Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
EBAbsk8ydv.exe

Overview

General Information

Sample name:EBAbsk8ydv.exe
renamed because original name is a hash value
Original sample name:4fdb0465d2a66e1d810e072b8e205bf7445566a8e9a97c4cd3da0a7b4dc991a4.exe
Analysis ID:1488510
MD5:e546e832f5762cbf8f28b6558c012b8d
SHA1:ad6368dbb616f9a1a56ec1d3ac9026887928ad63
SHA256:4fdb0465d2a66e1d810e072b8e205bf7445566a8e9a97c4cd3da0a7b4dc991a4
Tags:dssdhome-xyzexe
Infos:

Detection

Score:56
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Contains functionality to infect the boot sector
Performs DNS queries to domains with low reputation
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to communicate with device drivers
Contains functionality to dynamically determine API calls
Contains functionality to query locales information (e.g. system language)
Contains functionality to query network adapater information
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Detected potential crypto function
Extensive use of GetProcAddress (often used to hide API calls)
Found evasive API chain (date check)
IP address seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
PE / OLE file has an invalid certificate
PE file contains an invalid checksum
Queries disk information (often used to detect virtual machines)
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses a known web browser user agent for HTTP communication

Classification

  • System is w10x64
  • EBAbsk8ydv.exe (PID: 6552 cmdline: "C:\Users\user\Desktop\EBAbsk8ydv.exe" MD5: E546E832F5762CBF8F28B6558C012B8D)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: EBAbsk8ydv.exeReversingLabs: Detection: 13%
Source: EBAbsk8ydv.exeVirustotal: Detection: 12%Perma Link
Source: EBAbsk8ydv.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: E:\F1_proj_trunk\f1\src\features\qbroker\Release\qbroker64.pdb; source: EBAbsk8ydv.exe
Source: Binary string: E:\F1_proj_trunk\f1\src\features\qbroker\Release\qbroker64.pdb source: EBAbsk8ydv.exe
Source: C:\Users\user\Desktop\EBAbsk8ydv.exeCode function: 0_2_00007FF61BD614C0 __doserrno,_errno,_invalid_parameter_noinfo,_errno,__doserrno,_getdrive,FindFirstFileExW,_errno,_errno,_wfullpath,_errno,_errno,_errno,_wfullpath,IsRootUNCName,GetDriveTypeW,free,__loctotime64_t,free,_wsopen_s,_fstat64,_close,FileTimeToSystemTime,SystemTimeToTzSpecificLocalTime,__loctotime64_t,FileTimeToSystemTime,SystemTimeToTzSpecificLocalTime,__loctotime64_t,FileTimeToSystemTime,SystemTimeToTzSpecificLocalTime,__loctotime64_t,FindClose,__wdtoxmode,GetLastError,_dosmaperr,FindClose,GetLastError,_dosmaperr,FindClose,0_2_00007FF61BD614C0
Source: C:\Users\user\Desktop\EBAbsk8ydv.exeCode function: 0_2_00007FF61BD58C4C FindFirstFileW,FindClose,0_2_00007FF61BD58C4C

Networking

barindex
Source: DNS query: xn--ypd.dssdhome.xyz
Source: Joe Sandbox ViewIP Address: 169.150.247.38 169.150.247.38
Source: global trafficHTTP traffic detected: GET /11/ip.bin HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Linux i644 ; en-US) Gecko/20100101 Firefox/70.2Host: xn--ypd.dssdhome.xyz
Source: global trafficHTTP traffic detected: GET /11/ip.bin HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Linux i644 ; en-US) Gecko/20100101 Firefox/70.2Host: xn--ypd.dssdhome.xyz
Source: global trafficHTTP traffic detected: GET /11/ip.bin HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Linux i644 ; en-US) Gecko/20100101 Firefox/70.2Host: xn--ypd.dssdhome.xyz
Source: global trafficHTTP traffic detected: GET /11/ip.bin HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Linux i644 ; en-US) Gecko/20100101 Firefox/70.2Host: xn--ypd.dssdhome.xyz
Source: global trafficHTTP traffic detected: GET /11/ip.bin HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Linux i644 ; en-US) Gecko/20100101 Firefox/70.2Host: xn--ypd.dssdhome.xyz
Source: global trafficHTTP traffic detected: GET /11/ip.bin HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Linux i644 ; en-US) Gecko/20100101 Firefox/70.2Host: xn--ypd.dssdhome.xyz
Source: global trafficHTTP traffic detected: GET /11/ip.bin HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Linux i644 ; en-US) Gecko/20100101 Firefox/70.2Host: xn--ypd.dssdhome.xyz
Source: global trafficHTTP traffic detected: GET /11/ip.bin HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Linux i644 ; en-US) Gecko/20100101 Firefox/70.2Host: xn--ypd.dssdhome.xyz
Source: global trafficHTTP traffic detected: GET /11/ip.bin HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Linux i644 ; en-US) Gecko/20100101 Firefox/70.2Host: xn--ypd.dssdhome.xyz
Source: global trafficHTTP traffic detected: GET /11/ip.bin HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Linux i644 ; en-US) Gecko/20100101 Firefox/70.2Host: xn--ypd.dssdhome.xyz
Source: global trafficHTTP traffic detected: GET /11/ip.bin HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Linux i644 ; en-US) Gecko/20100101 Firefox/70.2Host: xn--ypd.dssdhome.xyz
Source: global trafficHTTP traffic detected: GET /11/ip.bin HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Linux i644 ; en-US) Gecko/20100101 Firefox/70.2Host: xn--ypd.dssdhome.xyz
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficHTTP traffic detected: GET /11/ip.bin HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Linux i644 ; en-US) Gecko/20100101 Firefox/70.2Host: xn--ypd.dssdhome.xyz
Source: global trafficHTTP traffic detected: GET /11/ip.bin HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Linux i644 ; en-US) Gecko/20100101 Firefox/70.2Host: xn--ypd.dssdhome.xyz
Source: global trafficHTTP traffic detected: GET /11/ip.bin HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Linux i644 ; en-US) Gecko/20100101 Firefox/70.2Host: xn--ypd.dssdhome.xyz
Source: global trafficHTTP traffic detected: GET /11/ip.bin HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Linux i644 ; en-US) Gecko/20100101 Firefox/70.2Host: xn--ypd.dssdhome.xyz
Source: global trafficHTTP traffic detected: GET /11/ip.bin HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Linux i644 ; en-US) Gecko/20100101 Firefox/70.2Host: xn--ypd.dssdhome.xyz
Source: global trafficHTTP traffic detected: GET /11/ip.bin HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Linux i644 ; en-US) Gecko/20100101 Firefox/70.2Host: xn--ypd.dssdhome.xyz
Source: global trafficHTTP traffic detected: GET /11/ip.bin HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Linux i644 ; en-US) Gecko/20100101 Firefox/70.2Host: xn--ypd.dssdhome.xyz
Source: global trafficHTTP traffic detected: GET /11/ip.bin HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Linux i644 ; en-US) Gecko/20100101 Firefox/70.2Host: xn--ypd.dssdhome.xyz
Source: global trafficHTTP traffic detected: GET /11/ip.bin HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Linux i644 ; en-US) Gecko/20100101 Firefox/70.2Host: xn--ypd.dssdhome.xyz
Source: global trafficHTTP traffic detected: GET /11/ip.bin HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Linux i644 ; en-US) Gecko/20100101 Firefox/70.2Host: xn--ypd.dssdhome.xyz
Source: global trafficHTTP traffic detected: GET /11/ip.bin HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Linux i644 ; en-US) Gecko/20100101 Firefox/70.2Host: xn--ypd.dssdhome.xyz
Source: global trafficHTTP traffic detected: GET /11/ip.bin HTTP/1.1Connection: Keep-AliveUser-Agent: Mozilla/5.0 (Linux i644 ; en-US) Gecko/20100101 Firefox/70.2Host: xn--ypd.dssdhome.xyz
Source: global trafficDNS traffic detected: DNS query: xn--ypd.dssdhome.xyz
Source: EBAbsk8ydv.exe, 00000000.00000002.3273555261.000000EF41CFA000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://11.dssdhome.xyz/11/ip.bin
Source: EBAbsk8ydv.exeString found in binary or memory: http://crl.thawte.com/ThawteTimestampingCA.crl0
Source: EBAbsk8ydv.exeString found in binary or memory: http://ocsp.thawte.com0
Source: EBAbsk8ydv.exeString found in binary or memory: http://ts-aia.ws.symantec.com/tss-ca-g2.cer0
Source: EBAbsk8ydv.exeString found in binary or memory: http://ts-crl.ws.symantec.com/tss-ca-g2.crl0(
Source: EBAbsk8ydv.exeString found in binary or memory: http://ts-ocsp.ws.symantec.com07
Source: EBAbsk8ydv.exe, 00000000.00000003.3261373186.0000025CDA1B2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://xn--ypd.dssdhome.xyz/
Source: EBAbsk8ydv.exe, 00000000.00000002.3273716612.0000025CDA1B2000.00000004.00000020.00020000.00000000.sdmp, EBAbsk8ydv.exe, 00000000.00000003.3261373186.0000025CDA1B2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://xn--ypd.dssdhome.xyz/.2
Source: EBAbsk8ydv.exe, 00000000.00000002.3273716612.0000025CDA1B2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://xn--ypd.dssdhome.xyz/.2&aGV
Source: EBAbsk8ydv.exe, 00000000.00000003.3261373186.0000025CDA1B2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://xn--ypd.dssdhome.xyz/.2refox/70.2
Source: EBAbsk8ydv.exe, 00000000.00000002.3273716612.0000025CDA1B2000.00000004.00000020.00020000.00000000.sdmp, EBAbsk8ydv.exe, 00000000.00000002.3273716612.0000025CDA189000.00000004.00000020.00020000.00000000.sdmp, EBAbsk8ydv.exe, 00000000.00000002.3273716612.0000025CDA148000.00000004.00000020.00020000.00000000.sdmp, EBAbsk8ydv.exe, 00000000.00000003.3261373186.0000025CDA180000.00000004.00000020.00020000.00000000.sdmp, EBAbsk8ydv.exe, 00000000.00000003.3261373186.0000025CDA1B2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://xn--ypd.dssdhome.xyz/11/ip.bin
Source: EBAbsk8ydv.exe, 00000000.00000002.3273716612.0000025CDA1B2000.00000004.00000020.00020000.00000000.sdmp, EBAbsk8ydv.exe, 00000000.00000003.3261373186.0000025CDA1B2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://xn--ypd.dssdhome.xyz/11/ip.bin.
Source: EBAbsk8ydv.exe, 00000000.00000002.3273716612.0000025CDA189000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://xn--ypd.dssdhome.xyz/11/ip.binI
Source: EBAbsk8ydv.exe, 00000000.00000002.3273716612.0000025CDA1B2000.00000004.00000020.00020000.00000000.sdmp, EBAbsk8ydv.exe, 00000000.00000003.3261373186.0000025CDA1B2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://xn--ypd.dssdhome.xyz/11/ip.binx
Source: EBAbsk8ydv.exe, 00000000.00000002.3273716612.0000025CDA189000.00000004.00000020.00020000.00000000.sdmp, EBAbsk8ydv.exe, 00000000.00000003.3261373186.0000025CDA180000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://xn--ypd.dssdhome.xyz/11/ip.binz
Source: EBAbsk8ydv.exe, 00000000.00000002.3273716612.0000025CDA1B2000.00000004.00000020.00020000.00000000.sdmp, EBAbsk8ydv.exe, 00000000.00000003.3261373186.0000025CDA1B2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://xn--ypd.dssdhome.xyz/ll
Source: EBAbsk8ydv.exe, 00000000.00000003.3261373186.0000025CDA1B2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://xn--ypd.dssdhome.xyz/lla
Source: EBAbsk8ydv.exe, 00000000.00000002.3273716612.0000025CDA1B2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://xn--ypd.dssdhome.xyz/xa
Source: EBAbsk8ydv.exe, 00000000.00000002.3273716612.0000025CDA1B2000.00000004.00000020.00020000.00000000.sdmp, EBAbsk8ydv.exe, 00000000.00000002.3273716612.0000025CDA148000.00000004.00000020.00020000.00000000.sdmp, EBAbsk8ydv.exe, 00000000.00000003.3261373186.0000025CDA1B2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://xn--ypd.dssdhome.xyz:80/11/ip.bin
Source: EBAbsk8ydv.exe, 00000000.00000002.3273716612.0000025CDA1B2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://xn--ypd.dssdhome.xyz:80/11/ip.binP&o9V
Source: EBAbsk8ydv.exe, 00000000.00000003.3261373186.0000025CDA1B2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://xn--ypd.dssdhome.xyz:80/11/ip.binPf
Source: EBAbsk8ydv.exe, 00000000.00000002.3273716612.0000025CDA1B2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://xn--ypd.dssdhome.xyz:80/11/ip.biny
Source: EBAbsk8ydv.exe, 00000000.00000003.3261373186.0000025CDA1B2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://xn--ypd.dssdhome.xyz/11/ip.bin
Source: EBAbsk8ydv.exe, 00000000.00000002.3273716612.0000025CDA1B2000.00000004.00000020.00020000.00000000.sdmp, EBAbsk8ydv.exe, 00000000.00000003.3261373186.0000025CDA1B2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://xn--ypd.dssdhome.xyz/11/ip.binE
Source: EBAbsk8ydv.exe, 00000000.00000002.3273716612.0000025CDA1B2000.00000004.00000020.00020000.00000000.sdmp, EBAbsk8ydv.exe, 00000000.00000003.3261373186.0000025CDA1B2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://xn--ypd.dssdhome.xyz/11/ip.bino
Source: C:\Users\user\Desktop\EBAbsk8ydv.exeCode function: 0_2_00007FF61BD5DD00: CreateFileW,DeviceIoControl,FindCloseChangeNotification,0_2_00007FF61BD5DD00
Source: C:\Users\user\Desktop\EBAbsk8ydv.exeCode function: 0_2_00007FF61BD5D4340_2_00007FF61BD5D434
Source: C:\Users\user\Desktop\EBAbsk8ydv.exeCode function: 0_2_00007FF61BD5D9A00_2_00007FF61BD5D9A0
Source: C:\Users\user\Desktop\EBAbsk8ydv.exeCode function: 0_2_00007FF61BD418480_2_00007FF61BD41848
Source: C:\Users\user\Desktop\EBAbsk8ydv.exeCode function: 0_2_00007FF61BD56FB10_2_00007FF61BD56FB1
Source: C:\Users\user\Desktop\EBAbsk8ydv.exeCode function: 0_2_00007FF61BD714E00_2_00007FF61BD714E0
Source: C:\Users\user\Desktop\EBAbsk8ydv.exeCode function: 0_2_00007FF61BD614C00_2_00007FF61BD614C0
Source: C:\Users\user\Desktop\EBAbsk8ydv.exeCode function: 0_2_00007FF61BD724540_2_00007FF61BD72454
Source: C:\Users\user\Desktop\EBAbsk8ydv.exeCode function: 0_2_00007FF61BD7442C0_2_00007FF61BD7442C
Source: C:\Users\user\Desktop\EBAbsk8ydv.exeCode function: 0_2_00007FF61BD64C2C0_2_00007FF61BD64C2C
Source: C:\Users\user\Desktop\EBAbsk8ydv.exeCode function: 0_2_00007FF61BD62B780_2_00007FF61BD62B78
Source: C:\Users\user\Desktop\EBAbsk8ydv.exeCode function: 0_2_00007FF61BD77B2C0_2_00007FF61BD77B2C
Source: C:\Users\user\Desktop\EBAbsk8ydv.exeCode function: 0_2_00007FF61BD772C80_2_00007FF61BD772C8
Source: C:\Users\user\Desktop\EBAbsk8ydv.exeCode function: 0_2_00007FF61BD50AAC0_2_00007FF61BD50AAC
Source: C:\Users\user\Desktop\EBAbsk8ydv.exeCode function: 0_2_00007FF61BD66AAC0_2_00007FF61BD66AAC
Source: C:\Users\user\Desktop\EBAbsk8ydv.exeCode function: 0_2_00007FF61BD6A2780_2_00007FF61BD6A278
Source: C:\Users\user\Desktop\EBAbsk8ydv.exeCode function: 0_2_00007FF61BD4EA000_2_00007FF61BD4EA00
Source: C:\Users\user\Desktop\EBAbsk8ydv.exeCode function: 0_2_00007FF61BD529E40_2_00007FF61BD529E4
Source: C:\Users\user\Desktop\EBAbsk8ydv.exeCode function: 0_2_00007FF61BD5E1E80_2_00007FF61BD5E1E8
Source: C:\Users\user\Desktop\EBAbsk8ydv.exeCode function: 0_2_00007FF61BD471440_2_00007FF61BD47144
Source: C:\Users\user\Desktop\EBAbsk8ydv.exeCode function: 0_2_00007FF61BD748900_2_00007FF61BD74890
Source: C:\Users\user\Desktop\EBAbsk8ydv.exeCode function: 0_2_00007FF61BD6AFF00_2_00007FF61BD6AFF0
Source: C:\Users\user\Desktop\EBAbsk8ydv.exeCode function: 0_2_00007FF61BD43FD40_2_00007FF61BD43FD4
Source: C:\Users\user\Desktop\EBAbsk8ydv.exeCode function: 0_2_00007FF61BD6C7B40_2_00007FF61BD6C7B4
Source: C:\Users\user\Desktop\EBAbsk8ydv.exeCode function: 0_2_00007FF61BD70EBC0_2_00007FF61BD70EBC
Source: C:\Users\user\Desktop\EBAbsk8ydv.exeCode function: 0_2_00007FF61BD69EC80_2_00007FF61BD69EC8
Source: C:\Users\user\Desktop\EBAbsk8ydv.exeCode function: 0_2_00007FF61BD64EA00_2_00007FF61BD64EA0
Source: C:\Users\user\Desktop\EBAbsk8ydv.exeCode function: 0_2_00007FF61BD6B6AC0_2_00007FF61BD6B6AC
Source: C:\Users\user\Desktop\EBAbsk8ydv.exeCode function: 0_2_00007FF61BD62E900_2_00007FF61BD62E90
Source: C:\Users\user\Desktop\EBAbsk8ydv.exeCode function: 0_2_00007FF61BD7A6600_2_00007FF61BD7A660
Source: C:\Users\user\Desktop\EBAbsk8ydv.exeCode function: 0_2_00007FF61BD576700_2_00007FF61BD57670
Source: C:\Users\user\Desktop\EBAbsk8ydv.exeCode function: 0_2_00007FF61BD78D8C0_2_00007FF61BD78D8C
Source: C:\Users\user\Desktop\EBAbsk8ydv.exeCode function: 0_2_00007FF61BD65D540_2_00007FF61BD65D54
Source: EBAbsk8ydv.exeStatic PE information: invalid certificate
Source: EBAbsk8ydv.exeBinary or memory string: OriginalFilename vs EBAbsk8ydv.exe
Source: EBAbsk8ydv.exe, 00000000.00000000.2018453175.00007FF61BD95000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameqbroker.exe, vs EBAbsk8ydv.exe
Source: EBAbsk8ydv.exeBinary or memory string: OriginalFilenameqbroker.exe, vs EBAbsk8ydv.exe
Source: classification engineClassification label: mal56.troj.winEXE@1/0@1/1
Source: C:\Users\user\Desktop\EBAbsk8ydv.exeCode function: 0_2_00007FF61BD4EFA0 GetCurrentThreadId,PostThreadMessageW,Sleep,ShellExecuteW,CoCreateInstance,CoCreateInstance,0_2_00007FF61BD4EFA0
Source: EBAbsk8ydv.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\EBAbsk8ydv.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: EBAbsk8ydv.exeReversingLabs: Detection: 13%
Source: EBAbsk8ydv.exeVirustotal: Detection: 12%
Source: C:\Users\user\Desktop\EBAbsk8ydv.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\EBAbsk8ydv.exeSection loaded: wininet.dllJump to behavior
Source: C:\Users\user\Desktop\EBAbsk8ydv.exeSection loaded: netapi32.dllJump to behavior
Source: C:\Users\user\Desktop\EBAbsk8ydv.exeSection loaded: netutils.dllJump to behavior
Source: C:\Users\user\Desktop\EBAbsk8ydv.exeSection loaded: wkscli.dllJump to behavior
Source: C:\Users\user\Desktop\EBAbsk8ydv.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\EBAbsk8ydv.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\EBAbsk8ydv.exeSection loaded: iphlpapi.dllJump to behavior
Source: C:\Users\user\Desktop\EBAbsk8ydv.exeSection loaded: dhcpcsvc.dllJump to behavior
Source: C:\Users\user\Desktop\EBAbsk8ydv.exeSection loaded: winhttp.dllJump to behavior
Source: C:\Users\user\Desktop\EBAbsk8ydv.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\EBAbsk8ydv.exeSection loaded: webio.dllJump to behavior
Source: C:\Users\user\Desktop\EBAbsk8ydv.exeSection loaded: mswsock.dllJump to behavior
Source: C:\Users\user\Desktop\EBAbsk8ydv.exeSection loaded: winnsi.dllJump to behavior
Source: C:\Users\user\Desktop\EBAbsk8ydv.exeSection loaded: sspicli.dllJump to behavior
Source: C:\Users\user\Desktop\EBAbsk8ydv.exeSection loaded: dnsapi.dllJump to behavior
Source: C:\Users\user\Desktop\EBAbsk8ydv.exeSection loaded: rasadhlp.dllJump to behavior
Source: C:\Users\user\Desktop\EBAbsk8ydv.exeSection loaded: fwpuclnt.dllJump to behavior
Source: C:\Users\user\Desktop\EBAbsk8ydv.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\EBAbsk8ydv.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\EBAbsk8ydv.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\EBAbsk8ydv.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\EBAbsk8ydv.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\EBAbsk8ydv.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\EBAbsk8ydv.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\EBAbsk8ydv.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\EBAbsk8ydv.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\EBAbsk8ydv.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: C:\Users\user\Desktop\EBAbsk8ydv.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
Source: EBAbsk8ydv.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: EBAbsk8ydv.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: EBAbsk8ydv.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: EBAbsk8ydv.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: EBAbsk8ydv.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: EBAbsk8ydv.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: EBAbsk8ydv.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: EBAbsk8ydv.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: EBAbsk8ydv.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: E:\F1_proj_trunk\f1\src\features\qbroker\Release\qbroker64.pdb; source: EBAbsk8ydv.exe
Source: Binary string: E:\F1_proj_trunk\f1\src\features\qbroker\Release\qbroker64.pdb source: EBAbsk8ydv.exe
Source: EBAbsk8ydv.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: EBAbsk8ydv.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: EBAbsk8ydv.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: EBAbsk8ydv.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: EBAbsk8ydv.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Users\user\Desktop\EBAbsk8ydv.exeCode function: 0_2_00007FF61BD5CF60 GetSystemDirectoryW,LoadLibraryW,GetProcAddress,GetAdaptersInfo,FreeLibrary,0_2_00007FF61BD5CF60
Source: EBAbsk8ydv.exeStatic PE information: real checksum: 0x63c9a should be: 0x61a23

Persistence and Installation Behavior

barindex
Source: C:\Users\user\Desktop\EBAbsk8ydv.exeCode function: CreateFileW,DeviceIoControl,DeviceIoControl,CloseHandle, \\.\PhysicalDrive%d0_2_00007FF61BD5D434
Source: C:\Users\user\Desktop\EBAbsk8ydv.exeCode function: CreateFileW,DeviceIoControl,isalnum,isalnum,GetLastError,FindCloseChangeNotification, \\.\PhysicalDrive%d0_2_00007FF61BD5D9A0
Source: C:\Users\user\Desktop\EBAbsk8ydv.exeCode function: CreateFileW,DeviceIoControl,malloc,DeviceIoControl,free,CloseHandle, \\.\PhysicalDrive%d0_2_00007FF61BD5D748

