Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
2PSj0qX4W6.exe

Overview

General Information

Sample name:2PSj0qX4W6.exe
renamed because original name is a hash value
Original sample name:31a89af6712da7bd56b1033952468302bd0838d48c6712c5499c60178f4d95a3.exe
Analysis ID:1508524
MD5:c92c541048de8be340a990db10e7cbab
SHA1:50f7ef4239b9fd0358b10a8b3106871e2de1fd29
SHA256:31a89af6712da7bd56b1033952468302bd0838d48c6712c5499c60178f4d95a3
Tags:116-198-231-169exe
Infos:

Detection

CobaltStrike, Metasploit
Score:96
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected CobaltStrike
Yara detected Metasploit Payload
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
AV process strings found (often used to terminate AV products)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
One or more processes crash
Suricata IDS alerts with low severity for network traffic
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • 2PSj0qX4W6.exe (PID: 6640 cmdline: "C:\Users\user\Desktop\2PSj0qX4W6.exe" MD5: C92C541048DE8BE340A990DB10E7CBAB)
    • WerFault.exe (PID: 2504 cmdline: C:\Windows\system32\WerFault.exe -u -p 6640 -s 1108 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Cobalt Strike, CobaltStrikeCobalt Strike is a paid penetration testing product that allows an attacker to deploy an agent named 'Beacon' on the victim machine. Beacon includes a wealth of functionality to the attacker, including, but not limited to command execution, key logging, file transfer, SOCKS proxying, privilege escalation, mimikatz, port scanning and lateral movement. Beacon is in-memory/file-less, in that it consists of stageless or multi-stage shellcode that once loaded by exploiting a vulnerability or executing a shellcode loader, will reflectively load itself into the memory of a process without touching the disk. It supports C2 and staging over HTTP, HTTPS, DNS, SMB named pipes as well as forward and reverse TCP; Beacons can be daisy-chained. Cobalt Strike comes with a toolkit for developing shellcode loaders, called Artifact Kit.The Beacon implant has become popular amongst targeted attackers and criminal users as it is well written, stable, and highly customizable.
  • APT 29
  • APT32
  • APT41
  • AQUATIC PANDA
  • Anunak
  • Cobalt
  • Codoso
  • CopyKittens
  • DarkHydrus
  • FIN6
  • FIN7
  • Leviathan
  • Mustang Panda
  • Shell Crew
  • Stone Panda
  • TianWu
  • UNC1878
  • UNC2452
  • Winnti Umbrella
https://malpedia.caad.fkie.fraunhofer.de/details/win.cobalt_strike
{"C2Server": "http://116.198.231.169:63222/jquery-3.3.2.slim.min.js", "User Agent": "User-Agent: Mozilla/5.0 (Windows NT 6.3; Trident/7.0; rv:11.0) like Gecko\r\n"}
{"Headers": "Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8\r\nAccept-Language: en-US,en;q=0.5\r\nReferer: http://code.jquery.com/\r\nAccept-Encoding: gzip, deflate\r\nUser-Agent: Mozilla/5.0 (Windows NT 6.3; Trident/7.0; rv:11.0) like Gecko\r\n", "Type": "Metasploit Download", "URL": "http://116.198.231.169/jquery-3.3.2.slim.min.js"}
SourceRuleDescriptionAuthorStrings
C:\ProgramData\Microsoft\Windows\WER\Temp\WERDD67.tmp.dmpWindows_Trojan_Metasploit_7bc0f998Identifies the API address lookup function leverage by metasploit shellcodeunknown
  • 0x1d171:$a1: 48 31 D2 65 48 8B 52 60 48 8B 52 18 48 8B 52 20 48 8B 72 50 48 0F B7 4A 4A 4D 31 C9 48 31 C0 AC 3C 61
C:\ProgramData\Microsoft\Windows\WER\Temp\WERDD67.tmp.dmpWindows_Trojan_Metasploit_c9773203Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families.unknown
  • 0x1d1dd:$a: 48 31 C0 AC 41 C1 C9 0D 41 01 C1 38 E0 75 F1 4C 03 4C 24 08 45 39 D1
SourceRuleDescriptionAuthorStrings
00000000.00000002.2277720966.0000009C38F0E000.00000040.00000010.00020000.00000000.sdmpJoeSecurity_MetasploitPayload_3Yara detected Metasploit PayloadJoe Security
    00000000.00000002.2277720966.0000009C38F0E000.00000040.00000010.00020000.00000000.sdmpJoeSecurity_CobaltStrike_3Yara detected CobaltStrikeJoe Security
      00000000.00000002.2277720966.0000009C38F0E000.00000040.00000010.00020000.00000000.sdmpWindows_Trojan_Metasploit_7bc0f998Identifies the API address lookup function leverage by metasploit shellcodeunknown
      • 0x911:$a1: 48 31 D2 65 48 8B 52 60 48 8B 52 18 48 8B 52 20 48 8B 72 50 48 0F B7 4A 4A 4D 31 C9 48 31 C0 AC 3C 61
      00000000.00000002.2277720966.0000009C38F0E000.00000040.00000010.00020000.00000000.sdmpWindows_Trojan_Metasploit_c9773203Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families.unknown
      • 0x97d:$a: 48 31 C0 AC 41 C1 C9 0D 41 01 C1 38 E0 75 F1 4C 03 4C 24 08 45 39 D1
      No Sigma rule has matched
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-09-10T10:55:04.118942+020020287653Unknown Traffic192.168.2.449730116.198.231.16963222TCP
      2024-09-10T10:55:09.022682+020020287653Unknown Traffic192.168.2.449733116.198.231.16963222TCP
      2024-09-10T10:55:15.914160+020020287653Unknown Traffic192.168.2.449736116.198.231.16963222TCP
      2024-09-10T10:55:20.852983+020020287653Unknown Traffic192.168.2.449739116.198.231.16963222TCP
      2024-09-10T10:55:25.054384+020020287653Unknown Traffic192.168.2.449748116.198.231.16963222TCP
      2024-09-10T10:55:29.321752+020020287653Unknown Traffic192.168.2.449751116.198.231.16963222TCP
      2024-09-10T10:55:33.512668+020020287653Unknown Traffic192.168.2.449754116.198.231.16963222TCP
      2024-09-10T10:55:37.898702+020020287653Unknown Traffic192.168.2.449757116.198.231.16963222TCP
      2024-09-10T10:55:42.111525+020020287653Unknown Traffic192.168.2.449760116.198.231.16963222TCP
      2024-09-10T10:55:46.314350+020020287653Unknown Traffic192.168.2.449763116.198.231.16963222TCP

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: 2PSj0qX4W6.exeAvira: detected
      Source: 00000000.00000002.2277720966.0000009C38F0E000.00000040.00000010.00020000.00000000.sdmpMalware Configuration Extractor: CobaltStrike {"C2Server": "http://116.198.231.169:63222/jquery-3.3.2.slim.min.js", "User Agent": "User-Agent: Mozilla/5.0 (Windows NT 6.3; Trident/7.0; rv:11.0) like Gecko\r\n"}
      Source: 00000000.00000002.2277720966.0000009C38F0E000.00000040.00000010.00020000.00000000.sdmpMalware Configuration Extractor: Metasploit {"Headers": "Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8\r\nAccept-Language: en-US,en;q=0.5\r\nReferer: http://code.jquery.com/\r\nAccept-Encoding: gzip, deflate\r\nUser-Agent: Mozilla/5.0 (Windows NT 6.3; Trident/7.0; rv:11.0) like Gecko\r\n", "Type": "Metasploit Download", "URL": "http://116.198.231.169/jquery-3.3.2.slim.min.js"}
      Source: 2PSj0qX4W6.exeReversingLabs: Detection: 50%
      Source: 2PSj0qX4W6.exeVirustotal: Detection: 43%Perma Link
      Source: Submited SampleIntegrated Neural Analysis Model: Matched 98.6% probability
      Source: 2PSj0qX4W6.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
      Source: Binary string: \ConsoleApplication3\x64\Release\ConsoleApplication3.pdb source: 2PSj0qX4W6.exe
      Source: Binary string: \ConsoleApplication3\x64\Release\ConsoleApplication3.pdb(( source: 2PSj0qX4W6.exe

      Networking

      barindex
      Source: Malware configuration extractorURLs: http://116.198.231.169:63222/jquery-3.3.2.slim.min.js
      Source: Malware configuration extractorURLs: http://116.198.231.169/jquery-3.3.2.slim.min.js
      Source: global trafficTCP traffic: 192.168.2.4:49730 -> 116.198.231.169:63222
      Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:49739 -> 116.198.231.169:63222
      Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:49760 -> 116.198.231.169:63222
      Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:49736 -> 116.198.231.169:63222
      Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:49733 -> 116.198.231.169:63222
      Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:49748 -> 116.198.231.169:63222
      Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:49754 -> 116.198.231.169:63222
      Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:49763 -> 116.198.231.169:63222
      Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:49730 -> 116.198.231.169:63222
      Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:49757 -> 116.198.231.169:63222
      Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.4:49751 -> 116.198.231.169:63222
      Source: unknownTCP traffic detected without corresponding DNS query: 116.198.231.169
      Source: unknownTCP traffic detected without corresponding DNS query: 116.198.231.169
      Source: unknownTCP traffic detected without corresponding DNS query: 116.198.231.169
      Source: unknownTCP traffic detected without corresponding DNS query: 116.198.231.169
      Source: unknownTCP traffic detected without corresponding DNS query: 116.198.231.169
      Source: unknownTCP traffic detected without corresponding DNS query: 116.198.231.169
      Source: unknownTCP traffic detected without corresponding DNS query: 116.198.231.169
      Source: unknownTCP traffic detected without corresponding DNS query: 116.198.231.169
      Source: unknownTCP traffic detected without corresponding DNS query: 116.198.231.169
      Source: unknownTCP traffic detected without corresponding DNS query: 116.198.231.169
      Source: unknownTCP traffic detected without corresponding DNS query: 116.198.231.169
      Source: unknownTCP traffic detected without corresponding DNS query: 116.198.231.169
      Source: unknownTCP traffic detected without corresponding DNS query: 116.198.231.169
      Source: unknownTCP traffic detected without corresponding DNS query: 116.198.231.169
      Source: unknownTCP traffic detected without corresponding DNS query: 116.198.231.169
      Source: unknownTCP traffic detected without corresponding DNS query: 116.198.231.169
      Source: unknownTCP traffic detected without corresponding DNS query: 116.198.231.169
      Source: unknownTCP traffic detected without corresponding DNS query: 116.198.231.169
      Source: unknownTCP traffic detected without corresponding DNS query: 116.198.231.169
      Source: unknownTCP traffic detected without corresponding DNS query: 116.198.231.169
      Source: unknownTCP traffic detected without corresponding DNS query: 116.198.231.169
      Source: unknownTCP traffic detected without corresponding DNS query: 116.198.231.169
      Source: unknownTCP traffic detected without corresponding DNS query: 116.198.231.169
      Source: unknownTCP traffic detected without corresponding DNS query: 116.198.231.169
      Source: unknownTCP traffic detected without corresponding DNS query: 116.198.231.169
      Source: unknownTCP traffic detected without corresponding DNS query: 116.198.231.169
      Source: unknownTCP traffic detected without corresponding DNS query: 116.198.231.169
      Source: unknownTCP traffic detected without corresponding DNS query: 116.198.231.169
      Source: unknownTCP traffic detected without corresponding DNS query: 116.198.231.169
      Source: unknownTCP traffic detected without corresponding DNS query: 116.198.231.169
      Source: unknownTCP traffic detected without corresponding DNS query: 116.198.231.169
      Source: unknownTCP traffic detected without corresponding DNS query: 116.198.231.169
      Source: unknownTCP traffic detected without corresponding DNS query: 116.198.231.169
      Source: unknownTCP traffic detected without corresponding DNS query: 116.198.231.169
      Source: unknownTCP traffic detected without corresponding DNS query: 116.198.231.169
      Source: unknownTCP traffic detected without corresponding DNS query: 116.198.231.169
      Source: unknownTCP traffic detected without corresponding DNS query: 116.198.231.169
      Source: unknownTCP traffic detected without corresponding DNS query: 116.198.231.169
      Source: unknownTCP traffic detected without corresponding DNS query: 116.198.231.169
      Source: unknownTCP traffic detected without corresponding DNS query: 116.198.231.169
      Source: unknownTCP traffic detected without corresponding DNS query: 116.198.231.169
      Source: unknownTCP traffic detected without corresponding DNS query: 116.198.231.169
      Source: unknownTCP traffic detected without corresponding DNS query: 116.198.231.169
      Source: unknownTCP traffic detected without corresponding DNS query: 116.198.231.169
      Source: unknownTCP traffic detected without corresponding DNS query: 116.198.231.169
      Source: unknownTCP traffic detected without corresponding DNS query: 116.198.231.169
      Source: unknownTCP traffic detected without corresponding DNS query: 116.198.231.169
      Source: unknownTCP traffic detected without corresponding DNS query: 116.198.231.169
      Source: unknownTCP traffic detected without corresponding DNS query: 116.198.231.169
      Source: unknownTCP traffic detected without corresponding DNS query: 116.198.231.169
      Source: 2PSj0qX4W6.exe, 2PSj0qX4W6.exe, 00000000.00000003.2160064724.000001F973602000.00000004.00000020.00020000.00000000.sdmp, 2PSj0qX4W6.exe, 00000000.00000002.2278159144.000001F9735BB000.00000004.00000020.00020000.00000000.sdmp, 2PSj0qX4W6.exe, 00000000.00000002.2277720966.0000009C38F0E000.00000040.00000010.00020000.00000000.sdmp, 2PSj0qX4W6.exe, 00000000.00000003.2119298442.000001F973602000.00000004.00000020.00020000.00000000.sdmp, 2PSj0qX4W6.exe, 00000000.00000003.2055318318.000001F973602000.00000004.00000020.00020000.00000000.sdmp, 2PSj0qX4W6.exe, 00000000.00000003.2139474328.000001F973602000.00000004.00000020.00020000.00000000.sdmp, 2PSj0qX4W6.exe, 00000000.00000003.2076583946.000001F973602000.00000004.00000020.00020000.00000000.sdmp, 2PSj0qX4W6.exe, 00000000.00000003.2097445402.000001F973602000.00000004.00000020.00020000.00000000.sdmp, 2PSj0qX4W6.exe, 00000000.00000002.2278159144.000001F973602000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://code.jquery.com/
      Source: 2PSj0qX4W6.exe, 00000000.00000003.2033252187.000001F973602000.00000004.00000020.00020000.00000000.sdmp, 2PSj0qX4W6.exe, 00000000.00000003.2011457982.000001F973602000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://code.jquery.com/Es
      Source: 2PSj0qX4W6.exe, 00000000.00000002.2278159144.000001F9735BB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://code.jquery.com/MW
      Source: 2PSj0qX4W6.exe, 00000000.00000002.2278159144.000001F9735BB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://code.jquery.com/Z
      Source: 2PSj0qX4W6.exe, 00000000.00000003.2160064724.000001F973602000.00000004.00000020.00020000.00000000.sdmp, 2PSj0qX4W6.exe, 00000000.00000003.2119298442.000001F973602000.00000004.00000020.00020000.00000000.sdmp, 2PSj0qX4W6.exe, 00000000.00000003.2139474328.000001F973602000.00000004.00000020.00020000.00000000.sdmp, 2PSj0qX4W6.exe, 00000000.00000003.2097445402.000001F973602000.00000004.00000020.00020000.00000000.sdmp, 2PSj0qX4W6.exe, 00000000.00000002.2278159144.000001F973602000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://code.jquery.com/ru
      Source: 2PSj0qX4W6.exe, 00000000.00000003.2119298442.000001F973602000.00000004.00000020.00020000.00000000.sdmp, 2PSj0qX4W6.exe, 00000000.00000003.2097445402.000001F973602000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://code.jquery.com/wx
      Source: Amcache.hve.6.drString found in binary or memory: http://upx.sf.net
      Source: 2PSj0qX4W6.exe, 00000000.00000002.2278159144.000001F9735F2000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://116.198.231.169/
      Source: 2PSj0qX4W6.exe, 00000000.00000002.2278159144.000001F9735CB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://116.198.231.169:63222/
      Source: 2PSj0qX4W6.exe, 00000000.00000002.2278159144.000001F9735CB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://116.198.231.169:63222/4h
      Source: 2PSj0qX4W6.exe, 00000000.00000002.2278159144.000001F9735CB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://116.198.231.169:63222/SkX
      Source: 2PSj0qX4W6.exe, 00000000.00000002.2278159144.000001F9735CB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://116.198.231.169:63222/dllC
      Source: 2PSj0qX4W6.exe, 00000000.00000002.2278159144.000001F9735CB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://116.198.231.169:63222/jquery-3.3.2.slim.min.js
      Source: 2PSj0qX4W6.exe, 00000000.00000002.2278159144.000001F9735BB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://116.198.231.169:63222/jquery-3.3.2.slim.min.js9u
      Source: 2PSj0qX4W6.exe, 00000000.00000002.2278159144.000001F9735CB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://116.198.231.169:63222/jquery-3.3.2.slim.min.jsRe
      Source: 2PSj0qX4W6.exe, 00000000.00000002.2278159144.000001F9735CB000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://116.198.231.169:63222/jquery-3.3.2.slim.min.jsje

