Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
setup.exe

Overview

General Information

Sample name:setup.exe
Analysis ID:1521012
MD5:f6c330bf80269e6a2ce60b6c173ede5e
SHA1:3a1ee94b51b65b73ae8694d407feae213cdfa0a3
SHA256:dd41646c21ed512b30eaad50eca6e74a45ecd7c6c7bf9d1c6aa804c2ea845428
Tags:exeuser-4k95m
Infos:

Detection

RisePro Stealer
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Multi AV Scanner detection for submitted file
Suricata IDS alerts for network traffic
Yara detected RisePro Stealer
AI detected suspicious sample
Allocates memory in foreign processes
Contains functionality to inject code into remote processes
Found stalling execution ending in API Sleep call
Injects a PE file into a foreign processes
Machine Learning detection for sample
Switches to a custom stack to bypass stack traces
Writes to foreign memory regions
Abnormal high CPU Usage
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Contains functionality for execution timing, often used to detect debuggers
Contains functionality to dynamically determine API calls
Contains functionality to read the PEB
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found decision node followed by non-executed suspicious APIs
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sample file is different than original file name gathered from version info
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • setup.exe (PID: 5608 cmdline: "C:\Users\user\Desktop\setup.exe" MD5: F6C330BF80269E6A2CE60B6C173EDE5E)
    • conhost.exe (PID: 2916 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
    • RegAsm.exe (PID: 6408 cmdline: "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe" MD5: 0D5DF43AF2916F47D00C1573797C1A13)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
Process Memory Space: RegAsm.exe PID: 6408JoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security
    SourceRuleDescriptionAuthorStrings
    3.2.RegAsm.exe.400000.0.unpackJoeSecurity_RiseProStealerYara detected RisePro StealerJoe Security
      No Sigma rule has matched
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-09-28T03:03:04.022076+020020490601A Network Trojan was detected192.168.2.749700193.233.132.25350600TCP
      TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
      2024-09-28T03:03:07.019564+020020462691A Network Trojan was detected192.168.2.749700193.233.132.25350600TCP

      Click to jump to signature section

      Show All Signature Results

      AV Detection

      barindex
      Source: setup.exeAvira: detected
      Source: setup.exeReversingLabs: Detection: 63%
      Source: setup.exeVirustotal: Detection: 73%Perma Link
      Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
      Source: setup.exeJoe Sandbox ML: detected
      Source: C:\Users\user\Desktop\setup.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\setup.exe.logJump to behavior
      Source: setup.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Source: Binary string: RegAsm.pdb source: RegAsm.exe, 00000003.00000002.3721877835.00000000015F6000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: RegAsm.pdb4 source: RegAsm.exe, 00000003.00000002.3721877835.00000000015F6000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: C:\7jdz0h\obj\Release\Company.pdb source: setup.exe