Boot Survival

barindex
Source: C:\Users\user\Desktop\EBAbsk8ydv.exeCode function: CreateFileW,DeviceIoControl,DeviceIoControl,CloseHandle, \\.\PhysicalDrive%d0_2_00007FF61BD5D434
Source: C:\Users\user\Desktop\EBAbsk8ydv.exeCode function: CreateFileW,DeviceIoControl,isalnum,isalnum,GetLastError,FindCloseChangeNotification, \\.\PhysicalDrive%d0_2_00007FF61BD5D9A0
Source: C:\Users\user\Desktop\EBAbsk8ydv.exeCode function: CreateFileW,DeviceIoControl,malloc,DeviceIoControl,free,CloseHandle, \\.\PhysicalDrive%d0_2_00007FF61BD5D748
Source: C:\Users\user\Desktop\EBAbsk8ydv.exeCode function: 0_2_00007FF61BD62B78 EncodePointer,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00007FF61BD62B78
Source: C:\Users\user\Desktop\EBAbsk8ydv.exeProcess information set: NOALIGNMENTFAULTEXCEPT | NOGPFAULTERRORBOX | NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\EBAbsk8ydv.exeCode function: GetSystemDirectoryW,LoadLibraryW,GetProcAddress,GetAdaptersInfo,FreeLibrary,0_2_00007FF61BD5CF60
Source: C:\Users\user\Desktop\EBAbsk8ydv.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_0-22258
Source: C:\Users\user\Desktop\EBAbsk8ydv.exe TID: 4760Thread sleep time: -150000s >= -30000sJump to behavior
Source: C:\Users\user\Desktop\EBAbsk8ydv.exeFile opened: PhysicalDrive0Jump to behavior
Source: C:\Users\user\Desktop\EBAbsk8ydv.exeLast function: Thread delayed
Source: C:\Users\user\Desktop\EBAbsk8ydv.exeCode function: 0_2_00007FF61BD614C0 __doserrno,_errno,_invalid_parameter_noinfo,_errno,__doserrno,_getdrive,FindFirstFileExW,_errno,_errno,_wfullpath,_errno,_errno,_errno,_wfullpath,IsRootUNCName,GetDriveTypeW,free,__loctotime64_t,free,_wsopen_s,_fstat64,_close,FileTimeToSystemTime,SystemTimeToTzSpecificLocalTime,__loctotime64_t,FileTimeToSystemTime,SystemTimeToTzSpecificLocalTime,__loctotime64_t,FileTimeToSystemTime,SystemTimeToTzSpecificLocalTime,__loctotime64_t,FindClose,__wdtoxmode,GetLastError,_dosmaperr,FindClose,GetLastError,_dosmaperr,FindClose,0_2_00007FF61BD614C0
Source: C:\Users\user\Desktop\EBAbsk8ydv.exeCode function: 0_2_00007FF61BD58C4C FindFirstFileW,FindClose,0_2_00007FF61BD58C4C
Source: C:\Users\user\Desktop\EBAbsk8ydv.exeCode function: 0_2_00007FF61BD506C4 GetSystemTimeAsFileTime,GetModuleHandleW,GetProcAddress,GetSystemInfo,GetSystemDefaultLangID,InternetOpenA,InternetSetOptionW,InternetConnectW,0_2_00007FF61BD506C4
Source: EBAbsk8ydv.exe, 00000000.00000002.3273716612.0000025CDA148000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWp
Source: EBAbsk8ydv.exe, 00000000.00000002.3273716612.0000025CDA1B2000.00000004.00000020.00020000.00000000.sdmp, EBAbsk8ydv.exe, 00000000.00000003.3261373186.0000025CDA1B2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: EBAbsk8ydv.exe, 00000000.00000002.3273716612.0000025CDA1B2000.00000004.00000020.00020000.00000000.sdmp, EBAbsk8ydv.exe, 00000000.00000003.3261373186.0000025CDA1B2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
Source: C:\Users\user\Desktop\EBAbsk8ydv.exeAPI call chain: ExitProcess graph end nodegraph_0-22196
Source: C:\Users\user\Desktop\EBAbsk8ydv.exeCode function: 0_2_00007FF61BD5ECDC GetLastError,IsDebuggerPresent,OutputDebugStringW,0_2_00007FF61BD5ECDC
Source: C:\Users\user\Desktop\EBAbsk8ydv.exeCode function: 0_2_00007FF61BD5ECDC GetLastError,IsDebuggerPresent,OutputDebugStringW,0_2_00007FF61BD5ECDC
Source: C:\Users\user\Desktop\EBAbsk8ydv.exeCode function: 0_2_00007FF61BD5CF60 GetSystemDirectoryW,LoadLibraryW,GetProcAddress,GetAdaptersInfo,FreeLibrary,0_2_00007FF61BD5CF60
Source: C:\Users\user\Desktop\EBAbsk8ydv.exeCode function: 0_2_00007FF61BD74D00 _lseeki64_nolock,_lseeki64_nolock,GetProcessHeap,HeapAlloc,_errno,_errno,_setmode_nolock,_write_nolock,__doserrno,_errno,_setmode_nolock,GetProcessHeap,HeapFree,_lseeki64_nolock,_get_osfhandle,SetEndOfFile,_errno,__doserrno,GetLastError,_lseeki64_nolock,0_2_00007FF61BD74D00
Source: C:\Users\user\Desktop\EBAbsk8ydv.exeCode function: 0_2_00007FF61BD687D8 SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF61BD687D8
Source: C:\Users\user\Desktop\EBAbsk8ydv.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,0_2_00007FF61BD71D1C
Source: C:\Users\user\Desktop\EBAbsk8ydv.exeCode function: __crtGetLocaleInfoEx,malloc,__crtGetLocaleInfoEx,WideCharToMultiByte,free,0_2_00007FF61BD6E4DC
Source: C:\Users\user\Desktop\EBAbsk8ydv.exeCode function: _getptd,TranslateName,GetLocaleNameFromLangCountry,GetLocaleNameFromLanguage,TranslateName,GetLocaleNameFromLangCountry,ProcessCodePage,IsValidCodePage,__crtGetLocaleInfoEx,__crtGetLocaleInfoEx,wcschr,wcschr,__crtGetLocaleInfoEx,_itow_s,GetLocaleNameFromLanguage,__crtGetUserDefaultLocaleName,_invoke_watson,_invoke_watson,_getptd,_getptd,LcidFromHexString,GetLocaleInfoW,0_2_00007FF61BD714E0
Source: C:\Users\user\Desktop\EBAbsk8ydv.exeCode function: __crtGetLocaleInfoEx,0_2_00007FF61BD713DC
Source: C:\Users\user\Desktop\EBAbsk8ydv.exeCode function: _getptd,_getptd,LcidFromHexString,GetLocaleInfoW,TestDefaultLanguage,0_2_00007FF61BD71BD0
Source: C:\Users\user\Desktop\EBAbsk8ydv.exeCode function: __crtGetLocaleInfoEx,__crtGetLocaleInfoEx,GetACP,0_2_00007FF61BD71328
Source: C:\Users\user\Desktop\EBAbsk8ydv.exeCode function: _getptd,_getptd,LcidFromHexString,GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,TestDefaultLanguage,0_2_00007FF61BD719A0
Source: C:\Users\user\Desktop\EBAbsk8ydv.exeCode function: __crtDownlevelLocaleNameToLCID,GetLocaleInfoW,0_2_00007FF61BD6E944
Source: C:\Users\user\Desktop\EBAbsk8ydv.exeCode function: EnumSystemLocalesW,0_2_00007FF61BD6E900
Source: C:\Users\user\Desktop\EBAbsk8ydv.exeCode function: _getptd,EnumSystemLocalesW,0_2_00007FF61BD7190C
Source: C:\Users\user\Desktop\EBAbsk8ydv.exeCode function: _getptd,EnumSystemLocalesW,0_2_00007FF61BD71858
Source: C:\Users\user\Desktop\EBAbsk8ydv.exeCode function: _getptd,__crtGetLocaleInfoEx,__crtGetLocaleInfoEx,TestDefaultCountry,__crtGetLocaleInfoEx,TestDefaultCountry,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_getptd,__crtGetLocaleInfoEx,_invoke_watson,0_2_00007FF61BD70EBC
Source: C:\Users\user\Desktop\EBAbsk8ydv.exeCode function: _getptd,__lc_wcstolc,__get_qualified_locale_downlevel,__get_qualified_locale,__lc_lctowcs,__crtGetLocaleInfoEx,GetACP,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,0_2_00007FF61BD64EA0
Source: C:\Users\user\Desktop\EBAbsk8ydv.exeCode function: _getptd,_getptd,TranslateName,GetLcidFromLangCountry,GetLcidFromLanguage,TranslateName,GetLcidFromLangCountry,GetLcidFromLanguage,_getptd,EnumSystemLocalesW,GetUserDefaultLCID,ProcessCodePage,IsValidCodePage,IsValidLocale,__crtDownlevelLCIDToLocaleName,__crtDownlevelLCIDToLocaleName,GetLocaleInfoW,GetLocaleInfoW,_itow_s,0_2_00007FF61BD71E74
Source: C:\Users\user\Desktop\EBAbsk8ydv.exeCode function: _LocaleUpdate::_LocaleUpdate,__crtGetLocaleInfoA_stat,0_2_00007FF61BD6E648
Source: C:\Users\user\Desktop\EBAbsk8ydv.exeCode function: _getptd,GetLocaleInfoW,0_2_00007FF61BD71DCC
Source: C:\Users\user\Desktop\EBAbsk8ydv.exeCode function: __crtGetLocaleInfoA,GetLastError,__crtGetLocaleInfoA,_calloc_crt,__crtGetLocaleInfoA,_calloc_crt,free,free,__crtGetLocaleInfoEx,_calloc_crt,__crtGetLocaleInfoEx,free,__crtGetLocaleInfoEx,_invoke_watson,0_2_00007FF61BD63598
Source: C:\Users\user\Desktop\EBAbsk8ydv.exeCode function: 0_2_00007FF61BD506C4 GetSystemTimeAsFileTime,GetModuleHandleW,GetProcAddress,GetSystemInfo,GetSystemDefaultLangID,InternetOpenA,InternetSetOptionW,InternetConnectW,0_2_00007FF61BD506C4
Source: C:\Users\user\Desktop\EBAbsk8ydv.exeCode function: 0_2_00007FF61BD7442C _lock,_get_daylight,_get_daylight,_get_daylight,___lc_codepage_func,_getenv_helper_nolock,free,_malloc_crt,_invoke_watson,free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,_invoke_watson,0_2_00007FF61BD7442C
Source: C:\Users\user\Desktop\EBAbsk8ydv.exeCode function: 0_2_00007FF61BD5DF34 GetVersionExW,0_2_00007FF61BD5DF34
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
Native API
1
Bootkit
1
DLL Side-Loading
2
Virtualization/Sandbox Evasion
OS Credential Dumping2
System Time Discovery
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/Job1
DLL Side-Loading
Boot or Logon Initialization Scripts1
Bootkit
LSASS Memory41
Security Software Discovery
Remote Desktop ProtocolData from Removable Media1
Ingress Tool Transfer
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager2
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared Drive2
Non-Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDS1
System Network Configuration Discovery
Distributed Component Object ModelInput Capture12
Application Layer Protocol
Traffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets1
File and Directory Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials24
System Information Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
EBAbsk8ydv.exe14%ReversingLabs
EBAbsk8ydv.exe12%VirustotalBrowse
No Antivirus matches
No Antivirus matches
No Antivirus matches
SourceDetectionScannerLabelLink
http://crl.thawte.com/ThawteTimestampingCA.crl00%URL Reputationsafe
http://ocsp.thawte.com00%URL Reputationsafe
http://xn--ypd.dssdhome.xyz/ll0%Avira URL Cloudsafe
http://11.dssdhome.xyz/11/ip.bin0%Avira URL Cloudsafe
http://xn--ypd.dssdhome.xyz/11/ip.bin0%Avira URL Cloudsafe
http://xn--ypd.dssdhome.xyz/0%Avira URL Cloudsafe
http://xn--ypd.dssdhome.xyz/11/ip.binI0%Avira URL Cloudsafe
http://xn--ypd.dssdhome.xyz/.2&aGV0%Avira URL Cloudsafe
https://xn--ypd.dssdhome.xyz/11/ip.bin0%Avira URL Cloudsafe
http://xn--ypd.dssdhome.xyz/.2refox/70.20%Avira URL Cloudsafe
http://xn--ypd.dssdhome.xyz/11/ip.bin.0%Avira URL Cloudsafe
http://xn--ypd.dssdhome.xyz:80/11/ip.bin0%Avira URL Cloudsafe
http://xn--ypd.dssdhome.xyz/11/ip.bin0%VirustotalBrowse
http://xn--ypd.dssdhome.xyz/11/ip.binz0%Avira URL Cloudsafe
http://xn--ypd.dssdhome.xyz:80/11/ip.biny0%Avira URL Cloudsafe
http://xn--ypd.dssdhome.xyz:80/11/ip.bin0%VirustotalBrowse
https://xn--ypd.dssdhome.xyz/11/ip.binE0%Avira URL Cloudsafe
http://xn--ypd.dssdhome.xyz/11/ip.binx0%Avira URL Cloudsafe
http://xn--ypd.dssdhome.xyz:80/11/ip.binP&o9V0%Avira URL Cloudsafe
http://xn--ypd.dssdhome.xyz/lla0%Avira URL Cloudsafe
https://xn--ypd.dssdhome.xyz/11/ip.bino0%Avira URL Cloudsafe
http://xn--ypd.dssdhome.xyz/.20%Avira URL Cloudsafe
http://xn--ypd.dssdhome.xyz/xa0%Avira URL Cloudsafe
http://xn--ypd.dssdhome.xyz:80/11/ip.binPf0%Avira URL Cloudsafe
NameIPActiveMaliciousAntivirus DetectionReputation
mooscc.b-cdn.net
169.150.247.38
truefalse
    unknown
    xn--ypd.dssdhome.xyz
    unknown
    unknowntrue
      unknown
      NameSourceMaliciousAntivirus DetectionReputation
      http://xn--ypd.dssdhome.xyz/11/ip.binIEBAbsk8ydv.exe, 00000000.00000002.3273716612.0000025CDA189000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://xn--ypd.dssdhome.xyz/EBAbsk8ydv.exe, 00000000.00000003.3261373186.0000025CDA1B2000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://xn--ypd.dssdhome.xyz/11/ip.binEBAbsk8ydv.exe, 00000000.00000002.3273716612.0000025CDA1B2000.00000004.00000020.00020000.00000000.sdmp, EBAbsk8ydv.exe, 00000000.00000002.3273716612.0000025CDA189000.00000004.00000020.00020000.00000000.sdmp, EBAbsk8ydv.exe, 00000000.00000002.3273716612.0000025CDA148000.00000004.00000020.00020000.00000000.sdmp, EBAbsk8ydv.exe, 00000000.00000003.3261373186.0000025CDA180000.00000004.00000020.00020000.00000000.sdmp, EBAbsk8ydv.exe, 00000000.00000003.3261373186.0000025CDA1B2000.00000004.00000020.00020000.00000000.sdmpfalse
      • 0%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      http://11.dssdhome.xyz/11/ip.binEBAbsk8ydv.exe, 00000000.00000002.3273555261.000000EF41CFA000.00000004.00000010.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://crl.thawte.com/ThawteTimestampingCA.crl0EBAbsk8ydv.exefalse
      • URL Reputation: safe
      unknown
      http://xn--ypd.dssdhome.xyz/llEBAbsk8ydv.exe, 00000000.00000002.3273716612.0000025CDA1B2000.00000004.00000020.00020000.00000000.sdmp, EBAbsk8ydv.exe, 00000000.00000003.3261373186.0000025CDA1B2000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://ocsp.thawte.com0EBAbsk8ydv.exefalse
      • URL Reputation: safe
      unknown
      http://xn--ypd.dssdhome.xyz/.2&aGVEBAbsk8ydv.exe, 00000000.00000002.3273716612.0000025CDA1B2000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://xn--ypd.dssdhome.xyz/11/ip.binEBAbsk8ydv.exe, 00000000.00000003.3261373186.0000025CDA1B2000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://xn--ypd.dssdhome.xyz/.2refox/70.2EBAbsk8ydv.exe, 00000000.00000003.3261373186.0000025CDA1B2000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://xn--ypd.dssdhome.xyz/11/ip.bin.EBAbsk8ydv.exe, 00000000.00000002.3273716612.0000025CDA1B2000.00000004.00000020.00020000.00000000.sdmp, EBAbsk8ydv.exe, 00000000.00000003.3261373186.0000025CDA1B2000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://xn--ypd.dssdhome.xyz:80/11/ip.binEBAbsk8ydv.exe, 00000000.00000002.3273716612.0000025CDA1B2000.00000004.00000020.00020000.00000000.sdmp, EBAbsk8ydv.exe, 00000000.00000002.3273716612.0000025CDA148000.00000004.00000020.00020000.00000000.sdmp, EBAbsk8ydv.exe, 00000000.00000003.3261373186.0000025CDA1B2000.00000004.00000020.00020000.00000000.sdmpfalse
      • 0%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      http://xn--ypd.dssdhome.xyz/11/ip.binzEBAbsk8ydv.exe, 00000000.00000002.3273716612.0000025CDA189000.00000004.00000020.00020000.00000000.sdmp, EBAbsk8ydv.exe, 00000000.00000003.3261373186.0000025CDA180000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://xn--ypd.dssdhome.xyz:80/11/ip.binyEBAbsk8ydv.exe, 00000000.00000002.3273716612.0000025CDA1B2000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://xn--ypd.dssdhome.xyz/11/ip.binEEBAbsk8ydv.exe, 00000000.00000002.3273716612.0000025CDA1B2000.00000004.00000020.00020000.00000000.sdmp, EBAbsk8ydv.exe, 00000000.00000003.3261373186.0000025CDA1B2000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://xn--ypd.dssdhome.xyz/11/ip.binxEBAbsk8ydv.exe, 00000000.00000002.3273716612.0000025CDA1B2000.00000004.00000020.00020000.00000000.sdmp, EBAbsk8ydv.exe, 00000000.00000003.3261373186.0000025CDA1B2000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://xn--ypd.dssdhome.xyz:80/11/ip.binP&o9VEBAbsk8ydv.exe, 00000000.00000002.3273716612.0000025CDA1B2000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://xn--ypd.dssdhome.xyz/llaEBAbsk8ydv.exe, 00000000.00000003.3261373186.0000025CDA1B2000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://xn--ypd.dssdhome.xyz/11/ip.binoEBAbsk8ydv.exe, 00000000.00000002.3273716612.0000025CDA1B2000.00000004.00000020.00020000.00000000.sdmp, EBAbsk8ydv.exe, 00000000.00000003.3261373186.0000025CDA1B2000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://xn--ypd.dssdhome.xyz/.2EBAbsk8ydv.exe, 00000000.00000002.3273716612.0000025CDA1B2000.00000004.00000020.00020000.00000000.sdmp, EBAbsk8ydv.exe, 00000000.00000003.3261373186.0000025CDA1B2000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://xn--ypd.dssdhome.xyz/xaEBAbsk8ydv.exe, 00000000.00000002.3273716612.0000025CDA1B2000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://xn--ypd.dssdhome.xyz:80/11/ip.binPfEBAbsk8ydv.exe, 00000000.00000003.3261373186.0000025CDA1B2000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs
      IPDomainCountryFlagASNASN NameMalicious
      169.150.247.38
      mooscc.b-cdn.netUnited States
      2711SPIRITTEL-ASUSfalse
      Joe Sandbox version:40.0.0 Tourmaline
      Analysis ID:1488510
      Start date and time:2024-08-06 06:47:07 +02:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 3m 58s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Number of analysed new started processes analysed:5
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Sample name:EBAbsk8ydv.exe
      renamed because original name is a hash value
      Original Sample Name:4fdb0465d2a66e1d810e072b8e205bf7445566a8e9a97c4cd3da0a7b4dc991a4.exe
      Detection:MAL
      Classification:mal56.troj.winEXE@1/0@1/1
      EGA Information:
      • Successful, ratio: 100%
      HCA Information:
      • Successful, ratio: 100%
      • Number of executed functions: 13
      • Number of non-executed functions: 55
      Cookbook Comments:
      • Found application associated with file extension: .exe
      • Exclude process from analysis (whitelisted): dllhost.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
      TimeTypeDescription
      00:49:57API Interceptor22x Sleep call for process: EBAbsk8ydv.exe modified
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      169.150.247.38https://softworldinc.wpengine.comGet hashmaliciousUnknownBrowse
      • cdn.rawgit.com/michalsnik/aos/2.1.1/dist/aos.js
      rPRESSUREREDUCINGVALVE_pdf.exeGet hashmaliciousFormBook, GuLoaderBrowse
      • www.openlend.lat/aw8o/?-wkb=JwP18BaQn2gAMbwzAk/tzHq1rHqPkgowxzXz/N2AVg5llpqPoDBUT4Fbw9qJesVKC8w5QoNuWE8SYi183Rf2cdVRH8sDFcjA1Q==&_-=axSpBNXszGs9cCrW
      No context
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      SPIRITTEL-ASUShttps://mato-camp-v4.b-cdn.net/kestyGet hashmaliciousUnknownBrowse
      • 169.150.247.33
      https://forms.office.com/Pages/ResponsePage.aspx?id=mZB7T0Dtr0mx-Js9AsqUvjkKVGExcKpLpLje28x2_kZUOVA4UU9WT0pSQUFPSTZPUlhWTElINUNETy4uGet hashmaliciousHTMLPhisherBrowse
      • 169.150.247.37
      https://16784846511.cloud/Get hashmaliciousUnknownBrowse
      • 169.150.247.36
      jQ0zXV2d1X.elfGet hashmaliciousMiraiBrowse
      • 165.167.232.23
      https://ipfs.io/ipfs/QmVLJJWuJ1bT38BeLkxSKLDMhVADeV6vmCtQ5cAqW3qdoRGet hashmaliciousHTMLPhisherBrowse
      • 169.150.247.36
      IISz6QDXkY.elfGet hashmaliciousMiraiBrowse
      • 207.146.102.5
      https://markeertrafficservicebv6t3etwyghdsbn.dorik.io/Get hashmaliciousUnknownBrowse
      • 169.150.247.36
      https://link.storjshare.io/s/jvktcsf5ypoak5aucs6fn6noqgga/crowdstrikesupport/update.zip?download=1Get hashmaliciousUnknownBrowse
      • 169.150.247.39
      https://www.globalepic.co.kr/view.php?ud=202408011057515744edd3030223_29Get hashmaliciousUnknownBrowse
      • 169.150.236.104
      No context
      No context
      No created / dropped files found
      File type:PE32+ executable (GUI) x86-64, for MS Windows
      Entropy (8bit):6.219147275536416
      TrID:
      • Win64 Executable GUI (202006/5) 92.65%
      • Win64 Executable (generic) (12005/4) 5.51%
      • Generic Win/DOS Executable (2004/3) 0.92%
      • DOS Executable Generic (2002/1) 0.92%
      • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
      File name:EBAbsk8ydv.exe
      File size:352'608 bytes
      MD5:e546e832f5762cbf8f28b6558c012b8d
      SHA1:ad6368dbb616f9a1a56ec1d3ac9026887928ad63
      SHA256:4fdb0465d2a66e1d810e072b8e205bf7445566a8e9a97c4cd3da0a7b4dc991a4
      SHA512:f68c9286765cca89fc63020b2573ddc88cff745e5502fd5cf97c1160ce8f46a6bd08227be335d3a2022a1ac179eddddbd52d05c7a9c32332cffcc1dbd7de21c7
      SSDEEP:6144:rEdue2soURTO6e6FMCnIpXsuJr79LLKFdLEH5Z:rm2soUQR+nIhLKFd4Z
      TLSH:94747E69F2E455F8C46BC63689964642D3F27C261A7ADF4F13A0472B2F332909F2D712
      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......B....p...p...p..@!F..p..@!x.Jp..@!y..p....W..p....R..p...p...p..{.|..p..."B..p...p...p..{.G..p..Rich.p.........................
      Icon Hash:00928e8e8686b000
      Entrypoint:0x140020618
      Entrypoint Section:.text
      Digitally signed:true
      Imagebase:0x140000000
      Subsystem:windows gui
      Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
      DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
      Time Stamp:0x5626F46B [Wed Oct 21 02:11:55 2015 UTC]
      TLS Callbacks:
      CLR (.Net) Version:
      OS Version Major:5
      OS Version Minor:2
      File Version Major:5
      File Version Minor:2
      Subsystem Version Major:5
      Subsystem Version Minor:2
      Import Hash:b330d810ce52a718c58fc0a72cbb426c
      Signature Valid:false
      Signature Issuer:CN=VeriSign Class 3 Code Signing 2010 CA, OU=Terms of use at https://www.verisign.com/rpa (c)10, OU=VeriSign Trust Network, O="VeriSign, Inc.", C=US
      Signature Validation Error:The digital signature of the object did not verify
      Error Number:-2146869232
      Not Before, Not After
      • 16/01/2013 19:00:00 16/02/2016 18:59:59
      Subject Chain
      • CN=Tencent Technology(Shenzhen) Company Limited, OU=Digital ID Class 3 - Microsoft Software Validation v2, O=Tencent Technology(Shenzhen) Company Limited, L=shenzhen, S=guangdong, C=CN
      Version:3
      Thumbprint MD5:242913A2A31BAD3BC7F08E547E0BBFAD
      Thumbprint SHA-1:2FDD445591CD2EEDBEF8B8A281896A59C08B3DC9
      Thumbprint SHA-256:16DB61B6F85E044F6DE44775EC093BEFDA52C35C4AB1424E9463C01B5E11E386
      Serial:7170BD93CF3F189AE6452B514C49340E
      Instruction
      dec eax
      sub esp, 28h
      call 00007FD3257F8BE8h
      dec eax
      add esp, 28h
      jmp 00007FD3257F102Bh
      int3
      int3
      int3
      int3
      int3
      int3
      int3
      int3
      int3
      int3
      int3
      int3
      nop word ptr [eax+eax+00000000h]
      dec eax
      mov eax, ecx
      dec eax
      neg ecx
      dec eax
      test eax, 00000007h
      je 00007FD3257F1201h
      nop
      mov dl, byte ptr [eax]
      dec eax
      inc eax
      test dl, dl
      je 00007FD3257F1251h
      test al, 07h
      jne 00007FD3257F11E5h
      dec ecx
      mov eax, FEFEFEFFh
      Programming Language:
      • [RES] VS2013 build 21005
      • [LNK] VS2013 UPD4 build 31101
      NameVirtual AddressVirtual Size Is in Section
      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IMPORT0x4da380xf0.rdata
      IMAGE_DIRECTORY_ENTRY_RESOURCE0x580000x6e8.rsrc
      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x550000x2a54.pdata
      IMAGE_DIRECTORY_ENTRY_SECURITY0x548000x1960
      IMAGE_DIRECTORY_ENTRY_BASERELOC0x590000xbf4.reloc
      IMAGE_DIRECTORY_ENTRY_DEBUG0x3c6100x38.rdata
      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x481f00x70.rdata
      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IAT0x3c0000x538.rdata
      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
      .text0x10000x3affc0x3b000043d7a8a7762ce240ee30b0e264bf052False0.4893198821504237data6.43588709572288IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      .rdata0x3c0000x12bca0x12c00b8c697b4fe8eae5f35d8658801eb1c54False0.3447395833333333data4.4036530103672185IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .data0x4f0000x52380x2800752715e664679c0b2c6de2e3dfe40a72False0.24716796875data3.448216610884499IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
      .pdata0x550000x2a540x2c00c883e64b3fad00cc2dfa25ec2d2587a5False0.4665305397727273data5.31766570768096IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .rsrc0x580000x6e80x800dfea87dd18bd72fb2394ad0ec611cfd5False0.40478515625data4.374395563555661IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .reloc0x590000xbf40xc00e2b726280567b8e93f7147381710dc80False0.4895833333333333data5.420233678628129IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
      NameRVASizeTypeLanguageCountryZLIB Complexity
      RT_VERSION0x580a00x2dcdataChineseChina0.47950819672131145
      RT_MANIFEST0x583800x365XML 1.0 document, Unicode text, UTF-8 (with BOM) text, with very long lines (809), with CRLF line terminatorsEnglishUnited States0.4890678941311853
      DLLImport
      KERNEL32.dllGetLastError, HeapSize, EnterCriticalSection, CreateEventW, DecodePointer, WaitForMultipleObjects, CreateWaitableTimerW, DeleteCriticalSection, GetCurrentThreadId, CloseHandle, CreateThread, RaiseException, Sleep, GetCurrentProcess, GetModuleHandleW, OpenProcess, LoadLibraryW, GetProcAddress, OpenThread, GetModuleHandleA, LocalFree, LeaveCriticalSection, InitializeCriticalSectionAndSpinCount, InitializeCriticalSection, GetProcessHeap, SetEvent, WaitForSingleObject, HeapFree, SetWaitableTimer, HeapAlloc, SetErrorMode, GetModuleFileNameW, HeapReAlloc, SetEnvironmentVariableA, FlushFileBuffers, WriteConsoleW, ReadConsoleW, SetEndOfFile, GetTimeZoneInformation, SetStdHandle, SetFilePointerEx, GetConsoleMode, GetConsoleCP, EnumSystemLocalesW, GetUserDefaultLCID, IsValidLocale, GetLocaleInfoW, LCMapStringW, CompareStringW, LoadLibraryExW, GetCurrentDirectoryW, GetFullPathNameW, PeekNamedPipe, GetFileInformationByHandle, FileTimeToLocalFileTime, TlsFree, TlsSetValue, TlsGetValue, TlsAlloc, TerminateProcess, SetUnhandledExceptionFilter, UnhandledExceptionFilter, RtlVirtualUnwind, RtlCaptureContext, FreeEnvironmentStringsW, IsDebuggerPresent, OutputDebugStringW, MultiByteToWideChar, WideCharToMultiByte, GetSystemDefaultLangID, GetSystemTimeAsFileTime, GetSystemInfo, GetVersionExW, CreateFileW, CopyFileW, DeleteFileW, GetFileSize, ReadFile, WriteFile, FindFirstFileW, FindClose, ExpandEnvironmentStringsW, GetSystemDirectoryW, FreeLibrary, DeviceIoControl, EncodePointer, GetCommandLineW, RtlPcToFileHeader, RtlLookupFunctionEntry, RtlUnwindEx, FindFirstFileExW, GetDriveTypeW, SystemTimeToTzSpecificLocalTime, FileTimeToSystemTime, CreateDirectoryW, IsProcessorFeaturePresent, ExitProcess, GetModuleHandleExW, GetStdHandle, IsValidCodePage, GetACP, GetOEMCP, GetCPInfo, SetLastError, GetStringTypeW, GetFileType, GetStartupInfoW, QueryPerformanceCounter, GetCurrentProcessId, GetEnvironmentStringsW
      USER32.dllPostThreadMessageW, PostQuitMessage, GetMessageW, DispatchMessageW
      ADVAPI32.dllRegSetValueExW, RegCloseKey, RegOpenKeyExW, RegQueryValueExW, RegCreateKeyExW, RegOpenKeyExA, RegQueryValueExA
      SHELL32.dllCommandLineToArgvW, ShellExecuteW, SHGetSpecialFolderPathW
      ole32.dllCoUninitialize, StringFromGUID2, CoInitializeEx, CoRevokeClassObject, CoRegisterClassObject, CoCreateInstance, CoInitialize, CoCreateGuid, CoRegisterMessageFilter
      OLEAUT32.dllSysAllocString, SysFreeString, SysStringLen, VariantClear, VariantInit, SysAllocStringLen, VariantChangeType
      SHLWAPI.dllPathAppendW, PathFileExistsW, PathFindFileNameW
      VERSION.dllGetFileVersionInfoW, VerQueryValueW
      WS2_32.dllhtonl, htons
      WININET.dllHttpSendRequestA, HttpOpenRequestW, InternetConnectW, InternetSetOptionW, InternetOpenA, InternetCloseHandle
      NETAPI32.dllNetbios, NetApiBufferFree, NetWkstaTransportEnum
      Language of compilation systemCountry where language is spokenMap
      ChineseChina
      EnglishUnited States
      TimestampSource PortDest PortSource IPDest IP
      Aug 6, 2024 06:49:57.262454987 CEST4971780192.168.2.5169.150.247.38
      Aug 6, 2024 06:49:57.269674063 CEST8049717169.150.247.38192.168.2.5
      Aug 6, 2024 06:49:57.269773006 CEST4971780192.168.2.5169.150.247.38
      Aug 6, 2024 06:49:57.269931078 CEST4971780192.168.2.5169.150.247.38
      Aug 6, 2024 06:49:57.281670094 CEST8049717169.150.247.38192.168.2.5
      Aug 6, 2024 06:49:57.911437988 CEST8049717169.150.247.38192.168.2.5
      Aug 6, 2024 06:49:57.952321053 CEST4971780192.168.2.5169.150.247.38
      Aug 6, 2024 06:49:58.017133951 CEST4971780192.168.2.5169.150.247.38
      Aug 6, 2024 06:49:58.024327993 CEST8049717169.150.247.38192.168.2.5
      Aug 6, 2024 06:49:58.205720901 CEST8049717169.150.247.38192.168.2.5
      Aug 6, 2024 06:49:58.249180079 CEST4971780192.168.2.5169.150.247.38
      Aug 6, 2024 06:49:58.313817978 CEST4971780192.168.2.5169.150.247.38
      Aug 6, 2024 06:49:58.318697929 CEST8049717169.150.247.38192.168.2.5
      Aug 6, 2024 06:49:58.499335051 CEST8049717169.150.247.38192.168.2.5
      Aug 6, 2024 06:49:58.546098948 CEST4971780192.168.2.5169.150.247.38
      Aug 6, 2024 06:49:58.610755920 CEST4971780192.168.2.5169.150.247.38
      Aug 6, 2024 06:49:58.617762089 CEST8049717169.150.247.38192.168.2.5
      Aug 6, 2024 06:49:58.798878908 CEST8049717169.150.247.38192.168.2.5
      Aug 6, 2024 06:49:58.842983007 CEST4971780192.168.2.5169.150.247.38
      Aug 6, 2024 06:49:58.921405077 CEST4971780192.168.2.5169.150.247.38
      Aug 6, 2024 06:49:58.927308083 CEST8049717169.150.247.38192.168.2.5
      Aug 6, 2024 06:49:59.108037949 CEST8049717169.150.247.38192.168.2.5
      Aug 6, 2024 06:49:59.155453920 CEST4971780192.168.2.5169.150.247.38
      Aug 6, 2024 06:49:59.244649887 CEST4971780192.168.2.5169.150.247.38
      Aug 6, 2024 06:49:59.250206947 CEST8049717169.150.247.38192.168.2.5
      Aug 6, 2024 06:49:59.429970980 CEST8049717169.150.247.38192.168.2.5
      Aug 6, 2024 06:49:59.433697939 CEST4971780192.168.2.5169.150.247.38
      Aug 6, 2024 06:49:59.439074039 CEST8049717169.150.247.38192.168.2.5
      Aug 6, 2024 06:49:59.441411018 CEST4971780192.168.2.5169.150.247.38
      Aug 6, 2024 06:49:59.555691004 CEST4971880192.168.2.5169.150.247.38
      Aug 6, 2024 06:49:59.560662031 CEST8049718169.150.247.38192.168.2.5
      Aug 6, 2024 06:49:59.560744047 CEST4971880192.168.2.5169.150.247.38
      Aug 6, 2024 06:49:59.560867071 CEST4971880192.168.2.5169.150.247.38
      Aug 6, 2024 06:49:59.565654039 CEST8049718169.150.247.38192.168.2.5
      Aug 6, 2024 06:50:00.197655916 CEST8049718169.150.247.38192.168.2.5
      Aug 6, 2024 06:50:00.249172926 CEST4971880192.168.2.5169.150.247.38
      Aug 6, 2024 06:50:00.313848972 CEST4971880192.168.2.5169.150.247.38
      Aug 6, 2024 06:50:00.318672895 CEST8049718169.150.247.38192.168.2.5
      Aug 6, 2024 06:50:00.508359909 CEST8049718169.150.247.38192.168.2.5
      Aug 6, 2024 06:50:00.561811924 CEST4971880192.168.2.5169.150.247.38
      Aug 6, 2024 06:50:00.626308918 CEST4971880192.168.2.5169.150.247.38
      Aug 6, 2024 06:50:00.631752968 CEST8049718169.150.247.38192.168.2.5
      Aug 6, 2024 06:50:00.813179970 CEST8049718169.150.247.38192.168.2.5
      Aug 6, 2024 06:50:00.858572960 CEST4971880192.168.2.5169.150.247.38
      Aug 6, 2024 06:50:00.938793898 CEST4971880192.168.2.5169.150.247.38
      Aug 6, 2024 06:50:00.943757057 CEST8049718169.150.247.38192.168.2.5
      Aug 6, 2024 06:50:01.275109053 CEST8049718169.150.247.38192.168.2.5
      Aug 6, 2024 06:50:01.327472925 CEST4971880192.168.2.5169.150.247.38
      Aug 6, 2024 06:50:01.392329931 CEST4971880192.168.2.5169.150.247.38
      Aug 6, 2024 06:50:01.397145033 CEST8049718169.150.247.38192.168.2.5
      Aug 6, 2024 06:50:01.876283884 CEST8049718169.150.247.38192.168.2.5
      Aug 6, 2024 06:50:01.883272886 CEST8049718169.150.247.38192.168.2.5
      Aug 6, 2024 06:50:01.883409977 CEST4971880192.168.2.5169.150.247.38
      Aug 6, 2024 06:50:01.986604929 CEST4971880192.168.2.5169.150.247.38
      Aug 6, 2024 06:50:01.991575003 CEST8049718169.150.247.38192.168.2.5
      Aug 6, 2024 06:50:02.173449039 CEST8049718169.150.247.38192.168.2.5
      Aug 6, 2024 06:50:02.173610926 CEST4971880192.168.2.5169.150.247.38
      Aug 6, 2024 06:50:02.179132938 CEST8049718169.150.247.38192.168.2.5
      Aug 6, 2024 06:50:02.179198980 CEST4971880192.168.2.5169.150.247.38
      TimestampSource PortDest PortSource IPDest IP
      Aug 6, 2024 06:49:56.622706890 CEST5011753192.168.2.51.1.1.1
      Aug 6, 2024 06:49:57.257381916 CEST53501171.1.1.1192.168.2.5
      TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
      Aug 6, 2024 06:49:56.622706890 CEST192.168.2.51.1.1.10x657Standard query (0)xn--ypd.dssdhome.xyzA (IP address)IN (0x0001)false
      TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
      Aug 6, 2024 06:49:57.257381916 CEST1.1.1.1192.168.2.50x657No error (0)xn--ypd.dssdhome.xyzmooscc.b-cdn.netCNAME (Canonical name)IN (0x0001)false
      Aug 6, 2024 06:49:57.257381916 CEST1.1.1.1192.168.2.50x657No error (0)mooscc.b-cdn.net169.150.247.38A (IP address)IN (0x0001)false
      • xn--ypd.dssdhome.xyz
      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
      0192.168.2.549717169.150.247.38806552C:\Users\user\Desktop\EBAbsk8ydv.exe
      TimestampBytes transferredDirectionData
      Aug 6, 2024 06:49:57.269931078 CEST153OUTGET /11/ip.bin HTTP/1.1
      Connection: Keep-Alive
      User-Agent: Mozilla/5.0 (Linux i644 ; en-US) Gecko/20100101 Firefox/70.2
      Host: xn--ypd.dssdhome.xyz
      Aug 6, 2024 06:49:57.911437988 CEST527INHTTP/1.1 301 Moved Permanently
      Date: Tue, 06 Aug 2024 04:49:57 GMT
      Content-Type: text/html
      Content-Length: 162
      Connection: keep-alive
      Server: BunnyCDN-DE1-1081
      CDN-PullZone: 2373567
      CDN-Uid: 95780366-96cb-4089-af63-a08b2db1368d
      CDN-RequestCountryCode: US
      Location: https://xn--ypd.dssdhome.xyz/11/ip.bin
      CDN-RequestId: be5099dc7c01a47d3576d8fe9662bb0c
      Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
      Data Ascii: <html><head><title>301 Moved Permanently</title></head><body><center><h1>301 Moved Permanently</h1></center><hr><center>nginx</center></body></html>
      Aug 6, 2024 06:49:58.017133951 CEST153OUTGET /11/ip.bin HTTP/1.1
      Connection: Keep-Alive
      User-Agent: Mozilla/5.0 (Linux i644 ; en-US) Gecko/20100101 Firefox/70.2
      Host: xn--ypd.dssdhome.xyz
      Aug 6, 2024 06:49:58.205720901 CEST527INHTTP/1.1 301 Moved Permanently
      Date: Tue, 06 Aug 2024 04:49:58 GMT
      Content-Type: text/html
      Content-Length: 162
      Connection: keep-alive
      Server: BunnyCDN-DE1-1081
      CDN-PullZone: 2373567
      CDN-Uid: 95780366-96cb-4089-af63-a08b2db1368d
      CDN-RequestCountryCode: US
      Location: https://xn--ypd.dssdhome.xyz/11/ip.bin
      CDN-RequestId: db31078d8f4a0473029c445575f28c60
      Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
      Data Ascii: <html><head><title>301 Moved Permanently</title></head><body><center><h1>301 Moved Permanently</h1></center><hr><center>nginx</center></body></html>
      Aug 6, 2024 06:49:58.313817978 CEST153OUTGET /11/ip.bin HTTP/1.1
      Connection: Keep-Alive
      User-Agent: Mozilla/5.0 (Linux i644 ; en-US) Gecko/20100101 Firefox/70.2
      Host: xn--ypd.dssdhome.xyz
      Aug 6, 2024 06:49:58.499335051 CEST527INHTTP/1.1 301 Moved Permanently
      Date: Tue, 06 Aug 2024 04:49:58 GMT
      Content-Type: text/html
      Content-Length: 162
      Connection: keep-alive
      Server: BunnyCDN-DE1-1081
      CDN-PullZone: 2373567
      CDN-Uid: 95780366-96cb-4089-af63-a08b2db1368d
      CDN-RequestCountryCode: US
      Location: https://xn--ypd.dssdhome.xyz/11/ip.bin
      CDN-RequestId: 919c7f4aa01a857db9b31b9676a4d09d
      Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
      Data Ascii: <html><head><title>301 Moved Permanently</title></head><body><center><h1>301 Moved Permanently</h1></center><hr><center>nginx</center></body></html>
      Aug 6, 2024 06:49:58.610755920 CEST153OUTGET /11/ip.bin HTTP/1.1
      Connection: Keep-Alive
      User-Agent: Mozilla/5.0 (Linux i644 ; en-US) Gecko/20100101 Firefox/70.2
      Host: xn--ypd.dssdhome.xyz
      Aug 6, 2024 06:49:58.798878908 CEST527INHTTP/1.1 301 Moved Permanently
      Date: Tue, 06 Aug 2024 04:49:58 GMT
      Content-Type: text/html
      Content-Length: 162
      Connection: keep-alive
      Server: BunnyCDN-DE1-1081
      CDN-PullZone: 2373567
      CDN-Uid: 95780366-96cb-4089-af63-a08b2db1368d
      CDN-RequestCountryCode: US
      Location: https://xn--ypd.dssdhome.xyz/11/ip.bin
      CDN-RequestId: eb82b29bb83d8361dade02913e264979
      Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
      Data Ascii: <html><head><title>301 Moved Permanently</title></head><body><center><h1>301 Moved Permanently</h1></center><hr><center>nginx</center></body></html>
      Aug 6, 2024 06:49:58.921405077 CEST153OUTGET /11/ip.bin HTTP/1.1
      Connection: Keep-Alive
      User-Agent: Mozilla/5.0 (Linux i644 ; en-US) Gecko/20100101 Firefox/70.2
      Host: xn--ypd.dssdhome.xyz
      Aug 6, 2024 06:49:59.108037949 CEST527INHTTP/1.1 301 Moved Permanently
      Date: Tue, 06 Aug 2024 04:49:59 GMT
      Content-Type: text/html
      Content-Length: 162
      Connection: keep-alive
      Server: BunnyCDN-DE1-1081
      CDN-PullZone: 2373567
      CDN-Uid: 95780366-96cb-4089-af63-a08b2db1368d
      CDN-RequestCountryCode: US
      Location: https://xn--ypd.dssdhome.xyz/11/ip.bin
      CDN-RequestId: 19299e6d228007cd2048ba7fbbf47e3e
      Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
      Data Ascii: <html><head><title>301 Moved Permanently</title></head><body><center><h1>301 Moved Permanently</h1></center><hr><center>nginx</center></body></html>
      Aug 6, 2024 06:49:59.244649887 CEST153OUTGET /11/ip.bin HTTP/1.1
      Connection: Keep-Alive
      User-Agent: Mozilla/5.0 (Linux i644 ; en-US) Gecko/20100101 Firefox/70.2
      Host: xn--ypd.dssdhome.xyz
      Aug 6, 2024 06:49:59.429970980 CEST365INHTTP/1.1 301 Moved Permanently
      Date: Tue, 06 Aug 2024 04:49:59 GMT
      Content-Type: text/html
      Content-Length: 162
      Connection: keep-alive
      Server: BunnyCDN-DE1-1081
      CDN-PullZone: 2373567
      CDN-Uid: 95780366-96cb-4089-af63-a08b2db1368d
      CDN-RequestCountryCode: US
      Location: https://xn--ypd.dssdhome.xyz/11/ip.bin
      CDN-RequestId: 063dc64c3d2f58b861d1c2df423c7e0e