      System Summary

      barindex
      Source: 00000000.00000002.2277720966.0000009C38F0E000.00000040.00000010.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies the API address lookup function leverage by metasploit shellcode Author: unknown
      Source: 00000000.00000002.2277720966.0000009C38F0E000.00000040.00000010.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families. Author: unknown
      Source: C:\ProgramData\Microsoft\Windows\WER\Temp\WERDD67.tmp.dmp, type: DROPPEDMatched rule: Identifies the API address lookup function leverage by metasploit shellcode Author: unknown
      Source: C:\ProgramData\Microsoft\Windows\WER\Temp\WERDD67.tmp.dmp, type: DROPPEDMatched rule: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families. Author: unknown
      Source: C:\Users\user\Desktop\2PSj0qX4W6.exeCode function: 0_2_00007FF628B417B00_2_00007FF628B417B0
      Source: C:\Users\user\Desktop\2PSj0qX4W6.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 6640 -s 1108
      Source: 00000000.00000002.2277720966.0000009C38F0E000.00000040.00000010.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_7bc0f998 os = windows, severity = x86, description = Identifies the API address lookup function leverage by metasploit shellcode, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = fdb5c665503f07b2fc1ed7e4e688295e1222a500bfb68418661db60c8e75e835, id = 7bc0f998-7014-4883-8a56-d5ee00c15aed, last_modified = 2021-08-23
      Source: 00000000.00000002.2277720966.0000009C38F0E000.00000040.00000010.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_c9773203 os = windows, severity = x86, description = Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., creation_date = 2021-04-07, scan_context = file, memory, reference = https://github.com/rapid7/metasploit-framework/blob/04e8752b9b74cbaad7cb0ea6129c90e3172580a2/external/source/shellcode/windows/x64/src/block/block_api.asm, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = afde93eeb14b4d0c182f475a22430f101394938868741ffa06445e478b6ece36, id = c9773203-6d1e-4246-a1e0-314217e0207a, last_modified = 2021-08-23
      Source: C:\ProgramData\Microsoft\Windows\WER\Temp\WERDD67.tmp.dmp, type: DROPPEDMatched rule: Windows_Trojan_Metasploit_7bc0f998 os = windows, severity = x86, description = Identifies the API address lookup function leverage by metasploit shellcode, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = fdb5c665503f07b2fc1ed7e4e688295e1222a500bfb68418661db60c8e75e835, id = 7bc0f998-7014-4883-8a56-d5ee00c15aed, last_modified = 2021-08-23
      Source: C:\ProgramData\Microsoft\Windows\WER\Temp\WERDD67.tmp.dmp, type: DROPPEDMatched rule: Windows_Trojan_Metasploit_c9773203 os = windows, severity = x86, description = Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., creation_date = 2021-04-07, scan_context = file, memory, reference = https://github.com/rapid7/metasploit-framework/blob/04e8752b9b74cbaad7cb0ea6129c90e3172580a2/external/source/shellcode/windows/x64/src/block/block_api.asm, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = afde93eeb14b4d0c182f475a22430f101394938868741ffa06445e478b6ece36, id = c9773203-6d1e-4246-a1e0-314217e0207a, last_modified = 2021-08-23
      Source: classification engineClassification label: mal96.troj.winEXE@2/5@0/1
      Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess6640
      Source: C:\Windows\System32\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\a9482d5d-3bb9-458e-a6e7-6eabe5e41af8Jump to behavior
      Source: 2PSj0qX4W6.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\2PSj0qX4W6.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: 2PSj0qX4W6.exeReversingLabs: Detection: 50%
      Source: 2PSj0qX4W6.exeVirustotal: Detection: 43%
      Source: unknownProcess created: C:\Users\user\Desktop\2PSj0qX4W6.exe "C:\Users\user\Desktop\2PSj0qX4W6.exe"
      Source: C:\Users\user\Desktop\2PSj0qX4W6.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 6640 -s 1108
      Source: C:\Users\user\Desktop\2PSj0qX4W6.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\Desktop\2PSj0qX4W6.exeSection loaded: msvcp140.dllJump to behavior
      Source: C:\Users\user\Desktop\2PSj0qX4W6.exeSection loaded: vcruntime140_1.dllJump to behavior
      Source: C:\Users\user\Desktop\2PSj0qX4W6.exeSection loaded: vcruntime140.dllJump to behavior
      Source: C:\Users\user\Desktop\2PSj0qX4W6.exeSection loaded: wininet.dllJump to behavior
      Source: C:\Users\user\Desktop\2PSj0qX4W6.exeSection loaded: iertutil.dllJump to behavior
      Source: C:\Users\user\Desktop\2PSj0qX4W6.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Users\user\Desktop\2PSj0qX4W6.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\Desktop\2PSj0qX4W6.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\Desktop\2PSj0qX4W6.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Users\user\Desktop\2PSj0qX4W6.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\Desktop\2PSj0qX4W6.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Users\user\Desktop\2PSj0qX4W6.exeSection loaded: winhttp.dllJump to behavior
      Source: C:\Users\user\Desktop\2PSj0qX4W6.exeSection loaded: mswsock.dllJump to behavior
      Source: C:\Users\user\Desktop\2PSj0qX4W6.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Users\user\Desktop\2PSj0qX4W6.exeSection loaded: winnsi.dllJump to behavior
      Source: C:\Users\user\Desktop\2PSj0qX4W6.exeSection loaded: urlmon.dllJump to behavior
      Source: C:\Users\user\Desktop\2PSj0qX4W6.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Users\user\Desktop\2PSj0qX4W6.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Users\user\Desktop\2PSj0qX4W6.exeSection loaded: schannel.dllJump to behavior
      Source: C:\Users\user\Desktop\2PSj0qX4W6.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{057EEE47-2572-4AA1-88D7-60CE2149E33C}\InProcServer32Jump to behavior
      Source: 2PSj0qX4W6.exeStatic PE information: Image base 0x140000000 > 0x60000000
      Source: 2PSj0qX4W6.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
      Source: 2PSj0qX4W6.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
      Source: 2PSj0qX4W6.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
      Source: 2PSj0qX4W6.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
      Source: 2PSj0qX4W6.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
      Source: 2PSj0qX4W6.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
      Source: 2PSj0qX4W6.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
      Source: 2PSj0qX4W6.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
      Source: Binary string: \ConsoleApplication3\x64\Release\ConsoleApplication3.pdb source: 2PSj0qX4W6.exe
      Source: Binary string: \ConsoleApplication3\x64\Release\ConsoleApplication3.pdb(( source: 2PSj0qX4W6.exe
      Source: 2PSj0qX4W6.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
      Source: 2PSj0qX4W6.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
      Source: 2PSj0qX4W6.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
      Source: 2PSj0qX4W6.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
      Source: 2PSj0qX4W6.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
      Source: C:\Users\user\Desktop\2PSj0qX4W6.exeCode function: 0_2_0000009C38F0EA2B push eax; ret 0_2_0000009C38F0EC87
      Source: C:\Users\user\Desktop\2PSj0qX4W6.exeCode function: 0_2_0000009C38F0EC09 push eax; ret 0_2_0000009C38F0EC87
      Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: Amcache.hve.6.drBinary or memory string: VMware
      Source: Amcache.hve.6.drBinary or memory string: VMware Virtual USB Mouse
      Source: Amcache.hve.6.drBinary or memory string: vmci.syshbin
      Source: Amcache.hve.6.drBinary or memory string: VMware, Inc.
      Source: Amcache.hve.6.drBinary or memory string: VMware20,1hbin@
      Source: Amcache.hve.6.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
      Source: Amcache.hve.6.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
      Source: Amcache.hve.6.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
      Source: 2PSj0qX4W6.exe, 00000000.00000002.2278159144.000001F9735F2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
      Source: Amcache.hve.6.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
      Source: Amcache.hve.6.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
      Source: Amcache.hve.6.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
      Source: Amcache.hve.6.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
      Source: Amcache.hve.6.drBinary or memory string: vmci.sys
      Source: Amcache.hve.6.drBinary or memory string: VMware-56 4d 43 71 48 15 3d ed-ae e6 c7 5a ec d9 3b f0
      Source: Amcache.hve.6.drBinary or memory string: vmci.syshbin`
      Source: Amcache.hve.6.drBinary or memory string: \driver\vmci,\driver\pci
      Source: Amcache.hve.6.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
      Source: Amcache.hve.6.drBinary or memory string: VMware20,1
      Source: Amcache.hve.6.drBinary or memory string: Microsoft Hyper-V Generation Counter
      Source: Amcache.hve.6.drBinary or memory string: NECVMWar VMware SATA CD00
      Source: Amcache.hve.6.drBinary or memory string: VMware Virtual disk SCSI Disk Device
      Source: Amcache.hve.6.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
      Source: Amcache.hve.6.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
      Source: Amcache.hve.6.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
      Source: Amcache.hve.6.drBinary or memory string: VMware PCI VMCI Bus Device
      Source: Amcache.hve.6.drBinary or memory string: VMware VMCI Bus Device
      Source: Amcache.hve.6.drBinary or memory string: VMware Virtual RAM
      Source: Amcache.hve.6.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
      Source: 2PSj0qX4W6.exe, 00000000.00000002.2278159144.000001F9735A3000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW@
      Source: Amcache.hve.6.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
      Source: C:\Users\user\Desktop\2PSj0qX4W6.exeCode function: 0_2_00007FF628B439CC IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF628B439CC
      Source: C:\Users\user\Desktop\2PSj0qX4W6.exeCode function: 0_2_00007FF628B42F04 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF628B42F04
      Source: C:\Users\user\Desktop\2PSj0qX4W6.exeCode function: 0_2_00007FF628B439CC IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF628B439CC
      Source: C:\Users\user\Desktop\2PSj0qX4W6.exeCode function: 0_2_00007FF628B43B74 SetUnhandledExceptionFilter,0_2_00007FF628B43B74
      Source: C:\Users\user\Desktop\2PSj0qX4W6.exeCode function: 0_2_00007FF628B43BE4 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00007FF628B43BE4
      Source: Amcache.hve.6.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
      Source: Amcache.hve.6.drBinary or memory string: msmpeng.exe
      Source: Amcache.hve.6.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
      Source: Amcache.hve.6.drBinary or memory string: MsMpEng.exe

