Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
a.exe

Overview

General Information

Sample name:a.exe
Analysis ID:1473196
MD5:19aff0a43f80919a6113020d3ff38300
SHA1:f0db6e0967c534fa0326c9db009d0f22e0112a6b
SHA256:de19e0163af15585c305f845b90262aee3c2bdf037f9fc733d3f1b379d00edd0
Tags:exemeeting-equitaligaiustizia-it
Infos:

Detection

Score:76
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
AI detected suspicious sample
Machine Learning detection for sample
PE file has a writeable .text section
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to read the PEB
Detected non-DNS traffic on DNS port
Detected potential crypto function
IP address seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
PE file contains an invalid checksum
PE file does not import any functions
Sample execution stops while process was sleeping (likely an evasion)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • a.exe (PID: 6516 cmdline: "C:\Users\user\Desktop\a.exe" MD5: 19AFF0A43F80919A6113020D3FF38300)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
0.2.a.exe.400000.0.unpackPirpi_1609_ADetects Pirpi Backdoor - and other malware (generic rule)Florian Roth
  • 0x460:$op1: 74 08 C1 CB 0D 03 DA 40 EB
  • 0x44a:$op2: 03 F5 56 8B 76 20 03 F5 33 C9 49
  • 0x472:$op3: 03 DD 66 8B 0C 4B 8B 5E 1C 03 DD 8B 04 8B 03 C5
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: a.exeAvira: detected
Source: a.exeVirustotal: Detection: 75%Perma Link
Source: a.exeReversingLabs: Detection: 73%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 95.9% probability
Source: a.exeJoe Sandbox ML: detected
Source: a.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: unknownHTTPS traffic detected: 52.165.165.26:443 -> 192.168.2.4:49730 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.68.123.157:443 -> 192.168.2.4:59159 version: TLS 1.2
Source: global trafficTCP traffic: 192.168.2.4:60099 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.4:53727 -> 1.1.1.1:53
Source: global trafficTCP traffic: 192.168.2.4:59157 -> 162.159.36.2:53
Source: Joe Sandbox ViewIP Address: 173.222.162.32 173.222.162.32
Source: Joe Sandbox ViewJA3 fingerprint: 28a2c9bd18a11de089ef85a160da29e4
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.32
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.32
Source: unknownTCP traffic detected without corresponding DNS query: 173.222.162.32
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 52.165.165.26
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknownTCP traffic detected without corresponding DNS query: 40.68.123.157
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: C:\Users\user\Desktop\a.exeCode function: 0_2_0042AB7A socket,bind,ioctlsocket,recv,0_2_0042AB7A
Source: global trafficHTTP traffic detected: GET /SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=BKYog6EU1eMYTXH&MD=Y78V3DYp HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33Host: slscr.update.microsoft.com
Source: global trafficHTTP traffic detected: GET /SLS/%7BE7A50285-D08D-499D-9FF8-180FDC2332BC%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=BKYog6EU1eMYTXH&MD=Y78V3DYp HTTP/1.1Connection: Keep-AliveAccept: */*User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33Host: slscr.update.microsoft.com
Source: global trafficDNS traffic detected: DNS query: themicrosoftnow.com
Source: a.exe, 00000000.00000002.3510834715.000000000049E000.00000004.00000020.00020000.00000000.sdmp, a.exe, 00000000.00000002.3510834715.00000000004D4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://themicrosoftnow.com/?q=17e314a1
Source: a.exe, 00000000.00000002.3510834715.00000000004D4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://themicrosoftnow.com/?q=17e314a1O
Source: a.exe, 00000000.00000002.3510834715.00000000004D4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://themicrosoftnow.com/?q=17e314a2
Source: a.exe, 00000000.00000002.3510834715.00000000004D4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://themicrosoftnow.com/?q=17e314a2?
Source: a.exe, 00000000.00000002.3510834715.00000000004D4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://themicrosoftnow.com/?q=17e314a2F
Source: a.exe, 00000000.00000002.3510834715.00000000004D4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://themicrosoftnow.com/?q=17e314a2ON)Cu
Source: a.exe, 00000000.00000002.3510834715.00000000004D4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://themicrosoftnow.com/?q=17e314a2g
Source: a.exe, 00000000.00000002.3510834715.00000000004D4000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://themicrosoftnow.com/?q=17e314a2o)bu
Source: unknownNetwork traffic detected: HTTP traffic on port 49675 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 49672 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49730
Source: unknownNetwork traffic detected: HTTP traffic on port 49730 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49672
Source: unknownNetwork traffic detected: HTTP traffic on port 59159 -> 443
Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 59159
Source: unknownHTTPS traffic detected: 52.165.165.26:443 -> 192.168.2.4:49730 version: TLS 1.2
Source: unknownHTTPS traffic detected: 40.68.123.157:443 -> 192.168.2.4:59159 version: TLS 1.2