      Networking

      barindex
      Source: Network trafficSuricata IDS: 2049060 - Severity 1 - ET MALWARE RisePro TCP Heartbeat Packet : 192.168.2.7:49700 -> 193.233.132.253:50600
      Source: Network trafficSuricata IDS: 2046269 - Severity 1 - ET MALWARE [ANY.RUN] RisePro TCP (Activity) : 192.168.2.7:49700 -> 193.233.132.253:50600
      Source: global trafficTCP traffic: 192.168.2.7:49700 -> 193.233.132.253:50600
      Source: Joe Sandbox ViewIP Address: 193.233.132.253 193.233.132.253
      Source: Joe Sandbox ViewIP Address: 193.233.132.253 193.233.132.253
      Source: Joe Sandbox ViewASN Name: FREE-NET-ASFREEnetEU FREE-NET-ASFREEnetEU
      Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.253
      Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.253
      Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.253
      Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.253
      Source: unknownTCP traffic detected without corresponding DNS query: 193.233.132.253
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004680A0 recv,3_2_004680A0
      Source: RegAsm.exe, 00000003.00000002.3720560055.0000000000515000.00000002.00000400.00020000.00000000.sdmpString found in binary or memory: http://www.winimage.com/zLibDll
      Source: RegAsm.exe, 00000003.00000002.3720560055.0000000000515000.00000002.00000400.00020000.00000000.sdmpString found in binary or memory: http://www.winimage.com/zLibDllDpRTpR
      Source: RegAsm.exe, 00000003.00000002.3720560055.0000000000515000.00000002.00000400.00020000.00000000.sdmpString found in binary or memory: https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll
      Source: RegAsm.exe, 00000003.00000002.3721877835.00000000015AA000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://t.me/RiseProSUPPORT
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeProcess Stats: CPU usage > 49%
      Source: C:\Users\user\Desktop\setup.exeCode function: 0_2_00A20B800_2_00A20B80
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_005EF0063_2_005EF006
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0057900A3_2_0057900A
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0054F0FB3_2_0054F0FB
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0055014F3_2_0055014F
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0054D12C3_2_0054D12C
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_005701F53_2_005701F5
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004E925D3_2_004E925D
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004872703_2_00487270
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_005E23493_2_005E2349
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004E03D03_2_004E03D0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_005DC3B13_2_005DC3B1
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004024003_2_00402400
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_005AF4AC3_2_005AF4AC
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_005535083_2_00553508
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004E959F3_2_004E959F
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_005486763_2_00548676
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004026003_2_00402600
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_005836143_2_00583614
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_005636083_2_00563608
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0056D85D3_2_0056D85D
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_005DB8313_2_005DB831
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_005639D33_2_005639D3
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_005EFAD23_2_005EFAD2
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004E5B903_2_004E5B90
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00418BB03_2_00418BB0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_005BDC4C3_2_005BDC4C
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_005D7D093_2_005D7D09
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_005D4E2F3_2_005D4E2F
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_005E8EF43_2_005E8EF4
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00483EF03_2_00483EF0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0059AEB83_2_0059AEB8
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00550FB63_2_00550FB6
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0057DFBA3_2_0057DFBA
      Source: setup.exe, 00000000.00000002.1256634562.00000000008C9000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs setup.exe
      Source: setup.exe, 00000000.00000000.1252913238.00000000002BC000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameCompany.exeJ vs setup.exe
      Source: setup.exeBinary or memory string: OriginalFilenameCompany.exeJ vs setup.exe
      Source: classification engineClassification label: mal100.troj.evad.winEXE@4/1@0/1
      Source: C:\Users\user\Desktop\setup.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\setup.exe.logJump to behavior
      Source: C:\Users\user\Desktop\setup.exeMutant created: NULL
      Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:2916:120:WilError_03
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeFile created: C:\Users\user~1\AppData\Local\Temp\adobe9Ly9nVMaTKYMJump to behavior
      Source: setup.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      Source: setup.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
      Source: C:\Users\user\Desktop\setup.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
      Source: RegAsm.exe, 00000003.00000002.3720560055.0000000000515000.00000002.00000400.00020000.00000000.sdmpBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
      Source: RegAsm.exe, 00000003.00000002.3720560055.0000000000515000.00000002.00000400.00020000.00000000.sdmpBinary or memory string: UPDATE %Q.%s SET sql = sqlite_rename_table(sql, %Q), tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger');
      Source: setup.exeReversingLabs: Detection: 63%
      Source: setup.exeVirustotal: Detection: 73%
      Source: unknownProcess created: C:\Users\user\Desktop\setup.exe "C:\Users\user\Desktop\setup.exe"
      Source: C:\Users\user\Desktop\setup.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Source: C:\Users\user\Desktop\setup.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
      Source: C:\Users\user\Desktop\setup.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
      Source: C:\Users\user\Desktop\setup.exeSection loaded: mscoree.dllJump to behavior
      Source: C:\Users\user\Desktop\setup.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Users\user\Desktop\setup.exeSection loaded: acgenral.dllJump to behavior
      Source: C:\Users\user\Desktop\setup.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Users\user\Desktop\setup.exeSection loaded: winmm.dllJump to behavior
      Source: C:\Users\user\Desktop\setup.exeSection loaded: samcli.dllJump to behavior
      Source: C:\Users\user\Desktop\setup.exeSection loaded: msacm32.dllJump to behavior
      Source: C:\Users\user\Desktop\setup.exeSection loaded: version.dllJump to behavior
      Source: C:\Users\user\Desktop\setup.exeSection loaded: userenv.dllJump to behavior
      Source: C:\Users\user\Desktop\setup.exeSection loaded: dwmapi.dllJump to behavior
      Source: C:\Users\user\Desktop\setup.exeSection loaded: urlmon.dllJump to behavior
      Source: C:\Users\user\Desktop\setup.exeSection loaded: mpr.dllJump to behavior
      Source: C:\Users\user\Desktop\setup.exeSection loaded: sspicli.dllJump to behavior
      Source: C:\Users\user\Desktop\setup.exeSection loaded: winmmbase.dllJump to behavior
      Source: C:\Users\user\Desktop\setup.exeSection loaded: winmmbase.dllJump to behavior
      Source: C:\Users\user\Desktop\setup.exeSection loaded: iertutil.dllJump to behavior
      Source: C:\Users\user\Desktop\setup.exeSection loaded: srvcli.dllJump to behavior
      Source: C:\Users\user\Desktop\setup.exeSection loaded: netutils.dllJump to behavior
      Source: C:\Users\user\Desktop\setup.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Users\user\Desktop\setup.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
      Source: C:\Users\user\Desktop\setup.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
      Source: C:\Users\user\Desktop\setup.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: apphelp.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: aclayers.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mpr.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: sfc_os.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: rstrtmgr.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ncrypt.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: ntasn1.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: d3d11.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dxgi.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: resourcepolicyclient.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: kernel.appcore.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: d3d10warp.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: uxtheme.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: dxcore.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: winhttp.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: wininet.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: mswsock.dllJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeSection loaded: devobj.dllJump to behavior
      Source: setup.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
      Source: setup.exeStatic PE information: Virtual size of .text is bigger than: 0x100000
      Source: setup.exeStatic file information: File size 2265088 > 1048576
      Source: setup.exeStatic PE information: Raw size of .text is bigger than: 0x100000 < 0x228600
      Source: setup.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Source: setup.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
      Source: Binary string: RegAsm.pdb source: RegAsm.exe, 00000003.00000002.3721877835.00000000015F6000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: RegAsm.pdb4 source: RegAsm.exe, 00000003.00000002.3721877835.00000000015F6000.00000004.00000020.00020000.00000000.sdmp
      Source: Binary string: C:\7jdz0h\obj\Release\Company.pdb source: setup.exe
      Source: setup.exeStatic PE information: 0x9484A554 [Wed Dec 16 08:44:04 2048 UTC]
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00418BB0 LoadLibraryA,GetProcAddress,3_2_00418BB0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004DD189 push ecx; ret 3_2_004DD19C
      Source: C:\Users\user\Desktop\setup.exeFile created: C:\Users\user\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\setup.exe.logJump to behavior
      Source: C:\Users\user\Desktop\setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
      Source: C:\Users\user\Desktop\setup.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