      Session IDSource IPSource PortDestination IPDestination PortPIDProcess
      1192.168.2.549718169.150.247.38806552C:\Users\user\Desktop\EBAbsk8ydv.exe
      TimestampBytes transferredDirectionData
      Aug 6, 2024 06:49:59.560867071 CEST153OUTGET /11/ip.bin HTTP/1.1
      Connection: Keep-Alive
      User-Agent: Mozilla/5.0 (Linux i644 ; en-US) Gecko/20100101 Firefox/70.2
      Host: xn--ypd.dssdhome.xyz
      Aug 6, 2024 06:50:00.197655916 CEST527INHTTP/1.1 301 Moved Permanently
      Date: Tue, 06 Aug 2024 04:50:00 GMT
      Content-Type: text/html
      Content-Length: 162
      Connection: keep-alive
      Server: BunnyCDN-DE1-1081
      CDN-PullZone: 2373567
      CDN-Uid: 95780366-96cb-4089-af63-a08b2db1368d
      CDN-RequestCountryCode: US
      Location: https://xn--ypd.dssdhome.xyz/11/ip.bin
      CDN-RequestId: 444c8b2556c6243f928a428bd494d13e
      Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
      Data Ascii: <html><head><title>301 Moved Permanently</title></head><body><center><h1>301 Moved Permanently</h1></center><hr><center>nginx</center></body></html>
      Aug 6, 2024 06:50:00.313848972 CEST153OUTGET /11/ip.bin HTTP/1.1
      Connection: Keep-Alive
      User-Agent: Mozilla/5.0 (Linux i644 ; en-US) Gecko/20100101 Firefox/70.2
      Host: xn--ypd.dssdhome.xyz
      Aug 6, 2024 06:50:00.508359909 CEST527INHTTP/1.1 301 Moved Permanently
      Date: Tue, 06 Aug 2024 04:50:00 GMT
      Content-Type: text/html
      Content-Length: 162
      Connection: keep-alive
      Server: BunnyCDN-DE1-1081
      CDN-PullZone: 2373567
      CDN-Uid: 95780366-96cb-4089-af63-a08b2db1368d
      CDN-RequestCountryCode: US
      Location: https://xn--ypd.dssdhome.xyz/11/ip.bin
      CDN-RequestId: 92bddefdfde33dde9fccea1296c538c3
      Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
      Data Ascii: <html><head><title>301 Moved Permanently</title></head><body><center><h1>301 Moved Permanently</h1></center><hr><center>nginx</center></body></html>
      Aug 6, 2024 06:50:00.626308918 CEST153OUTGET /11/ip.bin HTTP/1.1
      Connection: Keep-Alive
      User-Agent: Mozilla/5.0 (Linux i644 ; en-US) Gecko/20100101 Firefox/70.2
      Host: xn--ypd.dssdhome.xyz
      Aug 6, 2024 06:50:00.813179970 CEST527INHTTP/1.1 301 Moved Permanently
      Date: Tue, 06 Aug 2024 04:50:00 GMT
      Content-Type: text/html
      Content-Length: 162
      Connection: keep-alive
      Server: BunnyCDN-DE1-1081
      CDN-PullZone: 2373567
      CDN-Uid: 95780366-96cb-4089-af63-a08b2db1368d
      CDN-RequestCountryCode: US
      Location: https://xn--ypd.dssdhome.xyz/11/ip.bin
      CDN-RequestId: d58f0122d3cbf739407a5e2f5fefa92a
      Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
      Data Ascii: <html><head><title>301 Moved Permanently</title></head><body><center><h1>301 Moved Permanently</h1></center><hr><center>nginx</center></body></html>
      Aug 6, 2024 06:50:00.938793898 CEST153OUTGET /11/ip.bin HTTP/1.1
      Connection: Keep-Alive
      User-Agent: Mozilla/5.0 (Linux i644 ; en-US) Gecko/20100101 Firefox/70.2
      Host: xn--ypd.dssdhome.xyz
      Aug 6, 2024 06:50:01.275109053 CEST527INHTTP/1.1 301 Moved Permanently
      Date: Tue, 06 Aug 2024 04:50:01 GMT
      Content-Type: text/html
      Content-Length: 162
      Connection: keep-alive
      Server: BunnyCDN-DE1-1081
      CDN-PullZone: 2373567
      CDN-Uid: 95780366-96cb-4089-af63-a08b2db1368d
      CDN-RequestCountryCode: US
      Location: https://xn--ypd.dssdhome.xyz/11/ip.bin
      CDN-RequestId: b4ef89284b08063718fefbfed938fef8
      Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
      Data Ascii: <html><head><title>301 Moved Permanently</title></head><body><center><h1>301 Moved Permanently</h1></center><hr><center>nginx</center></body></html>
      Aug 6, 2024 06:50:01.392329931 CEST153OUTGET /11/ip.bin HTTP/1.1
      Connection: Keep-Alive
      User-Agent: Mozilla/5.0 (Linux i644 ; en-US) Gecko/20100101 Firefox/70.2
      Host: xn--ypd.dssdhome.xyz
      Aug 6, 2024 06:50:01.876283884 CEST527INHTTP/1.1 301 Moved Permanently
      Date: Tue, 06 Aug 2024 04:50:01 GMT
      Content-Type: text/html
      Content-Length: 162
      Connection: keep-alive
      Server: BunnyCDN-DE1-1081
      CDN-PullZone: 2373567
      CDN-Uid: 95780366-96cb-4089-af63-a08b2db1368d
      CDN-RequestCountryCode: US
      Location: https://xn--ypd.dssdhome.xyz/11/ip.bin
      CDN-RequestId: ac17ea3ad375b53926edfbba60d34fa0
      Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
      Data Ascii: <html><head><title>301 Moved Permanently</title></head><body><center><h1>301 Moved Permanently</h1></center><hr><center>nginx</center></body></html>
      Aug 6, 2024 06:50:01.883272886 CEST527INHTTP/1.1 301 Moved Permanently
      Date: Tue, 06 Aug 2024 04:50:01 GMT
      Content-Type: text/html
      Content-Length: 162
      Connection: keep-alive
      Server: BunnyCDN-DE1-1081
      CDN-PullZone: 2373567
      CDN-Uid: 95780366-96cb-4089-af63-a08b2db1368d
      CDN-RequestCountryCode: US
      Location: https://xn--ypd.dssdhome.xyz/11/ip.bin
      CDN-RequestId: ac17ea3ad375b53926edfbba60d34fa0
      Data Raw: 3c 68 74 6d 6c 3e 0d 0a 3c 68 65 61 64 3e 3c 74 69 74 6c 65 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 74 69 74 6c 65 3e 3c 2f 68 65 61 64 3e 0d 0a 3c 62 6f 64 79 3e 0d 0a 3c 63 65 6e 74 65 72 3e 3c 68 31 3e 33 30 31 20 4d 6f 76 65 64 20 50 65 72 6d 61 6e 65 6e 74 6c 79 3c 2f 68 31 3e 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 68 72 3e 3c 63 65 6e 74 65 72 3e 6e 67 69 6e 78 3c 2f 63 65 6e 74 65 72 3e 0d 0a 3c 2f 62 6f 64 79 3e 0d 0a 3c 2f 68 74 6d 6c 3e 0d 0a
      Data Ascii: <html><head><title>301 Moved Permanently</title></head><body><center><h1>301 Moved Permanently</h1></center><hr><center>nginx</center></body></html>
      Aug 6, 2024 06:50:01.986604929 CEST153OUTGET /11/ip.bin HTTP/1.1
      Connection: Keep-Alive
      User-Agent: Mozilla/5.0 (Linux i644 ; en-US) Gecko/20100101 Firefox/70.2
      Host: xn--ypd.dssdhome.xyz
      Aug 6, 2024 06:50:02.173449039 CEST365INHTTP/1.1 301 Moved Permanently
      Date: Tue, 06 Aug 2024 04:50:02 GMT
      Content-Type: text/html
      Content-Length: 162
      Connection: keep-alive
      Server: BunnyCDN-DE1-1081
      CDN-PullZone: 2373567
      CDN-Uid: 95780366-96cb-4089-af63-a08b2db1368d
      CDN-RequestCountryCode: US
      Location: https://xn--ypd.dssdhome.xyz/11/ip.bin
      CDN-RequestId: e551df1544ada1b6d4bd5a7798d56dcd