System Summary

barindex
Source: 0.2.a.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Pirpi Backdoor - and other malware (generic rule) Author: Florian Roth
Source: a.exeStatic PE information: Section: .text IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
Source: C:\Users\user\Desktop\a.exeCode function: 0_2_00428C160_2_00428C16
Source: C:\Users\user\Desktop\a.exeCode function: 0_2_004291A90_2_004291A9
Source: C:\Users\user\Desktop\a.exeCode function: 0_2_004286720_2_00428672
Source: C:\Users\user\Desktop\a.exeCode function: 0_2_0042E3D10_2_0042E3D1
Source: C:\Users\user\Desktop\a.exeCode function: 0_2_004297950_2_00429795
Source: a.exeStatic PE information: No import functions for PE file found
Source: a.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
Source: 0.2.a.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Pirpi_1609_A date = 2016-09-08, hash2 = 8caa179ec20b6e3938d17132980e0b9fe8ef753a70052f7e857b339427eb0f78, hash1 = 2a5a0bc350e774bd784fc25090518626b65a3ce10c7401f44a1616ea2ae32f4c, author = Florian Roth, description = Detects Pirpi Backdoor - and other malware (generic rule), reference = http://goo.gl/igxLyF, license = https://creativecommons.org/licenses/by-nc/4.0/
Source: a.exeStatic PE information: Section: .text IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
Source: a.exeStatic PE information: Section .text
Source: classification engineClassification label: mal76.winEXE@1/0@2/9
Source: C:\Users\user\Desktop\a.exeCode function: 0_2_0042C51A CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,FindCloseChangeNotification,0_2_0042C51A
Source: C:\Users\user\Desktop\a.exeMutant created: \Sessions\1\BaseNamedObjects\__user__
Source: a.exeStatic PE information: Section: .text IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
Source: C:\Users\user\Desktop\a.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: a.exeVirustotal: Detection: 75%
Source: a.exeReversingLabs: Detection: 73%
Source: C:\Users\user\Desktop\a.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\a.exeSection loaded: advpack.dllJump to behavior
Source: C:\Users\user\Desktop\a.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\a.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\a.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\a.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\a.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\a.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\a.exeSection loaded: msvcrt40.dllJump to behavior
Source: C:\Users\user\Desktop\a.exeSection loaded: napinsp.dllJump to behavior
Source: C:\Users\user\Desktop\a.exeSection loaded: pnrpnsp.dllJump to behavior
Source: C:\Users\user\Desktop\a.exeSection loaded: wshbth.dllJump to behavior
Source: C:\Users\user\Desktop\a.exeSection loaded: nlaapi.dllJump to behavior
Source: C:\Users\user\Desktop\a.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\a.exeSection loaded: winrnr.dllJump to behavior
Source: C:\Users\user\Desktop\a.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\a.exeSection loaded: iertutil.dllJump to behavior
Source: C:\Users\user\Desktop\a.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\a.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\a.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\a.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\a.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\a.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\a.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\a.exeSection loaded: urlmon.dllJump to behavior
Source: C:\Users\user\Desktop\a.exeSection loaded: srvcli.dllJump to behavior
Source: C:\Users\user\Desktop\a.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\a.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\a.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
Source: a.exeStatic PE information: real checksum: 0x17fb2 should be: 0xffd3
Source: C:\Users\user\Desktop\a.exeCode function: 0_2_00401000 push esp; retf 91AFh0_2_004012A7
Source: C:\Users\user\Desktop\a.exeCode function: 0_2_00420D68 push ebx; retf 0000h0_2_00420D69
Source: C:\Users\user\Desktop\a.exeCode function: 0_2_00420E18 pushad ; iretd 0_2_00420E19
Source: C:\Users\user\Desktop\a.exeCode function: 0_2_0042FEE0 push eax; ret 0_2_0042FF0E
Source: C:\Users\user\Desktop\a.exeCode function: 0_2_00420B7D push cs; retn 0000h0_2_00420C1D
Source: a.exeStatic PE information: section name: .text entropy: 7.9026165840806435
Source: C:\Users\user\Desktop\a.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\a.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\a.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
Source: C:\Users\user\Desktop\a.exeCode function: 0_2_00426CD0 rdtsc 0_2_00426CD0
Source: C:\Users\user\Desktop\a.exeLast function: Thread delayed
Source: a.exe, 00000000.00000002.3510834715.000000000049E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Users\user\Desktop\a.exeProcess information queried: ProcessInformationJump to behavior
Source: C:\Users\user\Desktop\a.exeCode function: 0_2_00426CD0 rdtsc 0_2_00426CD0
Source: C:\Users\user\Desktop\a.exeCode function: 0_2_004269AE LdrLoadDll,0_2_004269AE
Source: C:\Users\user\Desktop\a.exeCode function: 0_2_0040122B mov eax, dword ptr fs:[00000030h]0_2_0040122B
Source: C:\Users\user\Desktop\a.exeCode function: 0_2_00426963 mov eax, dword ptr fs:[00000030h]0_2_00426963
Source: C:\Users\user\Desktop\a.exeCode function: 0_2_00426990 mov eax, dword ptr fs:[00000030h]0_2_00426990
Source: a.exe, 00000000.00000002.3511147119.00000000023F0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 06:49:07 - Check: explorer.exe 2580 Shell_TrayWnd
Source: a.exe, 00000000.00000002.3511147119.00000000023F0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 06:49:08 - Check: explorer.exe 2580 Shell_TrayWnd
Source: a.exe, 00000000.00000002.3511147119.00000000023F0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 06:49:06 - Check: explorer.exe 2580 Shell_TrayWnd
Source: a.exe, 00000000.00000002.3511147119.00000000023F0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 06:49:09 - Check: explorer.exe 2580 Shell_TrayWnd
Source: a.exe, 00000000.00000002.3511147119.00000000023F0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 06:49:08 - Check: explorer.exe 2580 Progman Program Manager
Source: a.exe, 00000000.00000002.3511147119.00000000023F0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 06:49:06 - Check: explorer.exe 2580 Progman Program Manager
Source: a.exe, 00000000.00000002.3511147119.00000000023F0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 06:49:07 - Check: explorer.exe 2580 Progman Program Manager
Source: a.exe, 00000000.00000002.3511147119.00000000023F0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 06:49:10 - Check: explorer.exe 2580 Progman Program Manager
Source: a.exe, 00000000.00000002.3511147119.00000000023F0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 06:49:09 - Check: explorer.exe 2580 Progman Program Manager
Source: a.exe, 00000000.00000002.3511147119.00000000023F0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 06:49:05 - Check: explorer.exe 2580 Progman Program Manager
Source: a.exe, 00000000.00000002.3511147119.00000000023F0000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: 06:49:10 - Check: explorer.exe 2580 Shell_TrayWnd
Source: C:\Users\user\Desktop\a.exeCode function: 0_2_0042AB7A socket,bind,ioctlsocket,recv,0_2_0042AB7A
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
2
Software Packing
OS Credential Dumping11
Security Software Discovery
Remote Services1
Archive Collected Data
11
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Process Injection
LSASS Memory3
Process Discovery
Remote Desktop ProtocolData from Removable Media2
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager1
System Information Discovery
SMB/Windows Admin SharesData from Network Shared Drive3
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook2
Obfuscated Files or Information
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput Capture2
Ingress Tool Transfer
Traffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
a.exe76%VirustotalBrowse
a.exe74%ReversingLabsWin32.Trojan.Leonem
a.exe100%AviraHEUR/AGEN.1318542
a.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
themicrosoftnow.com1%VirustotalBrowse
SourceDetectionScannerLabelLink
http://themicrosoftnow.com/?q=17e314a1O0%Avira URL Cloudsafe
http://themicrosoftnow.com/?q=17e314a10%Avira URL Cloudsafe
http://themicrosoftnow.com/?q=17e314a2ON)Cu0%Avira URL Cloudsafe
http://themicrosoftnow.com/?q=17e314a20%Avira URL Cloudsafe
http://themicrosoftnow.com/?q=17e314a2?0%Avira URL Cloudsafe
http://themicrosoftnow.com/?q=17e314a2F0%Avira URL Cloudsafe
http://themicrosoftnow.com/?q=17e314a2o)bu0%Avira URL Cloudsafe
http://themicrosoftnow.com/?q=17e314a2g0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
themicrosoftnow.com
unknown
unknownfalseunknown
NameSourceMaliciousAntivirus DetectionReputation
http://themicrosoftnow.com/?q=17e314a1Oa.exe, 00000000.00000002.3510834715.00000000004D4000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://themicrosoftnow.com/?q=17e314a1a.exe, 00000000.00000002.3510834715.000000000049E000.00000004.00000020.00020000.00000000.sdmp, a.exe, 00000000.00000002.3510834715.00000000004D4000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://themicrosoftnow.com/?q=17e314a2a.exe, 00000000.00000002.3510834715.00000000004D4000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://themicrosoftnow.com/?q=17e314a2?a.exe, 00000000.00000002.3510834715.00000000004D4000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://themicrosoftnow.com/?q=17e314a2ON)Cua.exe, 00000000.00000002.3510834715.00000000004D4000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://themicrosoftnow.com/?q=17e314a2Fa.exe, 00000000.00000002.3510834715.00000000004D4000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://themicrosoftnow.com/?q=17e314a2o)bua.exe, 00000000.00000002.3510834715.00000000004D4000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
http://themicrosoftnow.com/?q=17e314a2ga.exe, 00000000.00000002.3510834715.00000000004D4000.00000004.00000020.00020000.00000000.sdmpfalse
  • Avira URL Cloud: safe
unknown
  • No. of IPs < 25%
  • 25% < No. of IPs < 50%
  • 50% < No. of IPs < 75%
  • 75% < No. of IPs
IPDomainCountryFlagASNASN NameMalicious
52.165.165.26
unknownUnited States
8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
40.68.123.157
unknownUnited States
8075MICROSOFT-CORP-MSN-AS-BLOCKUSfalse
173.222.162.32
unknownUnited States
35994AKAMAI-ASUSfalse
IP
192.168.2.1
192.168.2.8
192.168.2.7
192.168.2.4
192.168.2.6
192.168.2.5
Joe Sandbox version:40.0.0 Tourmaline
Analysis ID:1473196
Start date and time:2024-07-15 07:47:50 +02:00
Joe Sandbox product:CloudBasic
Overall analysis duration:0h 5m 15s
Hypervisor based Inspection enabled:false
Report type:full
Cookbook file name:default.jbs
Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
Run name:Run with higher sleep bypass
Number of analysed new started processes analysed:5
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Sample name:a.exe
Detection:MAL
Classification:mal76.winEXE@1/0@2/9
EGA Information:
  • Successful, ratio: 100%
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 23
  • Number of non-executed functions: 12
Cookbook Comments:
  • Found application associated with file extension: .exe
  • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
  • Excluded IPs from analysis (whitelisted): 93.184.221.240, 192.229.221.95
  • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, d.3.0.0.0.0.0.0.0.0.0.0.0.0.0.0.7.0.0.0.8.0.4.0.0.3.0.1.3.0.6.2.ip6.arpa, fe3cr.delivery.mp.microsoft.com
  • Not all processes where analyzed, report is missing behavior information
  • Report size getting too big, too many NtOpenKeyEx calls found.
  • Report size getting too big, too many NtQueryValueKey calls found.
No simulations
MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
52.165.165.26b6HXTGQmJN.exeGet hashmaliciousAmadey, Babadeda, Glupteba, Mystic Stealer, RedLine, SmokeLoader, zgRATBrowse
    40.68.123.157file.exeGet hashmaliciousAmadey, RisePro StealerBrowse
      173.222.162.32RgZaLjgCto.exeGet hashmaliciousTinbaBrowse
        JRDpxoBkBJ.exeGet hashmaliciousNotPetyaBrowse
          smartsscreen.exeGet hashmaliciousXmrigBrowse
            java.exeGet hashmaliciousTinbaBrowse
              java.exeGet hashmaliciousTinbaBrowse
                java.exeGet hashmaliciousTinbaBrowse
                  p2pWin.exeGet hashmaliciousPetya / NotPetya, MimikatzBrowse
                    No context
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    MICROSOFT-CORP-MSN-AS-BLOCKUSfile-sample_100kB.docGet hashmaliciousUnknownBrowse
                    • 13.107.246.60
                    My Info Tech Partner Executed Agreement Docs#186231(Revised).pdfGet hashmaliciousHTMLPhisherBrowse
                    • 20.190.159.75
                    botx.mpsl.elfGet hashmaliciousMiraiBrowse
                    • 51.139.222.6
                    botx.x86.elfGet hashmaliciousMiraiBrowse
                    • 20.36.42.245
                    botx.mips.elfGet hashmaliciousMiraiBrowse
                    • 51.152.245.210
                    s6ue6dcFAI.exeGet hashmaliciousBabadedaBrowse
                    • 20.96.153.111
                    JblYqEneyY.exeGet hashmaliciousBabadedaBrowse
                    • 20.96.153.111
                    s6ue6dcFAI.exeGet hashmaliciousBabadedaBrowse
                    • 94.245.104.56
                    185.208.158.215-mips-2024-07-14T08_54_05.elfGet hashmaliciousUnknownBrowse
                    • 20.115.182.79
                    MICROSOFT-CORP-MSN-AS-BLOCKUSfile-sample_100kB.docGet hashmaliciousUnknownBrowse
                    • 13.107.246.60
                    My Info Tech Partner Executed Agreement Docs#186231(Revised).pdfGet hashmaliciousHTMLPhisherBrowse
                    • 20.190.159.75
                    botx.mpsl.elfGet hashmaliciousMiraiBrowse
                    • 51.139.222.6
                    botx.x86.elfGet hashmaliciousMiraiBrowse
                    • 20.36.42.245
                    botx.mips.elfGet hashmaliciousMiraiBrowse
                    • 51.152.245.210
                    s6ue6dcFAI.exeGet hashmaliciousBabadedaBrowse
                    • 20.96.153.111
                    JblYqEneyY.exeGet hashmaliciousBabadedaBrowse
                    • 20.96.153.111
                    s6ue6dcFAI.exeGet hashmaliciousBabadedaBrowse
                    • 94.245.104.56
                    185.208.158.215-mips-2024-07-14T08_54_05.elfGet hashmaliciousUnknownBrowse
                    • 20.115.182.79
                    AKAMAI-ASUS00#U2800.exeGet hashmaliciousPython StealerBrowse
                    • 23.47.168.24
                    My Info Tech Partner Executed Agreement Docs#186231(Revised).pdfGet hashmaliciousHTMLPhisherBrowse
                    • 2.19.244.159
                    https://shell-shiny-spectrum.glitch.me/public/CcNfN0.HTMGet hashmaliciousHTMLPhisherBrowse
                    • 23.50.131.157
                    https://lnky.ru/rhrwtGet hashmaliciousUnknownBrowse
                    • 2.16.202.113
                    botx.x86.elfGet hashmaliciousMiraiBrowse
                    • 23.210.234.238
                    botx.mips.elfGet hashmaliciousMiraiBrowse
                    • 104.78.68.129
                    https://lnky.ru/qqj9vGet hashmaliciousUnknownBrowse
                    • 2.19.126.133
                    http://coffeeroasting.co.th/Get hashmaliciousUnknownBrowse
                    • 23.223.209.21
                    http://lnky.ru/82s0tGet hashmaliciousUnknownBrowse
                    • 88.221.169.65
                    Setup.exeGet hashmaliciousAsyncRAT, HTMLPhisher, Clipboard Hijacker, Phorpiex, PureLog Stealer, Raccoon Stealer v2, RedLineBrowse
                    • 184.28.90.27
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    28a2c9bd18a11de089ef85a160da29e4file-sample_100kB.docGet hashmaliciousUnknownBrowse
                    • 52.165.165.26
                    • 40.68.123.157
                    https://abu.usaday.biz/favicon.icoGet hashmaliciousUnknownBrowse
                    • 52.165.165.26
                    • 40.68.123.157
                    http://khalidhost.loseyourip.com:777/dddd.mp4Get hashmaliciousUnknownBrowse
                    • 52.165.165.26
                    • 40.68.123.157
                    http://teligeam.cam/Get hashmaliciousUnknownBrowse
                    • 52.165.165.26
                    • 40.68.123.157
                    http://ipfs.io/ipfs/bafybeidnyrv32bguoxmjyjmacd3ry2ldez34oxvmsn7neqkhso4nh4pcqe/Get hashmaliciousUnknownBrowse
                    • 52.165.165.26
                    • 40.68.123.157
                    http://arijitarz.github.io/netflix/Get hashmaliciousUnknownBrowse
                    • 52.165.165.26
                    • 40.68.123.157
                    https://pttgov-gw.top/help/Get hashmaliciousUnknownBrowse
                    • 52.165.165.26
                    • 40.68.123.157
                    https://yasmeen1211.github.io/Video-Streaming-PlatformGet hashmaliciousUnknownBrowse
                    • 52.165.165.26
                    • 40.68.123.157
                    https://bhaiqori.github.io/review-meta-serviceGet hashmaliciousUnknownBrowse
                    • 52.165.165.26
                    • 40.68.123.157
                    No context
                    No created / dropped files found
                    File type:PE32 executable (GUI) Intel 80386, for MS Windows
                    Entropy (8bit):7.884079926004798
                    TrID:
                    • Win32 Executable (generic) a (10002005/4) 99.96%
                    • Generic Win/DOS Executable (2004/3) 0.02%
                    • DOS Executable Generic (2002/1) 0.02%
                    File name:a.exe
                    File size:35'328 bytes
                    MD5:19aff0a43f80919a6113020d3ff38300
                    SHA1:f0db6e0967c534fa0326c9db009d0f22e0112a6b
                    SHA256:de19e0163af15585c305f845b90262aee3c2bdf037f9fc733d3f1b379d00edd0
                    SHA512:bbd6b4fdf3aea24aa66b6e17b778596c86260f76b7d0502fe5339dc198d30c4314d18eb8121ec07995ea86d461c9bf0985c436b3c65b0001b357305a1e457e27
                    SSDEEP:768:TLlw6CpA/0H9QoiMLD7aBzE/BMR35hUJtwjxI1VFA:TZMgu9QFM7x/BOpCExI7FA
                    TLSH:B5F2E175AEA61746CAECDF38DDB97F31503CE1D63A280A3C8CC879D76CA1B47A160584
                    File Content Preview:MZl.....................@.......Win32 Program!..$......!.L.!`...GoLink www.GoDevTool.com........PE..L......f..........................................@........................................................................................................
                    Icon Hash:90cececece8e8eb0
                    Entrypoint:0x401000
                    Entrypoint Section:.text
                    Digitally signed:false
                    Imagebase:0x400000
                    Subsystem:windows gui
                    Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                    DLL Characteristics:
                    Time Stamp:0x6686D5B5 [Thu Jul 4 17:02:45 2024 UTC]
                    TLS Callbacks:
                    CLR (.Net) Version:
                    OS Version Major:4
                    OS Version Minor:0
                    File Version Major:4
                    File Version Minor:0
                    Subsystem Version Major:4
                    Subsystem Version Minor:0
                    Import Hash:
                    Instruction
                    xor ecx, ecx
                    jmp 00007F564526EBF4h
                    jmp 00007F564526EBF7h
                    call 00007F564526EBEEh
                    pop eax
                    add eax, 11h
                    xor byte ptr [eax], 0000006Ah
                    inc eax
                    inc ecx
                    cmp ecx, 00008757h
                    jne 00007F564526EBE5h
                    sub edx, 68h
                    push 0000006Ah
                    jmp 00007F568460667Bh
                    cmp al, 59h
                    xchg dword ptr [4E4E16E1h], edi
                    jecxz 00007F564526EBF8h
                    dec esi
                    jle 00007F564526EBD5h
                    push es
                    dec esi
                    jc 00007F564526EBD5h
                    push es
                    dec esi
                    jp 00007F564526EB9Fh
                    dec esi
                    jbe 00007F564526EC5Dh
                    push 0000006Ah
                    push FFFFFFE7h
                    dec esi
                    jp 00007F564526EBD9h
                    dec esi
                    jle 00007F564526EC2Ch
                    cmp eax, 4A4E3EE7h
                    cmp edi, dword ptr [eax]
                    add byte ptr [ebx+ebp*2], 0000006Ah
                    push FFFFFFEFh
                    stosb
                    push ds
                    jnl 00007F564526EBD3h
                    dec esi
                    jp 00007F564526EBD3h
                    dec esi
                    inc edx
                    das
                    loopne 00007F564526EC58h
                    push edx
                    sub ah, dl
                    inc eax
                    xchg eax, ebp
                    jecxz 00007F564526EC20h
                    dec esi
                    jp 00007F564526EB73h
                    mov edx, 6A6A6BD4h
                    push FFFFFFE7h
                    dec esi
                    jp 00007F564526EBD9h
                    dec esi
                    jle 00007F564526EC2Ch
                    cmp eax, 4A4E3EE7h
                    cmp edi, dword ptr [eax]
                    adc byte ptr [ebx+6Bh], 0000006Ah
                    push FFFFFFE7h
                    pop esi
                    sbb ch, bl
                    xchg eax, esp
                    push 656B6A6Ah
                    in eax, dx
                    je 00007F564526EC5Dh
                    push 0000006Ah
                    out 2Eh, eax
                    dec esi
                    jp 00007F564526EBD9h
                    dec esi
                    jle 00007F564526EC2Ch
                    cmp eax, 4A4E3EE7h
                    cmp edi, dword ptr [eax]
                    cmp byte ptr [edi+6Bh], 0000006Ah
                    push FFFFFFEFh
                    stosb
                    pop ds
                    jno 00007F564526EBD9h
                    dec esi
                    jp 00007F564526EBD9h
                    dec esi
                    jle 00007F564526EC2Ch
                    cmp eax, 4A4E3EE7h
                    cmp edi, dword ptr [eax]
                    adc byte ptr [esi+00006A6Ah], 00000000h
                    NameVirtual AddressVirtual Size Is in Section
                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x00x0
                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IAT0x00x0
                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                    .text0x10000x87800x8800c0d261c253ade4e8b44b18a8fb33f126False0.9793198529411765data7.9026165840806435IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    TimestampSource PortDest PortSource IPDest IP
                    Jul 15, 2024 07:48:34.737529993 CEST49675443192.168.2.4173.222.162.32
                    Jul 15, 2024 07:48:44.346996069 CEST49675443192.168.2.4173.222.162.32
                    Jul 15, 2024 07:48:56.932049990 CEST49672443192.168.2.4173.222.162.32
                    Jul 15, 2024 07:48:56.932152033 CEST44349672173.222.162.32192.168.2.4
                    Jul 15, 2024 07:48:57.495899916 CEST49730443192.168.2.452.165.165.26
                    Jul 15, 2024 07:48:57.495944977 CEST4434973052.165.165.26192.168.2.4
                    Jul 15, 2024 07:48:57.496000051 CEST49730443192.168.2.452.165.165.26
                    Jul 15, 2024 07:48:57.500076056 CEST49730443192.168.2.452.165.165.26
                    Jul 15, 2024 07:48:57.500097990 CEST4434973052.165.165.26192.168.2.4
                    Jul 15, 2024 07:48:58.194803953 CEST4434973052.165.165.26192.168.2.4
                    Jul 15, 2024 07:48:58.194900990 CEST49730443192.168.2.452.165.165.26
                    Jul 15, 2024 07:48:58.197336912 CEST49730443192.168.2.452.165.165.26
                    Jul 15, 2024 07:48:58.197344065 CEST4434973052.165.165.26192.168.2.4
                    Jul 15, 2024 07:48:58.197655916 CEST4434973052.165.165.26192.168.2.4
                    Jul 15, 2024 07:48:58.253057003 CEST49730443192.168.2.452.165.165.26
                    Jul 15, 2024 07:48:58.938100100 CEST49730443192.168.2.452.165.165.26
                    Jul 15, 2024 07:48:58.980503082 CEST4434973052.165.165.26192.168.2.4
                    Jul 15, 2024 07:48:59.169495106 CEST4434973052.165.165.26192.168.2.4
                    Jul 15, 2024 07:48:59.169516087 CEST4434973052.165.165.26192.168.2.4
                    Jul 15, 2024 07:48:59.169523954 CEST4434973052.165.165.26192.168.2.4
                    Jul 15, 2024 07:48:59.169564962 CEST4434973052.165.165.26192.168.2.4
                    Jul 15, 2024 07:48:59.169594049 CEST49730443192.168.2.452.165.165.26
                    Jul 15, 2024 07:48:59.169596910 CEST4434973052.165.165.26192.168.2.4
                    Jul 15, 2024 07:48:59.169612885 CEST4434973052.165.165.26192.168.2.4
                    Jul 15, 2024 07:48:59.169632912 CEST4434973052.165.165.26192.168.2.4
                    Jul 15, 2024 07:48:59.169657946 CEST49730443192.168.2.452.165.165.26
                    Jul 15, 2024 07:48:59.169712067 CEST49730443192.168.2.452.165.165.26
                    Jul 15, 2024 07:48:59.169747114 CEST4434973052.165.165.26192.168.2.4
                    Jul 15, 2024 07:48:59.169807911 CEST49730443192.168.2.452.165.165.26
                    Jul 15, 2024 07:48:59.169815063 CEST4434973052.165.165.26192.168.2.4
                    Jul 15, 2024 07:48:59.170171976 CEST4434973052.165.165.26192.168.2.4
                    Jul 15, 2024 07:48:59.170308113 CEST49730443192.168.2.452.165.165.26
                    Jul 15, 2024 07:48:59.829463959 CEST49730443192.168.2.452.165.165.26
                    Jul 15, 2024 07:48:59.829500914 CEST4434973052.165.165.26192.168.2.4
                    Jul 15, 2024 07:48:59.829523087 CEST49730443192.168.2.452.165.165.26
                    Jul 15, 2024 07:48:59.829529047 CEST4434973052.165.165.26192.168.2.4
                    Jul 15, 2024 07:49:01.037134886 CEST6009953192.168.2.41.1.1.1
                    Jul 15, 2024 07:49:01.044955015 CEST53600991.1.1.1192.168.2.4
                    Jul 15, 2024 07:49:01.045764923 CEST6009953192.168.2.41.1.1.1
                    Jul 15, 2024 07:49:01.053461075 CEST53600991.1.1.1192.168.2.4
                    Jul 15, 2024 07:49:01.565610886 CEST6009953192.168.2.41.1.1.1
                    Jul 15, 2024 07:49:02.059673071 CEST6009953192.168.2.41.1.1.1
                    Jul 15, 2024 07:49:02.065232038 CEST53600991.1.1.1192.168.2.4
                    Jul 15, 2024 07:49:02.065340996 CEST6009953192.168.2.41.1.1.1
                    Jul 15, 2024 07:49:15.136529922 CEST5372753192.168.2.41.1.1.1
                    Jul 15, 2024 07:49:15.141520977 CEST53537271.1.1.1192.168.2.4
                    Jul 15, 2024 07:49:15.141758919 CEST5372753192.168.2.41.1.1.1
                    Jul 15, 2024 07:49:15.146809101 CEST53537271.1.1.1192.168.2.4
                    Jul 15, 2024 07:49:15.659360886 CEST5372753192.168.2.41.1.1.1
                    Jul 15, 2024 07:49:15.724463940 CEST5372753192.168.2.41.1.1.1
                    Jul 15, 2024 07:49:15.729790926 CEST53537271.1.1.1192.168.2.4
                    Jul 15, 2024 07:49:15.729877949 CEST5372753192.168.2.41.1.1.1
                    Jul 15, 2024 07:49:28.293047905 CEST5915753192.168.2.4162.159.36.2
                    Jul 15, 2024 07:49:28.298058033 CEST5359157162.159.36.2192.168.2.4
                    Jul 15, 2024 07:49:28.298233986 CEST5915753192.168.2.4162.159.36.2
                    Jul 15, 2024 07:49:28.303365946 CEST5359157162.159.36.2192.168.2.4
                    Jul 15, 2024 07:49:28.753206015 CEST5915753192.168.2.4162.159.36.2
                    Jul 15, 2024 07:49:28.758687019 CEST5359157162.159.36.2192.168.2.4
                    Jul 15, 2024 07:49:28.758814096 CEST5915753192.168.2.4162.159.36.2
                    Jul 15, 2024 07:49:28.872648954 CEST59159443192.168.2.440.68.123.157
                    Jul 15, 2024 07:49:28.872692108 CEST4435915940.68.123.157192.168.2.4
                    Jul 15, 2024 07:49:28.873020887 CEST59159443192.168.2.440.68.123.157
                    Jul 15, 2024 07:49:28.874198914 CEST59159443192.168.2.440.68.123.157
                    Jul 15, 2024 07:49:28.874213934 CEST4435915940.68.123.157192.168.2.4
                    Jul 15, 2024 07:49:29.655755043 CEST4435915940.68.123.157192.168.2.4
                    Jul 15, 2024 07:49:29.655901909 CEST59159443192.168.2.440.68.123.157
                    Jul 15, 2024 07:49:29.661241055 CEST59159443192.168.2.440.68.123.157
                    Jul 15, 2024 07:49:29.661257029 CEST4435915940.68.123.157192.168.2.4
                    Jul 15, 2024 07:49:29.661554098 CEST4435915940.68.123.157192.168.2.4
                    Jul 15, 2024 07:49:29.671534061 CEST59159443192.168.2.440.68.123.157
                    Jul 15, 2024 07:49:29.712512016 CEST4435915940.68.123.157192.168.2.4
                    Jul 15, 2024 07:49:29.992098093 CEST4435915940.68.123.157192.168.2.4
                    Jul 15, 2024 07:49:29.992161989 CEST4435915940.68.123.157192.168.2.4
                    Jul 15, 2024 07:49:29.992209911 CEST4435915940.68.123.157192.168.2.4
                    Jul 15, 2024 07:49:29.992505074 CEST59159443192.168.2.440.68.123.157
                    Jul 15, 2024 07:49:29.992521048 CEST4435915940.68.123.157192.168.2.4
                    Jul 15, 2024 07:49:29.992635965 CEST59159443192.168.2.440.68.123.157
                    Jul 15, 2024 07:49:29.992639065 CEST4435915940.68.123.157192.168.2.4
                    Jul 15, 2024 07:49:29.992666960 CEST4435915940.68.123.157192.168.2.4
                    Jul 15, 2024 07:49:29.992705107 CEST4435915940.68.123.157192.168.2.4
                    Jul 15, 2024 07:49:29.992772102 CEST59159443192.168.2.440.68.123.157
                    Jul 15, 2024 07:49:29.992779970 CEST4435915940.68.123.157192.168.2.4
                    Jul 15, 2024 07:49:29.993046999 CEST59159443192.168.2.440.68.123.157
                    Jul 15, 2024 07:49:29.993230104 CEST4435915940.68.123.157192.168.2.4
                    Jul 15, 2024 07:49:29.993324041 CEST59159443192.168.2.440.68.123.157
                    Jul 15, 2024 07:49:29.993355989 CEST4435915940.68.123.157192.168.2.4
                    Jul 15, 2024 07:49:29.993488073 CEST59159443192.168.2.440.68.123.157
                    Jul 15, 2024 07:49:30.007904053 CEST59159443192.168.2.440.68.123.157
                    Jul 15, 2024 07:49:30.007930994 CEST4435915940.68.123.157192.168.2.4
                    Jul 15, 2024 07:49:30.008059025 CEST59159443192.168.2.440.68.123.157
                    Jul 15, 2024 07:49:30.008068085 CEST4435915940.68.123.157192.168.2.4
                    TimestampSource PortDest PortSource IPDest IP
                    Jul 15, 2024 07:48:40.161655903 CEST6329953192.168.2.41.1.1.1
                    Jul 15, 2024 07:48:40.169413090 CEST53632991.1.1.1192.168.2.4
                    Jul 15, 2024 07:48:40.255207062 CEST5598153192.168.2.41.1.1.1
                    Jul 15, 2024 07:48:40.269239902 CEST53559811.1.1.1192.168.2.4
                    Jul 15, 2024 07:49:01.029908895 CEST53561551.1.1.1192.168.2.4
                    Jul 15, 2024 07:49:03.260839939 CEST138138192.168.2.4192.168.2.255
                    Jul 15, 2024 07:49:15.135704994 CEST53632211.1.1.1192.168.2.4
                    Jul 15, 2024 07:49:28.291702986 CEST5359773162.159.36.2192.168.2.4
                    Jul 15, 2024 07:49:28.801639080 CEST53540941.1.1.1192.168.2.4
                    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                    Jul 15, 2024 07:48:40.161655903 CEST192.168.2.41.1.1.10x47c8Standard query (0)themicrosoftnow.comA (IP address)IN (0x0001)false
                    Jul 15, 2024 07:48:40.255207062 CEST192.168.2.41.1.1.10x2978Standard query (0)themicrosoftnow.comA (IP address)IN (0x0001)false
                    • slscr.update.microsoft.com
                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    0192.168.2.44973052.165.165.26443
                    TimestampBytes transferredDirectionData
                    2024-07-15 05:48:58 UTC306OUTGET /SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=BKYog6EU1eMYTXH&MD=Y78V3DYp HTTP/1.1
                    Connection: Keep-Alive
                    Accept: */*
                    User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33
                    Host: slscr.update.microsoft.com


