (PID: 7272 cmdline: "C:\Users\user\Desktop\mG31YklE0k.exe" MD5: 8B6CAA03BD794CF1D3D61493383414F0)
    • conhost.exe (PID: 7280 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • cmd.exe (PID: 7396 cmdline: cmd.exe /C "chcp 65001 > NUL & wmic os get Name,OSArchitecture /format:rawxml" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 7404 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • chcp.com (PID: 7448 cmdline: chcp 65001 MD5: 33395C4732A49065EA72590B14B64F32)
      • WMIC.exe (PID: 7464 cmdline: wmic os get Name,OSArchitecture /format:rawxml MD5: C37F2F4F4B3CD128BDABCAEB2266A785)
    • cmd.exe (PID: 7500 cmdline: cmd.exe /C "chcp 65001 > NUL & wmic cpu get Name /format:rawxml" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 7508 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • chcp.com (PID: 7552 cmdline: chcp 65001 MD5: 33395C4732A49065EA72590B14B64F32)
      • WMIC.exe (PID: 7568 cmdline: wmic cpu get Name /format:rawxml MD5: C37F2F4F4B3CD128BDABCAEB2266A785)
    • cmd.exe (PID: 7604 cmdline: cmd.exe /C "chcp 65001 > NUL & wmic os get TotalVisibleMemorySize /format:rawxml" MD5: 8A2122E8162DBEF04694B9C3E0B6CDEE)
      • conhost.exe (PID: 7612 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • chcp.com (PID: 7648 cmdline: chcp 65001 MD5: 33395C4732A49065EA72590B14B64F32)
      • WMIC.exe (PID: 7664 cmdline: wmic os get TotalVisibleMemorySize /format:rawxml MD5: C37F2F4F4B3CD128BDABCAEB2266A785)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
mG31YklE0k.exeJoeSecurity_SuspiciousPDBYara detected Suspicious PDBJoe Security
    mG31YklE0k.exeWindows_Trojan_MicroBackdoor_46f2e5fdunknownunknown
    • 0x600:$a1: cmd.exe /C "%s%s"
    • 0x570:$a2: %s|%s|%d|%s|%d|%d
    • 0x598:$a3: {{{$%.8x}}}
    • 0x5d0:$a5: chcp 65001 > NUL &
    • 0x7a8:$a6: CONNECT %s:%d HTTP/1.0
    SourceRuleDescriptionAuthorStrings
    00000000.00000002.2555584235.00007FF792321000.00000020.00000001.01000000.00000003.sdmpJoeSecurity_SuspiciousPDBYara detected Suspicious PDBJoe Security
      00000000.00000002.2555584235.00007FF792321000.00000020.00000001.01000000.00000003.sdmpWindows_Trojan_MicroBackdoor_46f2e5fdunknownunknown
      • 0x200:$a1: cmd.exe /C "%s%s"
      • 0x170:$a2: %s|%s|%d|%s|%d|%d
      • 0x198:$a3: {{{$%.8x}}}
      • 0x1d0:$a5: chcp 65001 > NUL &
      • 0x3a8:$a6: CONNECT %s:%d HTTP/1.0
      00000000.00000000.1316395438.00007FF792321000.00000020.00000001.01000000.00000003.sdmpJoeSecurity_SuspiciousPDBYara detected Suspicious PDBJoe Security
        00000000.00000000.1316395438.00007FF792321000.00000020.00000001.01000000.00000003.sdmpWindows_Trojan_MicroBackdoor_46f2e5fdunknownunknown
        • 0x200:$a1: cmd.exe /C "%s%s"
        • 0x170:$a2: %s|%s|%d|%s|%d|%d
        • 0x198:$a3: {{{$%.8x}}}
        • 0x1d0:$a5: chcp 65001 > NUL &
        • 0x3a8:$a6: CONNECT %s:%d HTTP/1.0
        Process Memory Space: mG31YklE0k.exe PID: 7272JoeSecurity_SuspiciousPDBYara detected Suspicious PDBJoe Security
          SourceRuleDescriptionAuthorStrings
          0.0.mG31YklE0k.exe.7ff792320000.0.unpackJoeSecurity_SuspiciousPDBYara detected Suspicious PDBJoe Security
            0.0.mG31YklE0k.exe.7ff792320000.0.unpackWindows_Trojan_MicroBackdoor_46f2e5fdunknownunknown
            • 0x600:$a1: cmd.exe /C "%s%s"
            • 0x570:$a2: %s|%s|%d|%s|%d|%d
            • 0x598:$a3: {{{$%.8x}}}
            • 0x5d0:$a5: chcp 65001 > NUL &
            • 0x7a8:$a6: CONNECT %s:%d HTTP/1.0
            0.2.mG31YklE0k.exe.7ff792320000.0.unpackJoeSecurity_SuspiciousPDBYara detected Suspicious PDBJoe Security
              0.2.mG31YklE0k.exe.7ff792320000.0.unpackWindows_Trojan_MicroBackdoor_46f2e5fdunknownunknown
              • 0x600:$a1: cmd.exe /C "%s%s"
              • 0x570:$a2: %s|%s|%d|%s|%d|%d
              • 0x598:$a3: {{{$%.8x}}}
              • 0x5d0:$a5: chcp 65001 > NUL &
              • 0x7a8:$a6: CONNECT %s:%d HTTP/1.0
              No Sigma rule has matched
              No Snort rule has matched

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.5% probability
              Source: C:\Users\user\Desktop\mG31YklE0k.exeCode function: 0_2_00007FF792324780 lstrcmpA,CryptAcquireContextA,CryptAcquireContextA,GetLastError,CryptImportPublicKeyInfo,CryptExportKey,LocalAlloc,CryptExportKey,GetLastError,LocalFree,CryptDestroyKey,GetLastError,CryptDestroyKey,GetLastError,CryptReleaseContext,0_2_00007FF792324780
              Source: C:\Users\user\Desktop\mG31YklE0k.exeCode function: 0_2_00007FF792323990 CryptHashCertificate,LocalAlloc,LocalFree,recv,WSAGetLastError,GetLastError,closesocket,0_2_00007FF792323990
              Source: C:\Users\user\Desktop\mG31YklE0k.exeCode function: 0_2_00007FF792323490 CryptHashCertificate,LocalAlloc,LocalFree,recv,WSAGetLastError,GetLastError,0_2_00007FF792323490
              Source: C:\Users\user\Desktop\mG31YklE0k.exeCode function: 0_2_00007FF792324920 CryptAcquireContextA,GetLastError,CryptAcquireContextA,GetLastError,CryptGenRandom,GetLastError,CryptReleaseContext,0_2_00007FF792324920
              Source: C:\Users\user\Desktop\mG31YklE0k.exeCode function: 0_2_00007FF792324530 CryptAcquireContextA,CryptCreateHash,GetLastError,CryptReleaseContext,GetLastError,0_2_00007FF792324530
              Source: C:\Users\user\Desktop\mG31YklE0k.exeCode function: 0_2_00007FF792324130 CryptQueryObject,CertGetNameStringW,CertNameToStrW,CertNameToStrW,CryptHashCertificate,wsprintfA,CertFreeCertificateContext,GetLastError,CertFreeCertificateContext,GetLastError,0_2_00007FF792324130
              Source: C:\Users\user\Desktop\mG31YklE0k.exeCode function: 0_2_00007FF7923243C0 CryptAcquireContextA,CryptCreateHash,GetLastError,CryptReleaseContext,CryptHashData,CryptGetHashParam,CryptDestroyHash,CryptReleaseContext,GetLastError,0_2_00007FF7923243C0
              Source: C:\Users\user\Desktop\mG31YklE0k.exeCode function: 0_2_00007FF7923245D0 lstrcmpA,CryptAcquireContextA,CryptAcquireContextA,GetLastError,CryptImportPublicKeyInfo,LocalAlloc,CryptEncrypt,LocalFree,CryptDestroyKey,GetLastError,LocalFree,CryptDestroyKey,GetLastError,CryptDestroyKey,GetLastError,CryptReleaseContext,0_2_00007FF7923245D0
              Source: C:\Users\user\Desktop\mG31YklE0k.exeCode function: 0_2_00007FF79232B068 CryptCreateHash,0_2_00007FF79232B068
              Source: C:\Users\user\Desktop\mG31YklE0k.exeCode function: 0_2_00007FF79232B070 CryptHashData,0_2_00007FF79232B070
              Source: C:\Users\user\Desktop\mG31YklE0k.exeCode function: 0_2_00007FF79232B0D8 CryptQueryObject,CryptImportPublicKeyInfo,CryptHashCertificate,0_2_00007FF79232B0D8
              Source: C:\Users\user\Desktop\mG31YklE0k.exeCode function: 0_2_00007FF7923244E0 CryptGetHashParam,0_2_00007FF7923244E0
              Source: C:\Users\user\Desktop\mG31YklE0k.exeCode function: 0_2_00007FF79232B0E8 CryptImportPublicKeyInfo,0_2_00007FF79232B0E8
              Source: C:\Users\user\Desktop\mG31YklE0k.exeCode function: 0_2_00007FF79232B0F0 CryptHashCertificate,0_2_00007FF79232B0F0
              Source: C:\Users\user\Desktop\mG31YklE0k.exeCode function: 0_2_00007FF7923245C0 CryptHashData,0_2_00007FF7923245C0
              Source: mG31YklE0k.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
              Source: Binary string: C:\Users\vs2019\source\repos\backdoor\x64\Release\backdoor.pdb&& source: mG31YklE0k.exe
              Source: Binary string: C:\Users\vs2019\source\repos\backdoor\x64\Release\backdoor.pdb source: mG31YklE0k.exe
              Source: C:\Users\user\Desktop\mG31YklE0k.exeCode function: 0_2_00007FF792322330 GetLogicalDriveStringsA,lstrlenA,GetDriveTypeA,GetLastError,MultiByteToWideChar,LocalAlloc,GetLastError,MultiByteToWideChar,FindFirstFileW,wsprintfW,wsprintfW,FindNextFileW,FindClose,FindClose,GetLastError,LocalFree,0_2_00007FF792322330
              Source: C:\Users\user\Desktop\mG31YklE0k.exeCode function: 0_2_00007FF792322330 GetLogicalDriveStringsA,lstrlenA,GetDriveTypeA,GetLastError,MultiByteToWideChar,LocalAlloc,GetLastError,MultiByteToWideChar,FindFirstFileW,wsprintfW,wsprintfW,FindNextFileW,FindClose,FindClose,GetLastError,LocalFree,0_2_00007FF792322330
              Source: global trafficTCP traffic: 192.168.2.9:49706 -> 47.236.8.208:28115
              Source: unknownTCP traffic detected without corresponding DNS query: 47.236.8.208
              Source: unknownTCP traffic detected without corresponding DNS query: 47.236.8.208
              Source: unknownTCP traffic detected without corresponding DNS query: 47.236.8.208
              Source: unknownTCP traffic detected without corresponding DNS query: 47.236.8.208
              Source: unknownTCP traffic detected without corresponding DNS query: 47.236.8.208
              Source: unknownTCP traffic detected without corresponding DNS query: 47.236.8.208
              Source: unknownTCP traffic detected without corresponding DNS query: 47.236.8.208
              Source: unknownTCP traffic detected without corresponding DNS query: 47.236.8.208
              Source: unknownTCP traffic detected without corresponding DNS query: 47.236.8.208
              Source: unknownTCP traffic detected without corresponding DNS query: 47.236.8.208
              Source: unknownTCP traffic detected without corresponding DNS query: 47.236.8.208
              Source: unknownTCP traffic detected without corresponding DNS query: 47.236.8.208
              Source: unknownTCP traffic detected without corresponding DNS query: 47.236.8.208
              Source: unknownTCP traffic detected without corresponding DNS query: 47.236.8.208
              Source: unknownTCP traffic detected without corresponding DNS query: 47.236.8.208
              Source: unknownTCP traffic detected without corresponding DNS query: 47.236.8.208
              Source: unknownTCP traffic detected without corresponding DNS query: 47.236.8.208
              Source: unknownTCP traffic detected without corresponding DNS query: 47.236.8.208
              Source: C:\Users\user\Desktop\mG31YklE0k.exeCode function: 0_2_00007FF792323990 CryptHashCertificate,LocalAlloc,LocalFree,recv,WSAGetLastError,GetLastError,closesocket,0_2_00007FF792323990