      Click to jump to process

      Click to jump to process

      Click to dive into process behavior distribution

      Target ID:0
      Start time:00:47:55
      Start date:06/08/2024
      Path:C:\Users\user\Desktop\EBAbsk8ydv.exe
      Wow64 process (32bit):false
      Commandline:"C:\Users\user\Desktop\EBAbsk8ydv.exe"
      Imagebase:0x7ff61bd40000
      File size:352'608 bytes
      MD5 hash:E546E832F5762CBF8F28B6558C012B8D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:low
      Has exited:false

      Reset < >

        Execution Graph

        Execution Coverage:2.9%
        Dynamic/Decrypted Code Coverage:0%
        Signature Coverage:28.9%
        Total number of Nodes:391
        Total number of Limit Nodes:12
        execution_graph 22043 7ff61bd60460 22084 7ff61bd68308 GetStartupInfoW 22043->22084 22046 7ff61bd60474 22085 7ff61bd629d4 GetProcessHeap 22046->22085 22047 7ff61bd604d4 22048 7ff61bd604fa 22047->22048 22050 7ff61bd604e6 22047->22050 22051 7ff61bd604e1 22047->22051 22086 7ff61bd64a18 22048->22086 22192 7ff61bd62e90 59 API calls 9 library calls 22050->22192 22191 7ff61bd62e1c 59 API calls 2 library calls 22051->22191 22055 7ff61bd60525 _RTC_Initialize 22103 7ff61bd678dc 22055->22103 22056 7ff61bd604f0 22193 7ff61bd62a74 GetModuleHandleExW GetProcAddress ExitProcess __crtCorExitProcess 22056->22193 22057 7ff61bd6050c 22194 7ff61bd62e1c 59 API calls 2 library calls 22057->22194 22058 7ff61bd60511 22195 7ff61bd62e90 59 API calls 9 library calls 22058->22195 22062 7ff61bd6051b 22196 7ff61bd62a74 GetModuleHandleExW GetProcAddress ExitProcess __crtCorExitProcess 22062->22196 22065 7ff61bd60530 22066 7ff61bd6053e GetCommandLineW 22065->22066 22197 7ff61bd605ec 59 API calls 2 library calls 22065->22197 22121 7ff61bd68130 GetEnvironmentStringsW 22066->22121 22072 7ff61bd6056a 22134 7ff61bd67e94 22072->22134 22076 7ff61bd6057d 22148 7ff61bd62ad4 22076->22148 22079 7ff61bd60587 22080 7ff61bd60592 22079->22080 22200 7ff61bd62a8c 67 API calls 3 library calls 22079->22200 22154 7ff61bd41848 SetErrorMode CoInitializeEx 22080->22154 22083 7ff61bd605a8 22084->22046 22085->22047 22201 7ff61bd62b78 EncodePointer 22086->22201 22088 7ff61bd64a23 22206 7ff61bd6dc4c 22088->22206 22091 7ff61bd64a8a 22211 7ff61bd64a98 62 API calls 2 library calls 22091->22211 22094 7ff61bd604ff 22094->22055 22094->22057 22094->22058 22214 7ff61bd6dac0 22103->22214 22105 7ff61bd6790b 22106 7ff61bd63320 _calloc_crt 59 API calls 22105->22106 22108 7ff61bd6791f 22106->22108 22107 7ff61bd6799a GetStartupInfoW 22116 7ff61bd67af6 22107->22116 22117 7ff61bd679b4 22107->22117 22108->22107 22109 7ff61bd6792f _ioinit 22108->22109 22109->22065 22110 7ff61bd67bdb 22111 7ff61bd6dcb0 _setmbcp LeaveCriticalSection 22110->22111 22111->22109 22112 7ff61bd67b3e GetStdHandle 22115 7ff61bd67b69 GetFileType 22112->22115 22112->22116 22113 7ff61bd67a10 22113->22116 22118 7ff61bd67a98 GetFileType 22113->22118 22120 7ff61bd68334 _mtinitlocks InitializeCriticalSectionAndSpinCount 22113->22120 22114 7ff61bd63320 _calloc_crt 59 API calls 22114->22117 22115->22116 22116->22110 22116->22112 22119 7ff61bd68334 _mtinitlocks InitializeCriticalSectionAndSpinCount 22116->22119 22117->22113 22117->22114 22117->22116 22118->22113 22119->22116 22120->22113 22122 7ff61bd60550 22121->22122 22123 7ff61bd68156 22121->22123 22128 7ff61bd67c0c GetModuleFileNameW 22122->22128 22219 7ff61bd633a0 59 API calls malloc 22123->22219 22126 7ff61bd68178 ctype 22127 7ff61bd68191 FreeEnvironmentStringsW 22126->22127 22127->22122 22129 7ff61bd67c4c wparse_cmdline 22128->22129 22130 7ff61bd6055c 22129->22130 22131 7ff61bd67ca7 22129->22131 22130->22072 22198 7ff61bd62a8c 67 API calls 3 library calls 22130->22198 22220 7ff61bd633a0 59 API calls malloc 22131->22220 22133 7ff61bd67cac wparse_cmdline 22133->22130 22135 7ff61bd67ec7 __get_qualified_locale_downlevel 22134->22135 22139 7ff61bd6056f 22134->22139 22221 7ff61bd63320 22135->22221 22137 7ff61bd67f5f 22226 7ff61bd5f368 59 API calls 2 library calls 22137->22226 22139->22076 22199 7ff61bd62a8c 67 API calls 3 library calls 22139->22199 22140 7ff61bd63320 _calloc_crt 59 API calls 22141 7ff61bd67ef7 __get_qualified_locale_downlevel 22140->22141 22141->22137 22141->22139 22141->22140 22142 7ff61bd67f9f 22141->22142 22145 7ff61bd67fb7 22141->22145 22225 7ff61bd5fe20 59 API calls 2 library calls 22141->22225 22227 7ff61bd5f368 59 API calls 2 library calls 22142->22227 22228 7ff61bd639f8 15 API calls _call_reportfault 22145->22228 22150 7ff61bd62ae6 _IsNonwritableInCurrentImage 22148->22150 22239 7ff61bd6aa5c 22150->22239 22151 7ff61bd62b03 _initterm_e 22153 7ff61bd62b26 _cinit _IsNonwritableInCurrentImage 22151->22153 22242 7ff61bd5f5b0 70 API calls _onexit 22151->22242 22153->22079 22243 7ff61bd4fdac 22154->22243 22158 7ff61bd4189c setSBCS 22159 7ff61bd418ab GetCurrentThreadId 22158->22159 22160 7ff61bd418e9 CoRegisterClassObject CoRegisterClassObject 22159->22160 22277 7ff61bd5f3a8 59 API calls 5 library calls 22160->22277 22162 7ff61bd4193a 22163 7ff61bd419a1 GetCurrentThreadId 22162->22163 22164 7ff61bd41942 CreateEventW 22162->22164 22166 7ff61bd41a30 GetMessageW 22163->22166 22167 7ff61bd419b2 CommandLineToArgvW 22163->22167 22164->22163 22165 7ff61bd41968 GetCurrentThreadId CreateThread 22164->22165 22165->22163 22175 7ff61bd41a4f 22166->22175 22167->22166 22184 7ff61bd419c7 _wsetlocale_nolock 22167->22184 22168 7ff61bd41ac2 22170 7ff61bd41ae1 22168->22170 22171 7ff61bd41acb GetCurrentThreadId PostThreadMessageW 22168->22171 22169 7ff61bd41a27 LocalFree 22169->22166 22172 7ff61bd41aea SetEvent 22170->22172 22173 7ff61bd41af4 22170->22173 22171->22170 22172->22173 22176 7ff61bd41b1d 22173->22176 22177 7ff61bd41afd WaitForSingleObject CloseHandle 22173->22177 22174 7ff61bd41a5b GetCurrentThreadId 22174->22175 22175->22168 22175->22174 22178 7ff61bd41a7e GetCurrentThreadId 22175->22178 22179 7ff61bd41aa2 DispatchMessageW GetMessageW 22175->22179 22185 7ff61bd41a96 GetCurrentThreadId 22175->22185 22180 7ff61bd41b2c 22176->22180 22181 7ff61bd41b22 CloseHandle 22176->22181 22177->22176 22178->22175 22178->22179 22179->22175 22182 7ff61bd41b3d 22180->22182 22183 7ff61bd41b33 CoRevokeClassObject 22180->22183 22181->22180 22186 7ff61bd41b4e CoUninitialize 22182->22186 22187 7ff61bd41b44 CoRevokeClassObject 22182->22187 22183->22182 22184->22169 22185->22168 22185->22179 22278 7ff61bd5edd0 22186->22278 22187->22186 22191->22050 22192->22056 22194->22058 22195->22062 22202 7ff61bd62b91 _init_pointers 22201->22202 22212 7ff61bd613b4 EncodePointer 22202->22212 22204 7ff61bd62bb1 _init_pointers 22205 7ff61bd683ac 34 API calls 22204->22205 22205->22088 22207 7ff61bd6dc67 22206->22207 22209 7ff61bd64a28 22207->22209 22213 7ff61bd68334 InitializeCriticalSectionAndSpinCount 22207->22213 22209->22091 22210 7ff61bd68298 TlsAlloc 22209->22210 22211->22094 22212->22204 22213->22207 22215 7ff61bd6dade 22214->22215 22216 7ff61bd6daef EnterCriticalSection 22214->22216 22218 7ff61bd6db8c 59 API calls 8 library calls 22215->22218 22218->22216 22219->22126 22220->22133 22222 7ff61bd63345 22221->22222 22224 7ff61bd63381 22222->22224 22229 7ff61bd6e384 22222->22229 22224->22141 22225->22141 22226->22139 22227->22139 22230 7ff61bd6e399 22229->22230 22235 7ff61bd6e3b6 22229->22235 22231 7ff61bd6e3a7 22230->22231 22230->22235 22237 7ff61bd62964 59 API calls _getptd_noexit 22231->22237 22232 7ff61bd6e3ce HeapAlloc 22234 7ff61bd6e3ac 22232->22234 22232->22235 22234->22222 22235->22232 22235->22234 22238 7ff61bd629f4 DecodePointer 22235->22238 22237->22234 22238->22235 22240 7ff61bd6aa6f EncodePointer 22239->22240 22240->22240 22241 7ff61bd6aa8a 22240->22241 22241->22151 22242->22153 22244 7ff61bd4fdca 22243->22244 22245 7ff61bd4fe5c 22244->22245 22246 7ff61bd4fded 22244->22246 22250 7ff61bd41894 22244->22250 22247 7ff61bd4fe54 Sleep 22245->22247 22245->22250 22287 7ff61bd5f658 61 API calls 4 library calls 22246->22287 22247->22245 22249 7ff61bd4fdf7 22249->22250 22288 7ff61bd501b0 61 API calls 22249->22288 22253 7ff61bd506c4 22250->22253 22252 7ff61bd4fe0c InitializeCriticalSectionAndSpinCount 22252->22250 22254 7ff61bd50906 22253->22254 22255 7ff61bd50701 22253->22255 22256 7ff61bd5edd0 __crt_atoflt_l 9 API calls 22254->22256 22257 7ff61bd5073b 22255->22257 22258 7ff61bd50711 GetSystemTimeAsFileTime 22255->22258 22259 7ff61bd50912 22256->22259 22289 7ff61bd5694c 22257->22289 22258->22257 22259->22158 22262 7ff61bd5074f 22306 7ff61bd56a44 LoadLibraryA FindCloseChangeNotification SleepEx 22262->22306 22263 7ff61bd50798 22307 7ff61bd4fe74 63 API calls 22263->22307 22265 7ff61bd507de 22266 7ff61bd507e6 22265->22266 22267 7ff61bd507ef GetModuleHandleW GetProcAddress 22265->22267 22266->22267 22268 7ff61bd5081a GetSystemDefaultLangID 22267->22268 22269 7ff61bd5081e GetSystemInfo 22267->22269 22271 7ff61bd50856 22268->22271 22269->22268 22308 7ff61bd4fe74 63 API calls 22271->22308 22273 7ff61bd50868 22274 7ff61bd50879 InternetOpenA 22273->22274 22274->22254 22275 7ff61bd5089f InternetSetOptionW InternetConnectW 22274->22275 22275->22254 22276 7ff61bd508ff 22275->22276 22276->22254 22277->22162 22279 7ff61bd5edd9 22278->22279 22280 7ff61bd41b6e 22279->22280 22281 7ff61bd62174 IsProcessorFeaturePresent 22279->22281 22280->22083 22282 7ff61bd6218b 22281->22282 22560 7ff61bd68224 RtlCaptureContext RtlLookupFunctionEntry RtlVirtualUnwind 22282->22560 22284 7ff61bd6219e 22561 7ff61bd62128 5 API calls 2 library calls 22284->22561 22287->22249 22288->22252 22290 7ff61bd569aa 22289->22290 22304 7ff61bd56a07 22289->22304 22291 7ff61bd569bc 22290->22291 22292 7ff61bd569cf 22290->22292 22328 7ff61bd5fd98 59 API calls 4 library calls 22291->22328 22309 7ff61bd57d20 22292->22309 22293 7ff61bd5edd0 __crt_atoflt_l 9 API calls 22295 7ff61bd56a30 22293->22295 22299 7ff61bd56a57 22295->22299 22317 7ff61bd56be1 22295->22317 22298 7ff61bd569cd 22314 7ff61bd5c568 22298->22314 22321 7ff61bd573a1 22299->22321 22304->22293 22305 7ff61bd56a61 22305->22262 22306->22263 22307->22265 22308->22273 22330 7ff61bd57dc8 22309->22330 22311 7ff61bd5edd0 __crt_atoflt_l 9 API calls 22313 7ff61bd569d6 22311->22313 22312 7ff61bd57d78 22312->22311 22313->22298 22329 7ff61bd5fd98 59 API calls 4 library calls 22313->22329 22547 7ff61bd5b1a0 22314->22547 22316 7ff61bd5c59d 22316->22304 22318 7ff61bd56c4d 22317->22318 22319 7ff61bd56c8d LoadLibraryA 22318->22319 22320 7ff61bd56caf 22319->22320 22322 7ff61bd573c1 22321->22322 22323 7ff61bd5752d 22322->22323 22324 7ff61bd573e7 FindCloseChangeNotification 22322->22324 22323->22305 22325 7ff61bd57481 22324->22325 22326 7ff61bd574a0 SleepEx 22325->22326 22327 7ff61bd574ad 22325->22327 22326->22325 22327->22305 22328->22298 22329->22298 22331 7ff61bd57e4f 22330->22331 22371 7ff61bd5cf60 22331->22371 22334 7ff61bd57e81 22389 7ff61bd5df34 22334->22389 22336 7ff61bd57e90 22336->22334 22403 7ff61bd5cdc0 12 API calls 2 library calls 22336->22403 22340 7ff61bd57ed0 22370 7ff61bd57f4d 22340->22370 22405 7ff61bd58d94 61 API calls 22340->22405 22343 7ff61bd57f01 22406 7ff61bd54c18 61 API calls 22343->22406 22346 7ff61bd57ff6 22347 7ff61bd58022 22346->22347 22349 7ff61bd58003 22346->22349 22412 7ff61bd58128 190 API calls __crt_atoflt_l 22347->22412 22348 7ff61bd57f15 22407 7ff61bd58e40 61 API calls 22348->22407 22411 7ff61bd5ea7c 9 API calls __crt_atoflt_l 22349->22411 22353 7ff61bd5802a 22355 7ff61bd5802e CoInitialize 22353->22355 22363 7ff61bd58020 22353->22363 22354 7ff61bd57f27 22408 7ff61bd54c18 61 API calls 22354->22408 22413 7ff61bd5f658 61 API calls 4 library calls 22355->22413 22358 7ff61bd57f3b 22409 7ff61bd58e40 61 API calls 22358->22409 22359 7ff61bd58049 22361 7ff61bd5805e 22359->22361 22362 7ff61bd58051 CoCreateGuid 22359->22362 22366 7ff61bd5807c 22361->22366 22367 7ff61bd58076 CoUninitialize 22361->22367 22362->22361 22364 7ff61bd5edd0 __crt_atoflt_l 9 API calls 22363->22364 22365 7ff61bd5810d 22364->22365 22365->22312 22368 7ff61bd58089 22366->22368 22414 7ff61bd582e4 185 API calls __crt_atoflt_l 22366->22414 22367->22366 22368->22363 22410 7ff61bd58e7c 61 API calls 22370->22410 22372 7ff61bd5cf89 setSBCS __crtGetStringTypeA_stat 22371->22372 22373 7ff61bd5cfbd GetSystemDirectoryW 22372->22373 22375 7ff61bd5cfdf 22373->22375 22374 7ff61bd5d01e 22415 7ff61bd622f8 22374->22415 22375->22374 22376 7ff61bd5d1bb 22375->22376 22437 7ff61bd62248 9 API calls __report_securityfailure 22376->22437 22379 7ff61bd5d1c0 22381 7ff61bd5d06b GetProcAddress 22383 7ff61bd5d147 FreeLibrary 22381->22383 22384 7ff61bd5d089 GetAdaptersInfo 22381->22384 22382 7ff61bd5edd0 __crt_atoflt_l 9 API calls 22385 7ff61bd57e7a 22382->22385 22386 7ff61bd5d16a 22383->22386 22384->22383 22388 7ff61bd5d0a5 22384->22388 22385->22334 22402 7ff61bd5cc60 61 API calls 2 library calls 22385->22402 22386->22382 22388->22383 22424 7ff61bd5ca74 RegOpenKeyExA 22388->22424 22390 7ff61bd5df72 22389->22390 22391 7ff61bd5df55 GetVersionExW 22389->22391 22392 7ff61bd57eba 22390->22392 22475 7ff61bd5d434 22390->22475 22391->22390 22392->22340 22404 7ff61bd58cac 107 API calls 22392->22404 22399 7ff61bd5dfb4 22511 7ff61bd5d748 93 API calls 4 library calls 22399->22511 22401 7ff61bd5dfc2 22401->22392 22402->22336 22403->22334 22404->22340 22405->22343 22406->22348 22407->22354 22408->22358 22409->22370 22410->22346 22411->22363 22412->22353 22413->22359 22414->22368 22416 7ff61bd6230b 22415->22416 22420 7ff61bd62310 22416->22420 22422 7ff61bd62362 22416->22422 22418 7ff61bd5d052 LoadLibraryW 22418->22381 22418->22386 22419 7ff61bd62335 22439 7ff61bd639d8 16 API calls _invalid_parameter_noinfo 22419->22439 22420->22418 22438 7ff61bd62964 59 API calls _getptd_noexit 22420->22438 22422->22418 22440 7ff61bd62964 59 API calls _getptd_noexit 22422->22440 22425 7ff61bd5cc36 22424->22425 22426 7ff61bd5caf6 22424->22426 22427 7ff61bd5edd0 __crt_atoflt_l 9 API calls 22425->22427 22441 7ff61bd4f17c 22426->22441 22429 7ff61bd5cc44 22427->22429 22429->22388 22431 7ff61bd5cc2b RegCloseKey 22431->22425 22432 7ff61bd5cb3c RegQueryValueExA 22433 7ff61bd5cb7d setSBCS 22432->22433 22434 7ff61bd5cc20 RegCloseKey 22432->22434 22435 7ff61bd5cb96 RegQueryValueExA 22433->22435 22434->22431 22435->22434 22436 7ff61bd5cbc8 22435->22436 22436->22434 22437->22379 22438->22419 22439->22418 22440->22419 22444 7ff61bd5fa10 22441->22444 22447 7ff61bd5fa30 22444->22447 22448 7ff61bd5fa68 22447->22448 22449 7ff61bd5fa5e 22447->22449 22450 7ff61bd62964 _errno 59 API calls 22448->22450 22473 7ff61bd4f1a3 RegOpenKeyExA 22448->22473 22449->22448 22452 7ff61bd5fa8a 22449->22452 22451 7ff61bd5fb42 22450->22451 22455 7ff61bd639d8 _invalid_parameter_noinfo 16 API calls 22451->22455 22453 7ff61bd5fadc 22452->22453 22454 7ff61bd5fa8f 22452->22454 22456 7ff61bd62964 _errno 59 API calls 22453->22456 22457 7ff61bd62964 _errno 59 API calls 22454->22457 22455->22473 22458 7ff61bd5fae1 22456->22458 22459 7ff61bd5fa94 22457->22459 22460 7ff61bd5f928 _vsnprintf_helper 87 API calls 22458->22460 22461 7ff61bd5f928 _vsnprintf_helper 87 API calls 22459->22461 22462 7ff61bd5fb0d 22460->22462 22463 7ff61bd5fac0 22461->22463 22464 7ff61bd5fb31 22462->22464 22466 7ff61bd5fb1d 22462->22466 22463->22464 22465 7ff61bd5fac5 22463->22465 22470 7ff61bd62964 _errno 59 API calls 22464->22470 22464->22473 22467 7ff61bd62964 _errno 59 API calls 22465->22467 22468 7ff61bd62964 _errno 59 API calls 22466->22468 22469 7ff61bd5faca 22467->22469 22471 7ff61bd5fb22 22468->22471 22472 7ff61bd62964 _errno 59 API calls 22469->22472 22469->22473 22470->22451 22471->22473 22474 7ff61bd62964 _errno 59 API calls 22471->22474 22472->22473 22473->22431 22473->22432 22474->22473 22485 7ff61bd5d476 setSBCS 22475->22485 22476 7ff61bd5d719 22477 7ff61bd5edd0 __crt_atoflt_l 9 API calls 22476->22477 22478 7ff61bd5d72a 22477->22478 22478->22392 22488 7ff61bd5dd00 22478->22488 22481 7ff61bd5d4e6 DeviceIoControl 22482 7ff61bd5d705 CloseHandle 22481->22482 22481->22485 22482->22485 22483 7ff61bd5d582 DeviceIoControl 22483->22485 22484 7ff61bd5d1c4 61 API calls 22484->22485 22485->22476 22485->22482 22485->22483 22485->22484 22487 7ff61bd5d6f9 22485->22487 22512 7ff61bd5dfe0 22485->22512 22515 7ff61bd5c9ac 61 API calls 22485->22515 22487->22482 22496 7ff61bd5dd3d setSBCS 22488->22496 22489 7ff61bd5df06 22490 7ff61bd5edd0 __crt_atoflt_l 9 API calls 22489->22490 22491 7ff61bd5df17 22490->22491 22491->22392 22498 7ff61bd5d9a0 22491->22498 22492 7ff61bd5dfe0 87 API calls 22493 7ff61bd5dd74 CreateFileW 22492->22493 22493->22496 22494 7ff61bd5ddc2 DeviceIoControl 22494->22496 22495 7ff61bd5def2 FindCloseChangeNotification 22495->22496 22496->22489 22496->22492 22496->22494 22496->22495 22497 7ff61bd5d1c4 61 API calls 22496->22497 22497->22496 22510 7ff61bd5d9e2 setSBCS 22498->22510 22499 7ff61bd5dcd1 22500 7ff61bd5edd0 __crt_atoflt_l 9 API calls 22499->22500 22501 7ff61bd5dce2 22500->22501 22501->22392 22501->22399 22502 7ff61bd5dfe0 87 API calls 22503 7ff61bd5da19 CreateFileW 22502->22503 22503->22510 22504 7ff61bd5da78 DeviceIoControl 22505 7ff61bd5dcb7 GetLastError 22504->22505 22504->22510 22506 7ff61bd5dcbd FindCloseChangeNotification 22505->22506 22506->22510 22507 7ff61bd5d294 70 API calls 22507->22510 22508 7ff61bd623e0 70 API calls isalnum 22508->22510 22509 7ff61bd41d10 61 API calls 22509->22510 22510->22499 22510->22502 22510->22504 22510->22506 22510->22507 22510->22508 22510->22509 22511->22401 22516 7ff61bd60158 22512->22516 22515->22485 22519 7ff61bd60178 22516->22519 22520 7ff61bd601b2 22519->22520 22521 7ff61bd601a8 22519->22521 22522 7ff61bd62964 _errno 59 API calls 22520->22522 22523 7ff61bd5d4ad CreateFileW 22520->22523 22521->22520 22524 7ff61bd601d4 22521->22524 22544 7ff61bd60291 22522->22544 22523->22481 22523->22485 22525 7ff61bd60229 22524->22525 22526 7ff61bd601d9 22524->22526 22528 7ff61bd62964 _errno 59 API calls 22525->22528 22529 7ff61bd62964 _errno 59 API calls 22526->22529 22527 7ff61bd639d8 _invalid_parameter_noinfo 16 API calls 22527->22523 22530 7ff61bd6022e 22528->22530 22531 7ff61bd601de 22529->22531 22532 7ff61bd602c8 _vswprintf_helper 87 API calls 22530->22532 22533 7ff61bd602c8 _vswprintf_helper 87 API calls 22531->22533 22534 7ff61bd6025a 22532->22534 22535 7ff61bd6020a 22533->22535 22537 7ff61bd6026b 22534->22537 22540 7ff61bd6027f 22534->22540 22536 7ff61bd6020f 22535->22536 22535->22540 22538 7ff61bd62964 _errno 59 API calls 22536->22538 22539 7ff61bd62964 _errno 59 API calls 22537->22539 22542 7ff61bd60214 22538->22542 22541 7ff61bd60270 22539->22541 22540->22523 22543 7ff61bd62964 _errno 59 API calls 22540->22543 22541->22523 22546 7ff61bd62964 _errno 59 API calls 22541->22546 22542->22523 22545 7ff61bd62964 _errno 59 API calls 22542->22545 22543->22544 22544->22527 22545->22523 22546->22523 22548 7ff61bd5b25c 22547->22548 22549 7ff61bd5b1c2 22547->22549 22558 7ff61bd5ec6c 61 API calls 2 library calls 22548->22558 22551 7ff61bd5b1cc 22549->22551 22552 7ff61bd5b268 22549->22552 22556 7ff61bd5b1db setSBCS 22551->22556 22557 7ff61bd42098 61 API calls 3 library calls 22551->22557 22559 7ff61bd5ec6c 61 API calls 2 library calls 22552->22559 22556->22316 22557->22556 22560->22284