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    1192.168.2.44973052.165.165.264436516C:\Users\user\Desktop\a.exe
                    TimestampBytes transferredDirectionData
                    2024-07-15 05:48:59 UTC560INHTTP/1.1 200 OK
                    Cache-Control: no-cache
                    Pragma: no-cache
                    Content-Type: application/octet-stream
                    Expires: -1
                    Last-Modified: Mon, 01 Jan 0001 00:00:00 GMT
                    ETag: "XAopazV00XDWnJCwkmEWRv6JkbjRA9QSSZ2+e/3MzEk=_2880"
                    MS-CorrelationId: ead434d9-ccc4-4b22-bcbb-cc83cf238a79
                    MS-RequestId: 5124a4f2-a044-4386-87ac-e75258ee859e
                    MS-CV: j90t8wnlI0G7aGqf.0
                    X-Microsoft-SLSClientCache: 2880
                    Content-Disposition: attachment; filename=environment.cab
                    X-Content-Type-Options: nosniff
                    Date: Mon, 15 Jul 2024 05:48:58 GMT
                    Connection: close
                    Content-Length: 24490
                    2024-07-15 05:48:59 UTC15824INData Raw: 4d 53 43 46 00 00 00 00 92 1e 00 00 00 00 00 00 44 00 00 00 00 00 00 00 03 01 01 00 01 00 04 00 23 d0 00 00 14 00 00 00 00 00 10 00 92 1e 00 00 18 41 00 00 00 00 00 00 00 00 00 00 64 00 00 00 01 00 01 00 e6 42 00 00 00 00 00 00 00 00 00 00 00 00 80 00 65 6e 76 69 72 6f 6e 6d 65 6e 74 2e 63 61 62 00 78 cf 8d 5c 26 1e e6 42 43 4b ed 5c 07 54 13 db d6 4e a3 f7 2e d5 d0 3b 4c 42 af 4a 57 10 e9 20 bd 77 21 94 80 88 08 24 2a 02 02 d2 55 10 a4 a8 88 97 22 8a 0a d2 11 04 95 ae d2 8b 20 28 0a 88 20 45 05 f4 9f 80 05 bd ed dd f7 ff 77 dd f7 bf 65 d6 4a 66 ce 99 33 67 4e d9 7b 7f fb db 7b 56 f4 4d 34 b4 21 e0 a7 03 0a d9 fc 68 6e 1d 20 70 28 14 02 85 20 20 ad 61 10 08 e3 66 0d ed 66 9b 1d 6a 90 af 1f 17 f0 4b 68 35 01 83 6c fb 44 42 5c 7d 83 3d 03 30 be 3e ae be 58
                    Data Ascii: MSCFD#AdBenvironment.cabx\&BCK\TN.;LBJW w!$*U" ( EweJf3gN{{VM4!hn p( affjKh5lDB\}=0>X
                    2024-07-15 05:48:59 UTC8666INData Raw: 04 01 31 2f 30 2d 30 0a 02 05 00 e1 2b 8a 50 02 01 00 30 0a 02 01 00 02 02 12 fe 02 01 ff 30 07 02 01 00 02 02 11 e6 30 0a 02 05 00 e1 2c db d0 02 01 00 30 36 06 0a 2b 06 01 04 01 84 59 0a 04 02 31 28 30 26 30 0c 06 0a 2b 06 01 04 01 84 59 0a 03 02 a0 0a 30 08 02 01 00 02 03 07 a1 20 a1 0a 30 08 02 01 00 02 03 01 86 a0 30 0d 06 09 2a 86 48 86 f7 0d 01 01 05 05 00 03 81 81 00 0c d9 08 df 48 94 57 65 3e ad e7 f2 17 9c 1f ca 3d 4d 6c cd 51 e1 ed 9c 17 a5 52 35 0f fd de 4b bd 22 92 c5 69 e5 d7 9f 29 23 72 40 7a ca 55 9d 8d 11 ad d5 54 00 bb 53 b4 87 7b 72 84 da 2d f6 e3 2c 4f 7e ba 1a 58 88 6e d6 b9 6d 16 ae 85 5b b5 c2 81 a8 e0 ee 0a 9c 60 51 3a 7b e4 61 f8 c3 e4 38 bd 7d 28 17 d6 79 f0 c8 58 c6 ef 1f f7 88 65 b1 ea 0a c0 df f7 ee 5c 23 c2 27 fd 98 63 08 31
                    Data Ascii: 1/0-0+P000,06+Y1(0&0+Y0 00*HHWe>=MlQR5K"i)#r@zUTS{r-,O~Xnm[`Q:{a8}(yXe\#'c1


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    2192.168.2.45915940.68.123.157443
                    TimestampBytes transferredDirectionData
                    2024-07-15 05:49:29 UTC306OUTGET /SLS/%7BE7A50285-D08D-499D-9FF8-180FDC2332BC%7D/x64/10.0.19045.2006/0?CH=700&L=en-GB&P=&PT=0x30&WUA=10.0.19041.1949&MK=BKYog6EU1eMYTXH&MD=Y78V3DYp HTTP/1.1
                    Connection: Keep-Alive
                    Accept: */*
                    User-Agent: Windows-Update-Agent/10.0.10011.16384 Client-Protocol/2.33
                    Host: slscr.update.microsoft.com