              System Summary

              barindex
              Source: mG31YklE0k.exe, type: SAMPLEMatched rule: Windows_Trojan_MicroBackdoor_46f2e5fd Author: unknown
              Source: 0.0.mG31YklE0k.exe.7ff792320000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_MicroBackdoor_46f2e5fd Author: unknown
              Source: 0.2.mG31YklE0k.exe.7ff792320000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_MicroBackdoor_46f2e5fd Author: unknown
              Source: 00000000.00000002.2555584235.00007FF792321000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_MicroBackdoor_46f2e5fd Author: unknown
              Source: 00000000.00000000.1316395438.00007FF792321000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_MicroBackdoor_46f2e5fd Author: unknown
              Source: C:\Users\user\Desktop\mG31YklE0k.exeCode function: 0_2_00007FF7923247800_2_00007FF792324780
              Source: C:\Users\user\Desktop\mG31YklE0k.exeCode function: 0_2_00007FF7923239900_2_00007FF792323990
              Source: C:\Users\user\Desktop\mG31YklE0k.exeCode function: 0_2_00007FF792321B500_2_00007FF792321B50
              Source: C:\Users\user\Desktop\mG31YklE0k.exeCode function: 0_2_00007FF7923243C00_2_00007FF7923243C0
              Source: C:\Users\user\Desktop\mG31YklE0k.exeCode function: 0_2_00007FF7923229700_2_00007FF792322970
              Source: C:\Users\user\Desktop\mG31YklE0k.exeCode function: 0_2_00007FF7923226200_2_00007FF792322620
              Source: C:\Users\user\Desktop\mG31YklE0k.exeCode function: 0_2_00007FF7923254300_2_00007FF792325430
              Source: mG31YklE0k.exeBinary or memory string: OriginalFilename vs mG31YklE0k.exe
              Source: mG31YklE0k.exe, 00000000.00000000.1316429199.00007FF79232A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameAccessEnum.exeP vs mG31YklE0k.exe
              Source: mG31YklE0k.exe, 00000000.00000002.2555625467.00007FF79232A000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameAccessEnum.exeP vs mG31YklE0k.exe
              Source: mG31YklE0k.exeBinary or memory string: OriginalFilenameAccessEnum.exeP vs mG31YklE0k.exe
              Source: mG31YklE0k.exe, type: SAMPLEMatched rule: Windows_Trojan_MicroBackdoor_46f2e5fd reference_sample = fbbfcc81a976b57739ef13c1545ea4409a1c69720469c05ba249a42d532f9c21, os = windows, severity = x86, creation_date = 2022-03-07, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.MicroBackdoor, fingerprint = d4e410b9c36c1d5206f5d17190ef4e5fd4b4e4d40acad703775aed085a08ef7c, id = 46f2e5fd-edea-4321-b38c-7478b47f054b, last_modified = 2022-04-12
              Source: 0.0.mG31YklE0k.exe.7ff792320000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_MicroBackdoor_46f2e5fd reference_sample = fbbfcc81a976b57739ef13c1545ea4409a1c69720469c05ba249a42d532f9c21, os = windows, severity = x86, creation_date = 2022-03-07, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.MicroBackdoor, fingerprint = d4e410b9c36c1d5206f5d17190ef4e5fd4b4e4d40acad703775aed085a08ef7c, id = 46f2e5fd-edea-4321-b38c-7478b47f054b, last_modified = 2022-04-12
              Source: 0.2.mG31YklE0k.exe.7ff792320000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_MicroBackdoor_46f2e5fd reference_sample = fbbfcc81a976b57739ef13c1545ea4409a1c69720469c05ba249a42d532f9c21, os = windows, severity = x86, creation_date = 2022-03-07, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.MicroBackdoor, fingerprint = d4e410b9c36c1d5206f5d17190ef4e5fd4b4e4d40acad703775aed085a08ef7c, id = 46f2e5fd-edea-4321-b38c-7478b47f054b, last_modified = 2022-04-12
              Source: 00000000.00000002.2555584235.00007FF792321000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_MicroBackdoor_46f2e5fd reference_sample = fbbfcc81a976b57739ef13c1545ea4409a1c69720469c05ba249a42d532f9c21, os = windows, severity = x86, creation_date = 2022-03-07, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.MicroBackdoor, fingerprint = d4e410b9c36c1d5206f5d17190ef4e5fd4b4e4d40acad703775aed085a08ef7c, id = 46f2e5fd-edea-4321-b38c-7478b47f054b, last_modified = 2022-04-12
              Source: 00000000.00000000.1316395438.00007FF792321000.00000020.00000001.01000000.00000003.sdmp, type: MEMORYMatched rule: Windows_Trojan_MicroBackdoor_46f2e5fd reference_sample = fbbfcc81a976b57739ef13c1545ea4409a1c69720469c05ba249a42d532f9c21, os = windows, severity = x86, creation_date = 2022-03-07, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.MicroBackdoor, fingerprint = d4e410b9c36c1d5206f5d17190ef4e5fd4b4e4d40acad703775aed085a08ef7c, id = 46f2e5fd-edea-4321-b38c-7478b47f054b, last_modified = 2022-04-12
              Source: classification engineClassification label: mal56.evad.winEXE@23/5@0/1
              Source: C:\Users\user\Desktop\mG31YklE0k.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-2246122658-3693405117-2476756634-1003\1d921b7dbd459b1bfc7fa12af4fbde00_9e146be9-c76a-4720-bcdb-53011b87bd06Jump to behavior
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7280:120:WilError_03
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7404:120:WilError_03
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7508:120:WilError_03
              Source: C:\Users\user\Desktop\mG31YklE0k.exeMutant created: \Sessions\1\BaseNamedObjects\30D78F9B-C56E-472C-8A29-E91111115
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:7612:120:WilError_03
              Source: C:\Users\user\Desktop\mG31YklE0k.exeFile created: C:\Users\user\AppData\Local\Temp\Tmp13AC.tmpJump to behavior
              Source: mG31YklE0k.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Windows\System32\wbem\WMIC.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT Name FROM WIN32_PROCESSOR
              Source: C:\Users\user\Desktop\mG31YklE0k.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: unknownProcess created: C:\Users\user\Desktop\mG31YklE0k.exe "C:\Users\user\Desktop\mG31YklE0k.exe"
              Source: C:\Users\user\Desktop\mG31YklE0k.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Users\user\Desktop\mG31YklE0k.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C "chcp 65001 > NUL & wmic os get Name,OSArchitecture /format:rawxml"
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic os get Name,OSArchitecture /format:rawxml
              Source: C:\Users\user\Desktop\mG31YklE0k.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C "chcp 65001 > NUL & wmic cpu get Name /format:rawxml"
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic cpu get Name /format:rawxml
              Source: C:\Users\user\Desktop\mG31YklE0k.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C "chcp 65001 > NUL & wmic os get TotalVisibleMemorySize /format:rawxml"
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic os get TotalVisibleMemorySize /format:rawxml
              Source: C:\Users\user\Desktop\mG31YklE0k.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C "chcp 65001 > NUL & wmic os get Name,OSArchitecture /format:rawxml"Jump to behavior
              Source: C:\Users\user\Desktop\mG31YklE0k.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C "chcp 65001 > NUL & wmic cpu get Name /format:rawxml"Jump to behavior
              Source: C:\Users\user\Desktop\mG31YklE0k.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C "chcp 65001 > NUL & wmic os get TotalVisibleMemorySize /format:rawxml"Jump to behavior
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001Jump to behavior
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic os get Name,OSArchitecture /format:rawxmlJump to behavior
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001Jump to behavior
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic cpu get Name /format:rawxmlJump to behavior
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001Jump to behavior
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic os get TotalVisibleMemorySize /format:rawxmlJump to behavior
              Source: C:\Users\user\Desktop\mG31YklE0k.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Users\user\Desktop\mG31YklE0k.exeSection loaded: vcruntime140.dllJump to behavior
              Source: C:\Users\user\Desktop\mG31YklE0k.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Users\user\Desktop\mG31YklE0k.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Users\user\Desktop\mG31YklE0k.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Users\user\Desktop\mG31YklE0k.exeSection loaded: msasn1.dllJump to behavior
              Source: C:\Users\user\Desktop\mG31YklE0k.exeSection loaded: msisip.dllJump to behavior
              Source: C:\Users\user\Desktop\mG31YklE0k.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Users\user\Desktop\mG31YklE0k.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Users\user\Desktop\mG31YklE0k.exeSection loaded: wshext.dllJump to behavior
              Source: C:\Users\user\Desktop\mG31YklE0k.exeSection loaded: appxsip.dllJump to behavior
              Source: C:\Users\user\Desktop\mG31YklE0k.exeSection loaded: opcservices.dllJump to behavior
              Source: C:\Users\user\Desktop\mG31YklE0k.exeSection loaded: esdsip.dllJump to behavior
              Source: C:\Users\user\Desktop\mG31YklE0k.exeSection loaded: napinsp.dllJump to behavior
              Source: C:\Users\user\Desktop\mG31YklE0k.exeSection loaded: pnrpnsp.dllJump to behavior
              Source: C:\Users\user\Desktop\mG31YklE0k.exeSection loaded: wshbth.dllJump to behavior
              Source: C:\Users\user\Desktop\mG31YklE0k.exeSection loaded: nlaapi.dllJump to behavior
              Source: C:\Users\user\Desktop\mG31YklE0k.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Users\user\Desktop\mG31YklE0k.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Users\user\Desktop\mG31YklE0k.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Users\user\Desktop\mG31YklE0k.exeSection loaded: winrnr.dllJump to behavior
              Source: C:\Users\user\Desktop\mG31YklE0k.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Users\user\Desktop\mG31YklE0k.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Users\user\Desktop\mG31YklE0k.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Users\user\Desktop\mG31YklE0k.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Users\user\Desktop\mG31YklE0k.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Users\user\Desktop\mG31YklE0k.exeSection loaded: dpapi.dllJump to behavior
              Source: C:\Windows\System32\chcp.comSection loaded: ulib.dllJump to behavior
              Source: C:\Windows\System32\chcp.comSection loaded: fsutilext.dllJump to behavior
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: framedynos.dllJump to behavior
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: msxml6.dllJump to behavior
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140.dllJump to behavior
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140_1.dllJump to behavior
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\System32\chcp.comSection loaded: ulib.dllJump to behavior
              Source: C:\Windows\System32\chcp.comSection loaded: fsutilext.dllJump to behavior
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: framedynos.dllJump to behavior
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: msxml6.dllJump to behavior
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140.dllJump to behavior
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140_1.dllJump to behavior
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\System32\chcp.comSection loaded: ulib.dllJump to behavior
              Source: C:\Windows\System32\chcp.comSection loaded: fsutilext.dllJump to behavior
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: framedynos.dllJump to behavior
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: msxml6.dllJump to behavior
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: urlmon.dllJump to behavior
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: iertutil.dllJump to behavior
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: srvcli.dllJump to behavior
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: netutils.dllJump to behavior
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: uxtheme.dllJump to behavior
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140.dllJump to behavior
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: vcruntime140_1.dllJump to behavior
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\System32\wbem\WMIC.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\System32\wbem\WMIC.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}\InprocServer32Jump to behavior
              Source: mG31YklE0k.exeStatic PE information: Image base 0x140000000 > 0x60000000
              Source: mG31YklE0k.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
              Source: mG31YklE0k.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
              Source: mG31YklE0k.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
              Source: mG31YklE0k.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
              Source: mG31YklE0k.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
              Source: mG31YklE0k.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
              Source: mG31YklE0k.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
              Source: mG31YklE0k.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
              Source: Binary string: C:\Users\vs2019\source\repos\backdoor\x64\Release\backdoor.pdb&& source: mG31YklE0k.exe
              Source: Binary string: C:\Users\vs2019\source\repos\backdoor\x64\Release\backdoor.pdb source: mG31YklE0k.exe
              Source: C:\Users\user\Desktop\mG31YklE0k.exeCode function: 0_2_00007FF792323D20 _vscprintf,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,LocalAlloc,vsprintf,lstrlenA,LocalFree,0_2_00007FF792323D20
              Source: C:\Windows\System32\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\System32\wbem\WMIC.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: C:\Users\user\Desktop\mG31YklE0k.exeCode function: GetModuleHandleA,GetModuleFileNameA,StrStrA,CreateThread,CloseHandle,0_2_00007FF792324080
              Source: C:\Users\user\Desktop\mG31YklE0k.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)graph_0-1881
              Source: C:\Windows\System32\wbem\WMIC.exeWMI Queries: IWbemServices::ExecQuery - ROOT\CIMV2 : SELECT Name FROM WIN32_PROCESSOR
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Users\user\Desktop\mG31YklE0k.exeCode function: 0_2_00007FF792322330 GetLogicalDriveStringsA,lstrlenA,GetDriveTypeA,GetLastError,MultiByteToWideChar,LocalAlloc,GetLastError,MultiByteToWideChar,FindFirstFileW,wsprintfW,wsprintfW,FindNextFileW,FindClose,FindClose,GetLastError,LocalFree,0_2_00007FF792322330
              Source: C:\Users\user\Desktop\mG31YklE0k.exeCode function: 0_2_00007FF792322330 GetLogicalDriveStringsA,lstrlenA,GetDriveTypeA,GetLastError,MultiByteToWideChar,LocalAlloc,GetLastError,MultiByteToWideChar,FindFirstFileW,wsprintfW,wsprintfW,FindNextFileW,FindClose,FindClose,GetLastError,LocalFree,0_2_00007FF792322330
              Source: mG31YklE0k.exe, 00000000.00000002.2555279121.0000024AB1E5C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
              Source: mG31YklE0k.exe, 00000000.00000002.2555279121.0000024AB1E5C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
              Source: C:\Windows\System32\wbem\WMIC.exeProcess information queried: ProcessInformationJump to behavior
              Source: C:\Users\user\Desktop\mG31YklE0k.exeCode function: 0_2_00007FF792326740 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF792326740
              Source: C:\Users\user\Desktop\mG31YklE0k.exeCode function: 0_2_00007FF792323D20 _vscprintf,LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,LocalAlloc,vsprintf,lstrlenA,LocalFree,0_2_00007FF792323D20
              Source: C:\Users\user\Desktop\mG31YklE0k.exeCode function: 0_2_00007FF792322F00 CreateMutexA,CreateMutexExA,GetLastError,GetCommandLineA,SetUnhandledExceptionFilter,GetCurrentProcessId,lstrlenA,lstrlenA,GetVersionExA,GetLastError,WSAStartup,WSAGetLastError,lstrlenA,gethostbyname,inet_addr,Sleep,htons,inet_ntoa,socket,connect,GetTickCount,closesocket,WSAGetLastError,closesocket,Sleep,WSAGetLastError,Sleep,closesocket,CloseHandle,0_2_00007FF792322F00
              Source: C:\Users\user\Desktop\mG31YklE0k.exeCode function: 0_2_00007FF7923260A8 SetUnhandledExceptionFilter,_set_new_mode,_set_new_mode,0_2_00007FF7923260A8
              Source: C:\Users\user\Desktop\mG31YklE0k.exeCode function: 0_2_00007FF792326740 IsProcessorFeaturePresent,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF792326740
              Source: C:\Users\user\Desktop\mG31YklE0k.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C "chcp 65001 > NUL & wmic os get Name,OSArchitecture /format:rawxml"Jump to behavior
              Source: C:\Users\user\Desktop\mG31YklE0k.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C "chcp 65001 > NUL & wmic cpu get Name /format:rawxml"Jump to behavior
              Source: C:\Users\user\Desktop\mG31YklE0k.exeProcess created: C:\Windows\System32\cmd.exe cmd.exe /C "chcp 65001 > NUL & wmic os get TotalVisibleMemorySize /format:rawxml"Jump to behavior
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001Jump to behavior
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic os get Name,OSArchitecture /format:rawxmlJump to behavior
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001Jump to behavior
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic cpu get Name /format:rawxmlJump to behavior
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\chcp.com chcp 65001Jump to behavior
              Source: C:\Windows\System32\cmd.exeProcess created: C:\Windows\System32\wbem\WMIC.exe wmic os get TotalVisibleMemorySize /format:rawxmlJump to behavior
              Source: C:\Users\user\Desktop\mG31YklE0k.exeCode function: 0_2_00007FF792326620 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00007FF792326620
              Source: C:\Users\user\Desktop\mG31YklE0k.exeCode function: 0_2_00007FF792324BE0 GetVersionExA,GetLastError,GetCurrentProcess,OpenProcessToken,GetTokenInformation,GetLastError,LocalAlloc,GetTokenInformation,GetSidSubAuthorityCount,GetSidSubAuthority,LocalFree,GetLastError,LocalFree,GetLastError,CloseHandle,GetLastError,0_2_00007FF792324BE0
              Source: C:\Users\user\Desktop\mG31YklE0k.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
              Source: C:\Users\user\Desktop\mG31YklE0k.exeCode function: cmd.exe /C "%s%s"0_2_00007FF792321B50
              Source: Yara matchFile source: mG31YklE0k.exe, type: SAMPLE
              Source: Yara matchFile source: 0.0.mG31YklE0k.exe.7ff792320000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 0.2.mG31YklE0k.exe.7ff792320000.0.unpack, type: UNPACKEDPE
              Source: Yara matchFile source: 00000000.00000002.2555584235.00007FF792321000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: 00000000.00000000.1316395438.00007FF792321000.00000020.00000001.01000000.00000003.sdmp, type: MEMORY
              Source: Yara matchFile source: Process Memory Space: mG31YklE0k.exe PID: 7272, type: MEMORYSTR
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid Accounts11
              Windows Management Instrumentation
              1
              DLL Side-Loading
              11
              Process Injection
              1
              Masquerading
              OS Credential Dumping1
              System Time Discovery
              Remote Services1
              Archive Collected Data
              2
              Encrypted Channel
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault Accounts1
              Command and Scripting Interpreter
              Boot or Logon Initialization Scripts1
              DLL Side-Loading
              1
              Virtualization/Sandbox Evasion
              LSASS Memory121
              Security Software Discovery
              Remote Desktop ProtocolData from Removable Media1
              Non-Standard Port
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain Accounts1
              Native API
              Logon Script (Windows)Logon Script (Windows)11
              Process Injection
              Security Account Manager1
              Virtualization/Sandbox Evasion
              SMB/Windows Admin SharesData from Network Shared Drive1
              Ingress Tool Transfer
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
              DLL Side-Loading
              NTDS1
              Process Discovery
              Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets2
              File and Directory Discovery
              SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
              Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials5
              System Information Discovery
              VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 signatures2 2 Behavior Graph ID: 1467030 Sample: mG31YklE0k Startdate: 03/07/2024 Architecture: WINDOWS Score: 56 39 Malicious sample detected (through community Yara rule) 2->39 41 AI detected suspicious sample 2->41 7 mG31YklE0k.exe 31 2->7         started        process3 dnsIp4 37 47.236.8.208, 28115, 49706 CHARTER-20115US United States 7->37 43 Contains functionality to compare user and computer (likely to detect sandboxes) 7->43 11 cmd.exe 1 7->11         started        13 cmd.exe 1 7->13         started        15 cmd.exe 1 7->15         started        17 conhost.exe 7->17         started        signatures5 process6 process7 19 WMIC.exe 1 11->19         started        21 conhost.exe 11->21         started        23 chcp.com 1 11->23         started        25 WMIC.exe 1 13->25         started        27 conhost.exe 13->27         started        29 chcp.com 1 13->29         started        31 WMIC.exe 1 15->31         started        33 conhost.exe 15->33         started        35 chcp.com 1 15->35         started       