      Remote Access Functionality

      barindex
      Source: Yara matchFile source: 00000000.00000002.2277720966.0000009C38F0E000.00000040.00000010.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.2277720966.0000009C38F0E000.00000040.00000010.00020000.00000000.sdmp, type: MEMORY
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
      DLL Side-Loading
      1
      Process Injection
      1
      Process Injection
      OS Credential Dumping1
      System Time Discovery
      Remote Services1
      Archive Collected Data
      1
      Encrypted Channel
      Exfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
      DLL Side-Loading
      1
      DLL Side-Loading
      LSASS Memory21
      Security Software Discovery
      Remote Desktop ProtocolData from Removable Media1
      Non-Standard Port
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
      Obfuscated Files or Information
      Security Account Manager2
      System Information Discovery
      SMB/Windows Admin SharesData from Network Shared Drive1
      Application Layer Protocol
      Automated ExfiltrationData Encrypted for Impact
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      2PSj0qX4W6.exe50%ReversingLabsWin64.Backdoor.MeterpreterReverseShell
      2PSj0qX4W6.exe44%VirustotalBrowse
      2PSj0qX4W6.exe100%AviraTR/AD.MeterpreterSC.jtwai
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      SourceDetectionScannerLabelLink
      http://upx.sf.net0%URL Reputationsafe
      https://116.198.231.169:63222/4h0%Avira URL Cloudsafe
      http://116.198.231.169:63222/jquery-3.3.2.slim.min.js0%Avira URL Cloudsafe
      http://code.jquery.com/0%Avira URL Cloudsafe
      http://code.jquery.com/Es0%Avira URL Cloudsafe
      http://code.jquery.com/MW0%Avira URL Cloudsafe
      http://code.jquery.com/ru0%Avira URL Cloudsafe
      https://116.198.231.169:63222/jquery-3.3.2.slim.min.js9u0%Avira URL Cloudsafe
      http://code.jquery.com/wx0%Avira URL Cloudsafe
      https://116.198.231.169:63222/jquery-3.3.2.slim.min.js0%Avira URL Cloudsafe
      https://116.198.231.169:63222/jquery-3.3.2.slim.min.jsje0%Avira URL Cloudsafe
      https://116.198.231.169:63222/0%Avira URL Cloudsafe
      http://code.jquery.com/Z0%Avira URL Cloudsafe
      https://116.198.231.169:63222/jquery-3.3.2.slim.min.jsRe0%Avira URL Cloudsafe
      https://116.198.231.169:63222/dllC0%Avira URL Cloudsafe
      https://116.198.231.169/0%Avira URL Cloudsafe
      http://116.198.231.169/jquery-3.3.2.slim.min.js0%Avira URL Cloudsafe
      https://116.198.231.169:63222/SkX0%Avira URL Cloudsafe
      No contacted domains info
      NameMaliciousAntivirus DetectionReputation
      http://116.198.231.169:63222/jquery-3.3.2.slim.min.jstrue
      • Avira URL Cloud: safe
      unknown
      http://116.198.231.169/jquery-3.3.2.slim.min.jstrue
      • Avira URL Cloud: safe
      unknown
      NameSourceMaliciousAntivirus DetectionReputation
      https://116.198.231.169:63222/4h2PSj0qX4W6.exe, 00000000.00000002.2278159144.000001F9735CB000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://code.jquery.com/MW2PSj0qX4W6.exe, 00000000.00000002.2278159144.000001F9735BB000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://code.jquery.com/2PSj0qX4W6.exe, 2PSj0qX4W6.exe, 00000000.00000003.2160064724.000001F973602000.00000004.00000020.00020000.00000000.sdmp, 2PSj0qX4W6.exe, 00000000.00000002.2278159144.000001F9735BB000.00000004.00000020.00020000.00000000.sdmp, 2PSj0qX4W6.exe, 00000000.00000002.2277720966.0000009C38F0E000.00000040.00000010.00020000.00000000.sdmp, 2PSj0qX4W6.exe, 00000000.00000003.2119298442.000001F973602000.00000004.00000020.00020000.00000000.sdmp, 2PSj0qX4W6.exe, 00000000.00000003.2055318318.000001F973602000.00000004.00000020.00020000.00000000.sdmp, 2PSj0qX4W6.exe, 00000000.00000003.2139474328.000001F973602000.00000004.00000020.00020000.00000000.sdmp, 2PSj0qX4W6.exe, 00000000.00000003.2076583946.000001F973602000.00000004.00000020.00020000.00000000.sdmp, 2PSj0qX4W6.exe, 00000000.00000003.2097445402.000001F973602000.00000004.00000020.00020000.00000000.sdmp, 2PSj0qX4W6.exe, 00000000.00000002.2278159144.000001F973602000.00000004.00000020.00020000.00000000.sdmptrue
      • Avira URL Cloud: safe
      unknown
      http://code.jquery.com/Es2PSj0qX4W6.exe, 00000000.00000003.2033252187.000001F973602000.00000004.00000020.00020000.00000000.sdmp, 2PSj0qX4W6.exe, 00000000.00000003.2011457982.000001F973602000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://code.jquery.com/ru2PSj0qX4W6.exe, 00000000.00000003.2160064724.000001F973602000.00000004.00000020.00020000.00000000.sdmp, 2PSj0qX4W6.exe, 00000000.00000003.2119298442.000001F973602000.00000004.00000020.00020000.00000000.sdmp, 2PSj0qX4W6.exe, 00000000.00000003.2139474328.000001F973602000.00000004.00000020.00020000.00000000.sdmp, 2PSj0qX4W6.exe, 00000000.00000003.2097445402.000001F973602000.00000004.00000020.00020000.00000000.sdmp, 2PSj0qX4W6.exe, 00000000.00000002.2278159144.000001F973602000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://116.198.231.169:63222/jquery-3.3.2.slim.min.js9u2PSj0qX4W6.exe, 00000000.00000002.2278159144.000001F9735BB000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://code.jquery.com/wx2PSj0qX4W6.exe, 00000000.00000003.2119298442.000001F973602000.00000004.00000020.00020000.00000000.sdmp, 2PSj0qX4W6.exe, 00000000.00000003.2097445402.000001F973602000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://116.198.231.169:63222/jquery-3.3.2.slim.min.js2PSj0qX4W6.exe, 00000000.00000002.2278159144.000001F9735CB000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://116.198.231.169:63222/2PSj0qX4W6.exe, 00000000.00000002.2278159144.000001F9735CB000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://116.198.231.169:63222/jquery-3.3.2.slim.min.jsje2PSj0qX4W6.exe, 00000000.00000002.2278159144.000001F9735CB000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://code.jquery.com/Z2PSj0qX4W6.exe, 00000000.00000002.2278159144.000001F9735BB000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      http://upx.sf.netAmcache.hve.6.drfalse
      • URL Reputation: safe
      unknown
      https://116.198.231.169:63222/jquery-3.3.2.slim.min.jsRe2PSj0qX4W6.exe, 00000000.00000002.2278159144.000001F9735CB000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://116.198.231.169:63222/dllC2PSj0qX4W6.exe, 00000000.00000002.2278159144.000001F9735CB000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://116.198.231.169/2PSj0qX4W6.exe, 00000000.00000002.2278159144.000001F9735F2000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://116.198.231.169:63222/SkX2PSj0qX4W6.exe, 00000000.00000002.2278159144.000001F9735CB000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs
      IPDomainCountryFlagASNASN NameMalicious
      116.198.231.169
      unknownChina
      137699CHINATELECOM-JIANGSU-SUQIAN-IDCCHINATELECOMJiangsuSuqiantrue
      Joe Sandbox version:40.0.0 Tourmaline
      Analysis ID:1508524
      Start date and time:2024-09-10 10:54:08 +02:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 3m 57s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Number of analysed new started processes analysed:8
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Sample name:2PSj0qX4W6.exe
      renamed because original name is a hash value
      Original Sample Name:31a89af6712da7bd56b1033952468302bd0838d48c6712c5499c60178f4d95a3.exe
      Detection:MAL
      Classification:mal96.troj.winEXE@2/5@0/1
      EGA Information:
      • Successful, ratio: 100%
      HCA Information:
      • Successful, ratio: 57%
      • Number of executed functions: 3
      • Number of non-executed functions: 5
      Cookbook Comments:
      • Found application associated with file extension: .exe
      • Exclude process from analysis (whitelisted): MpCmdRun.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
      • Excluded IPs from analysis (whitelisted): 20.42.73.29
      • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, login.live.com, blobcollector.events.data.trafficmanager.net, onedsblobprdeus15.eastus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
      • Not all processes where analyzed, report is missing behavior information
      TimeTypeDescription
      04:55:59API Interceptor1x Sleep call for process: WerFault.exe modified
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      116.198.231.169LtmV2sDcTK.exeGet hashmaliciousCobaltStrike, MetasploitBrowse
        QT2hJT3Syn.exeGet hashmaliciousCobaltStrike, MetasploitBrowse
          No context
          MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
          CHINATELECOM-JIANGSU-SUQIAN-IDCCHINATELECOMJiangsuSuqianLtmV2sDcTK.exeGet hashmaliciousCobaltStrike, MetasploitBrowse
          • 116.198.231.169
          QT2hJT3Syn.exeGet hashmaliciousCobaltStrike, MetasploitBrowse
          • 116.198.231.169
          gOEF4WOJ3c.elfGet hashmaliciousUnknownBrowse
          • 116.198.238.210
          No context
          No context
          Process:C:\Windows\System32\WerFault.exe
          File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
          Category:dropped
          Size (bytes):65536
          Entropy (8bit):0.9245646449165812
          Encrypted:false
          SSDEEP:96:ekFdPsShq1ooh7RH6NbQXIDcQWc6zcEZcw37n+HbHg/JgWpt8sKa9bATFUp2QMRI:3HPif0I3DEj84TzuiFrCZ24lO8Q
          MD5:416A3D8E48E5B5770090C18CB54FDF51
          SHA1:0B4D1843FB793E94A1D71E52FF72892F6EAA6F23
          SHA-256:E7DF402DBB327D31E66655F1D9076E740F17272F26FB98182DEAFAB49D2FC6FF
          SHA-512:A12F9EDFAD6E036CC401D0B9657034594EC7072E99CD112D7336E90892C90EACABA8385D4E8D4E166466F1CF061031FDBAD1FEA148F4626B40FC9F317A159498
          Malicious:true
          Reputation:low
          Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.B.E.X.6.4.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.0.4.3.2.1.4.7.7.2.9.0.2.4.1.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.0.4.3.2.1.4.8.2.4.4.6.4.0.2.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.1.f.a.3.6.3.9.1.-.5.2.e.8.-.4.c.e.3.-.8.7.1.e.-.9.6.9.b.b.9.3.7.6.f.1.5.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.3.0.a.1.4.d.f.b.-.e.4.5.c.-.4.e.e.7.-.a.9.b.5.-.5.f.0.c.6.c.5.a.8.2.7.f.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.2.P.S.j.0.q.X.4.W.6...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.9.f.0.-.0.0.0.1.-.0.0.1.4.-.9.9.4.f.-.8.8.1.e.5.f.0.3.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.a.a.1.4.5.0.4.e.b.2.0.c.3.f.1.c.a.8.1.d.a.b.8.b.1.a.2.5.3.e.c.7.0.0.0.0.f.f.f.f.!.0.0.0.0.5.0.f.7.e.f.4.2.3.9.b.9.f.d.0.3.5.8.b.1.0.a.8.b.3.1.0.6.8.7.1.e.2.d.e.1.f.d.2.9.!.2.P.S.j.0.q.X.4.W.6...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.4././.0.6././.2.1.:.1.4.
          Process:C:\Windows\System32\WerFault.exe
          File Type:Mini DuMP crash report, 14 streams, Tue Sep 10 08:55:47 2024, 0x1205a4 type
          Category:dropped
          Size (bytes):155260
          Entropy (8bit):1.3902254874213669
          Encrypted:false
          SSDEEP:192:wZtOtp/Wk4ttD7OYobH2zp4Xml50H5lzE/uecJeHPfXlu:3tpH4tBCNbHfXml51rcJmHXlu
          MD5:7F487C6B840E02EB449B744A43C00478
          SHA1:E60A4785630C3E9AB99B64A5ED0CCFC28B201A46
          SHA-256:C37E1AF52EBEF0109F43DBDC2D0A8FAC33E2829620BB866BD66833DC89E7FA47
          SHA-512:B8D47463FEA40CD9402CA4DD2A66F159A8E107067D490EB91ECCBF3EC5F894EC4CE0B1300A71164DB4A731A09CE70C062C4737D000733E0A01CD0E775927886E
          Malicious:false
          Yara Hits:
          • Rule: Windows_Trojan_Metasploit_7bc0f998, Description: Identifies the API address lookup function leverage by metasploit shellcode, Source: C:\ProgramData\Microsoft\Windows\WER\Temp\WERDD67.tmp.dmp, Author: unknown
          • Rule: Windows_Trojan_Metasploit_c9773203, Description: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., Source: C:\ProgramData\Microsoft\Windows\WER\Temp\WERDD67.tmp.dmp, Author: unknown
          Reputation:low
          Preview:MDMP..a..... ..........f........................................,X..........T.......8...........T...........@/..</......................l...............................................................................eJ..............Lw......................T...........d..f.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
          Process:C:\Windows\System32\WerFault.exe
          File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
          Category:dropped
          Size (bytes):8904
          Entropy (8bit):3.705376798221505
          Encrypted:false
          SSDEEP:192:R6l7wVeJa4sC6Y96g3MgmfwvpDa89bVhMfqHm:R6lXJlZ6Ygg3MgmfwpV6fT
          MD5:E996CC364F1F082EE541D2B2ED587289
          SHA1:98E69D64BC77CBF30AC70F1044EB98651EF173BB
          SHA-256:23547EEBBDF49DC318C6C3B4A545698D338543DC783E277506F3294D2ECF0FF0
          SHA-512:D80DDD9619CA6A74D1ED462142289CC85B4BE7923316E7E36F8A6E4B89438D468D9A5684A633C77E79BD00EAC4BCA74C13752E1EF7686ED47153E50B23A2B701
          Malicious:false
          Reputation:low
          Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.6.6.4.0.<./.P.i.
          Process:C:\Windows\System32\WerFault.exe
          File Type:XML 1.0 document, ASCII text, with CRLF line terminators
          Category:dropped
          Size (bytes):4800
          Entropy (8bit):4.484327472962603
          Encrypted:false
          SSDEEP:48:cvIwWl8zsoJg771I9XgVVWpW8VYCYm8M4J8pO1FCuyq8vYpO+1dmeywVw9d:uIjfuI7Ed7VuJUeWYz19XO9d
          MD5:9FE9CD7357210EA4035C7F1F5F6437D2
          SHA1:8C9E535AD02DB0B37E2B92FE19C95A1940E6EC96
          SHA-256:324F5292471F6B0836DD326F6DA7EE0366E5FCE18E9A7B3DD0B59F94558CCB2D
          SHA-512:517870D7CE5FF49A2FDD7B19261E4341D53DDFBAA2EAD09A93055820FC9BCD4A32E35A27095AC3B8AF10859B4E7C7744D98914864BCAC640410A3AC38D2E35F9
          Malicious:false
          Reputation:low
          Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="493918" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
          Process:C:\Windows\System32\WerFault.exe
          File Type:MS Windows registry file, NT/2000 or above
          Category:dropped
          Size (bytes):1835008
          Entropy (8bit):4.465588284885263
          Encrypted:false
          SSDEEP:6144:pIXfpi67eLPU9skLmb0b4BWSPKaJG8nAgejZMMhA2gX4WABl0uNmdwBCswSbt:aXD94BWlLZMM6YFHc+t
          MD5:44AF3AD31457D05AE9DDC6D1B7DE83BF
          SHA1:6EF7CE9623A032E2243ABFDE29DECFE4438FD73D
          SHA-256:5C09256A9E83F4771622FD25F0E645B2D6FC62E8201D4E02B03EB44E9B47FA2A
          SHA-512:3EA33647C42A2B5ADD46AFD3EF5999DA39651A8BCE789BFB46B26AA9F0EE5C1EF96D18554B54291A58750B9C4F9CD0EBCA7E9C836D32D7B85B48964675E37EBE
          Malicious:false
          Reputation:low
          Preview:regf6...6....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm:.:_................................................................................................................................................................................................................................................................................................................................................w..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
