Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
2PSj0qX4W6.exe

Overview

General Information

Sample name:2PSj0qX4W6.exe
renamed because original name is a hash value
Original sample name:31a89af6712da7bd56b1033952468302bd0838d48c6712c5499c60178f4d95a3.exe
Analysis ID:1508524
MD5:c92c541048de8be340a990db10e7cbab
SHA1:50f7ef4239b9fd0358b10a8b3106871e2de1fd29
SHA256:31a89af6712da7bd56b1033952468302bd0838d48c6712c5499c60178f4d95a3
Tags:116-198-231-169exe
Infos:

Detection

CobaltStrike, Metasploit
Score:96
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for submitted file
Yara detected CobaltStrike
Yara detected Metasploit Payload
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
AV process strings found (often used to terminate AV products)
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
One or more processes crash
Suricata IDS alerts with low severity for network traffic
Uses code obfuscation techniques (call, push, ret)
Yara signature match

Classification

  • System is w10x64
  • 2PSj0qX4W6.exe (PID: 5840 cmdline: "C:\Users\user\Desktop\2PSj0qX4W6.exe" MD5: C92C541048DE8BE340A990DB10E7CBAB)
    • WerFault.exe (PID: 5492 cmdline: C:\Windows\system32\WerFault.exe -u -p 5840 -s 1196 MD5: FD27D9F6D02763BDE32511B5DF7FF7A0)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Cobalt Strike, CobaltStrikeCobalt Strike is a paid penetration testing product that allows an attacker to deploy an agent named 'Beacon' on the victim machine. Beacon includes a wealth of functionality to the attacker, including, but not limited to command execution, key logging, file transfer, SOCKS proxying, privilege escalation, mimikatz, port scanning and lateral movement. Beacon is in-memory/file-less, in that it consists of stageless or multi-stage shellcode that once loaded by exploiting a vulnerability or executing a shellcode loader, will reflectively load itself into the memory of a process without touching the disk. It supports C2 and staging over HTTP, HTTPS, DNS, SMB named pipes as well as forward and reverse TCP; Beacons can be daisy-chained. Cobalt Strike comes with a toolkit for developing shellcode loaders, called Artifact Kit.The Beacon implant has become popular amongst targeted attackers and criminal users as it is well written, stable, and highly customizable.
  • APT 29
  • APT32
  • APT41
  • AQUATIC PANDA
  • Anunak
  • Cobalt
  • Codoso
  • CopyKittens
  • DarkHydrus
  • FIN6
  • FIN7
  • Leviathan
  • Mustang Panda
  • Shell Crew
  • Stone Panda
  • TianWu
  • UNC1878
  • UNC2452
  • Winnti Umbrella
https://malpedia.caad.fkie.fraunhofer.de/details/win.cobalt_strike
{"C2Server": "http://116.198.231.169:63222/jquery-3.3.2.slim.min.js", "User Agent": "User-Agent: Mozilla/5.0 (Windows NT 6.3; Trident/7.0; rv:11.0) like Gecko\r\n"}
{"Headers": "Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8\r\nAccept-Language: en-US,en;q=0.5\r\nReferer: http://code.jquery.com/\r\nAccept-Encoding: gzip, deflate\r\nUser-Agent: Mozilla/5.0 (Windows NT 6.3; Trident/7.0; rv:11.0) like Gecko\r\n", "Type": "Metasploit Download", "URL": "http://116.198.231.169/jquery-3.3.2.slim.min.js"}
SourceRuleDescriptionAuthorStrings
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE651.tmp.dmpWindows_Trojan_Metasploit_7bc0f998Identifies the API address lookup function leverage by metasploit shellcodeunknown
  • 0xeeb1:$a1: 48 31 D2 65 48 8B 52 60 48 8B 52 18 48 8B 52 20 48 8B 72 50 48 0F B7 4A 4A 4D 31 C9 48 31 C0 AC 3C 61
C:\ProgramData\Microsoft\Windows\WER\Temp\WERE651.tmp.dmpWindows_Trojan_Metasploit_c9773203Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families.unknown
  • 0xef1d:$a: 48 31 C0 AC 41 C1 C9 0D 41 01 C1 38 E0 75 F1 4C 03 4C 24 08 45 39 D1
SourceRuleDescriptionAuthorStrings
00000000.00000002.2896570979.0000006751CFE000.00000040.00000010.00020000.00000000.sdmpJoeSecurity_MetasploitPayload_3Yara detected Metasploit PayloadJoe Security
    00000000.00000002.2896570979.0000006751CFE000.00000040.00000010.00020000.00000000.sdmpJoeSecurity_CobaltStrike_3Yara detected CobaltStrikeJoe Security
      00000000.00000002.2896570979.0000006751CFE000.00000040.00000010.00020000.00000000.sdmpWindows_Trojan_Metasploit_7bc0f998Identifies the API address lookup function leverage by metasploit shellcodeunknown
      • 0xa81:$a1: 48 31 D2 65 48 8B 52 60 48 8B 52 18 48 8B 52 20 48 8B 72 50 48 0F B7 4A 4A 4D 31 C9 48 31 C0 AC 3C 61
      00000000.00000002.2896570979.0000006751CFE000.00000040.00000010.00020000.00000000.sdmpWindows_Trojan_Metasploit_c9773203Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families.unknown
      • 0xaed:$a: 48 31 C0 AC 41 C1 C9 0D 41 01 C1 38 E0 75 F1 4C 03 4C 24 08 45 39 D1
      No Sigma rule has matched
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-09-10T10:59:33.655829+020020287653Unknown Traffic192.168.2.649710116.198.231.16963222TCP
      2024-09-10T10:59:37.773973+020020287653Unknown Traffic192.168.2.649714116.198.231.16963222TCP
      2024-09-10T10:59:41.893384+020020287653Unknown Traffic192.168.2.649718116.198.231.16963222TCP
      2024-09-10T10:59:46.078353+020020287653Unknown Traffic192.168.2.649721116.198.231.16963222TCP
      2024-09-10T10:59:50.311099+020020287653Unknown Traffic192.168.2.649729116.198.231.16963222TCP
      2024-09-10T10:59:54.409893+020020287653Unknown Traffic192.168.2.649733116.198.231.16963222TCP
      2024-09-10T10:59:58.570098+020020287653Unknown Traffic192.168.2.649736116.198.231.16963222TCP
      2024-09-10T11:00:02.676980+020020287653Unknown Traffic192.168.2.649739116.198.231.16963222TCP
      2024-09-10T11:00:06.754121+020020287653Unknown Traffic192.168.2.649743116.198.231.16963222TCP
      2024-09-10T11:00:10.906680+020020287653Unknown Traffic192.168.2.649746116.198.231.16963222TCP

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: 2PSj0qX4W6.exeAvira: detected
      Source: 00000000.00000002.2896570979.0000006751CFE000.00000040.00000010.00020000.00000000.sdmpMalware Configuration Extractor: CobaltStrike {"C2Server": "http://116.198.231.169:63222/jquery-3.3.2.slim.min.js", "User Agent": "User-Agent: Mozilla/5.0 (Windows NT 6.3; Trident/7.0; rv:11.0) like Gecko\r\n"}
      Source: 00000000.00000002.2896570979.0000006751CFE000.00000040.00000010.00020000.00000000.sdmpMalware Configuration Extractor: Metasploit {"Headers": "Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8\r\nAccept-Language: en-US,en;q=0.5\r\nReferer: http://code.jquery.com/\r\nAccept-Encoding: gzip, deflate\r\nUser-Agent: Mozilla/5.0 (Windows NT 6.3; Trident/7.0; rv:11.0) like Gecko\r\n", "Type": "Metasploit Download", "URL": "http://116.198.231.169/jquery-3.3.2.slim.min.js"}
      Source: 2PSj0qX4W6.exeReversingLabs: Detection: 50%
      Source: 2PSj0qX4W6.exeVirustotal: Detection: 43%Perma Link
      Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.2% probability
      Source: 2PSj0qX4W6.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
      Source: Binary string: \ConsoleApplication3\x64\Release\ConsoleApplication3.pdb source: 2PSj0qX4W6.exe
      Source: Binary string: \ConsoleApplication3\x64\Release\ConsoleApplication3.pdb(( source: 2PSj0qX4W6.exe

      Networking

      barindex
      Source: Malware configuration extractorURLs: http://116.198.231.169:63222/jquery-3.3.2.slim.min.js
      Source: Malware configuration extractorURLs: http://116.198.231.169/jquery-3.3.2.slim.min.js
      Source: global trafficTCP traffic: 192.168.2.6:49710 -> 116.198.231.169:63222
      Source: Joe Sandbox ViewIP Address: 116.198.231.169 116.198.231.169
      Source: Joe Sandbox ViewASN Name: CHINATELECOM-JIANGSU-SUQIAN-IDCCHINATELECOMJiangsuSuqian CHINATELECOM-JIANGSU-SUQIAN-IDCCHINATELECOMJiangsuSuqian
      Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.6:49710 -> 116.198.231.169:63222
      Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.6:49746 -> 116.198.231.169:63222
      Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.6:49714 -> 116.198.231.169:63222
      Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.6:49729 -> 116.198.231.169:63222
      Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.6:49733 -> 116.198.231.169:63222
      Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.6:49721 -> 116.198.231.169:63222
      Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.6:49736 -> 116.198.231.169:63222
      Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.6:49743 -> 116.198.231.169:63222
      Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.6:49718 -> 116.198.231.169:63222
      Source: Network trafficSuricata IDS: 2028765 - Severity 3 - ET JA3 Hash - [Abuse.ch] Possible Dridex : 192.168.2.6:49739 -> 116.198.231.169:63222
      Source: unknownTCP traffic detected without corresponding DNS query: 116.198.231.169
      Source: unknownTCP traffic detected without corresponding DNS query: 116.198.231.169
      Source: unknownTCP traffic detected without corresponding DNS query: 116.198.231.169
      Source: unknownTCP traffic detected without corresponding DNS query: 116.198.231.169
      Source: unknownTCP traffic detected without corresponding DNS query: 116.198.231.169
      Source: unknownTCP traffic detected without corresponding DNS query: 116.198.231.169
      Source: unknownTCP traffic detected without corresponding DNS query: 116.198.231.169
      Source: unknownTCP traffic detected without corresponding DNS query: 116.198.231.169
      Source: unknownTCP traffic detected without corresponding DNS query: 116.198.231.169
      Source: unknownTCP traffic detected without corresponding DNS query: 116.198.231.169
      Source: unknownTCP traffic detected without corresponding DNS query: 116.198.231.169
      Source: unknownTCP traffic detected without corresponding DNS query: 116.198.231.169
      Source: unknownTCP traffic detected without corresponding DNS query: 116.198.231.169
      Source: unknownTCP traffic detected without corresponding DNS query: 116.198.231.169
      Source: unknownTCP traffic detected without corresponding DNS query: 116.198.231.169
      Source: unknownTCP traffic detected without corresponding DNS query: 116.198.231.169
      Source: unknownTCP traffic detected without corresponding DNS query: 116.198.231.169
      Source: unknownTCP traffic detected without corresponding DNS query: 116.198.231.169
      Source: unknownTCP traffic detected without corresponding DNS query: 116.198.231.169
      Source: unknownTCP traffic detected without corresponding DNS query: 116.198.231.169
      Source: unknownTCP traffic detected without corresponding DNS query: 116.198.231.169
      Source: unknownTCP traffic detected without corresponding DNS query: 116.198.231.169
      Source: unknownTCP traffic detected without corresponding DNS query: 116.198.231.169
      Source: unknownTCP traffic detected without corresponding DNS query: 116.198.231.169
      Source: unknownTCP traffic detected without corresponding DNS query: 116.198.231.169
      Source: unknownTCP traffic detected without corresponding DNS query: 116.198.231.169
      Source: unknownTCP traffic detected without corresponding DNS query: 116.198.231.169
      Source: unknownTCP traffic detected without corresponding DNS query: 116.198.231.169
      Source: unknownTCP traffic detected without corresponding DNS query: 116.198.231.169
      Source: unknownTCP traffic detected without corresponding DNS query: 116.198.231.169
      Source: unknownTCP traffic detected without corresponding DNS query: 116.198.231.169
      Source: unknownTCP traffic detected without corresponding DNS query: 116.198.231.169
      Source: unknownTCP traffic detected without corresponding DNS query: 116.198.231.169
      Source: unknownTCP traffic detected without corresponding DNS query: 116.198.231.169
      Source: unknownTCP traffic detected without corresponding DNS query: 116.198.231.169
      Source: unknownTCP traffic detected without corresponding DNS query: 116.198.231.169
      Source: unknownTCP traffic detected without corresponding DNS query: 116.198.231.169
      Source: unknownTCP traffic detected without corresponding DNS query: 116.198.231.169
      Source: unknownTCP traffic detected without corresponding DNS query: 116.198.231.169
      Source: unknownTCP traffic detected without corresponding DNS query: 116.198.231.169
      Source: unknownTCP traffic detected without corresponding DNS query: 116.198.231.169
      Source: unknownTCP traffic detected without corresponding DNS query: 116.198.231.169
      Source: unknownTCP traffic detected without corresponding DNS query: 116.198.231.169
      Source: unknownTCP traffic detected without corresponding DNS query: 116.198.231.169
      Source: unknownTCP traffic detected without corresponding DNS query: 116.198.231.169
      Source: unknownTCP traffic detected without corresponding DNS query: 116.198.231.169
      Source: unknownTCP traffic detected without corresponding DNS query: 116.198.231.169
      Source: unknownTCP traffic detected without corresponding DNS query: 116.198.231.169
      Source: unknownTCP traffic detected without corresponding DNS query: 116.198.231.169
      Source: unknownTCP traffic detected without corresponding DNS query: 116.198.231.169
      Source: 2PSj0qX4W6.exe, 00000000.00000002.2896706346.000001C8FE81E000.00000004.00000020.00020000.00000000.sdmp, 2PSj0qX4W6.exe, 00000000.00000003.2425824737.000001C8FE852000.00000004.00000020.00020000.00000000.sdmp, 2PSj0qX4W6.exe, 00000000.00000003.2487535741.000001C8FE852000.00000004.00000020.00020000.00000000.sdmp, 2PSj0qX4W6.exe, 00000000.00000002.2896570979.0000006751CFE000.00000040.00000010.00020000.00000000.sdmp, 2PSj0qX4W6.exe, 00000000.00000003.2466881398.000001C8FE852000.00000004.00000020.00020000.00000000.sdmp, 2PSj0qX4W6.exe, 00000000.00000003.2446877050.000001C8FE852000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://code.jquery.com/
      Source: Amcache.hve.7.drString found in binary or memory: http://upx.sf.net
      Source: 2PSj0qX4W6.exe, 00000000.00000002.2896706346.000001C8FE81E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://116.198.231.169/
      Source: 2PSj0qX4W6.exe, 00000000.00000002.2896706346.000001C8FE7CC000.00000004.00000020.00020000.00000000.sdmp, 2PSj0qX4W6.exe, 00000000.00000002.2896706346.000001C8FE803000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://116.198.231.169:63222/
      Source: 2PSj0qX4W6.exe, 00000000.00000002.2896706346.000001C8FE803000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://116.198.231.169:63222/7
      Source: 2PSj0qX4W6.exe, 00000000.00000002.2896706346.000001C8FE803000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://116.198.231.169:63222/ft
      Source: 2PSj0qX4W6.exe, 00000000.00000002.2896706346.000001C8FE7CC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://116.198.231.169:63222/jquery-3.3.2.slim.min.js
      Source: 2PSj0qX4W6.exe, 00000000.00000002.2896706346.000001C8FE7CC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://116.198.231.169:63222/jquery-3.3.2.slim.min.jsUb
      Source: 2PSj0qX4W6.exe, 00000000.00000002.2896706346.000001C8FE803000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://116.198.231.169:63222/ocal