      Malware Analysis System Evasion

      barindex
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeStalling execution: Execution stalls by calling Sleepgraph_3-23553
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeAPI/Special instruction interceptor: Address: 703BA7
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeAPI/Special instruction interceptor: Address: 65B260
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeAPI/Special instruction interceptor: Address: 5FD48D
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeAPI/Special instruction interceptor: Address: 61633D
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeAPI/Special instruction interceptor: Address: 742DBD
      Source: C:\Users\user\Desktop\setup.exeMemory allocated: A20000 memory reserve | memory write watchJump to behavior
      Source: C:\Users\user\Desktop\setup.exeMemory allocated: 2650000 memory reserve | memory write watchJump to behavior
      Source: C:\Users\user\Desktop\setup.exeMemory allocated: 4650000 memory reserve | memory write watchJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0054C04A rdtsc 3_2_0054C04A
      Source: C:\Users\user\Desktop\setup.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWindow / User API: threadDelayed 3163Jump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeWindow / User API: threadDelayed 5349Jump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)graph_3-23558
      Source: C:\Users\user\Desktop\setup.exe TID: 6752Thread sleep time: -922337203685477s >= -30000sJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6396Thread sleep count: 3163 > 30Jump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6396Thread sleep time: -319463s >= -30000sJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 7224Thread sleep count: 350 > 30Jump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6396Thread sleep count: 5349 > 30Jump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe TID: 6396Thread sleep time: -540249s >= -30000sJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeLast function: Thread delayed
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeLast function: Thread delayed
      Source: C:\Users\user\Desktop\setup.exeThread delayed: delay time: 922337203685477Jump to behavior
      Source: RegAsm.exe, 00000003.00000002.3721877835.0000000001609000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: SCSI\DISK&VEN_VMWARE&PROD_VIRTUAL_DISK\4&1656F219&0&000000&
      Source: RegAsm.exe, 00000003.00000002.3721877835.000000000161B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\scsi#disk&ven_vmware&prod_virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
      Source: RegAsm.exe, 00000003.00000002.3721877835.000000000161B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \\?\SCSI#Disk&Ven_VMware&Prod_Virtual_disk#4&1656f219&0&000000#{53f56307-b6bf-11d0-94f2-00a0c91efb8b}
      Source: RegAsm.exe, 00000003.00000002.3721877835.0000000001609000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_0054C04A rdtsc 3_2_0054C04A
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_00418BB0 LoadLibraryA,GetProcAddress,3_2_00418BB0
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeCode function: 3_2_004146B0 mov eax, dword ptr fs:[00000030h]3_2_004146B0
      Source: C:\Users\user\Desktop\setup.exeMemory allocated: page read and write | page guardJump to behavior