          File type:PE32+ executable (GUI) x86-64, for MS Windows
          Entropy (8bit):6.837840610486668
          TrID:
          • Win64 Executable GUI (202006/5) 92.65%
          • Win64 Executable (generic) (12005/4) 5.51%
          • Generic Win/DOS Executable (2004/3) 0.92%
          • DOS Executable Generic (2002/1) 0.92%
          • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
          File name:2PSj0qX4W6.exe
          File size:39'424 bytes
          MD5:c92c541048de8be340a990db10e7cbab
          SHA1:50f7ef4239b9fd0358b10a8b3106871e2de1fd29
          SHA256:31a89af6712da7bd56b1033952468302bd0838d48c6712c5499c60178f4d95a3
          SHA512:fa1b8808c7ea8ff81ef4b30095b896098e29c8c281f9bcfd0570469da9bea3b1d9a20aeb75f79dcf2ae4d933442b1d1094bc16156dbd98dadc0f5ff115f8dccb
          SSDEEP:768:+mOM8UGqSc62S1MdS4o8BWPKbKqB5SW2pegUxHTo:+hM2qSO9S4oqijdM1V
          TLSH:8E039D5A7B40C9EEDC6A4339C113A91AF3B378211752BADF57D542620E623E1BC7B092
          File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......-$..iE.^iE.^iE.^`=p^eE.^..._jE.^..._cE.^..._rE.^..._oE.^"=._lE.^iE.^9E.^z.._jE.^z..^hE.^z.._hE.^RichiE.^........PE..d.....uf...
          Icon Hash:90cececece8e8eb0
          Entrypoint:0x140003688
          Entrypoint Section:.text
          Digitally signed:false
          Imagebase:0x140000000
          Subsystem:windows gui
          Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
          DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
          Time Stamp:0x667590C5 [Fri Jun 21 14:40:05 2024 UTC]
          TLS Callbacks:
          CLR (.Net) Version:
          OS Version Major:6
          OS Version Minor:0
          File Version Major:6
          File Version Minor:0
          Subsystem Version Major:6
          Subsystem Version Minor:0
          Import Hash:6b40e87f57848366f8223dc72adc8105
          Instruction
          dec eax
          sub esp, 28h
          call 00007FEC20F02B88h
          dec eax
          add esp, 28h
          jmp 00007FEC20F024A7h
          int3
          int3
          jmp 00007FEC20F02DBEh
          int3
          int3
          int3
          dec eax
          and dword ptr [ecx+10h], 00000000h
          dec eax
          lea eax, dword ptr [00001CD0h]
          dec eax
          mov dword ptr [ecx+08h], eax
          dec eax
          lea eax, dword ptr [00001CB5h]
          dec eax
          mov dword ptr [ecx], eax
          dec eax
          mov eax, ecx
          ret
          int3
          int3
          dec eax
          sub esp, 48h
          dec eax
          lea ecx, dword ptr [esp+20h]
          call 00007FEC20F02607h
          dec eax
          lea edx, dword ptr [00006597h]
          dec eax
          lea ecx, dword ptr [esp+20h]
          call 00007FEC20F02CD4h
          int3
          dec eax
          mov dword ptr [esp+10h], ebx
          dec eax
          mov dword ptr [esp+18h], esi
          push ebp
          push edi
          inc ecx
          push esi
          dec eax
          mov ebp, esp
          dec eax
          sub esp, 10h
          xor eax, eax
          xor ecx, ecx
          cpuid
          inc esp
          mov eax, ecx
          inc esp
          mov edx, edx
          inc ecx
          xor edx, 49656E69h
          inc ecx
          xor eax, 6C65746Eh
          inc esp
          mov ecx, ebx
          inc esp
          mov esi, eax
          xor ecx, ecx
          mov eax, 00000001h
          cpuid
          inc ebp
          or edx, eax
          mov dword ptr [ebp-10h], eax
          inc ecx
          xor ecx, 756E6547h
          mov dword ptr [ebp-0Ch], ebx
          inc ebp
          or edx, ecx
          mov dword ptr [ebp-08h], ecx
          mov edi, ecx
          mov dword ptr [ebp-04h], edx
          jne 00007FEC20F0268Dh
          dec eax
          or dword ptr [00007959h], FFFFFFFFh
          and eax, 0FFF3FF0h
          dec eax
          mov dword ptr [00000041h], 00000000h
          Programming Language:
          • [IMP] VS2008 SP1 build 30729
          NameVirtual AddressVirtual Size Is in Section
          IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IMPORT0x9d5c0xf0.rdata
          IMAGE_DIRECTORY_ENTRY_RESOURCE0xd0000x1e0.rsrc
          IMAGE_DIRECTORY_ENTRY_EXCEPTION0xc0000x2dc.pdata
          IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
          IMAGE_DIRECTORY_ENTRY_BASERELOC0xe0000x74.reloc
          IMAGE_DIRECTORY_ENTRY_DEBUG0x92600x70.rdata
          IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
          IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
          IMAGE_DIRECTORY_ENTRY_TLS0x00x0
          IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x91200x140.rdata
          IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_IAT0x50000x280.rdata
          IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
          IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
          IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
          NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
          .text0x10000x30b40x3200e9963f482a3d6e7f4e75fe743c2953bfFalse0.585234375data6.257536886152972IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
          .rdata0x50000x59140x5a000d9164bef9ec87f2b9facc8891c7342fFalse0.6498263888888889data7.192253966884054IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          .data0xb0000x7a00x200e58308d815ae9f347d76df3fe7a185dbFalse0.251953125DOS executable (block device driver)2.229094667815011IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
          .pdata0xc0000x2dc0x40099db291c0f94381619f68f9a01ef2c14False0.3837890625data3.0805904685737957IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          .rsrc0xd0000x1e00x20044e3d39532c9319314b3e7669556d25aFalse0.529296875data4.701503258251789IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
          .reloc0xe0000x740x200f4ff1a136d814031024657417835019eFalse0.23046875data1.3772139608147294IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
          NameRVASizeTypeLanguageCountryZLIB Complexity
          RT_MANIFEST0xd0600x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
          DLLImport
          KERNEL32.dllRtlLookupFunctionEntry, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, TerminateProcess, IsProcessorFeaturePresent, LoadLibraryA, GetModuleHandleW, QueryPerformanceCounter, GetCurrentProcessId, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, RtlCaptureContext, IsDebuggerPresent, VirtualProtect
          MSVCP140.dll?good@ios_base@std@@QEBA_NXZ, ?_Xlength_error@std@@YAXPEBD@Z, ?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A, ?uncaught_exception@std@@YA_NXZ, ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ, ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z, ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z, ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z, ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ, ?put@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@D@Z, ?widen@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBADD@Z
          CRYPT32.dllCertEnumSystemStore
          VCRUNTIME140_1.dll__CxxFrameHandler4
          VCRUNTIME140.dllmemset, __current_exception_context, __current_exception, _CxxThrowException, __C_specific_handler, memcpy, __std_exception_copy, __std_exception_destroy, memchr, __std_terminate
          api-ms-win-crt-string-l1-1-0.dllisalnum
          api-ms-win-crt-runtime-l1-1-0.dll_c_exit, __p___argv, __p___argc, terminate, _exit, exit, _initterm_e, _register_thread_local_exe_atexit_callback, _initterm, _set_app_type, _seh_filter_exe, _cexit, _crt_atexit, _register_onexit_function, _initialize_onexit_table, _initialize_narrow_environment, _configure_narrow_argv, _get_initial_narrow_environment, _invalid_parameter_noinfo_noreturn
          api-ms-win-crt-heap-l1-1-0.dllfree, _callnewh, _set_new_mode, malloc
          api-ms-win-crt-math-l1-1-0.dll__setusermatherr
          api-ms-win-crt-stdio-l1-1-0.dll__p__commode, _set_fmode
          api-ms-win-crt-locale-l1-1-0.dll_configthreadlocale
          Language of compilation systemCountry where language is spokenMap
          EnglishUnited States
          TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
          2024-09-10T10:55:04.118942+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.449730116.198.231.16963222TCP
          2024-09-10T10:55:09.022682+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.449733116.198.231.16963222TCP
          2024-09-10T10:55:15.914160+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.449736116.198.231.16963222TCP
          2024-09-10T10:55:20.852983+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.449739116.198.231.16963222TCP
          2024-09-10T10:55:25.054384+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.449748116.198.231.16963222TCP
          2024-09-10T10:55:29.321752+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.449751116.198.231.16963222TCP
          2024-09-10T10:55:33.512668+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.449754116.198.231.16963222TCP
          2024-09-10T10:55:37.898702+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.449757116.198.231.16963222TCP
          2024-09-10T10:55:42.111525+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.449760116.198.231.16963222TCP
          2024-09-10T10:55:46.314350+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.449763116.198.231.16963222TCP
          TimestampSource PortDest PortSource IPDest IP
          Sep 10, 2024 10:55:01.710592031 CEST4973063222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:01.715487957 CEST6322249730116.198.231.169192.168.2.4
          Sep 10, 2024 10:55:01.715586901 CEST4973063222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:01.762476921 CEST4973063222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:01.767303944 CEST6322249730116.198.231.169192.168.2.4
          Sep 10, 2024 10:55:04.118747950 CEST6322249730116.198.231.169192.168.2.4
          Sep 10, 2024 10:55:04.118942022 CEST4973063222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:04.128942966 CEST4973063222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:04.129878998 CEST4973163222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:04.133819103 CEST6322249730116.198.231.169192.168.2.4
          Sep 10, 2024 10:55:04.134744883 CEST6322249731116.198.231.169192.168.2.4
          Sep 10, 2024 10:55:04.134829998 CEST4973163222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:04.135397911 CEST4973163222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:04.140238047 CEST6322249731116.198.231.169192.168.2.4
          Sep 10, 2024 10:55:06.692790031 CEST6322249731116.198.231.169192.168.2.4
          Sep 10, 2024 10:55:06.692981005 CEST4973163222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:06.693032026 CEST4973163222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:06.693772078 CEST4973263222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:06.697916031 CEST6322249731116.198.231.169192.168.2.4
          Sep 10, 2024 10:55:06.698647022 CEST6322249732116.198.231.169192.168.2.4
          Sep 10, 2024 10:55:06.698743105 CEST4973263222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:06.698915958 CEST4973263222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:06.700776100 CEST4973363222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:06.704348087 CEST6322249732116.198.231.169192.168.2.4
          Sep 10, 2024 10:55:06.704432011 CEST4973263222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:06.705852985 CEST6322249733116.198.231.169192.168.2.4
          Sep 10, 2024 10:55:06.705961943 CEST4973363222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:06.706494093 CEST4973363222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:06.711441040 CEST6322249733116.198.231.169192.168.2.4
          Sep 10, 2024 10:55:09.022600889 CEST6322249733116.198.231.169192.168.2.4
          Sep 10, 2024 10:55:09.022681952 CEST4973363222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:09.022789001 CEST6322249733116.198.231.169192.168.2.4
          Sep 10, 2024 10:55:09.022813082 CEST4973363222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:09.022847891 CEST4973363222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:09.023612976 CEST4973463222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:09.027592897 CEST6322249733116.198.231.169192.168.2.4
          Sep 10, 2024 10:55:09.028485060 CEST6322249734116.198.231.169192.168.2.4
          Sep 10, 2024 10:55:09.028573036 CEST4973463222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:09.028870106 CEST4973463222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:09.033672094 CEST6322249734116.198.231.169192.168.2.4
          Sep 10, 2024 10:55:13.794656992 CEST6322249734116.198.231.169192.168.2.4
          Sep 10, 2024 10:55:13.794774055 CEST4973463222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:13.794945002 CEST4973463222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:13.795623064 CEST6322249734116.198.231.169192.168.2.4
          Sep 10, 2024 10:55:13.795687914 CEST4973463222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:13.795828104 CEST4973563222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:13.796179056 CEST6322249734116.198.231.169192.168.2.4
          Sep 10, 2024 10:55:13.796237946 CEST4973463222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:13.800618887 CEST6322249734116.198.231.169192.168.2.4
          Sep 10, 2024 10:55:13.801759005 CEST6322249735116.198.231.169192.168.2.4
          Sep 10, 2024 10:55:13.801852942 CEST4973563222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:13.802002907 CEST4973563222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:13.803451061 CEST4973663222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:13.808653116 CEST6322249735116.198.231.169192.168.2.4
          Sep 10, 2024 10:55:13.808732986 CEST4973563222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:13.809005022 CEST6322249736116.198.231.169192.168.2.4
          Sep 10, 2024 10:55:13.809425116 CEST4973663222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:13.809425116 CEST4973663222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:13.814338923 CEST6322249736116.198.231.169192.168.2.4
          Sep 10, 2024 10:55:15.912946939 CEST6322249736116.198.231.169192.168.2.4
          Sep 10, 2024 10:55:15.914160013 CEST4973663222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:15.914160013 CEST4973663222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:15.914412975 CEST4973763222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:15.919066906 CEST6322249736116.198.231.169192.168.2.4
          Sep 10, 2024 10:55:15.919189930 CEST6322249737116.198.231.169192.168.2.4
          Sep 10, 2024 10:55:15.919282913 CEST4973763222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:15.919603109 CEST4973763222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:15.924379110 CEST6322249737116.198.231.169192.168.2.4