                    Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                    3192.168.2.45915940.68.123.1574436516C:\Users\user\Desktop\a.exe
                    TimestampBytes transferredDirectionData
                    2024-07-15 05:49:29 UTC560INHTTP/1.1 200 OK
                    Cache-Control: no-cache
                    Pragma: no-cache
                    Content-Type: application/octet-stream
                    Expires: -1
                    Last-Modified: Mon, 01 Jan 0001 00:00:00 GMT
                    ETag: "vic+p1MiJJ+/WMnK08jaWnCBGDfvkGRzPk9f8ZadQHg=_1440"
                    MS-CorrelationId: 07e01441-7e2b-46e1-bcfb-da9facc0085f
                    MS-RequestId: 54d515d3-dff1-4fd8-85aa-3772f8a2ef8b
                    MS-CV: bwBPY7yjj0uCkB83.0
                    X-Microsoft-SLSClientCache: 1440
                    Content-Disposition: attachment; filename=environment.cab
                    X-Content-Type-Options: nosniff
                    Date: Mon, 15 Jul 2024 05:49:29 GMT
                    Connection: close
                    Content-Length: 30005
                    2024-07-15 05:49:29 UTC15824INData Raw: 4d 53 43 46 00 00 00 00 8d 2b 00 00 00 00 00 00 44 00 00 00 00 00 00 00 03 01 01 00 01 00 04 00 5b 49 00 00 14 00 00 00 00 00 10 00 8d 2b 00 00 a8 49 00 00 00 00 00 00 00 00 00 00 64 00 00 00 01 00 01 00 72 4d 00 00 00 00 00 00 00 00 00 00 00 00 80 00 65 6e 76 69 72 6f 6e 6d 65 6e 74 2e 63 61 62 00 fe f6 51 be 21 2b 72 4d 43 4b ed 7c 05 58 54 eb da f6 14 43 49 37 0a 02 d2 b9 86 0e 41 52 a4 1b 24 a5 bb 43 24 44 18 94 90 92 52 41 3a 05 09 95 ee 54 b0 00 91 2e e9 12 10 04 11 c9 6f 10 b7 a2 67 9f bd cf 3e ff b7 ff b3 bf 73 ed e1 9a 99 f5 c6 7a d7 bb de f5 3e cf fd 3c f7 dc 17 4a 1a 52 e7 41 a8 97 1e 14 f4 e5 25 7d f4 05 82 82 c1 20 30 08 06 ba c3 05 02 11 7f a9 c1 ff d2 87 5c 1e f4 ed 65 8e 7a 1f f6 0a 40 03 1d 7b f9 83 2c 1c 2f db b8 3a 39 3a 58 38 ba 73 5e
                    Data Ascii: MSCF+D[I+IdrMenvironment.cabQ!+rMCK|XTCI7AR$C$DRA:T.og>sz><JRA%} 0\ez@{,/:9:X8s^
                    2024-07-15 05:49:29 UTC14181INData Raw: 06 03 55 04 06 13 02 55 53 31 13 30 11 06 03 55 04 08 13 0a 57 61 73 68 69 6e 67 74 6f 6e 31 10 30 0e 06 03 55 04 07 13 07 52 65 64 6d 6f 6e 64 31 1e 30 1c 06 03 55 04 0a 13 15 4d 69 63 72 6f 73 6f 66 74 20 43 6f 72 70 6f 72 61 74 69 6f 6e 31 26 30 24 06 03 55 04 03 13 1d 4d 69 63 72 6f 73 6f 66 74 20 54 69 6d 65 2d 53 74 61 6d 70 20 50 43 41 20 32 30 31 30 30 1e 17 0d 32 33 31 30 31 32 31 39 30 37 32 35 5a 17 0d 32 35 30 31 31 30 31 39 30 37 32 35 5a 30 81 d2 31 0b 30 09 06 03 55 04 06 13 02 55 53 31 13 30 11 06 03 55 04 08 13 0a 57 61 73 68 69 6e 67 74 6f 6e 31 10 30 0e 06 03 55 04 07 13 07 52 65 64 6d 6f 6e 64 31 1e 30 1c 06 03 55 04 0a 13 15 4d 69 63 72 6f 73 6f 66 74 20 43 6f 72 70 6f 72 61 74 69 6f 6e 31 2d 30 2b 06 03 55 04 0b 13 24 4d 69 63 72 6f
                    Data Ascii: UUS10UWashington10URedmond10UMicrosoft Corporation1&0$UMicrosoft Time-Stamp PCA 20100231012190725Z250110190725Z010UUS10UWashington10URedmond10UMicrosoft Corporation1-0+U$Micro


                    Click to jump to process

                    Click to jump to process

                    Click to dive into process behavior distribution

                    Target ID:0
                    Start time:01:48:39
                    Start date:15/07/2024
                    Path:C:\Users\user\Desktop\a.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\Desktop\a.exe"
                    Imagebase:0x400000
                    File size:35'328 bytes
                    MD5 hash:19AFF0A43F80919A6113020D3FF38300
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:low
                    Has exited:false

                    Reset < >

                      Execution Graph

                      Execution Coverage:14.6%
                      Dynamic/Decrypted Code Coverage:98.9%
                      Signature Coverage:3.2%
                      Total number of Nodes:439
                      Total number of Limit Nodes:30
                      execution_graph 3722 401000 3723 401006 3722->3723 3726 40122b GetPEB 3723->3726 3727 401255 VirtualAlloc 3726->3727 3729 40129d 3727->3729 4229 42d3a0 4234 42a81c 4229->4234 4232 42d3c2 4233 42685e ??3@YAXPAX 4233->4232 4236 42a83b 4234->4236 4235 42a8df 4235->4232 4235->4233 4236->4235 4237 42685e ??3@YAXPAX 4236->4237 4237->4236 4113 4271c7 4116 424781 4113->4116 4117 4247ac 4116->4117 4118 424ced 2 API calls 4117->4118 4119 4247b4 4118->4119 4170 4253e5 4172 42541e 4170->4172 4171 42544c 4172->4171 4173 42605e 3 API calls 4172->4173 4173->4172 4203 426f8a 4206 426f93 4203->4206 4204 4270cc 4205 427192 4204->4205 4208 4270ff 4204->4208 4216 42685e ??3@YAXPAX 4204->4216 4207 42685e ??3@YAXPAX 4205->4207 4206->4204 4209 42685e ??3@YAXPAX 4206->4209 4207->4208 4210 427dd2 ??3@YAXPAX 4208->4210 4211 4270ab 4209->4211 4212 4271c3 4210->4212 4213 428513 ??3@YAXPAX 4211->4213 4214 4270ba 4213->4214 4215 42685e ??3@YAXPAX 4214->4215 4215->4204 4216->4204 4174 4274eb 4175 427505 4174->4175 4180 42a045 4175->4180 4177 427536 4178 42685e ??3@YAXPAX 4177->4178 4179 427553 4178->4179 4183 42a3b0 4180->4183 4184 427bd8 3 API calls 4183->4184 4185 42a056 4184->4185 4185->4177 4089 422a68 4090 422a75 4089->4090 4091 42686f new[] 2 API calls 4090->4091 4092 422a81 4091->4092 4217 423689 4218 42369a 4217->4218 4219 423626 ??3@YAXPAX 4218->4219 4220 4236b0 4219->4220 4221 42353f 2 API calls 4220->4221 4222 4236bc 4221->4222 4053 42454e 4055 42458a 4053->4055 4054 424711 4055->4054 4057 424800 4055->4057 4058 42480f 4057->4058 4074 424818 4057->4074 4059 424956 4058->4059 4060 42484c 4058->4060 4058->4074 4061 4233d3 2 API calls 4059->4061 4077 4233d3 4060->4077 4075 42494d 4061->4075 4063 424862 4066 42493f 4063->4066 4067 4233d3 2 API calls 4063->4067 4063->4074 4064 424c8b 4065 424ca0 3 API calls 4064->4065 4065->4074 4081 423626 4066->4081 4067->4066 4069 42686f LoadLibraryW malloc new[] 4069->4075 4070 424ab7 4071 4267ca ??3@YAXPAX 4070->4071 4072 424ac0 4071->4072 4073 424ca0 3 API calls 4072->4073 4073->4074 4074->4055 4075->4064 4075->4069 4075->4070 4075->4074 4076 4267ca ??3@YAXPAX 4075->4076 4076->4075 4078 4233ed 4077->4078 4085 42353f 4078->4085 4080 423403 4080->4063 4082 42363c 4081->4082 4083 423657 4082->4083 4084 42685e ??3@YAXPAX 4082->4084 4083->4075 4084->4083 4086 423550 4085->4086 4087 4267b0 new[] 2 API calls 4086->4087 4088 423555 4086->4088 4087->4088 4088->4080 4093 429f70 4096 42a6bd 4093->4096 4097 427bd8 3 API calls 4096->4097 4098 429f83 4097->4098 4099 427e10 4100 427dd2 ??3@YAXPAX 4099->4100 4101 427e1f 4100->4101 4102 427e32 4101->4102 4103 42685e ??3@YAXPAX 4101->4103 4103->4102 4223 426990 GetPEB 4224 423790 4225 423392 ??3@YAXPAX 4224->4225 4226 42379f 4225->4226 4227 42685e ??3@YAXPAX 4226->4227 4228 4237b2 4226->4228 4227->4228 4186 4273f6 4188 427411 4186->4188 4187 427465 4189 424ca0 3 API calls 4187->4189 4188->4187 4190 427bd8 3 API calls 4188->4190 4191 4274c9 4188->4191 4192 427422 4188->4192 4189->4192 4190->4188 4191->4192 4193 424ca0 3 API calls 4191->4193 4193->4192 4109 42d117 4111 42d126 4109->4111 4110 42d202 4111->4110 4112 42b493 2 API calls 4111->4112 4112->4111 4194 4243f5 4197 424401 4194->4197 4195 424528 4196 4267ca ??3@YAXPAX 4196->4197 4197->4195 4197->4196 4120 4271da 4121 4271fa 4120->4121 4122 427230 4121->4122 4123 427205 4121->4123 4124 42722b 4122->4124 4125 4272db 4122->4125 4126 427359 4122->4126 4123->4124 4135 42a0ed 4123->4135 4130 4267b0 new[] 2 API calls 4125->4130 4128 427362 4126->4128 4129 42736c 4126->4129 4131 424ca0 3 API calls 4128->4131 4132 427bd8 3 API calls 4129->4132 4130->4124 4131->4124 4133 42738c 4132->4133 4133->4124 4134 424ca0 3 API calls 4133->4134 4134->4124 4136 42a0ff 4135->4136 4137 42a13a 4136->4137 4144 42a153 4136->4144 4151 42a108 4136->4151 4138 42a144 4137->4138 4139 42a2af 4137->4139 4138->4151 4161 42a411 4138->4161 4141 42a302 4139->4141 4142 42a32f 4139->4142 4148 42a3e1 3 API calls 4141->4148 4143 42a69b 3 API calls 4142->4143 4143->4151 4145 42a21c 4144->4145 4146 42a205 4144->4146 4147 4267b0 new[] 2 API calls 4145->4147 4155 42a69b 4146->4155 4150 42a223 4147->4150 4148->4151 4152 4267b0 new[] 2 API calls 4150->4152 4151->4124 4153 42a25a 4152->4153 4158 42a3e1 4153->4158 4156 42a6bd 3 API calls 4155->4156 4157 42a6b9 4156->4157 4157->4151 4159 42a6bd 3 API calls 4158->4159 4160 42a40b 4159->4160 4160->4151 4162 42a423 4161->4162 4164 42a431 4161->4164 4163 427e40 3 API calls 4162->4163 4163->4164 4165 42a52b 4164->4165 4166 42a5c8 4164->4166 4169 42a555 4164->4169 4168 4267b0 new[] 2 API calls 4165->4168 4167 4267b0 new[] 2 API calls 4166->4167 4167->4169 4168->4169 4169->4151 3730 42de5b 3742 426a28 3730->3742 3733 42de6c SetErrorMode 3734 42de7f 3733->3734 3747 426911 3734->3747 3735 42de87 3751 42e10d 3735->3751 3738 42dea5 CreateThread 3756 42db1a 3738->3756 4039 42db8e 3738->4039 3740 42de67 3746 426a4f 3742->3746 3743 426b3a 3743->3733 3743->3740 3745 4269ae LdrLoadDll 3745->3746 3746->3743 3746->3745 3760 426963 GetPEB 3746->3760 3748 426925 3747->3748 3749 42695a 3748->3749 3750 42694a CoInitialize 3748->3750 3749->3735 3750->3749 3761 42f08f 3751->3761 3753 42e19d 3754 42de9c 3753->3754 3755 42e32f CreateMutexW 3753->3755 3754->3738 3754->3740 3755->3754 3759 42db1d 3756->3759 3757 42db2f 3757->3740 3758 42db59 CreateThread 3758->3759 3780 42d43e 3758->3780 3759->3757 3759->3758 3760->3746 3764 42f0be 3761->3764 3763 42f0db 3763->3753 3764->3763 3766 42f177 3764->3766 3767 42686f 3764->3767 3766->3763 3772 42f2a7 3766->3772 3768 42687c LoadLibraryW 3767->3768 3771 426893 3767->3771 3768->3771 3769 4268b8 3769->3766 3770 4268a8 malloc 3770->3769 3771->3769 3771->3770 3773 42f2b0 3772->3773 3774 42f2bc 3772->3774 3776 4267ca 3773->3776 3774->3763 3777 4267d6 3776->3777 3778 4267fb ??3@YAXPAX 3777->3778 3779 426808 3777->3779 3778->3779 3779->3774 3781 42d457 3780->3781 3802 4267b0 3781->3802 3784 42d4c2 3809 42cefb 3784->3809 3788 42d627 3850 42b493 3788->3850 3789 42d4eb 3795 42d5e7 3789->3795 3799 42d648 3789->3799 3842 4230d0 3789->3842 3792 42d5c2 3793 4267ca ??3@YAXPAX 3792->3793 3793->3795 3794 424ca0 CreateThread closesocket ??3@YAXPAX 3794->3799 3846 42eb52 3795->3846 3796 42d993 3797 4267b0 new[] 2 API calls 3797->3799 3799->3794 3799->3796 3799->3797 3813 427d70 3799->3813 3818 426d33 3799->3818 3823 427743 3799->3823 3803 42686f new[] 2 API calls 3802->3803 3804 4267bd 3803->3804 3804->3784 3805 42a700 3804->3805 3806 42a72c 3805->3806 3858 42d238 3806->3858 3810 42cf31 3809->3810 3811 42cf0b 3809->3811 3810->3789 3811->3810 3812 42cf14 CreateThread 3811->3812 3812->3810 3869 42aa1e 3812->3869 3901 426e8e 3813->3901 3816 427d92 3816->3799 3817 42685e ??3@YAXPAX 3817->3816 3943 427da7 3818->3943 3820 426d44 3821 4267b0 new[] 2 API calls 3820->3821 3822 426d79 3821->3822 3822->3799 3824 427759 3823->3824 3825 4267b0 new[] 2 API calls 3824->3825 3835 42778b 3824->3835 3825->3835 3827 42788e 3828 427892 3827->3828 3829 4278c8 3827->3829 3832 42685e ??3@YAXPAX 3828->3832 3833 4278ad 3828->3833 3830 4278e3 3829->3830 3831 42685e ??3@YAXPAX 3829->3831 3970 427bd8 3830->3970 3831->3830 3832->3833 3833->3799 3954 423d97 3835->3954 3836 427928 3836->3833 3837 42f08f 3 API calls 3836->3837 3838 427a22 3837->3838 3839 427bd8 3 API calls 3838->3839 3840 427ba6 3839->3840 3840->3833 3977 424ca0 CreateThread 3840->3977 3843 4230e3 3842->3843 3845 4230dc 3842->3845 3844 42686f new[] 2 API calls 3843->3844 3844->3845 3845->3792 3847 42eb72 3846->3847 3848 42ebe5 lstrcmpiW 3847->3848 3849 42eb7e 3847->3849 3848->3849 3849->3788 3854 42b4a9 3850->3854 3851 4267b0 new[] 2 API calls 3852 42b620 3851->3852 3853 42b6e9 3852->3853 3855 4267b0 new[] 2 API calls 3852->3855 3853->3799 3854->3851 3854->3852 3856 42b6b2 3855->3856 3857 42b493 2 API calls 3856->3857 3857->3853 3859 42d272 3858->3859 3860 4267b0 new[] 2 API calls 3859->3860 3865 42a802 3859->3865 3861 42d298 3860->3861 3862 42d2fe 3861->3862 3864 42b493 2 API calls 3861->3864 3861->3865 3866 42685e 3862->3866 3864->3861 3865->3784 3867 4267ca ??3@YAXPAX 3866->3867 3868 42686a 3867->3868 3868->3865 3871 42aa43 3869->3871 3870 42ab67 3871->3870 3873 42a8e3 3871->3873 3875 42a903 3873->3875 3874 42a91e 3874->3871 3875->3874 3876 4267b0 new[] 2 API calls 3875->3876 3877 42a9a1 CreateThread 3876->3877 3877->3875 3878 42ab7a 3877->3878 3879 42ab99 3878->3879 3880 42685e ??3@YAXPAX 3879->3880 3881 42abc5 3880->3881 3882 42686f new[] 2 API calls 3881->3882 3885 42abdc 3881->3885 3886 42ac3b 3882->3886 3883 42ac71 3884 4267ca ??3@YAXPAX 3883->3884 3884->3885 3886->3883 3888 42ad63 3886->3888 3889 42b135 3888->3889 3890 42adb5 3888->3890 3891 42b265 3889->3891 3897 42b17a 3889->3897 3890->3889 3892 42add1 3890->3892 3893 42b2e5 3891->3893 3894 42b33c 3891->3894 3898 42b493 2 API calls 3892->3898 3895 42b493 2 API calls 3893->3895 3899 42b130 3894->3899 3900 42b493 2 API calls 3894->3900 3895->3899 3896 42b493 2 API calls 3896->3899 3897->3896 3898->3899 3899->3886 3900->3899 3902 426eb7 3901->3902 3903 426ecd closesocket 3902->3903 3904 426ee4 3902->3904 3903->3904 3908 42685e ??3@YAXPAX 3904->3908 3915 4270cc 3904->3915 3905 4270ff 3923 427dd2 3905->3923 3906 427192 3907 42685e ??3@YAXPAX 3906->3907 3907->3905 3910 4270ab 3908->3910 3917 428513 3910->3917 3914 42685e ??3@YAXPAX 3914->3915 3915->3905 3915->3906 3916 42685e ??3@YAXPAX 3915->3916 3916->3915 3918 4270ba 3917->3918 3920 428529 3917->3920 3918->3914 3919 4285b1 3921 4267ca ??3@YAXPAX 3919->3921 3920->3919 3922 4267ca ??3@YAXPAX 3920->3922 3921->3918 3922->3919 3924 427dec 3923->3924 3927 423bd7 3924->3927 3928 423c0a 3927->3928 3929 423ccd 3928->3929 3930 42685e ??3@YAXPAX 3928->3930 3931 4267ca ??3@YAXPAX 3929->3931 3930->3929 3932 423cfe 3931->3932 3939 423392 3932->3939 3935 423392 ??3@YAXPAX 3936 423d41 3935->3936 3937 4267ca ??3@YAXPAX 3936->3937 3938 423d5f 3937->3938 3938->3816 3938->3817 3940 4233bf 3939->3940 3941 4233ad 3939->3941 3940->3935 3942 42685e ??3@YAXPAX 3941->3942 3942->3940 3946 4237c0 3943->3946 3945 427db6 3945->3820 3947 4237ec 3946->3947 3948 42686f new[] 2 API calls 3947->3948 3949 423826 3948->3949 3950 42686f new[] 2 API calls 3949->3950 3951 423906 3950->3951 3952 42686f new[] 2 API calls 3951->3952 3953 423b97 3952->3953 3953->3945 3955 423dba 3954->3955 3956 42eb52 lstrcmpiW 3955->3956 3964 423dd9 3955->3964 3966 423e79 3956->3966 3957 423fe3 socket 3958 424018 3957->3958 3957->3964 3959 424063 3958->3959 3960 42c5c5 5 API calls 3958->3960 3961 424097 3959->3961 3979 42c5c5 3959->3979 3960->3959 3963 42c5c5 5 API calls 3961->3963 3965 4240cb 3961->3965 3963->3965 3964->3827 3965->3964 3967 42422c 3965->3967 4000 42605e 3965->4000 3966->3957 3966->3964 3966->3965 3967->3964 3968 42605e 3 API calls 3967->3968 3968->3964 3971 42686f new[] 2 API calls 3970->3971 3972 427bfa 3971->3972 3974 427c41 3972->3974 4009 425178 3972->4009 3974->3836 3976 4267ca ??3@YAXPAX 3976->3974 3978 424ccf 3977->3978 4030 424cd3 3977->4030 3978->3833 3986 42c5d2 3979->3986 3980 42c5dc 3980->3961 3981 42c8ac 3982 42c8d4 3981->3982 3983 42c8d9 InternetConnectW 3981->3983 3985 42c908 3983->3985 3988 42c91c 3983->3988 3984 42c893 InternetOpenW 3984->3981 3986->3980 3986->3981 3986->3984 3987 42c9cc 3988->3987 3989 4230d0 2 API calls 3988->3989 3990 42c9d7 3988->3990 3989->3990 3991 42cb5c 3990->3991 3992 4230d0 2 API calls 3990->3992 3993 4267ca ??3@YAXPAX 3991->3993 3995 42cc9c 3991->3995 3992->3991 3993->3995 3994 42cca8 3995->3994 3996 42ccde 3995->3996 3998 42ccd3 3995->3998 3997 42686f new[] 2 API calls 3996->3997 3997->3980 3998->3980 3999 42686f new[] 2 API calls 3998->3999 3999->3980 4001 42686f new[] 2 API calls 4000->4001 4002 426087 4001->4002 4004 4230d0 2 API calls 4002->4004 4006 4260ae 4002->4006 4003 426167 4003->3967 4004->4006 4005 4266e6 4005->4003 4008 4267ca ??3@YAXPAX 4005->4008 4006->4003 4006->4005 4007 4267ca ??3@YAXPAX 4006->4007 4007->4005 4008->4003 4010 425197 4009->4010 4011 42686f new[] 2 API calls 4010->4011 4013 42519e 4010->4013 4012 4251d2 4011->4012 4012->4013 4015 425395 4012->4015 4017 424f47 4012->4017 4013->3976 4014 4267ca ??3@YAXPAX 4014->4013 4015->4014 4018 42686f new[] 2 API calls 4017->4018 4019 424f5d 4018->4019 4020 4230d0 2 API calls 4019->4020 4021 424f84 4020->4021 4022 42686f new[] 2 API calls 4021->4022 4023 4250af 4021->4023 4024 424ff9 4022->4024 4025 4267ca ??3@YAXPAX 4023->4025 4026 4267ca ??3@YAXPAX 4024->4026 4027 425160 4025->4027 4026->4023 4028 4267ca ??3@YAXPAX 4027->4028 4029 42516c 4028->4029 4029->4012 4033 424ced 4030->4033 4034 424d03 closesocket 4033->4034 4037 424d33 4034->4037 4036 424ce5 4037->4036 4038 42685e ??3@YAXPAX 4037->4038 4038->4036 4040 42dbb5 4039->4040 4041 4267b0 new[] 2 API calls 4040->4041 4044 42dcd7 4040->4044 4045 42dd13 4041->4045 4042 42de3a 4043 42685e ??3@YAXPAX 4042->4043 4043->4044 4045->4042 4047 427e40 4045->4047 4048 427e63 4047->4048 4052 427e5c 4047->4052 4049 42686f new[] 2 API calls 4048->4049 4048->4052 4051 427ed2 4049->4051 4050 428513 ??3@YAXPAX 4050->4052 4051->4050 4051->4052 4052->4045 4238 422eb8 4239 422ede GetLastError 4238->4239 4240 422ec4 4238->4240 4240->4239
                      APIs
                      • FindCloseChangeNotification.KERNELBASE(000000FF,000000FF,0000022C,00000002,00000000), ref: 0042C5B7
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.3510815918.0000000000420000.00000040.00001000.00020000.00000000.sdmp, Offset: 00420000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_420000_a.jbxd
                      Similarity
                      • API ID: ChangeCloseFindNotification
                      • String ID: ,B
                      • API String ID: 2591292051-3761920493
                      • Opcode ID: a25a29e07ff33b856039dfac94da5e17e2259f9090964ab20ed8f51f5caf7cca
                      • Instruction ID: 69c12917d5625f236152d9589f3ea70b79f7e8fda487bdfd99b3498450476a6c
                      • Opcode Fuzzy Hash: a25a29e07ff33b856039dfac94da5e17e2259f9090964ab20ed8f51f5caf7cca
                      • Instruction Fuzzy Hash: 00114671A01228FBDB10EBA5DA48B9EB7B8AF44304F5045DAD505A7280D778EB84CF54
                      APIs
                      Memory Dump Source
                      • Source File: 00000000.00000002.3510815918.0000000000420000.00000040.00001000.00020000.00000000.sdmp, Offset: 00420000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_420000_a.jbxd
                      Similarity
                      • API ID: Load
                      • String ID:
                      • API String ID: 2234796835-0
                      • Opcode ID: d357a9234166d3ab6c8eeba960308be9b97213f315f5a24bb1d9e6a64a306ddf
                      • Instruction ID: 9b56c69823a120cde8835361d85800256868ba9bf9c6633a63092418a4b41b77
                      • Opcode Fuzzy Hash: d357a9234166d3ab6c8eeba960308be9b97213f315f5a24bb1d9e6a64a306ddf
                      • Instruction Fuzzy Hash: 2711DBB1A00208EFDB00CF99E984B9EBBB4FF44304F5140AAE805AB350D775AA95DB95
                      APIs
                      • VirtualAlloc.KERNELBASE(00000000,00011CB0,00001000,00000040), ref: 00401290
                      Memory Dump Source
                      • Source File: 00000000.00000002.3510784067.0000000000401000.00000040.00000001.01000000.00000003.sdmp, Offset: 00400000, based on PE: true
                      • Associated: 00000000.00000002.3510769069.0000000000400000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_400000_a.jbxd
                      Similarity
                      • API ID: AllocVirtual
                      • String ID:
                      • API String ID: 4275171209-0
                      • Opcode ID: 02bb93b3727cd303fc7c3931be4f470b6c577474a4ca1623552423a40f144b6c
                      • Instruction ID: ef9a3fa6a4c4783687441f2c87558c614114034e0e86d0a0dfc5117895701c22
                      • Opcode Fuzzy Hash: 02bb93b3727cd303fc7c3931be4f470b6c577474a4ca1623552423a40f144b6c
                      • Instruction Fuzzy Hash: DF01B1322406109FC7249F48CCC1B66B3E8EF49721B0A45AEEE46B77A2C6B5BC518694
                      Memory Dump Source
                      • Source File: 00000000.00000002.3510815918.0000000000420000.00000040.00001000.00020000.00000000.sdmp, Offset: 00420000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_420000_a.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 56097b8d573c60134cd7c5c1e702197eeff8a09875758029f50140bb9fbd7b41
                      • Instruction ID: c2ee3f3054380049c76b824ffff242437c4a46d8cb7cea5eeef48a76fa79559e
                      • Opcode Fuzzy Hash: 56097b8d573c60134cd7c5c1e702197eeff8a09875758029f50140bb9fbd7b41
                      • Instruction Fuzzy Hash: BE5180B1E00218AFDB04DFE4E991BEEB7B5AF48304F548219F515AB380D778A901CB59