      HIPS / PFW / Operating System Protection Evasion

      barindex
      Source: C:\Users\user\Desktop\setup.exeMemory allocated: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 protect: page execute and read and writeJump to behavior
      Source: C:\Users\user\Desktop\setup.exeCode function: 0_2_02652411 CreateProcessA,VirtualAlloc,Wow64GetThreadContext,ReadProcessMemory,VirtualAllocEx,WriteProcessMemory,WriteProcessMemory,WriteProcessMemory,Wow64SetThreadContext,ResumeThread,0_2_02652411
      Source: C:\Users\user\Desktop\setup.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000 value starts with: 4D5AJump to behavior
      Source: C:\Users\user\Desktop\setup.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 400000Jump to behavior
      Source: C:\Users\user\Desktop\setup.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 401000Jump to behavior
      Source: C:\Users\user\Desktop\setup.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 515000Jump to behavior
      Source: C:\Users\user\Desktop\setup.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 540000Jump to behavior
      Source: C:\Users\user\Desktop\setup.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 545000Jump to behavior
      Source: C:\Users\user\Desktop\setup.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 5F6000Jump to behavior
      Source: C:\Users\user\Desktop\setup.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 5F7000Jump to behavior
      Source: C:\Users\user\Desktop\setup.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 81B000Jump to behavior
      Source: C:\Users\user\Desktop\setup.exeMemory written: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe base: 1091008Jump to behavior
      Source: C:\Users\user\Desktop\setup.exeProcess created: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"Jump to behavior
      Source: C:\Users\user\Desktop\setup.exeQueries volume information: C:\Users\user\Desktop\setup.exe VolumeInformationJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeQueries volume information: C:\ VolumeInformationJump to behavior
      Source: C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

      Stealing of Sensitive Information

      barindex
      Source: Yara matchFile source: 3.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 6408, type: MEMORYSTR

      Remote Access Functionality

      barindex
      Source: Yara matchFile source: 3.2.RegAsm.exe.400000.0.unpack, type: UNPACKEDPE
      Source: Yara matchFile source: Process Memory Space: RegAsm.exe PID: 6408, type: MEMORYSTR
      ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
      Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
      Native API
      1
      DLL Side-Loading
      411
      Process Injection
      1
      Masquerading
      OS Credential Dumping111
      Security Software Discovery
      Remote Services1
      Archive Collected Data
      1
      Encrypted Channel
      Exfiltration Over Other Network MediumAbuse Accessibility Features
      CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
      DLL Side-Loading
      1
      Disable or Modify Tools
      LSASS Memory31
      Virtualization/Sandbox Evasion
      Remote Desktop ProtocolData from Removable Media1
      Non-Standard Port
      Exfiltration Over BluetoothNetwork Denial of Service
      Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)31
      Virtualization/Sandbox Evasion
      Security Account Manager1
      Application Window Discovery
      SMB/Windows Admin SharesData from Network Shared Drive1
      Ingress Tool Transfer
      Automated ExfiltrationData Encrypted for Impact
      Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook411
      Process Injection
      NTDS112
      System Information Discovery
      Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
      Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
      Obfuscated Files or Information
      LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
      Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts1
      Timestomp
      Cached Domain CredentialsWi-Fi DiscoveryVNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
      DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
      DLL Side-Loading
      DCSyncRemote System DiscoveryWindows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
      Hide Legend

      Legend:

      • Process
      • Signature
      • Created File
      • DNS/IP Info
      • Is Dropped
      • Is Windows Process
      • Number of created Registry Values
      • Number of created Files
      • Visual Basic
      • Delphi
      • Java
      • .Net C# or VB.NET
      • C, C++ or other language
      • Is malicious
      • Internet

      This section contains all screenshots as thumbnails, including those not shown in the slideshow.