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              No Antivirus matches
              No contacted domains info
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              47.236.8.208
              unknownUnited States
              20115CHARTER-20115USfalse
              Joe Sandbox version:40.0.0 Tourmaline
              Analysis ID:1467030
              Start date and time:2024-07-03 16:40:39 +02:00
              Joe Sandbox product:CloudBasic
              Overall analysis duration:0h 4m 46s
              Hypervisor based Inspection enabled:false
              Report type:full
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
              Number of analysed new started processes analysed:22
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Sample name:mG31YklE0k.exe
              (renamed file extension from none to exe, renamed because original name is a hash value)
              Original Sample Name:a63073dc84ad47517f9b50c4270b274888fda0536381f04259418b25e96407c9
              Detection:MAL
              Classification:mal56.evad.winEXE@23/5@0/1
              EGA Information:
              • Successful, ratio: 100%
              HCA Information:
              • Successful, ratio: 93%
              • Number of executed functions: 21
              • Number of non-executed functions: 20
              • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
              • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, fe3cr.delivery.mp.microsoft.com
              • Not all processes where analyzed, report is missing behavior information
              • VT rate limit hit for: mG31YklE0k.exe
              TimeTypeDescription
              10:41:31API Interceptor3x Sleep call for process: WMIC.exe modified
              No context
              No context
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              CHARTER-20115USRR1h1iO6W2.exeGet hashmaliciousFormBookBrowse
              • 47.239.13.172
              Fiyat ARH-4309745275.pdf240012048477374'dir.PO 13u40000876.exeGet hashmaliciousFormBookBrowse
              • 47.239.13.172
              Siparis. 000867000960 TAVSAN order_Optium A.s 03.07.2024.exeGet hashmaliciousFormBookBrowse
              • 47.239.13.172
              http://we-whatsapp-kf.top/Get hashmaliciousUnknownBrowse
              • 47.238.134.130
              http://we-whatsapp-kf.club/Get hashmaliciousUnknownBrowse
              • 47.238.60.212
              mirai.mpsl.elfGet hashmaliciousMiraiBrowse
              • 24.181.17.151
              mirai.spc.elfGet hashmaliciousMiraiBrowse
              • 35.134.142.218
              mirai.x86.elfGet hashmaliciousMiraiBrowse
              • 97.95.170.153
              jew.mpsl.elfGet hashmaliciousUnknownBrowse
              • 47.26.252.103
              jew.arm7.elfGet hashmaliciousMiraiBrowse
              • 174.87.193.170
              No context
              No context
              Process:C:\Users\user\Desktop\mG31YklE0k.exe
              File Type:PEM certificate
              Category:dropped
              Size (bytes):1224
              Entropy (8bit):5.903840842623564
              Encrypted:false
              SSDEEP:24:LrqxX9bklbDsOuvbCJLz3KkR03ZugOo5Apq1A1lfn1/xRVFxq9IZcNNugpR:LrabkdYr0neRF1CDP1/r02Z4P
              MD5:5174764DB37DF7458941465937A0AD81
              SHA1:328B97EE6799CC62603A669F9A3E26C5D18A1962
              SHA-256:33D3672C97F5542D5349FD71ADD714B52CEB4B8A787B3250B48C5F5137C1C945
              SHA-512:F47530419C58D8170A687AD7D60803D63505099F8621A53EA5F39E93FE5F0640F1DD71CD650893BA67BF7647560B1FB02D9D36C9C5873EC74EDA940A9EA9B771
              Malicious:false
              Preview:-----BEGIN CERTIFICATE-----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
              Process:C:\Users\user\Desktop\mG31YklE0k.exe
              File Type:data
              Category:dropped
              Size (bytes):45
              Entropy (8bit):0.9111711733157262
              Encrypted:false
              SSDEEP:3:/lwltJ:Wz
              MD5:3D7D230E8E9B4E8202935E38050E13E5
              SHA1:DFABCB8DCBC48AB136F6F87A29BF4A7C9CCCCAAF
              SHA-256:269E9F79960D5201DA265CEF43575B1EF31644174DA7A9AB23501AD3A0CACFC3
              SHA-512:02BAF2F6CE0222EBFD4186641AC8F8BF8C54D0184A6C4C85F720171EEF8B1871ACCC9F3E522B80C8814428F52B007CE321312A76B4538D59E4A436D43011FF30
              Malicious:false
              Preview:........................................user.
              Process:C:\Windows\System32\chcp.com
              File Type:ASCII text, with CRLF line terminators
              Category:dropped
              Size (bytes):25
              Entropy (8bit):4.103465189601646
              Encrypted:false
              SSDEEP:3:PHsEiV/:PsES
              MD5:D38306034A39FBDFDAC172946D5EF53F
              SHA1:346E6FF4E144749719368D4A27675C44E742BDCF
              SHA-256:2B06CDF30ADE079C57F6E8EC16FA27563855265463BEDE417A2DD63A631B6A21
              SHA-512:7F3CFF34DB2E1528BA3928E3C41CEC4C6407DFAB4CD57FA298CCD06AA65696FB3321DFCC24A0BF5A7D546F1216E3506F1D26B09B11E5511AD33219913FA149D4
              Malicious:false
              Preview:Active code page: 65001..
              File type:PE32+ executable (console) x86-64, for MS Windows
              Entropy (8bit):6.852039182449177
              TrID:
              • Win64 Executable Console (202006/5) 92.65%
              • Win64 Executable (generic) (12005/4) 5.51%
              • Generic Win/DOS Executable (2004/3) 0.92%
              • DOS Executable Generic (2002/1) 0.92%
              • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
              File name:mG31YklE0k.exe
              File size:432'128 bytes
              MD5:8b6caa03bd794cf1d3d61493383414f0
              SHA1:a15fa197e0c22aad50b20dacb48abf6d6f81ed9c
              SHA256:a63073dc84ad47517f9b50c4270b274888fda0536381f04259418b25e96407c9
              SHA512:806acd96674899d1eb6e8ab26e5f02d968b2fc6eb8cbfd6412a174ac49b8b5848a9e11c0627a089438cd7e69f5fc7bf9d890a6944fb2de16887cdbc831ba0e6d
              SSDEEP:12288:mZbroXPJbRw99/5inSFpKLJPiVv64Lafz:UnmRbWsaKLZOlef
              TLSH:0B948D9600A200E1D44D633EE49772E89215BFE949E058D7EF3A73E1EB3F6B56C2D109
              File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........D..J%..J%..J%..C]..@%...P..H%...P..X%...P..@%...P..I%..^N..[%..J%...%...P..@%...P`.K%..J%..K%...P..K%..RichJ%.................
              Icon Hash:69ec8cccccec69b2
              Entrypoint:0x140006240
              Entrypoint Section:.text
              Digitally signed:false
              Imagebase:0x140000000
              Subsystem:windows cui
              Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
              DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
              Time Stamp:0x668549A1 [Wed Jul 3 12:52:49 2024 UTC]
              TLS Callbacks:
              CLR (.Net) Version:
              OS Version Major:6
              OS Version Minor:0
              File Version Major:6
              File Version Minor:0
              Subsystem Version Major:6
              Subsystem Version Minor:0
              Import Hash:da2da8d7e1b177f6c85b526cf54d4f81
              Instruction
              dec eax
              sub esp, 28h
              call 00007FFAE8E2605Ch
              dec eax
              add esp, 28h
              jmp 00007FFAE8E25AF7h
              int3
              int3
              inc eax
              push ebx
              dec eax
              sub esp, 20h
              dec eax
              mov ebx, ecx
              xor ecx, ecx
              call dword ptr [00004EABh]
              dec eax
              mov ecx, ebx
              call dword ptr [00005012h]
              call dword ptr [00004ED4h]
              dec eax
              mov ecx, eax
              mov edx, C0000409h
              dec eax
              add esp, 20h
              pop ebx
              dec eax
              jmp dword ptr [00004ED8h]
              dec eax
              mov dword ptr [esp+08h], ecx
              dec eax
              sub esp, 38h
              mov ecx, 00000017h
              call dword ptr [00005024h]
              test eax, eax
              je 00007FFAE8E25C89h
              mov ecx, 00000002h
              int 29h
              dec eax
              lea ecx, dword ptr [00002952h]
              call 00007FFAE8E25D2Eh
              dec eax
              mov eax, dword ptr [esp+38h]
              dec eax
              mov dword ptr [00002A39h], eax
              dec eax
              lea eax, dword ptr [esp+38h]
              dec eax
              add eax, 08h
              dec eax
              mov dword ptr [000029C9h], eax
              dec eax
              mov eax, dword ptr [00002A22h]
              dec eax
              mov dword ptr [00002893h], eax
              dec eax
              mov eax, dword ptr [esp+40h]
              dec eax
              mov dword ptr [00002997h], eax
              mov dword ptr [0000286Dh], C0000409h
              mov dword ptr [00002867h], 00000001h
              mov dword ptr [00002871h], 00000001h
              Programming Language:
              • [IMP] VS2008 SP1 build 30729
              NameVirtual AddressVirtual Size Is in Section
              IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IMPORT0xb4d80x118.idata
              IMAGE_DIRECTORY_ENTRY_RESOURCE0xd0000x60580.rsrc
              IMAGE_DIRECTORY_ENTRY_EXCEPTION0xa0000x678.pdata
              IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
              IMAGE_DIRECTORY_ENTRY_BASERELOC0x6e0000x6c.reloc
              IMAGE_DIRECTORY_ENTRY_DEBUG0x13f00x70.text
              IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
              IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
              IMAGE_DIRECTORY_ENTRY_TLS0x00x0
              IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x14600x138.text
              IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_IAT0xb0000x4b0.idata
              IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
              IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
              IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
              NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
              .text0x10000x650c0x66005ae99d49b304354990d853d02c05ac9fFalse0.5579810049019608data6.007636917711092IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              .data0x80000x11680x800ddacbbc2b0e3ddba423fac05ce1dea96False0.52197265625data4.968150545191446IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
              .pdata0xa0000x6780x800b51c7c5405a356a7c42be5b3f3a96813False0.408203125data3.7544532864563442IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .idata0xb0000x14c20x1600d073fcab1edf44983863e0a0c4368d77False0.3400213068181818data4.236583202306604IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .rsrc0xd0000x605800x60600325f82659efe38a5b21505320a8f123eFalse0.5032070768482491data6.839791011908209IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
              .reloc0x6e0000x6c0x2009678921f82daf9b4123af53d42bf553cFalse0.2265625data1.3703275274477857IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
              NameRVASizeTypeLanguageCountryZLIB Complexity
              RT_ICON0x58b500x60aPNG image data, 128 x 128, 8-bit/color RGB, non-interlacedEnglishUnited States0.9573091849935317
              RT_ICON0x591600x70a8Device independent bitmap graphic, 96 x 192 x 24, image size 0EnglishUnited States0.029576976421636616
              RT_ICON0x602080x4ee8Device independent bitmap graphic, 80 x 160 x 24, image size 0EnglishUnited States0.033811881188118814
              RT_ICON0x650f00x3228Device independent bitmap graphic, 64 x 128 x 24, image size 0EnglishUnited States0.042834890965732085
              RT_ICON0x683180x1ca8Device independent bitmap graphic, 48 x 96 x 24, image size 0EnglishUnited States0.05466194111232279
              RT_ICON0x69fc00x1428Device independent bitmap graphic, 40 x 80 x 24, image size 0EnglishUnited States0.06763565891472868
              RT_ICON0x6b3e80xca8Device independent bitmap graphic, 32 x 64 x 24, image size 0EnglishUnited States0.08364197530864198
              RT_ICON0x6c0900x748Device independent bitmap graphic, 24 x 48 x 24, image size 0EnglishUnited States0.11856223175965665
              RT_ICON0x6c7d80x528Device independent bitmap graphic, 20 x 40 x 24, image size 0EnglishUnited States0.12878787878787878
              RT_ICON0x6cd000x368Device independent bitmap graphic, 16 x 32 x 24, image size 0EnglishUnited States0.18692660550458715
              RT_RCDATA0xd3400x4b809dataEnglishUnited States0.6231839537989439
              RT_GROUP_ICON0x6d0680x92dataEnglishUnited States0.6986301369863014
              RT_VERSION0x6d1000x2fcdataEnglishUnited States0.468586387434555
              RT_MANIFEST0x6d4000x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
              DLLImport
              SHLWAPI.dllStrStrA, StrCmpNA, StrToIntExA
              CRYPT32.dllCertNameToStrW, CertGetNameStringW, CryptQueryObject, CertFreeCertificateContext, CryptImportPublicKeyInfo, CryptHashCertificate
              WS2_32.dllinet_ntoa, recv, select, send, WSAGetLastError, WSAStartup, gethostbyname, __WSAFDIsSet, closesocket, connect, htons, inet_addr, socket
              KERNEL32.dllWriteFile, CloseHandle, SetUnhandledExceptionFilter, GetLastError, CreatePipe, PeekNamedPipe, WaitForSingleObject, CreateMutexA, Sleep, GetCurrentProcess, GetCurrentProcessId, ExitProcess, TerminateProcess, GetExitCodeProcess, GetFileSize, CreateThread, GetCurrentThreadId, CreateProcessA, CreateProcessW, GetStartupInfoW, GetTickCount, GetVersionExA, GetModuleFileNameA, GetModuleFileNameW, GetDriveTypeA, GetProcAddress, LoadLibraryA, LocalAlloc, LocalFree, lstrcmpA, lstrlenA, GetLogicalDriveStringsA, GetStartupInfoA, GetComputerNameW, MultiByteToWideChar, WideCharToMultiByte, AllocConsole, FreeConsole, GetConsoleCP, InitializeCriticalSection, EnterCriticalSection, LeaveCriticalSection, DeleteCriticalSection, lstrcpynA, GetModuleHandleW, RtlCaptureContext, RtlLookupFunctionEntry, RtlVirtualUnwind, UnhandledExceptionFilter, ReadFile, FindNextFileW, FindFirstFileW, FindClose, CreateFileW, GetModuleHandleA, GetCommandLineA, IsProcessorFeaturePresent, QueryPerformanceCounter, GetSystemTimeAsFileTime, InitializeSListHead, IsDebuggerPresent, SwitchToThread
              USER32.dllwsprintfW, wsprintfA
              ADVAPI32.dllCryptEncrypt, CryptGenRandom, CryptGetHashParam, CryptDestroyKey, CryptReleaseContext, CryptAcquireContextA, RegQueryValueExA, RegOpenKeyExA, RegOpenKeyA, RegEnumValueA, RegDeleteValueA, RegCloseKey, GetUserNameW, CryptCreateHash, CryptHashData, CryptDestroyHash, OpenProcessToken, CryptExportKey, RegEnumKeyA, GetTokenInformation, GetSidSubAuthorityCount, GetSidSubAuthority, CreateWellKnownSid, CheckTokenMembership
              SHELL32.dll
              VCRUNTIME140.dll__current_exception, __C_specific_handler, __current_exception_context
              api-ms-win-crt-runtime-l1-1-0.dll_c_exit, exit, _seh_filter_exe, _initialize_onexit_table, _register_onexit_function, _cexit, terminate, _set_app_type, _register_thread_local_exe_atexit_callback, _initterm_e, __p___argv, __p___argc, _initterm, _get_initial_narrow_environment, _initialize_narrow_environment, _configure_narrow_argv, _crt_atexit, _exit
              api-ms-win-crt-math-l1-1-0.dll__setusermatherr
              api-ms-win-crt-stdio-l1-1-0.dll__p__commode, _set_fmode
              api-ms-win-crt-locale-l1-1-0.dll_configthreadlocale
              api-ms-win-crt-heap-l1-1-0.dll_set_new_mode
              Language of compilation systemCountry where language is spokenMap
              EnglishUnited States
              TimestampSource PortDest PortSource IPDest IP
              Jul 3, 2024 16:41:30.219249964 CEST4970628115192.168.2.947.236.8.208
              Jul 3, 2024 16:41:30.225084066 CEST281154970647.236.8.208192.168.2.9
              Jul 3, 2024 16:41:30.225183010 CEST4970628115192.168.2.947.236.8.208
              Jul 3, 2024 16:41:30.259793997 CEST4970628115192.168.2.947.236.8.208
              Jul 3, 2024 16:41:30.266283989 CEST281154970647.236.8.208192.168.2.9
              Jul 3, 2024 16:41:31.235215902 CEST281154970647.236.8.208192.168.2.9
              Jul 3, 2024 16:41:31.285934925 CEST4970628115192.168.2.947.236.8.208
              Jul 3, 2024 16:41:31.524907112 CEST281154970647.236.8.208192.168.2.9
              Jul 3, 2024 16:41:31.525197029 CEST4970628115192.168.2.947.236.8.208
              Jul 3, 2024 16:41:31.530241013 CEST281154970647.236.8.208192.168.2.9
              Jul 3, 2024 16:41:31.892337084 CEST281154970647.236.8.208192.168.2.9
              Jul 3, 2024 16:41:31.942200899 CEST4970628115192.168.2.947.236.8.208
              Jul 3, 2024 16:41:32.289998055 CEST4970628115192.168.2.947.236.8.208
              Jul 3, 2024 16:41:32.294883966 CEST281154970647.236.8.208192.168.2.9
              Jul 3, 2024 16:41:32.625359058 CEST4970628115192.168.2.947.236.8.208
              Jul 3, 2024 16:41:32.630269051 CEST281154970647.236.8.208192.168.2.9
              Jul 3, 2024 16:41:32.966854095 CEST281154970647.236.8.208192.168.2.9
              Jul 3, 2024 16:41:33.020313025 CEST4970628115192.168.2.947.236.8.208
              Jul 3, 2024 16:41:33.231466055 CEST4970628115192.168.2.947.236.8.208
              Jul 3, 2024 16:41:33.236527920 CEST281154970647.236.8.208192.168.2.9
              Jul 3, 2024 16:41:33.668651104 CEST4970628115192.168.2.947.236.8.208
              Jul 3, 2024 16:41:33.673911095 CEST281154970647.236.8.208192.168.2.9
              Jul 3, 2024 16:41:34.010229111 CEST281154970647.236.8.208192.168.2.9
              Jul 3, 2024 16:41:34.054932117 CEST4970628115192.168.2.947.236.8.208
              Jul 3, 2024 16:41:34.528506041 CEST4970628115192.168.2.947.236.8.208
              Jul 3, 2024 16:41:34.533524036 CEST281154970647.236.8.208192.168.2.9
              Jul 3, 2024 16:41:34.862430096 CEST4970628115192.168.2.947.236.8.208
              Jul 3, 2024 16:41:34.867324114 CEST281154970647.236.8.208192.168.2.9
              Jul 3, 2024 16:41:35.203341007 CEST281154970647.236.8.208192.168.2.9
              Jul 3, 2024 16:41:35.203818083 CEST4970628115192.168.2.947.236.8.208
              Jul 3, 2024 16:41:35.208679914 CEST281154970647.236.8.208192.168.2.9
              Jul 3, 2024 16:42:05.192363977 CEST4970628115192.168.2.947.236.8.208
              Jul 3, 2024 16:42:05.197391033 CEST281154970647.236.8.208192.168.2.9
              Jul 3, 2024 16:42:35.192430973 CEST4970628115192.168.2.947.236.8.208
              Jul 3, 2024 16:42:35.197546959 CEST281154970647.236.8.208192.168.2.9
              Jul 3, 2024 16:43:05.208242893 CEST4970628115192.168.2.947.236.8.208
              Jul 3, 2024 16:43:05.213143110 CEST281154970647.236.8.208192.168.2.9

              Click to jump to process

              Click to jump to process

              Click to dive into process behavior distribution

              Click to jump to process

              Target ID:0
              Start time:10:41:29
              Start date:03/07/2024
              Path:C:\Users\user\Desktop\mG31YklE0k.exe
              Wow64 process (32bit):false
              Commandline:"C:\Users\user\Desktop\mG31YklE0k.exe"
              Imagebase:0x7ff792320000
              File size:432'128 bytes
              MD5 hash:8B6CAA03BD794CF1D3D61493383414F0
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Yara matches:
              • Rule: JoeSecurity_SuspiciousPDB, Description: Yara detected Suspicious PDB, Source: 00000000.00000002.2555584235.00007FF792321000.00000020.00000001.01000000.00000003.sdmp, Author: Joe Security
              • Rule: Windows_Trojan_MicroBackdoor_46f2e5fd, Description: unknown, Source: 00000000.00000002.2555584235.00007FF792321000.00000020.00000001.01000000.00000003.sdmp, Author: unknown
              • Rule: JoeSecurity_SuspiciousPDB, Description: Yara detected Suspicious PDB, Source: 00000000.00000000.1316395438.00007FF792321000.00000020.00000001.01000000.00000003.sdmp, Author: Joe Security
              • Rule: Windows_Trojan_MicroBackdoor_46f2e5fd, Description: unknown, Source: 00000000.00000000.1316395438.00007FF792321000.00000020.00000001.01000000.00000003.sdmp, Author: unknown
              Reputation:low
              Has exited:false

              Target ID:1
              Start time:10:41:29
              Start date:03/07/2024
              Path:C:\Windows\System32\conhost.exe
              Wow64 process (32bit):false
              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Imagebase:0x7ff70f010000
              File size:862'208 bytes
              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high
              Has exited:false

              Target ID:3
              Start time:10:41:30
              Start date:03/07/2024
              Path:C:\Windows\System32\cmd.exe
              Wow64 process (32bit):false
              Commandline:cmd.exe /C "chcp 65001 > NUL & wmic os get Name,OSArchitecture /format:rawxml"
              Imagebase:0x7ff66e910000
              File size:289'792 bytes
              MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high
              Has exited:true

              Target ID:4
              Start time:10:41:30
              Start date:03/07/2024
              Path:C:\Windows\System32\conhost.exe
              Wow64 process (32bit):false
              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Imagebase:0x7ff70f010000
              File size:862'208 bytes
              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high
              Has exited:true

              Target ID:5
              Start time:10:41:31
              Start date:03/07/2024
              Path:C:\Windows\System32\chcp.com
              Wow64 process (32bit):false
              Commandline:chcp 65001
              Imagebase:0x7ff73b3d0000
              File size:14'848 bytes
              MD5 hash:33395C4732A49065EA72590B14B64F32
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:moderate
              Has exited:true

              Target ID:6
              Start time:10:41:31
              Start date:03/07/2024
              Path:C:\Windows\System32\wbem\WMIC.exe
              Wow64 process (32bit):false
              Commandline:wmic os get Name,OSArchitecture /format:rawxml
              Imagebase:0x7ff798d30000
              File size:576'000 bytes
              MD5 hash:C37F2F4F4B3CD128BDABCAEB2266A785
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:moderate
              Has exited:true

              Target ID:7
              Start time:10:41:32
              Start date:03/07/2024
              Path:C:\Windows\System32\cmd.exe
              Wow64 process (32bit):false
              Commandline:cmd.exe /C "chcp 65001 > NUL & wmic cpu get Name /format:rawxml"
              Imagebase:0x7ff66e910000
              File size:289'792 bytes
              MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high
              Has exited:true

              Target ID:8
              Start time:10:41:32
              Start date:03/07/2024
              Path:C:\Windows\System32\conhost.exe
              Wow64 process (32bit):false
              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Imagebase:0x7ff70f010000
              File size:862'208 bytes
              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high
              Has exited:true

              Target ID:9
              Start time:10:41:32
              Start date:03/07/2024
              Path:C:\Windows\System32\chcp.com
              Wow64 process (32bit):false
              Commandline:chcp 65001
              Imagebase:0x7ff73b3d0000
              File size:14'848 bytes
              MD5 hash:33395C4732A49065EA72590B14B64F32
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:moderate
              Has exited:true

              Target ID:10
              Start time:10:41:32
              Start date:03/07/2024
              Path:C:\Windows\System32\wbem\WMIC.exe
              Wow64 process (32bit):false
              Commandline:wmic cpu get Name /format:rawxml
              Imagebase:0x7ff798d30000
              File size:576'000 bytes
              MD5 hash:C37F2F4F4B3CD128BDABCAEB2266A785
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:moderate
              Has exited:true

              Target ID:11
              Start time:10:41:33
              Start date:03/07/2024
              Path:C:\Windows\System32\cmd.exe
              Wow64 process (32bit):false
              Commandline:cmd.exe /C "chcp 65001 > NUL & wmic os get TotalVisibleMemorySize /format:rawxml"
              Imagebase:0x7ff66e910000
              File size:289'792 bytes
              MD5 hash:8A2122E8162DBEF04694B9C3E0B6CDEE
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high
              Has exited:true

              Target ID:12
              Start time:10:41:33
              Start date:03/07/2024
              Path:C:\Windows\System32\conhost.exe
              Wow64 process (32bit):false
              Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Imagebase:0x7ff70f010000
              File size:862'208 bytes
              MD5 hash:0D698AF330FD17BEE3BF90011D49251D
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:high
              Has exited:true

              Target ID:13
              Start time:10:41:33
              Start date:03/07/2024
              Path:C:\Windows\System32\chcp.com
              Wow64 process (32bit):false
              Commandline:chcp 65001
              Imagebase:0x7ff73b3d0000
              File size:14'848 bytes
              MD5 hash:33395C4732A49065EA72590B14B64F32
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:moderate
              Has exited:true

              Target ID:14
              Start time:10:41:33
              Start date:03/07/2024
              Path:C:\Windows\System32\wbem\WMIC.exe
              Wow64 process (32bit):false
              Commandline:wmic os get TotalVisibleMemorySize /format:rawxml
              Imagebase:0x7ff798d30000
              File size:576'000 bytes
              MD5 hash:C37F2F4F4B3CD128BDABCAEB2266A785
              Has elevated privileges:true
              Has administrator privileges:true
              Programmed in:C, C++ or other language
              Reputation:moderate
              Has exited:true