          Sep 10, 2024 10:55:18.143480062 CEST6322249737116.198.231.169192.168.2.4
          Sep 10, 2024 10:55:18.143703938 CEST4973763222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:18.143703938 CEST4973763222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:18.144604921 CEST4973863222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:18.148813009 CEST6322249737116.198.231.169192.168.2.4
          Sep 10, 2024 10:55:18.150221109 CEST6322249738116.198.231.169192.168.2.4
          Sep 10, 2024 10:55:18.152355909 CEST4973863222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:18.152355909 CEST4973863222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:18.157476902 CEST6322249738116.198.231.169192.168.2.4
          Sep 10, 2024 10:55:18.157577991 CEST4973863222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:18.158157110 CEST4973963222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:18.162992001 CEST6322249739116.198.231.169192.168.2.4
          Sep 10, 2024 10:55:18.167414904 CEST4973963222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:18.167414904 CEST4973963222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:18.172281027 CEST6322249739116.198.231.169192.168.2.4
          Sep 10, 2024 10:55:20.852901936 CEST6322249739116.198.231.169192.168.2.4
          Sep 10, 2024 10:55:20.852982998 CEST4973963222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:20.853085995 CEST6322249739116.198.231.169192.168.2.4
          Sep 10, 2024 10:55:20.853135109 CEST4973963222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:20.853257895 CEST4973963222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:20.853602886 CEST6322249739116.198.231.169192.168.2.4
          Sep 10, 2024 10:55:20.853643894 CEST4973963222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:20.858295918 CEST6322249739116.198.231.169192.168.2.4
          Sep 10, 2024 10:55:20.859674931 CEST4974363222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:20.864428043 CEST6322249743116.198.231.169192.168.2.4
          Sep 10, 2024 10:55:20.864511967 CEST4974363222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:20.864881992 CEST4974363222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:20.869682074 CEST6322249743116.198.231.169192.168.2.4
          Sep 10, 2024 10:55:22.954804897 CEST6322249743116.198.231.169192.168.2.4
          Sep 10, 2024 10:55:22.954862118 CEST4974363222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:22.954989910 CEST4974363222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:22.957165003 CEST4974763222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:22.959714890 CEST6322249743116.198.231.169192.168.2.4
          Sep 10, 2024 10:55:22.961966991 CEST6322249747116.198.231.169192.168.2.4
          Sep 10, 2024 10:55:22.962138891 CEST4974763222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:22.962275982 CEST4974763222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:22.967021942 CEST4974863222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:22.967417955 CEST6322249747116.198.231.169192.168.2.4
          Sep 10, 2024 10:55:22.967858076 CEST6322249747116.198.231.169192.168.2.4
          Sep 10, 2024 10:55:22.967895985 CEST4974763222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:22.971818924 CEST6322249748116.198.231.169192.168.2.4
          Sep 10, 2024 10:55:22.974215984 CEST4974863222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:22.974545002 CEST4974863222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:22.979347944 CEST6322249748116.198.231.169192.168.2.4
          Sep 10, 2024 10:55:25.051626921 CEST6322249748116.198.231.169192.168.2.4
          Sep 10, 2024 10:55:25.054383993 CEST4974863222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:25.054419041 CEST4974863222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:25.059464931 CEST6322249748116.198.231.169192.168.2.4
          Sep 10, 2024 10:55:25.062802076 CEST4974963222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:25.067953110 CEST6322249749116.198.231.169192.168.2.4
          Sep 10, 2024 10:55:25.069499969 CEST4974963222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:25.069920063 CEST4974963222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:25.078075886 CEST6322249749116.198.231.169192.168.2.4
          Sep 10, 2024 10:55:27.102555037 CEST6322249749116.198.231.169192.168.2.4
          Sep 10, 2024 10:55:27.102858067 CEST4974963222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:27.103004932 CEST4974963222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:27.107841015 CEST6322249749116.198.231.169192.168.2.4
          Sep 10, 2024 10:55:27.108587980 CEST4975063222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:27.113470078 CEST6322249750116.198.231.169192.168.2.4
          Sep 10, 2024 10:55:27.113588095 CEST4975063222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:27.113807917 CEST4975063222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:27.115112066 CEST4975163222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:27.119009018 CEST6322249750116.198.231.169192.168.2.4
          Sep 10, 2024 10:55:27.119095087 CEST4975063222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:27.119920969 CEST6322249751116.198.231.169192.168.2.4
          Sep 10, 2024 10:55:27.120029926 CEST4975163222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:27.120414972 CEST4975163222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:27.125164986 CEST6322249751116.198.231.169192.168.2.4
          Sep 10, 2024 10:55:29.321527958 CEST6322249751116.198.231.169192.168.2.4
          Sep 10, 2024 10:55:29.321752071 CEST4975163222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:29.322035074 CEST4975163222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:29.326128006 CEST4975263222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:29.326870918 CEST6322249751116.198.231.169192.168.2.4
          Sep 10, 2024 10:55:29.330899954 CEST6322249752116.198.231.169192.168.2.4
          Sep 10, 2024 10:55:29.330980062 CEST4975263222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:29.331295013 CEST4975263222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:29.336163044 CEST6322249752116.198.231.169192.168.2.4
          Sep 10, 2024 10:55:31.411154985 CEST6322249752116.198.231.169192.168.2.4
          Sep 10, 2024 10:55:31.413330078 CEST4975263222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:31.414077044 CEST4975263222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:31.416646957 CEST4975363222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:31.418931007 CEST6322249752116.198.231.169192.168.2.4
          Sep 10, 2024 10:55:31.421804905 CEST6322249753116.198.231.169192.168.2.4
          Sep 10, 2024 10:55:31.421914101 CEST4975363222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:31.422113895 CEST4975363222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:31.425889015 CEST4975463222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:31.427186966 CEST6322249753116.198.231.169192.168.2.4
          Sep 10, 2024 10:55:31.427258968 CEST4975363222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:31.430936098 CEST6322249754116.198.231.169192.168.2.4
          Sep 10, 2024 10:55:31.431051970 CEST4975463222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:31.431583881 CEST4975463222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:31.436429977 CEST6322249754116.198.231.169192.168.2.4
          Sep 10, 2024 10:55:33.512569904 CEST6322249754116.198.231.169192.168.2.4
          Sep 10, 2024 10:55:33.512667894 CEST4975463222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:33.512794018 CEST4975463222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:33.515537977 CEST4975563222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:33.517604113 CEST6322249754116.198.231.169192.168.2.4
          Sep 10, 2024 10:55:33.520396948 CEST6322249755116.198.231.169192.168.2.4
          Sep 10, 2024 10:55:33.520515919 CEST4975563222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:33.520934105 CEST4975563222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:33.525765896 CEST6322249755116.198.231.169192.168.2.4
          Sep 10, 2024 10:55:35.691947937 CEST6322249755116.198.231.169192.168.2.4
          Sep 10, 2024 10:55:35.692148924 CEST4975563222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:35.692209959 CEST4975563222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:35.694906950 CEST4975663222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:35.697313070 CEST6322249755116.198.231.169192.168.2.4
          Sep 10, 2024 10:55:35.699955940 CEST6322249756116.198.231.169192.168.2.4
          Sep 10, 2024 10:55:35.700078011 CEST4975663222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:35.700248003 CEST4975663222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:35.701647043 CEST4975763222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:35.705513954 CEST6322249756116.198.231.169192.168.2.4
          Sep 10, 2024 10:55:35.705612898 CEST4975663222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:35.706521988 CEST6322249757116.198.231.169192.168.2.4
          Sep 10, 2024 10:55:35.706584930 CEST4975763222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:35.706916094 CEST4975763222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:35.711663008 CEST6322249757116.198.231.169192.168.2.4
          Sep 10, 2024 10:55:37.898607969 CEST6322249757116.198.231.169192.168.2.4
          Sep 10, 2024 10:55:37.898701906 CEST4975763222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:37.898828983 CEST4975763222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:37.902903080 CEST4975863222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:37.906430960 CEST6322249757116.198.231.169192.168.2.4
          Sep 10, 2024 10:55:37.908746004 CEST6322249758116.198.231.169192.168.2.4
          Sep 10, 2024 10:55:37.908847094 CEST4975863222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:37.909116030 CEST4975863222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:37.914352894 CEST6322249758116.198.231.169192.168.2.4
          Sep 10, 2024 10:55:40.024862051 CEST6322249758116.198.231.169192.168.2.4
          Sep 10, 2024 10:55:40.025043964 CEST4975863222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:40.025171995 CEST4975863222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:40.029555082 CEST4975963222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:40.031424046 CEST6322249758116.198.231.169192.168.2.4
          Sep 10, 2024 10:55:40.035991907 CEST6322249759116.198.231.169192.168.2.4
          Sep 10, 2024 10:55:40.036066055 CEST4975963222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:40.036212921 CEST4975963222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:40.037763119 CEST4976063222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:40.042732954 CEST6322249759116.198.231.169192.168.2.4
          Sep 10, 2024 10:55:40.042783022 CEST4975963222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:40.044060946 CEST6322249760116.198.231.169192.168.2.4
          Sep 10, 2024 10:55:40.044128895 CEST4976063222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:40.044437885 CEST4976063222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:40.050646067 CEST6322249760116.198.231.169192.168.2.4
          Sep 10, 2024 10:55:42.111341953 CEST6322249760116.198.231.169192.168.2.4
          Sep 10, 2024 10:55:42.111525059 CEST4976063222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:42.111565113 CEST4976063222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:42.115299940 CEST4976163222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:42.116497993 CEST6322249760116.198.231.169192.168.2.4
          Sep 10, 2024 10:55:42.120259047 CEST6322249761116.198.231.169192.168.2.4
          Sep 10, 2024 10:55:42.120341063 CEST4976163222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:42.120644093 CEST4976163222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:42.125552893 CEST6322249761116.198.231.169192.168.2.4
          Sep 10, 2024 10:55:44.296638012 CEST6322249761116.198.231.169192.168.2.4
          Sep 10, 2024 10:55:44.296745062 CEST4976163222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:44.296875000 CEST4976163222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:44.300544977 CEST4976263222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:44.301759958 CEST6322249761116.198.231.169192.168.2.4
          Sep 10, 2024 10:55:44.305515051 CEST6322249762116.198.231.169192.168.2.4
          Sep 10, 2024 10:55:44.305593014 CEST4976263222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:44.305680990 CEST4976263222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:44.308291912 CEST4976363222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:44.311844110 CEST6322249762116.198.231.169192.168.2.4
          Sep 10, 2024 10:55:44.311916113 CEST4976263222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:44.313210011 CEST6322249763116.198.231.169192.168.2.4
          Sep 10, 2024 10:55:44.313291073 CEST4976363222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:44.313550949 CEST4976363222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:44.318389893 CEST6322249763116.198.231.169192.168.2.4
          Sep 10, 2024 10:55:46.314235926 CEST6322249763116.198.231.169192.168.2.4
          Sep 10, 2024 10:55:46.314349890 CEST4976363222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:46.314475060 CEST4976363222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:46.319300890 CEST4976463222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:46.320549011 CEST6322249763116.198.231.169192.168.2.4
          Sep 10, 2024 10:55:46.325150013 CEST6322249764116.198.231.169192.168.2.4
          Sep 10, 2024 10:55:46.325263023 CEST4976463222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:46.325956106 CEST4976463222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:46.331918001 CEST6322249764116.198.231.169192.168.2.4
          Sep 10, 2024 10:55:48.373234987 CEST6322249764116.198.231.169192.168.2.4
          Sep 10, 2024 10:55:48.373445988 CEST4976463222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:48.373493910 CEST4976463222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:48.376390934 CEST4976563222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:48.381674051 CEST6322249764116.198.231.169192.168.2.4
          Sep 10, 2024 10:55:48.382292032 CEST6322249765116.198.231.169192.168.2.4
          Sep 10, 2024 10:55:48.382371902 CEST4976563222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:48.382522106 CEST4976563222192.168.2.4116.198.231.169
          Sep 10, 2024 10:55:48.387830019 CEST6322249765116.198.231.169192.168.2.4
          Sep 10, 2024 10:55:48.387892962 CEST4976563222192.168.2.4116.198.231.169