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 0 7ff61bd41848-7ff61bd41897 SetErrorMode CoInitializeEx call 7ff61bd4fdac call 7ff61bd506c4 4 7ff61bd4189c-7ff61bd41940 call 7ff61bd61140 GetCurrentThreadId CoRegisterClassObject * 2 call 7ff61bd5f3a8 0->4 10 7ff61bd419a1-7ff61bd419b0 GetCurrentThreadId 4->10 11 7ff61bd41942-7ff61bd41966 CreateEventW 4->11 13 7ff61bd41a30-7ff61bd41a4d GetMessageW 10->13 14 7ff61bd419b2-7ff61bd419c5 CommandLineToArgvW 10->14 11->10 12 7ff61bd41968-7ff61bd4199d GetCurrentThreadId CreateThread 11->12 12->10 15 7ff61bd41abe-7ff61bd41ac0 13->15 14->13 16 7ff61bd419c7-7ff61bd419ce 14->16 17 7ff61bd41a4f-7ff61bd41a52 15->17 18 7ff61bd41ac2-7ff61bd41ac4 15->18 19 7ff61bd41a27-7ff61bd41a2a LocalFree 16->19 20 7ff61bd419d0 16->20 17->18 23 7ff61bd41a54-7ff61bd41a59 17->23 21 7ff61bd41ac6-7ff61bd41ac9 18->21 22 7ff61bd41ae1-7ff61bd41ae8 18->22 19->13 24 7ff61bd419d3-7ff61bd419ea call 7ff61bd6012c 20->24 21->22 25 7ff61bd41acb-7ff61bd41adb GetCurrentThreadId PostThreadMessageW 21->25 26 7ff61bd41aea-7ff61bd41af0 SetEvent 22->26 27 7ff61bd41af4-7ff61bd41afb 22->27 28 7ff61bd41a77-7ff61bd41a7c 23->28 29 7ff61bd41a5b-7ff61bd41a64 GetCurrentThreadId 23->29 41 7ff61bd419f9-7ff61bd41a22 call 7ff61bd60074 call 7ff61bd412fc 24->41 42 7ff61bd419ec-7ff61bd419f5 24->42 25->22 26->27 33 7ff61bd41b1d-7ff61bd41b20 27->33 34 7ff61bd41afd-7ff61bd41b19 WaitForSingleObject CloseHandle 27->34 36 7ff61bd41a7e-7ff61bd41a87 GetCurrentThreadId 28->36 37 7ff61bd41aa2-7ff61bd41ab8 DispatchMessageW GetMessageW 28->37 31 7ff61bd41a66-7ff61bd41a69 29->31 32 7ff61bd41a74 29->32 31->32 38 7ff61bd41a6b-7ff61bd41a6d 31->38 32->28 39 7ff61bd41b2c-7ff61bd41b31 33->39 40 7ff61bd41b22-7ff61bd41b28 CloseHandle 33->40 34->33 36->37 43 7ff61bd41a89-7ff61bd41a90 36->43 37->15 38->32 44 7ff61bd41a6f-7ff61bd41a72 38->44 45 7ff61bd41b3d-7ff61bd41b42 39->45 46 7ff61bd41b33-7ff61bd41b39 CoRevokeClassObject 39->46 40->39 41->19 42->24 47 7ff61bd419f7 42->47 43->37 48 7ff61bd41a92-7ff61bd41a94 43->48 51 7ff61bd41a96-7ff61bd41aa0 GetCurrentThreadId 44->51 52 7ff61bd41b4e-7ff61bd41b89 CoUninitialize call 7ff61bd5edd0 45->52 53 7ff61bd41b44-7ff61bd41b4a CoRevokeClassObject 45->53 46->45 47->19 48->37 48->51 51->18 51->37 53->52
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3273984107.00007FF61BD41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61BD40000, based on PE: true
        • Associated: 00000000.00000002.3273965318.00007FF61BD40000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274021381.00007FF61BD7C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD8F000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD94000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274083951.00007FF61BD95000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff61bd40000_EBAbsk8ydv.jbxd
        Similarity
        • API ID: Thread$Current$Object$ClassMessage$Handle$CloseCreateEventInitializeRegisterRevokeSystemTime_errno$AddressAllocArgvCommandCountCriticalDefaultDispatchErrorFileFreeHeapLangLineLocalModeModulePostProcSectionSingleSpinUninitializeWait_callnewhmalloc
        • String ID: !!!param=(%ws), and result=%d(0x%x)$--pt=
        • API String ID: 936543831-3547824706
        • Opcode ID: 58205efe5a3e29f5020299fe62fb87e29203e1061887d7311f45762cce80e52e
        • Instruction ID: b8bbd503bb8f728346380e3dc8a6bd95b11de05872e79c49faace4b2b4aa2777
        • Opcode Fuzzy Hash: 58205efe5a3e29f5020299fe62fb87e29203e1061887d7311f45762cce80e52e
        • Instruction Fuzzy Hash: 77A11C32F08E5A8AEB1CCB71E4546AD37A1BF48F6CB446235CD0D92A64DE38A509C744

        Control-flow Graph

        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3273984107.00007FF61BD41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61BD40000, based on PE: true
        • Associated: 00000000.00000002.3273965318.00007FF61BD40000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274021381.00007FF61BD7C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD8F000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD94000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274083951.00007FF61BD95000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff61bd40000_EBAbsk8ydv.jbxd
        Similarity
        • API ID: InternetSystem$Time$AddressConnectDefaultFileHandleInfoLangModuleOpenOptionProc
        • String ID: GetNativeSystemInfo$QQ Data Report$kernel32.dll$qbwup.imtt.qq.com
        • API String ID: 3082367296-404951005
        • Opcode ID: dfcdd1e627b552f5fcc6b089cbe0647b8e705594d37419fb9a644f721dbe48a1
        • Instruction ID: e48ad9db8bcb7252dc3e0664991b667c8895e46c22ed5729e14173f25887858c
        • Opcode Fuzzy Hash: dfcdd1e627b552f5fcc6b089cbe0647b8e705594d37419fb9a644f721dbe48a1
        • Instruction Fuzzy Hash: 63614A26E09E4A9AFB1CEF21D4543E823A0EB4CB68F442236DA0D876B9DF7CD544C744

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 135 7ff61bd56fb1-7ff61bd57137 139 7ff61bd5713d-7ff61bd5715b 135->139 140 7ff61bd571c0 135->140 139->140 143 7ff61bd5715d-7ff61bd5717e 139->143 141 7ff61bd571c2-7ff61bd571e2 140->141 145 7ff61bd571ba 143->145 146 7ff61bd57180-7ff61bd5719b 143->146 145->140 146->145 148 7ff61bd5719d-7ff61bd571b5 146->148 150 7ff61bd571b7 148->150 151 7ff61bd571e3-7ff61bd5721b 148->151 150->145 153 7ff61bd5738a-7ff61bd5739c 151->153 154 7ff61bd57221-7ff61bd57225 151->154 153->140 155 7ff61bd57227-7ff61bd5723b 154->155 156 7ff61bd57245-7ff61bd5725c 154->156 155->156 158 7ff61bd57265-7ff61bd5726a 156->158 159 7ff61bd57384 158->159 160 7ff61bd57270-7ff61bd5727d 158->160 159->153 160->159 163 7ff61bd57283-7ff61bd572b6 160->163 165 7ff61bd572bc-7ff61bd572c9 163->165 166 7ff61bd57381 163->166 165->159 167 7ff61bd572cf-7ff61bd572ec 165->167 166->159 169 7ff61bd5734e-7ff61bd5736e 167->169 170 7ff61bd572ee 167->170 169->141 171 7ff61bd572f1-7ff61bd572f9 170->171 171->169 172 7ff61bd572fb-7ff61bd57313 171->172 172->159 176 7ff61bd57315-7ff61bd57330 172->176 179 7ff61bd57332-7ff61bd5734c 176->179 180 7ff61bd57373-7ff61bd5737d 176->180 179->169 179->171 180->166
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3273984107.00007FF61BD41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61BD40000, based on PE: true
        • Associated: 00000000.00000002.3273965318.00007FF61BD40000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274021381.00007FF61BD7C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD8F000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD94000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274083951.00007FF61BD95000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff61bd40000_EBAbsk8ydv.jbxd
        Similarity
        • API ID:
        • String ID: $($0$4$5$6$G$M$T$a$i$l$u$z
        • API String ID: 0-2079474088
        • Opcode ID: 7d012af2536f1f7d995bb6865e94ab2d39a3359b1312110b88a70488074df788
        • Instruction ID: 556cfad332e130f1cd2234b72ed9dee0f6a924ced5cb42dc37dea3aceb5a8d1c
        • Opcode Fuzzy Hash: 7d012af2536f1f7d995bb6865e94ab2d39a3359b1312110b88a70488074df788
        • Instruction Fuzzy Hash: 28B16676A04B818AE768CF61D8487EE3BB5F748B9CF549129DF494BA08DF788548CB04

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 226 7ff61bd5d9a0-7ff61bd5d9df 227 7ff61bd5d9e2-7ff61bd5d9e4 226->227 228 7ff61bd5d9ea-7ff61bd5da48 call 7ff61bd61140 call 7ff61bd5dfe0 CreateFileW 227->228 229 7ff61bd5dcd1-7ff61bd5dcfc call 7ff61bd5edd0 227->229 236 7ff61bd5dcc6-7ff61bd5dccb 228->236 237 7ff61bd5da4e-7ff61bd5dab6 call 7ff61bd61140 DeviceIoControl 228->237 236->227 236->229 240 7ff61bd5dabc-7ff61bd5db0f call 7ff61bd61140 * 3 237->240 241 7ff61bd5dcb7 GetLastError 237->241 249 7ff61bd5db27-7ff61bd5db36 240->249 250 7ff61bd5db11-7ff61bd5db22 call 7ff61bd5d294 240->250 242 7ff61bd5dcbd-7ff61bd5dcc0 FindCloseChangeNotification 241->242 242->236 252 7ff61bd5db38-7ff61bd5db49 call 7ff61bd5d294 249->252 253 7ff61bd5db4e-7ff61bd5db5c 249->253 250->249 252->253 255 7ff61bd5db77-7ff61bd5db81 call 7ff61bd623e0 253->255 256 7ff61bd5db5e-7ff61bd5db74 call 7ff61bd5d294 253->256 261 7ff61bd5db83-7ff61bd5db8e call 7ff61bd623e0 255->261 262 7ff61bd5db94-7ff61bd5dbac 255->262 256->255 261->242 261->262 263 7ff61bd5dbb3-7ff61bd5dbb7 262->263 264 7ff61bd5dbae-7ff61bd5dbb1 262->264 267 7ff61bd5dbbb-7ff61bd5dbc2 263->267 266 7ff61bd5dbc4-7ff61bd5dbe5 call 7ff61bd41d10 call 7ff61bd5171c 264->266 273 7ff61bd5dbe7-7ff61bd5dbec call 7ff61bd5edb8 266->273 274 7ff61bd5dbf1-7ff61bd5dc07 266->274 267->266 267->267 273->274 276 7ff61bd5dc09-7ff61bd5dc0c 274->276 277 7ff61bd5dc0e-7ff61bd5dc15 274->277 278 7ff61bd5dc22-7ff61bd5dc46 call 7ff61bd41d10 call 7ff61bd5171c 276->278 279 7ff61bd5dc19-7ff61bd5dc20 277->279 284 7ff61bd5dc48-7ff61bd5dc4d call 7ff61bd5edb8 278->284 285 7ff61bd5dc52-7ff61bd5dc68 278->285 279->278 279->279 284->285 287 7ff61bd5dc6a-7ff61bd5dc6d 285->287 288 7ff61bd5dc6f-7ff61bd5dc76 285->288 289 7ff61bd5dc83-7ff61bd5dca7 call 7ff61bd41d10 call 7ff61bd5171c 287->289 290 7ff61bd5dc7a-7ff61bd5dc81 288->290 295 7ff61bd5dca9-7ff61bd5dcae call 7ff61bd5edb8 289->295 296 7ff61bd5dcb3-7ff61bd5dcb5 289->296 290->289 290->290 295->296 296->242
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3273984107.00007FF61BD41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61BD40000, based on PE: true
        • Associated: 00000000.00000002.3273965318.00007FF61BD40000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274021381.00007FF61BD7C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD8F000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD94000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274083951.00007FF61BD95000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff61bd40000_EBAbsk8ydv.jbxd
        Similarity
        • API ID: isalnumisprint$ChangeCloseControlCreateDeviceErrorFileFindLastNotification_wcsftime_lisspace
        • String ID: \\.\PhysicalDrive%d
        • API String ID: 3713868347-2935326385
        • Opcode ID: 5f22f7dda0fa0d2083e89765b6fb2e99ee3076c198469aed35988f3e453eb5fa
        • Instruction ID: 00a970f0408dd2f988190c0edbe54349386c4c1c10ba8f5a73be8b1464a0a1c5
        • Opcode Fuzzy Hash: 5f22f7dda0fa0d2083e89765b6fb2e99ee3076c198469aed35988f3e453eb5fa
        • Instruction Fuzzy Hash: 2891F426E08AC648F728DB3598006EE2770FB99B68F405331DA9C87AE9DF38D149C704

        Control-flow Graph

        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3273984107.00007FF61BD41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61BD40000, based on PE: true
        • Associated: 00000000.00000002.3273965318.00007FF61BD40000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274021381.00007FF61BD7C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD8F000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD94000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274083951.00007FF61BD95000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff61bd40000_EBAbsk8ydv.jbxd
        Similarity
        • API ID: Library$AdaptersAddressDirectoryFreeInfoLoadProcSystem
        • String ID: GetAdaptersInfo$iphlpapi.dll
        • API String ID: 779643986-3114217049
        • Opcode ID: 4a27c3a1f73799821867c693db5f1ce39942eb2f893445ff2fda54d3b6687bb2
        • Instruction ID: a2456f92935ef1c604ebe09ae4df613cd5dc63375b8c78a456d6a6b6a69f7000
        • Opcode Fuzzy Hash: 4a27c3a1f73799821867c693db5f1ce39942eb2f893445ff2fda54d3b6687bb2
        • Instruction Fuzzy Hash: AB510626A19AC599EB2CCF24D9145F937B0FB4CBA8F445232CA5C837A5EF38D606C310

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 338 7ff61bd5d434-7ff61bd5d473 339 7ff61bd5d476-7ff61bd5d478 338->339 340 7ff61bd5d719-7ff61bd5d744 call 7ff61bd5edd0 339->340 341 7ff61bd5d47e-7ff61bd5d4e0 call 7ff61bd61140 call 7ff61bd5dfe0 CreateFileW 339->341 348 7ff61bd5d4e6-7ff61bd5d534 DeviceIoControl 341->348 349 7ff61bd5d70e-7ff61bd5d713 341->349 350 7ff61bd5d53a-7ff61bd5d565 call 7ff61bd61140 * 2 348->350 351 7ff61bd5d705-7ff61bd5d708 CloseHandle 348->351 349->339 349->340 356 7ff61bd5d56b-7ff61bd5d572 350->356 357 7ff61bd5d5ff 350->357 351->349 356->357 358 7ff61bd5d578-7ff61bd5d580 356->358 359 7ff61bd5d601-7ff61bd5d603 357->359 358->357 360 7ff61bd5d582-7ff61bd5d5fd DeviceIoControl 358->360 359->351 361 7ff61bd5d609-7ff61bd5d60d 359->361 360->359 361->351 362 7ff61bd5d613-7ff61bd5d63c call 7ff61bd5d1c4 call 7ff61bd5171c 361->362 367 7ff61bd5d648-7ff61bd5d671 call 7ff61bd5d1c4 call 7ff61bd5171c 362->367 368 7ff61bd5d63e-7ff61bd5d643 call 7ff61bd5edb8 362->368 374 7ff61bd5d67d-7ff61bd5d6a8 call 7ff61bd5d1c4 call 7ff61bd5171c 367->374 375 7ff61bd5d673-7ff61bd5d678 call 7ff61bd5edb8 367->375 368->367 381 7ff61bd5d6aa-7ff61bd5d6af call 7ff61bd5edb8 374->381 382 7ff61bd5d6b4-7ff61bd5d6b7 374->382 375->374 381->382 384 7ff61bd5d6b9-7ff61bd5d6cf call 7ff61bd5c9e4 382->384 385 7ff61bd5d703 382->385 384->385 388 7ff61bd5d6d1-7ff61bd5d6d4 384->388 385->351 388->385 389 7ff61bd5d6d6-7ff61bd5d6f7 call 7ff61bd5c9ac call 7ff61bd5171c 388->389 389->385 394 7ff61bd5d6f9-7ff61bd5d6fe call 7ff61bd5edb8 389->394 394->385
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3273984107.00007FF61BD41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61BD40000, based on PE: true
        • Associated: 00000000.00000002.3273965318.00007FF61BD40000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274021381.00007FF61BD7C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD8F000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD94000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274083951.00007FF61BD95000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff61bd40000_EBAbsk8ydv.jbxd
        Similarity
        • API ID: ControlDevice$CloseCreateFileHandle_wcsftime_l
        • String ID: $\\.\PhysicalDrive%d
        • API String ID: 2232022054-4129297631
        • Opcode ID: e552fafb8f0c2b07f14bd3e18931d16ec8ff4264b4c9298c1863061f42ef912c
        • Instruction ID: 1307d0afff09c3d60dedf103c8ddc8f856e23cb1a9b4e3aa52451545d5b9ad7e
        • Opcode Fuzzy Hash: e552fafb8f0c2b07f14bd3e18931d16ec8ff4264b4c9298c1863061f42ef912c
        • Instruction Fuzzy Hash: E781F522E08A8685FB18DB61E4007ED67B0FB89BA8F401235DA5D87AF5DF7CD146CB04