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 0 42c5c5-42c5da call 42fee0 call 42d20a 5 42c5f2-42c5f9 0->5 6 42c5dc-42c5e0 0->6 7 42c5fb-42c60a 5->7 8 42c60c-42c60f 5->8 9 42c5e2-42c5e5 6->9 10 42c5eb-42c5ed 6->10 11 42c614-42c665 call 42c51a 7->11 8->11 9->10 12 42cef6-42cefa 10->12 15 42c667-42c69c 11->15 16 42c6cb-42c796 11->16 21 42c6b1-42c6c4 15->21 22 42c69e-42c6a4 15->22 24 42c81f-42c823 16->24 25 42c79c-42c7a7 16->25 21->16 26 42c6ab 22->26 28 42c829-42c833 24->28 29 42c8ac-42c8b0 24->29 30 42c7a9-42c7f7 call 42fdd0 25->30 31 42c7fd-42c804 25->31 26->21 35 42c835-42c884 call 42fdd0 28->35 36 42c88a-42c891 28->36 32 42c8b2-42c8c5 29->32 33 42c8cb-42c8d2 29->33 30->31 31->24 34 42c806-42c819 31->34 32->33 38 42c8d4 33->38 39 42c8d9-42c906 InternetConnectW 33->39 34->24 35->36 36->29 42 42c893-42c8a6 InternetOpenW 36->42 45 42c908-42c90c 39->45 46 42c91c-42c926 39->46 42->29 48 42c917 45->48 49 42c90e-42c911 45->49 50 42c960-42c994 46->50 51 42c928-42c95e 46->51 49->48 57 42c997-42c9ca 50->57 51->57 60 42c9d1-42c9d5 57->60 61 42c9cc 57->61 62 42c9d7-42c9e9 60->62 63 42c9ee-42cacc call 42e725 call 4230d0 60->63 64 42cad2-42caec call 42fdd0 62->64 63->64 69 42caf2-42cafb 64->69 70 42cb75-42cb79 64->70 69->70 72 42cafd-42cb72 call 42f920 call 42f930 * 2 call 42fa10 call 4230d0 call 42f920 69->72 74 42cb7b-42cb84 70->74 75 42cbbd-42cbc8 70->75 72->70 74->75 76 42cb86-42cbba call 42f920 * 2 call 42fdd0 74->76 78 42cc04-42cc3f 75->78 79 42cbca-42cc02 75->79 76->75 89 42cc45-42cc8e 78->89 79->89 99 42cc90-42cc9c call 4267ca 89->99 100 42cc9f-42cca6 89->100 99->100 103 42cca8 100->103 104 42ccad-42ccd1 100->104 110 42ccd3-42cedd 104->110 111 42ccd8-42ccdc 104->111 115 42ce16-42ce1d 110->115 113 42cd43 111->113 114 42ccde-42cd3e call 42686f 111->114 116 42cd4d-42cd79 113->116 114->12 118 42ce25-42ce2c 115->118 119 42ce1f 115->119 124 42ce09-42ce10 116->124 125 42cd7f-42cdc0 call 42e725 116->125 121 42ce3b-42ce42 118->121 122 42ce2e-42ce34 118->122 119->118 126 42ce44-42ce4b 121->126 127 42cead-42ceb4 121->127 122->121 124->115 124->116 136 42cdc2-42cdc6 125->136 137 42cdd3-42cde7 125->137 126->127 129 42ce4d-42ceab call 42686f 126->129 130 42cec3-42ceca 127->130 131 42ceb6-42cebc 127->131 129->12 134 42ced9-42cedb 130->134 135 42cecc-42ced2 130->135 131->130 134->12 135->134 139 42cdd1 136->139 140 42cdc8-42cdcb 136->140 141 42cdf8-42ce07 137->141 142 42cde9-42cdf2 137->142 139->115 140->139 141->115 142->141
                      APIs
                      • ImpersonateLoggedOnUser.KERNELBASE(?), ref: 0042C6A5
                      • InternetSetOptionW.WININET(00000000,00000049,000FFFFF,00000004), ref: 0042C779
                      • InternetOpenW.WININET(User-Agent:Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Safari/537.,00000000,00000000,00000000,00000000), ref: 0042C8A0
                      • InternetConnectW.WININET(00000000,?,?,00000000,00000000,00000003,00000000,00000000), ref: 0042C8F3
                      • HttpSendRequestW.WININET(?,00000000,00000000,?,?), ref: 0042CC7E
                      • RevertToSelf.KERNELBASE ref: 0042CE1F
                      • InternetCloseHandle.WININET(00000000), ref: 0042CE35
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.3510815918.0000000000420000.00000040.00001000.00020000.00000000.sdmp, Offset: 00420000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_420000_a.jbxd
                      Similarity
                      • API ID: Internet$CloseConnectHandleHttpImpersonateLoggedOpenOptionRequestRevertSelfSendUser
                      • String ID: "0B$$$&/B$+0B$,B$/%x%x%x$//B$/?q=%x$40B$=0B$F0B$HTTP=HTTP://%s:%d$HTTP=HTTP://%s:%d$Host: %sContent-Length: %dAccept: %sProxy-Authorization: Basic %SUser-Agent: %s$Host: %s:%dContent-Length: %dAccept: %sProxy-Authorization: Basic %SUser-Agent: %s$O0B$POST$User-Agent:Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/126.0.0.0 Safari/537.$X0B$a0B$explorer.exe$text/html,application/xhtml+xml,application/xml,*/*$text/html,application/xhtml+xml,application/xml,*/*
                      • API String ID: 442711457-2791847347
                      • Opcode ID: 098bd4b58bc5e65f2bd99e56462270234b32664b925ffc9d425ba992b2768650
                      • Instruction ID: 571e0ac3c45c6e96eb4045ade905452f511fd989386608dde7307241ba99af2a
                      • Opcode Fuzzy Hash: 098bd4b58bc5e65f2bd99e56462270234b32664b925ffc9d425ba992b2768650
                      • Instruction Fuzzy Hash: 75426370A00228EBDB24DF54DC85BEAB3B4FF48704F5481EAE50966280DB759BC5CF99