              Reset < >

                Execution Graph

                Execution Coverage:31.6%
                Dynamic/Decrypted Code Coverage:0%
                Signature Coverage:58.7%
                Total number of Nodes:673
                Total number of Limit Nodes:22
                execution_graph 1371 7ff792324be0 GetVersionExA 1372 7ff792324c51 1371->1372 1373 7ff792324c44 GetLastError 1371->1373 1374 7ff792324d4c 1372->1374 1376 7ff792324c65 GetCurrentProcess OpenProcessToken 1372->1376 1373->1374 1387 7ff792325fc0 1374->1387 1378 7ff792324c89 GetTokenInformation 1376->1378 1379 7ff792324d46 GetLastError 1376->1379 1377 7ff792324d5a 1380 7ff792324d2c GetLastError 1378->1380 1381 7ff792324cb5 GetLastError 1378->1381 1379->1374 1383 7ff792324d32 CloseHandle 1380->1383 1381->1380 1382 7ff792324cc0 LocalAlloc 1381->1382 1382->1380 1384 7ff792324cd4 GetTokenInformation 1382->1384 1383->1374 1385 7ff792324cf7 GetSidSubAuthorityCount GetSidSubAuthority LocalFree 1384->1385 1386 7ff792324d1b GetLastError LocalFree 1384->1386 1385->1383 1386->1383 1388 7ff792325fc9 1387->1388 1389 7ff792325fd4 1388->1389 1390 7ff792326288 IsProcessorFeaturePresent 1388->1390 1389->1377 1391 7ff7923262a0 1390->1391 1394 7ff79232635c RtlCaptureContext 1391->1394 1393 7ff7923262b3 1393->1377 1395 7ff792326376 RtlLookupFunctionEntry 1394->1395 1396 7ff79232638c capture_previous_context 1395->1396 1397 7ff7923263c5 1395->1397 1396->1395 1396->1397 1397->1393 1921 7ff792322620 1922 7ff792322946 1921->1922 1923 7ff792322651 LocalAlloc 1921->1923 1924 7ff792325fc0 3 API calls 1922->1924 1925 7ff79232267b MultiByteToWideChar 1923->1925 1926 7ff792322670 GetLastError 1923->1926 1929 7ff79232295e 1924->1929 1927 7ff7923226b8 LocalAlloc 1925->1927 1928 7ff7923226ad GetLastError 1925->1928 1926->1922 1931 7ff7923226eb 1927->1931 1932 7ff7923226e0 GetLastError 1927->1932 1930 7ff792322938 LocalFree 1928->1930 1930->1922 1934 7ff7923226fd MultiByteToWideChar CreateFileW 1931->1934 1933 7ff79232292e 1932->1933 1933->1930 1935 7ff7923227c3 GetFileSize 1934->1935 1936 7ff792322756 1934->1936 1938 7ff792322810 send 1935->1938 1939 7ff7923227ed 1935->1939 1937 7ff792322780 send 1936->1937 1943 7ff7923227b0 1936->1943 1937->1936 1941 7ff7923227b8 WSAGetLastError 1937->1941 1938->1939 1940 7ff792322911 WSAGetLastError 1938->1940 1939->1938 1949 7ff792322844 1939->1949 1942 7ff792322917 CloseHandle 1940->1942 1944 7ff792322920 LocalFree 1941->1944 1942->1944 1943->1944 1944->1933 1945 7ff792322852 ReadFile 1947 7ff7923228ff GetLastError 1945->1947 1945->1949 1946 7ff792322905 1946->1942 1947->1946 1948 7ff7923228c0 send 1948->1949 1950 7ff7923228f5 WSAGetLastError 1948->1950 1949->1945 1949->1946 1949->1948 1950->1946 1951 7ff792325fe0 1952 7ff792325ff0 1951->1952 1962 7ff792326458 1952->1962 1954 7ff792326740 6 API calls 1955 7ff792326095 1954->1955 1956 7ff792326014 _RTC_Initialize 1957 7ff792326062 _configthreadlocale 1956->1957 1959 7ff792326077 1956->1959 1958 7ff79232606e __scrt_initialize_crt 1957->1958 1958->1959 1960 7ff792326072 _initialize_narrow_environment 1958->1960 1959->1954 1961 7ff792326085 1959->1961 1960->1959 1963 7ff792326469 1962->1963 1964 7ff79232649b 1962->1964 1965 7ff7923264d8 1963->1965 1968 7ff79232646e __scrt_release_startup_lock 1963->1968 1964->1956 1966 7ff792326740 6 API calls 1965->1966 1967 7ff7923264e2 1966->1967 1968->1964 1969 7ff79232648b _initialize_onexit_table 1968->1969 1969->1964 2075 7ff792326240 2078 7ff792326620 2075->2078 2079 7ff792326249 2078->2079 2080 7ff792326643 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 2078->2080 2080->2079 2081 7ff792324040 GetCurrentProcessId GetCurrentProcessId GetCurrentThreadId 2082 7ff792324068 2081->2082 2083 7ff792324073 ExitProcess 2081->2083 2084 7ff792322300 2085 7ff792322ca0 17 API calls 2084->2085 2086 7ff792322309 2085->2086 1416 7ff7923260c4 1417 7ff7923260dd __scrt_initialize_crt 1416->1417 1418 7ff79232621b 1417->1418 1419 7ff7923260e5 __scrt_acquire_startup_lock 1417->1419 1440 7ff792326740 IsProcessorFeaturePresent 1418->1440 1421 7ff792326225 1419->1421 1425 7ff792326103 __scrt_release_startup_lock 1419->1425 1422 7ff792326740 6 API calls 1421->1422 1423 7ff792326230 1422->1423 1424 7ff792326238 _exit 1423->1424 1426 7ff7923261ae _get_initial_narrow_environment __p___argv __p___argc 1425->1426 1429 7ff7923261a6 _register_thread_local_exe_atexit_callback 1425->1429 1432 7ff792326128 1425->1432 1433 7ff792324080 GetModuleHandleA GetModuleFileNameA StrStrA 1426->1433 1428 7ff7923261d0 __scrt_is_managed_app 1428->1423 1430 7ff7923261db 1428->1430 1429->1426 1431 7ff7923261e0 _cexit 1430->1431 1430->1432 1431->1432 1434 7ff7923240c7 1433->1434 1435 7ff792324116 1433->1435 1436 7ff7923240ce CreateThread 1434->1436 1437 7ff792324105 1434->1437 1435->1428 1436->1435 1438 7ff7923240ee CloseHandle 1436->1438 1446 7ff792322f00 CreateMutexA 1437->1446 1438->1428 1441 7ff792326766 1440->1441 1442 7ff792326785 RtlCaptureContext RtlLookupFunctionEntry 1441->1442 1443 7ff7923267ae capture_previous_context 1442->1443 1444 7ff79232681c IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 1443->1444 1445 7ff79232686e 1444->1445 1445->1421 1447 7ff792322f47 GetCommandLineA SetUnhandledExceptionFilter GetCurrentProcessId lstrlenA 1446->1447 1448 7ff792322f36 GetLastError 1446->1448 1449 7ff792323210 1447->1449 1450 7ff792322f75 lstrlenA 1447->1450 1448->1447 1448->1449 1452 7ff792325fc0 3 API calls 1449->1452 1450->1449 1451 7ff792322f8a 1450->1451 1451->1449 1487 7ff792323250 1451->1487 1453 7ff792323220 1452->1453 1453->1435 1456 7ff792322fe2 WSAStartup 1458 7ff792323014 lstrlenA 1456->1458 1459 7ff792322ff6 WSAGetLastError 1456->1459 1457 7ff792322fc4 GetLastError 1460 7ff792325fc0 3 API calls 1457->1460 1511 7ff792324130 1458->1511 1462 7ff792325fc0 3 API calls 1459->1462 1461 7ff792322fda 1460->1461 1461->1435 1464 7ff79232300c 1462->1464 1464->1435 1467 7ff792323063 1468 7ff792323070 gethostbyname 1467->1468 1470 7ff7923230da htons inet_ntoa 1467->1470 1473 7ff7923231a6 Sleep 1467->1473 1474 7ff792323119 socket 1467->1474 1477 7ff79232315e GetTickCount 1467->1477 1480 7ff79232319d closesocket 1467->1480 1482 7ff7923231cc 1467->1482 1485 7ff792323189 closesocket 1467->1485 1551 7ff792323490 CryptHashCertificate 1467->1551 1468->1467 1469 7ff792323089 inet_addr 1468->1469 1469->1470 1471 7ff79232309d Sleep 1469->1471 1526 7ff792323990 1470->1526 1471->1468 1473->1468 1475 7ff792323134 connect 1474->1475 1476 7ff7923231b6 WSAGetLastError Sleep 1474->1476 1475->1467 1478 7ff792323197 WSAGetLastError 1475->1478 1476->1468 1573 7ff7923236f0 LocalAlloc 1477->1573 1478->1480 1480->1473 1483 7ff7923231e8 closesocket 1482->1483 1484 7ff7923231f1 1482->1484 1483->1484 1484->1449 1486 7ff79232320a CloseHandle 1484->1486 1485->1468 1486->1449 1488 7ff79232328a GetModuleHandleA GetProcAddress 1487->1488 1505 7ff792323435 1487->1505 1489 7ff7923232d6 RegOpenKeyExA 1488->1489 1490 7ff7923232b6 GetCurrentProcess 1488->1490 1492 7ff792323302 RegQueryValueExA 1489->1492 1489->1505 1494 7ff7923232ca 1490->1494 1491 7ff792325fc0 3 API calls 1493 7ff792322fa9 GetVersionExA 1491->1493 1495 7ff792323451 RegCloseKey 1492->1495 1496 7ff792323343 1492->1496 1493->1456 1493->1457 1494->1489 1495->1505 1496->1495 1497 7ff792323358 RegCloseKey GetComputerNameW 1496->1497 1498 7ff79232338a 1497->1498 1499 7ff79232337f GetLastError 1497->1499 1590 7ff792324530 CryptAcquireContextA 1498->1590 1499->1505 1501 7ff7923233ae 1502 7ff7923233b6 lstrlenA 1501->1502 1501->1505 1596 7ff7923245c0 CryptHashData 1502->1596 1505->1491 1512 7ff79232415f 1511->1512 1513 7ff792324162 CryptQueryObject 1511->1513 1512->1513 1514 7ff7923241ba 1513->1514 1515 7ff792324362 GetLastError 1513->1515 1516 7ff79232432e 1514->1516 1517 7ff7923241c8 CertGetNameStringW CertNameToStrW CertNameToStrW CryptHashCertificate 1514->1517 1515->1516 1521 7ff792325fc0 3 API calls 1516->1521 1518 7ff7923242da 1517->1518 1519 7ff79232434f GetLastError CertFreeCertificateContext 1517->1519 1520 7ff7923242f0 wsprintfA 1518->1520 1519->1516 1520->1520 1523 7ff792324319 1520->1523 1522 7ff792323036 1521->1522 1522->1449 1525 7ff792325350 InitializeCriticalSection 1522->1525 1523->1516 1524 7ff79232433d CertFreeCertificateContext 1523->1524 1524->1516 1525->1467 1597 7ff792325370 1526->1597 1528 7ff7923239d2 1604 7ff792324ed0 RegOpenKeyA 1528->1604 1531 7ff792323c46 1532 7ff792325fc0 3 API calls 1531->1532 1533 7ff792323c5c 1532->1533 1533->1467 1535 7ff792323a2b CryptHashCertificate 1536 7ff792323c24 GetLastError 1535->1536 1547 7ff7923239f3 1535->1547 1538 7ff792323c2a closesocket 1536->1538 1538->1547 1540 7ff792323abb LocalAlloc 1540->1536 1540->1547 1542 7ff792323b2b LocalFree 1542->1538 1542->1547 1545 7ff792323b60 recv 1546 7ff792323c1c WSAGetLastError 1545->1546 1545->1547 1546->1538 1547->1531 1547->1535 1547->1538 1547->1540 1547->1542 1547->1545 1548 7ff792323bd7 1547->1548 1623 7ff792324d70 1547->1623 1641 7ff792324920 CryptAcquireContextA 1547->1641 1651 7ff792324780 lstrcmpA 1547->1651 1669 7ff7923245d0 lstrcmpA 1547->1669 1688 7ff792323e40 1547->1688 1693 7ff7923243c0 CryptAcquireContextA 1547->1693 1549 7ff792325370 3 API calls 1548->1549 1550 7ff792323c17 1549->1550 1550->1531 1552 7ff7923236b8 GetLastError 1551->1552 1553 7ff792323517 1551->1553 1572 7ff792323633 1552->1572 1554 7ff792324920 10 API calls 1553->1554 1555 7ff792323526 1554->1555 1557 7ff792324780 18 API calls 1555->1557 1555->1572 1556 7ff792325fc0 3 API calls 1558 7ff7923236d0 1556->1558 1559 7ff79232353a 1557->1559 1558->1467 1560 7ff792323544 LocalAlloc 1559->1560 1559->1572 1560->1552 1561 7ff79232355d 1560->1561 1562 7ff7923245d0 19 API calls 1561->1562 1563 7ff7923235a9 1562->1563 1564 7ff7923235be LocalFree 1563->1564 1565 7ff792323e40 2 API calls 1563->1565 1566 7ff7923235d8 1564->1566 1564->1572 1567 7ff7923235bb 1565->1567 1568 7ff7923243c0 12 API calls 1566->1568 1567->1564 1570 7ff7923235ef 1568->1570 1569 7ff792323600 recv 1569->1570 1571 7ff7923236b0 WSAGetLastError 1569->1571 1570->1569 1570->1572 1571->1572 1572->1556 1580 7ff792323728 1573->1580 1588 7ff792323730 1573->1588 1574 7ff792325fc0 3 API calls 1575 7ff79232397f 1574->1575 1575->1467 1576 7ff79232378a select 1578 7ff792323934 WSAGetLastError 1576->1578 1576->1588 1577 7ff7923237df recv 1577->1578 1577->1588 1578->1580 1579 7ff7923237ce __WSAFDIsSet 1579->1577 1579->1588 1580->1574 1581 7ff792323890 GetTickCount 1825 7ff792323d20 1581->1825 1583 7ff79232385b lstrlenA 1583->1588 1584 7ff7923238e0 lstrcmpA 1584->1588 1585 7ff792323d20 10 API calls 1585->1588 1586 7ff792323879 lstrlenA 1586->1588 1587 7ff792325d50 2 API calls 1587->1588 1588->1576 1588->1577 1588->1579 1588->1580 1588->1581 1588->1583 1588->1584 1588->1585 1588->1586 1588->1587 1838 7ff792321b50 1588->1838 1591 7ff79232459d GetLastError 1590->1591 1592 7ff79232455d CryptCreateHash 1590->1592 1595 7ff7923245a3 1591->1595 1593 7ff79232458a GetLastError CryptReleaseContext 1592->1593 1594 7ff79232457a 1592->1594 1593->1595 1594->1501 1595->1501 1598 7ff7923253d8 EnterCriticalSection 1597->1598 1599 7ff79232537e 1597->1599 1601 7ff7923253ef LeaveCriticalSection 1598->1601 1599->1598 1600 7ff792325385 1599->1600 1602 7ff79232539c EnterCriticalSection 1600->1602 1603 7ff792325394 1600->1603 1601->1528 1602->1601 1603->1528 1605 7ff79232505a 1604->1605 1606 7ff792324f12 RegEnumKeyA 1604->1606 1607 7ff792325fc0 3 API calls 1605->1607 1608 7ff792325047 RegCloseKey 1606->1608 1609 7ff792324f3c 1606->1609 1610 7ff7923239dc 1607->1610 1608->1605 1611 7ff792324f44 wsprintfA RegOpenKeyA 1609->1611 1610->1531 1610->1547 1612 7ff792324f7e RegQueryValueExA 1611->1612 1613 7ff79232501d RegEnumKeyA 1611->1613 1614 7ff792324fad 1612->1614 1615 7ff792325012 RegCloseKey 1612->1615 1613->1611 1616 7ff79232503f 1613->1616 1614->1615 1617 7ff792324fb6 LocalAlloc 1614->1617 1615->1613 1616->1608 1618 7ff79232500c GetLastError 1617->1618 1619 7ff792324fcb RegQueryValueExA 1617->1619 1618->1615 1620 7ff792325001 LocalFree 1619->1620 1621 7ff792324ff6 1619->1621 1620->1615 1703 7ff792325080 1621->1703 1624 7ff792324de6 1623->1624 1625 7ff792324d95 EnterCriticalSection LeaveCriticalSection 1623->1625 1626 7ff792324df7 1624->1626 1627 7ff792324e40 socket 1624->1627 1625->1624 1630 7ff792324dfd 1626->1630 1631 7ff792324e30 1626->1631 1628 7ff792324e5d htons connect 1627->1628 1629 7ff792324ea0 WSAGetLastError 1627->1629 1635 7ff792324e1b 1628->1635 1636 7ff792324e8f WSAGetLastError closesocket 1628->1636 1629->1635 1632 7ff792324e20 1630->1632 1633 7ff792324e03 1630->1633 1766 7ff792325430 1631->1766 1750 7ff7923257e0 1632->1750 1633->1635 1730 7ff792325950 1633->1730 1638 7ff792325fc0 3 API calls 1635->1638 1636->1635 1640 7ff792324ec2 1638->1640 1640->1547 1642 7ff792324968 GetLastError 1641->1642 1643 7ff79232499f CryptGenRandom 1641->1643 1644 7ff792324997 GetLastError 1642->1644 1645 7ff792324975 CryptAcquireContextA 1642->1645 1646 7ff7923249bb CryptReleaseContext 1643->1646 1647 7ff7923249b5 GetLastError 1643->1647 1648 7ff7923249c8 1644->1648 1645->1643 1645->1644 1646->1648 1647->1646 1649 7ff792325fc0 3 API calls 1648->1649 1650 7ff7923249d7 1649->1650 1650->1547 1652 7ff7923247b9 CryptAcquireContextA 1651->1652 1653 7ff7923248fb 1651->1653 1654 7ff792324807 CryptImportPublicKeyInfo 1652->1654 1655 7ff7923247e0 CryptAcquireContextA 1652->1655 1657 7ff792325fc0 3 API calls 1653->1657 1658 7ff7923248e8 GetLastError 1654->1658 1659 7ff792324831 CryptExportKey 1654->1659 1655->1654 1656 7ff7923247fc GetLastError 1655->1656 1656->1653 1660 7ff79232490a 1657->1660 1663 7ff7923248ee CryptReleaseContext 1658->1663 1661 7ff79232485c LocalAlloc 1659->1661 1662 7ff7923248d5 GetLastError CryptDestroyKey 1659->1662 1660->1547 1661->1662 1664 7ff792324873 CryptExportKey 1661->1664 1662->1663 1663->1653 1665 7ff7923248b9 GetLastError 1664->1665 1667 7ff79232489a 1664->1667 1666 7ff7923248bf LocalFree CryptDestroyKey 1665->1666 1666->1663 1667->1666 1668 7ff7923248b1 1667->1668 1668->1653 1670 7ff79232461a 1669->1670 1671 7ff792324621 CryptAcquireContextA 1669->1671 1674 7ff792325fc0 3 API calls 1670->1674 1672 7ff79232466a CryptImportPublicKeyInfo 1671->1672 1673 7ff792324643 CryptAcquireContextA 1671->1673 1676 7ff792324750 GetLastError 1672->1676 1677 7ff792324694 LocalAlloc 1672->1677 1673->1672 1675 7ff79232465f GetLastError 1673->1675 1679 7ff792324772 1674->1679 1675->1670 1678 7ff792324756 CryptReleaseContext 1676->1678 1680 7ff79232473d GetLastError CryptDestroyKey 1677->1680 1681 7ff7923246ae 1677->1681 1678->1670 1679->1547 1680->1678 1682 7ff7923246be CryptEncrypt 1681->1682 1683 7ff7923246ec 1682->1683 1684 7ff792324721 GetLastError 1682->1684 1685 7ff792324727 LocalFree CryptDestroyKey 1683->1685 1686 7ff7923246f4 1683->1686 1684->1685 1685->1678 1686->1686 1687 7ff79232470b LocalFree CryptDestroyKey 1686->1687 1687->1678 1689 7ff792323e67 1688->1689 1690 7ff792323ea6 1689->1690 1691 7ff792323e80 send 1689->1691 1690->1547 