        Control-flow Graph

        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3273984107.00007FF61BD41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61BD40000, based on PE: true
        • Associated: 00000000.00000002.3273965318.00007FF61BD40000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274021381.00007FF61BD7C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD8F000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD94000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274083951.00007FF61BD95000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff61bd40000_EBAbsk8ydv.jbxd
        Similarity
        • API ID: ChangeCloseControlCreateDeviceFileFindNotification_wcsftime_l
        • String ID: SCSIDISK$\\.\Scsi%d:
        • API String ID: 1682414592-2176293039
        • Opcode ID: 577b507be059ceb8dda8a8d80dc6f0ca7d4625d406ab22ce9cbaccb78d2fb990
        • Instruction ID: f4071631d7d77ad780e51351d4daac0f4380fe5eb6947e5943a831547edad816
        • Opcode Fuzzy Hash: 577b507be059ceb8dda8a8d80dc6f0ca7d4625d406ab22ce9cbaccb78d2fb990
        • Instruction Fuzzy Hash: 2E518632F08A8649FB28DB65E4047EA7760EB59BA8F401231DE9C47AA5DF3CD146CB14

        Control-flow Graph

        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.3273984107.00007FF61BD41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61BD40000, based on PE: true
        • Associated: 00000000.00000002.3273965318.00007FF61BD40000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274021381.00007FF61BD7C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD8F000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD94000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274083951.00007FF61BD95000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff61bd40000_EBAbsk8ydv.jbxd
        Similarity
        • API ID: Version
        • String ID:
        • API String ID: 1889659487-0
        • Opcode ID: 9310357b27b72605c91cda9fd868c2f1d05fda8222a43fcded9a615d6b2e3943
        • Instruction ID: 57b2e80d93c5ca2fcf4aad6fd217bbe0320d3d3b700b79077a1aa469796555e8
        • Opcode Fuzzy Hash: 9310357b27b72605c91cda9fd868c2f1d05fda8222a43fcded9a615d6b2e3943
        • Instruction Fuzzy Hash: A3119E60E0EA8E44FE1C5F526D149BA53A09F1EFE4E042335DE0E876F69E2CA4478224

        Control-flow Graph

        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3273984107.00007FF61BD41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61BD40000, based on PE: true
        • Associated: 00000000.00000002.3273965318.00007FF61BD40000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274021381.00007FF61BD7C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD8F000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD94000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274083951.00007FF61BD95000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff61bd40000_EBAbsk8ydv.jbxd
        Similarity
        • API ID: CloseOpenQueryValue$_wcsftime_l
        • String ID: %s\Connection$MediaSubType$PCI$PnpInstanceID$System\CurrentControlSet\Control\Network\{4D36E972-E325-11CE-BFC1-08002BE10318}
        • API String ID: 1942821279-3769660923
        • Opcode ID: 1e710f77e3ee06986cbe06514addf1342d7295bd946d04cac56360bd4f484af0
        • Instruction ID: 799cde96c7c77b3f3436396a241bd487643aeb4ee2ff0aab4e8cc4f13216bfe1
        • Opcode Fuzzy Hash: 1e710f77e3ee06986cbe06514addf1342d7295bd946d04cac56360bd4f484af0
        • Instruction Fuzzy Hash: DC514776A18F4686EB58CF11E48076A73B4FB8CB94F442235E68D83664DF7CD545CB40

        Control-flow Graph

        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3273984107.00007FF61BD41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61BD40000, based on PE: true
        • Associated: 00000000.00000002.3273965318.00007FF61BD40000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274021381.00007FF61BD7C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD8F000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD94000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274083951.00007FF61BD95000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff61bd40000_EBAbsk8ydv.jbxd
        Similarity
        • API ID: LibraryLoad
        • String ID: 32.d$dll$msvc$rt.d$ttp.$user$winh
        • API String ID: 1029625771-3273083856
        • Opcode ID: 73224d7bf1c59c6d7a50056a5264328afd2584649fa69412497d679d280ec81e
        • Instruction ID: c31abecf591b65dfa36461f4013eef8db529113432f100ca0c66124bfe94d1e3
        • Opcode Fuzzy Hash: 73224d7bf1c59c6d7a50056a5264328afd2584649fa69412497d679d280ec81e
        • Instruction Fuzzy Hash: 1B417331E45F4687E618EBA1B04529E73B5FB59710F20D134EBD94BB6ADF38E8118348

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 436 7ff61bd57dc8-7ff61bd57e4d 437 7ff61bd57e54 436->437 438 7ff61bd57e4f-7ff61bd57e52 436->438 439 7ff61bd57e57-7ff61bd57e63 437->439 438->439 440 7ff61bd57e6a 439->440 441 7ff61bd57e65-7ff61bd57e68 439->441 442 7ff61bd57e6d-7ff61bd57e7f call 7ff61bd5cf60 440->442 441->442 445 7ff61bd57e86-7ff61bd57e92 call 7ff61bd5cc60 442->445 446 7ff61bd57e81-7ff61bd57e84 442->446 445->446 451 7ff61bd57e94-7ff61bd57ea0 call 7ff61bd5cdc0 445->451 448 7ff61bd57ea4-7ff61bd57eb5 call 7ff61bd5df34 446->448 452 7ff61bd57eba-7ff61bd57ec0 448->452 451->448 454 7ff61bd57eeb-7ff61bd57eee 452->454 455 7ff61bd57ec2-7ff61bd57ee0 call 7ff61bd58cac call 7ff61bd5171c 452->455 456 7ff61bd57ef4-7ff61bd57f5d call 7ff61bd58d94 call 7ff61bd54c18 call 7ff61bd58e40 call 7ff61bd54c18 call 7ff61bd58e40 call 7ff61bd5171c 454->456 457 7ff61bd57fe0 454->457 455->454 472 7ff61bd57ee2-7ff61bd57ee6 call 7ff61bd5edb8 455->472 510 7ff61bd57f68-7ff61bd57f7f 456->510 511 7ff61bd57f5f-7ff61bd57f63 call 7ff61bd5edb8 456->511 462 7ff61bd57fe6-7ff61bd57ffa call 7ff61bd58e7c 457->462 469 7ff61bd57ffc-7ff61bd58001 462->469 470 7ff61bd58022-7ff61bd5802c call 7ff61bd58128 462->470 469->470 473 7ff61bd58003-7ff61bd58020 call 7ff61bd5ea7c 469->473 481 7ff61bd5808e-7ff61bd58094 470->481 482 7ff61bd5802e-7ff61bd5804f CoInitialize call 7ff61bd5f658 470->482 472->454 473->481 484 7ff61bd58096-7ff61bd5809b call 7ff61bd5edb8 481->484 485 7ff61bd580a0-7ff61bd580b4 481->485 494 7ff61bd58069-7ff61bd58074 call 7ff61bd5edb8 482->494 495 7ff61bd58051-7ff61bd5805c CoCreateGuid 482->495 484->485 489 7ff61bd580b6-7ff61bd580bb call 7ff61bd5edb8 485->489 490 7ff61bd580c0-7ff61bd580d3 485->490 489->490 497 7ff61bd580d5-7ff61bd580da call 7ff61bd5edb8 490->497 498 7ff61bd580df-7ff61bd580f3 490->498 512 7ff61bd5807c-7ff61bd5807f 494->512 513 7ff61bd58076 CoUninitialize 494->513 495->494 499 7ff61bd5805e-7ff61bd58066 495->499 497->498 503 7ff61bd580f5-7ff61bd580f9 call 7ff61bd5edb8 498->503 504 7ff61bd580fe-7ff61bd58127 call 7ff61bd5edd0 498->504 499->494 503->504 514 7ff61bd57f8a-7ff61bd57f9b 510->514 515 7ff61bd57f81-7ff61bd57f85 call 7ff61bd5edb8 510->515 511->510 516 7ff61bd5808b 512->516 517 7ff61bd58081-7ff61bd58089 call 7ff61bd582e4 512->517 513->512 521 7ff61bd57f9d-7ff61bd57fa1 call 7ff61bd5edb8 514->521 522 7ff61bd57fa6-7ff61bd57fb7 514->522 515->514 516->481 517->481 521->522 525 7ff61bd57fb9-7ff61bd57fbd call 7ff61bd5edb8 522->525 526 7ff61bd57fc2-7ff61bd57fd3 522->526 525->526 526->462 528 7ff61bd57fd5-7ff61bd57fde call 7ff61bd5edb8 526->528 528->462
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.3273984107.00007FF61BD41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61BD40000, based on PE: true
        • Associated: 00000000.00000002.3273965318.00007FF61BD40000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274021381.00007FF61BD7C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD8F000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD94000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274083951.00007FF61BD95000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff61bd40000_EBAbsk8ydv.jbxd
        Similarity
        • API ID: File$Create$BufferCloseCopyDeleteEnumFreeGuidHandleInitializeReadSizeTransportUninitializeWkstamallocswscanf
        • String ID:
        • API String ID: 967320499-0
        • Opcode ID: f45f6e0889ba490f2accccdbf6b7aa0c194da9b90917add94f5b7e6bbfcb44cd
        • Instruction ID: 691f1ca98b0fa721cc78613b54abe7e9f42e9b2e79498603aab8ac81829e6eda
        • Opcode Fuzzy Hash: f45f6e0889ba490f2accccdbf6b7aa0c194da9b90917add94f5b7e6bbfcb44cd
        • Instruction Fuzzy Hash: E5A1A022E08E4685FB1CDB65E8411AE6770FB89B68F502235EE4D876B6DF39D484C708

        Control-flow Graph

        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.3273984107.00007FF61BD41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61BD40000, based on PE: true
        • Associated: 00000000.00000002.3273965318.00007FF61BD40000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274021381.00007FF61BD7C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD8F000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD94000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274083951.00007FF61BD95000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff61bd40000_EBAbsk8ydv.jbxd
        Similarity
        • API ID: ChangeCloseFindNotificationSleep
        • String ID:
        • API String ID: 1821831730-0
        • Opcode ID: 17cfd8ad0c7638cb764231ca36a94797f8588443699496d39ce2ea07f32eeec3
        • Instruction ID: 76e31a641fda8884511d75a452610aa18496a9112cd4e3f46f0215db9e3c0ef7
        • Opcode Fuzzy Hash: 17cfd8ad0c7638cb764231ca36a94797f8588443699496d39ce2ea07f32eeec3
        • Instruction Fuzzy Hash: 4F416A72B006818AE7149F71E4143AD3BB2F749BDCF148239DF092BB58CF7885898B14