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 143 42db8e-42dcc1 147 42dcc8-42dcd5 143->147 148 42dcd7-42dcda 147->148 149 42dcdf-42dd61 call 4267b0 147->149 150 42de55-42de58 148->150 157 42dd67 149->157 158 42de3a-42de52 call 42685e 149->158 160 42dd71-42dd7d 157->160 158->150 160->158 162 42dd83-42dd9c 160->162 163 42ddad-42ddbc 162->163 164 42ddfa-42de35 call 427e40 163->164 165 42ddbe-42ddf8 163->165 164->160 165->163
                      APIs
                      • CreateFileW.KERNELBASE(?,80000000,00000001,00000000,00000003,00000080,00000000), ref: 0042DCC2
                      • new[].LIBCMTD ref: 0042DD0E
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.3510815918.0000000000420000.00000040.00001000.00020000.00000000.sdmp, Offset: 00420000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_420000_a.jbxd
                      Similarity
                      • API ID: CreateFilenew[]
                      • String ID: %$%$%$%TM%\~stp$,B$-.B$.$P$\$\$a0B$m$p$s$t$y-B$~$-B
                      • API String ID: 2677580319-1007343944
                      • Opcode ID: 1052bf6fb657033bd6e2e80ccc2485ef01e5a8547e03ede4d935053bbf40ea00
                      • Instruction ID: 991b76666c0592443248787b340a2f2211c756335522731b30e180f6356b0313
                      • Opcode Fuzzy Hash: 1052bf6fb657033bd6e2e80ccc2485ef01e5a8547e03ede4d935053bbf40ea00
                      • Instruction Fuzzy Hash: 0F713970A1022C9BCB20DF50DC88BDAB7B5BF98304F1042D9D5096B290DBB65BD9CF59

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 173 427743-42777e 176 427863-427889 call 423d97 173->176 177 427784-4277b9 call 4267b0 call 42e92c 173->177 181 42788e-427890 176->181 191 4277bb-4277d5 call 42fdd0 177->191 192 42782e-42784c call 42eab7 177->192 183 427892-427896 181->183 184 4278c8-4278cc 181->184 188 4278b7-4278c3 call 42d3d0 183->188 189 427898-4278b0 call 42685e 183->189 185 4278ce-4278e6 call 42685e 184->185 186 4278ed-42792a call 427bd8 184->186 185->186 209 427933-42793a 186->209 210 42792c-42792e 186->210 201 427bd3-427bd7 188->201 189->188 207 4277e3 191->207 208 4277d7-4277e1 191->208 192->176 205 42784e-42785d 192->205 205->176 211 4277ed-42782c call 422ada 207->211 208->211 212 427945-427949 209->212 210->201 211->176 215 427973-42798c 212->215 216 42794b-427964 212->216 217 427995-427a27 call 42fdd0 call 42f3dc call 426cd0 call 42f08f 215->217 218 42798e-427990 215->218 216->215 219 427966-427971 216->219 232 427a29-427a36 217->232 233 427a3d-427aab call 422f4a call 4275c5 call 42fdd0 217->233 218->201 219->212 232->233 242 427ac4-427af0 233->242 243 427aad-427ac2 call 42fa90 233->243 247 427b20-427bad call 42f394 call 42fa90 call 42f307 call 427bd8 242->247 249 427af2-427b1d call 42fa90 242->249 243->247 262 427bce 247->262 263 427baf-427bcc call 424ca0 247->263 249->247 262->201 263->201
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.3510815918.0000000000420000.00000040.00001000.00020000.00000000.sdmp, Offset: 00420000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_420000_a.jbxd
                      Similarity
                      • API ID: new[]
                      • String ID: -B$%ls$b,B$c.B$g-B$themicrosoftnow.com$y-B$.B
                      • API String ID: 4059295235-2915703440
                      • Opcode ID: bac67506c4bde1b7bed6b2cbd1d409884a53bcff170b6181209bdddc640cfa4f
                      • Instruction ID: 830da3df04be107f8ec3ff06f81f01b6a6b533eee721bf3151cb76c3187da28a
                      • Opcode Fuzzy Hash: bac67506c4bde1b7bed6b2cbd1d409884a53bcff170b6181209bdddc640cfa4f
                      • Instruction Fuzzy Hash: AAC1A8B1E002289BDB24DF90DC45BDDB7B5BF48304F4045EAE509A7281DB74AB85CF69

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 267 42d43e-42d455 268 42d457-42d475 267->268 269 42d49b-42d4b5 call 4267b0 267->269 270 42d491 268->270 271 42d477-42d48f 268->271 275 42d4b7-42d4bd call 42a700 269->275 276 42d4ca 269->276 270->269 271->269 279 42d4c2-42d4c8 275->279 278 42d4d4-42d504 call 42cefb 276->278 283 42d50a-42d553 call 42fdd0 278->283 284 42d648-42d664 278->284 279->278 290 42d559-42d5ea call 42f920 call 42f930 * 2 call 42fa10 call 4230d0 call 42f920 call 4267ca 283->290 291 42d5ec-42d611 call 42f920 * 2 283->291 285 42d670-42d678 284->285 286 42d666 284->286 292 42d67b-42d68d call 42e3d1 285->292 286->285 305 42d614-42d643 call 42eb52 call 42b493 290->305 291->305 308 42d693-42d697 292->308 309 42d736-42d75f call 42d42f 292->309 305->284 312 42d6fa-42d701 308->312 313 42d699-42d6af call 424ca0 308->313 331 42d761-42d765 309->331 332 42d789-42d790 309->332 317 42d703-42d717 312->317 318 42d726-42d731 312->318 313->312 323 42d6b1-42d6cd 313->323 317->318 334 42d719-42d71f 317->334 328 42d9c5-42d9cc 318->328 329 42d6e9 323->329 330 42d6cf-42d6e7 323->330 328->292 338 42d9d2-42d9d6 328->338 335 42d6f3 329->335 330->335 331->332 336 42d767-42d76b 331->336 339 42d792-42d7a6 332->339 340 42d7b4-42d7b8 332->340 334->318 335->312 336->332 344 42d76d-42d777 call 4247b8 336->344 346 42da27-42da2e 338->346 347 42d9d8-42d9dc 338->347 339->340 355 42d7a8-42d7ad 339->355 342 42d7ba-42d7d0 call 424ca0 340->342 343 42d81b-42d83f call 4267b0 340->343 342->343 365 42d7d2-42d7ee 342->365 374 42d841-42d847 call 426d33 343->374 375 42d854 343->375 344->332 367 42d779-42d783 call 4273d4 344->367 350 42da30-42da4e 346->350 351 42da7e-42da83 346->351 347->346 354 42d9de-42d9fa 347->354 357 42da50-42da68 350->357 358 42da6a 350->358 361 42da16 354->361 362 42d9fc-42da14 354->362 355->340 366 42da74 357->366 358->366 364 42da20 361->364 362->364 364->346 370 42d7f0-42d800 call 427d70 365->370 371 42d80a 365->371 366->351 367->332 381 42d9ba 367->381 380 42d802-42d808 370->380 376 42d814 371->376 382 42d84c-42d852 374->382 379 42d85e-42d879 375->379 376->343 383 42d88a-42d88e 379->383 384 42d87b-42d888 379->384 380->376 381->328 382->379 385 42d89d-42d8ac 383->385 386 42d890-42d893 383->386 384->385 387 42d901-42d908 385->387 388 42d8ae-42d8bb 385->388 386->385 389 42d925-42d936 call 42756e 387->389 390 42d90a-42d923 call 42756e 387->390 388->387 396 42d8bd-42d8c4 call 42e6bb 388->396 395 42d93b-42d963 389->395 390->395 400 42d965-42d96c 395->400 401 42d96e-42d991 395->401 396->387 402 42d8c6-42d8cd 396->402 403 42d995-42d99f call 427743 400->403 401->403 411 42d993 401->411 404 42d8ea-42d8fa call 42756e 402->404 405 42d8cf-42d8e8 call 42756e 402->405 413 42d9a4-42d9b7 403->413 412 42d8ff 404->412 405->412 411->338 412->395 413->381
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.3510815918.0000000000420000.00000040.00001000.00020000.00000000.sdmp, Offset: 00420000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_420000_a.jbxd
                      Similarity
                      • API ID: new[]$Sleep
                      • String ID: -B$g-B$themicrosoftnow.com$themicrosoftnow.com
                      • API String ID: 344610696-3605936220
                      • Opcode ID: c654ab827db24afe279abf6dc6cdb4f1eb550ff65189d50c1dcdac7fa483c925
                      • Instruction ID: 7156f01f5ff38cc0c9668f9fe3e0901fc0f9b56cce36bf679595df8f6e05e353
                      • Opcode Fuzzy Hash: c654ab827db24afe279abf6dc6cdb4f1eb550ff65189d50c1dcdac7fa483c925
                      • Instruction Fuzzy Hash: DC025C70F00228EBDB25DF50ED59BAEB3B4BB44305F9081AAE50967290D7B85F85CF48

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 415 42f08f-42f0d9 418 42f0e2-42f175 415->418 419 42f0db-42f0dd 415->419 422 42f186-42f1ac 418->422 423 42f177-42f181 418->423 420 42f2f6-42f306 419->420 428 42f1c8-42f1ee call 42686f 422->428 429 42f1ae-42f1b7 422->429 424 42f299-42f2f4 call 42f2a7 423->424 424->420 435 42f1f0-42f1fa 428->435 436 42f1ff-42f225 428->436 429->428 437 42f1b9-42f1c3 429->437 435->424 439 42f233-42f25c 436->439 440 42f227-42f231 436->440 437->424 441 42f264-42f266 439->441 440->424 441->424 442 42f268-42f297 call 42ffa2 441->442 442->420
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.3510815918.0000000000420000.00000040.00001000.00020000.00000000.sdmp, Offset: 00420000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_420000_a.jbxd
                      Similarity
                      • API ID:
                      • String ID: 8/B$A/B$L-B$b,B
                      • API String ID: 0-1919537502
                      • Opcode ID: 11119b0ee33718ea5929a1a26b0d1346d0b97534b8fce023acc49c6cb05edbd1
                      • Instruction ID: aef9ffe74e54d2a4df4160d35cbab9a4d367340717c3d44d66066497567aa269
                      • Opcode Fuzzy Hash: 11119b0ee33718ea5929a1a26b0d1346d0b97534b8fce023acc49c6cb05edbd1
                      • Instruction Fuzzy Hash: 49518DB1A01128EBDB20DF94ED58BDEB7B4FB48314F9041E9E109A7280D7799E84CF59

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 446 423d97-423db8 447 423dc3-423dd7 call 4247b8 446->447 448 423dba-423dbd 446->448 452 423de0-423e83 call 42eb52 447->452 453 423dd9-423ddb 447->453 448->447 463 423e89-423e90 452->463 464 423fcc-423fd0 452->464 454 4243ef-4243f2 453->454 463->464 465 423e96-423eaf 463->465 466 424146-42414a 464->466 467 423fd6-423fdd 464->467 481 423eb1-423eb5 465->481 482 423ecb-423ed5 465->482 468 424150-42415a 466->468 469 42432f-424333 466->469 467->466 470 423fe3-423ffc socket 467->470 472 424169-424170 468->472 473 42415c-424163 468->473 476 424335-424344 469->476 477 424349-424353 469->477 474 424018-424037 call 42b6ef 470->474 475 423ffe-424002 470->475 472->469 483 424176-42418f call 42b6ef 472->483 473->469 473->472 494 424045-42406c call 42c5c5 474->494 495 424039-424043 474->495 484 424011-424013 475->484 485 424004-42400e call 42e720 475->485 476->454 479 424374-4243ac 477->479 480 424355-424372 477->480 505 4243af-4243b6 479->505 480->505 488 423eb7-423ec1 call 42e720 481->488 489 423ec4-423ec6 481->489 492 423ed7-423eed 482->492 493 423f14-423f18 482->493 508 424265-424269 483->508 509 424195-4241c5 call 42b766 483->509 484->454 485->484 488->489 489->454 510 423f07-423f0d 492->510 511 423eef-423f05 call 42d3d0 492->511 493->464 498 423f1e-423f37 call 42b6ef 493->498 503 424073-424077 494->503 495->494 495->503 498->464 522 423f3d-423f6d call 42b766 498->522 514 4240a7-4240ab 503->514 515 424079-424092 call 42c5c5 503->515 518 4243c1-4243c5 505->518 508->469 512 42426f-424288 508->512 544 4241cb-4241cf 509->544 545 424258-42425e 509->545 510->493 511->493 538 4242a4-4242ba 512->538 539 42428a-42428e 512->539 523 4240db-4240df 514->523 524 4240ad-4240c6 call 42c5c5 514->524 532 424097-4240a0 515->532 525 4243c7-4243e8 518->525 526 4243ea 518->526 555 423fbf-423fc5 522->555 556 423f6f-423f73 522->556 527 4240e1-4240e5 523->527 528 424139-42413f 523->528 541 4240cb-4240d4 524->541 525->518 526->454 535 4240f0-424137 call 42d3d0 527->535 536 4240e7-4240ea 527->536 528->466 532->514 535->466 536->535 557 424322-424328 538->557 558 4242bc-4242eb call 42d3d0 call 42605e 538->558 546 424290-42429a call 42e720 539->546 547 42429d-42429f 539->547 541->523 551 4241d1-4241da 544->551 552 4241dc-424220 call 42f920 call 42d3d0 544->552 545->508 546->547 547->454 551->552 573 424222-42422e call 42605e 552->573 574 424256 552->574 555->464 561 423f80-423fbd call 42f920 call 42d3d0 556->561 562 423f75-423f7e 556->562 557->469 576 42430c-424319 558->576 577 4242ed-42430a 558->577 561->464 562->561 582 424230-42424d 573->582 583 42424f 573->583 574->508 581 424320 576->581 577->581 581->469 582->574 583->574
                      APIs
                      • socket.WS2_32(00000002,00000001,00000006), ref: 00423FE9
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.3510815918.0000000000420000.00000040.00001000.00020000.00000000.sdmp, Offset: 00420000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_420000_a.jbxd
                      Similarity
                      • API ID: socket
                      • String ID: b,B$socket() == SOCKET_ERROR$socket() == SOCKET_ERROR$socket() == SOCKET_ERROR$w/B
                      • API String ID: 98920635-1736774646
                      • Opcode ID: 168176c209fe0eb78d6f0d4e87bed2b1fdf991733941f422b53f8dc784dae6a9
                      • Instruction ID: ce6d19fd95ae200415258df1787290cf5512b70acc554df741d9f25c621dad86
                      • Opcode Fuzzy Hash: 168176c209fe0eb78d6f0d4e87bed2b1fdf991733941f422b53f8dc784dae6a9
                      • Instruction Fuzzy Hash: 04225C74B00214EFDB18DF94E885BAEB3B1FF88704F50815AF915AB391CBB5A941CB58