          Click to jump to process

          Click to jump to process

          Click to dive into process behavior distribution

          Click to jump to process

          Target ID:0
          Start time:04:55:00
          Start date:10/09/2024
          Path:C:\Users\user\Desktop\2PSj0qX4W6.exe
          Wow64 process (32bit):false
          Commandline:"C:\Users\user\Desktop\2PSj0qX4W6.exe"
          Imagebase:0x7ff628b40000
          File size:39'424 bytes
          MD5 hash:C92C541048DE8BE340A990DB10E7CBAB
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Yara matches:
          • Rule: JoeSecurity_MetasploitPayload_3, Description: Yara detected Metasploit Payload, Source: 00000000.00000002.2277720966.0000009C38F0E000.00000040.00000010.00020000.00000000.sdmp, Author: Joe Security
          • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000000.00000002.2277720966.0000009C38F0E000.00000040.00000010.00020000.00000000.sdmp, Author: Joe Security
          • Rule: Windows_Trojan_Metasploit_7bc0f998, Description: Identifies the API address lookup function leverage by metasploit shellcode, Source: 00000000.00000002.2277720966.0000009C38F0E000.00000040.00000010.00020000.00000000.sdmp, Author: unknown
          • Rule: Windows_Trojan_Metasploit_c9773203, Description: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., Source: 00000000.00000002.2277720966.0000009C38F0E000.00000040.00000010.00020000.00000000.sdmp, Author: unknown
          Reputation:low
          Has exited:true

          Target ID:6
          Start time:04:55:47
          Start date:10/09/2024
          Path:C:\Windows\System32\WerFault.exe
          Wow64 process (32bit):false
          Commandline:C:\Windows\system32\WerFault.exe -u -p 6640 -s 1108
          Imagebase:0x7ff6c2860000
          File size:570'736 bytes
          MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
          Has elevated privileges:true
          Has administrator privileges:true
          Programmed in:C, C++ or other language
          Reputation:high
          Has exited:true

          Reset < >

            Execution Graph

            Execution Coverage:14.1%
            Dynamic/Decrypted Code Coverage:0.8%
            Signature Coverage:30%
            Total number of Nodes:253
            Total number of Limit Nodes:2
            execution_graph 1120 7ff628b43e38 1121 7ff628b43e70 __GSHandlerCheckCommon 1120->1121 1122 7ff628b43e9c 1121->1122 1123 7ff628b43e8b __CxxFrameHandler4 1121->1123 1123->1122 1139 7ff628b43fd8 ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N 1124 7ff628b4363a 1125 7ff628b43b20 GetModuleHandleW 1124->1125 1126 7ff628b43641 1125->1126 1127 7ff628b43680 _exit 1126->1127 1128 7ff628b43645 1126->1128 1062 7ff628b42d81 1063 7ff628b42d8f ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N ?uncaught_exception@std@ 1062->1063 1064 7ff628b42daf ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@ 1063->1064 1065 7ff628b42db9 1063->1065 1064->1065 1066 7ff628b41000 1067 7ff628b431a4 3 API calls 1066->1067 1068 7ff628b4100e 1067->1068 1140 7ff628b41160 __std_exception_destroy 1141 7ff628b43f60 1142 7ff628b43f80 1141->1142 1143 7ff628b43f73 1141->1143 1145 7ff628b41750 1143->1145 1146 7ff628b4178f 1145->1146 1147 7ff628b41763 1145->1147 1146->1142 1148 7ff628b41787 1147->1148 1149 7ff628b417a8 _invalid_parameter_noinfo_noreturn 1147->1149 1150 7ff628b42ed0 free 1148->1150 1150->1146 1069 7ff628b43688 1072 7ff628b43be4 1069->1072 1073 7ff628b43c07 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 1072->1073 1074 7ff628b43691 1072->1074 1073->1074 1093 7ff628b43428 1094 7ff628b43438 1093->1094 1106 7ff628b43258 1094->1106 1096 7ff628b439cc 9 API calls 1097 7ff628b434dd 1096->1097 1098 7ff628b4345c _RTC_Initialize 1104 7ff628b434bf 1098->1104 1114 7ff628b43c98 InitializeSListHead 1098->1114 1104->1096 1105 7ff628b434cd 1104->1105 1107 7ff628b43269 1106->1107 1111 7ff628b4329b 1106->1111 1108 7ff628b432d8 1107->1108 1112 7ff628b4326e __scrt_acquire_startup_lock 1107->1112 1109 7ff628b439cc 9 API calls 1108->1109 1110 7ff628b432e2 1109->1110 1111->1098 1112->1111 1113 7ff628b4328b _initialize_onexit_table 1112->1113 1113->1111 854 7ff628b4350c 855 7ff628b43525 854->855 856 7ff628b4352d __scrt_acquire_startup_lock 855->856 857 7ff628b43663 855->857 859 7ff628b4366d 856->859 866 7ff628b4354b __scrt_release_startup_lock 856->866 910 7ff628b439cc IsProcessorFeaturePresent 857->910 860 7ff628b439cc 9 API calls 859->860 861 7ff628b43678 860->861 863 7ff628b43680 _exit 861->863 862 7ff628b43570 864 7ff628b435f6 _get_initial_narrow_environment __p___argv __p___argc 874 7ff628b42890 memcpy 864->874 866->862 866->864 868 7ff628b435ee _register_thread_local_exe_atexit_callback 866->868 868->864 871 7ff628b43623 872 7ff628b43628 _cexit 871->872 873 7ff628b4362d 871->873 872->873 873->862 875 7ff628b42930 874->875 875->875 876 7ff628b4294c 875->876 877 7ff628b42c21 875->877 879 7ff628b42954 memcpy 876->879 881 7ff628b42980 876->881 967 7ff628b41250 ?_Xlength_error@std@@YAXPEBD 877->967 880 7ff628b42a1b 879->880 916 7ff628b41a40 880->916 882 7ff628b4298c 881->882 885 7ff628b429d1 881->885 890 7ff628b429df 881->890 891 7ff628b429ee 881->891 946 7ff628b431a4 882->946 883 7ff628b42c26 968 7ff628b411b0 883->968 889 7ff628b429f6 memcpy 885->889 889->880 890->882 890->883 894 7ff628b431a4 3 API calls 891->894 892 7ff628b42a71 memset 896 7ff628b42ac6 memset 892->896 897 7ff628b42a90 892->897 893 7ff628b42c2c 898 7ff628b429a2 894->898 895 7ff628b42be7 _invalid_parameter_noinfo_noreturn 900 7ff628b42bee 895->900 907 7ff628b42ae0 LoadLibraryA VirtualProtect CertEnumSystemStore 896->907 897->896 898->889 898->895 901 7ff628b42ed0 free 900->901 902 7ff628b42bf3 901->902 958 7ff628b42eb0 902->958 905 7ff628b42bbe 905->895 905->900 907->902 907->905 908 7ff628b43b20 GetModuleHandleW 909 7ff628b4361f 908->909 909->861 909->871 911 7ff628b439f2 910->911 912 7ff628b43a00 memset RtlCaptureContext RtlLookupFunctionEntry 911->912 913 7ff628b43a76 memset IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 912->913 914 7ff628b43a3a RtlVirtualUnwind 912->914 915 7ff628b43af6 913->915 914->913 915->859 971 7ff628b41270 916->971 918 7ff628b41a8d 919 7ff628b41aa0 memcpy 918->919 920 7ff628b43420 919->920 921 7ff628b41aca memcpy 920->921 922 7ff628b41b11 memcpy 921->922 927 7ff628b42792 921->927 928 7ff628b41b50 922->928 923 7ff628b427cc 975 7ff628b417b0 923->975 925 7ff628b42807 926 7ff628b42ed0 free 925->926 929 7ff628b42811 926->929 927->923 1014 7ff628b42c30 927->1014 930 7ff628b41bb5 memset 928->930 932 7ff628b41bd6 928->932 933 7ff628b42ed0 free 929->933 930->928 931 7ff628b41bf9 memset 931->932 932->931 944 7ff628b41c1a 932->944 935 7ff628b42819 933->935 937 7ff628b42859 935->937 938 7ff628b42854 935->938 940 7ff628b4284d _invalid_parameter_noinfo_noreturn 935->940 939 7ff628b42eb0 8 API calls 937->939 941 7ff628b42ed0 free 938->941 942 7ff628b4286b 939->942 940->938 941->937 942->892 942->895 955 7ff628b42ed0 942->955 943 7ff628b42741 memcpy 943->927 943->944 944->927 944->943 945 7ff628b42521 memcpy 944->945 945->944 947 7ff628b431be malloc 946->947 948 7ff628b431c8 947->948 949 7ff628b431af 947->949 948->898 949->947 951 7ff628b431ce 949->951 950 7ff628b431d9 953 7ff628b411b0 Concurrency::cancel_current_task __std_exception_copy 950->953 951->950 1051 7ff628b436c4 951->1051 954 7ff628b431df 953->954 956 7ff628b4369c free 955->956 959 7ff628b42eb9 958->959 960 7ff628b42c04 959->960 961 7ff628b42f38 IsProcessorFeaturePresent 959->961 960->908 962 7ff628b42f50 961->962 1055 7ff628b43130 RtlCaptureContext 962->1055 969 7ff628b411be Concurrency::cancel_current_task 968->969 970 7ff628b411cf __std_exception_copy 969->970 970->893 972 7ff628b41722 971->972 973 7ff628b412c2 971->973 972->918 973->972 1028 7ff628b418d0 973->1028 976 7ff628b417e0 975->976 976->976 977 7ff628b417fc 976->977 978 7ff628b418c2 976->978 980 7ff628b41802 memcpy 977->980 988 7ff628b4181f 977->988 1049 7ff628b41250 ?_Xlength_error@std@@YAXPEBD 978->1049 981 7ff628b418ac 980->981 981->925 982 7ff628b4182b 985 7ff628b431a4 3 API calls 982->985 983 7ff628b418c7 986 7ff628b411b0 Concurrency::cancel_current_task __std_exception_copy 983->986 984 7ff628b4188f memcpy 984->981 989 7ff628b41841 985->989 990 7ff628b418cd 986->990 987 7ff628b41887 991 7ff628b431a4 3 API calls 987->991 988->982 988->983 988->984 988->987 992 7ff628b41846 989->992 993 7ff628b41880 _invalid_parameter_noinfo_noreturn 989->993 994 7ff628b41a25 990->994 997 7ff628b418ff 990->997 991->992 992->984 993->987 1050 7ff628b41250 ?_Xlength_error@std@@YAXPEBD 994->1050 996 7ff628b41964 999 7ff628b431a4 3 API calls 996->999 997->996 1000 7ff628b4194a 997->1000 1002 7ff628b41957 997->1002 1003 7ff628b4198f 997->1003 998 7ff628b41a2a 1001 7ff628b411b0 Concurrency::cancel_current_task __std_exception_copy 998->1001 1009 7ff628b4197c 999->1009 1007 7ff628b419ab memcpy 1000->1007 1008 7ff628b419f5 memcpy 1000->1008 1006 7ff628b41a30 1001->1006 1002->996 1002->998 1005 7ff628b431a4 3 API calls 1003->1005 1004 7ff628b419ee _invalid_parameter_noinfo_noreturn 1004->1008 1005->1009 1011 7ff628b419cc 1007->1011 1012 7ff628b419e1 1007->1012 1010 7ff628b419ec 1008->1010 1009->1000 1009->1004 1010->925 1011->1004 1011->1012 1013 7ff628b42ed0 free 1012->1013 1013->1010 1017 7ff628b42c62 ?good@ios_base@std@ 1014->1017 1016 7ff628b42c97 1018 7ff628b42cad ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12 ?good@ios_base@std@ 1016->1018 1023 7ff628b42cc5 1016->1023 1017->1016 1017->1023 1018->1023 1020 7ff628b42d1d ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J 1024 7ff628b42ccf ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N ?uncaught_exception@std@ 1020->1024 1025 7ff628b42d42 1020->1025 1021 7ff628b427e7 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 1021->923 1022 7ff628b42daf ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@ 1022->1021 1023->1020 1023->1024 1026 7ff628b42cf5 ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD 1023->1026 1024->1021 1024->1022 1025->1024 1027 7ff628b42d47 ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD 1025->1027 1026->1023 1026->1024 1027->1024 1027->1025 1029 7ff628b41a25 1028->1029 1033 7ff628b418ff 1028->1033 1048 7ff628b41250 ?_Xlength_error@std@@YAXPEBD 1029->1048 1031 7ff628b41a2a 1034 7ff628b411b0 Concurrency::cancel_current_task __std_exception_copy 1031->1034 1032 7ff628b431a4 3 API calls 1043 7ff628b4194a 1032->1043 1035 7ff628b41957 1033->1035 1036 7ff628b4198f 1033->1036 1040 7ff628b41964 1033->1040 1033->1043 1039 7ff628b41a30 1034->1039 1035->1031 1035->1040 1038 7ff628b431a4 3 API calls 1036->1038 1037 7ff628b419ee _invalid_parameter_noinfo_noreturn 1042 7ff628b419f5 memcpy 1037->1042 1038->1043 1040->1032 1041 7ff628b419ab memcpy 1045 7ff628b419cc 1041->1045 1046 7ff628b419e1 1041->1046 1044 7ff628b419ec 1042->1044 1043->1037 1043->1041 1043->1042 1044->972 1045->1037 1045->1046 1047 7ff628b42ed0 free 1046->1047 1047->1044 1054 7ff628b436a4 1051->1054 1053 7ff628b436d2 _CxxThrowException 1054->1053 1056 7ff628b4314a RtlLookupFunctionEntry 1055->1056 1057 7ff628b42f63 1056->1057 1058 7ff628b43160 RtlVirtualUnwind 1056->1058 1059 7ff628b42f04 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 1057->1059 1058->1056 1058->1057 1075 7ff628b4300c 1078 7ff628b43020 IsProcessorFeaturePresent 1075->1078 1079 7ff628b43037 1078->1079 1084 7ff628b430c0 RtlCaptureContext RtlLookupFunctionEntry 1079->1084 1085 7ff628b430f0 RtlVirtualUnwind 1084->1085 1086 7ff628b4304b 1084->1086 1085->1086 1087 7ff628b42f04 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 1086->1087 1115 7ff628b4402b _seh_filter_exe 1089 7ff628b41110 __std_exception_destroy 1090 7ff628b41138 1089->1090 1091 7ff628b41145 1089->1091 1092 7ff628b42ed0 free 1090->1092 1092->1091 1116 7ff628b42e30 ?uncaught_exception@std@ 1117 7ff628b42e43 ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@ 1116->1117 1118 7ff628b42e4d 1116->1118 1117->1118 1119 7ff628b410b0 __std_exception_copy 1129 7ff628b44050 1130 7ff628b44098 1129->1130 1131 7ff628b44061 1129->1131 1132 7ff628b44093 1131->1132 1133 7ff628b4408c _invalid_parameter_noinfo_noreturn 1131->1133 1134 7ff628b42ed0 free 1132->1134 1133->1132 1134->1130 1151 7ff628b42df0 ?widen@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBADD ?put@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@D ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12 1152 7ff628b434f0 1156 7ff628b43b74 SetUnhandledExceptionFilter 1152->1156 1157 7ff628b41070 1158 7ff628b41088 1157->1158 1159 7ff628b41092 1157->1159 1160 7ff628b42ed0 free 1158->1160 1160->1159 1060 9c38f0ea2b HttpOpenRequestA 1061 9c38f0ea52 1060->1061