1691->1689 1692 7ff792323ec0 WSAGetLastError 1691->1692 1692->1690 1694 7ff7923244ad GetLastError 1693->1694 1695 7ff792324413 CryptCreateHash 1693->1695 1698 7ff7923244b3 1694->1698 1696 7ff792324437 GetLastError CryptReleaseContext 1695->1696 1697 7ff79232444c CryptHashData 1695->1697 1696->1698 1699 7ff792324490 CryptDestroyHash CryptReleaseContext 1697->1699 1700 7ff792324464 CryptGetHashParam 1697->1700 1701 7ff792325fc0 3 API calls 1698->1701 1699->1698 1700->1699 1702 7ff7923244c2 1701->1702 1702->1547 1724 7ff792325d50 1703->1724 1705 7ff792325321 1706 7ff792325fc0 3 API calls 1705->1706 1707 7ff79232533d 1706->1707 1707->1620 1708 7ff792325301 LocalFree 1709 7ff792325d50 2 API calls 1708->1709 1716 7ff7923250ba 1709->1716 1710 7ff792325de0 lstrlenA LocalAlloc 1710->1716 1711 7ff7923252ec LocalFree 1711->1716 1712 7ff7923252fb LocalFree 1712->1708 1713 7ff792325140 lstrcmpA 1714 7ff79232515b lstrcmpA 1713->1714 1713->1716 1714->1716 1715 7ff792325d50 lstrlenA lstrlenA 1715->1716 1716->1705 1716->1708 1716->1710 1716->1711 1716->1712 1716->1713 1716->1715 1717 7ff7923252ce LocalFree 1716->1717 1718 7ff7923252dd LocalFree 1716->1718 1719 7ff7923251cb StrToIntExA 1716->1719 1721 7ff792325243 lstrcpynA 1716->1721 1722 7ff79232522a lstrcmpA 1716->1722 1723 7ff792325278 lstrcpynA 1716->1723 1717->1716 1718->1716 1719->1716 1720 7ff7923252bf GetLastError 1719->1720 1720->1716 1721->1716 1722->1716 1723->1716 1725 7ff792325d71 1724->1725 1726 7ff792325d84 lstrlenA 1724->1726 1725->1716 1727 7ff792325dbe 1726->1727 1728 7ff792325d95 1726->1728 1727->1716 1729 7ff792325da0 lstrlenA 1728->1729 1729->1727 1729->1729 1802 7ff792323fb0 gethostbyname 1730->1802 1732 7ff79232597d 1733 7ff792325990 socket 1732->1733 1734 7ff792325984 1732->1734 1735 7ff7923259ca htons connect 1733->1735 1736 7ff7923259bf WSAGetLastError 1733->1736 1739 7ff792325fc0 3 API calls 1734->1739 1737 7ff792325acf WSAGetLastError 1735->1737 1738 7ff7923259ff 1735->1738 1736->1734 1740 7ff792325ad5 closesocket 1737->1740 1742 7ff792325a11 send 1738->1742 1741 7ff792325b05 1739->1741 1740->1734 1741->1635 1742->1737 1743 7ff792325a36 1742->1743 1809 7ff792325b20 select 1743->1809 1746 7ff792325a60 htons send 1746->1737 1747 7ff792325a95 1746->1747 1748 7ff792325b20 8 API calls 1747->1748 1749 7ff792325aa8 1748->1749 1749->1734 1749->1740 1751 7ff792323fb0 5 API calls 1750->1751 1752 7ff79232580d 1751->1752 1753 7ff792325820 socket 1752->1753 1757 7ff792325814 1752->1757 1754 7ff79232585a htons connect 1753->1754 1755 7ff79232584f WSAGetLastError 1753->1755 1758 7ff79232588b 1754->1758 1759 7ff792325904 WSAGetLastError 1754->1759 1755->1757 1756 7ff792325fc0 3 API calls 1760 7ff79232593a 1756->1760 1757->1756 1762 7ff79232589d htons send 1758->1762 1761 7ff79232590a closesocket 1759->1761 1760->1635 1761->1757 1762->1759 1763 7ff7923258d1 1762->1763 1764 7ff792325b20 8 API calls 1763->1764 1765 7ff7923258e4 1764->1765 1765->1757 1765->1761 1767 7ff792323fb0 5 API calls 1766->1767 1768 7ff792325467 1767->1768 1769 7ff79232547a socket 1768->1769 1772 7ff79232546e 1768->1772 1770 7ff7923254a9 WSAGetLastError 1769->1770 1771 7ff7923254b4 htons connect 1769->1771 1770->1772 1773 7ff792325797 WSAGetLastError 1771->1773 1774 7ff7923254e9 inet_ntoa wsprintfA lstrlenA send 1771->1774 1775 7ff792325fc0 3 API calls 1772->1775 1776 7ff79232579d closesocket 1773->1776 1774->1773 1788 7ff792325538 1774->1788 1777 7ff7923257cc 1775->1777 1776->1772 1777->1635 1778 7ff792325550 select 1779 7ff79232576c WSAGetLastError 1778->1779 1778->1788 1780 7ff792325772 1779->1780 1782 7ff792325777 LocalFree 1780->1782 1783 7ff792325780 1780->1783 1781 7ff7923256a2 StrCmpNA 1784 7ff7923256e4 1781->1784 1785 7ff7923256c4 StrCmpNA 1781->1785 1782->1783 1783->1772 1783->1776 1819 7ff792325de0 1784->1819 1785->1778 1785->1784 1787 7ff7923255c2 __WSAFDIsSet 1787->1788 1788->1778 1788->1780 1788->1781 1788->1787 1790 7ff7923255ed recv 1788->1790 1794 7ff79232562c LocalAlloc 1788->1794 1801 7ff79232566e LocalFree 1788->1801 1789 7ff7923256fb 1789->1780 1791 7ff792325d50 2 API calls 1789->1791 1790->1779 1790->1788 1792 7ff79232570b 1791->1792 1793 7ff792325757 LocalFree 1792->1793 1795 7ff792325de0 2 API calls 1792->1795 1793->1780 1794->1788 1796 7ff792325764 GetLastError 1794->1796 1797 7ff79232572c 1795->1797 1796->1780 1797->1793 1798 7ff792325730 StrToIntExA 1797->1798 1799 7ff79232574c LocalFree 1798->1799 1800 7ff792325746 GetLastError 1798->1800 1799->1793 1800->1799 1801->1788 1803 7ff792323fde inet_addr 1802->1803 1804 7ff792324006 1802->1804 1805 7ff792325fc0 3 API calls 1803->1805 1807 7ff792325fc0 3 API calls 1804->1807 1806 7ff792324000 1805->1806 1806->1732 1808 7ff79232403a 1807->1808 1808->1732 1810 7ff792325b9d 1809->1810 1811 7ff792325bf0 WSAGetLastError 1809->1811 1812 7ff792325bea 1810->1812 1813 7ff792325ba1 __WSAFDIsSet 1810->1813 1811->1812 1816 7ff792325fc0 3 API calls 1812->1816 1813->1812 1814 7ff792325bb2 __WSAFDIsSet 1813->1814 1814->1812 1815 7ff792325bc6 1814->1815 1818 7ff792325bd3 recv 1815->1818 1817 7ff792325a49 1816->1817 1817->1740 1817->1746 1818->1811 1818->1812 1820 7ff792325e15 1819->1820 1824 7ff792325e5d 1819->1824 1821 7ff792325e1e lstrlenA 1820->1821 1820->1824 1822 7ff792325e34 1821->1822 1821->1824 1823 7ff792325e62 LocalAlloc 1822->1823 1822->1824 1823->1824 1824->1789 1826 7ff792323d5c LoadLibraryA 1825->1826 1827 7ff792323d46 1825->1827 1828 7ff792323e36 1826->1828 1829 7ff792323d75 GetProcAddress 1826->1829 1827->1826 1830 7ff792323dd6 LocalAlloc 1827->1830 1828->1588 1829->1828 1831 7ff792323d95 GetProcAddress 1829->1831 1830->1828 1835 7ff792323df9 vsprintf lstrlenA 1830->1835 1831->1828 1832 7ff792323db5 GetProcAddress 1831->1832 1832->1828 1833 7ff792323dd1 1832->1833 1833->1830 1836 7ff792323e40 2 API calls 1835->1836 1837 7ff792323e21 LocalFree 1836->1837 1837->1588 1839 7ff792321bc8 LocalAlloc 1838->1839 1890 7ff792322057 1838->1890 1842 7ff792321be9 CreatePipe 1839->1842 1843 7ff792321bde GetLastError 1839->1843 1840 7ff79232206a CloseHandle 1841 7ff792322070 1840->1841 1846 7ff792322079 CloseHandle 1841->1846 1847 7ff79232207f 1841->1847 1844 7ff792321c0e CreatePipe 1842->1844 1845 7ff792321c03 GetLastError 1842->1845 1843->1890 1848 7ff792321c29 GetLastError 1844->1848 1849 7ff792321c34 GetStartupInfoW 1844->1849 1845->1890 1846->1847 1850 7ff792322089 CloseHandle 1847->1850 1851 7ff79232208f 1847->1851 1848->1890 1852 7ff792321c89 MultiByteToWideChar 1849->1852 1853 7ff792321c79 1849->1853 1850->1851 1854 7ff792322099 CloseHandle 1851->1854 1855 7ff79232209f 1851->1855 1856 7ff792321cbe GetLastError 1852->1856 1857 7ff792321cd1 LocalAlloc 1852->1857 1853->1852 1854->1855 1858 7ff7923220a8 CloseHandle 1855->1858 1859 7ff7923220ae 1855->1859 1856->1890 1860 7ff792321d0d 1857->1860 1861 7ff792321cf4 GetLastError 1857->1861 1858->1859 1862 7ff7923220b8 CloseHandle 1859->1862 1863 7ff7923220be 1859->1863 1866 7ff792321d1d MultiByteToWideChar LocalAlloc 1860->1866 1861->1890 1862->1863 1864 7ff7923220cc 1863->1864 1865 7ff7923220c3 LocalFree 1863->1865 1867 7ff7923220da 1864->1867 1868 7ff7923220d1 LocalFree 1864->1868 1865->1864 1871 7ff792321d5c GetLastError 1866->1871 1872 7ff792321d70 wsprintfW CreateProcessW 1866->1872 1869 7ff7923220e8 1867->1869 1870 7ff7923220df LocalFree 1867->1870 1868->1867 1875 7ff792323d20 10 API calls 1869->1875 1870->1869 1871->1890 1873 7ff792321deb 1872->1873 1874 7ff792321ddb GetLastError 1872->1874 1876 7ff792321e10 1873->1876 1877 7ff792321def FreeConsole AllocConsole 1873->1877 1874->1890 1878 7ff7923220fb 1875->1878 1881 7ff792321e14 GetTickCount PeekNamedPipe 1876->1881 1877->1876 1879 7ff792321dff GetConsoleCP FreeConsole 1877->1879 1880 7ff792325fc0 3 API calls 1878->1880 1879->1881 1882 7ff79232210f 1880->1882 1883 7ff792321ff6 GetLastError 1881->1883 1894 7ff792321e4b 1881->1894 1882->1588 1884 7ff792322026 GetExitCodeProcess 1883->1884 1887 7ff792322038 1884->1887 1888 7ff792322051 GetLastError 1884->1888 1885 7ff792321e9a ReadFile 1889 7ff792322017 GetLastError 1885->1889 1885->1894 1886 7ff792321e59 GetExitCodeProcess 1886->1889 1886->1894 1887->1890 1891 7ff792322041 TerminateProcess 1887->1891 1888->1890 1892 7ff79232201d 1889->1892 1890->1840 1890->1841 1891->1888 1891->1890 1892->1884 1893 7ff792321e7c GetTickCount 1897 7ff792321e8f SwitchToThread 1893->1897 1898 7ff792322003 1893->1898 1894->1885 1894->1886 1894->1892 1894->1893 1895 7ff792321fc3 PeekNamedPipe 1894->1895 1899 7ff792321ed9 MultiByteToWideChar 1894->1899 1906 7ff792321f70 1894->1906 1895->1894 1896 7ff792321ff2 1895->1896 1896->1883 1897->1895 1902 7ff792323d20 10 API calls 1898->1902 1900 7ff792321ef9 LocalAlloc 1899->1900 1901 7ff792321f5e GetLastError 1899->1901 1900->1901 1903 7ff792321f18 1900->1903 1905 7ff792321fbb GetTickCount 1901->1905 1904 7ff792322015 1902->1904 1908 7ff792321f25 MultiByteToWideChar 1903->1908 1904->1892 1905->1895 1906->1905 1907 7ff792321f90 send 1906->1907 1907->1906 1909 7ff792322143 WSAGetLastError 1907->1909 1914 7ff792323ed0 WideCharToMultiByte 1908->1914 1909->1884 1912 7ff79232212a LocalFree 1912->1884 1913 7ff792321f56 LocalFree 1913->1905 1915 7ff792321f4b 1914->1915 1916 7ff792323f1c LocalAlloc 1914->1916 1915->1912 1915->1913 1917 7ff792323f9f GetLastError 1916->1917 1918 7ff792323f35 WideCharToMultiByte 1916->1918 1917->1915 1919 7ff792323e40 2 API calls 1918->1919 1920 7ff792323f77 LocalFree 1919->1920 1920->1915 1366 7ff7923260a8 1367 7ff7923268e8 1366->1367 1368 7ff7923260b1 SetUnhandledExceptionFilter 1367->1368 1369 7ff792326bf8 _set_new_mode 1368->1369 1370 7ff79232b3d0 1369->1370 1398 7ff7923249f0 GetVersionExA 1399 7ff792324a59 GetLastError 1398->1399 1400 7ff792324a66 1398->1400 1401 7ff792324bbf 1399->1401 1402 7ff792324bb9 IsUserAnAdmin 1400->1402 1404 7ff792324a7c GetCurrentProcess OpenProcessToken 1400->1404 1403 7ff792325fc0 3 API calls 1401->1403 1402->1401 1407 7ff792324bcb 1403->1407 1405 7ff792324baf GetLastError 1404->1405 1406 7ff792324aa2 GetTokenInformation 1404->1406 1405->1401 1408 7ff792324ace GetLastError CloseHandle 1406->1408 1409 7ff792324ae6 1406->1409 1408->1401 1410 7ff792324b98 IsUserAnAdmin CloseHandle 1409->1410 1411 7ff792324af1 GetTokenInformation 1409->1411 1410->1401 1411->1408 1412 7ff792324b1e CreateWellKnownSid 1411->1412 1413 7ff792324b78 GetLastError CloseHandle CloseHandle 1412->1413 1414 7ff792324b3e CheckTokenMembership 1412->1414 1413->1401 1414->1413 1415 7ff792324b5a CloseHandle CloseHandle 1414->1415 1415->1401 1970 7ff792322970 1971 7ff79232299e LocalAlloc 1970->1971 1978 7ff792322c75 1970->1978 1973 7ff7923229b9 GetLastError 1971->1973 1974 7ff7923229c4 MultiByteToWideChar 1971->1974 1972 7ff792325fc0 3 API calls 1977 7ff792322c89 1972->1977 1973->1978 1975 7ff7923229f8 GetLastError 1974->1975 1976 7ff792322a03 LocalAlloc 1974->1976 1979 7ff792322c5f LocalFree 1975->1979 1980 7ff792322a37 1976->1980 1981 7ff792322a2c GetLastError 1976->1981 1978->1972 1979->1978 1983 7ff792322a44 MultiByteToWideChar CreateFileW 1980->1983 1982 7ff792322c55 1981->1982 1982->1979 1984 7ff792322af7 1983->1984 1985 7ff792322a9a 1983->1985 1987 7ff792322b20 send 1984->1987 1989 7ff792322b4f 1984->1989 1986 7ff792322ac0 send 1985->1986 1991 7ff792322aef 1985->1991 1986->1985 1988 7ff792322c46 WSAGetLastError 1986->1988 1987->1984 1987->1988 1990 7ff792322c4c LocalFree 1988->1990 1992 7ff792322b60 recv 1989->1992 1998 7ff792322b93 1989->1998 1990->1982 1991->1990 1992->1989 1993 7ff792322c35 WSAGetLastError 1992->1993 1994 7ff792322c3b CloseHandle 1993->1994 1994->1990 1995 7ff792322c15 1995->1994 1996 7ff792322c27 CloseHandle 1995->1996 1996->1990 1998->1995 1999 7ff792322be3 WriteFile 1998->1999 2001 7ff792323c80 1998->2001 1999->1998 2000 7ff792322c17 GetLastError 1999->2000 2000->1995 2002 7ff792323cd6 2001->2002 2005 7ff792323ca4 2001->2005 2002->1998 2003 7ff792323cb0 recv 2004 7ff792323d0b WSAGetLastError 2003->2004 2003->2005 2004->2002 2005->2002 2005->2003 2006 7ff792322170 2007 7ff79232219a 2006->2007 2008 7ff7923221a2 2006->2008 2010 7ff792325fc0 3 API calls 2007->2010 2023 7ff792322ca0 GetCommandLineA 2008->2023 2012 7ff7923222e7 2010->2012 2013 7ff7923221cb GetStartupInfoA CreateProcessA 2015 7ff79232229b GetLastError 2013->2015 2016 7ff792322233 WaitForSingleObject 2013->2016 2014 7ff7923221be CloseHandle 2014->2013 2019 7ff7923222a1 CreateMutexA 2015->2019 2017 7ff792322257 TerminateProcess 2016->2017 2018 7ff792322263 GetExitCodeProcess 2016->2018 2020 7ff792322278 CloseHandle CloseHandle 2017->2020 2018->2020 2021 7ff792322272 GetLastError 2018->2021 2019->2007 2022 7ff7923222be GetLastError 2019->2022 2020->2007 2020->2019 2021->2020 2022->2007 2024 7ff792322cdc RegOpenKeyExA 2023->2024 2025 7ff792322ed3 2023->2025 2026 7ff792322d28 LocalAlloc 2024->2026 2027 7ff792322d07 RegOpenKeyA 2024->2027 2028 7ff792325fc0 3 API calls 2025->2028 2029 7ff792322ebc RegCloseKey 2026->2029 2030 7ff792322d4c RegEnumValueA 2026->2030 2027->2025 2027->2026 2031 7ff7923221a7 closesocket 2028->2031 2029->2025 2032 7ff792322da9 2030->2032 2033 7ff792322eab LocalFree 2030->2033 2031->2013 2031->2014 2034 7ff792322dcb lstrcmpA 2032->2034 2035 7ff792322e54 RegEnumValueA 2032->2035 2033->2029 2034->2035 2036 7ff792322ddb RegDeleteValueA RegOpenKeyExA 2034->2036 2035->2032 2037 7ff792322ea3 2035->2037 2038 7ff792322e39 RegDeleteValueA RegCloseKey 2036->2038 2039 7ff792322e1c RegOpenKeyA 2036->2039 2037->2033 2038->2035 2039->2035 2039->2038 2040 7ff792322330 2041 7ff79232240a MultiByteToWideChar 2040->2041 2042 7ff79232236f GetLogicalDriveStringsA 2040->2042 2043 7ff7923223ff GetLastError 2041->2043 2044 7ff79232242f LocalAlloc 2041->2044 2042->2043 2051 7ff79232238e 2042->2051 2045 7ff7923223f0 2043->2045 2046 7ff792322469 2044->2046 2047 7ff79232245e GetLastError 2044->2047 2048 7ff792323d20 10 API calls 2045->2048 2052 7ff792322476 MultiByteToWideChar 2046->2052 2047->2045 2058 7ff7923223f7 2048->2058 2049 7ff7923223a0 lstrlenA 2050 7ff7923223bf GetDriveTypeA 2049->2050 2049->2051 2050->2051 2051->2045 2051->2049 2051->2050 2054 7ff792323d20 10 API calls 2051->2054 2051->2058 2053 7ff7923224a6 FindFirstFileW 2052->2053 2059 7ff7923225b8 GetLastError 2053->2059 2065 7ff7923224f9 2053->2065 2054->2051 2055 7ff792325fc0 3 API calls 2056 7ff792322602 2055->2056 2058->2055 2060 7ff7923225be LocalFree 2059->2060 2060->2045 2061 7ff792322585 FindNextFileW 2064 7ff79232259b FindClose 2061->2064 2061->2065 2062 7ff79232254a wsprintfW 2062->2065 2063 7ff792322536 wsprintfW 2063->2065 2064->2060 2065->2061 2065->2062 2065->2063 2066 7ff792323ed0 7 API calls 2065->2066 2067 7ff7923225a8 FindClose 2065->2067 2066->2065 2067->2060 2068 7ff792323230 2069 7ff792322f00 282 API calls 2068->2069 2070 7ff792323247 2069->2070 2087 7ff792321b10 GetTickCount 2088 7ff792323d20 10 API calls 2087->2088 2089 7ff792321b37 2088->2089 2071 7ff7923261f2 2072 7ff7923261f9 __scrt_is_managed_app 2071->2072 2073 7ff792326238 _exit 2072->2073 2074 7ff7923261fd 2072->2074