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 585 424ced-424d31 closesocket 589 424d33-424d3f 585->589 590 424d44-424d5b 585->590 589->590 592 424d6c-424d80 590->592 593 424d5d-424d65 590->593 595 424d82-424d99 592->595 596 424dc1-424dc8 592->596 593->592 602 424daa-424dba 595->602 603 424d9b-424da3 595->603 597 424dca-424de1 596->597 598 424e09-424e10 596->598 608 424df2-424e02 597->608 609 424de3-424deb 597->609 600 424e1b-424e1f 598->600 604 424e51-424e58 600->604 605 424e21-424e2c 600->605 602->596 603->602 606 424e5a-424e6c 604->606 607 424e7b-424e8c 604->607 610 424e2e-424e47 605->610 611 424e4f 605->611 606->607 623 424e6e-424e74 606->623 612 424e8e-424ea0 607->612 613 424eaf-424ec0 607->613 608->598 609->608 610->611 611->600 612->613 625 424ea2-424ea8 612->625 618 424ec2-424ed4 613->618 619 424ee3-424ef7 613->619 618->619 628 424ed6-424edc 618->628 621 424f43-424f46 619->621 622 424ef9-424f39 call 42685e 619->622 622->621 623->607 625->613 628->619
                      APIs
                      • closesocket.WS2_32(?), ref: 00424D24
                      • FindCloseChangeNotification.KERNELBASE(?), ref: 00424D73
                      • FindCloseChangeNotification.KERNELBASE(00000000), ref: 00424E75
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.3510815918.0000000000420000.00000040.00001000.00020000.00000000.sdmp, Offset: 00420000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_420000_a.jbxd
                      Similarity
                      • API ID: ChangeCloseFindNotification$closesocket
                      • String ID: ,B$O0B$,B
                      • API String ID: 2622216524-3871590362
                      • Opcode ID: 20a43316604b007258de5ce02d6e24aa7055b1077c3a81a3bef5e24309dd8fc3
                      • Instruction ID: acf167f8ca5a5c88db1091ec2d81350130a4c2a773b5e2936053c9faeea1e764
                      • Opcode Fuzzy Hash: 20a43316604b007258de5ce02d6e24aa7055b1077c3a81a3bef5e24309dd8fc3
                      • Instruction Fuzzy Hash: 6181C878B00204EFDB14DF94D598AAEB772FB88314FA08699E9215B391C775EE42CF44

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 632 42e10d-42e1a2 call 42f08f 635 42e1a4-42e1a6 632->635 636 42e1ab-42e1d7 call 4232f8 632->636 637 42e37c-42e380 635->637 641 42e1f0-42e1f7 636->641 642 42e1d9-42e1e4 636->642 643 42e204-42e21f call 42f3dc 641->643 644 42e1f9-42e1ff 641->644 642->641 645 42e1e6 642->645 648 42e221-42e223 643->648 649 42e228-42e277 call 4232f8 643->649 644->637 645->641 648->637 654 42e291-42e298 649->654 655 42e279-42e285 649->655 656 42e2a5-42e2bf 654->656 657 42e29a-42e2a0 654->657 655->654 658 42e287 655->658 660 42e2c1-42e2c3 656->660 661 42e2c8-42e2f4 call 4232f8 656->661 657->637 658->654 660->637 665 42e2f6-42e301 661->665 666 42e30d-42e314 661->666 665->666 667 42e303 665->667 668 42e376 666->668 669 42e316-42e343 CreateMutexW 666->669 667->666 668->637 671 42e34e-42e353 669->671 671->668 672 42e355-42e36c 671->672 672->668
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.3510815918.0000000000420000.00000040.00001000.00020000.00000000.sdmp, Offset: 00420000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_420000_a.jbxd
                      Similarity
                      • API ID:
                      • String ID: %d.%d$,B$__%s__$a0B$y-B
                      • API String ID: 0-2739053071
                      • Opcode ID: db83e78ae8d46cc34a783128afac3384235eed2e492da2eb3bda5340d6cada1f
                      • Instruction ID: 142e017194dedddf65a412fa52f45dc8f1fdde68b45ba13dd053c0f04b2b40ab
                      • Opcode Fuzzy Hash: db83e78ae8d46cc34a783128afac3384235eed2e492da2eb3bda5340d6cada1f
                      • Instruction Fuzzy Hash: 73518271A00628ABDB34DB25FD54BEB73B4BB04346F8005E9E509E6290E7B89BC5CF54

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 674 42dec8-42df15 676 42df17-42df19 674->676 677 42df1e-42df42 674->677 678 42dfcd-42dfd1 676->678 680 42df44-42df4e 677->680 681 42dfbc-42dfc8 677->681 680->681 682 42df50-42dfb6 call 42fa90 * 3 680->682 681->678 682->681
                      APIs
                      • CreateFileW.KERNELBASE(%C:\Users\user\AppData\Local\Temp%\\~2DC0693B73E4,80000000,00000003,00000000,00000004,00000080,00000000), ref: 0042DF03
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.3510815918.0000000000420000.00000040.00001000.00020000.00000000.sdmp, Offset: 00420000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_420000_a.jbxd
                      Similarity
                      • API ID: CreateFile
                      • String ID: %C:\Users\user\AppData\Local\Temp%\\~2DC0693B73E4$,B$Default$mt-D15F$-B
                      • API String ID: 823142352-1466088817
                      • Opcode ID: 164795a9d55e76830387114e21bbbdc4d1453d015a1b508ba270e00ae0cdb562
                      • Instruction ID: 0b7dfde61ccee6f82f2cf28c137301680376fb3a47d2147c09b1ea2caddb7cfc
                      • Opcode Fuzzy Hash: 164795a9d55e76830387114e21bbbdc4d1453d015a1b508ba270e00ae0cdb562
                      • Instruction Fuzzy Hash: 0D21C871B00319BFE724C760ED12F967778AB48700F8041BAF609A62D0E6F41A55CF6D

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 690 42eb52-42eb7c call 42e92c 693 42ebe5-42ebf6 lstrcmpiW 690->693 694 42eb7e-42eb98 call 42fdd0 690->694 696 42ec11-42ec2f call 422f5c 693->696 697 42ebf8-42ec0c call 422ffe 693->697 703 42eba6 694->703 704 42eb9a-42eba4 694->704 706 42ec31-42ec35 696->706 707 42ec3d-42ec41 696->707 705 42ecad-42ecb0 697->705 708 42ebb0-42ebe0 call 422ada call 422ffe 703->708 704->708 709 42ec37-42ec39 706->709 710 42ec3b-42ecab 706->710 711 42ec43-42ec4f 707->711 712 42ec79-42ec88 call 422f53 707->712 708->705 709->705 720 42ec97-42ec9f call 42eab7 710->720 715 42ec51-42ec6d call 42fa90 711->715 716 42ec6f-42ec77 711->716 723 42ec92-42ec95 712->723 724 42ec8a-42ec8e 712->724 715->712 716->707 729 42eca4-42eca7 720->729 723->705 724->723 728 42ec90-42eca9 724->728 728->720 729->705
                      APIs
                      • lstrcmpiW.KERNELBASE(00000000,localhost), ref: 0042EBEE
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.3510815918.0000000000420000.00000040.00001000.00020000.00000000.sdmp, Offset: 00420000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_420000_a.jbxd
                      Similarity
                      • API ID: lstrcmpi
                      • String ID: %ls$127.0.0.1$T&B$localhost$y>B
                      • API String ID: 1586166983-4016028382
                      • Opcode ID: cbef34ec9c3e19057950f6f39b01c702ea79eca5f07ab71f98a5eb68c181e662
                      • Instruction ID: d7b1ef147be25e92c52abea6ce29516002638ea1317b2c4ef689ce038938c50b
                      • Opcode Fuzzy Hash: cbef34ec9c3e19057950f6f39b01c702ea79eca5f07ab71f98a5eb68c181e662
                      • Instruction Fuzzy Hash: 07410671B00228FBCB14CF93E841BEE7774AB44304F90855AF5099B380D7BD9A85DB89

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 731 426e8e-426ecb 734 426ee4-426f0b 731->734 735 426ecd-426edd closesocket 731->735 737 426f16-426f22 734->737 735->734 738 426f71-426f7a 737->738 739 426f24-426f43 737->739 740 426f81-426fa5 738->740 743 426f45-426f54 739->743 744 426f5b-426f6f 739->744 745 4270d4-4270fd 740->745 746 426fab-426fe5 740->746 743->744 744->737 753 427104-42710b 745->753 754 4270ff 745->754 747 426ff0-426ff9 746->747 751 426ffb-426fff 747->751 752 42705d-427061 747->752 757 427001-427014 751->757 758 42702b-427038 751->758 755 427063-427075 752->755 756 427078-427083 752->756 760 427116-42711f 753->760 759 4271b1-4271c6 call 427dd2 754->759 755->756 761 427085-427089 756->761 762 4270cf 756->762 763 427016 757->763 764 427018-427027 757->764 765 427043-427047 758->765 766 42703a-427040 758->766 768 427192-4271aa call 42685e 760->768 769 427121-42712d 760->769 761->762 767 42708b-427098 761->767 762->745 770 426fe7-426fed 763->770 764->758 771 427029 764->771 772 427051-427057 765->772 773 427049-42704f 765->773 766->765 767->762 777 42709a-4270cc call 42685e call 428513 call 42685e 767->777 768->759 778 427130-427134 769->778 770->747 771->752 774 42705b 772->774 775 427059 772->775 773->758 773->772 774->770 775->752 777->762 782 427136-42714f 778->782 783 42718d 778->783 787 427151-427168 782->787 788 42717e 782->788 783->760 795 427176-42717c 787->795 796 42716a-427173 call 42685e 787->796 790 427185-42718b 788->790 790->778 795->790 796->795
                      APIs
                      • closesocket.WS2_32(000000FF), ref: 00426ED4
                      • FindCloseChangeNotification.KERNELBASE(?), ref: 00426F7B
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.3510815918.0000000000420000.00000040.00001000.00020000.00000000.sdmp, Offset: 00420000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_420000_a.jbxd
                      Similarity
                      • API ID: ChangeCloseFindNotificationclosesocket
                      • String ID: ,B$p}B$,B
                      • API String ID: 2503150427-2782076901
                      • Opcode ID: dfbe1779b629ae80509e6619f7b8bc2ed072946cbbbbb5a54cb2707d1d3b00df
                      • Instruction ID: f72ae2fcd957f3f700c509849401277bad0857df8f87ef0a6bba422df45e9840
                      • Opcode Fuzzy Hash: dfbe1779b629ae80509e6619f7b8bc2ed072946cbbbbb5a54cb2707d1d3b00df
                      • Instruction Fuzzy Hash: EBB10974E04219DFCB14CF94D594AAEB7B2FF48304F648159E402AB345C779AE8ACF84

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 800 42a8e3-42a91c call 422fbf call 422fc8 805 42a925-42a93c 800->805 806 42a91e-42a920 800->806 808 42a958-42a962 805->808 809 42a93e-42a94f 805->809 807 42aa1a-42aa1d 806->807 811 42a973-42a986 808->811 809->808 810 42a951-42a953 809->810 810->807 812 42aa18 811->812 813 42a98c-42a998 811->813 812->807 813->812 814 42a99a-42aa0b call 4267b0 CreateThread 813->814 817 42aa13 814->817 817->811
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.3510815918.0000000000420000.00000040.00001000.00020000.00000000.sdmp, Offset: 00420000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_420000_a.jbxd
                      Similarity
                      • API ID:
                      • String ID: g-B
                      • API String ID: 0-169967332
                      • Opcode ID: c5ba44f83ce66ab46017740f337cd37b4eb32b68b3d0582db23e11c49cc90e26
                      • Instruction ID: 8ef0a3fe48af72f743d8bf1d517f7d931df392a9c98f732dbf396dc561ea0254
                      • Opcode Fuzzy Hash: c5ba44f83ce66ab46017740f337cd37b4eb32b68b3d0582db23e11c49cc90e26
                      • Instruction Fuzzy Hash: 7F312CB4A042289FDB64CF10D985BE9B7B1AB59304F5081D9DA8967340CBB46EC1CF55

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 819 42686f-42687a 820 426898-4268a6 819->820 821 42687c-42688c LoadLibraryW 819->821 822 4268b8-4268be 820->822 823 4268a8-4268b5 malloc 820->823 824 426893 821->824 823->822 824->820
                      APIs
                      • LoadLibraryW.KERNELBASE(msvcrt40.dll,malloc,00000000,?,004267BD,0042DD13,00000000,?,0042DD13,00000000), ref: 00426886
                      • malloc.MSVCRT ref: 004268AC
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.3510815918.0000000000420000.00000040.00001000.00020000.00000000.sdmp, Offset: 00420000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_420000_a.jbxd
                      Similarity
                      • API ID: LibraryLoadmalloc
                      • String ID: malloc$msvcrt40.dll
                      • API String ID: 3900084889-1711729993
                      • Opcode ID: 0319db4cc8215f42cee7a9cdd7c62899f18708c99e0255e2dfc45ec1088b8bd3
                      • Instruction ID: eda8dff7fd1f7566b85a98bfb0b8888bb5446ece5a627b6efdb2a50cb963d8f2
                      • Opcode Fuzzy Hash: 0319db4cc8215f42cee7a9cdd7c62899f18708c99e0255e2dfc45ec1088b8bd3
                      • Instruction Fuzzy Hash: 39E039B0A01208EFCB14DFA4E90CB493BB8FB04706F800275E40896760E37A9900CF59