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 0 7ff628b42890-7ff628b4292d memcpy 1 7ff628b42930-7ff628b42937 0->1 1->1 2 7ff628b42939-7ff628b42946 1->2 3 7ff628b4294c-7ff628b42952 2->3 4 7ff628b42c21-7ff628b42c26 call 7ff628b41250 2->4 6 7ff628b42980-7ff628b4298a 3->6 7 7ff628b42954-7ff628b4297b memcpy 3->7 14 7ff628b42c27-7ff628b42c2f call 7ff628b411b0 4->14 9 7ff628b429b9-7ff628b429cf 6->9 10 7ff628b4298c-7ff628b42996 6->10 8 7ff628b42a1b-7ff628b42a3d call 7ff628b41a40 7->8 23 7ff628b42a71-7ff628b42a8e memset 8->23 24 7ff628b42a3f-7ff628b42a51 8->24 15 7ff628b429d6-7ff628b429dd 9->15 16 7ff628b429d1-7ff628b429d4 9->16 13 7ff628b4299a-7ff628b429a5 call 7ff628b431a4 10->13 31 7ff628b42be7-7ff628b42bed _invalid_parameter_noinfo_noreturn 13->31 32 7ff628b429ab-7ff628b429b7 13->32 21 7ff628b429df-7ff628b429e6 15->21 22 7ff628b429ee-7ff628b429f3 call 7ff628b431a4 15->22 20 7ff628b429f6-7ff628b42a17 memcpy 16->20 20->8 21->14 27 7ff628b429ec 21->27 22->20 33 7ff628b42ac6-7ff628b42ade memset 23->33 34 7ff628b42a90-7ff628b42a9c 23->34 29 7ff628b42a6c call 7ff628b42ed0 24->29 30 7ff628b42a53-7ff628b42a66 24->30 27->13 29->23 30->29 30->31 39 7ff628b42bee call 7ff628b42ed0 31->39 32->20 38 7ff628b42ae0-7ff628b42ae7 33->38 37 7ff628b42aa0-7ff628b42ac4 34->37 37->33 37->37 38->38 40 7ff628b42ae9-7ff628b42aec 38->40 42 7ff628b42bf3-7ff628b42c20 call 7ff628b42eb0 39->42 43 7ff628b42b79-7ff628b42bbc LoadLibraryA VirtualProtect CertEnumSystemStore 40->43 44 7ff628b42af2-7ff628b42afe 40->44 43->42 46 7ff628b42bbe-7ff628b42bd0 43->46 47 7ff628b42b00-7ff628b42b0f 44->47 46->39 49 7ff628b42bd2-7ff628b42be5 46->49 50 7ff628b42b17-7ff628b42b1d 47->50 51 7ff628b42b11-7ff628b42b15 47->51 49->31 49->39 52 7ff628b42b1f-7ff628b42b23 50->52 53 7ff628b42b25-7ff628b42b2b 50->53 54 7ff628b42b31-7ff628b42b40 51->54 52->54 53->54 55 7ff628b42b2d 53->55 56 7ff628b42b48-7ff628b42b4e 54->56 57 7ff628b42b42-7ff628b42b46 54->57 55->54 59 7ff628b42b56-7ff628b42b5c 56->59 60 7ff628b42b50-7ff628b42b54 56->60 58 7ff628b42b62-7ff628b42b77 57->58 58->43 58->47 59->58 61 7ff628b42b5e 59->61 60->58 61->58
            APIs
            Strings
            • kernel32.dll, xrefs: 00007FF628B42B79
            • fTk0IXs+RsZrY9epOUeq1oQ0l4RoVPjlVJoEuMX3zPeE+je8GdHrJUcxFZpepdr4SDRVKa6s7ouAvVNOqjbmDXauHJGPlOuvClVpjZvRyLdC2d6h5WF7twqC1kX9nIKWgL9KaawEYPrhgpcPJeSSnLatPbvLnYxgng2QCJQ8DmxkwRBosnzlWeW39pnWOJcwZvMht1Ue7ys35aku9WPa2jr1RTE8qRhrprEAHTM+xpPpcOmcTSt4aUDyEbOtWv6EV/1G, xrefs: 00007FF628B428CB
            Memory Dump Source
            • Source File: 00000000.00000002.2278488279.00007FF628B41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF628B40000, based on PE: true
            • Associated: 00000000.00000002.2278464273.00007FF628B40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2278512992.00007FF628B45000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2278538193.00007FF628B4B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2278559128.00007FF628B4C000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff628b40000_2PSj0qX4W6.jbxd
            Similarity
            • API ID: memcpy$memset$CertConcurrency::cancel_current_taskEnumLibraryLoadProtectStoreSystemVirtual_invalid_parameter_noinfo_noreturnmalloc
            • String ID: fTk0IXs+RsZrY9epOUeq1oQ0l4RoVPjlVJoEuMX3zPeE+je8GdHrJUcxFZpepdr4SDRVKa6s7ouAvVNOqjbmDXauHJGPlOuvClVpjZvRyLdC2d6h5WF7twqC1kX9nIKWgL9KaawEYPrhgpcPJeSSnLatPbvLnYxgng2QCJQ8DmxkwRBosnzlWeW39pnWOJcwZvMht1Ue7ys35aku9WPa2jr1RTE8qRhrprEAHTM+xpPpcOmcTSt4aUDyEbOtWv6EV/1G$kernel32.dll
            • API String ID: 150564791-1552992655
            • Opcode ID: ffa8f0ba843f4013f44525dfc9840ffd1d381b7730647cc0e71a19c35832ef2a
            • Instruction ID: 6a227d6ccf3f123da0e50f0e56d1fc82c8e9a0bfc434b3bbfc264d5fdcfff427
            • Opcode Fuzzy Hash: ffa8f0ba843f4013f44525dfc9840ffd1d381b7730647cc0e71a19c35832ef2a
            • Instruction Fuzzy Hash: CCA1D522E18A8685EE20CB34DC513BD6361FB867A5F44023BDA9D836D6DF3CE149D709

            Control-flow Graph

            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2278488279.00007FF628B41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF628B40000, based on PE: true
            • Associated: 00000000.00000002.2278464273.00007FF628B40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2278512992.00007FF628B45000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2278538193.00007FF628B4B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2278559128.00007FF628B4C000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff628b40000_2PSj0qX4W6.jbxd
            Similarity
            • API ID: __p___argc__p___argv__scrt_acquire_startup_lock__scrt_release_startup_lock_cexit_exit_get_initial_narrow_environment_register_thread_local_exe_atexit_callback
            • String ID:
            • API String ID: 1133592946-0
            • Opcode ID: df102f85938d3cac35a7069fa22ae6c53ea1cb25a1aa4727b64a6a950befc1c6
            • Instruction ID: ec96a6c94ec571bc10d3196c56eb95cff6652ada3d1f886a0007805566bcc829
            • Opcode Fuzzy Hash: df102f85938d3cac35a7069fa22ae6c53ea1cb25a1aa4727b64a6a950befc1c6
            • Instruction Fuzzy Hash: FC31F911A0C50342EE14AB35BD73BBD6691AFCA786F5C403FDA4E872D3DE2DE405824A

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 113 9c38f0ea2b-9c38f0ea51 HttpOpenRequestA 114 9c38f0ea52-9c38f0ea8e 113->114 117 9c38f0ec31-9c38f0ec52 114->117 118 9c38f0ea94-9c38f0ea97 114->118 122 9c38f0ec54-9c38f0ec71 117->122 119 9c38f0ea9d 118->119 120 9c38f0ec29-9c38f0ec2a 118->120 119->114 120->117 122->120 124 9c38f0ec73-9c38f0ec7b 122->124 124->122 125 9c38f0ec7d-9c38f0ec87 124->125
            APIs
            • HttpOpenRequestA.WININET(00000000,00000000,84C03200,00000000), ref: 0000009C38F0EA46
            Strings
            Memory Dump Source
            • Source File: 00000000.00000002.2277720966.0000009C38F0E000.00000040.00000010.00020000.00000000.sdmp, Offset: 0000009C38F0E000, based on PE: false
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_9c38f0e000_2PSj0qX4W6.jbxd
            Yara matches
            Similarity
            • API ID: HttpOpenRequest
            • String ID: U.;
            • API String ID: 1984915467-4213443877
            • Opcode ID: ab09341529980e95ac1e803047b3985bc20a26ea9b837d55d995e7e224907264
            • Instruction ID: 719451cd09982e1b2262eb2799ab56f9776b05cb32f08330fa00311705b80971
            • Opcode Fuzzy Hash: ab09341529980e95ac1e803047b3985bc20a26ea9b837d55d995e7e224907264
            • Instruction Fuzzy Hash: EE114CA034890D1BFA18519D7C56B7621CAD7DC759F24C12FB55EC33D6DC648C82815A