        Control-flow Graph

        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.3273984107.00007FF61BD41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61BD40000, based on PE: true
        • Associated: 00000000.00000002.3273965318.00007FF61BD40000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274021381.00007FF61BD7C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD8F000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD94000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274083951.00007FF61BD95000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff61bd40000_EBAbsk8ydv.jbxd
        Similarity
        • API ID: memcpy_s
        • String ID:
        • API String ID: 1502251526-0
        • Opcode ID: 3ba629cbf69f092d9a6a99baa789089f6e541fc72971d204d36041c70e46a210
        • Instruction ID: 2d2b2e6c95ae2f4cb13698ab632489f5abc90d5fd12654bdc0e22a52294ce4f0
        • Opcode Fuzzy Hash: 3ba629cbf69f092d9a6a99baa789089f6e541fc72971d204d36041c70e46a210
        • Instruction Fuzzy Hash: 57318A32E09E8588FB289BA0E4513EC2370EB48B68F501335DA4D97AA5CF3CD5458744
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3273984107.00007FF61BD41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61BD40000, based on PE: true
        • Associated: 00000000.00000002.3273965318.00007FF61BD40000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274021381.00007FF61BD7C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD8F000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD94000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274083951.00007FF61BD95000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff61bd40000_EBAbsk8ydv.jbxd
        Similarity
        • API ID: String_snwprintf_s$Free$AllocExecuteShell
        • String ID: !!!CCustomInternetExplorer::Navigate::TargetFrameName=%p, PostData =%p, Headers=%p$!!!CCustomInternetExplorer::Navigate::succeeded GetQQBrowserRegExePath, hShellEcecute=0x%0x, bstrParam=(%ws)$%s|%s|%s|CallIE(hr=0x%0x)$--force-qb-trident-mode --url=$Headers$Navigate$PostData$Refresh$ShellExecute(failed)=%d, CallIE=0x%0x$TargetFrameName$getqb(failed),callIE=0x%0x$open$success
        • API String ID: 1409506827-3779367281
        • Opcode ID: 1bd3418aa18722d502f0f989c2ef448bb372b33f642515aba0af826c2920730e
        • Instruction ID: 8e3bc836beba626fb72f063e0afb531d7f379a2213bbbf395c6c4b7593122712
        • Opcode Fuzzy Hash: 1bd3418aa18722d502f0f989c2ef448bb372b33f642515aba0af826c2920730e
        • Instruction Fuzzy Hash: 0E325022E08F8686EB1CDB61E4402ED77B4FB48BA8F505235EA4D97EA9DF38D145C740
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3273984107.00007FF61BD41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61BD40000, based on PE: true
        • Associated: 00000000.00000002.3273965318.00007FF61BD40000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274021381.00007FF61BD7C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD8F000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD94000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274083951.00007FF61BD95000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff61bd40000_EBAbsk8ydv.jbxd
        Similarity
        • API ID: String_snwprintf_s$Free$AllocExecuteShell
        • String ID: !!!CCustomInternetExplorer::Navigate2::TargetFrameName=%p PostData=%p, Headers=%p, Url=(%ws)$%s|%s|%s|CallIE(hr=0x%0x)$--force-qb-trident-mode --url=$Headers$Navigate2$PostData$QueryStatusWB$ShellExecute(failed)=%d, CallIE=0x%0x$TargetFrameName$getqb(failed),callIE=0x%0x$open$success
        • API String ID: 1409506827-1244131776
        • Opcode ID: 94eb9b60d4815c93928bcf632506e6fd5ac0767ceb5879db2def2a593c99b36b
        • Instruction ID: f54f2e79a237da6bba28b45149bb0b1ac86cf9eee4bf76d6a597175e2ca12dd9
        • Opcode Fuzzy Hash: 94eb9b60d4815c93928bcf632506e6fd5ac0767ceb5879db2def2a593c99b36b
        • Instruction Fuzzy Hash: A4126232E08E8685EB1CDB65E4402ED37B4FB48B68F506236EA4D97AA9DF3CD145C700
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3273984107.00007FF61BD41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61BD40000, based on PE: true
        • Associated: 00000000.00000002.3273965318.00007FF61BD40000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274021381.00007FF61BD7C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD8F000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD94000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274083951.00007FF61BD95000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff61bd40000_EBAbsk8ydv.jbxd
        Similarity
        • API ID: CloseExceptionHandleHttpInternetRequestThrowstd::exception::exception$OpenSendXbad_allochtonlstd::_
        • String ID: FuncName must not be empty$HTTP/1.1$POST$ServantName must not be empty$crypt$qbpcstat$stat
        • API String ID: 254083644-2247718545
        • Opcode ID: de6711ad864119869007c65ce8b63b81258a5e4cc7d5ab55e84a7347c8c6c515
        • Instruction ID: e1f0d7a030f85021c53dbeeec30f11c5afd941f8a0c34f35e64fcc3e8c6853c2
        • Opcode Fuzzy Hash: de6711ad864119869007c65ce8b63b81258a5e4cc7d5ab55e84a7347c8c6c515
        • Instruction Fuzzy Hash: 1122B232A08F8989EB28DF71D8406EC3775FB48B98F902236DA4D97A69DF38D554C704
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.3273984107.00007FF61BD41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61BD40000, based on PE: true
        • Associated: 00000000.00000002.3273965318.00007FF61BD40000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274021381.00007FF61BD7C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD8F000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD94000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274083951.00007FF61BD95000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff61bd40000_EBAbsk8ydv.jbxd
        Similarity
        • API ID: Locale$Info__crt$_calloc_crtfree$A_statErrorLastUpdateUpdate::__calloc_impl_invoke_watson
        • String ID:
        • API String ID: 377212461-0
        • Opcode ID: e3bf062b5020bad119278e3234153a9c97d88ad087b0860666f44413645793e8
        • Instruction ID: 63710619b83dc3df2e3858fcb909d2472646ab2d7da3f47eab64087bdf42859f
        • Opcode Fuzzy Hash: e3bf062b5020bad119278e3234153a9c97d88ad087b0860666f44413645793e8
        • Instruction Fuzzy Hash: 8651F511F18ACA46FA6D9A6A945077A7294AFACFF4F046331DE0DD7BA5DE3CE4008700
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3273984107.00007FF61BD41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61BD40000, based on PE: true
        • Associated: 00000000.00000002.3273965318.00007FF61BD40000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274021381.00007FF61BD7C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD8F000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD94000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274083951.00007FF61BD95000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff61bd40000_EBAbsk8ydv.jbxd
        Similarity
        • API ID: ControlDevice_errno$AllocCloseCreateFileHandleHeap_callnewh_wcsftime_lfreemalloc
        • String ID: .$\\.\PhysicalDrive%d
        • API String ID: 3652198919-636426351
        • Opcode ID: 2cb9f29a0383857dff898a6d44bd58ec0e7d864761fd42d99c1947b355f38110
        • Instruction ID: 0f3b204635b2bd8afb03aa48823afbcb691c6327dbfcf4a915f86f702924e37e
        • Opcode Fuzzy Hash: 2cb9f29a0383857dff898a6d44bd58ec0e7d864761fd42d99c1947b355f38110
        • Instruction Fuzzy Hash: D251A332A18E4686FB28DF51E4147AE63A0FB89BA4F401235DE4D87BA5DF3CD145CB04
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3273984107.00007FF61BD41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61BD40000, based on PE: true
        • Associated: 00000000.00000002.3273965318.00007FF61BD40000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274021381.00007FF61BD7C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD8F000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD94000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274083951.00007FF61BD95000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff61bd40000_EBAbsk8ydv.jbxd
        Similarity
        • API ID: CreateInstanceThread$CurrentExecuteMessagePostShellSleep
        • String ID: -Embedding$open
        • API String ID: 4109628772-2736633392
        • Opcode ID: fd2df4d1919a09f22f9c63018b7fd7111f9de143657e3ef7dbf67d501e261332
        • Instruction ID: 96da561574633287c5c5482c98e60dadafecdd3b4f26ab863cd8a60ea2d9c849
        • Opcode Fuzzy Hash: fd2df4d1919a09f22f9c63018b7fd7111f9de143657e3ef7dbf67d501e261332
        • Instruction Fuzzy Hash: 48518232E08E8A86E71CDF11E8442A96761FB8CB68F402236D94D87AB4DF7CE445CB40
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3273984107.00007FF61BD41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61BD40000, based on PE: true
        • Associated: 00000000.00000002.3273965318.00007FF61BD40000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274021381.00007FF61BD7C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD8F000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD94000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274083951.00007FF61BD95000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff61bd40000_EBAbsk8ydv.jbxd
        Similarity
        • API ID: String$AllocFree
        • String ID: FindBrowserByIndex$NavigateHack
        • API String ID: 344208780-3607754153
        • Opcode ID: de8f1f9ed67bc6513ebae345c0a51becab5b6116b3a1311c571633cf55c53bdc
        • Instruction ID: cc686dfa61cba77ea23ca2f6f198b0726e2f1190a7ec8d663b72592dec825daf
        • Opcode Fuzzy Hash: de8f1f9ed67bc6513ebae345c0a51becab5b6116b3a1311c571633cf55c53bdc
        • Instruction Fuzzy Hash: F2717C32E18E459AFB1CDB60D4503AC23A4FB58BA8F446635EA4D87EAACF3CD115C740
        APIs
        Strings
        • ERROR : Unable to initialize critical section in CAtlBaseModule, xrefs: 00007FF61BD5ED5F
        Memory Dump Source
        • Source File: 00000000.00000002.3273984107.00007FF61BD41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61BD40000, based on PE: true
        • Associated: 00000000.00000002.3273965318.00007FF61BD40000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274021381.00007FF61BD7C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD8F000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD94000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274083951.00007FF61BD95000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff61bd40000_EBAbsk8ydv.jbxd
        Similarity
        • API ID: DebugDebuggerErrorLastOutputPresentString
        • String ID: ERROR : Unable to initialize critical section in CAtlBaseModule
        • API String ID: 389471666-631824599
        • Opcode ID: f676bf00bd45b925f24ae54672d027915a33156fdb6a16f405138c6fe5cc32f1
        • Instruction ID: c6b72286f6c1c23c4002767a9f241993fce75c69083ce9a7bfd97cd43792d1b0
        • Opcode Fuzzy Hash: f676bf00bd45b925f24ae54672d027915a33156fdb6a16f405138c6fe5cc32f1
        • Instruction Fuzzy Hash: 9C116D72E04F4A9BE70C9B26E9503B933A0FF18B69F406235C64DC2960EF7CE4648700
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3273984107.00007FF61BD41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61BD40000, based on PE: true
        • Associated: 00000000.00000002.3273965318.00007FF61BD40000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274021381.00007FF61BD7C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD8F000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD94000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274083951.00007FF61BD95000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff61bd40000_EBAbsk8ydv.jbxd
        Similarity
        • API ID: htonl$ExceptionThrowstd::exception::exception
        • String ID: gfffffff$gfffffff$gfffffff
        • API String ID: 1194782181-2968619780
        • Opcode ID: 7f4e2fb3dc5b2d2fb114832c0c81eb9e0488da7db746ea189fc7acc70b9d317e
        • Instruction ID: 44537ac96407a3f8a61dbc414348ff94acaf4473afe4213c5bb5896d3568a983
        • Opcode Fuzzy Hash: 7f4e2fb3dc5b2d2fb114832c0c81eb9e0488da7db746ea189fc7acc70b9d317e
        • Instruction Fuzzy Hash: A1C29566B089C586DF0CDB3596512FD2772EB4AFE4B407120EA5D4BB6ACE3CE402DB05
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.3273984107.00007FF61BD41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61BD40000, based on PE: true
        • Associated: 00000000.00000002.3273965318.00007FF61BD40000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274021381.00007FF61BD7C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD8F000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD94000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274083951.00007FF61BD95000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff61bd40000_EBAbsk8ydv.jbxd
        Similarity
        • API ID: Find$CloseFileFirst
        • String ID:
        • API String ID: 2295610775-0
        • Opcode ID: 8a02239767a8b36154e632c7aba0e0c2fca487b9197e97b71514e1963a2b26dd
        • Instruction ID: 7f3c9d35aad1e12d976c300007b32a6d89581bb442a728211618690213e49cd0
        • Opcode Fuzzy Hash: 8a02239767a8b36154e632c7aba0e0c2fca487b9197e97b71514e1963a2b26dd
        • Instruction Fuzzy Hash: D7F0E225E0AD0985EE6C9B24E45A3B53360FB58F78F542732C96D832F0CE2C90099700
        APIs
        • EnumSystemLocalesW.KERNEL32(?,?,?,?,00007FF61BD70EAB,?,?,00000140,00007FF61BD7157B), ref: 00007FF61BD6E931
        Memory Dump Source
        • Source File: 00000000.00000002.3273984107.00007FF61BD41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61BD40000, based on PE: true
        • Associated: 00000000.00000002.3273965318.00007FF61BD40000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274021381.00007FF61BD7C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD8F000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD94000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274083951.00007FF61BD95000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff61bd40000_EBAbsk8ydv.jbxd
        Similarity
        • API ID: EnumLocalesSystem
        • String ID:
        • API String ID: 2099609381-0
        • Opcode ID: 73643b16058b4c7c9c70b5fc0a0d8582263b454781c721b842577a58b24a1dfe
        • Instruction ID: a7e01ac99a068863a4c5bd00420fc179bdf91536f9c76c1cca2262e12f087ae9
        • Opcode Fuzzy Hash: 73643b16058b4c7c9c70b5fc0a0d8582263b454781c721b842577a58b24a1dfe
        • Instruction Fuzzy Hash: 93E0EC26E19E8AD6F75C5B01FC9136037A0AF5DB25F503632C50CC6A74CE6CA1968705
        Memory Dump Source
        • Source File: 00000000.00000002.3273984107.00007FF61BD41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61BD40000, based on PE: true
        • Associated: 00000000.00000002.3273965318.00007FF61BD40000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274021381.00007FF61BD7C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD8F000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD94000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274083951.00007FF61BD95000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff61bd40000_EBAbsk8ydv.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: a37785044067b7a1469bff97e43a5488a276ebc2d2d122b53df96d93c8cdea13
        • Instruction ID: 36e9ad9e523bf675709288599cd5ce1a276f1b24d2b0397a99583be5512651a5
        • Opcode Fuzzy Hash: a37785044067b7a1469bff97e43a5488a276ebc2d2d122b53df96d93c8cdea13
        • Instruction Fuzzy Hash: 132283B7F345204BD31DCB69EC52FA836A2B75434C709A02CEA17D3F44EA3DEA158644
        Memory Dump Source
        • Source File: 00000000.00000002.3273984107.00007FF61BD41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61BD40000, based on PE: true
        • Associated: 00000000.00000002.3273965318.00007FF61BD40000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274021381.00007FF61BD7C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD8F000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD94000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274083951.00007FF61BD95000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff61bd40000_EBAbsk8ydv.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: e0a2dbce7e390b63f7df38598765106d3b12782b4211c6c1c5caf7da0a4464e1
        • Instruction ID: 10abda2feb9175b64af6ff571e8f9ecec970e7bc5494e6d5c1e88f4d2e3e5016
        • Opcode Fuzzy Hash: e0a2dbce7e390b63f7df38598765106d3b12782b4211c6c1c5caf7da0a4464e1
        • Instruction Fuzzy Hash: 345123737349184BA319CE39EA16A5A3391F3D974C748E124EF46E7B45EA3DE902C381
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3273984107.00007FF61BD41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61BD40000, based on PE: true
        • Associated: 00000000.00000002.3273965318.00007FF61BD40000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274021381.00007FF61BD7C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD8F000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD94000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274083951.00007FF61BD95000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff61bd40000_EBAbsk8ydv.jbxd
        Similarity
        • API ID: _errno$__doserrno_getptd_noexit_invalid_parameter_noinfo$FullNamePath_getdrive_validdrive
        • String ID: .$:
        • API String ID: 3206601966-4202072812
        • Opcode ID: c278636a75acf6b6aa7e52600644b43fcd6dd163b020e58cd30286ffe6d5198d
        • Instruction ID: 2b97792ef57ba7277666eb3ed9096be21898efe63e3dcb57af0bc3b83293e262
        • Opcode Fuzzy Hash: c278636a75acf6b6aa7e52600644b43fcd6dd163b020e58cd30286ffe6d5198d
        • Instruction Fuzzy Hash: BD31CB15E0CE8E42FA2E5F5184543BE6290AF8CF78F456235D94DC72B6DEBCD8418B11
        APIs
        Strings
        • !!!enter CCustomInternetExplorer::QueryInterface::IID(%ws), threadid=%d, xrefs: 00007FF61BD42D1A
        • !!!enter CCustomInternetExplorer::QueryInterface::IID(%ws) should pass(%ws), xrefs: 00007FF61BD42D5A
        • !!!enter CCustomInternetExplorer::QueryInterface::IID(%ws) not supported, xrefs: 00007FF61BD431ED
        • !!!IEWebBrowser for QueryInterface(%ws) got 0x%0x, xrefs: 00007FF61BD42ECC
        • !!!enter CCustomInternetExplorer::QueryInterface::IID(%ws) not supported, m_pIEWebBrowser2=%p, xrefs: 00007FF61BD43036
        • !!!CreateIEWebBrowser2() in QueryInterface(%ws) got 0x%0x, xrefs: 00007FF61BD42E9C
        Memory Dump Source
        • Source File: 00000000.00000002.3273984107.00007FF61BD41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61BD40000, based on PE: true
        • Associated: 00000000.00000002.3273965318.00007FF61BD40000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274021381.00007FF61BD7C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD8F000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD94000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274083951.00007FF61BD95000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff61bd40000_EBAbsk8ydv.jbxd
        Similarity
        • API ID: String$AllocFreeFrom$CurrentExceptionThreadThrow
        • String ID: !!!CreateIEWebBrowser2() in QueryInterface(%ws) got 0x%0x$!!!IEWebBrowser for QueryInterface(%ws) got 0x%0x$!!!enter CCustomInternetExplorer::QueryInterface::IID(%ws) not supported$!!!enter CCustomInternetExplorer::QueryInterface::IID(%ws) not supported, m_pIEWebBrowser2=%p$!!!enter CCustomInternetExplorer::QueryInterface::IID(%ws) should pass(%ws)$!!!enter CCustomInternetExplorer::QueryInterface::IID(%ws), threadid=%d
        • API String ID: 2093652262-2840267380
        • Opcode ID: cad24af98e3b99c65bb915084164526389ec252c12579296056ed3c6e499cd0d
        • Instruction ID: e0e3cfb8990367c626fce50176340a3fca17f1b061f3e746f646b69d73ad6397
        • Opcode Fuzzy Hash: cad24af98e3b99c65bb915084164526389ec252c12579296056ed3c6e499cd0d
        • Instruction Fuzzy Hash: A102FD22F18E4A85EB5DDB15D4802786761EB49F78F846632DA4D87BB8CFBCE844C350
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3273984107.00007FF61BD41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61BD40000, based on PE: true
        • Associated: 00000000.00000002.3273965318.00007FF61BD40000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274021381.00007FF61BD7C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD8F000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD94000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274083951.00007FF61BD95000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff61bd40000_EBAbsk8ydv.jbxd
        Similarity
        • API ID: AddressHandleOpenProcProcess$CloseErrorLastLibraryLoadModule
        • String ID: GetProcessImageFileNameW$K32GetProcessImageFileNameW$kernel32$psapi.dll
        • API String ID: 1640075399-1140887699
        • Opcode ID: aa82de994624b4998622f923e83a535e56021346db82b491f78cc213d6dde9bb
        • Instruction ID: 6f558e2382926725f08438d5ea98d60f4797a05d902ce2e426a502107eee35b5
        • Opcode Fuzzy Hash: aa82de994624b4998622f923e83a535e56021346db82b491f78cc213d6dde9bb
        • Instruction Fuzzy Hash: 6D212A61F0EF0B85EA5C9F16E85427827A1AF4CFA5F486639D90EC37B4EE6CE4448740
        APIs
        • GetModuleHandleA.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF61BD4257F), ref: 00007FF61BD4F402
        • GetProcAddress.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF61BD4257F), ref: 00007FF61BD4F41E
        • OpenThread.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF61BD4257F), ref: 00007FF61BD4F44C
        • GetLastError.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF61BD4257F), ref: 00007FF61BD4F45A
        • OpenThread.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF61BD4257F), ref: 00007FF61BD4F46F
        • CloseHandle.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF61BD4257F), ref: 00007FF61BD4F4A7
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3273984107.00007FF61BD41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61BD40000, based on PE: true
        • Associated: 00000000.00000002.3273965318.00007FF61BD40000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274021381.00007FF61BD7C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD8F000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD94000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274083951.00007FF61BD95000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff61bd40000_EBAbsk8ydv.jbxd
        Similarity
        • API ID: HandleOpenThread$AddressCloseErrorLastModuleProc
        • String ID: NtQueryInformationThread$ntdll.dll
        • API String ID: 2925828140-2698099043
        • Opcode ID: b15917006222226be9306d18a042d1e7103124e091ac296d0882ca0ad3a46121
        • Instruction ID: ae9342f13bac923eb471d0288322fd7ec44d13f649f280b4113f4faee58c16e8
        • Opcode Fuzzy Hash: b15917006222226be9306d18a042d1e7103124e091ac296d0882ca0ad3a46121
        • Instruction Fuzzy Hash: 4F217E22E19F0A86EB1CDB16A89416963A1FF8CFA4F446635D94D83B74EF3CE405C740
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3273984107.00007FF61BD41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61BD40000, based on PE: true
        • Associated: 00000000.00000002.3273965318.00007FF61BD40000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274021381.00007FF61BD7C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD8F000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD94000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274083951.00007FF61BD95000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff61bd40000_EBAbsk8ydv.jbxd
        Similarity
        • API ID: Close$AddressExistsFileHandleModulePathProcQueryValue
        • String ID: InstallDir$QQBrowser.exe$Software\Tencent\QQBrowser$Software\Wow6432Node\Tencent\QQBrowser
        • API String ID: 3970199010-1871758474
        • Opcode ID: a4d2b91cced5d2252ad5ecd6bf6790e37562157be7f73dccbdb02d7fce924ec1
        • Instruction ID: 269c5a4fcfd25b3c435c4faabd038bbfc479d5284c6b817e12e67cb15bb35626
        • Opcode Fuzzy Hash: a4d2b91cced5d2252ad5ecd6bf6790e37562157be7f73dccbdb02d7fce924ec1
        • Instruction Fuzzy Hash: 6B417032E08F4585EA1C9B21E8441AA6364FB89BB4F506335EA6DC3BB9DF3CD545C740
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3273984107.00007FF61BD41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61BD40000, based on PE: true
        • Associated: 00000000.00000002.3273965318.00007FF61BD40000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274021381.00007FF61BD7C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD8F000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD94000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274083951.00007FF61BD95000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff61bd40000_EBAbsk8ydv.jbxd
        Similarity
        • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_lockmessagesstd::bad_exception::bad_exception
        • String ID: bad cast
        • API String ID: 620047600-3145022300
        • Opcode ID: 6fa198d8182d60241d03b708863fe7a84b2709087642af159d215598ae70a9eb
        • Instruction ID: c78fb22b79a63890714b918de704eedac5f2acffab0f2889876a183a96fc23e9
        • Opcode Fuzzy Hash: 6fa198d8182d60241d03b708863fe7a84b2709087642af159d215598ae70a9eb
        • Instruction Fuzzy Hash: F6315B21E0DF5A81FA1D9B15E8900B96371EB98FB4B442332DA5D876F9DE3CE846C305
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3273984107.00007FF61BD41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61BD40000, based on PE: true
        • Associated: 00000000.00000002.3273965318.00007FF61BD40000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274021381.00007FF61BD7C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD8F000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD94000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274083951.00007FF61BD95000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff61bd40000_EBAbsk8ydv.jbxd
        Similarity
        • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_locknumpunctstd::bad_exception::bad_exception
        • String ID: bad cast
        • API String ID: 4068408745-3145022300
        • Opcode ID: b59a08d1540ec987e1887726f7663786dbea4613d7ad03c91e53d418083ca5fc
        • Instruction ID: 08dd4439046958c33c7b3516c2f451ee8f5cdb103b06446ad7880fa0a05f9486
        • Opcode Fuzzy Hash: b59a08d1540ec987e1887726f7663786dbea4613d7ad03c91e53d418083ca5fc
        • Instruction Fuzzy Hash: F1313E21E09E0A91FA1D9F25E8900B96371EB98FB4B142332D65DC77F5DE7CE8468B04
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3273984107.00007FF61BD41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61BD40000, based on PE: true
        • Associated: 00000000.00000002.3273965318.00007FF61BD40000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274021381.00007FF61BD7C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD8F000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD94000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274083951.00007FF61BD95000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff61bd40000_EBAbsk8ydv.jbxd
        Similarity
        • API ID: std::_$LockitLockit::_$ExceptionFacet_RegisterThrow_lockctypestd::bad_exception::bad_exception
        • String ID: bad cast
        • API String ID: 3320480354-3145022300
        • Opcode ID: 1e214aa9f60b7bf54ab17ca2b64ecbdf3207e7ccc1a0268482592e6b885839f2
        • Instruction ID: 7a4aa0a8118dbfbe18a9ff93a588f7f89de95d6b9b2831ce0b1b12bb2d719c47
        • Opcode Fuzzy Hash: 1e214aa9f60b7bf54ab17ca2b64ecbdf3207e7ccc1a0268482592e6b885839f2
        • Instruction Fuzzy Hash: E9314021E09E4A81EA1D9F15E8500B96371EB88FB4F186332DA5DC76F5DE3CE4858B04
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3273984107.00007FF61BD41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61BD40000, based on PE: true
        • Associated: 00000000.00000002.3273965318.00007FF61BD40000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274021381.00007FF61BD7C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD8F000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD94000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274083951.00007FF61BD95000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff61bd40000_EBAbsk8ydv.jbxd
        Similarity
        • API ID: Exception_getptd$DestructObject$Raise_getptd_noexit
        • String ID: csm
        • API String ID: 2851507484-1018135373
        • Opcode ID: f63c31c8744fcde41ace1429d150bb829a6fb854e99d4356c7669e496792e9cb
        • Instruction ID: 6b3a1f13b31c9bb48b6f94b745e1e95e8edd7e8cb9d0e59eb66a41fa230047f1
        • Opcode Fuzzy Hash: f63c31c8744fcde41ace1429d150bb829a6fb854e99d4356c7669e496792e9cb
        • Instruction Fuzzy Hash: 37214B76A08A8982E638DB55E0403AE7361F78CFA4F055236DE9D437A5CF3DE485CB00
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.3273984107.00007FF61BD41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61BD40000, based on PE: true
        • Associated: 00000000.00000002.3273965318.00007FF61BD40000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274021381.00007FF61BD7C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD8F000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD94000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274083951.00007FF61BD95000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff61bd40000_EBAbsk8ydv.jbxd
        Similarity
        • API ID: free$Sleep_malloc_crtmalloc
        • String ID:
        • API String ID: 2523592665-0
        • Opcode ID: ffe51e098a28f5bc81262543e1a2495965659b64c93bc8964f93e359b729555d
        • Instruction ID: f196da2f35cc32469270f671e1a5c2840f58e549260d4c409b5071fbcbace5fc
        • Opcode Fuzzy Hash: ffe51e098a28f5bc81262543e1a2495965659b64c93bc8964f93e359b729555d
        • Instruction Fuzzy Hash: 8B617336A04F8A92FA1C9B16E94166933A4FB8CB68F441235DE5C87B61DF3CE4A5C740
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.3273984107.00007FF61BD41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61BD40000, based on PE: true
        • Associated: 00000000.00000002.3273965318.00007FF61BD40000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274021381.00007FF61BD7C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD8F000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD94000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274083951.00007FF61BD95000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff61bd40000_EBAbsk8ydv.jbxd
        Similarity
        • API ID: CriticalSectionString$ClassObjectRevokeThread$AllocCurrentEnterFreeFromInitializeLeaveMessagePost
        • String ID:
        • API String ID: 1381646855-0
        • Opcode ID: a029d25510344f831e2ec24893b9987acfd9a486f14a21de3c8d25aeeaf843b1
        • Instruction ID: 58dfadd8832582367d09a17646beddaaa7cd582f39cb52c183fa2d80cc8509d2
        • Opcode Fuzzy Hash: a029d25510344f831e2ec24893b9987acfd9a486f14a21de3c8d25aeeaf843b1
        • Instruction Fuzzy Hash: 6C618F22E08F8586E71C9B62E8406AD67B4FB89B64F542235DA4D97FB4DF38E450CB00
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.3273984107.00007FF61BD41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61BD40000, based on PE: true
        • Associated: 00000000.00000002.3273965318.00007FF61BD40000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274021381.00007FF61BD7C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD8F000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD94000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274083951.00007FF61BD95000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff61bd40000_EBAbsk8ydv.jbxd
        Similarity
        • API ID: _errno_invalid_parameter_noinfo$_getptd_noexit
        • String ID:
        • API String ID: 1573762532-0
        • Opcode ID: 36164a5b92ab75e8b9d0270866404d9543f1fa6deae194a1da3a023a4b3b9817
        • Instruction ID: d8f486552bd396baca949cffbf96a4558e0744479e6c77f0b59b6b9062a2545c
        • Opcode Fuzzy Hash: 36164a5b92ab75e8b9d0270866404d9543f1fa6deae194a1da3a023a4b3b9817
        • Instruction Fuzzy Hash: DD413075E08ADE41EB6C7B11908017972B0EF58FB4F846272DE9C8B6E5DE2CD4418704
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.3273984107.00007FF61BD41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61BD40000, based on PE: true
        • Associated: 00000000.00000002.3273965318.00007FF61BD40000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274021381.00007FF61BD7C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD8F000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD94000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274083951.00007FF61BD95000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff61bd40000_EBAbsk8ydv.jbxd
        Similarity
        • API ID: File$CloseCreateFind$CopyDeleteFirstFolderHandlePathReadSizeSpecial
        • String ID:
        • API String ID: 2284925675-0
        • Opcode ID: e2c09bcf50226816ff0f6ef4bf8d80569a357a0aade116ce0efe607448ec2109
        • Instruction ID: 620c8805c1f1616585c975d2d2a3a00a3e01d51d1e52657e45b87010e04e06e5
        • Opcode Fuzzy Hash: e2c09bcf50226816ff0f6ef4bf8d80569a357a0aade116ce0efe607448ec2109
        • Instruction Fuzzy Hash: 41519E32B04E45DAEB18DF65D4542AC63B1FB88BA8F805335DA2D93AE8DF38D514C744
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.3273984107.00007FF61BD41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61BD40000, based on PE: true
        • Associated: 00000000.00000002.3273965318.00007FF61BD40000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274021381.00007FF61BD7C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD8F000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD94000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274083951.00007FF61BD95000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff61bd40000_EBAbsk8ydv.jbxd
        Similarity
        • API ID: Locale_errno_invalid_parameter_noinfo$UpdateUpdate::__getptd_noexit