      windows-stand
      SourceDetectionScannerLabelLink
      setup.exe63%ReversingLabsByteCode-MSIL.Trojan.LummaStealer
      setup.exe74%VirustotalBrowse
      setup.exe100%AviraTR/AD.Nekark.amdkl
      setup.exe100%Joe Sandbox ML
      No Antivirus matches
      No Antivirus matches
      No Antivirus matches
      SourceDetectionScannerLabelLink
      http://www.winimage.com/zLibDll1%VirustotalBrowse
      https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dll0%VirustotalBrowse
      http://www.winimage.com/zLibDllDpRTpR1%VirustotalBrowse
      https://t.me/RiseProSUPPORT0%VirustotalBrowse
      No contacted domains info
      NameSourceMaliciousAntivirus DetectionReputation
      https://ipinfo.io/https://www.maxmind.com/en/locate-my-ip-addressWs2_32.dllRegAsm.exe, 00000003.00000002.3720560055.0000000000515000.00000002.00000400.00020000.00000000.sdmpfalseunknown
      http://www.winimage.com/zLibDllRegAsm.exe, 00000003.00000002.3720560055.0000000000515000.00000002.00000400.00020000.00000000.sdmpfalseunknown
      https://t.me/RiseProSUPPORTRegAsm.exe, 00000003.00000002.3721877835.00000000015AA000.00000004.00000020.00020000.00000000.sdmpfalseunknown
      http://www.winimage.com/zLibDllDpRTpRRegAsm.exe, 00000003.00000002.3720560055.0000000000515000.00000002.00000400.00020000.00000000.sdmpfalseunknown
      • No. of IPs < 25%
      • 25% < No. of IPs < 50%
      • 50% < No. of IPs < 75%
      • 75% < No. of IPs
      IPDomainCountryFlagASNASN NameMalicious
      193.233.132.253
      unknownRussian Federation
      2895FREE-NET-ASFREEnetEUtrue
      Joe Sandbox version:41.0.0 Charoite
      Analysis ID:1521012
      Start date and time:2024-09-28 03:02:06 +02:00
      Joe Sandbox product:CloudBasic
      Overall analysis duration:0h 7m 14s
      Hypervisor based Inspection enabled:false
      Report type:full
      Cookbook file name:default.jbs
      Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
      Number of analysed new started processes analysed:17
      Number of new started drivers analysed:0
      Number of existing processes analysed:0
      Number of existing drivers analysed:0
      Number of injected processes analysed:0
      Technologies:
      • HCA enabled
      • EGA enabled
      • AMSI enabled
      Analysis Mode:default
      Analysis stop reason:Timeout
      Sample name:setup.exe
      Detection:MAL
      Classification:mal100.troj.evad.winEXE@4/1@0/1
      EGA Information:
      • Successful, ratio: 100%
      HCA Information:Failed
      Cookbook Comments:
      • Found application associated with file extension: .exe
      • Override analysis time to 240000 for current running targets taking high CPU consumption
      • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, SgrmBroker.exe, conhost.exe, backgroundTaskHost.exe, svchost.exe
      • Excluded domains from analysis (whitelisted): slscr.update.microsoft.com, ctldl.windowsupdate.com, time.windows.com, fe3cr.delivery.mp.microsoft.com
      • Not all processes where analyzed, report is missing behavior information
      TimeTypeDescription
      22:12:27API Interceptor1253233x Sleep call for process: RegAsm.exe modified
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      193.233.132.253OJa1BOigU3.exeGet hashmaliciousLummaC, PureLog Stealer, RisePro StealerBrowse
      • 193.233.132.253/retailerTest.exe
      WlCIinu0yp.exeGet hashmaliciousLummaC Stealer, PureLog Stealer, RedLine, RisePro Stealer, Socks5Systemz, Vidar, zgRATBrowse
      • 193.233.132.253/lumma2804.exe
      file.exeGet hashmaliciousLummaC, PureLog Stealer, RedLine, RisePro Stealer, Vidar, zgRATBrowse
      • 193.233.132.253/lumma2804.exe
      2q45IEa3Ee.exeGet hashmaliciousLummaC, RisePro StealerBrowse
      • 193.233.132.253/lumma1504.exe
      TANQUIVUIA.exeGet hashmaliciousLummaC, RisePro StealerBrowse
      • 193.233.132.253/lumma1504.exe
      SecuriteInfo.com.Trojan.Siggen28.25504.27914.23637.exeGet hashmaliciousGlupteba, LummaC Stealer, Mars Stealer, PureLog Stealer, RedLine, RisePro Stealer, SmokeLoaderBrowse
      • 193.233.132.253/lumma1104.exe
      80OrFCsz0u.exeGet hashmaliciousGCleaner, Glupteba, LummaC Stealer, Mars Stealer, PureLog Stealer, RedLine, RisePro StealerBrowse
      • 193.233.132.253/lumma1104.exe
      file.exeGet hashmaliciousLummaC, PureLog Stealer, RisePro StealerBrowse
      • 193.233.132.253/lumma1104.exe
      file.exeGet hashmaliciousLummaC, PureLog Stealer, RisePro StealerBrowse
      • 193.233.132.253/lumma1104.exe
      file.exeGet hashmaliciousLummaC, PureLog Stealer, RisePro StealerBrowse
      • 193.233.132.253/lumma1104.exe
      No context
      MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
      FREE-NET-ASFREEnetEUfile.exeGet hashmaliciousLummaC, Amadey, LummaC StealerBrowse
      • 147.45.44.104
      https://steamcommninty.com/activates/giftsGet hashmaliciousUnknownBrowse
      • 147.45.47.40
      file.exeGet hashmaliciousLummaC, RDPWrap Tool, LummaC Stealer, VidarBrowse
      • 147.45.44.104
      file.exeGet hashmaliciousLummaC, RDPWrap Tool, LummaC Stealer, VidarBrowse
      • 147.45.44.104
      file.exeGet hashmaliciousLummaC, RDPWrap Tool, LummaC Stealer, Stealc, VidarBrowse
      • 147.45.44.104
      file.exeGet hashmaliciousLummaC, RDPWrap Tool, LummaC Stealer, VidarBrowse
      • 147.45.44.104
      file.exeGet hashmaliciousClipboard Hijacker, Cryptbot, Neoreklami, Socks5SystemzBrowse
      • 147.45.60.44
      SolaraV3.exeGet hashmaliciousRedLineBrowse
      • 147.45.47.192
      file.exeGet hashmaliciousLummaC, RDPWrap Tool, LummaC Stealer, VidarBrowse
      • 147.45.44.104
      file.exeGet hashmaliciousLummaC, RDPWrap Tool, LummaC Stealer, VidarBrowse
      • 147.45.44.104
      No context
      No context