      System Summary

      barindex
      Source: 00000000.00000002.2896570979.0000006751CFE000.00000040.00000010.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies the API address lookup function leverage by metasploit shellcode Author: unknown
      Source: 00000000.00000002.2896570979.0000006751CFE000.00000040.00000010.00020000.00000000.sdmp, type: MEMORYMatched rule: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families. Author: unknown
      Source: C:\ProgramData\Microsoft\Windows\WER\Temp\WERE651.tmp.dmp, type: DROPPEDMatched rule: Identifies the API address lookup function leverage by metasploit shellcode Author: unknown
      Source: C:\ProgramData\Microsoft\Windows\WER\Temp\WERE651.tmp.dmp, type: DROPPEDMatched rule: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families. Author: unknown
      Source: C:\Users\user\Desktop\2PSj0qX4W6.exeCode function: 0_2_00007FF77CA517B00_2_00007FF77CA517B0
      Source: C:\Users\user\Desktop\2PSj0qX4W6.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 5840 -s 1196
      Source: 00000000.00000002.2896570979.0000006751CFE000.00000040.00000010.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_7bc0f998 os = windows, severity = x86, description = Identifies the API address lookup function leverage by metasploit shellcode, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = fdb5c665503f07b2fc1ed7e4e688295e1222a500bfb68418661db60c8e75e835, id = 7bc0f998-7014-4883-8a56-d5ee00c15aed, last_modified = 2021-08-23
      Source: 00000000.00000002.2896570979.0000006751CFE000.00000040.00000010.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Metasploit_c9773203 os = windows, severity = x86, description = Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., creation_date = 2021-04-07, scan_context = file, memory, reference = https://github.com/rapid7/metasploit-framework/blob/04e8752b9b74cbaad7cb0ea6129c90e3172580a2/external/source/shellcode/windows/x64/src/block/block_api.asm, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = afde93eeb14b4d0c182f475a22430f101394938868741ffa06445e478b6ece36, id = c9773203-6d1e-4246-a1e0-314217e0207a, last_modified = 2021-08-23
      Source: C:\ProgramData\Microsoft\Windows\WER\Temp\WERE651.tmp.dmp, type: DROPPEDMatched rule: Windows_Trojan_Metasploit_7bc0f998 os = windows, severity = x86, description = Identifies the API address lookup function leverage by metasploit shellcode, creation_date = 2021-03-23, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = fdb5c665503f07b2fc1ed7e4e688295e1222a500bfb68418661db60c8e75e835, id = 7bc0f998-7014-4883-8a56-d5ee00c15aed, last_modified = 2021-08-23
      Source: C:\ProgramData\Microsoft\Windows\WER\Temp\WERE651.tmp.dmp, type: DROPPEDMatched rule: Windows_Trojan_Metasploit_c9773203 os = windows, severity = x86, description = Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., creation_date = 2021-04-07, scan_context = file, memory, reference = https://github.com/rapid7/metasploit-framework/blob/04e8752b9b74cbaad7cb0ea6129c90e3172580a2/external/source/shellcode/windows/x64/src/block/block_api.asm, license = Elastic License v2, threat_name = Windows.Trojan.Metasploit, fingerprint = afde93eeb14b4d0c182f475a22430f101394938868741ffa06445e478b6ece36, id = c9773203-6d1e-4246-a1e0-314217e0207a, last_modified = 2021-08-23
      Source: classification engineClassification label: mal96.troj.winEXE@2/5@0/1
      Source: C:\Windows\System32\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess5840
      Source: C:\Windows\System32\WerFault.exeFile created: C:\ProgramData\Microsoft\Windows\WER\Temp\757974aa-b1eb-48d5-a47b-6a157b07f2c8Jump to behavior
      Source: 2PSj0qX4W6.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: C:\Users\user\Desktop\2PSj0qX4W6.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: 2PSj0qX4W6.exeReversingLabs: Detection: 50%
      Source: 2PSj0qX4W6.exeVirustotal: Detection: 43%
      Source: unknownProcess created: C:\Users\user\Desktop\2PSj0qX4W6.exe "C:\Users\user\Desktop\2PSj0qX4W6.exe"
      Source: C:\Users\user\Desktop\2PSj0qX4W6.exeProcess created: C:\Windows\System32\WerFault.exe C:\Windows\system32\WerFault.exe -u -p 5840 -s 1196
      Source: C:\Users\user\Desktop\2PSj0qX4W6.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\Desktop\2PSj0qX4W6.exeSection loaded: msvcp140.dllJump to behavior
      Source: C:\Users\user\Desktop\2PSj0qX4W6.exeSection loaded: vcruntime140_1.dllJump to behavior
      Source: C:\Users\user\Desktop\2PSj0qX4W6.exeSection loaded: vcruntime140.dllJump to behavior
      Source: C:\Users\user\Desktop\2PSj0qX4W6.exeSection loaded: vcruntime140.dllJump to behavior
      Source: C:\Users\user\Desktop\2PSj0qX4W6.exeSection loaded: wininet.dllJump to behavior
      Source: C:\Users\user\Desktop\2PSj0qX4W6.exeSection loaded: iertutil.dllJump to behavior
      Source: C:\Users\user\Desktop\2PSj0qX4W6.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Users\user\Desktop\2PSj0qX4W6.exeSection loaded: windows.storage.dllJump to behavior
      Source: C:\Users\user\Desktop\2PSj0qX4W6.exeSection loaded: wldp.dllJump to behavior
      Source: C:\Users\user\Desktop\2PSj0qX4W6.exeSection loaded: profapi.dllJump to behavior
      Source: C:\Users\user\Desktop\2PSj0qX4W6.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\Desktop\2PSj0qX4W6.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
      Source: C:\Users\user\Desktop\2PSj0qX4W6.exeSection loaded: winhttp.dllJump to behavior
      Source: C:\Users\user\Desktop\2PSj0qX4W6.exeSection loaded: mswsock.dllJump to behavior
      Source: C:\Users\user\Desktop\2PSj0qX4W6.exeSection loaded: iphlpapi.dllJump to behavior
      Source: C:\Users\user\Desktop\2PSj0qX4W6.exeSection loaded: winnsi.dllJump to behavior
      Source: C:\Users\user\Desktop\2PSj0qX4W6.exeSection loaded: urlmon.dllJump to behavior
      Source: C:\Users\user\Desktop\2PSj0qX4W6.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Users\user\Desktop\2PSj0qX4W6.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Users\user\Desktop\2PSj0qX4W6.exeSection loaded: schannel.dllJump to behavior
      Source: C:\Users\user\Desktop\2PSj0qX4W6.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
      Source: 2PSj0qX4W6.exeStatic PE information: Image base 0x140000000 > 0x60000000
      Source: 2PSj0qX4W6.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
      Source: 2PSj0qX4W6.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
      Source: 2PSj0qX4W6.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
      Source: 2PSj0qX4W6.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
      Source: 2PSj0qX4W6.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
      Source: 2PSj0qX4W6.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
      Source: 2PSj0qX4W6.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
      Source: 2PSj0qX4W6.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
      Source: Binary string: \ConsoleApplication3\x64\Release\ConsoleApplication3.pdb source: 2PSj0qX4W6.exe
      Source: Binary string: \ConsoleApplication3\x64\Release\ConsoleApplication3.pdb(( source: 2PSj0qX4W6.exe
      Source: 2PSj0qX4W6.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
      Source: 2PSj0qX4W6.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
      Source: 2PSj0qX4W6.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
      Source: 2PSj0qX4W6.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
      Source: 2PSj0qX4W6.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
      Source: C:\Users\user\Desktop\2PSj0qX4W6.exeCode function: 0_2_0000006751CFEB9B push eax; ret 0_2_0000006751CFEDF7
      Source: C:\Users\user\Desktop\2PSj0qX4W6.exeCode function: 0_2_0000006751CFED79 push eax; ret 0_2_0000006751CFEDF7
      Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Windows\System32\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: Amcache.hve.7.drBinary or memory string: VMware
      Source: Amcache.hve.7.drBinary or memory string: VMware Virtual USB Mouse
      Source: 2PSj0qX4W6.exe, 00000000.00000002.2896706346.000001C8FE842000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW{
      Source: Amcache.hve.7.drBinary or memory string: vmci.syshbin
      Source: Amcache.hve.7.drBinary or memory string: VMware, Inc.
      Source: Amcache.hve.7.drBinary or memory string: VMware20,1hbin@
      Source: Amcache.hve.7.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
      Source: Amcache.hve.7.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
      Source: Amcache.hve.7.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
      Source: Amcache.hve.7.drBinary or memory string: VMware-42 27 80 4d 99 30 0e 9c-c1 9b 2a 23 ea 1f c4 20
      Source: 2PSj0qX4W6.exe, 00000000.00000002.2896706346.000001C8FE842000.00000004.00000020.00020000.00000000.sdmp, 2PSj0qX4W6.exe, 00000000.00000002.2896706346.000001C8FE803000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
      Source: Amcache.hve.7.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
      Source: Amcache.hve.7.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
      Source: Amcache.hve.7.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
      Source: Amcache.hve.7.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
      Source: Amcache.hve.7.drBinary or memory string: vmci.sys
      Source: Amcache.hve.7.drBinary or memory string: vmci.syshbin`
      Source: Amcache.hve.7.drBinary or memory string: \driver\vmci,\driver\pci
      Source: Amcache.hve.7.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
      Source: Amcache.hve.7.drBinary or memory string: VMware20,1
      Source: Amcache.hve.7.drBinary or memory string: Microsoft Hyper-V Generation Counter
      Source: Amcache.hve.7.drBinary or memory string: NECVMWar VMware SATA CD00
      Source: Amcache.hve.7.drBinary or memory string: VMware Virtual disk SCSI Disk Device
      Source: Amcache.hve.7.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
      Source: Amcache.hve.7.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
      Source: Amcache.hve.7.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
      Source: Amcache.hve.7.drBinary or memory string: VMware PCI VMCI Bus Device
      Source: Amcache.hve.7.drBinary or memory string: VMware VMCI Bus Device
      Source: Amcache.hve.7.drBinary or memory string: VMware Virtual RAM
      Source: Amcache.hve.7.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
      Source: Amcache.hve.7.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
      Source: C:\Users\user\Desktop\2PSj0qX4W6.exeCode function: 0_2_00007FF77CA539CC IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF77CA539CC
      Source: C:\Users\user\Desktop\2PSj0qX4W6.exeCode function: 0_2_00007FF77CA539CC IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF77CA539CC
      Source: C:\Users\user\Desktop\2PSj0qX4W6.exeCode function: 0_2_00007FF77CA52F04 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF77CA52F04
      Source: C:\Users\user\Desktop\2PSj0qX4W6.exeCode function: 0_2_00007FF77CA53B74 SetUnhandledExceptionFilter,0_2_00007FF77CA53B74
      Source: C:\Users\user\Desktop\2PSj0qX4W6.exeCode function: 0_2_00007FF77CA53BE4 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00007FF77CA53BE4
      Source: Amcache.hve.7.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
      Source: Amcache.hve.7.drBinary or memory string: msmpeng.exe
      Source: Amcache.hve.7.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
      Source: Amcache.hve.7.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
      Source: Amcache.hve.7.drBinary or memory string: MsMpEng.exe