        • String ID:
        • API String ID: 781512312-0
        • Opcode ID: 114d716205cd9dd7d1c115ba21ab42b81c090a2b93a5ee04d70adfc3818b5fa7
        • Instruction ID: 9f6316a479c8179c68fcf91539a96978b112909c1310364b8684de75d816d42c
        • Opcode Fuzzy Hash: 114d716205cd9dd7d1c115ba21ab42b81c090a2b93a5ee04d70adfc3818b5fa7
        • Instruction Fuzzy Hash: 7C413B72E08A9B81EB6CB71190401FD36B1EF58FB0F945276D6DC8B6E8DE2CD8418704
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.3273984107.00007FF61BD41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61BD40000, based on PE: true
        • Associated: 00000000.00000002.3273965318.00007FF61BD40000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274021381.00007FF61BD7C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD8F000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD94000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274083951.00007FF61BD95000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff61bd40000_EBAbsk8ydv.jbxd
        Similarity
        • API ID: Locale$UpdateUpdate::___updatetlocinfo__updatetmbcinfo_errno_getptd_invalid_parameter_noinfo
        • String ID:
        • API String ID: 3191669884-0
        • Opcode ID: 5afd3457c7a2ea1a5f02dee57da20931110c2d528eea28ea6e04efb072b26444
        • Instruction ID: 6ad8d2b04a5579a78274630577793348f388c9fbf4c1097e0bda4e3b4c119a7f
        • Opcode Fuzzy Hash: 5afd3457c7a2ea1a5f02dee57da20931110c2d528eea28ea6e04efb072b26444
        • Instruction Fuzzy Hash: 8831D132E18F8A95E62C9B11C4845A9B6A0EB5CFF4F146232EE59837E5CF7CD851C700
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3273984107.00007FF61BD41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61BD40000, based on PE: true
        • Associated: 00000000.00000002.3273965318.00007FF61BD40000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274021381.00007FF61BD7C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD8F000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD94000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274083951.00007FF61BD95000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff61bd40000_EBAbsk8ydv.jbxd
        Similarity
        • API ID: AddressCloseHandleModuleOpenProc
        • String ID: Advapi32.dll$RegOpenKeyTransactedW
        • API String ID: 823179699-3913318428
        • Opcode ID: 46beea28c6eae07af4a728249fe307b16fa5c9b9b6675718f3559790d5a38139
        • Instruction ID: de9c41d6a8ed2c04a8774916c514781b3e9975d63e000fb9a30b7466c6a246f5
        • Opcode Fuzzy Hash: 46beea28c6eae07af4a728249fe307b16fa5c9b9b6675718f3559790d5a38139
        • Instruction Fuzzy Hash: C3214132A18E4986FB2C9B51E4583B963A0FB49FA8F586235EA4D87A64DF3CD4548700
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.3273984107.00007FF61BD41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61BD40000, based on PE: true
        • Associated: 00000000.00000002.3273965318.00007FF61BD40000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274021381.00007FF61BD7C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD8F000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD94000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274083951.00007FF61BD95000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff61bd40000_EBAbsk8ydv.jbxd
        Similarity
        • API ID: ErrorLastThreadTimerWaitable$CreateCurrentFreeHeapMessageMultipleObjectsPostWait_errnofree
        • String ID:
        • API String ID: 2911511307-0
        • Opcode ID: 689c32a63b2e1eb818ab7082173d63fae4e2e3531b0e754b93d29fbe0c040a1d
        • Instruction ID: 3d51635f1663d7252a1b95fe63e8bece5db5571889a5d94423b5d7a91180d175
        • Opcode Fuzzy Hash: 689c32a63b2e1eb818ab7082173d63fae4e2e3531b0e754b93d29fbe0c040a1d
        • Instruction Fuzzy Hash: 3321B632E18F4587E75D8B24E41176A77A0FF8DB64F102334E68E82964DF6CE044CB00
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3273984107.00007FF61BD41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61BD40000, based on PE: true
        • Associated: 00000000.00000002.3273965318.00007FF61BD40000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274021381.00007FF61BD7C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD8F000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD94000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274083951.00007FF61BD95000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff61bd40000_EBAbsk8ydv.jbxd
        Similarity
        • API ID: ExceptionThrow
        • String ID: ios_base::badbit set$ios_base::eofbit set$ios_base::failbit set
        • API String ID: 432778473-1866435925
        • Opcode ID: 093aac91aca3d5cb444e93d4d42d2825fe212e2d82f146a169df17e4c3784bdb
        • Instruction ID: 5cd0a5de793453222272e0e04908e397df24558f174e8ee465ed9b16cfe601fe
        • Opcode Fuzzy Hash: 093aac91aca3d5cb444e93d4d42d2825fe212e2d82f146a169df17e4c3784bdb
        • Instruction Fuzzy Hash: C3116061E18E0F95FF5CDB64D8814EC2370AF58F28F543231D61D9A975EE68E545C304
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3273984107.00007FF61BD41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61BD40000, based on PE: true
        • Associated: 00000000.00000002.3273965318.00007FF61BD40000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274021381.00007FF61BD7C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD8F000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD94000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274083951.00007FF61BD95000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff61bd40000_EBAbsk8ydv.jbxd
        Similarity
        • API ID: _getptd
        • String ID: MOC$RCC$csm
        • API String ID: 3186804695-2671469338
        • Opcode ID: 5c374d830ee814f54b2f9fa3c3e92b96ec2efda21db6e13fed2e5b8fabcddbb5
        • Instruction ID: 75f579d4b056aa62c63aa360194600a5030ab766c5a7a3bc89f51d769a8cc662
        • Opcode Fuzzy Hash: 5c374d830ee814f54b2f9fa3c3e92b96ec2efda21db6e13fed2e5b8fabcddbb5
        • Instruction Fuzzy Hash: 71F0FE35D089CE85E65D2B5085453FC32A0AF5CF25F85A671C21CC22A29FAC64848A22
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.3273984107.00007FF61BD41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61BD40000, based on PE: true
        • Associated: 00000000.00000002.3273965318.00007FF61BD40000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274021381.00007FF61BD7C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD8F000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD94000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274083951.00007FF61BD95000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff61bd40000_EBAbsk8ydv.jbxd
        Similarity
        • API ID: String$memcpy_s$AllocFree
        • String ID:
        • API String ID: 3865269606-0
        • Opcode ID: e22d06bfb5369b301686315787000ad3005f2f7fca881707cd04031463c0dc54
        • Instruction ID: 314770b2330e729c6ec5d5b81a0d8482d73e665230e67090d156564435c1d07d
        • Opcode Fuzzy Hash: e22d06bfb5369b301686315787000ad3005f2f7fca881707cd04031463c0dc54
        • Instruction Fuzzy Hash: D041E425F18E4F82EA2C5B5144591781690AF8CFB8F24633ACE1DC7FF5CE6CE4548208
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3273984107.00007FF61BD41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61BD40000, based on PE: true
        • Associated: 00000000.00000002.3273965318.00007FF61BD40000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274021381.00007FF61BD7C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD8F000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD94000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274083951.00007FF61BD95000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff61bd40000_EBAbsk8ydv.jbxd
        Similarity
        • API ID: Getcvt$___lc_codepage_func___lc_locale_name_func___mb_cur_max_func__updatetlocinfo_getptdlocaleconv
        • String ID: false$true
        • API String ID: 379465546-2658103896
        • Opcode ID: c770085aa06cf17b6387c8f837feb050c9cc296f023650f2e6eb596c1cc5e8d8
        • Instruction ID: 3a8e2b0d08d206a2c2a8c224f7c2e252792ce9ae308d7d181c945e985e86443e
        • Opcode Fuzzy Hash: c770085aa06cf17b6387c8f837feb050c9cc296f023650f2e6eb596c1cc5e8d8
        • Instruction Fuzzy Hash: 0B31E522A08F8A41E7298F21964036D7BA0EB58FF8F156371CAAC473F5CE38D455C380
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3273984107.00007FF61BD41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61BD40000, based on PE: true
        • Associated: 00000000.00000002.3273965318.00007FF61BD40000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274021381.00007FF61BD7C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD8F000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD94000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274083951.00007FF61BD95000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff61bd40000_EBAbsk8ydv.jbxd
        Similarity
        • API ID: Path$AppendFileFolderInfoQuerySpecialValueVersion
        • String ID: \Internet Explorer\iexplore.exe
        • API String ID: 3320195616-38705447
        • Opcode ID: 84e7ca486809708aacdf764988d78f65cf761cafb01ba4910b894d15dae9b407
        • Instruction ID: 435147e1c129bb9df43818ddc181319d9d908d4243f6a4ac571d4855159136b5
        • Opcode Fuzzy Hash: 84e7ca486809708aacdf764988d78f65cf761cafb01ba4910b894d15dae9b407
        • Instruction Fuzzy Hash: CD212161A18E4B95EB2C9F21E8547BA63A0FB4CB58F446135D64DC7974DF7CE244C700
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.3273984107.00007FF61BD41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61BD40000, based on PE: true
        • Associated: 00000000.00000002.3273965318.00007FF61BD40000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274021381.00007FF61BD7C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD8F000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD94000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274083951.00007FF61BD95000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff61bd40000_EBAbsk8ydv.jbxd
        Similarity
        • API ID: cvtdate$_errno_get_daylight_invalid_parameter_noinfo_invoke_watson
        • String ID:
        • API String ID: 1447642234-0
        • Opcode ID: a3b1e53b5f70f45bfea4914cdc108dd655034d0a9fcfc8361ab68712039ad71a
        • Instruction ID: 55e07881e5019f642ca8c1d64a02d726acd4ef3de37c8c565dfa046a0d966ee1
        • Opcode Fuzzy Hash: a3b1e53b5f70f45bfea4914cdc108dd655034d0a9fcfc8361ab68712039ad71a
        • Instruction Fuzzy Hash: 00815572D18A56C7D37D8F05A451479FBE5FB98B54F10623AEA8982A74DFBCE4408F00
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.3273984107.00007FF61BD41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61BD40000, based on PE: true
        • Associated: 00000000.00000002.3273965318.00007FF61BD40000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274021381.00007FF61BD7C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD8F000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD94000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274083951.00007FF61BD95000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff61bd40000_EBAbsk8ydv.jbxd
        Similarity
        • API ID: ByteCharLocaleMultiWide$UpdateUpdate::__errno_isleadbyte_l
        • String ID:
        • API String ID: 2998201375-0
        • Opcode ID: 875ca83cb4141ce2e370ac5f9a9d47422609fd01dcb68c20e4be45d132a48f4f
        • Instruction ID: 0e9f2a44d1d35fbb7130c14d41d13576ad0ae3ba4655e2d6e17d72b5946404d1
        • Opcode Fuzzy Hash: 875ca83cb4141ce2e370ac5f9a9d47422609fd01dcb68c20e4be45d132a48f4f
        • Instruction Fuzzy Hash: 9041B932E08B8686E76C8F15A1815797BA1EB48FB8F145235DB4C977B5CF7CD4528700
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.3273984107.00007FF61BD41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61BD40000, based on PE: true
        • Associated: 00000000.00000002.3273965318.00007FF61BD40000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274021381.00007FF61BD7C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD8F000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD94000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274083951.00007FF61BD95000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff61bd40000_EBAbsk8ydv.jbxd
        Similarity
        • API ID: _getptd$_inconsistency$DecodePointer_getptd_noexit
        • String ID:
        • API String ID: 3566995948-0
        • Opcode ID: b1ff322655b69a1476251a369cc291caccd7b7030a3ca704fc697a4b73b927dc
        • Instruction ID: 7347d5210d444f79ac6e73b5a99a9f4294141bb61b4013bc822afc7e36416243
        • Opcode Fuzzy Hash: b1ff322655b69a1476251a369cc291caccd7b7030a3ca704fc697a4b73b927dc
        • Instruction Fuzzy Hash: 2BF08921E09DCA80EA5D6B55D0811FC7361DF4CFA4F0CB331D64D472A7DE68E4908714
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3273984107.00007FF61BD41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61BD40000, based on PE: true
        • Associated: 00000000.00000002.3273965318.00007FF61BD40000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274021381.00007FF61BD7C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD8F000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD94000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274083951.00007FF61BD95000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff61bd40000_EBAbsk8ydv.jbxd
        Similarity
        • API ID: ExceptionThrow_wcsftime_lhtonlstd::exception::exception
        • String ID: invalid string size, tag: %d, size: %u
        • API String ID: 2297430322-3143865162
        • Opcode ID: 1e4bbb424b589b7c4d6a9f69d28644da6729227b79945c1b82c0398d7d9d0045
        • Instruction ID: 4e046fa654d6b8029005a06552bddc50a43fb17afbe51da41d645a5b5422c9e2
        • Opcode Fuzzy Hash: 1e4bbb424b589b7c4d6a9f69d28644da6729227b79945c1b82c0398d7d9d0045
        • Instruction Fuzzy Hash: E141D466F08A4A9AFB1C9BB4D0003EC2771E709F98F402231CE0C97A9ACE78E059D745
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3273984107.00007FF61BD41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61BD40000, based on PE: true
        • Associated: 00000000.00000002.3273965318.00007FF61BD40000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274021381.00007FF61BD7C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD8F000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD94000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274083951.00007FF61BD95000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff61bd40000_EBAbsk8ydv.jbxd
        Similarity
        • API ID: Netbios
        • String ID: 3
        • API String ID: 544444789-1842515611
        • Opcode ID: fc2c6cc1660e2a1a7a068082d65f1229dadc3ebeeb12d96405019ee56709e9e2
        • Instruction ID: a007c4fec5b88bc51deda284aae1fac04619c44c5e889cf2ea214a9f40f59ee5
        • Opcode Fuzzy Hash: fc2c6cc1660e2a1a7a068082d65f1229dadc3ebeeb12d96405019ee56709e9e2
        • Instruction Fuzzy Hash: 5441A126A0DAC54DE7298F7198403ED7B70F759B48F485275DACC83B5ACE2CD206CB10
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3273984107.00007FF61BD41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61BD40000, based on PE: true
        • Associated: 00000000.00000002.3273965318.00007FF61BD40000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274021381.00007FF61BD7C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD8F000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD94000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274083951.00007FF61BD95000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff61bd40000_EBAbsk8ydv.jbxd
        Similarity
        • API ID: BufferEnumFreeTransportWkstaswscanfvscan_fn
        • String ID: %2hx%2hx%2hx%2hx%2hx%2hx
        • API String ID: 2287809651-1625236832
        • Opcode ID: 562012ec4a8d04ffbd1ac61d7800b8f51613bfbd1697ddc3d8399b8b53b45b8e
        • Instruction ID: db937c7d6e48cffa90a4397f0df64232484dce5ae5a3fdc3cf00f463d19adf8b
        • Opcode Fuzzy Hash: 562012ec4a8d04ffbd1ac61d7800b8f51613bfbd1697ddc3d8399b8b53b45b8e
        • Instruction Fuzzy Hash: BF418A66F14E4589FB588F71E4802EC37B4FB08B58B486236DE4DA3B68EE38C542C344
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3273984107.00007FF61BD41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61BD40000, based on PE: true
        • Associated: 00000000.00000002.3273965318.00007FF61BD40000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274021381.00007FF61BD7C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD8F000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD94000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274083951.00007FF61BD95000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff61bd40000_EBAbsk8ydv.jbxd
        Similarity
        • API ID: FolderPathSpecial
        • String ID: \Global.db$\Tencent\DeskUpdate$\Tencent\Desktop
        • API String ID: 994120019-3757207327
        • Opcode ID: ef9c67a7b736c5df7e5daa3a7a868a4ff0da9a40d72e9e1e0b6a8c9ecd359c25
        • Instruction ID: 58d2a41cdd9488d382556c3c4dcaa2faddb738e4367caa1046cedbc696e4eb76
        • Opcode Fuzzy Hash: ef9c67a7b736c5df7e5daa3a7a868a4ff0da9a40d72e9e1e0b6a8c9ecd359c25
        • Instruction Fuzzy Hash: 1431B432E18F8A81EA289F25E4517A92760FB49BB4F402330D96D87AF5DF3DE045C704
        APIs
        • GetCurrentThreadId.KERNEL32 ref: 00007FF61BD4255D
          • Part of subcall function 00007FF61BD4F3D0: GetModuleHandleA.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,?,?,00007FF61BD4257F), ref: 00007FF61BD4F402
          • Part of subcall function 00007FF61BD4F4D8: OpenProcess.KERNEL32(?,?,?,00007FF61BD425AB), ref: 00007FF61BD4F4FB
          • Part of subcall function 00007FF61BD4F4D8: GetLastError.KERNEL32(?,?,?,00007FF61BD425AB), ref: 00007FF61BD4F50B
          • Part of subcall function 00007FF61BD4F4D8: OpenProcess.KERNEL32(?,?,?,00007FF61BD425AB), ref: 00007FF61BD4F520
        • PathFindFileNameW.SHLWAPI ref: 00007FF61BD425B0
        • PathFindFileNameW.SHLWAPI ref: 00007FF61BD425DA
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3273984107.00007FF61BD41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61BD40000, based on PE: true
        • Associated: 00000000.00000002.3273965318.00007FF61BD40000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274021381.00007FF61BD7C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD8F000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD94000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274083951.00007FF61BD95000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff61bd40000_EBAbsk8ydv.jbxd
        Similarity
        • API ID: FileFindNameOpenPathProcess$CurrentErrorHandleLastModuleThread
        • String ID: !!!pid=%d through (tid=%d), name=%ws(%ws)
        • API String ID: 4126646617-725543756
        • Opcode ID: d9a42e5648462b841738da11a7d38eaa4930a2defaf0a3aad7186ab1921fdfb4
        • Instruction ID: d20d2271fa0d6d579d9928cd5c3d730338a549b3fa7a810669d726bd277b5b4d
        • Opcode Fuzzy Hash: d9a42e5648462b841738da11a7d38eaa4930a2defaf0a3aad7186ab1921fdfb4
        • Instruction Fuzzy Hash: BF31AA22E28E8691EA6CDF11E4445AA7361FB8CB60F416331DA5E83AB5DF3CE545C740
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3273984107.00007FF61BD41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61BD40000, based on PE: true
        • Associated: 00000000.00000002.3273965318.00007FF61BD40000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274021381.00007FF61BD7C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD8F000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD94000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274083951.00007FF61BD95000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff61bd40000_EBAbsk8ydv.jbxd
        Similarity
        • API ID: CloseCreateValue
        • String ID: Software\Tencent\QQBrowser\QBroker
        • API String ID: 1818849710-661104360
        • Opcode ID: c339afa961175439d270a1f878aef2dd04e9f67a5ceaaee9c33060fd387883c7
        • Instruction ID: 8120bba051a0505b7f691cd0c497214e19f2fa330e458b5a65b9e7e08500208e
        • Opcode Fuzzy Hash: c339afa961175439d270a1f878aef2dd04e9f67a5ceaaee9c33060fd387883c7
        • Instruction Fuzzy Hash: 67218632A18E8586EB188F10F4553AAB3A4FB8CBACF542235D68D47A74CF7CD144CB00
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3273984107.00007FF61BD41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61BD40000, based on PE: true
        • Associated: 00000000.00000002.3273965318.00007FF61BD40000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274021381.00007FF61BD7C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD8F000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD94000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274083951.00007FF61BD95000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff61bd40000_EBAbsk8ydv.jbxd
        Similarity
        • API ID: Path$AppendExistsFileFolderSpecial
        • String ID: \Internet Explorer\iexplore.exe
        • API String ID: 2859893649-38705447
        • Opcode ID: 04ff5b0c2f70b85f27fe75ce75b636d5ad538f00c212532b620ced39efe5c13e
        • Instruction ID: 905f49b756e145a4454d4c2e30377325e03fe02c1a03e9b3671d4637f30d0b27
        • Opcode Fuzzy Hash: 04ff5b0c2f70b85f27fe75ce75b636d5ad538f00c212532b620ced39efe5c13e
        • Instruction Fuzzy Hash: 82114521E08A8A51EE389B61E4553BA6360FB9CB68F942335D6AD879F4DF6CD205C700
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3273984107.00007FF61BD41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61BD40000, based on PE: true
        • Associated: 00000000.00000002.3273965318.00007FF61BD40000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274021381.00007FF61BD7C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD8F000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD94000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274083951.00007FF61BD95000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff61bd40000_EBAbsk8ydv.jbxd
        Similarity
        • API ID: _getptd$_inconsistency$DestructExceptionObject
        • String ID: csm
        • API String ID: 2821275340-1018135373
        • Opcode ID: 54738449fae25136525e3d73a4cde9389fcf728a346489a781f55c28ab9eb91b
        • Instruction ID: 13bb0da2b38b7e1080da38cbd1ef14a4d2c0c0d7df325d73347a1f3e1ac63d3f
        • Opcode Fuzzy Hash: 54738449fae25136525e3d73a4cde9389fcf728a346489a781f55c28ab9eb91b
        • Instruction Fuzzy Hash: C4018422D05A8A85D76C9F2184E12FE3360EB4CF68F086231DE4DCA35ACE68D8808B41
        APIs
        • _callnewh.LIBCMT ref: 00007FF61BD5F666
        • malloc.LIBCMT ref: 00007FF61BD5F672
          • Part of subcall function 00007FF61BD5F3A8: _FF_MSGBANNER.LIBCMT ref: 00007FF61BD5F3D8
          • Part of subcall function 00007FF61BD5F3A8: _NMSG_WRITE.LIBCMT ref: 00007FF61BD5F3E2
          • Part of subcall function 00007FF61BD5F3A8: HeapAlloc.KERNEL32(?,?,?,00007FF61BD633D0,?,?,?,00007FF61BD6DBE4,?,?,?,00007FF61BD6DAE3,?,?,?,00007FF61BD5F4C5), ref: 00007FF61BD5F3FD
          • Part of subcall function 00007FF61BD5F3A8: _callnewh.LIBCMT ref: 00007FF61BD5F416
          • Part of subcall function 00007FF61BD5F3A8: _errno.LIBCMT ref: 00007FF61BD5F421
          • Part of subcall function 00007FF61BD5F3A8: _errno.LIBCMT ref: 00007FF61BD5F42C
        • _CxxThrowException.LIBCMT ref: 00007FF61BD5F6BB
          • Part of subcall function 00007FF61BD606E8: RtlPcToFileHeader.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FF61BD5ECA1), ref: 00007FF61BD60756
          • Part of subcall function 00007FF61BD606E8: RaiseException.KERNEL32(?,?,?,?,?,?,?,?,?,?,?,00007FF61BD5ECA1), ref: 00007FF61BD60795
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3273984107.00007FF61BD41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61BD40000, based on PE: true
        • Associated: 00000000.00000002.3273965318.00007FF61BD40000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274021381.00007FF61BD7C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD8F000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD94000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274083951.00007FF61BD95000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff61bd40000_EBAbsk8ydv.jbxd
        Similarity
        • API ID: Exception_callnewh_errno$AllocFileHeaderHeapRaiseThrowmalloc
        • String ID: bad allocation
        • API String ID: 1214304046-2104205924
        • Opcode ID: b81a1a26c0a4adbc31c3fa8f9502520f94a1c5b7c375de76df4e8ba8216c7643
        • Instruction ID: 17f84d39e71c9929998a10d98e6cd37b182fbf3e85931b60f8c7bca1820a2de3
        • Opcode Fuzzy Hash: b81a1a26c0a4adbc31c3fa8f9502520f94a1c5b7c375de76df4e8ba8216c7643
        • Instruction Fuzzy Hash: B1F09651E09F4F41EE2CA740A4404B56364FF8DB68F442235DA8D8B7B5EE7CE244CB00
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.3273984107.00007FF61BD41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61BD40000, based on PE: true
        • Associated: 00000000.00000002.3273965318.00007FF61BD40000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274021381.00007FF61BD7C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD8F000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD94000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274083951.00007FF61BD95000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff61bd40000_EBAbsk8ydv.jbxd
        Similarity
        • API ID: strcspn$Mpunctlocaleconv
        • String ID:
        • API String ID: 2882554788-0
        • Opcode ID: 053ecaac9354419ddf1ac585ae6d1347d06da948ae916d9b4f2870e79173457f
        • Instruction ID: b283a39fef09e162d398b14b55167f8ffd925fc0616d4ad671c01327d3a93523
        • Opcode Fuzzy Hash: 053ecaac9354419ddf1ac585ae6d1347d06da948ae916d9b4f2870e79173457f
        • Instruction Fuzzy Hash: 8DD18C22F09F8989EB088FB5D0406EC2771FB49B98F546225DE8DA7B5ADF38D046C744
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.3273984107.00007FF61BD41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61BD40000, based on PE: true
        • Associated: 00000000.00000002.3273965318.00007FF61BD40000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274021381.00007FF61BD7C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD8F000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD94000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274083951.00007FF61BD95000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff61bd40000_EBAbsk8ydv.jbxd
        Similarity
        • API ID: isprintisspace
        • String ID:
        • API String ID: 2609633722-0
        • Opcode ID: cb33ea4c5fb831a7523e1f192c435978392835876fc21bf0941de0629dea0196
        • Instruction ID: 5d2c0ebba01b9f4819db729ec12f29b61a36e656d57841f1c9b198f778970bca
        • Opcode Fuzzy Hash: cb33ea4c5fb831a7523e1f192c435978392835876fc21bf0941de0629dea0196
        • Instruction Fuzzy Hash: BA412462E0CEDE45F72E8E79459477D6EA0DB19FA0F086270CF89866B2DD3CA442C314
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.3273984107.00007FF61BD41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61BD40000, based on PE: true
        • Associated: 00000000.00000002.3273965318.00007FF61BD40000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274021381.00007FF61BD7C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD8F000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD94000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274083951.00007FF61BD95000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff61bd40000_EBAbsk8ydv.jbxd
        Similarity
        • API ID: File$Create$CloseFolderHandlePathSpecialWrite
        • String ID:
        • API String ID: 261467261-0
        • Opcode ID: 87a36924370a38567c8f29f943b8af8cacfb3f5e16a5e2e4da282d07ff7eaf9b
        • Instruction ID: 85bdd9b4473198ea5bcc8c35038a326e2e4a530c59835708793f1bd74cefac1e
        • Opcode Fuzzy Hash: 87a36924370a38567c8f29f943b8af8cacfb3f5e16a5e2e4da282d07ff7eaf9b
        • Instruction Fuzzy Hash: BE319D32B04A859AE7189F25E4546AC7361FB88BB8F405335EA6D83BE8CF38D5158704
        APIs
        Memory Dump Source
        • Source File: 00000000.00000002.3273984107.00007FF61BD41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61BD40000, based on PE: true
        • Associated: 00000000.00000002.3273965318.00007FF61BD40000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274021381.00007FF61BD7C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD8F000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD94000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274083951.00007FF61BD95000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff61bd40000_EBAbsk8ydv.jbxd
        Similarity
        • API ID: Locale$UpdateUpdate::___updatetlocinfo__updatetmbcinfo_errno_getptd_getptd_noexit_invalid_parameter_noinfostrchr
        • String ID:
        • API String ID: 4151157258-0
        • Opcode ID: 9f204ea91d6198c4a82ef353745b2060fa986f5a3426e358ba194c17e780f943
        • Instruction ID: dd85ec66613a9390e226add04527df92c157731aea455e5235c1a7adc7f009fe
        • Opcode Fuzzy Hash: 9f204ea91d6198c4a82ef353745b2060fa986f5a3426e358ba194c17e780f943
        • Instruction Fuzzy Hash: 9221F953E1CAAAA1EB6C5625D0D01BD67D0EB88FF8F186331E68E876E5CD6CD4418700
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3273984107.00007FF61BD41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61BD40000, based on PE: true
        • Associated: 00000000.00000002.3273965318.00007FF61BD40000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274021381.00007FF61BD7C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD8F000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD94000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274083951.00007FF61BD95000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff61bd40000_EBAbsk8ydv.jbxd
        Similarity
        • API ID: Close$HandleXbad_allocstd::_
        • String ID: string too long
        • API String ID: 3601596506-2556327735
        • Opcode ID: 372d5d49983c13a36cddd18aa35a4e4ff7c67db2dcde71bf080ae64639e4d0e4
        • Instruction ID: 738ea8755562b3bd11335e27ebc6ab14fa5c25afdacefde193aa99608d9bec52
        • Opcode Fuzzy Hash: 372d5d49983c13a36cddd18aa35a4e4ff7c67db2dcde71bf080ae64639e4d0e4
        • Instruction Fuzzy Hash: 8C315222E19E0981EA1C4B15D4442382374EB48FB5F686335DA2D97BF4DF7CE5528388
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3273984107.00007FF61BD41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61BD40000, based on PE: true
        • Associated: 00000000.00000002.3273965318.00007FF61BD40000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274021381.00007FF61BD7C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD8F000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD94000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274083951.00007FF61BD95000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff61bd40000_EBAbsk8ydv.jbxd
        Similarity
        • API ID: _snwprintf_s_vsnprintf_s_l
        • String ID: ExecWB$cmdID=0x%0x
        • API String ID: 2495276089-1305857435
        • Opcode ID: d2504834d054f49e557b6adf1fcb99767156465117bdd46e3a5108ef1bc64949
        • Instruction ID: 7d25f112c3f1fd3ab34ab7ccdfa0be25137b24f6dff90cac7664d1f15d11cd24
        • Opcode Fuzzy Hash: d2504834d054f49e557b6adf1fcb99767156465117bdd46e3a5108ef1bc64949
        • Instruction Fuzzy Hash: 92419222E08B8A86F718DB65E4403ED7761FB88768F501235DA8D47AAACF7CD145CB40
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3273984107.00007FF61BD41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61BD40000, based on PE: true
        • Associated: 00000000.00000002.3273965318.00007FF61BD40000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274021381.00007FF61BD7C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD8F000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD94000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274083951.00007FF61BD95000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff61bd40000_EBAbsk8ydv.jbxd
        Similarity
        • API ID: Thread$CurrentMessagePost
        • String ID: Quit
        • API String ID: 3590184027-3818420395
        • Opcode ID: c5d0bb174f7255261121061f4f28705b061de229dd0f39cf965b494ab33ca0ef
        • Instruction ID: 4c683b2426006691ecaaf2f6d4eca391abd90b75826b27005acf3bfae92505f3
        • Opcode Fuzzy Hash: c5d0bb174f7255261121061f4f28705b061de229dd0f39cf965b494ab33ca0ef
        • Instruction Fuzzy Hash: 6D315932A18A459AFB18DF30E4443ED33A4EB48B5CF806635EA4D87EAACF38D114C750
        APIs
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.3273984107.00007FF61BD41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF61BD40000, based on PE: true
        • Associated: 00000000.00000002.3273965318.00007FF61BD40000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274021381.00007FF61BD7C000.00000002.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD8F000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274044925.00007FF61BD94000.00000004.00000001.01000000.00000003.sdmpDownload File
        • Associated: 00000000.00000002.3274083951.00007FF61BD95000.00000002.00000001.01000000.00000003.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_7ff61bd40000_EBAbsk8ydv.jbxd
        Similarity
        • API ID: CloseQueryValue
        • String ID: Software\Tencent\QQBrowser\QBroker
        • API String ID: 3356406503-661104360
        • Opcode ID: c2fdb8d571b8b3e4283bdc6ab94a3081b84b2d7644d909ec7713784ee6c357a3
        • Instruction ID: fb70411e909e93a7a1eb39682fede61d0121370b599c6dd292e525c4c883dafa
        • Opcode Fuzzy Hash: c2fdb8d571b8b3e4283bdc6ab94a3081b84b2d7644d909ec7713784ee6c357a3
        • Instruction Fuzzy Hash: E0315632E14E1989FB189B7098492ED33B4FB0CBA8F445636CE0D93A68DF38D148C794