      Process:C:\Users\user\Desktop\setup.exe
      File Type:ASCII text, with CRLF line terminators
      Category:dropped
      Size (bytes):42
      Entropy (8bit):4.0050635535766075
      Encrypted:false
      SSDEEP:3:QHXMKa/xwwUy:Q3La/xwQ
      MD5:84CFDB4B995B1DBF543B26B86C863ADC
      SHA1:D2F47764908BF30036CF8248B9FF5541E2711FA2
      SHA-256:D8988D672D6915B46946B28C06AD8066C50041F6152A91D37FFA5CF129CC146B
      SHA-512:485F0ED45E13F00A93762CBF15B4B8F996553BAA021152FAE5ABA051E3736BCD3CA8F4328F0E6D9E3E1F910C96C4A9AE055331123EE08E3C2CE3A99AC2E177CE
      Malicious:true
      Reputation:high, very likely benign file
      Preview:1,"fusion","GAC",0..1,"WinRT","NotApp",1..
      File type:PE32 executable (console) Intel 80386 Mono/.Net assembly, for MS Windows
      Entropy (8bit):7.999653481278875
      TrID:
      • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
      • Win32 Executable (generic) a (10002005/4) 49.78%
      • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
      • Generic Win/DOS Executable (2004/3) 0.01%
      • DOS Executable Generic (2002/1) 0.01%
      File name:setup.exe
      File size:2'265'088 bytes
      MD5:f6c330bf80269e6a2ce60b6c173ede5e
      SHA1:3a1ee94b51b65b73ae8694d407feae213cdfa0a3
      SHA256:dd41646c21ed512b30eaad50eca6e74a45ecd7c6c7bf9d1c6aa804c2ea845428
      SHA512:9ff5152bbbf71574dd1abf4a7a05b4884e7f2d1c5bb7d7e1e1ff0e467aaa83221a04cbb47257ea4394d637b01f5f59d0938af6ae4699069f8fe49ca1afa88e43
      SSDEEP:49152:q1kvIsRS6E2Z7ZkgbGrs1qi+ldn5Yp4cCA5XSVRrnzUM1vSxt3W:ekZRBpBGrN+p4DAgjQMpC
      TLSH:65A533A9D04D8FB8C3CB62B185A5610792F1F2E75BB663350709702AAFCD131B8C5FA5
      File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L...T............."...0..."..........2... ...."...@.. ........................#...........`................................
      Icon Hash:00928e8e8686b000
      Entrypoint:0x4032e6
      Entrypoint Section:.text
      Digitally signed:false
      Imagebase:0x400000
      Subsystem:windows cui
      Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
      DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
      Time Stamp:0x9484A554 [Wed Dec 16 08:44:04 2048 UTC]
      TLS Callbacks:
      CLR (.Net) Version:
      OS Version Major:4
      OS Version Minor:0
      File Version Major:4
      File Version Minor:0
      Subsystem Version Major:4
      Subsystem Version Minor:0
      Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
      Instruction
      jmp dword ptr [00402000h]
      add byte ptr [eax], al
      add byte ptr [eax], al
      out 44h, eax
      loope 00007F6BF06EFAC9h
      loope 00007F6BF06EFAA1h
      xchg eax, edi
      inc eax
      pop esi
      stosb
      out 4Fh, al
      fbld [esi]
      jp 00007F6BF06EF9F0h
      and al, ch
      adc byte ptr [esi], bl
      retf
      sbb eax, 31F6954Dh
      dec esi
      cmp eax, 2AA61047h
      jecxz 00007F6BF06EFA62h
      sub eax, EB91F13Ch
      salc
      fcomp qword ptr [ecx+24h]
      lea ebp, dword ptr [ecx]
      NameVirtual AddressVirtual Size Is in Section
      IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IMPORT0x32920x4f.text
      IMAGE_DIRECTORY_ENTRY_RESOURCE0x22c0000x5dc.rsrc
      IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
      IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
      IMAGE_DIRECTORY_ENTRY_BASERELOC0x22e0000xc.reloc
      IMAGE_DIRECTORY_ENTRY_DEBUG0x32200x38.text
      IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
      IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
      IMAGE_DIRECTORY_ENTRY_TLS0x00x0
      IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
      IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
      IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
      IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
      IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
      NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
      .text0x20000x2285b00x2286001a54088697eb86bcad73b6071a739505unknownunknownunknownunknownIMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
      .rsrc0x22c0000x5dc0x600928dd8bd0a422e6d709f17b14d4203bfFalse0.4381510416666667data4.164718679002896IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
      .reloc0x22e0000xc0x20041ef9bd02060e3a45c1522f573b6e54dFalse0.044921875data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
      NameRVASizeTypeLanguageCountryZLIB Complexity
      RT_VERSION0x22c0900x34cdata0.44075829383886256
      RT_MANIFEST0x22c3ec0x1eaXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.5489795918367347
      DLLImport
      mscoree.dll_CorExeMain
      TimestampSIDSignatureSeveritySource IPSource PortDest IPDest PortProtocol
      2024-09-28T03:03:04.022076+02002049060ET MALWARE RisePro TCP Heartbeat Packet1192.168.2.749700193.233.132.25350600TCP
      2024-09-28T03:03:07.019564+02002046269ET MALWARE [ANY.RUN] RisePro TCP (Activity)1192.168.2.749700193.233.132.25350600TCP
      TimestampSource PortDest PortSource IPDest IP
      Sep 28, 2024 03:03:04.012008905 CEST4970050600192.168.2.7193.233.132.253
      Sep 28, 2024 03:03:04.017039061 CEST5060049700193.233.132.253192.168.2.7
      Sep 28, 2024 03:03:04.018250942 CEST4970050600192.168.2.7193.233.132.253
      Sep 28, 2024 03:03:04.022075891 CEST4970050600192.168.2.7193.233.132.253
      Sep 28, 2024 03:03:04.026925087 CEST5060049700193.233.132.253192.168.2.7
      Sep 28, 2024 03:03:07.019563913 CEST4970050600192.168.2.7193.233.132.253
      Sep 28, 2024 03:03:07.025701046 CEST5060049700193.233.132.253192.168.2.7
      Sep 28, 2024 03:03:25.370343924 CEST5060049700193.233.132.253192.168.2.7
      Sep 28, 2024 03:03:25.370445013 CEST4970050600192.168.2.7193.233.132.253