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 825 426d33-426d3f call 427da7 827 426d44-426d64 825->827 829 426d66 827->829 830 426d6d-426d8f call 4267b0 827->830 829->830 833 426d9a-426da0 830->833 834 426da2-426db2 833->834 835 426db4-426e8d call 42fdd0 * 3 833->835 834->833
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.3510815918.0000000000420000.00000040.00001000.00020000.00000000.sdmp, Offset: 00420000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_420000_a.jbxd
                      Similarity
                      • API ID: new[]
                      • String ID: -B$p}B
                      • API String ID: 4059295235-475583553
                      • Opcode ID: dc96c2aa3a0f36037b2f58a43633fbcd29684ee778919fa16f42d0751cf8686a
                      • Instruction ID: 343f3903090dff3767ad0c36402a06fa5e60a3b0a33aa4f0d5d809e581a30c57
                      • Opcode Fuzzy Hash: dc96c2aa3a0f36037b2f58a43633fbcd29684ee778919fa16f42d0751cf8686a
                      • Instruction Fuzzy Hash: 594149B4E00209EBDB14DF94D945BAEB7B1FF84308F604169E805BB381C775AA05CB59
                      APIs
                      • SetErrorMode.KERNELBASE(00000002), ref: 0042DE6E
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.3510815918.0000000000420000.00000040.00001000.00020000.00000000.sdmp, Offset: 00420000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_420000_a.jbxd
                      Similarity
                      • API ID: ErrorMode
                      • String ID: L-B
                      • API String ID: 2340568224-1043978213
                      • Opcode ID: 879c82fc0f826749d4e3b8dda26821eccdabaa1b086cd992feefd46606567322
                      • Instruction ID: c235ed1f6d9eb9f38717dd3dcdda1fab107d9af44e103dbcebc7e3c0a48cc816
                      • Opcode Fuzzy Hash: 879c82fc0f826749d4e3b8dda26821eccdabaa1b086cd992feefd46606567322
                      • Instruction Fuzzy Hash: 8BF03730B8473476E6703BB3BE1BB2A39546F11769FE2073BB615D81E1DAE8E402451E
                      APIs
                      • CreateThread.KERNELBASE(00000000,00000000,Function_0000D43E,00000000,00000000,00000000), ref: 0042DB68
                      • Sleep.KERNELBASE(00002710), ref: 0042DB78
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.3510815918.0000000000420000.00000040.00001000.00020000.00000000.sdmp, Offset: 00420000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_420000_a.jbxd
                      Similarity
                      • API ID: CreateSleepThread
                      • String ID: g-B
                      • API String ID: 4202482776-169967332
                      • Opcode ID: b92e1020845c0a03d3cc9b76d9d3706cc94814a0fc831af23720397e92084021
                      • Instruction ID: d44f9ea5ce93b4d753edb8f0dee0e0eab8d36b42e291371f624dad1ef61280f9
                      • Opcode Fuzzy Hash: b92e1020845c0a03d3cc9b76d9d3706cc94814a0fc831af23720397e92084021
                      • Instruction Fuzzy Hash: AEF08230B84311B6F7345B64BE3AF213A54BB00751FE90236E511D52E0D7F8B882D56D
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.3510815918.0000000000420000.00000040.00001000.00020000.00000000.sdmp, Offset: 00420000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_420000_a.jbxd
                      Similarity
                      • API ID: Initialize
                      • String ID: CoInitialize$ole32.dll
                      • API String ID: 2538663250-3514546051
                      • Opcode ID: 3b3a8a8ec527f8202790480949d3ea971066ef9487cc2c497d06639b850785cb
                      • Instruction ID: f853cf3c63661b252875a72cdaa1252f8124fd0677ee044f034920cb1dd948e0
                      • Opcode Fuzzy Hash: 3b3a8a8ec527f8202790480949d3ea971066ef9487cc2c497d06639b850785cb
                      • Instruction Fuzzy Hash: 08E030B4A4424CEFCB10DFA4ED5C6497BA4EB14711F500275E505A73A0DAB58980CF5D
                      APIs
                      • CreateThread.KERNELBASE(00000000,00000000,Function_0000AA1E,0042D4EB,00000000,00000000,00A328E0,?,0042D4EB), ref: 0042CF25
                      Memory Dump Source
                      • Source File: 00000000.00000002.3510815918.0000000000420000.00000040.00001000.00020000.00000000.sdmp, Offset: 00420000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_420000_a.jbxd
                      Similarity
                      • API ID: CreateThread
                      • String ID:
                      • API String ID: 2422867632-0
                      • Opcode ID: 02d21ec9b3d195173608e1f7d1dea036576f41c34c4baa67b6aa984700f46e8f
                      • Instruction ID: c770470f6e87ad68edbed956179998bc5f8d367b40c8d2186466fde2b23f7356
                      • Opcode Fuzzy Hash: 02d21ec9b3d195173608e1f7d1dea036576f41c34c4baa67b6aa984700f46e8f
                      • Instruction Fuzzy Hash: 98E01A30B54208FBEB64CB85EE86F6DB3A5EB04711FA04199E904672C0C3F56E50DF89
                      APIs
                      • CreateThread.KERNELBASE(00000000,00000000,Function_00004CD3,?,00000000,00000000,?,00427BCA), ref: 00424CBA
                      Memory Dump Source
                      • Source File: 00000000.00000002.3510815918.0000000000420000.00000040.00001000.00020000.00000000.sdmp, Offset: 00420000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_420000_a.jbxd
                      Similarity
                      • API ID: CreateThread
                      • String ID:
                      • API String ID: 2422867632-0
                      • Opcode ID: c7a362e91c9f10ef4a4302b9b9e86772f4254624b1491cd913b04e5e5d2c143d
                      • Instruction ID: e50367e29c897fe21d3ba8c2d2d7c5f39f2da6b8c949dc94f0a1673281dc952f
                      • Opcode Fuzzy Hash: c7a362e91c9f10ef4a4302b9b9e86772f4254624b1491cd913b04e5e5d2c143d
                      • Instruction Fuzzy Hash: 2BE08C34B44308BBE720ABA4EE0AF6DBB38D740711F600299FA006A2C0D5B02A008754
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.3510815918.0000000000420000.00000040.00001000.00020000.00000000.sdmp, Offset: 00420000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_420000_a.jbxd
                      Similarity
                      • API ID:
                      • String ID: lB$
                      • API String ID: 0-4141540311
                      • Opcode ID: 7be23e029b6a057be302f23f3547a228f767dc0188edecc5c269d7f1e591a0fb
                      • Instruction ID: a36dff491b469ca1d200b9b5b1e80b40700a0114c43175bf21f5705002521ea8
                      • Opcode Fuzzy Hash: 7be23e029b6a057be302f23f3547a228f767dc0188edecc5c269d7f1e591a0fb
                      • Instruction Fuzzy Hash: 3B62D570E0415A9FCF08CFA8D5906AEBBB2FF89304F64819AD416AB344C734AE41DF59
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.3510815918.0000000000420000.00000040.00001000.00020000.00000000.sdmp, Offset: 00420000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_420000_a.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID: 0-3916222277
                      • Opcode ID: 6dc3c9f935801a1067d420f4ef294c66193aa01eb5d4c0c9e38ddd21e3b2c127
                      • Instruction ID: 196917cf896b1c9c03ba77504841560123c0583d9e61ee6b1bd21de4c39ee427
                      • Opcode Fuzzy Hash: 6dc3c9f935801a1067d420f4ef294c66193aa01eb5d4c0c9e38ddd21e3b2c127
                      • Instruction Fuzzy Hash: F332E270E0425ADFCF08CFA9C590AAEBBB2FF89308F248199C415AB355D735AA41CF55
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.3510815918.0000000000420000.00000040.00001000.00020000.00000000.sdmp, Offset: 00420000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_420000_a.jbxd
                      Similarity
                      • API ID:
                      • String ID: !
                      • API String ID: 0-2657877971
                      • Opcode ID: c594a39ba769eaebc3d14f25905bdf6b1f0d61d9e20c11e4f28ee581b975dcc6
                      • Instruction ID: cd39798d70cbea60c225ed7f8aac92c619a6e54baedd69a12b64d095667e0f50
                      • Opcode Fuzzy Hash: c594a39ba769eaebc3d14f25905bdf6b1f0d61d9e20c11e4f28ee581b975dcc6
                      • Instruction Fuzzy Hash: E9221370E0515A8FCF08CFA8D491AEEBBB2FF88304F54819AD516AB345CA356945CF98
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.3510815918.0000000000420000.00000040.00001000.00020000.00000000.sdmp, Offset: 00420000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_420000_a.jbxd
                      Similarity
                      • API ID:
                      • String ID: (-B
                      • API String ID: 0-1911010329
                      • Opcode ID: d30d8d46ebfb65795aae662135b0366a22e3a851edac379f41a588ea07b652eb
                      • Instruction ID: 17f4a7ad7ccc6dc8f713271ae7b1290b651ee5c5716ea5fb8b21a57f065f45fd
                      • Opcode Fuzzy Hash: d30d8d46ebfb65795aae662135b0366a22e3a851edac379f41a588ea07b652eb
                      • Instruction Fuzzy Hash: AB918630F00209DBDB19DFA9E990AEEB7F6AF88300F94856AE109E7254D775A405CB19
                      Memory Dump Source
                      • Source File: 00000000.00000002.3510815918.0000000000420000.00000040.00001000.00020000.00000000.sdmp, Offset: 00420000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_420000_a.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 9dca5c6d8e1c836118329868621bf8c42d71d0f7f1b1fd252eeaf5f609fe4f97
                      • Instruction ID: 0012e34aa35bc441a3ea605dd6de1e6fbf10e7e54fddec8d4042b6ec77eba30d
                      • Opcode Fuzzy Hash: 9dca5c6d8e1c836118329868621bf8c42d71d0f7f1b1fd252eeaf5f609fe4f97
                      • Instruction Fuzzy Hash: A9A15074E05148EFCB08CF99D590AADFBF2EF88304F68C1A9E459AB345D630AB51DB44
                      Memory Dump Source
                      • Source File: 00000000.00000002.3510815918.0000000000420000.00000040.00001000.00020000.00000000.sdmp, Offset: 00420000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_420000_a.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 45e57b8851ffe89438fa0e73e02014deb667be70f78a5a4fa8d0a9f3a8eecf3a
                      • Instruction ID: 9500fee6dfcd6cf8dedc22e432cf6e577843300e0a1d16dfc99902fa2d946a6f
                      • Opcode Fuzzy Hash: 45e57b8851ffe89438fa0e73e02014deb667be70f78a5a4fa8d0a9f3a8eecf3a
                      • Instruction Fuzzy Hash: 76016D71E0410DAFCB04CFE8E9858EEFBF9EF84300F904169E605A3204D770AA41CB94
                      Memory Dump Source
                      • Source File: 00000000.00000002.3510815918.0000000000420000.00000040.00001000.00020000.00000000.sdmp, Offset: 00420000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_420000_a.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: 9c21f6a4ae8f7ad610cf52c7e21ed6c623dafbd6e01ec2d9e3a55b03f623fc79
                      • Instruction ID: f7159268554ff1ee6931761459848057c2d85860203c2169315a977488a0eb5b
                      • Opcode Fuzzy Hash: 9c21f6a4ae8f7ad610cf52c7e21ed6c623dafbd6e01ec2d9e3a55b03f623fc79
                      • Instruction Fuzzy Hash: 31E0B639A41508EFC704DF8DE584C99FBF8EB89661F1081AAED0897321D631AE01CA90
                      Memory Dump Source
                      • Source File: 00000000.00000002.3510815918.0000000000420000.00000040.00001000.00020000.00000000.sdmp, Offset: 00420000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_420000_a.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: ebc2d6a1ca7868316b7ac34a16a6a7e6eff49c6df148cd221538d4604c62c810
                      • Instruction ID: c75bc0d95a5d769c2b171253ae892be3c9cd759e5c0eae4e8ea2322dc9cb5d06
                      • Opcode Fuzzy Hash: ebc2d6a1ca7868316b7ac34a16a6a7e6eff49c6df148cd221538d4604c62c810
                      • Instruction Fuzzy Hash: 5ED0923A3516049FC200CB4EE884D82F7ECEB4A6B5B0140A2FA09CB731C221EC00CAA0
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.3510815918.0000000000420000.00000040.00001000.00020000.00000000.sdmp, Offset: 00420000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_420000_a.jbxd
                      Similarity
                      • API ID: new[]
                      • String ID: %d.%d.%d.%d$a0B
                      • API String ID: 4059295235-2553569249
                      • Opcode ID: f428e8619c53f39551709f2064ac597ea08d9c1761da880d86c473f28e7568da
                      • Instruction ID: d1535ad254c69f98afe28aa0cead915e61f70dd6ce2851420a83163626738ebb
                      • Opcode Fuzzy Hash: f428e8619c53f39551709f2064ac597ea08d9c1761da880d86c473f28e7568da
                      • Instruction Fuzzy Hash: 7281EE74E00119AFDB04DF98E881AAEB7B2FF88304F548169E409AB352D735E981CF95
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.3510815918.0000000000420000.00000040.00001000.00020000.00000000.sdmp, Offset: 00420000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_420000_a.jbxd
                      Similarity
                      • API ID:
                      • String ID: -B$p-B
                      • API String ID: 0-2799929621
                      • Opcode ID: 00fcdd2b78ce5064c1563fbc5c57d3039ebf1fe6e833a0e25781b3b9659846d9
                      • Instruction ID: d37b824705a8fcd80cf93a41cb945e976d0a0e92fc4b1a058a50f0e6f9ef0b9d
                      • Opcode Fuzzy Hash: 00fcdd2b78ce5064c1563fbc5c57d3039ebf1fe6e833a0e25781b3b9659846d9
                      • Instruction Fuzzy Hash: 1A514E74A04219DFDB04DF94D941BEEB7B1FF88304F50826AE905AB381C779A942CF69
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.3510815918.0000000000420000.00000040.00001000.00020000.00000000.sdmp, Offset: 00420000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_420000_a.jbxd
                      Similarity
                      • API ID: new[]
                      • String ID: ,B$-B
                      • API String ID: 4059295235-515478226
                      • Opcode ID: 40e3f99ec40ab5c04edae32be12cafa28d9a1e35dee26e872ff19e1442f675c5
                      • Instruction ID: bd02203c5cec86f3448fe7a40e01b1becc62533f43075a8cd244bd4441c6c91a
                      • Opcode Fuzzy Hash: 40e3f99ec40ab5c04edae32be12cafa28d9a1e35dee26e872ff19e1442f675c5
                      • Instruction Fuzzy Hash: DD314AB0E00219EBDB14DFD4DC85BAEB7B5FB48304F50816AE505B7280D7789A01CBA9
                      APIs
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.3510815918.0000000000420000.00000040.00001000.00020000.00000000.sdmp, Offset: 00420000, based on PE: false
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_420000_a.jbxd
                      Similarity
                      • API ID: ??3@
                      • String ID: free$msvcrt40.dll
                      • API String ID: 613200358-1251705061
                      • Opcode ID: 355d5b640a3becf907ca759e260f6a992d26de45837f7b197c5151839e643df0
                      • Instruction ID: e6ccd68f8a03bfa0a6dfa5731438fbd1865617fae711cc7e17ef60b402a3512f
                      • Opcode Fuzzy Hash: 355d5b640a3becf907ca759e260f6a992d26de45837f7b197c5151839e643df0
                      • Instruction Fuzzy Hash: 11E08C70600214ABCB206FA0FD5CB5A3A78EB0070AFA01131E109822B0D6F954C0CB6C