      Remote Access Functionality

      barindex
      Source: Yara matchFile source: 00000000.00000002.2896570979.0000006751CFE000.00000040.00000010.00020000.00000000.sdmp, type: MEMORY
      Source: Yara matchFile source: 00000000.00000002.2896570979.0000006751CFE000.00000040.00000010.00020000.00000000.sdmp, type: MEMORY
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
      DLL Side-Loading
      1
      Process Injection
      1
      Process Injection
      OS Credential Dumping1
      System Time Discovery
      Remote Services1
      Archive Collected Data
      1
      Encrypted Channel
      Exfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
      DLL Side-Loading
      1
      DLL Side-Loading
      LSASS Memory21
      Security Software Discovery
      Remote Desktop ProtocolData from Removable Media1
      Non-Standard Port
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
      Obfuscated Files or Information
      Security Account Manager2
      System Information Discovery
      SMB/Windows Admin SharesData from Network Shared Drive1
      Application Layer Protocol
      Automated ExfiltrationData Encrypted for Impact
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      2PSj0qX4W6.exe50%ReversingLabsWin64.Backdoor.MeterpreterReverseShell
      2PSj0qX4W6.exe44%VirustotalBrowse
      2PSj0qX4W6.exe100%AviraTR/AD.MeterpreterSC.jtwai
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      SourceDetectionScannerLabelLink
      http://upx.sf.net0%URL Reputationsafe
      http://116.198.231.169:63222/jquery-3.3.2.slim.min.js0%Avira URL Cloudsafe
      https://116.198.231.169/0%VirustotalBrowse
      https://116.198.231.169:63222/ft0%Avira URL Cloudsafe
      https://116.198.231.169:63222/jquery-3.3.2.slim.min.jsUb0%Avira URL Cloudsafe
      http://code.jquery.com/0%Avira URL Cloudsafe
      http://code.jquery.com/1%VirustotalBrowse
      https://116.198.231.169/0%Avira URL Cloudsafe
      http://116.198.231.169:63222/jquery-3.3.2.slim.min.js0%VirustotalBrowse
      https://116.198.231.169:63222/ocal0%Avira URL Cloudsafe
      https://116.198.231.169:63222/70%Avira URL Cloudsafe
      https://116.198.231.169:63222/jquery-3.3.2.slim.min.js0%Avira URL Cloudsafe
      http://116.198.231.169/jquery-3.3.2.slim.min.js0%Avira URL Cloudsafe
      https://116.198.231.169:63222/0%Avira URL Cloudsafe
      https://116.198.231.169:63222/0%VirustotalBrowse
      https://116.198.231.169:63222/70%VirustotalBrowse
      https://116.198.231.169:63222/jquery-3.3.2.slim.min.js0%VirustotalBrowse
      No contacted domains info
      NameMaliciousAntivirus DetectionReputation
      http://116.198.231.169:63222/jquery-3.3.2.slim.min.jstrue
      • 0%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      http://116.198.231.169/jquery-3.3.2.slim.min.jstrue
      • Avira URL Cloud: safe
      unknown
      NameSourceMaliciousAntivirus DetectionReputation
      http://code.jquery.com/2PSj0qX4W6.exe, 00000000.00000002.2896706346.000001C8FE81E000.00000004.00000020.00020000.00000000.sdmp, 2PSj0qX4W6.exe, 00000000.00000003.2425824737.000001C8FE852000.00000004.00000020.00020000.00000000.sdmp, 2PSj0qX4W6.exe, 00000000.00000003.2487535741.000001C8FE852000.00000004.00000020.00020000.00000000.sdmp, 2PSj0qX4W6.exe, 00000000.00000002.2896570979.0000006751CFE000.00000040.00000010.00020000.00000000.sdmp, 2PSj0qX4W6.exe, 00000000.00000003.2466881398.000001C8FE852000.00000004.00000020.00020000.00000000.sdmp, 2PSj0qX4W6.exe, 00000000.00000003.2446877050.000001C8FE852000.00000004.00000020.00020000.00000000.sdmptrue
      • 1%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      http://upx.sf.netAmcache.hve.7.drfalse
      • URL Reputation: safe
      unknown
      https://116.198.231.169:63222/ft2PSj0qX4W6.exe, 00000000.00000002.2896706346.000001C8FE803000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://116.198.231.169:63222/jquery-3.3.2.slim.min.jsUb2PSj0qX4W6.exe, 00000000.00000002.2896706346.000001C8FE7CC000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://116.198.231.169/2PSj0qX4W6.exe, 00000000.00000002.2896706346.000001C8FE81E000.00000004.00000020.00020000.00000000.sdmpfalse
      • 0%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      https://116.198.231.169:63222/ocal2PSj0qX4W6.exe, 00000000.00000002.2896706346.000001C8FE803000.00000004.00000020.00020000.00000000.sdmpfalse
      • Avira URL Cloud: safe
      unknown
      https://116.198.231.169:63222/72PSj0qX4W6.exe, 00000000.00000002.2896706346.000001C8FE803000.00000004.00000020.00020000.00000000.sdmpfalse
      • 0%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      https://116.198.231.169:63222/jquery-3.3.2.slim.min.js2PSj0qX4W6.exe, 00000000.00000002.2896706346.000001C8FE7CC000.00000004.00000020.00020000.00000000.sdmpfalse
      • 0%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      https://116.198.231.169:63222/2PSj0qX4W6.exe, 00000000.00000002.2896706346.000001C8FE7CC000.00000004.00000020.00020000.00000000.sdmp, 2PSj0qX4W6.exe, 00000000.00000002.2896706346.000001C8FE803000.00000004.00000020.00020000.00000000.sdmpfalse
      • 0%, Virustotal, Browse
      • Avira URL Cloud: safe
      unknown
      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs
      IPDomainCountryFlagASNASN NameMalicious
      116.198.231.169
      unknownChina
      137699CHINATELECOM-JIANGSU-SUQIAN-IDCCHINATELECOMJiangsuSuqiantrue
      Joe Sandbox version:40.0.0 Tourmaline
      Analysis ID:1508524
      Start date and time:2024-09-10 10:58:36 +02:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 4m 56s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Run name:Run with higher sleep bypass
      Number of analysed new started processes analysed:8
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Sample name:2PSj0qX4W6.exe
      renamed because original name is a hash value
      Original Sample Name:31a89af6712da7bd56b1033952468302bd0838d48c6712c5499c60178f4d95a3.exe
      Detection:MAL
      Classification:mal96.troj.winEXE@2/5@0/1
      EGA Information:
      • Successful, ratio: 100%
      HCA Information:
      • Successful, ratio: 57%
      • Number of executed functions: 3
      • Number of non-executed functions: 5
      Cookbook Comments:
      • Found application associated with file extension: .exe
      • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
      • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, svchost.exe
      • Excluded IPs from analysis (whitelisted): 52.182.143.212
      • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, onedsblobprdcus15.centralus.cloudapp.azure.com, slscr.update.microsoft.com, login.live.com, blobcollector.events.data.trafficmanager.net, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
      • Report size getting too big, too many NtQueryValueKey calls found.
      No simulations
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      116.198.231.169LtmV2sDcTK.exeGet hashmaliciousCobaltStrike, MetasploitBrowse
        QT2hJT3Syn.exeGet hashmaliciousCobaltStrike, MetasploitBrowse
          TEiot52yrz.exeGet hashmaliciousCobaltStrike, MetasploitBrowse
            LtmV2sDcTK.exeGet hashmaliciousCobaltStrike, MetasploitBrowse
              QT2hJT3Syn.exeGet hashmaliciousCobaltStrike, MetasploitBrowse
                No context
                MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
                CHINATELECOM-JIANGSU-SUQIAN-IDCCHINATELECOMJiangsuSuqianLtmV2sDcTK.exeGet hashmaliciousCobaltStrike, MetasploitBrowse
                • 116.198.231.169
                QT2hJT3Syn.exeGet hashmaliciousCobaltStrike, MetasploitBrowse
                • 116.198.231.169
                TEiot52yrz.exeGet hashmaliciousCobaltStrike, MetasploitBrowse
                • 116.198.231.169
                LtmV2sDcTK.exeGet hashmaliciousCobaltStrike, MetasploitBrowse
                • 116.198.231.169
                QT2hJT3Syn.exeGet hashmaliciousCobaltStrike, MetasploitBrowse
                • 116.198.231.169
                gOEF4WOJ3c.elfGet hashmaliciousUnknownBrowse
                • 116.198.238.210
                No context
                No context
                Process:C:\Windows\System32\WerFault.exe
                File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                Category:dropped
                Size (bytes):65536
                Entropy (8bit):0.9252966262023578
                Encrypted:false
                SSDEEP:96:bUFHUdFg9sPsShq1ooh7Ry6NbQXIDcQWc6zcEZcw373+HbHg/JgwPt8sKa9bATFi:bMMysPiS0I3D0jc4TzuiFr9Z24lO8c
                MD5:F812271DDC55AAEF99034078E4BB68E9
                SHA1:8EB1CEF274CD1EF4D29CFFB08A8D768E617F5609
                SHA-256:A42795396D1E569675D0B468F1ED0728B1CC0E994E618D6B237F528BB4D9B4D0
                SHA-512:C5374AA11F7534C5FBF3305779E64C3C361D3C3A48B23E03162C741D445B8DF24080C7386F1E68A4A10731A74EE48183127B7BB8A9222725D2E2E2FF3CAF89FC
                Malicious:true
                Reputation:low
                Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.B.E.X.6.4.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.0.4.3.2.4.1.2.5.2.4.0.6.9.6.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.0.4.3.2.4.1.2.8.9.9.0.6.7.1.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.4.b.6.4.f.7.a.b.-.9.f.e.b.-.4.a.1.8.-.a.7.6.1.-.4.0.c.b.3.e.d.1.3.6.0.9.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.e.a.0.3.1.c.2.d.-.1.2.1.7.-.4.8.c.1.-.b.1.4.7.-.a.6.8.0.f.f.a.1.1.b.a.2.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....N.s.A.p.p.N.a.m.e.=.2.P.S.j.0.q.X.4.W.6...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.6.d.0.-.0.0.0.1.-.0.0.1.5.-.e.9.a.a.-.9.1.b.e.5.f.0.3.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.a.a.1.4.5.0.4.e.b.2.0.c.3.f.1.c.a.8.1.d.a.b.8.b.1.a.2.5.3.e.c.7.0.0.0.0.f.f.f.f.!.0.0.0.0.5.0.f.7.e.f.4.2.3.9.b.9.f.d.0.3.5.8.b.1.0.a.8.b.3.1.0.6.8.7.1.e.2.d.e.1.f.d.2.9.!.2.P.S.j.0.q.X.4.W.6...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.2.4././.0.6././.2.1.:.1.4.
                Process:C:\Windows\System32\WerFault.exe
                File Type:Mini DuMP crash report, 14 streams, Tue Sep 10 09:00:12 2024, 0x1205a4 type
                Category:dropped
                Size (bytes):139668
                Entropy (8bit):1.4580377854415398
                Encrypted:false
                SSDEEP:384:3XYZ819UXBhM6pxN0hPQD7Yhox5xZx5xGxmxfx/xfxsxmUiJmBC7UvQJ6l8bw4Ue:3oZ+9xQvYVC7w8H
                MD5:0F27339EA89F09329ABF12ADFE3BC7B2
                SHA1:C62363054D85E3EECFFD4E676AA596B1B99AD60A
                SHA-256:8ADB11DA4FCADC33A3D9AF67B1A3AB09000217B0E7CA1C509551EBAD9F9A1AB2
                SHA-512:2DD100BAF4473A2E5B4D34ABDBA0076F0FAACA587E2B48B3AC1C99BF742B06E1A3E5F065F9B7397FB68C59D05714EA72C778F99D773C770E312390F00EFC4CBE
                Malicious:false
                Yara Hits:
                • Rule: Windows_Trojan_Metasploit_7bc0f998, Description: Identifies the API address lookup function leverage by metasploit shellcode, Source: C:\ProgramData\Microsoft\Windows\WER\Temp\WERE651.tmp.dmp, Author: unknown
                • Rule: Windows_Trojan_Metasploit_c9773203, Description: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., Source: C:\ProgramData\Microsoft\Windows\WER\Temp\WERE651.tmp.dmp, Author: unknown
                Reputation:low
                Preview:MDMP..a..... ..........f........................................,S..........T.......8...........T...........x...............P...........<...............................................................................eJ..............Lw......................T...........q..f.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                Process:C:\Windows\System32\WerFault.exe
                File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                Category:dropped
                Size (bytes):8898
                Entropy (8bit):3.7040484298831475
                Encrypted:false
                SSDEEP:192:R6l7wVeJH5UD6Y2DUnturgmfXopDB89bMEUfoEm:R6lXJZA6Y5nturgmfXLM/fq
                MD5:ED37B24945E6CA9CA857AA55125D1C34
                SHA1:0219BC0FC74652BF9E060F05CF654D5D2E13812C
                SHA-256:B995CDC3A33C8AE351DF1DA104CEEC6B03EEA5C09688638A4BCD25B88B4981FE
                SHA-512:4A75AAC1DFBBA1E25FCF2D4A0D0BC5844848CE067FA8E6F96CEF68EF0908AAFC46736B894D06979D05C2682DB0A62B37926A0D6DE49845F3B1C40FC503BDFBC9
                Malicious:false
                Reputation:low
                Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.8.4.0.<./.P.i.
                Process:C:\Windows\System32\WerFault.exe
                File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                Category:dropped
                Size (bytes):4800
                Entropy (8bit):4.483424828149646
                Encrypted:false
                SSDEEP:48:cvIwWl8zsJJg771I9dktWpW8VYvYm8M4J88O1F0yq8vY8OgQdmeywVw9d:uIjfbI7Rc7V3JVjWxXQ9XO9d
                MD5:218FFE2992E37E3FF09C21A3CE2BB7AE
                SHA1:8E095A533EA1DC698D009C8A7FC3C843A205C04B
                SHA-256:D6A4348B5E5FD282555D431DFDE5C714BD935A5B8E316A547961FC0343148821
                SHA-512:E63E873E6DB6B0B3767866B69CD9D7A934EB500A25D37C77D30515DF714B787CB512734A975FF3651533925FB29B88E1445961D674304770B7852C01F5BD4F7C
                Malicious:false
                Reputation:low
                Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="493922" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                Process:C:\Windows\System32\WerFault.exe
                File Type:MS Windows registry file, NT/2000 or above
                Category:dropped
                Size (bytes):1835008
                Entropy (8bit):4.468715503812749
                Encrypted:false
                SSDEEP:6144:4zZfpi6ceLPx9skLmb0f3ZWSP3aJG8nAgeiJRMMhA2zX4WABluuN9jDH5S:uZHt3ZWOKnMM6bFpjj4
                MD5:BE72C90B6B7FB65E37EB96C4C87C9E33
                SHA1:560B679C5D0F6B59BA7C4563CA6330980619B8E1
                SHA-256:5C4BB100907085D8CBF6BBEDD4ABD8B573922ED4799D403A9416E8FE7183E3EC
                SHA-512:DBA45191E3C706A731EDEF1FB5D81853233B3E13881B587240AB16D479FA3BAC35B09ACBA9D9E0F36CB9FDDE518F3C65650FE36781228B9624CA1B7F5FCD873A
                Malicious:false
                Reputation:low
                Preview:regfH...H....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm.ja._.................................................................................................................................................................................................................................................................................................................................................w.........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                File type:PE32+ executable (GUI) x86-64, for MS Windows
                Entropy (8bit):6.837840610486668
                TrID:
                • Win64 Executable GUI (202006/5) 92.65%
                • Win64 Executable (generic) (12005/4) 5.51%
                • Generic Win/DOS Executable (2004/3) 0.92%
                • DOS Executable Generic (2002/1) 0.92%
                • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                File name:2PSj0qX4W6.exe
                File size:39'424 bytes
                MD5:c92c541048de8be340a990db10e7cbab
                SHA1:50f7ef4239b9fd0358b10a8b3106871e2de1fd29
                SHA256:31a89af6712da7bd56b1033952468302bd0838d48c6712c5499c60178f4d95a3
                SHA512:fa1b8808c7ea8ff81ef4b30095b896098e29c8c281f9bcfd0570469da9bea3b1d9a20aeb75f79dcf2ae4d933442b1d1094bc16156dbd98dadc0f5ff115f8dccb
                SSDEEP:768:+mOM8UGqSc62S1MdS4o8BWPKbKqB5SW2pegUxHTo:+hM2qSO9S4oqijdM1V