      Click to jump to process

      Click to jump to process

      Click to dive into process behavior distribution

      Click to jump to process

      Target ID:0
      Start time:21:03:00
      Start date:27/09/2024
      Path:C:\Users\user\Desktop\setup.exe
      Wow64 process (32bit):true
      Commandline:"C:\Users\user\Desktop\setup.exe"
      Imagebase:0x90000
      File size:2'265'088 bytes
      MD5 hash:F6C330BF80269E6A2CE60B6C173EDE5E
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:low
      Has exited:true

      Target ID:1
      Start time:21:03:00
      Start date:27/09/2024
      Path:C:\Windows\System32\conhost.exe
      Wow64 process (32bit):false
      Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
      Imagebase:0x7ff75da10000
      File size:862'208 bytes
      MD5 hash:0D698AF330FD17BEE3BF90011D49251D
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:false

      Target ID:3
      Start time:21:03:00
      Start date:27/09/2024
      Path:C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
      Wow64 process (32bit):true
      Commandline:"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
      Imagebase:0xee0000
      File size:65'440 bytes
      MD5 hash:0D5DF43AF2916F47D00C1573797C1A13
      Has elevated privileges:true
      Has administrator privileges:true
      Programmed in:C, C++ or other language
      Reputation:high
      Has exited:false