                Callgraph

                • Executed
                • Not Executed
                • Opacity -> Relevance
                • Disassembly available
                callgraph 0 Function_00007FF792326458 6 Function_00007FF792326B70 0->6 48 Function_00007FF792326740 0->48 1 Function_00007FF79232635C 13 Function_00007FF79232B278 1->13 2 Function_00007FF792322160 3 Function_00007FF79232B260 4 Function_00007FF79232B068 5 Function_00007FF792324D70 36 Function_00007FF792325430 5->36 54 Function_00007FF792325950 5->54 62 Function_00007FF7923257E0 5->62 94 Function_00007FF792325FC0 5->94 7 Function_00007FF792325370 8 Function_00007FF792322970 16 Function_00007FF792323C80 8->16 31 Function_00007FF792325C20 8->31 78 Function_00007FF792325F00 8->78 8->94 9 Function_00007FF792322170 87 Function_00007FF792322CA0 9->87 9->94 10 Function_00007FF79232B070 11 Function_00007FF792326C74 12 Function_00007FF792326575 14 Function_00007FF79232657C 14->6 15 Function_00007FF792325080 53 Function_00007FF792325D50 15->53 61 Function_00007FF792325DE0 15->61 15->94 16->31 17 Function_00007FF792324080 77 Function_00007FF792322F00 17->77 18 Function_00007FF792324780 18->94 19 Function_00007FF792326B81 20 Function_00007FF79232B080 21 Function_00007FF79232B288 22 Function_00007FF792326990 23 Function_00007FF792323990 23->5 23->7 23->18 29 Function_00007FF792324920 23->29 23->31 45 Function_00007FF792323E40 23->45 23->78 91 Function_00007FF792325CB0 23->91 93 Function_00007FF7923243C0 23->93 23->94 101 Function_00007FF792324ED0 23->101 102 Function_00007FF7923245D0 23->102 24 Function_00007FF792323490 24->18 24->29 24->31 24->45 24->78 24->91 24->93 24->94 24->102 25 Function_00007FF792326894 25->3 26 Function_00007FF79232671C 27 Function_00007FF792325B20 27->78 27->94 28 Function_00007FF792323D20 28->45 29->94 30 Function_00007FF792326620 32 Function_00007FF792322320 33 Function_00007FF792322620 33->31 33->78 33->94 34 Function_00007FF792326728 35 Function_00007FF792325F30 55 Function_00007FF792325F50 35->55 36->53 36->61 36->78 92 Function_00007FF792323FB0 36->92 36->94 103 Function_00007FF792325ED0 36->103 37 Function_00007FF792326730 38 Function_00007FF792324130 38->94 39 Function_00007FF792324530 40 Function_00007FF792322330 40->28 40->78 40->94 100 Function_00007FF792323ED0 40->100 41 Function_00007FF792323230 41->77 42 Function_00007FF792326738 43 Function_00007FF79232B038 44 Function_00007FF79232B238 45->31 46 Function_00007FF792326240 46->30 47 Function_00007FF792324040 48->13 48->42 48->78 49 Function_00007FF79232B148 50 Function_00007FF792321B50 50->28 50->31 50->78 50->94 50->100 51 Function_00007FF792323250 51->39 60 Function_00007FF7923244E0 51->60 51->94 95 Function_00007FF7923245C0 51->95 52 Function_00007FF792325350 54->27 54->78 54->92 54->94 56 Function_00007FF792326C51 57 Function_00007FF792326954 58 Function_00007FF79232B0D8 59 Function_00007FF792324BE0 59->94 60->94 61->78 61->103 62->27 62->78 62->92 62->94 63 Function_00007FF792325FE0 63->0 63->26 63->32 63->48 63->57 67 Function_00007FF7923266E8 63->67 69 Function_00007FF7923266EC 63->69 80 Function_00007FF792326700 63->80 82 Function_00007FF792326608 63->82 97 Function_00007FF7923266CC 63->97 104 Function_00007FF7923266D0 63->104 64 Function_00007FF79232B0E0 65 Function_00007FF79232B2E0 66 Function_00007FF7923264E4 68 Function_00007FF79232B0E8 70 Function_00007FF7923236F0 70->28 70->31 70->50 70->53 70->78 70->94 71 Function_00007FF7923249F0 71->94 72 Function_00007FF7923266F0 73 Function_00007FF7923261F2 73->25 74 Function_00007FF79232B0F0 75 Function_00007FF7923268F1 76 Function_00007FF7923266F8 77->23 77->24 77->38 77->51 77->52 77->70 77->94 77->103 79 Function_00007FF792322300 79->87 80->72 80->76 81 Function_00007FF79232B100 98 Function_00007FF7923265CC 82->98 83 Function_00007FF79232640C 83->67 99 Function_00007FF7923269CC 83->99 84 Function_00007FF792321B10 84->28 85 Function_00007FF79232B310 86 Function_00007FF792327299 87->94 88 Function_00007FF7923265A0 88->67 89 Function_00007FF7923260A8 90 Function_00007FF7923272A9 92->94 92->103 93->94 94->1 96 Function_00007FF7923260C4 96->14 96->17 96->25 96->34 96->37 96->48 96->66 96->83 96->88 105 Function_00007FF7923263D0 96->105 100->45 101->15 101->94 102->94 102->103 105->6

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 0 7ff792321b50-7ff792321bc2 1 7ff792321bc8-7ff792321bdc LocalAlloc 0->1 2 7ff792322061-7ff792322068 0->2 5 7ff792321be9-7ff792321c01 CreatePipe 1->5 6 7ff792321bde-7ff792321be4 GetLastError 1->6 3 7ff79232206a CloseHandle 2->3 4 7ff792322070-7ff792322077 2->4 3->4 9 7ff792322079 CloseHandle 4->9 10 7ff79232207f-7ff792322087 4->10 7 7ff792321c0e-7ff792321c27 CreatePipe 5->7 8 7ff792321c03-7ff792321c09 GetLastError 5->8 6->2 11 7ff792321c29-7ff792321c2f GetLastError 7->11 12 7ff792321c34-7ff792321c77 GetStartupInfoW 7->12 8->2 9->10 13 7ff792322089 CloseHandle 10->13 14 7ff79232208f-7ff792322097 10->14 11->2 15 7ff792321c89-7ff792321cbc MultiByteToWideChar 12->15 16 7ff792321c79-7ff792321c7c 12->16 13->14 17 7ff792322099 CloseHandle 14->17 18 7ff79232209f-7ff7923220a6 14->18 21 7ff792321cbe-7ff792321ccc GetLastError 15->21 22 7ff792321cd1-7ff792321cf2 LocalAlloc 15->22 19 7ff792321c7e-7ff792321c84 16->19 20 7ff792321c86 16->20 17->18 23 7ff7923220a8 CloseHandle 18->23 24 7ff7923220ae-7ff7923220b6 18->24 19->15 19->20 20->15 21->2 25 7ff792321d0d-7ff792321d5a call 7ff792325f00 MultiByteToWideChar LocalAlloc 22->25 26 7ff792321cf4-7ff792321d08 GetLastError 22->26 23->24 27 7ff7923220b8 CloseHandle 24->27 28 7ff7923220be-7ff7923220c1 24->28 38 7ff792321d5c-7ff792321d6b GetLastError 25->38 39 7ff792321d70-7ff792321dd9 wsprintfW CreateProcessW 25->39 29 7ff79232205c 26->29 27->28 31 7ff7923220cc-7ff7923220cf 28->31 32 7ff7923220c3-7ff7923220c6 LocalFree 28->32 29->2 34 7ff7923220da-7ff7923220dd 31->34 35 7ff7923220d1-7ff7923220d4 LocalFree 31->35 32->31 36 7ff7923220e8-7ff7923220f6 call 7ff792323d20 34->36 37 7ff7923220df-7ff7923220e2 LocalFree 34->37 35->34 45 7ff7923220fb-7ff792322129 call 7ff792325fc0 36->45 37->36 38->2 40 7ff792321deb-7ff792321ded 39->40 41 7ff792321ddb-7ff792321de6 GetLastError 39->41 43 7ff792321e10 40->43 44 7ff792321def-7ff792321dfd FreeConsole AllocConsole 40->44 41->2 48 7ff792321e14-7ff792321e45 GetTickCount PeekNamedPipe 43->48 44->43 46 7ff792321dff-7ff792321e0e GetConsoleCP FreeConsole 44->46 46->48 50 7ff792321e4b 48->50 51 7ff792321ff6-7ff792322001 GetLastError 48->51 53 7ff792321e50-7ff792321e57 50->53 52 7ff792322026-7ff792322036 GetExitCodeProcess 51->52 56 7ff792322038-7ff79232203f 52->56 57 7ff792322051 GetLastError 52->57 54 7ff792321e9a-7ff792321ebf ReadFile 53->54 55 7ff792321e59-7ff792321e69 GetExitCodeProcess 53->55 58 7ff792322017 GetLastError 54->58 62 7ff792321ec5-7ff792321eca 54->62 55->58 59 7ff792321e6f-7ff792321e76 55->59 60 7ff792322057 56->60 61 7ff792322041-7ff79232204f TerminateProcess 56->61 57->60 63 7ff79232201d 58->63 59->63 64 7ff792321e7c-7ff792321e89 GetTickCount 59->64 60->29 61->57 61->60 65 7ff792321ed0-7ff792321ed3 62->65 66 7ff792321fc3-7ff792321fec PeekNamedPipe 62->66 68 7ff792322020 63->68 69 7ff792321e8f-7ff792321e95 SwitchToThread 64->69 70 7ff792322003-7ff792322015 call 7ff792323d20 64->70 71 7ff792321ed9-7ff792321ef7 MultiByteToWideChar 65->71 72 7ff792321f66-7ff792321f6e 65->72 66->53 67 7ff792321ff2 66->67 67->51 68->52 69->66 70->68 73 7ff792321ef9-7ff792321f16 LocalAlloc 71->73 74 7ff792321f5e-7ff792321f64 GetLastError 71->74 76 7ff792321f70-7ff792321f7d call 7ff792325c20 72->76 77 7ff792321f82-7ff792321f84 72->77 73->74 78 7ff792321f18-7ff792321f46 call 7ff792325f00 MultiByteToWideChar call 7ff792323ed0 73->78 80 7ff792321fbb-7ff792321fc1 GetTickCount 74->80 76->77 77->80 82 7ff792321f86 77->82 89 7ff792321f4b-7ff792321f50 78->89 80->66 84 7ff792321f90-7ff792321faf send 82->84 86 7ff792322143-7ff792322157 WSAGetLastError 84->86 87 7ff792321fb5-7ff792321fb9 84->87 86->52 87->80 87->84 90 7ff79232212a-7ff79232213e LocalFree 89->90 91 7ff792321f56-7ff792321f5c LocalFree 89->91 90->52 91->80
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2555584235.00007FF792321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF792320000, based on PE: true
                • Associated: 00000000.00000002.2555558138.00007FF792320000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2555609498.00007FF792328000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2555625467.00007FF79232A000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff792320000_mG31YklE0k.jbxd
                Yara matches
                Similarity
                • API ID: CloseHandle$Local$ErrorFreeLast$Process$AllocCodeCreateExitPipeTerminate
                • String ID: *** ERROR: Timeout occured$chcp 65001 > NUL & $cmd.exe /C "%s%s"${{{#%.8x}}}
                • API String ID: 2561126683-440690278
                • Opcode ID: da73e3b086ad8585e865e1741d3301e734a5945a977b8d39513ddb4751ef9bad
                • Instruction ID: a35c02b23f56b8ed552dc8b0fc6b7e45da1b912d87fb86a4f48275425b82979e
                • Opcode Fuzzy Hash: da73e3b086ad8585e865e1741d3301e734a5945a977b8d39513ddb4751ef9bad
                • Instruction Fuzzy Hash: 17026131A08B5286FB30BB72A844679A7A1FF48B94F84417DDE4E43A58DFBCE445C760

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 92 7ff792322f00-7ff792322f34 CreateMutexA 93 7ff792322f47-7ff792322f6f GetCommandLineA SetUnhandledExceptionFilter GetCurrentProcessId lstrlenA 92->93 94 7ff792322f36-7ff792322f41 GetLastError 92->94 95 7ff792323210-7ff792323227 call 7ff792325fc0 93->95 96 7ff792322f75-7ff792322f84 lstrlenA 93->96 94->93 94->95 96->95 97 7ff792322f8a-7ff792322f92 96->97 97->95 99 7ff792322f98-7ff792322fc2 call 7ff792323250 GetVersionExA 97->99 103 7ff792322fe2-7ff792322ff4 WSAStartup 99->103 104 7ff792322fc4-7ff792322fe1 GetLastError call 7ff792325fc0 99->104 105 7ff792323014-7ff792323038 lstrlenA call 7ff792324130 103->105 106 7ff792322ff6-7ff792323013 WSAGetLastError call 7ff792325fc0 103->106 105->95 113 7ff79232303e-7ff792323068 call 7ff792325350 105->113 116 7ff792323070-7ff792323087 gethostbyname 113->116 117 7ff7923230aa-7ff7923230d4 call 7ff792325ed0 116->117 118 7ff792323089-7ff79232309b inet_addr 116->118 119 7ff7923230da-7ff792323117 htons inet_ntoa call 7ff792323990 117->119 124 7ff7923231a6-7ff7923231b1 Sleep 117->124 118->119 120 7ff79232309d-7ff7923230a8 Sleep 118->120 126 7ff792323159-7ff79232315c 119->126 127 7ff792323119-7ff79232312e socket 119->127 120->116 124->116 126->124 130 7ff79232315e-7ff79232316d GetTickCount call 7ff7923236f0 126->130 128 7ff792323134-7ff79232314b connect 127->128 129 7ff7923231b6-7ff7923231c7 WSAGetLastError Sleep 127->129 131 7ff792323197 WSAGetLastError 128->131 132 7ff79232314d-7ff792323150 call 7ff792323490 128->132 129->116 136 7ff792323172-7ff79232317a 130->136 134 7ff79232319d-7ff7923231a0 closesocket 131->134 137 7ff792323155-7ff792323157 132->137 134->124 138 7ff7923231cc-7ff7923231e6 136->138 139 7ff79232317c-7ff79232317f 136->139 137->126 137->134 140 7ff7923231e8-7ff7923231eb closesocket 138->140 141 7ff7923231f1-7ff792323208 call 7ff792325410 138->141 139->134 142 7ff792323181-7ff792323183 139->142 140->141 141->95 146 7ff79232320a CloseHandle 141->146 142->116 144 7ff792323189-7ff792323192 closesocket 142->144 144->116 146->95
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2555584235.00007FF792321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF792320000, based on PE: true
                • Associated: 00000000.00000002.2555558138.00007FF792320000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2555609498.00007FF792328000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2555625467.00007FF79232A000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff792320000_mG31YklE0k.jbxd
                Yara matches
                Similarity
                • API ID: ErrorLast$Sleeplstrlen$closesocket$CommandCountCreateCurrentExceptionFilterLineMutexProcessStartupTickUnhandledVersionconnectgethostbynamehtonsinet_addrinet_ntoasocket
                • String ID: -----BEGIN CERTIFICATE-----MIIDazCCAlOgAwIBAgIUaGMugH/V55gn/kKF7MTkZbXAMgcwDQYJKoZIhvcNAQELBQAwRTELMAkGA1UEBhMCQVUxEzARBgNVBAgMClNvbWUtU3RhdGUxITAfBgNVBAoMGEludGVybmV0IFdpZGdpdHMgUHR5IEx0ZDAeFw0yNDA3MDIwOTE1NDlaFw0yNTA3MDIwOTE1NDlaMEUxCzAJBgNVBAYTAkFVMRMwEQYDV$30D78F9B-C56E-472C-8A29-E91111115$324253563f750e8432be8e34af13249d$47.236.8.208
                • API String ID: 84727288-1026695507
                • Opcode ID: 97dc3dc6185f06f5d3c3692b71c6e10bc1e9102fb541311fcd43bd1663eb88e6
                • Instruction ID: 791737905a2aa453c1345ab8129f4786e62eea6614bf340852f3f2d3ab936d58
                • Opcode Fuzzy Hash: 97dc3dc6185f06f5d3c3692b71c6e10bc1e9102fb541311fcd43bd1663eb88e6
                • Instruction Fuzzy Hash: 98813C21E08A5281FA74BB31E814379A3A1BF84B60FC442BDDA5E426E5DFBCF545C670

                Control-flow Graph

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2555584235.00007FF792321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF792320000, based on PE: true
                • Associated: 00000000.00000002.2555558138.00007FF792320000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2555609498.00007FF792328000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2555625467.00007FF79232A000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff792320000_mG31YklE0k.jbxd
                Yara matches
                Similarity
                • API ID: AcquireContextCrypt$ErrorLastlstrcmp
                • String ID: 1.2.840.113549.1.1.1
                • API String ID: 3380055822-1045768084
                • Opcode ID: bb7228c47c3e8ab6bf27e9b09dc6a7054ea082258b3730e95ee1816905a7530a
                • Instruction ID: 8499731a84bca989fe411d59f9ef545ffab8a0ec13f3f3ab486b586b50affb3d
                • Opcode Fuzzy Hash: bb7228c47c3e8ab6bf27e9b09dc6a7054ea082258b3730e95ee1816905a7530a
                • Instruction Fuzzy Hash: 81418126A0864282F734BF75E84063AF761FF85B90F94407DDA5E42A58DFBCE449C720

                Control-flow Graph

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2555584235.00007FF792321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF792320000, based on PE: true
                • Associated: 00000000.00000002.2555558138.00007FF792320000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2555609498.00007FF792328000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2555625467.00007FF79232A000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff792320000_mG31YklE0k.jbxd
                Yara matches
                Similarity
                • API ID: Crypt$Context$AcquireErrorExportLastLocal$AllocDestroyFreeImportInfoPublicReleaselstrcmp
                • String ID: 1.2.840.113549.1.1.1$RSA1
                • API String ID: 1837312144-2012263958
                • Opcode ID: a4e4f76e9bbf0a16c4e1eb018d1a02789ea6febe891a77422323c85949518525
                • Instruction ID: 0a03a5166f782f27505f85a64c0aa7f332f2df71f08a432c9a6169880c94f990
                • Opcode Fuzzy Hash: a4e4f76e9bbf0a16c4e1eb018d1a02789ea6febe891a77422323c85949518525
                • Instruction Fuzzy Hash: 21412032A28B8186F770BB31E44462AB3A1FF84B44F84507DD64E46A58DF7DE549C760