                TLSH:8E039D5A7B40C9EEDC6A4339C113A91AF3B378211752BADF57D542620E623E1BC7B092
                File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......-$..iE.^iE.^iE.^`=p^eE.^..._jE.^..._cE.^..._rE.^..._oE.^"=._lE.^iE.^9E.^z.._jE.^z..^hE.^z.._hE.^RichiE.^........PE..d.....uf...
                Icon Hash:00928e8e8686b000
                Entrypoint:0x140003688
                Entrypoint Section:.text
                Digitally signed:false
                Imagebase:0x140000000
                Subsystem:windows gui
                Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
                DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                Time Stamp:0x667590C5 [Fri Jun 21 14:40:05 2024 UTC]
                TLS Callbacks:
                CLR (.Net) Version:
                OS Version Major:6
                OS Version Minor:0
                File Version Major:6
                File Version Minor:0
                Subsystem Version Major:6
                Subsystem Version Minor:0
                Import Hash:6b40e87f57848366f8223dc72adc8105
                Instruction
                dec eax
                sub esp, 28h
                call 00007F1AF0CD3B18h
                dec eax
                add esp, 28h
                jmp 00007F1AF0CD3437h
                int3
                int3
                jmp 00007F1AF0CD3D4Eh
                int3
                int3
                int3
                dec eax
                and dword ptr [ecx+10h], 00000000h
                dec eax
                lea eax, dword ptr [00001CD0h]
                dec eax
                mov dword ptr [ecx+08h], eax
                dec eax
                lea eax, dword ptr [00001CB5h]
                dec eax
                mov dword ptr [ecx], eax
                dec eax
                mov eax, ecx
                ret
                int3
                int3
                dec eax
                sub esp, 48h
                dec eax
                lea ecx, dword ptr [esp+20h]
                call 00007F1AF0CD3597h
                dec eax
                lea edx, dword ptr [00006597h]
                dec eax
                lea ecx, dword ptr [esp+20h]
                call 00007F1AF0CD3C64h
                int3
                dec eax
                mov dword ptr [esp+10h], ebx
                dec eax
                mov dword ptr [esp+18h], esi
                push ebp
                push edi
                inc ecx
                push esi
                dec eax
                mov ebp, esp
                dec eax
                sub esp, 10h
                xor eax, eax
                xor ecx, ecx
                cpuid
                inc esp
                mov eax, ecx
                inc esp
                mov edx, edx
                inc ecx
                xor edx, 49656E69h
                inc ecx
                xor eax, 6C65746Eh
                inc esp
                mov ecx, ebx
                inc esp
                mov esi, eax
                xor ecx, ecx
                mov eax, 00000001h
                cpuid
                inc ebp
                or edx, eax
                mov dword ptr [ebp-10h], eax
                inc ecx
                xor ecx, 756E6547h
                mov dword ptr [ebp-0Ch], ebx
                inc ebp
                or edx, ecx
                mov dword ptr [ebp-08h], ecx
                mov edi, ecx
                mov dword ptr [ebp-04h], edx
                jne 00007F1AF0CD361Dh
                dec eax
                or dword ptr [00007959h], FFFFFFFFh
                and eax, 0FFF3FF0h
                dec eax
                mov dword ptr [00000041h], 00000000h
                Programming Language:
                • [IMP] VS2008 SP1 build 30729
                NameVirtual AddressVirtual Size Is in Section
                IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IMPORT0x9d5c0xf0.rdata
                IMAGE_DIRECTORY_ENTRY_RESOURCE0xd0000x1e0.rsrc
                IMAGE_DIRECTORY_ENTRY_EXCEPTION0xc0000x2dc.pdata
                IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                IMAGE_DIRECTORY_ENTRY_BASERELOC0xe0000x74.reloc
                IMAGE_DIRECTORY_ENTRY_DEBUG0x92600x70.rdata
                IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x91200x140.rdata
                IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_IAT0x50000x280.rdata
                IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                .text0x10000x30b40x3200e9963f482a3d6e7f4e75fe743c2953bfFalse0.585234375data6.257536886152972IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                .rdata0x50000x59140x5a000d9164bef9ec87f2b9facc8891c7342fFalse0.6498263888888889data7.192253966884054IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                .data0xb0000x7a00x200e58308d815ae9f347d76df3fe7a185dbFalse0.251953125DOS executable (block device driver)2.229094667815011IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                .pdata0xc0000x2dc0x40099db291c0f94381619f68f9a01ef2c14False0.3837890625data3.0805904685737957IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                .rsrc0xd0000x1e00x20044e3d39532c9319314b3e7669556d25aFalse0.529296875data4.701503258251789IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                .reloc0xe0000x740x200f4ff1a136d814031024657417835019eFalse0.23046875data1.3772139608147294IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                NameRVASizeTypeLanguageCountryZLIB Complexity
                RT_MANIFEST0xd0600x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
                DLLImport
                KERNEL32.dllRtlLookupFunctionEntry, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, TerminateProcess, IsProcessorFeaturePresent, LoadLibraryA, GetModuleHandleW, QueryPerformanceCounter, GetCurrentProcessId, GetCurrentThreadId, GetSystemTimeAsFileTime, InitializeSListHead, RtlCaptureContext, IsDebuggerPresent, VirtualProtect
                MSVCP140.dll?good@ios_base@std@@QEBA_NXZ, ?_Xlength_error@std@@YAXPEBD@Z, ?cout@std@@3V?$basic_ostream@DU?$char_traits@D@std@@@1@A, ?uncaught_exception@std@@YA_NXZ, ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ, ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z, ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z, ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z@Z, ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z, ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ, ?put@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@D@Z, ?widen@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBADD@Z
                CRYPT32.dllCertEnumSystemStore
                VCRUNTIME140_1.dll__CxxFrameHandler4
                VCRUNTIME140.dllmemset, __current_exception_context, __current_exception, _CxxThrowException, __C_specific_handler, memcpy, __std_exception_copy, __std_exception_destroy, memchr, __std_terminate
                api-ms-win-crt-string-l1-1-0.dllisalnum
                api-ms-win-crt-runtime-l1-1-0.dll_c_exit, __p___argv, __p___argc, terminate, _exit, exit, _initterm_e, _register_thread_local_exe_atexit_callback, _initterm, _set_app_type, _seh_filter_exe, _cexit, _crt_atexit, _register_onexit_function, _initialize_onexit_table, _initialize_narrow_environment, _configure_narrow_argv, _get_initial_narrow_environment, _invalid_parameter_noinfo_noreturn
                api-ms-win-crt-heap-l1-1-0.dllfree, _callnewh, _set_new_mode, malloc
                api-ms-win-crt-math-l1-1-0.dll__setusermatherr
                api-ms-win-crt-stdio-l1-1-0.dll__p__commode, _set_fmode
                api-ms-win-crt-locale-l1-1-0.dll_configthreadlocale
                Language of compilation systemCountry where language is spokenMap
                EnglishUnited States
                TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                2024-09-10T10:59:33.655829+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.649710116.198.231.16963222TCP
                2024-09-10T10:59:37.773973+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.649714116.198.231.16963222TCP
                2024-09-10T10:59:41.893384+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.649718116.198.231.16963222TCP
                2024-09-10T10:59:46.078353+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.649721116.198.231.16963222TCP
                2024-09-10T10:59:50.311099+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.649729116.198.231.16963222TCP
                2024-09-10T10:59:54.409893+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.649733116.198.231.16963222TCP
                2024-09-10T10:59:58.570098+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.649736116.198.231.16963222TCP
                2024-09-10T11:00:02.676980+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.649739116.198.231.16963222TCP
                2024-09-10T11:00:06.754121+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.649743116.198.231.16963222TCP
                2024-09-10T11:00:10.906680+02002028765ET JA3 Hash - [Abuse.ch] Possible Dridex3192.168.2.649746116.198.231.16963222TCP
                TimestampSource PortDest PortSource IPDest IP
                Sep 10, 2024 10:59:30.720750093 CEST4971063222192.168.2.6116.198.231.169
                Sep 10, 2024 10:59:30.728576899 CEST6322249710116.198.231.169192.168.2.6
                Sep 10, 2024 10:59:30.728693962 CEST4971063222192.168.2.6116.198.231.169
                Sep 10, 2024 10:59:30.737454891 CEST4971063222192.168.2.6116.198.231.169
                Sep 10, 2024 10:59:30.746562004 CEST6322249710116.198.231.169192.168.2.6
                Sep 10, 2024 10:59:33.655555964 CEST6322249710116.198.231.169192.168.2.6
                Sep 10, 2024 10:59:33.655828953 CEST4971063222192.168.2.6116.198.231.169
                Sep 10, 2024 10:59:33.655936956 CEST4971063222192.168.2.6116.198.231.169
                Sep 10, 2024 10:59:33.656651974 CEST4971263222192.168.2.6116.198.231.169
                Sep 10, 2024 10:59:33.657365084 CEST6322249710116.198.231.169192.168.2.6
                Sep 10, 2024 10:59:33.657454014 CEST4971063222192.168.2.6116.198.231.169
                Sep 10, 2024 10:59:33.657922029 CEST6322249710116.198.231.169192.168.2.6
                Sep 10, 2024 10:59:33.657977104 CEST4971063222192.168.2.6116.198.231.169
                Sep 10, 2024 10:59:33.658705950 CEST6322249710116.198.231.169192.168.2.6
                Sep 10, 2024 10:59:33.658761024 CEST4971063222192.168.2.6116.198.231.169
                Sep 10, 2024 10:59:33.661962032 CEST6322249710116.198.231.169192.168.2.6
                Sep 10, 2024 10:59:33.661978960 CEST6322249712116.198.231.169192.168.2.6
                Sep 10, 2024 10:59:33.662067890 CEST4971263222192.168.2.6116.198.231.169
                Sep 10, 2024 10:59:33.662364006 CEST4971263222192.168.2.6116.198.231.169
                Sep 10, 2024 10:59:33.667212009 CEST6322249712116.198.231.169192.168.2.6
                Sep 10, 2024 10:59:35.690254927 CEST6322249712116.198.231.169192.168.2.6
                Sep 10, 2024 10:59:35.690326929 CEST4971263222192.168.2.6116.198.231.169
                Sep 10, 2024 10:59:35.690413952 CEST4971263222192.168.2.6116.198.231.169
                Sep 10, 2024 10:59:35.691039085 CEST4971363222192.168.2.6116.198.231.169
                Sep 10, 2024 10:59:35.695231915 CEST6322249712116.198.231.169192.168.2.6
                Sep 10, 2024 10:59:35.696063995 CEST6322249713116.198.231.169192.168.2.6
                Sep 10, 2024 10:59:35.696125031 CEST4971363222192.168.2.6116.198.231.169
                Sep 10, 2024 10:59:35.698559999 CEST4971363222192.168.2.6116.198.231.169
                Sep 10, 2024 10:59:35.700242043 CEST4971463222192.168.2.6116.198.231.169
                Sep 10, 2024 10:59:35.703449011 CEST6322249713116.198.231.169192.168.2.6
                Sep 10, 2024 10:59:35.703567028 CEST6322249713116.198.231.169192.168.2.6
                Sep 10, 2024 10:59:35.705111980 CEST6322249714116.198.231.169192.168.2.6
                Sep 10, 2024 10:59:35.705142975 CEST4971363222192.168.2.6116.198.231.169
                Sep 10, 2024 10:59:35.705204964 CEST4971463222192.168.2.6116.198.231.169
                Sep 10, 2024 10:59:35.705763102 CEST4971463222192.168.2.6116.198.231.169
                Sep 10, 2024 10:59:35.710582018 CEST6322249714116.198.231.169192.168.2.6
                Sep 10, 2024 10:59:37.773899078 CEST6322249714116.198.231.169192.168.2.6
                Sep 10, 2024 10:59:37.773972988 CEST4971463222192.168.2.6116.198.231.169
                Sep 10, 2024 10:59:37.774070978 CEST4971463222192.168.2.6116.198.231.169
                Sep 10, 2024 10:59:37.774682999 CEST4971563222192.168.2.6116.198.231.169
                Sep 10, 2024 10:59:37.778806925 CEST6322249714116.198.231.169192.168.2.6
                Sep 10, 2024 10:59:37.779463053 CEST6322249715116.198.231.169192.168.2.6
                Sep 10, 2024 10:59:37.779526949 CEST4971563222192.168.2.6116.198.231.169
                Sep 10, 2024 10:59:37.779762030 CEST4971563222192.168.2.6116.198.231.169
                Sep 10, 2024 10:59:37.784501076 CEST6322249715116.198.231.169192.168.2.6
                Sep 10, 2024 10:59:39.799499989 CEST6322249715116.198.231.169192.168.2.6
                Sep 10, 2024 10:59:39.799578905 CEST4971563222192.168.2.6116.198.231.169
                Sep 10, 2024 10:59:39.799685955 CEST4971563222192.168.2.6116.198.231.169
                Sep 10, 2024 10:59:39.800352097 CEST4971763222192.168.2.6116.198.231.169
                Sep 10, 2024 10:59:39.805425882 CEST6322249715116.198.231.169192.168.2.6
                Sep 10, 2024 10:59:39.806435108 CEST6322249717116.198.231.169192.168.2.6
                Sep 10, 2024 10:59:39.806535959 CEST4971763222192.168.2.6116.198.231.169
                Sep 10, 2024 10:59:39.806710005 CEST4971763222192.168.2.6116.198.231.169
                Sep 10, 2024 10:59:39.808470011 CEST4971863222192.168.2.6116.198.231.169
                Sep 10, 2024 10:59:39.812413931 CEST6322249717116.198.231.169192.168.2.6
                Sep 10, 2024 10:59:39.812480927 CEST4971763222192.168.2.6116.198.231.169
                Sep 10, 2024 10:59:39.814269066 CEST6322249718116.198.231.169192.168.2.6
                Sep 10, 2024 10:59:39.816961050 CEST4971863222192.168.2.6116.198.231.169
                Sep 10, 2024 10:59:39.817298889 CEST4971863222192.168.2.6116.198.231.169
                Sep 10, 2024 10:59:39.822118044 CEST6322249718116.198.231.169192.168.2.6
                Sep 10, 2024 10:59:41.893270969 CEST6322249718116.198.231.169192.168.2.6
                Sep 10, 2024 10:59:41.893383980 CEST4971863222192.168.2.6116.198.231.169
                Sep 10, 2024 10:59:41.893472910 CEST4971863222192.168.2.6116.198.231.169
                Sep 10, 2024 10:59:41.893949986 CEST4971963222192.168.2.6116.198.231.169
                Sep 10, 2024 10:59:41.898272991 CEST6322249718116.198.231.169192.168.2.6
                Sep 10, 2024 10:59:41.898824930 CEST6322249719116.198.231.169192.168.2.6
                Sep 10, 2024 10:59:41.898905993 CEST4971963222192.168.2.6116.198.231.169
                Sep 10, 2024 10:59:41.899262905 CEST4971963222192.168.2.6116.198.231.169
                Sep 10, 2024 10:59:41.904879093 CEST6322249719116.198.231.169192.168.2.6
                Sep 10, 2024 10:59:43.919490099 CEST6322249719116.198.231.169192.168.2.6
                Sep 10, 2024 10:59:43.919723034 CEST4971963222192.168.2.6116.198.231.169
                Sep 10, 2024 10:59:43.919836998 CEST4971963222192.168.2.6116.198.231.169