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 126 7ff628b417b0-7ff628b417df 127 7ff628b417e0-7ff628b417e7 126->127 127->127 128 7ff628b417e9-7ff628b417f6 127->128 129 7ff628b417fc-7ff628b41800 128->129 130 7ff628b418c2-7ff628b418c7 call 7ff628b41250 128->130 132 7ff628b4181f-7ff628b41829 129->132 133 7ff628b41802-7ff628b4181a memcpy 129->133 139 7ff628b418c8-7ff628b418f9 call 7ff628b411b0 130->139 135 7ff628b4182b-7ff628b41835 132->135 136 7ff628b41854-7ff628b4186a 132->136 134 7ff628b418ac-7ff628b418c1 133->134 138 7ff628b41839-7ff628b41844 call 7ff628b431a4 135->138 140 7ff628b4186c-7ff628b41873 136->140 141 7ff628b4188f-7ff628b418a8 memcpy 136->141 150 7ff628b41846-7ff628b41852 138->150 151 7ff628b41880-7ff628b41886 _invalid_parameter_noinfo_noreturn 138->151 154 7ff628b418ff-7ff628b41920 139->154 155 7ff628b41a25-7ff628b41a2a call 7ff628b41250 139->155 144 7ff628b41887-7ff628b4188c call 7ff628b431a4 140->144 145 7ff628b41875-7ff628b4187c 140->145 141->134 144->141 145->139 148 7ff628b4187e 145->148 148->138 150->141 151->144 157 7ff628b41966-7ff628b41970 154->157 158 7ff628b41922-7ff628b41931 154->158 163 7ff628b41a2b-7ff628b41a30 call 7ff628b411b0 155->163 161 7ff628b41974-7ff628b4197f call 7ff628b431a4 157->161 158->157 160 7ff628b41933-7ff628b41948 158->160 164 7ff628b4194a-7ff628b4194c 160->164 165 7ff628b4194e-7ff628b41955 160->165 171 7ff628b41981-7ff628b4198d 161->171 172 7ff628b419ee-7ff628b419f4 _invalid_parameter_noinfo_noreturn 161->172 170 7ff628b41997-7ff628b419a9 164->170 168 7ff628b41957-7ff628b4195e 165->168 169 7ff628b4198f-7ff628b41994 call 7ff628b431a4 165->169 168->163 175 7ff628b41964 168->175 169->170 176 7ff628b419ab-7ff628b419ca memcpy 170->176 177 7ff628b419f5-7ff628b41a01 memcpy 170->177 171->170 172->177 175->161 180 7ff628b419cc-7ff628b419df 176->180 181 7ff628b419e4-7ff628b419ec call 7ff628b42ed0 176->181 179 7ff628b41a06-7ff628b41a24 177->179 180->172 182 7ff628b419e1 180->182 181->179 182->181
            APIs
            • memcpy.VCRUNTIME140(00000000,?,?,00007FF628B42807), ref: 00007FF628B41811
            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(00000000,?,?,00007FF628B42807), ref: 00007FF628B41880
              • Part of subcall function 00007FF628B431A4: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF628B4100E), ref: 00007FF628B431BE
            • memcpy.VCRUNTIME140(00000000,?,?,00007FF628B42807), ref: 00007FF628B418A3
            • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF628B418C8
            • memcpy.VCRUNTIME140(?,?,?,?,?,?,?,?,00007FF628B42807), ref: 00007FF628B419B1
            • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,00007FF628B42807), ref: 00007FF628B419EE
            • memcpy.VCRUNTIME140(?,?,?,?,?,?,?,?,00007FF628B42807), ref: 00007FF628B419F8
            • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF628B41A2B
              • Part of subcall function 00007FF628B431A4: Concurrency::cancel_current_task.LIBCPMT ref: 00007FF628B431D4
              • Part of subcall function 00007FF628B431A4: Concurrency::cancel_current_task.LIBCPMT ref: 00007FF628B431DA
            Memory Dump Source
            • Source File: 00000000.00000002.2278488279.00007FF628B41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF628B40000, based on PE: true
            • Associated: 00000000.00000002.2278464273.00007FF628B40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2278512992.00007FF628B45000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2278538193.00007FF628B4B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2278559128.00007FF628B4C000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff628b40000_2PSj0qX4W6.jbxd
            Similarity
            • API ID: Concurrency::cancel_current_taskmemcpy$_invalid_parameter_noinfo_noreturn$malloc
            • String ID:
            • API String ID: 1057630676-0
            • Opcode ID: 464bffc901c1c071010548c694ba76aea8e22709931f1539bc19d3fd378ea19e
            • Instruction ID: 6aa0b68bae8282b2979f786b23b2fc0db4a41d3b23c12f567182ebd3836ca9e7
            • Opcode Fuzzy Hash: 464bffc901c1c071010548c694ba76aea8e22709931f1539bc19d3fd378ea19e
            • Instruction Fuzzy Hash: 05A22772A182D14AEB258F399C512FE7BA1F78678AF44413ADB9D97785CE3CE601C700

            Control-flow Graph

            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2278488279.00007FF628B41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF628B40000, based on PE: true
            • Associated: 00000000.00000002.2278464273.00007FF628B40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2278512992.00007FF628B45000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2278538193.00007FF628B4B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2278559128.00007FF628B4C000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff628b40000_2PSj0qX4W6.jbxd
            Similarity
            • API ID: ExceptionFilterPresentUnhandledmemset$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
            • String ID:
            • API String ID: 313767242-0
            • Opcode ID: f2aa790f9085783cc2a9030d909d546b5d07370b2f8c6efc4ec764b99a8b9c54
            • Instruction ID: 0bd409626d87da3cbedb90302656c3637975ef0f0a5bce7900cfbcc01228ef9b
            • Opcode Fuzzy Hash: f2aa790f9085783cc2a9030d909d546b5d07370b2f8c6efc4ec764b99a8b9c54
            • Instruction Fuzzy Hash: 22315A76608B818AEB608F60EC617ED7360FB89705F48403ADA4E87B99EF38D548C715

            Control-flow Graph

            APIs
            Memory Dump Source
            • Source File: 00000000.00000002.2278488279.00007FF628B41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF628B40000, based on PE: true
            • Associated: 00000000.00000002.2278464273.00007FF628B40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2278512992.00007FF628B45000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2278538193.00007FF628B4B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2278559128.00007FF628B4C000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff628b40000_2PSj0qX4W6.jbxd
            Similarity
            • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
            • String ID:
            • API String ID: 2933794660-0
            • Opcode ID: 0276672fa070bc2c4ef3fd86ef9fb26e19d7fbff92688fdf569c2d60a7172a23
            • Instruction ID: 6c7eb376790cde60ee52a7f06649c4678f211633f42089957a1a1e571b7d76db
            • Opcode Fuzzy Hash: 0276672fa070bc2c4ef3fd86ef9fb26e19d7fbff92688fdf569c2d60a7172a23
            • Instruction Fuzzy Hash: 30114C26B14F058AEF00CB70EC652AC33A4FB5A759F440E36DA6D827A5DF38D1588380
            Memory Dump Source
            • Source File: 00000000.00000002.2278488279.00007FF628B41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF628B40000, based on PE: true
            • Associated: 00000000.00000002.2278464273.00007FF628B40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2278512992.00007FF628B45000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2278538193.00007FF628B4B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2278559128.00007FF628B4C000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff628b40000_2PSj0qX4W6.jbxd
            Similarity
            • API ID:
            • String ID:
            • API String ID:
            • Opcode ID: 461e366995084b33554bdb7452efeaf27cd1e663f7dc700abdf8bff6f2843dad
            • Instruction ID: 4d9b62b4b70fa6d3bad4803ec85360e774e0bc7deec4929e473d9de07f1ad72d
            • Opcode Fuzzy Hash: 461e366995084b33554bdb7452efeaf27cd1e663f7dc700abdf8bff6f2843dad
            • Instruction Fuzzy Hash: 34A00129908D06D0EE198B60AD625286220ABAA322B59003AD00D811619E2CA948824A

            Control-flow Graph

            • Executed
            • Not Executed
            control_flow_graph 185 7ff628b42c30-7ff628b42c60 186 7ff628b42c68 185->186 187 7ff628b42c62-7ff628b42c66 185->187 188 7ff628b42c6a-7ff628b42c7a 186->188 187->188 189 7ff628b42c7c-7ff628b42c82 188->189 190 7ff628b42c83-7ff628b42c95 ?good@ios_base@std@@QEBA_NXZ 188->190 189->190 191 7ff628b42cc7-7ff628b42ccd 190->191 192 7ff628b42c97-7ff628b42ca6 190->192 195 7ff628b42cd9-7ff628b42cec 191->195 196 7ff628b42ccf-7ff628b42cd4 191->196 193 7ff628b42ca8-7ff628b42cab 192->193 194 7ff628b42cc5 192->194 193->194 198 7ff628b42cad-7ff628b42cc3 ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ ?good@ios_base@std@@QEBA_NXZ 193->198 194->191 200 7ff628b42d1d-7ff628b42d40 ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z 195->200 201 7ff628b42cee 195->201 199 7ff628b42d8f-7ff628b42dad ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z ?uncaught_exception@std@@YA_NXZ 196->199 198->191 202 7ff628b42db9-7ff628b42dc8 199->202 203 7ff628b42daf-7ff628b42db8 ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ 199->203 205 7ff628b42d68 200->205 206 7ff628b42d42-7ff628b42d45 200->206 204 7ff628b42cf0-7ff628b42cf3 201->204 208 7ff628b42dca-7ff628b42dd0 202->208 209 7ff628b42dd1-7ff628b42de1 202->209 203->202 204->200 210 7ff628b42cf5-7ff628b42d0f ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z 204->210 207 7ff628b42d6b 205->207 211 7ff628b42d47-7ff628b42d61 ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z 206->211 212 7ff628b42d6f-7ff628b42d7f 206->212 207->212 208->209 213 7ff628b42d18-7ff628b42d1b 210->213 214 7ff628b42d11-7ff628b42d16 210->214 211->205 215 7ff628b42d63-7ff628b42d66 211->215 212->199 213->204 214->207 215->206
            APIs
            • ?good@ios_base@std@@QEBA_NXZ.MSVCP140(?,?,?,?,00000001,00007FF628B427E7), ref: 00007FF628B42C8D
            • ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ.MSVCP140(?,?,?,?,00000001,00007FF628B427E7), ref: 00007FF628B42CAD
            • ?good@ios_base@std@@QEBA_NXZ.MSVCP140(?,?,?,?,00000001,00007FF628B427E7), ref: 00007FF628B42CBD
            • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140(?,?,?,?,00000001,00007FF628B427E7), ref: 00007FF628B42D06
            • ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z.MSVCP140(?,?,?,?,00000001,00007FF628B427E7), ref: 00007FF628B42D36
            • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140(?,?,?,?,00000001,00007FF628B427E7), ref: 00007FF628B42D58
            • ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z.MSVCP140(?,?,?,?,00000001,00007FF628B427E7), ref: 00007FF628B42D9E
            • ?uncaught_exception@std@@YA_NXZ.MSVCP140(?,?,?,?,00000001,00007FF628B427E7), ref: 00007FF628B42DA5
            • ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ.MSVCP140(?,?,?,?,00000001,00007FF628B427E7), ref: 00007FF628B42DB2
            Memory Dump Source
            • Source File: 00000000.00000002.2278488279.00007FF628B41000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF628B40000, based on PE: true
            • Associated: 00000000.00000002.2278464273.00007FF628B40000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2278512992.00007FF628B45000.00000002.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2278538193.00007FF628B4B000.00000004.00000001.01000000.00000003.sdmpDownload File
            • Associated: 00000000.00000002.2278559128.00007FF628B4C000.00000002.00000001.01000000.00000003.sdmpDownload File
            Joe Sandbox IDA Plugin
            • Snapshot File: hcaresult_0_2_7ff628b40000_2PSj0qX4W6.jbxd
            Similarity
            • API ID: D@std@@@std@@U?$char_traits@$?good@ios_base@std@@?sputc@?$basic_streambuf@$?flush@?$basic_ostream@?setstate@?$basic_ios@?sputn@?$basic_streambuf@?uncaught_exception@std@@Osfx@?$basic_ostream@V12@
            • String ID:
            • API String ID: 3274656010-0
            • Opcode ID: 1c69fbfb43a822db2c1053205ed4b05eb2a64257830f85884b741cf852c91941
            • Instruction ID: a7d8f292d3bc85e3679484d357668c308f5159dbc559112d17e9adb8a0087b26
            • Opcode Fuzzy Hash: 1c69fbfb43a822db2c1053205ed4b05eb2a64257830f85884b741cf852c91941
            • Instruction Fuzzy Hash: C5512236A08A4181EF208F29DDA123CA760EFC6F92B55C537CA5E837A1CF7ED4459349