                Control-flow Graph

                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2555584235.00007FF792321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF792320000, based on PE: true
                • Associated: 00000000.00000002.2555558138.00007FF792320000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2555609498.00007FF792328000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2555625467.00007FF79232A000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff792320000_mG31YklE0k.jbxd
                Yara matches
                Similarity
                • API ID: Token$AuthorityErrorInformationLastLocalProcess$AllocCloseCountCurrentFreeHandleOpenVersion
                • String ID:
                • API String ID: 1726717305-0
                • Opcode ID: 84e1ee547cd16025a8e5c5eaf9228b4336429ec269aa935b445246a5c9abbaa2
                • Instruction ID: 2252324b31bb4e12f878f438c885b315a08f76398daa4f786dccd171e944c710
                • Opcode Fuzzy Hash: 84e1ee547cd16025a8e5c5eaf9228b4336429ec269aa935b445246a5c9abbaa2
                • Instruction Fuzzy Hash: 09413E22E08B4286F720BB70E4003BDB3B1EB94B48F41557EDE4D56659DFB8B189C350

                Control-flow Graph

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2555584235.00007FF792321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF792320000, based on PE: true
                • Associated: 00000000.00000002.2555558138.00007FF792320000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2555609498.00007FF792328000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2555625467.00007FF79232A000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff792320000_mG31YklE0k.jbxd
                Yara matches
                Similarity
                • API ID: AddressProc$Local$AllocFreeLibraryLoadlstrlenvsprintf
                • String ID: _vscprintf$msvcrt.dll$sprintf$vsprintf
                • API String ID: 147120482-2814819631
                • Opcode ID: eadc4dfa9487ff5ef6a20d957b77e50debb2b712aad6b75c81ae23c4abf1b67c
                • Instruction ID: 23ef37cc66fbddcec628bc5a221a05220552e11092a01160b90d74c81a6a6380
                • Opcode Fuzzy Hash: eadc4dfa9487ff5ef6a20d957b77e50debb2b712aad6b75c81ae23c4abf1b67c
                • Instruction Fuzzy Hash: 47312D65A09B5381FF35BB75A894274A3A1AF48BD0F8445BDCD4D023A0EEBCF489C360

                Control-flow Graph

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2555584235.00007FF792321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF792320000, based on PE: true
                • Associated: 00000000.00000002.2555558138.00007FF792320000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2555609498.00007FF792328000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2555625467.00007FF79232A000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff792320000_mG31YklE0k.jbxd
                Yara matches
                Similarity
                • API ID: CertName$Crypt$CertificateHashObjectQueryStringwsprintf
                • String ID: %.2X
                • API String ID: 2640105808-213608013
                • Opcode ID: a01f408edb9a8f74c4fb5be574b99d21058be682e4b66ce2b4315588bc1ec5d7
                • Instruction ID: cf8a19bb1f58e17ca4db84f32332baffe2e4b0d2403d688a8789627d198aec00
                • Opcode Fuzzy Hash: a01f408edb9a8f74c4fb5be574b99d21058be682e4b66ce2b4315588bc1ec5d7
                • Instruction Fuzzy Hash: 68614232A18B8186F721EF25E8406ADB7B1FB88744F844139DB8D47A59DF7CE194CB10

                Control-flow Graph

                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2555584235.00007FF792321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF792320000, based on PE: true
                • Associated: 00000000.00000002.2555558138.00007FF792320000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2555609498.00007FF792328000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2555625467.00007FF79232A000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff792320000_mG31YklE0k.jbxd
                Yara matches
                Similarity
                • API ID: Crypt$Hash$Context$ErrorLastRelease$AcquireCreateDataDestroyParam
                • String ID:
                • API String ID: 420618377-0
                • Opcode ID: 5378d1afaa9ea9ce78b8640519108fb7b85e84630e84e3a8dd6142cd221e59f5
                • Instruction ID: d83f3ad05c2a1e88d4f0cb65450428400d41d5749fe3f1633a0421919b0549be
                • Opcode Fuzzy Hash: 5378d1afaa9ea9ce78b8640519108fb7b85e84630e84e3a8dd6142cd221e59f5
                • Instruction Fuzzy Hash: C4314632A1864182F760AB32F45066AF7A5FFC8B84F84917DEA8E47A58DF7CD445CB10

                Control-flow Graph

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2555584235.00007FF792321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF792320000, based on PE: true
                • Associated: 00000000.00000002.2555558138.00007FF792320000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2555609498.00007FF792328000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2555625467.00007FF79232A000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff792320000_mG31YklE0k.jbxd
                Yara matches
                Similarity
                • API ID: HandleModule$CloseCreateFileNameThread
                • String ID: C:\Users\user\Desktop\mG31YklE0k.exe$rundll32.exe
                • API String ID: 3777150470-4265591736
                • Opcode ID: 0c81b422f81cfc0abfd58334d4d18dadeed99d4ebbcfda9c07a2675569b56001
                • Instruction ID: 277459e5ccdbc78128f7db01ed62f5bbca658fc5504ed79e96c08c0d6a9655f0
                • Opcode Fuzzy Hash: 0c81b422f81cfc0abfd58334d4d18dadeed99d4ebbcfda9c07a2675569b56001
                • Instruction Fuzzy Hash: DB013925B1875282FB24BB35F844679A361BB44B84F88417DDA4D03768EEBCF149C760

                Control-flow Graph

                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2555584235.00007FF792321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF792320000, based on PE: true
                • Associated: 00000000.00000002.2555558138.00007FF792320000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2555609498.00007FF792328000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2555625467.00007FF79232A000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff792320000_mG31YklE0k.jbxd
                Yara matches
                Similarity
                • API ID: CryptErrorLast$AcquireContextLocal$AllocCloseCriticalEnumFreeOpenQuerySectionValuelstrcmp$CertificateEnterHashLeaveclosesocketrecvsendwsprintf
                • String ID:
                • API String ID: 2157848021-0
                • Opcode ID: d9e43eb65211b232cfda39747d0a0bae992af53bddefae2445599a30d4c6a848
                • Instruction ID: 09b4f999bb34fd402d96f5818dd0d3fd96d89bdd4863719fd3c979e7f13f51a4
                • Opcode Fuzzy Hash: d9e43eb65211b232cfda39747d0a0bae992af53bddefae2445599a30d4c6a848
                • Instruction Fuzzy Hash: 9671B532A1869281F730BB35E4403BAA3A1FF44794F80527DEA4D47695DFBCE585C760
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2555584235.00007FF792321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF792320000, based on PE: true
                • Associated: 00000000.00000002.2555558138.00007FF792320000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2555609498.00007FF792328000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2555625467.00007FF79232A000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff792320000_mG31YklE0k.jbxd
                Yara matches
                Similarity
                • API ID: Crypt$ContextErrorLast$Acquire$RandomRelease
                • String ID:
                • API String ID: 3728441355-0
                • Opcode ID: a232a733fd8e0f25fe72c7b9f9a56c4bbedd6f1a759a8af967787b9ae0d41743
                • Instruction ID: 3ed7dfb97ced0da27543101a3fde4ee86745f4c60a073c83d5f2a94d51c33125
                • Opcode Fuzzy Hash: a232a733fd8e0f25fe72c7b9f9a56c4bbedd6f1a759a8af967787b9ae0d41743
                • Instruction Fuzzy Hash: 5C215735A18B4282F760BB35A45462AA2A1FF88754F80907CEA8E53B18DF7CE449CB10
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2555584235.00007FF792321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF792320000, based on PE: true
                • Associated: 00000000.00000002.2555558138.00007FF792320000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2555609498.00007FF792328000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2555625467.00007FF79232A000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff792320000_mG31YklE0k.jbxd
                Yara matches
                Similarity
                • API ID: CryptErrorLast$AcquireContext$Locallstrcmp$AllocCertificateFreeHashrecvsend
                • String ID:
                • API String ID: 4214944934-0
                • Opcode ID: fa85038c119f5b38bd7c2ce57e367f69374941e6c47017545b112d1040fbb022
                • Instruction ID: 1645ccc7e387ad1e6e5ff2a626b3c13798edd1355a32b863b7d8de22eab39f66
                • Opcode Fuzzy Hash: fa85038c119f5b38bd7c2ce57e367f69374941e6c47017545b112d1040fbb022
                • Instruction Fuzzy Hash: 05517322A1868282F770BB35E4403BAE7A5FB85790F80417DDA4D53B95DFBCE444CB60
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2555584235.00007FF792321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF792320000, based on PE: true
                • Associated: 00000000.00000002.2555558138.00007FF792320000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2555609498.00007FF792328000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2555625467.00007FF79232A000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff792320000_mG31YklE0k.jbxd
                Yara matches
                Similarity
                • API ID: Crypt$ContextErrorLast$AcquireCreateHashRelease
                • String ID:
                • API String ID: 4104741015-0
                • Opcode ID: 083c638682328886a08654ee61228b1e669f75f2304f506c542920b65700edee
                • Instruction ID: f65bec3db5eefa782a1bb32252bed4474923f0eae576edc4c862afa7ad885540
                • Opcode Fuzzy Hash: 083c638682328886a08654ee61228b1e669f75f2304f506c542920b65700edee
                • Instruction Fuzzy Hash: 70014435B18A5282F760AB31F84572AA365FB88B84F94C078DA9C46658DF7CE455CB10
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2555584235.00007FF792321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF792320000, based on PE: true
                • Associated: 00000000.00000002.2555558138.00007FF792320000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2555609498.00007FF792328000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2555625467.00007FF79232A000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff792320000_mG31YklE0k.jbxd
                Yara matches
                Similarity
                • API ID: ExceptionFilterUnhandled
                • String ID:
                • API String ID: 3192549508-0
                • Opcode ID: 9db8c012ab206651dfefe73e26dadfbfbf3dae9e0190084e40dbf77c9a833f44
                • Instruction ID: 201eb1d2423156313b3f53d3b778e4062c60d8e68130248a7da2fd5c536c0f4f
                • Opcode Fuzzy Hash: 9db8c012ab206651dfefe73e26dadfbfbf3dae9e0190084e40dbf77c9a833f44
                • Instruction Fuzzy Hash: C2C08C81E0D683C1F2253BBA086217C90655FA0700FE085BEF108802A3CCDCA085CF37

                Control-flow Graph

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2555584235.00007FF792321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF792320000, based on PE: true
                • Associated: 00000000.00000002.2555558138.00007FF792320000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2555609498.00007FF792328000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2555625467.00007FF79232A000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff792320000_mG31YklE0k.jbxd
                Yara matches
                Similarity
                • API ID: ErrorLastProcessToken$CloseCurrentHandleInformationOpenVersion
                • String ID: D
                • API String ID: 3901347173-2746444292
                • Opcode ID: 705c8f43b295bd52e6d9a15a6dbf82299f9fb6bb7b0e6dd2c407aabfea82478f
                • Instruction ID: d2b757e2ca242478b5ce9ebef4ff2804d2ea0af7663ae0d290bab20704d29dc9
                • Opcode Fuzzy Hash: 705c8f43b295bd52e6d9a15a6dbf82299f9fb6bb7b0e6dd2c407aabfea82478f
                • Instruction Fuzzy Hash: EC510036E1CB8286F760BB71E84426DB361FB94B44F90517DEA8E42618DF7CE589CB10

                Control-flow Graph

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2555584235.00007FF792321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF792320000, based on PE: true
                • Associated: 00000000.00000002.2555558138.00007FF792320000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2555609498.00007FF792328000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2555625467.00007FF79232A000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff792320000_mG31YklE0k.jbxd
                Yara matches
                Similarity
                • API ID: Crypt$CloseHash$AcquireAddressComputerContextCreateCurrentErrorHandleLastModuleNameOpenParamProcProcessQueryValuelstrlenwsprintf
                • String ID: %.2x$IsWow64Process$MachineGuid$SOFTWARE\Microsoft\Cryptography$kernel32.dll
                • API String ID: 932469847-1683008531
                • Opcode ID: cc5091a3ecd151b3db448090e7f0cdabd79d8512507a13b9d0a34b427571998c
                • Instruction ID: 1c476dc06f604a9c1917f33f5547ee012b8cf2a63af182f3e635ce3b210251bc
                • Opcode Fuzzy Hash: cc5091a3ecd151b3db448090e7f0cdabd79d8512507a13b9d0a34b427571998c
                • Instruction Fuzzy Hash: D0513F32B18A4286FB61BF25E48026AB365FF84794FC050BDEA8D43A59DFBCD545CB10

                Control-flow Graph

                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2555584235.00007FF792321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF792320000, based on PE: true
                • Associated: 00000000.00000002.2555558138.00007FF792320000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2555609498.00007FF792328000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2555625467.00007FF79232A000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff792320000_mG31YklE0k.jbxd
                Yara matches
                Similarity
                • API ID: CloseEnumLocalOpenQueryValue$AllocErrorFreeLastlstrcmpwsprintf
                • String ID: %s\Software\Microsoft\Windows\CurrentVersion\Internet Settings$ProxyServer
                • API String ID: 2880357921-3364920562
                • Opcode ID: f703fd26846dc93f59185746bafd58968d219d916680c9288a364d4a59a2561a
                • Instruction ID: 43571d29d79ca43a3457dae522facb78e2e733ab3e94243839e8ca42a11ab887
                • Opcode Fuzzy Hash: f703fd26846dc93f59185746bafd58968d219d916680c9288a364d4a59a2561a
                • Instruction Fuzzy Hash: 99414131618A8682FB70BB21E8547AAF361FF84B84F84817DDA8E43A58DF7CD545CB50

                Control-flow Graph

                • Executed
                • Not Executed
                control_flow_graph 278 7ff7923236f0-7ff792323726 LocalAlloc 279 7ff792323728-7ff79232372b 278->279 280 7ff792323730-7ff79232376a 278->280 281 7ff79232396f-7ff792323989 call 7ff792325fc0 279->281 282 7ff792323770-7ff792323781 call 7ff792325f00 280->282 286 7ff792323786-7ff792323788 282->286 287 7ff79232378a-7ff7923237c0 select 286->287 288 7ff7923237df-7ff792323802 recv 286->288 289 7ff792323934 WSAGetLastError 287->289 290 7ff7923237c6-7ff7923237c8 287->290 288->289 291 7ff792323808-7ff79232380a 288->291 294 7ff79232393a 289->294 292 7ff79232388a 290->292 293 7ff7923237ce-7ff7923237dd __WSAFDIsSet 290->293 291->294 295 7ff792323810-7ff792323817 291->295 292->286 296 7ff792323890-7ff7923238a9 GetTickCount call 7ff792323d20 292->296 293->286 293->288 299 7ff79232393f-7ff792323967 294->299 297 7ff792323819-7ff792323826 call 7ff792325c20 295->297 298 7ff79232382b-7ff792323833 295->298 303 7ff7923238ae 296->303 297->298 298->294 302 7ff792323839-7ff792323841 298->302 299->281 302->286 304 7ff792323847-7ff792323855 302->304 303->286 305 7ff792323857 304->305 306 7ff79232385b-7ff79232386c lstrlenA 304->306 305->306 307 7ff79232386e 306->307 308 7ff7923238cd-7ff7923238da 306->308 311 7ff792323870-7ff792323877 307->311 309 7ff7923238dc 308->309 310 7ff792323903-7ff792323914 call 7ff792323d20 308->310 312 7ff7923238e0-7ff7923238ee lstrcmpA 309->312 310->282 321 7ff79232391a 310->321 314 7ff792323879-7ff792323886 lstrlenA 311->314 315 7ff7923238b3-7ff7923238bd call 7ff792325d50 311->315 317 7ff79232391c-7ff792323925 call 7ff792321b50 312->317 318 7ff7923238f0-7ff792323901 312->318 314->311 320 7ff792323888 314->320 324 7ff7923238c9 315->324 325 7ff7923238bf-7ff7923238c6 315->325 323 7ff79232392a-7ff79232392c 317->323 318->310 318->312 320->308 321->294 323->282 326 7ff792323932 323->326 324->308 325->324 326->299
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2555584235.00007FF792321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF792320000, based on PE: true
                • Associated: 00000000.00000002.2555558138.00007FF792320000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2555609498.00007FF792328000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2555625467.00007FF79232A000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff792320000_mG31YklE0k.jbxd
                Yara matches
                Similarity
                • API ID: lstrlen$AllocLocallstrcmprecvselect
                • String ID: $ERROR: Unknown command${{{$%.8x}}}
                • API String ID: 2706044607-2894458212
                • Opcode ID: ef6d48c5f118d34ece9a34bd44b64fe268e488214005fbaa3fcbe0b0dfa20124
                • Instruction ID: d6f67a8fcc9df19c45ef97071ae62fa2ef5ddba71cf4047a57410402d6bae2b7
                • Opcode Fuzzy Hash: ef6d48c5f118d34ece9a34bd44b64fe268e488214005fbaa3fcbe0b0dfa20124
                • Instruction Fuzzy Hash: 54619D21A0C68281FB74BB35A548379A3A5FF45BA4FC402BDDE8E46795DEBCE005C620