                Sep 10, 2024 10:59:43.920530081 CEST4972063222192.168.2.6116.198.231.169
                Sep 10, 2024 10:59:43.924664021 CEST6322249719116.198.231.169192.168.2.6
                Sep 10, 2024 10:59:43.926518917 CEST6322249720116.198.231.169192.168.2.6
                Sep 10, 2024 10:59:43.926613092 CEST4972063222192.168.2.6116.198.231.169
                Sep 10, 2024 10:59:43.926692009 CEST4972063222192.168.2.6116.198.231.169
                Sep 10, 2024 10:59:43.935798883 CEST6322249720116.198.231.169192.168.2.6
                Sep 10, 2024 10:59:43.935813904 CEST6322249720116.198.231.169192.168.2.6
                Sep 10, 2024 10:59:43.935887098 CEST4972063222192.168.2.6116.198.231.169
                Sep 10, 2024 10:59:43.946899891 CEST4972163222192.168.2.6116.198.231.169
                Sep 10, 2024 10:59:43.952742100 CEST6322249721116.198.231.169192.168.2.6
                Sep 10, 2024 10:59:43.952832937 CEST4972163222192.168.2.6116.198.231.169
                Sep 10, 2024 10:59:43.953110933 CEST4972163222192.168.2.6116.198.231.169
                Sep 10, 2024 10:59:43.958360910 CEST6322249721116.198.231.169192.168.2.6
                Sep 10, 2024 10:59:46.078262091 CEST6322249721116.198.231.169192.168.2.6
                Sep 10, 2024 10:59:46.078352928 CEST4972163222192.168.2.6116.198.231.169
                Sep 10, 2024 10:59:46.078413963 CEST4972163222192.168.2.6116.198.231.169
                Sep 10, 2024 10:59:46.078876972 CEST4972263222192.168.2.6116.198.231.169
                Sep 10, 2024 10:59:46.083461046 CEST6322249721116.198.231.169192.168.2.6
                Sep 10, 2024 10:59:46.083781004 CEST6322249722116.198.231.169192.168.2.6
                Sep 10, 2024 10:59:46.083849907 CEST4972263222192.168.2.6116.198.231.169
                Sep 10, 2024 10:59:46.084161043 CEST4972263222192.168.2.6116.198.231.169
                Sep 10, 2024 10:59:46.089684010 CEST6322249722116.198.231.169192.168.2.6
                Sep 10, 2024 10:59:48.157211065 CEST6322249722116.198.231.169192.168.2.6
                Sep 10, 2024 10:59:48.157284975 CEST4972263222192.168.2.6116.198.231.169
                Sep 10, 2024 10:59:48.157392025 CEST4972263222192.168.2.6116.198.231.169
                Sep 10, 2024 10:59:48.157861948 CEST4972863222192.168.2.6116.198.231.169
                Sep 10, 2024 10:59:48.164355993 CEST6322249722116.198.231.169192.168.2.6
                Sep 10, 2024 10:59:48.166410923 CEST6322249728116.198.231.169192.168.2.6
                Sep 10, 2024 10:59:48.166484118 CEST4972863222192.168.2.6116.198.231.169
                Sep 10, 2024 10:59:48.166604996 CEST4972863222192.168.2.6116.198.231.169
                Sep 10, 2024 10:59:48.168023109 CEST4972963222192.168.2.6116.198.231.169
                Sep 10, 2024 10:59:48.173434019 CEST6322249728116.198.231.169192.168.2.6
                Sep 10, 2024 10:59:48.173491001 CEST4972863222192.168.2.6116.198.231.169
                Sep 10, 2024 10:59:48.174988985 CEST6322249729116.198.231.169192.168.2.6
                Sep 10, 2024 10:59:48.175112009 CEST4972963222192.168.2.6116.198.231.169
                Sep 10, 2024 10:59:48.175410032 CEST4972963222192.168.2.6116.198.231.169
                Sep 10, 2024 10:59:48.180566072 CEST6322249729116.198.231.169192.168.2.6
                Sep 10, 2024 10:59:50.311037064 CEST6322249729116.198.231.169192.168.2.6
                Sep 10, 2024 10:59:50.311099052 CEST4972963222192.168.2.6116.198.231.169
                Sep 10, 2024 10:59:50.311172009 CEST4972963222192.168.2.6116.198.231.169
                Sep 10, 2024 10:59:50.311872959 CEST4973163222192.168.2.6116.198.231.169
                Sep 10, 2024 10:59:50.315984964 CEST6322249729116.198.231.169192.168.2.6
                Sep 10, 2024 10:59:50.316875935 CEST6322249731116.198.231.169192.168.2.6
                Sep 10, 2024 10:59:50.316977024 CEST4973163222192.168.2.6116.198.231.169
                Sep 10, 2024 10:59:50.317272902 CEST4973163222192.168.2.6116.198.231.169
                Sep 10, 2024 10:59:50.322021008 CEST6322249731116.198.231.169192.168.2.6
                Sep 10, 2024 10:59:52.367132902 CEST6322249731116.198.231.169192.168.2.6
                Sep 10, 2024 10:59:52.367230892 CEST4973163222192.168.2.6116.198.231.169
                Sep 10, 2024 10:59:52.367342949 CEST4973163222192.168.2.6116.198.231.169
                Sep 10, 2024 10:59:52.367826939 CEST4973263222192.168.2.6116.198.231.169
                Sep 10, 2024 10:59:52.372170925 CEST6322249731116.198.231.169192.168.2.6
                Sep 10, 2024 10:59:52.372714996 CEST6322249732116.198.231.169192.168.2.6
                Sep 10, 2024 10:59:52.372781038 CEST4973263222192.168.2.6116.198.231.169
                Sep 10, 2024 10:59:52.372848034 CEST4973263222192.168.2.6116.198.231.169
                Sep 10, 2024 10:59:52.374197006 CEST4973363222192.168.2.6116.198.231.169
                Sep 10, 2024 10:59:52.378457069 CEST6322249732116.198.231.169192.168.2.6
                Sep 10, 2024 10:59:52.378515005 CEST4973263222192.168.2.6116.198.231.169
                Sep 10, 2024 10:59:52.379097939 CEST6322249733116.198.231.169192.168.2.6
                Sep 10, 2024 10:59:52.379152060 CEST4973363222192.168.2.6116.198.231.169
                Sep 10, 2024 10:59:52.379435062 CEST4973363222192.168.2.6116.198.231.169
                Sep 10, 2024 10:59:52.384382010 CEST6322249733116.198.231.169192.168.2.6
                Sep 10, 2024 10:59:54.409831047 CEST6322249733116.198.231.169192.168.2.6
                Sep 10, 2024 10:59:54.409893036 CEST4973363222192.168.2.6116.198.231.169
                Sep 10, 2024 10:59:54.409981966 CEST4973363222192.168.2.6116.198.231.169
                Sep 10, 2024 10:59:54.414793015 CEST6322249733116.198.231.169192.168.2.6
                Sep 10, 2024 10:59:54.416822910 CEST4973463222192.168.2.6116.198.231.169
                Sep 10, 2024 10:59:54.421756029 CEST6322249734116.198.231.169192.168.2.6
                Sep 10, 2024 10:59:54.421832085 CEST4973463222192.168.2.6116.198.231.169
                Sep 10, 2024 10:59:54.422163010 CEST4973463222192.168.2.6116.198.231.169
                Sep 10, 2024 10:59:54.427814960 CEST6322249734116.198.231.169192.168.2.6
                Sep 10, 2024 10:59:56.475197077 CEST6322249734116.198.231.169192.168.2.6
                Sep 10, 2024 10:59:56.475317001 CEST4973463222192.168.2.6116.198.231.169
                Sep 10, 2024 10:59:56.475428104 CEST4973463222192.168.2.6116.198.231.169
                Sep 10, 2024 10:59:56.479209900 CEST4973563222192.168.2.6116.198.231.169
                Sep 10, 2024 10:59:56.480391026 CEST6322249734116.198.231.169192.168.2.6
                Sep 10, 2024 10:59:56.484093904 CEST6322249735116.198.231.169192.168.2.6
                Sep 10, 2024 10:59:56.484168053 CEST4973563222192.168.2.6116.198.231.169
                Sep 10, 2024 10:59:56.484318972 CEST4973563222192.168.2.6116.198.231.169
                Sep 10, 2024 10:59:56.486936092 CEST4973663222192.168.2.6116.198.231.169
                Sep 10, 2024 10:59:56.489562988 CEST6322249735116.198.231.169192.168.2.6
                Sep 10, 2024 10:59:56.489629984 CEST4973563222192.168.2.6116.198.231.169
                Sep 10, 2024 10:59:56.492364883 CEST6322249736116.198.231.169192.168.2.6
                Sep 10, 2024 10:59:56.492669106 CEST4973663222192.168.2.6116.198.231.169
                Sep 10, 2024 10:59:56.492971897 CEST4973663222192.168.2.6116.198.231.169
                Sep 10, 2024 10:59:56.497777939 CEST6322249736116.198.231.169192.168.2.6
                Sep 10, 2024 10:59:58.570008993 CEST6322249736116.198.231.169192.168.2.6
                Sep 10, 2024 10:59:58.570097923 CEST4973663222192.168.2.6116.198.231.169
                Sep 10, 2024 10:59:58.571727037 CEST4973663222192.168.2.6116.198.231.169
                Sep 10, 2024 10:59:58.574446917 CEST4973763222192.168.2.6116.198.231.169
                Sep 10, 2024 10:59:58.576970100 CEST6322249736116.198.231.169192.168.2.6
                Sep 10, 2024 10:59:58.579792023 CEST6322249737116.198.231.169192.168.2.6
                Sep 10, 2024 10:59:58.579859018 CEST4973763222192.168.2.6116.198.231.169
                Sep 10, 2024 10:59:58.580430031 CEST4973763222192.168.2.6116.198.231.169
                Sep 10, 2024 10:59:58.585581064 CEST6322249737116.198.231.169192.168.2.6
                Sep 10, 2024 11:00:00.676857948 CEST6322249737116.198.231.169192.168.2.6
                Sep 10, 2024 11:00:00.676930904 CEST4973763222192.168.2.6116.198.231.169
                Sep 10, 2024 11:00:00.677011967 CEST4973763222192.168.2.6116.198.231.169
                Sep 10, 2024 11:00:00.679893970 CEST4973863222192.168.2.6116.198.231.169
                Sep 10, 2024 11:00:00.682952881 CEST6322249737116.198.231.169192.168.2.6
                Sep 10, 2024 11:00:00.685765028 CEST6322249738116.198.231.169192.168.2.6
                Sep 10, 2024 11:00:00.685822010 CEST4973863222192.168.2.6116.198.231.169
                Sep 10, 2024 11:00:00.685879946 CEST4973863222192.168.2.6116.198.231.169
                Sep 10, 2024 11:00:00.686971903 CEST4973963222192.168.2.6116.198.231.169
                Sep 10, 2024 11:00:00.691569090 CEST6322249738116.198.231.169192.168.2.6
                Sep 10, 2024 11:00:00.691621065 CEST4973863222192.168.2.6116.198.231.169
                Sep 10, 2024 11:00:00.691772938 CEST6322249739116.198.231.169192.168.2.6
                Sep 10, 2024 11:00:00.691836119 CEST4973963222192.168.2.6116.198.231.169
                Sep 10, 2024 11:00:00.692034006 CEST4973963222192.168.2.6116.198.231.169
                Sep 10, 2024 11:00:00.696796894 CEST6322249739116.198.231.169192.168.2.6
                Sep 10, 2024 11:00:02.676904917 CEST6322249739116.198.231.169192.168.2.6
                Sep 10, 2024 11:00:02.676980019 CEST4973963222192.168.2.6116.198.231.169
                Sep 10, 2024 11:00:02.677057028 CEST4973963222192.168.2.6116.198.231.169
                Sep 10, 2024 11:00:02.681301117 CEST4974063222192.168.2.6116.198.231.169
                Sep 10, 2024 11:00:02.681874990 CEST6322249739116.198.231.169192.168.2.6
                Sep 10, 2024 11:00:02.686177969 CEST6322249740116.198.231.169192.168.2.6
                Sep 10, 2024 11:00:02.686255932 CEST4974063222192.168.2.6116.198.231.169
                Sep 10, 2024 11:00:02.686887980 CEST4974063222192.168.2.6116.198.231.169
                Sep 10, 2024 11:00:02.691689968 CEST6322249740116.198.231.169192.168.2.6
                Sep 10, 2024 11:00:04.742826939 CEST6322249740116.198.231.169192.168.2.6
                Sep 10, 2024 11:00:04.742902994 CEST4974063222192.168.2.6116.198.231.169
                Sep 10, 2024 11:00:04.742984056 CEST4974063222192.168.2.6116.198.231.169
                Sep 10, 2024 11:00:04.745366096 CEST4974263222192.168.2.6116.198.231.169
                Sep 10, 2024 11:00:04.747920990 CEST6322249740116.198.231.169192.168.2.6
                Sep 10, 2024 11:00:04.750256062 CEST6322249742116.198.231.169192.168.2.6
                Sep 10, 2024 11:00:04.750327110 CEST4974263222192.168.2.6116.198.231.169
                Sep 10, 2024 11:00:04.750435114 CEST4974263222192.168.2.6116.198.231.169
                Sep 10, 2024 11:00:04.751815081 CEST4974363222192.168.2.6116.198.231.169
                Sep 10, 2024 11:00:04.755709887 CEST6322249742116.198.231.169192.168.2.6
                Sep 10, 2024 11:00:04.755754948 CEST4974263222192.168.2.6116.198.231.169
                Sep 10, 2024 11:00:04.756675959 CEST6322249743116.198.231.169192.168.2.6
                Sep 10, 2024 11:00:04.756742954 CEST4974363222192.168.2.6116.198.231.169
                Sep 10, 2024 11:00:04.756972075 CEST4974363222192.168.2.6116.198.231.169
                Sep 10, 2024 11:00:04.761814117 CEST6322249743116.198.231.169192.168.2.6
                Sep 10, 2024 11:00:06.754056931 CEST6322249743116.198.231.169192.168.2.6
                Sep 10, 2024 11:00:06.754121065 CEST4974363222192.168.2.6116.198.231.169
                Sep 10, 2024 11:00:06.754240036 CEST4974363222192.168.2.6116.198.231.169
                Sep 10, 2024 11:00:06.759197950 CEST6322249743116.198.231.169192.168.2.6
                Sep 10, 2024 11:00:06.759752035 CEST4974463222192.168.2.6116.198.231.169
                Sep 10, 2024 11:00:06.764728069 CEST6322249744116.198.231.169192.168.2.6
                Sep 10, 2024 11:00:06.765093088 CEST4974463222192.168.2.6116.198.231.169
                Sep 10, 2024 11:00:06.765093088 CEST4974463222192.168.2.6116.198.231.169
                Sep 10, 2024 11:00:06.770709991 CEST6322249744116.198.231.169192.168.2.6
                Sep 10, 2024 11:00:08.873779058 CEST6322249744116.198.231.169192.168.2.6
                Sep 10, 2024 11:00:08.873878002 CEST4974463222192.168.2.6116.198.231.169
                Sep 10, 2024 11:00:08.873955965 CEST4974463222192.168.2.6116.198.231.169
                Sep 10, 2024 11:00:08.876344919 CEST4974563222192.168.2.6116.198.231.169
                Sep 10, 2024 11:00:08.880786896 CEST6322249744116.198.231.169192.168.2.6
                Sep 10, 2024 11:00:08.883395910 CEST6322249745116.198.231.169192.168.2.6
                Sep 10, 2024 11:00:08.883481979 CEST4974563222192.168.2.6116.198.231.169
                Sep 10, 2024 11:00:08.883650064 CEST4974563222192.168.2.6116.198.231.169
                Sep 10, 2024 11:00:08.887233019 CEST4974663222192.168.2.6116.198.231.169
                Sep 10, 2024 11:00:08.890755892 CEST6322249745116.198.231.169192.168.2.6
                Sep 10, 2024 11:00:08.890825033 CEST4974563222192.168.2.6116.198.231.169
                Sep 10, 2024 11:00:08.894006014 CEST6322249746116.198.231.169192.168.2.6
                Sep 10, 2024 11:00:08.894078016 CEST4974663222192.168.2.6116.198.231.169
                Sep 10, 2024 11:00:08.894349098 CEST4974663222192.168.2.6116.198.231.169
                Sep 10, 2024 11:00:08.901087999 CEST6322249746116.198.231.169192.168.2.6
                Sep 10, 2024 11:00:10.902652979 CEST6322249746116.198.231.169192.168.2.6
                Sep 10, 2024 11:00:10.906680107 CEST4974663222192.168.2.6116.198.231.169
                Sep 10, 2024 11:00:10.906754971 CEST4974663222192.168.2.6116.198.231.169
                Sep 10, 2024 11:00:10.909368038 CEST4974763222192.168.2.6116.198.231.169
                Sep 10, 2024 11:00:10.913419962 CEST6322249746116.198.231.169192.168.2.6
                Sep 10, 2024 11:00:10.915198088 CEST6322249747116.198.231.169192.168.2.6
                Sep 10, 2024 11:00:10.918633938 CEST4974763222192.168.2.6116.198.231.169
                Sep 10, 2024 11:00:10.918930054 CEST4974763222192.168.2.6116.198.231.169
                Sep 10, 2024 11:00:10.924865961 CEST6322249747116.198.231.169192.168.2.6
                Sep 10, 2024 11:00:12.957307100 CEST6322249747116.198.231.169192.168.2.6
                Sep 10, 2024 11:00:12.957408905 CEST4974763222192.168.2.6116.198.231.169
                Sep 10, 2024 11:00:12.957540989 CEST4974763222192.168.2.6116.198.231.169
                Sep 10, 2024 11:00:12.960448980 CEST4974863222192.168.2.6116.198.231.169
                Sep 10, 2024 11:00:12.962397099 CEST6322249747116.198.231.169192.168.2.6
                Sep 10, 2024 11:00:12.965328932 CEST6322249748116.198.231.169192.168.2.6
                Sep 10, 2024 11:00:12.965421915 CEST4974863222192.168.2.6116.198.231.169
                Sep 10, 2024 11:00:12.965591908 CEST4974863222192.168.2.6116.198.231.169
                Sep 10, 2024 11:00:12.970629930 CEST6322249748116.198.231.169192.168.2.6
                Sep 10, 2024 11:00:12.970714092 CEST4974863222192.168.2.6116.198.231.169

                Click to jump to process

                Click to jump to process

                Click to dive into process behavior distribution

                Click to jump to process

                Target ID:0
                Start time:04:59:29
                Start date:10/09/2024
                Path:C:\Users\user\Desktop\2PSj0qX4W6.exe
                Wow64 process (32bit):false
                Commandline:"C:\Users\user\Desktop\2PSj0qX4W6.exe"
                Imagebase:0x7ff77ca50000
                File size:39'424 bytes
                MD5 hash:C92C541048DE8BE340A990DB10E7CBAB
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Yara matches:
                • Rule: JoeSecurity_MetasploitPayload_3, Description: Yara detected Metasploit Payload, Source: 00000000.00000002.2896570979.0000006751CFE000.00000040.00000010.00020000.00000000.sdmp, Author: Joe Security
                • Rule: JoeSecurity_CobaltStrike_3, Description: Yara detected CobaltStrike, Source: 00000000.00000002.2896570979.0000006751CFE000.00000040.00000010.00020000.00000000.sdmp, Author: Joe Security
                • Rule: Windows_Trojan_Metasploit_7bc0f998, Description: Identifies the API address lookup function leverage by metasploit shellcode, Source: 00000000.00000002.2896570979.0000006751CFE000.00000040.00000010.00020000.00000000.sdmp, Author: unknown
                • Rule: Windows_Trojan_Metasploit_c9773203, Description: Identifies the 64 bit API hashing function used by Metasploit. This has been re-used by many other malware families., Source: 00000000.00000002.2896570979.0000006751CFE000.00000040.00000010.00020000.00000000.sdmp, Author: unknown
                Reputation:low
                Has exited:true

                Target ID:7
                Start time:05:00:12
                Start date:10/09/2024
                Path:C:\Windows\System32\WerFault.exe
                Wow64 process (32bit):false
                Commandline:C:\Windows\system32\WerFault.exe -u -p 5840 -s 1196
                Imagebase:0x7ff72d3f0000
                File size:570'736 bytes
                MD5 hash:FD27D9F6D02763BDE32511B5DF7FF7A0
                Has elevated privileges:true
                Has administrator privileges:true
                Programmed in:C, C++ or other language
                Reputation:high
                Has exited:true

                Reset < >

                  Execution Graph

                  Execution Coverage:12.8%
                  Dynamic/Decrypted Code Coverage:0.8%
                  Signature Coverage:30%
                  Total number of Nodes:253
                  Total number of Limit Nodes:2
                  execution_graph 1181 7ff77ca5402b _seh_filter_exe 925 7ff77ca5350c 926 7ff77ca53525 925->926 927 7ff77ca5352d __scrt_acquire_startup_lock 926->927 928 7ff77ca53663 926->928 930 7ff77ca5366d 927->930 933 7ff77ca5354b __scrt_release_startup_lock 927->933 981 7ff77ca539cc IsProcessorFeaturePresent 928->981 931 7ff77ca539cc 9 API calls 930->931 932 7ff77ca53678 931->932 935 7ff77ca53680 _exit 932->935 934 7ff77ca53570 933->934 936 7ff77ca535f6 _get_initial_narrow_environment __p___argv __p___argc 933->936 939 7ff77ca535ee _register_thread_local_exe_atexit_callback 933->939 945 7ff77ca52890 memcpy 936->945 939->936 942 7ff77ca53623 943 7ff77ca5362d 942->943 944 7ff77ca53628 _cexit 942->944 943->934 944->943 946 7ff77ca52930 945->946 946->946 947 7ff77ca5294c 946->947 948 7ff77ca52c21 946->948 950 7ff77ca52954 memcpy 947->950 951 7ff77ca52980 947->951 1038 7ff77ca51250 ?_Xlength_error@std@@YAXPEBD 948->1038 953 7ff77ca52a1b 950->953 954 7ff77ca529d1 951->954 959 7ff77ca529ee 951->959 960 7ff77ca529df 951->960 963 7ff77ca5298c 951->963 952 7ff77ca52c26 1039 7ff77ca511b0 952->1039 987 7ff77ca51a40 953->987 958 7ff77ca529f6 memcpy 954->958 958->953 964 7ff77ca531a4 3 API calls 959->964 960->952 960->963 962 7ff77ca52c2c 1017 7ff77ca531a4 963->1017 969 7ff77ca529a2 964->969 965 7ff77ca52a71 memset 967 7ff77ca52ac6 memset 965->967 968 7ff77ca52a90 965->968 966 7ff77ca52be7 _invalid_parameter_noinfo_noreturn 971 7ff77ca52bee 966->971 978 7ff77ca52ae0 LoadLibraryA VirtualProtect CertEnumSystemStore 967->978 968->967 969->958 969->966 972 7ff77ca52ed0 free 971->972 974 7ff77ca52bf3 972->974 1029 7ff77ca52eb0 974->1029 975 7ff77ca52bbe 975->966 975->971 978->974 978->975 979 7ff77ca53b20 GetModuleHandleW 980 7ff77ca5361f 979->980 980->932 980->942 982 7ff77ca539f2 981->982 983 7ff77ca53a00 memset RtlCaptureContext RtlLookupFunctionEntry 982->983 984 7ff77ca53a3a RtlVirtualUnwind 983->984 985 7ff77ca53a76 memset IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 983->985 984->985 986 7ff77ca53af6 985->986 986->930 1042 7ff77ca51270 987->1042 989 7ff77ca51a8d 990 7ff77ca51aa0 memcpy 989->990 991 7ff77ca53420 990->991 992 7ff77ca51aca memcpy 991->992 993 7ff77ca51b11 memcpy 992->993 998 7ff77ca52792 992->998 999 7ff77ca51b50 993->999 994 7ff77ca527cc 1046 7ff77ca517b0 994->1046 996 7ff77ca51bd6 1004 7ff77ca51bf9 memset 996->1004 1015 7ff77ca51c1a 996->1015 997 7ff77ca52807 1000 7ff77ca52ed0 free 997->1000 998->994 1085 7ff77ca52c30 998->1085 999->996 1001 7ff77ca51bb5 memset 999->1001 1002 7ff77ca52811 1000->1002 1001->999 1005 7ff77ca52ed0 free 1002->1005 1004->996 1008 7ff77ca52819 1005->1008 1007 7ff77ca52859 1010 7ff77ca52eb0 8 API calls 1007->1010 1008->1007 1009 7ff77ca52854 1008->1009 1011 7ff77ca5284d _invalid_parameter_noinfo_noreturn 1008->1011 1012 7ff77ca52ed0 free 1009->1012 1013 7ff77ca5286b 1010->1013 1011->1009 1012->1007 1013->965 1013->966 1026 7ff77ca52ed0 1013->1026 1014 7ff77ca52741 memcpy 1014->998 1014->1015 1015->998 1015->1014 1016 7ff77ca52521 memcpy 1015->1016 1016->1015 1018 7ff77ca531be malloc 1017->1018 1019 7ff77ca531c8 1018->1019 1020 7ff77ca531af 1018->1020 1019->969 1020->1018 1021 7ff77ca531ce 1020->1021 1022 7ff77ca531d9 1021->1022 1122 7ff77ca536c4 1021->1122 1024 7ff77ca511b0 Concurrency::cancel_current_task __std_exception_copy 1022->1024 1025 7ff77ca531df 1024->1025 1027 7ff77ca5369c free 1026->1027 1030 7ff77ca52eb9 1029->1030 1031 7ff77ca52c04 1030->1031 1032 7ff77ca52f38 IsProcessorFeaturePresent 1030->1032 1031->979 1033 7ff77ca52f50 1032->1033 1126 7ff77ca53130 RtlCaptureContext 1033->1126 1040 7ff77ca511be Concurrency::cancel_current_task 1039->1040 1041 7ff77ca511cf __std_exception_copy 1040->1041 1041->962 1043 7ff77ca51722 1042->1043 1044 7ff77ca512c2 1042->1044 1043->989 1044->1043 1099 7ff77ca518d0 1044->1099 1047 7ff77ca517e0 1046->1047 1047->1047 1048 7ff77ca517fc 1047->1048 1049 7ff77ca518c2 1047->1049 1050 7ff77ca51802 memcpy 1048->1050 1057 7ff77ca5181f 1048->1057 1120 7ff77ca51250 ?_Xlength_error@std@@YAXPEBD 1049->1120 1052 7ff77ca518ac 1050->1052 1052->997 1053 7ff77ca5182b 1058 7ff77ca531a4 3 API calls 1053->1058 1054 7ff77ca518c7 1059 7ff77ca511b0 Concurrency::cancel_current_task __std_exception_copy 1054->1059 1055 7ff77ca5188f memcpy 1055->1052 1056 7ff77ca51887 1060 7ff77ca531a4 3 API calls 1056->1060 1057->1053 1057->1054 1057->1055 1057->1056 1061 7ff77ca51841 1058->1061 1062 7ff77ca518cd 1059->1062 1063 7ff77ca51846 1060->1063 1061->1063 1064 7ff77ca51880 _invalid_parameter_noinfo_noreturn 1061->1064 1065 7ff77ca51a25 1062->1065 1069 7ff77ca518ff 1062->1069 1063->1055 1064->1056 1121 7ff77ca51250 ?_Xlength_error@std@@YAXPEBD 1065->1121 1066 7ff77ca51964 1071 7ff77ca531a4 3 API calls 1066->1071 1068 7ff77ca51a2a 1074 7ff77ca511b0 Concurrency::cancel_current_task __std_exception_copy 1068->1074 1069->1066 1070 7ff77ca5194a 1069->1070 1072 7ff77ca51957 1069->1072 1073 7ff77ca5198f 1069->1073 1076 7ff77ca519ab memcpy 1070->1076 1077 7ff77ca519f5 memcpy 1070->1077 1083 7ff77ca5197c 1071->1083 1072->1066 1072->1068 1079 7ff77ca531a4 3 API calls 1073->1079 1075 7ff77ca51a30 1074->1075 1080 7ff77ca519cc 1076->1080 1081 7ff77ca519e1 1076->1081 1082 7ff77ca519ec 1077->1082 1078 7ff77ca519ee _invalid_parameter_noinfo_noreturn 1078->1077 1079->1083 1080->1078 1080->1081 1084 7ff77ca52ed0 free 1081->1084 1082->997 1083->1070 1083->1078 1084->1082 1090 7ff77ca52c62 ?good@ios_base@std@ 1085->1090 1087 7ff77ca52cc5 1089 7ff77ca52ccf ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N ?uncaught_exception@std@ 1087->1089 1092 7ff77ca52d1d ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J 1087->1092 1097 7ff77ca52cf5 ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD 1087->1097 1088 7ff77ca52c97 1088->1087 1093 7ff77ca52cad ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12 ?good@ios_base@std@ 1088->1093 1094 7ff77ca52daf ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@ 1089->1094 1096 7ff77ca527e7 ??6?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV01@P6AAEAV01@AEAV01@@Z 1089->1096 1090->1087 1090->1088 1092->1089 1095 7ff77ca52d42 1092->1095 1093->1087 1094->1096 1095->1089 1098 7ff77ca52d47 ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD 1095->1098 1096->994 1097->1087 1097->1089 1098->1089 1098->1095 1100 7ff77ca51a25 1099->1100 1104 7ff77ca518ff 1099->1104 1119 7ff77ca51250 ?_Xlength_error@std@@YAXPEBD 1100->1119 1101 7ff77ca51964 1105 7ff77ca531a4 3 API calls 1101->1105 1103 7ff77ca51a2a 1109 7ff77ca511b0 Concurrency::cancel_current_task __std_exception_copy 1103->1109 1104->1101 1106 7ff77ca51957 1104->1106 1107 7ff77ca5198f 1104->1107 1108 7ff77ca5194a 1104->1108 1105->1108 1106->1101 1106->1103 1114 7ff77ca531a4 3 API calls 1107->1114 1111 7ff77ca519ab memcpy 1108->1111 1112 7ff77ca519f5 memcpy 1108->1112 1113 7ff77ca519ee _invalid_parameter_noinfo_noreturn 1108->1113 1110 7ff77ca51a30 1109->1110 1115 7ff77ca519cc 1111->1115 1116 7ff77ca519e1 1111->1116 1117 7ff77ca519ec 1112->1117 1113->1112 1114->1108 1115->1113 1115->1116 1118 7ff77ca52ed0 free 1116->1118 1117->1043 1118->1117 1125 7ff77ca536a4 1122->1125 1124 7ff77ca536d2 _CxxThrowException 1125->1124 1127 7ff77ca5314a RtlLookupFunctionEntry 1126->1127 1128 7ff77ca52f63 1127->1128 1129 7ff77ca53160 RtlVirtualUnwind 1127->1129 1130 7ff77ca52f04 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 1128->1130 1129->1127 1129->1128 1134 7ff77ca5300c 1137 7ff77ca53020 IsProcessorFeaturePresent 1134->1137 1138 7ff77ca53037 1137->1138 1143 7ff77ca530c0 RtlCaptureContext RtlLookupFunctionEntry 1138->1143 1144 7ff77ca530f0 RtlVirtualUnwind 1143->1144 1145 7ff77ca5304b 1143->1145 1144->1145 1146 7ff77ca52f04 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 1145->1146 1182 7ff77ca53428 1183 7ff77ca53438 1182->1183 1195 7ff77ca53258 1183->1195 1185 7ff77ca539cc 9 API calls 1186 7ff77ca534dd 1185->1186 1187 7ff77ca5345c _RTC_Initialize 1193 7ff77ca534bf 1187->1193 1203 7ff77ca53c98 InitializeSListHead 1187->1203 1193->1185 1194 7ff77ca534cd 1193->1194 1196 7ff77ca53269 1195->1196 1197 7ff77ca5329b 1195->1197 1198 7ff77ca532d8 1196->1198 1201 7ff77ca5326e __scrt_release_startup_lock 1196->1201 1197->1187 1199 7ff77ca539cc 9 API calls 1198->1199 1200 7ff77ca532e2 1199->1200 1201->1197 1202 7ff77ca5328b _initialize_onexit_table 1201->1202 1202->1197 1207 7ff77ca53688 1210 7ff77ca53be4 1207->1210 1211 7ff77ca53691 1210->1211 1212 7ff77ca53c07 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 1210->1212 1212->1211 1133 7ff77ca510b0 __std_exception_copy 1148 7ff77ca51110 __std_exception_destroy 1149 7ff77ca51138 1148->1149 1150 7ff77ca51145 1148->1150 1151 7ff77ca52ed0 free 1149->1151 1151->1150 1155 7ff77ca52df0 ?widen@?$basic_ios@DU?$char_traits@D@std@@@std@@QEBADD ?put@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@D ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12 1156 7ff77ca534f0 1160 7ff77ca53b74 SetUnhandledExceptionFilter 1156->1160 1166 7ff77ca54050 1167 7ff77ca54098 1166->1167 1168 7ff77ca54061 1166->1168 1169 7ff77ca54093 1168->1169 1170 7ff77ca5408c _invalid_parameter_noinfo_noreturn 1168->1170 1171 7ff77ca52ed0 free 1169->1171 1170->1169 1171->1167 1204 7ff77ca52e30 ?uncaught_exception@std@ 1205 7ff77ca52e4d 1204->1205 1206 7ff77ca52e43 ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@ 1204->1206 1206->1205 1217 7ff77ca51070 1218 7ff77ca51088 1217->1218 1219 7ff77ca51092 1217->1219 1220 7ff77ca52ed0 free 1218->1220 1220->1219 1165 7ff77ca53fd8 ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N 1172 7ff77ca53e38 1173 7ff77ca53e70 __GSHandlerCheckCommon 1172->1173 1174 7ff77ca53e8b __CxxFrameHandler4 1173->1174 1175 7ff77ca53e9c 1173->1175 1174->1175 1176 7ff77ca5363a 1177 7ff77ca53b20 GetModuleHandleW 1176->1177 1178 7ff77ca53641 1177->1178 1179 7ff77ca53680 _exit 1178->1179 1180 7ff77ca53645 1178->1180 1131 6751cfeb9b HttpOpenRequestA 1132 6751cfebc2 1131->1132 1152 7ff77ca51000 1153 7ff77ca531a4 3 API calls 1152->1153 1154 7ff77ca5100e 1153->1154 1221 7ff77ca51160 __std_exception_destroy 1222 7ff77ca53f60 1223 7ff77ca53f73 1222->1223 1224 7ff77ca53f80 1222->1224 1226 7ff77ca51750 1223->1226 1227 7ff77ca51763 1226->1227 1228 7ff77ca5178f 1226->1228 1229 7ff77ca51787 1227->1229 1230 7ff77ca517a8 _invalid_parameter_noinfo_noreturn 1227->1230 1228->1224 1231 7ff77ca52ed0 free 1229->1231 1231->1228 1213 7ff77ca52d81 1214 7ff77ca52d8f ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N ?uncaught_exception@std@ 1213->1214 1215 7ff77ca52daf ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@ 1214->1215 1216 7ff77ca52db9 1214->1216 1215->1216