                Control-flow Graph

                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2555584235.00007FF792321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF792320000, based on PE: true
                • Associated: 00000000.00000002.2555558138.00007FF792320000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2555609498.00007FF792328000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2555625467.00007FF79232A000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff792320000_mG31YklE0k.jbxd
                Yara matches
                Similarity
                • API ID: __p___argc__p___argv__scrt_acquire_startup_lock__scrt_initialize_crt__scrt_is_managed_app__scrt_release_startup_lock_cexit_exit_get_initial_narrow_environment_register_thread_local_exe_atexit_callback
                • String ID:
                • API String ID: 3019265742-0
                • Opcode ID: 5b28b9beae6e416053ad1fa9bd32edf6f43d44722f117cbf754f38e8f985c628
                • Instruction ID: b87f6c2475e85e1d7292ec8304ecf077c6b1177fad622b1248a0349f27db6d7b
                • Opcode Fuzzy Hash: 5b28b9beae6e416053ad1fa9bd32edf6f43d44722f117cbf754f38e8f985c628
                • Instruction Fuzzy Hash: 2D310B21E1C65282FA34BB35A5513B9A291AF85784FC4C0BDDA8D073D7DEADF805CA70
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2555584235.00007FF792321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF792320000, based on PE: true
                • Associated: 00000000.00000002.2555558138.00007FF792320000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2555609498.00007FF792328000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2555625467.00007FF79232A000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff792320000_mG31YklE0k.jbxd
                Yara matches
                Similarity
                • API ID: ByteCharLocalMultiWide$AllocErrorFreeLastsend
                • String ID:
                • API String ID: 3661506369-0
                • Opcode ID: 94ae4495e992c11c641c07ac0312475bce97894452f816ca4795e1d6352c8905
                • Instruction ID: cd36e95e3f9b999c53aff3fef4b559c00c437a98f7337474fbbd25884789e2cd
                • Opcode Fuzzy Hash: 94ae4495e992c11c641c07ac0312475bce97894452f816ca4795e1d6352c8905
                • Instruction Fuzzy Hash: B0216A36B18B4286E724EF22B884029BBA6FB88F90B44017CDF4953B64DF7CE556C750
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2555584235.00007FF792321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF792320000, based on PE: true
                • Associated: 00000000.00000002.2555558138.00007FF792320000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2555609498.00007FF792328000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2555625467.00007FF79232A000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff792320000_mG31YklE0k.jbxd
                Yara matches
                Similarity
                • API ID: ErrorLastsend
                • String ID:
                • API String ID: 1802528911-0
                • Opcode ID: 788791f3708ea20983311082fad8352eb56ef84cefd3e600651340c004df7d0e
                • Instruction ID: ca6d8c6b4063255791578ce4347800098fbc9b90dad4f94b469079d1b422b41d
                • Opcode Fuzzy Hash: 788791f3708ea20983311082fad8352eb56ef84cefd3e600651340c004df7d0e
                • Instruction Fuzzy Hash: CD01D432E1864285F370BB31B580279E2A1FF88B90F98457CDA4D43B55DEBCE444C750
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2555584235.00007FF792321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF792320000, based on PE: true
                • Associated: 00000000.00000002.2555558138.00007FF792320000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2555609498.00007FF792328000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2555625467.00007FF79232A000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff792320000_mG31YklE0k.jbxd
                Yara matches
                Similarity
                • API ID: ErrorLastgethostbynameinet_addrsocket
                • String ID: $CONNECT %s:%d HTTP/1.0
                • API String ID: 1837667487-1618206690
                • Opcode ID: fd1145cb3e59b9725c0e8ec7a43d72114c9004003418f53f3f910ab1c911184e
                • Instruction ID: 111470b40bf036601f050440e5756963e02556804fc402c40cc46dfa76332ad1
                • Opcode Fuzzy Hash: fd1145cb3e59b9725c0e8ec7a43d72114c9004003418f53f3f910ab1c911184e
                • Instruction Fuzzy Hash: 5E91812560864286F774BF35A8443B9A365FF45B94FC0117DEA1E46AD4DFBCE205C720
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2555584235.00007FF792321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF792320000, based on PE: true
                • Associated: 00000000.00000002.2555558138.00007FF792320000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2555609498.00007FF792328000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2555625467.00007FF79232A000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff792320000_mG31YklE0k.jbxd
                Yara matches
                Similarity
                • API ID: Find$ByteCharCloseDriveErrorFileLastLocalMultiWidewsprintf$AllocFirstFreeLogicalNextStringsTypelstrlen
                • String ID: 0x%I64x %s$D %s$D %s${{{#%.8x}}}
                • API String ID: 4240627101-2220868598
                • Opcode ID: 06c2d9c40caafc6060978beb0396fcd42b8ad7ac7e76347dadabbb5eae34b6d6
                • Instruction ID: b334537041197fe1ef500535511cf3614f6360fef2b4e525f593bacb283860cd
                • Opcode Fuzzy Hash: 06c2d9c40caafc6060978beb0396fcd42b8ad7ac7e76347dadabbb5eae34b6d6
                • Instruction Fuzzy Hash: 66819462A0868286F730BB36A81027AE7A5FF44B94FD4417DDE5E43694DFBCE445C720
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2555584235.00007FF792321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF792320000, based on PE: true
                • Associated: 00000000.00000002.2555558138.00007FF792320000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2555609498.00007FF792328000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2555625467.00007FF79232A000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff792320000_mG31YklE0k.jbxd
                Yara matches
                Similarity
                • API ID: ErrorLastLocal$AllocByteCharFreeMultiWide
                • String ID:
                • API String ID: 3698746609-0
                • Opcode ID: 20b431f87f550ca13bd797d0e9c3cd71a0e3300971d98448ecb009b465a6176b
                • Instruction ID: b04cbd66ee03acaf07684553bf1e7b33c86a7c77e202d3f2e62d09ca94eba601
                • Opcode Fuzzy Hash: 20b431f87f550ca13bd797d0e9c3cd71a0e3300971d98448ecb009b465a6176b
                • Instruction Fuzzy Hash: BB919331A1864286F730BB36A84437AE2A1FF85B90F94457DDA5D43B94DFBCE445C720
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2555584235.00007FF792321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF792320000, based on PE: true
                • Associated: 00000000.00000002.2555558138.00007FF792320000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2555609498.00007FF792328000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2555625467.00007FF79232A000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff792320000_mG31YklE0k.jbxd
                Yara matches
                Similarity
                • API ID: ErrorLastLocal$AllocByteCharFreeMultiWide
                • String ID:
                • API String ID: 3698746609-0
                • Opcode ID: ec638173b2777ea0177f7648dc120a072e466c571d84b125b11ac355dd3df3c6
                • Instruction ID: b98cd66f63dd817211e8e2eebb48694d7356658d1dd21902c016bf9ba2ffe7ce
                • Opcode Fuzzy Hash: ec638173b2777ea0177f7648dc120a072e466c571d84b125b11ac355dd3df3c6
                • Instruction Fuzzy Hash: 8D81A021B0865282F730BB36AC4037AE6A1FB85B94F94157CDE4E43BA4DEBCE444C760
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2555584235.00007FF792321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF792320000, based on PE: true
                • Associated: 00000000.00000002.2555558138.00007FF792320000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2555609498.00007FF792328000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2555625467.00007FF79232A000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff792320000_mG31YklE0k.jbxd
                Yara matches
                Similarity
                • API ID: ExceptionFilterPresentUnhandled$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                • String ID:
                • API String ID: 3140674995-0
                • Opcode ID: 0c82e3394a8510cb68c394d617c049d229b19ce87432c1eb93262b18cd8805f6
                • Instruction ID: 5a2bf1ed2d21ad71eac87e93041582bed5eae9401288a44e908e4c78c8620236
                • Opcode Fuzzy Hash: 0c82e3394a8510cb68c394d617c049d229b19ce87432c1eb93262b18cd8805f6
                • Instruction Fuzzy Hash: 77310B62619B8186EB60AF74E8503EDB365FB84748F84443EDA4D47A98DF78D548CB20
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2555584235.00007FF792321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF792320000, based on PE: true
                • Associated: 00000000.00000002.2555558138.00007FF792320000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2555609498.00007FF792328000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2555625467.00007FF79232A000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff792320000_mG31YklE0k.jbxd
                Yara matches
                Similarity
                • API ID: CryptHashParam
                • String ID:
                • API String ID: 1839025277-0
                • Opcode ID: 009c0628bc1a6b489b12d5b328a448f1418db9c0fe8e5bf7062187ece7f25820
                • Instruction ID: 599186598206e583673666052cccdce6e6ffaddd112429874b27e754df38f619
                • Opcode Fuzzy Hash: 009c0628bc1a6b489b12d5b328a448f1418db9c0fe8e5bf7062187ece7f25820
                • Instruction Fuzzy Hash: 01E092A193878082F310EF20E45135AB360FBC4B84FC06629F68E12725DF7CD181CA00
                Memory Dump Source
                • Source File: 00000000.00000002.2555625467.00007FF79232A000.00000002.00000001.01000000.00000003.sdmp, Offset: 00007FF792320000, based on PE: true
                • Associated: 00000000.00000002.2555558138.00007FF792320000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2555584235.00007FF792321000.00000020.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2555609498.00007FF792328000.00000004.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff792320000_mG31YklE0k.jbxd
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 86183fdb6df3387678390004221b7ff6591743fd74693a0b0da62dce99e1fcf4
                • Instruction ID: 034e5e6099e141df9f26c29f52f123cd2d0858a61cdf2db7dab0e39e1e9dfcaa
                • Opcode Fuzzy Hash: 86183fdb6df3387678390004221b7ff6591743fd74693a0b0da62dce99e1fcf4
                • Instruction Fuzzy Hash: 30D09E47C0D3C30BD3038A709C117183F704763904B4E80B7C684C22C3D88DB4458762
                Memory Dump Source
                • Source File: 00000000.00000002.2555625467.00007FF79232A000.00000002.00000001.01000000.00000003.sdmp, Offset: 00007FF792320000, based on PE: true
                • Associated: 00000000.00000002.2555558138.00007FF792320000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2555584235.00007FF792321000.00000020.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2555609498.00007FF792328000.00000004.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff792320000_mG31YklE0k.jbxd
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: a4408146ef460cab551af539e831ab92c5b29fa9073a41be110d1d290c3d8dd6
                • Instruction ID: 318d70931d7ca8b6eae560ce57e6a480db8b5309efe6d3a19256843270c5ad98
                • Opcode Fuzzy Hash: a4408146ef460cab551af539e831ab92c5b29fa9073a41be110d1d290c3d8dd6
                • Instruction Fuzzy Hash: FAC0027780C8C55AEF622A3815751B8AF61E793A00B4C89EDC3D441447D6952926E210
                Memory Dump Source
                • Source File: 00000000.00000002.2555625467.00007FF79232A000.00000002.00000001.01000000.00000003.sdmp, Offset: 00007FF792320000, based on PE: true
                • Associated: 00000000.00000002.2555558138.00007FF792320000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2555584235.00007FF792321000.00000020.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2555609498.00007FF792328000.00000004.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff792320000_mG31YklE0k.jbxd
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 61379237795740a4421243524e19946e8ca7b2d51c89735acc694ad8f7a246f7
                • Instruction ID: fb8dd11f56a09b9ede5fd55233c9e9f5823ab8facd3e3672c7d7a54dc0c5b985
                • Opcode Fuzzy Hash: 61379237795740a4421243524e19946e8ca7b2d51c89735acc694ad8f7a246f7
                • Instruction Fuzzy Hash: FAC0044794E7C20BE3139A7088226192F7046A790878EC0A3CB84C26D7D88DA8099366
                Memory Dump Source
                • Source File: 00000000.00000002.2555625467.00007FF79232A000.00000002.00000001.01000000.00000003.sdmp, Offset: 00007FF792320000, based on PE: true
                • Associated: 00000000.00000002.2555558138.00007FF792320000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2555584235.00007FF792321000.00000020.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2555609498.00007FF792328000.00000004.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff792320000_mG31YklE0k.jbxd
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 955a012982ad6cfdd8961d5dd14c72c3c1b394eb8dd5432c395f4f61fc1d283f
                • Instruction ID: 20b7a0f421fc790e0bd844dae5861f916282f52907feac1a41c07a65b6bca0f6
                • Opcode Fuzzy Hash: 955a012982ad6cfdd8961d5dd14c72c3c1b394eb8dd5432c395f4f61fc1d283f
                • Instruction Fuzzy Hash:
                Memory Dump Source
                • Source File: 00000000.00000002.2555584235.00007FF792321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF792320000, based on PE: true
                • Associated: 00000000.00000002.2555558138.00007FF792320000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2555609498.00007FF792328000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2555625467.00007FF79232A000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff792320000_mG31YklE0k.jbxd
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: a82f3e827c08fd19ba73e2328c3f35819d3b249727deab1a1e0ca7123c08a8a1
                • Instruction ID: dc9652978e8b46c4290b0fe43954d37cf75c1448a109fae5d79a8dcd6b869168
                • Opcode Fuzzy Hash: a82f3e827c08fd19ba73e2328c3f35819d3b249727deab1a1e0ca7123c08a8a1
                • Instruction Fuzzy Hash:
                Memory Dump Source
                • Source File: 00000000.00000002.2555625467.00007FF79232A000.00000002.00000001.01000000.00000003.sdmp, Offset: 00007FF792320000, based on PE: true
                • Associated: 00000000.00000002.2555558138.00007FF792320000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2555584235.00007FF792321000.00000020.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2555609498.00007FF792328000.00000004.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff792320000_mG31YklE0k.jbxd
                Yara matches
                Similarity
                • API ID:
                • String ID:
                • API String ID:
                • Opcode ID: 6381fa1539c911b83103003f2b337b5421d28f03a24b72a335d6e44ab7f58d51
                • Instruction ID: c3c79d711dc8b87be67c0e4752e25fd5045f3ce26b47d6ff6dc79caf6e2ebda2
                • Opcode Fuzzy Hash: 6381fa1539c911b83103003f2b337b5421d28f03a24b72a335d6e44ab7f58d51
                • Instruction Fuzzy Hash:
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2555584235.00007FF792321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF792320000, based on PE: true
                • Associated: 00000000.00000002.2555558138.00007FF792320000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2555609498.00007FF792328000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2555625467.00007FF79232A000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff792320000_mG31YklE0k.jbxd
                Yara matches
                Similarity
                • API ID: OpenValue$CloseDeleteEnumLocal$AllocCommandFreeLinelstrcmp
                • String ID: Software\Microsoft\Windows\CurrentVersion\Explorer$Software\Microsoft\Windows\CurrentVersion\Run
                • API String ID: 977922673-3122858842
                • Opcode ID: 4d4b936d614c47ce9995d5b5811eaf795889825debfa6f074eff5b6f8549e8fd
                • Instruction ID: d5589fb16f5629351a2e64e67e8e524115f09df42151b001e5df10f6815ad7e4
                • Opcode Fuzzy Hash: 4d4b936d614c47ce9995d5b5811eaf795889825debfa6f074eff5b6f8549e8fd
                • Instruction Fuzzy Hash: 80513332608B8185FB21AF21E8407AAF3A5FB84B94F84417DEA9D43B58DFBCD549C710
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2555584235.00007FF792321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF792320000, based on PE: true
                • Associated: 00000000.00000002.2555558138.00007FF792320000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2555609498.00007FF792328000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2555625467.00007FF79232A000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff792320000_mG31YklE0k.jbxd
                Yara matches
                Similarity
                • API ID: Local$Free$lstrcmplstrlen$lstrcpyn$AllocErrorLast
                • String ID: http$socks
                • API String ID: 1651737292-202976403
                • Opcode ID: 94a48dea6e8920c907405bd2dc88822abc89cd400761f62907b2530ebbb26e4d
                • Instruction ID: 5ace58c4dd56b112459f903b42c29bb49818da2139f3b50613a515c9b0a5dec4
                • Opcode Fuzzy Hash: 94a48dea6e8920c907405bd2dc88822abc89cd400761f62907b2530ebbb26e4d
                • Instruction Fuzzy Hash: 63818322B1861285FB28FF7199446BDA365BF44B88FC0107DDE0E53A94DFB8E646C360
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2555584235.00007FF792321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF792320000, based on PE: true
                • Associated: 00000000.00000002.2555558138.00007FF792320000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2555609498.00007FF792328000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2555625467.00007FF79232A000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff792320000_mG31YklE0k.jbxd
                Yara matches
                Similarity
                • API ID: CloseHandle$Process$CreateInfoObjectSingleStartupTerminateWaitclosesocket
                • String ID: 30D78F9B-C56E-472C-8A29-E91111115
                • API String ID: 3546384811-2607164518
                • Opcode ID: c6739ca2ae6a13fbcbd2b6d1d2a7a3e647980335907db84081b347a6887bbbab
                • Instruction ID: 795057e27d0723ecccaa20fca18e81d66c990fbab92529c9808a39306382a247
                • Opcode Fuzzy Hash: c6739ca2ae6a13fbcbd2b6d1d2a7a3e647980335907db84081b347a6887bbbab
                • Instruction Fuzzy Hash: 5141EB3191CB4282FB60BB61E84436AE3A1FF94790F90457DD98D46A64DFBCF485CB60
                APIs
                Strings
                Memory Dump Source
                • Source File: 00000000.00000002.2555584235.00007FF792321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF792320000, based on PE: true
                • Associated: 00000000.00000002.2555558138.00007FF792320000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2555609498.00007FF792328000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2555625467.00007FF79232A000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff792320000_mG31YklE0k.jbxd
                Yara matches
                Similarity
                • API ID: ErrorLastgethostbynameinet_addrsocket
                • String ID: Z
                • API String ID: 1837667487-1505515367
                • Opcode ID: 78e4a5df49b98a024ca9cb515cfde3272df46432125bda3cb33814f8367d651f
                • Instruction ID: cd0441d531b6b36f09fee73c70d147d7d47b4e973d4a2089d5d400f16da5c60a
                • Opcode Fuzzy Hash: 78e4a5df49b98a024ca9cb515cfde3272df46432125bda3cb33814f8367d651f
                • Instruction Fuzzy Hash: 2C318322A1864581F678BB31E4447B9B260FF49B74F80137DEA6E46AD4DFBCD544C720
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2555584235.00007FF792321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF792320000, based on PE: true
                • Associated: 00000000.00000002.2555558138.00007FF792320000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2555609498.00007FF792328000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2555625467.00007FF79232A000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff792320000_mG31YklE0k.jbxd
                Yara matches
                Similarity
                • API ID: ErrorLastgethostbynameinet_addrsocket
                • String ID:
                • API String ID: 1837667487-0
                • Opcode ID: aa8693d1c8d03eacc3825fc6779a4fed3fed2c8509551fa53c11dcfeebd77fde
                • Instruction ID: 88f347aa9721066cafd8310572c0770fbd5d4b9c5ce3c652d0dbf827357bc2f5
                • Opcode Fuzzy Hash: aa8693d1c8d03eacc3825fc6779a4fed3fed2c8509551fa53c11dcfeebd77fde
                • Instruction Fuzzy Hash: 5F419221A1868181F775BB31E4857B9A3A1FB48770F94137DEA6E02AD4DFBCD548CB10
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2555584235.00007FF792321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF792320000, based on PE: true
                • Associated: 00000000.00000002.2555558138.00007FF792320000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2555609498.00007FF792328000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2555625467.00007FF79232A000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff792320000_mG31YklE0k.jbxd
                Yara matches
                Similarity
                • API ID: CriticalSection$EnterLeave
                • String ID:
                • API String ID: 3168844106-0
                • Opcode ID: 958dbccbd1fbf5c21257f8691a4d2ad849c25a8524c0973bdedd82df4990e226
                • Instruction ID: b09d4d397f60c9ff2ae6ca2d2fb4c8a82bf5d1aadb2ed8884338037943abf2ea
                • Opcode Fuzzy Hash: 958dbccbd1fbf5c21257f8691a4d2ad849c25a8524c0973bdedd82df4990e226
                • Instruction Fuzzy Hash: 8331EF61E1C65282F630BB30B40053AE361FF94BA4F94137DEA5D02AA9DFACE448C720
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2555584235.00007FF792321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF792320000, based on PE: true
                • Associated: 00000000.00000002.2555558138.00007FF792320000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2555609498.00007FF792328000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2555625467.00007FF79232A000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff792320000_mG31YklE0k.jbxd
                Yara matches
                Similarity
                • API ID: ErrorLastrecvselect
                • String ID:
                • API String ID: 2792163092-0
                • Opcode ID: 5fc93c11fa2c1f7786afaa37de16675dca183815d4d8ea10c6b54cbc3c1290db
                • Instruction ID: 618715ee29f484961951ee2d91b29bd66393cd36b541ef8974904d7e37c39b60
                • Opcode Fuzzy Hash: 5fc93c11fa2c1f7786afaa37de16675dca183815d4d8ea10c6b54cbc3c1290db
                • Instruction Fuzzy Hash: 0A21B3A160C78281F774BB75A94437AA251AF85794F80127DFE4D82ED4DFBCD505CA10
                APIs
                Memory Dump Source
                • Source File: 00000000.00000002.2555584235.00007FF792321000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF792320000, based on PE: true
                • Associated: 00000000.00000002.2555558138.00007FF792320000.00000002.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2555609498.00007FF792328000.00000004.00000001.01000000.00000003.sdmpDownload File
                • Associated: 00000000.00000002.2555625467.00007FF79232A000.00000002.00000001.01000000.00000003.sdmpDownload File
                Joe Sandbox IDA Plugin
                • Snapshot File: hcaresult_0_2_7ff792320000_mG31YklE0k.jbxd
                Yara matches
                Similarity
                • API ID: CurrentProcess$ExitThread
                • String ID:
                • API String ID: 2249902822-0
                • Opcode ID: 95b05f36fe5a8d2e56da26327f11ad70a9561a9186ee40ff299f0a290bec8e87
                • Instruction ID: 33f2555c54755f3b7d03c7a2a2d3b75d5e8533b18fcc48805d9d8d703454250b
                • Opcode Fuzzy Hash: 95b05f36fe5a8d2e56da26327f11ad70a9561a9186ee40ff299f0a290bec8e87
                • Instruction Fuzzy Hash: CDE0EC61E1891A82F7247771E85C238A321BF18B21F84417CC519063A4DEAC789AC310