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 0 7ff77ca52890-7ff77ca5292d memcpy 1 7ff77ca52930-7ff77ca52937 0->1 1->1 2 7ff77ca52939-7ff77ca52946 1->2 3 7ff77ca5294c-7ff77ca52952 2->3 4 7ff77ca52c21-7ff77ca52c26 call 7ff77ca51250 2->4 6 7ff77ca52954-7ff77ca5297b memcpy 3->6 7 7ff77ca52980-7ff77ca5298a 3->7 12 7ff77ca52c27-7ff77ca52c2f call 7ff77ca511b0 4->12 9 7ff77ca52a1b-7ff77ca52a3d call 7ff77ca51a40 6->9 10 7ff77ca5298c-7ff77ca52996 7->10 11 7ff77ca529b9-7ff77ca529cf 7->11 27 7ff77ca52a3f-7ff77ca52a51 9->27 28 7ff77ca52a71-7ff77ca52a8e memset 9->28 16 7ff77ca5299a-7ff77ca529a5 call 7ff77ca531a4 10->16 13 7ff77ca529d6-7ff77ca529dd 11->13 14 7ff77ca529d1-7ff77ca529d4 11->14 20 7ff77ca529ee-7ff77ca529f3 call 7ff77ca531a4 13->20 21 7ff77ca529df-7ff77ca529e6 13->21 19 7ff77ca529f6-7ff77ca52a17 memcpy 14->19 31 7ff77ca529ab-7ff77ca529b7 16->31 32 7ff77ca52be7-7ff77ca52bed _invalid_parameter_noinfo_noreturn 16->32 19->9 20->19 21->12 25 7ff77ca529ec 21->25 25->16 29 7ff77ca52a6c call 7ff77ca52ed0 27->29 30 7ff77ca52a53-7ff77ca52a66 27->30 33 7ff77ca52ac6-7ff77ca52ade memset 28->33 34 7ff77ca52a90-7ff77ca52a9c 28->34 29->28 30->29 30->32 31->19 39 7ff77ca52bee call 7ff77ca52ed0 32->39 38 7ff77ca52ae0-7ff77ca52ae7 33->38 37 7ff77ca52aa0-7ff77ca52ac4 34->37 37->33 37->37 38->38 40 7ff77ca52ae9-7ff77ca52aec 38->40 44 7ff77ca52bf3-7ff77ca52c20 call 7ff77ca52eb0 39->44 42 7ff77ca52b79-7ff77ca52bbc LoadLibraryA VirtualProtect CertEnumSystemStore 40->42 43 7ff77ca52af2-7ff77ca52afe 40->43 42->44 45 7ff77ca52bbe-7ff77ca52bd0 42->45 46 7ff77ca52b00-7ff77ca52b0f 43->46 45->39 48 7ff77ca52bd2-7ff77ca52be5 45->48 49 7ff77ca52b17-7ff77ca52b1d 46->49 50 7ff77ca52b11-7ff77ca52b15 46->50 48->32 48->39 53 7ff77ca52b25-7ff77ca52b2b 49->53 54 7ff77ca52b1f-7ff77ca52b23 49->54 52 7ff77ca52b31-7ff77ca52b40 50->52 55 7ff77ca52b48-7ff77ca52b4e 52->55 56 7ff77ca52b42-7ff77ca52b46 52->56 53->52 57 7ff77ca52b2d 53->57 54->52 59 7ff77ca52b56-7ff77ca52b5c 55->59 60 7ff77ca52b50-7ff77ca52b54 55->60 58 7ff77ca52b62-7ff77ca52b77 56->58 57->52 58->42 58->46 59->58 61 7ff77ca52b5e 59->61 60->58 61->58
                  APIs
                  Strings
                  • kernel32.dll, xrefs: 00007FF77CA52B79
                  • fTk0IXs+RsZrY9epOUeq1oQ0l4RoVPjlVJoEuMX3zPeE+je8GdHrJUcxFZpepdr4SDRVKa6s7ouAvVNOqjbmDXauHJGPlOuvClVpjZvRyLdC2d6h5WF7twqC1kX9nIKWgL9KaawEYPrhgpcPJeSSnLatPbvLnYxgng2QCJQ8DmxkwRBosnzlWeW39pnWOJcwZvMht1Ue7ys35aku9WPa2jr1RTE8qRhrprEAHTM+xpPpcOmcTSt4aUDyEbOtWv6EV/1G, xrefs: 00007FF77CA528CB
                  Memory Dump Source
                  • Source File: 00000000.00000002.2896924563.00007FF77CA51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77CA50000, based on PE: true
                  • Associated: 00000000.00000002.2896888891.00007FF77CA50000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2896937029.00007FF77CA55000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2896951100.00007FF77CA5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2896971827.00007FF77CA5C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff77ca50000_2PSj0qX4W6.jbxd
                  Similarity
                  • API ID: memcpy$memset$CertConcurrency::cancel_current_taskEnumLibraryLoadProtectStoreSystemVirtual_invalid_parameter_noinfo_noreturnmalloc
                  • String ID: fTk0IXs+RsZrY9epOUeq1oQ0l4RoVPjlVJoEuMX3zPeE+je8GdHrJUcxFZpepdr4SDRVKa6s7ouAvVNOqjbmDXauHJGPlOuvClVpjZvRyLdC2d6h5WF7twqC1kX9nIKWgL9KaawEYPrhgpcPJeSSnLatPbvLnYxgng2QCJQ8DmxkwRBosnzlWeW39pnWOJcwZvMht1Ue7ys35aku9WPa2jr1RTE8qRhrprEAHTM+xpPpcOmcTSt4aUDyEbOtWv6EV/1G$kernel32.dll
                  • API String ID: 150564791-1552992655
                  • Opcode ID: ffa8f0ba843f4013f44525dfc9840ffd1d381b7730647cc0e71a19c35832ef2a
                  • Instruction ID: bd2bf7aec76efc8027e292688d17250501db719a2d8295e22a95f3212de1e712
                  • Opcode Fuzzy Hash: ffa8f0ba843f4013f44525dfc9840ffd1d381b7730647cc0e71a19c35832ef2a
                  • Instruction Fuzzy Hash: 7EA1A323B3868685EB20DB20F440AADA361FB49795FC28732DB5D47696DF38E145C710

                  Control-flow Graph

                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2896924563.00007FF77CA51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77CA50000, based on PE: true
                  • Associated: 00000000.00000002.2896888891.00007FF77CA50000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2896937029.00007FF77CA55000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2896951100.00007FF77CA5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2896971827.00007FF77CA5C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff77ca50000_2PSj0qX4W6.jbxd
                  Similarity
                  • API ID: __p___argc__p___argv__scrt_acquire_startup_lock__scrt_release_startup_lock_cexit_exit_get_initial_narrow_environment_register_thread_local_exe_atexit_callback
                  • String ID:
                  • API String ID: 1133592946-0
                  • Opcode ID: df102f85938d3cac35a7069fa22ae6c53ea1cb25a1aa4727b64a6a950befc1c6
                  • Instruction ID: 74d543b75b1f2efc695acce52ae99073c62256344bd8a73388f44c10168a8c29
                  • Opcode Fuzzy Hash: df102f85938d3cac35a7069fa22ae6c53ea1cb25a1aa4727b64a6a950befc1c6
                  • Instruction Fuzzy Hash: 92312913F3A60242EB10BB65B411BB9E291AF88782FC6C434EB0D076D7DE2DE4048260

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 113 6751cfeb9b-6751cfebc1 HttpOpenRequestA 114 6751cfebc2-6751cfebfe 113->114 117 6751cfec04-6751cfec07 114->117 118 6751cfeda1-6751cfedc2 114->118 119 6751cfec0d 117->119 120 6751cfed99-6751cfed9a 117->120 122 6751cfedc4-6751cfede1 118->122 119->114 120->118 122->120 124 6751cfede3-6751cfedeb 122->124 124->122 125 6751cfeded-6751cfedf7 124->125
                  APIs
                  • HttpOpenRequestA.WININET(00000000,00000000,84C03200,00000000), ref: 0000006751CFEBB6
                  Strings
                  Memory Dump Source
                  • Source File: 00000000.00000002.2896570979.0000006751CFE000.00000040.00000010.00020000.00000000.sdmp, Offset: 0000006751CFE000, based on PE: false
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_6751cfe000_2PSj0qX4W6.jbxd
                  Yara matches
                  Similarity
                  • API ID: HttpOpenRequest
                  • String ID: U.;
                  • API String ID: 1984915467-4213443877
                  • Opcode ID: ab09341529980e95ac1e803047b3985bc20a26ea9b837d55d995e7e224907264
                  • Instruction ID: cafdd04c6bb284505b192317716b2efab7c5bf1e50111015bebf52c1c68a5994
                  • Opcode Fuzzy Hash: ab09341529980e95ac1e803047b3985bc20a26ea9b837d55d995e7e224907264
                  • Instruction Fuzzy Hash: FB117CA034890D1BF61C819D7C6A73622CAD7C975AF25827FB50FC32D6DD948C93405A

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 126 7ff77ca517b0-7ff77ca517df 127 7ff77ca517e0-7ff77ca517e7 126->127 127->127 128 7ff77ca517e9-7ff77ca517f6 127->128 129 7ff77ca517fc-7ff77ca51800 128->129 130 7ff77ca518c2-7ff77ca518c7 call 7ff77ca51250 128->130 131 7ff77ca5181f-7ff77ca51829 129->131 132 7ff77ca51802-7ff77ca5181a memcpy 129->132 141 7ff77ca518c8-7ff77ca518f9 call 7ff77ca511b0 130->141 135 7ff77ca5182b-7ff77ca51835 131->135 136 7ff77ca51854-7ff77ca5186a 131->136 134 7ff77ca518ac-7ff77ca518c1 132->134 140 7ff77ca51839-7ff77ca51844 call 7ff77ca531a4 135->140 138 7ff77ca5186c-7ff77ca51873 136->138 139 7ff77ca5188f-7ff77ca518a8 memcpy 136->139 142 7ff77ca51887-7ff77ca5188c call 7ff77ca531a4 138->142 143 7ff77ca51875-7ff77ca5187c 138->143 139->134 152 7ff77ca51846-7ff77ca51852 140->152 153 7ff77ca51880-7ff77ca51886 _invalid_parameter_noinfo_noreturn 140->153 154 7ff77ca51a25-7ff77ca51a2a call 7ff77ca51250 141->154 155 7ff77ca518ff-7ff77ca51920 141->155 142->139 143->141 146 7ff77ca5187e 143->146 146->140 152->139 153->142 165 7ff77ca51a2b-7ff77ca51a30 call 7ff77ca511b0 154->165 156 7ff77ca51966-7ff77ca51970 155->156 157 7ff77ca51922-7ff77ca51931 155->157 160 7ff77ca51974-7ff77ca5197f call 7ff77ca531a4 156->160 157->156 159 7ff77ca51933-7ff77ca51948 157->159 162 7ff77ca5194e-7ff77ca51955 159->162 163 7ff77ca5194a-7ff77ca5194c 159->163 175 7ff77ca519ee-7ff77ca519f4 _invalid_parameter_noinfo_noreturn 160->175 176 7ff77ca51981-7ff77ca5198d 160->176 167 7ff77ca51957-7ff77ca5195e 162->167 168 7ff77ca5198f-7ff77ca51994 call 7ff77ca531a4 162->168 166 7ff77ca51997-7ff77ca519a9 163->166 172 7ff77ca519ab-7ff77ca519ca memcpy 166->172 173 7ff77ca519f5-7ff77ca51a01 memcpy 166->173 167->165 174 7ff77ca51964 167->174 168->166 178 7ff77ca519cc-7ff77ca519df 172->178 179 7ff77ca519e4-7ff77ca519ec call 7ff77ca52ed0 172->179 180 7ff77ca51a06-7ff77ca51a24 173->180 174->160 175->173 176->166 178->175 182 7ff77ca519e1 178->182 179->180 182->179
                  APIs
                  • memcpy.VCRUNTIME140(00000000,?,?,00007FF77CA52807), ref: 00007FF77CA51811
                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(00000000,?,?,00007FF77CA52807), ref: 00007FF77CA51880
                    • Part of subcall function 00007FF77CA531A4: malloc.API-MS-WIN-CRT-HEAP-L1-1-0(?,?,?,00007FF77CA5100E), ref: 00007FF77CA531BE
                  • memcpy.VCRUNTIME140(00000000,?,?,00007FF77CA52807), ref: 00007FF77CA518A3
                  • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF77CA518C8
                  • memcpy.VCRUNTIME140(?,?,?,?,?,?,?,?,00007FF77CA52807), ref: 00007FF77CA519B1
                  • _invalid_parameter_noinfo_noreturn.API-MS-WIN-CRT-RUNTIME-L1-1-0(?,?,?,?,?,?,?,?,00007FF77CA52807), ref: 00007FF77CA519EE
                  • memcpy.VCRUNTIME140(?,?,?,?,?,?,?,?,00007FF77CA52807), ref: 00007FF77CA519F8
                  • Concurrency::cancel_current_task.LIBCPMT ref: 00007FF77CA51A2B
                    • Part of subcall function 00007FF77CA531A4: Concurrency::cancel_current_task.LIBCPMT ref: 00007FF77CA531D4
                    • Part of subcall function 00007FF77CA531A4: Concurrency::cancel_current_task.LIBCPMT ref: 00007FF77CA531DA
                  Memory Dump Source
                  • Source File: 00000000.00000002.2896924563.00007FF77CA51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77CA50000, based on PE: true
                  • Associated: 00000000.00000002.2896888891.00007FF77CA50000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2896937029.00007FF77CA55000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2896951100.00007FF77CA5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2896971827.00007FF77CA5C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff77ca50000_2PSj0qX4W6.jbxd
                  Similarity
                  • API ID: Concurrency::cancel_current_taskmemcpy$_invalid_parameter_noinfo_noreturn$malloc
                  • String ID:
                  • API String ID: 1057630676-0
                  • Opcode ID: 464bffc901c1c071010548c694ba76aea8e22709931f1539bc19d3fd378ea19e
                  • Instruction ID: a4d26907f7b7776e3e1ba507700a6a22bb64b7f6ac83d2d337fa33c4e0b6556f
                  • Opcode Fuzzy Hash: 464bffc901c1c071010548c694ba76aea8e22709931f1539bc19d3fd378ea19e
                  • Instruction Fuzzy Hash: 64A228737282D18AE7259F29B4406FABBA1F74978AF868235DB8D47785CB3CE501C710

                  Control-flow Graph

                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2896924563.00007FF77CA51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77CA50000, based on PE: true
                  • Associated: 00000000.00000002.2896888891.00007FF77CA50000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2896937029.00007FF77CA55000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2896951100.00007FF77CA5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2896971827.00007FF77CA5C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff77ca50000_2PSj0qX4W6.jbxd
                  Similarity
                  • API ID: ExceptionFilterPresentUnhandledmemset$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
                  • String ID:
                  • API String ID: 313767242-0
                  • Opcode ID: f2aa790f9085783cc2a9030d909d546b5d07370b2f8c6efc4ec764b99a8b9c54
                  • Instruction ID: 9e59ac22707c9c221e46e35c929cd4e6c600e4af85117503bc413186e4353401
                  • Opcode Fuzzy Hash: f2aa790f9085783cc2a9030d909d546b5d07370b2f8c6efc4ec764b99a8b9c54
                  • Instruction Fuzzy Hash: 82311D67B29B818AEB609F60F8507A9A360FB88705F818439DB4E47A95EE38D548C710

                  Control-flow Graph

                  APIs
                  Memory Dump Source
                  • Source File: 00000000.00000002.2896924563.00007FF77CA51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77CA50000, based on PE: true
                  • Associated: 00000000.00000002.2896888891.00007FF77CA50000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2896937029.00007FF77CA55000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2896951100.00007FF77CA5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2896971827.00007FF77CA5C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff77ca50000_2PSj0qX4W6.jbxd
                  Similarity
                  • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
                  • String ID:
                  • API String ID: 2933794660-0
                  • Opcode ID: 0276672fa070bc2c4ef3fd86ef9fb26e19d7fbff92688fdf569c2d60a7172a23
                  • Instruction ID: 7fd76fe9eb8417e07ec6fc4bc9cd0f046c9485978a8725ac4fc03517d46b5040
                  • Opcode Fuzzy Hash: 0276672fa070bc2c4ef3fd86ef9fb26e19d7fbff92688fdf569c2d60a7172a23
                  • Instruction Fuzzy Hash: 4C114C22B24F058AEB009B60F8546B973A4FB1D759F850A31EF2D427A4DF38D1588390
                  Memory Dump Source
                  • Source File: 00000000.00000002.2896924563.00007FF77CA51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77CA50000, based on PE: true
                  • Associated: 00000000.00000002.2896888891.00007FF77CA50000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2896937029.00007FF77CA55000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2896951100.00007FF77CA5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2896971827.00007FF77CA5C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff77ca50000_2PSj0qX4W6.jbxd
                  Similarity
                  • API ID:
                  • String ID:
                  • API String ID:
                  • Opcode ID: 461e366995084b33554bdb7452efeaf27cd1e663f7dc700abdf8bff6f2843dad
                  • Instruction ID: b4fdf1b7a0a0805aebff711d745102f18cf088e753e3bee8333f5358700e1f20
                  • Opcode Fuzzy Hash: 461e366995084b33554bdb7452efeaf27cd1e663f7dc700abdf8bff6f2843dad
                  • Instruction Fuzzy Hash: 23A00126E39D02E4EB04AB40F950820E220ABA8322B838035E20E41060DE6CA5548261

                  Control-flow Graph

                  • Executed
                  • Not Executed
                  control_flow_graph 185 7ff77ca52c30-7ff77ca52c60 186 7ff77ca52c68 185->186 187 7ff77ca52c62-7ff77ca52c66 185->187 188 7ff77ca52c6a-7ff77ca52c7a 186->188 187->188 189 7ff77ca52c7c-7ff77ca52c82 188->189 190 7ff77ca52c83-7ff77ca52c95 ?good@ios_base@std@@QEBA_NXZ 188->190 189->190 191 7ff77ca52cc7-7ff77ca52ccd 190->191 192 7ff77ca52c97-7ff77ca52ca6 190->192 193 7ff77ca52cd9-7ff77ca52cec 191->193 194 7ff77ca52ccf-7ff77ca52cd4 191->194 196 7ff77ca52ca8-7ff77ca52cab 192->196 197 7ff77ca52cc5 192->197 199 7ff77ca52d1d-7ff77ca52d40 ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z 193->199 200 7ff77ca52cee 193->200 198 7ff77ca52d8f-7ff77ca52dad ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z ?uncaught_exception@std@@YA_NXZ 194->198 196->197 201 7ff77ca52cad-7ff77ca52cc3 ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ ?good@ios_base@std@@QEBA_NXZ 196->201 197->191 202 7ff77ca52db9-7ff77ca52dc8 198->202 203 7ff77ca52daf-7ff77ca52db8 ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ 198->203 205 7ff77ca52d68 199->205 206 7ff77ca52d42-7ff77ca52d45 199->206 204 7ff77ca52cf0-7ff77ca52cf3 200->204 201->191 207 7ff77ca52dca-7ff77ca52dd0 202->207 208 7ff77ca52dd1-7ff77ca52de1 202->208 203->202 204->199 209 7ff77ca52cf5-7ff77ca52d0f ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z 204->209 212 7ff77ca52d6b 205->212 210 7ff77ca52d47-7ff77ca52d61 ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z 206->210 211 7ff77ca52d6f-7ff77ca52d7f 206->211 207->208 213 7ff77ca52d18-7ff77ca52d1b 209->213 214 7ff77ca52d11-7ff77ca52d16 209->214 210->205 215 7ff77ca52d63-7ff77ca52d66 210->215 211->198 212->211 213->204 214->212 215->206
                  APIs
                  • ?good@ios_base@std@@QEBA_NXZ.MSVCP140(?,?,?,?,00000001,00007FF77CA527E7), ref: 00007FF77CA52C8D
                  • ?flush@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAAEAV12@XZ.MSVCP140(?,?,?,?,00000001,00007FF77CA527E7), ref: 00007FF77CA52CAD
                  • ?good@ios_base@std@@QEBA_NXZ.MSVCP140(?,?,?,?,00000001,00007FF77CA527E7), ref: 00007FF77CA52CBD
                  • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140(?,?,?,?,00000001,00007FF77CA527E7), ref: 00007FF77CA52D06
                  • ?sputn@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAA_JPEBD_J@Z.MSVCP140(?,?,?,?,00000001,00007FF77CA527E7), ref: 00007FF77CA52D36
                  • ?sputc@?$basic_streambuf@DU?$char_traits@D@std@@@std@@QEAAHD@Z.MSVCP140(?,?,?,?,00000001,00007FF77CA527E7), ref: 00007FF77CA52D58
                  • ?setstate@?$basic_ios@DU?$char_traits@D@std@@@std@@QEAAXH_N@Z.MSVCP140(?,?,?,?,00000001,00007FF77CA527E7), ref: 00007FF77CA52D9E
                  • ?uncaught_exception@std@@YA_NXZ.MSVCP140(?,?,?,?,00000001,00007FF77CA527E7), ref: 00007FF77CA52DA5
                  • ?_Osfx@?$basic_ostream@DU?$char_traits@D@std@@@std@@QEAAXXZ.MSVCP140(?,?,?,?,00000001,00007FF77CA527E7), ref: 00007FF77CA52DB2
                  Memory Dump Source
                  • Source File: 00000000.00000002.2896924563.00007FF77CA51000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF77CA50000, based on PE: true
                  • Associated: 00000000.00000002.2896888891.00007FF77CA50000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2896937029.00007FF77CA55000.00000002.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2896951100.00007FF77CA5B000.00000004.00000001.01000000.00000003.sdmpDownload File
                  • Associated: 00000000.00000002.2896971827.00007FF77CA5C000.00000002.00000001.01000000.00000003.sdmpDownload File
                  Joe Sandbox IDA Plugin
                  • Snapshot File: hcaresult_0_2_7ff77ca50000_2PSj0qX4W6.jbxd
                  Similarity
                  • API ID: D@std@@@std@@U?$char_traits@$?good@ios_base@std@@?sputc@?$basic_streambuf@$?flush@?$basic_ostream@?setstate@?$basic_ios@?sputn@?$basic_streambuf@?uncaught_exception@std@@Osfx@?$basic_ostream@V12@
                  • String ID:
                  • API String ID: 3274656010-0
                  • Opcode ID: 1c69fbfb43a822db2c1053205ed4b05eb2a64257830f85884b741cf852c91941
                  • Instruction ID: 8500872ba98e769f42bf40b40b4933426edc0927dbc36b0d2ec82d40503ec16f
                  • Opcode Fuzzy Hash: 1c69fbfb43a822db2c1053205ed4b05eb2a64257830f85884b741cf852c91941
                  • Instruction Fuzzy Hash: D8512133728A4185EB20AB19F590A38E760EF89F96B96C631DB5F837A1CF2DD4458350