      Reset < >

        Execution Graph

        Execution Coverage:41.5%
        Dynamic/Decrypted Code Coverage:100%
        Signature Coverage:19.6%
        Total number of Nodes:56
        Total number of Limit Nodes:1
        execution_graph 343 a20840 344 a20852 343->344 348 a20960 344->348 358 a20970 344->358 345 a2085a 349 a20970 348->349 367 a20514 349->367 351 a20992 371 a20b80 351->371 352 a209cc 356 a20a1d 352->356 376 a2052c 352->376 356->345 359 a20514 GetConsoleWindow 358->359 360 a20992 359->360 366 a20b80 VirtualProtect 360->366 361 a209cc 362 a2052c VirtualProtect 361->362 365 a20a1d 361->365 363 a209f1 362->363 364 a20538 CreateThread 363->364 363->365 364->365 365->345 366->361 368 a20a50 GetConsoleWindow 367->368 370 a20abb 368->370 370->351 374 a20b85 371->374 372 a2107b VirtualProtect 373 a210b8 372->373 373->352 374->372 375 a20d46 374->375 375->352 377 a21030 VirtualProtect 376->377 379 a209f1 377->379 379->356 380 a20538 379->380 382 a210f8 CreateThread 380->382 383 a211a0 382->383 383->356 391 a210f0 392 a21146 CreateThread 391->392 394 a211a0 392->394 384 2652411 387 2652449 CreateProcessA VirtualAlloc Wow64GetThreadContext ReadProcessMemory VirtualAllocEx 384->387 386 2652626 WriteProcessMemory 388 265266b 386->388 387->386 389 2652670 WriteProcessMemory 388->389 390 26526ad WriteProcessMemory Wow64SetThreadContext ResumeThread 388->390 389->388 400 a204c7 401 a204ce VirtualProtect 400->401 403 a210b8 401->403 407 a20f57 411 a20efc 407->411 408 a2107b VirtualProtect 409 a210b8 408->409 410 a2100a 411->408 411->410 404 a20a49 405 a20a8f GetConsoleWindow 404->405 406 a20abb 405->406 395 a204ff 396 a20506 395->396 398 a20960 4 API calls 396->398 399 a20970 4 API calls 396->399 397 a2085a 398->397 399->397

        Callgraph

        Control-flow Graph

        APIs
        • CreateProcessA.KERNELBASE(?,00000000,00000000,00000000,00000000,00000004,00000000,00000000,?,?), ref: 02652580
        • VirtualAlloc.KERNELBASE(00000000,00000004,00001000,00000004), ref: 02652593
        • Wow64GetThreadContext.KERNEL32(?,00000000), ref: 026525B1
        • ReadProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 026525D5
        • VirtualAllocEx.KERNELBASE(?,?,?,00003000,00000040), ref: 02652600
        • WriteProcessMemory.KERNELBASE(?,00000000,?,?,00000000,?), ref: 02652658
        • WriteProcessMemory.KERNELBASE(?,?,?,?,00000000,?,00000028), ref: 026526A3
        • WriteProcessMemory.KERNELBASE(?,?,?,00000004,00000000), ref: 026526E1
        • Wow64SetThreadContext.KERNEL32(?,?), ref: 0265271D
        • ResumeThread.KERNELBASE(?), ref: 0265272C
        Strings
        Memory Dump Source
        • Source File: 00000000.00000002.1257121516.0000000002652000.00000040.00000800.00020000.00000000.sdmp, Offset: 02652000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_2652000_setup.jbxd
        Similarity
        • API ID: Process$Memory$ThreadWrite$AllocContextVirtualWow64$CreateReadResume
        • String ID: GetP$Load$aryA$ress
        • API String ID: 2687962208-977067982
        • Opcode ID: 5830fdbf51cd66032c811c655c8f92b1c7674356d546a8de58cf9f8e9e68e0da
        • Instruction ID: 315ca02eda9149f674e6756808a9327192885b50a9684e3022b1a938fcfb7f4a
        • Opcode Fuzzy Hash: 5830fdbf51cd66032c811c655c8f92b1c7674356d546a8de58cf9f8e9e68e0da
        • Instruction Fuzzy Hash: 21B1D47664028AAFDB60CF68CC80BDA77A5FF88714F158524EA0CAB341D774FA51CB94

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 23 a20b80-a20baf 25 a20d46-a20d4d 23->25 26 a20bb5-a20bba 23->26 27 a20bf6-a20bfb 26->27 28 a20bbc-a20bcf 26->28 32 a20c02-a20c07 27->32 28->27 29 a20bd1-a20be4 28->29 29->27 30 a20be6-a20bf4 29->30 30->32 33 a20d4e-a20db2 32->33 34 a20c0d-a20c20 32->34 43 a20db5-a20dec 33->43 34->33 35 a20c26-a20c37 34->35 35->33 37 a20c3d-a20c5a 35->37 37->33 40 a20c60-a20c7c 37->40 40->33 44 a20c82-a20c9e 40->44 55 a20df2-a20e0f 43->55 56 a21014-a210b6 VirtualProtect 43->56 44->33 47 a20ca4-a20cb4 44->47 47->33 49 a20cba-a20cca 47->49 49->33 50 a20cd0-a20ce1 49->50 50->33 52 a20ce3-a20cf4 50->52 52->33 54 a20cf6-a20d09 52->54 54->33 57 a20d0b-a20d1c 54->57 55->56 62 a20e15-a20e33 55->62 64 a210b8-a210be 56->64 65 a210bf-a210e0 56->65 57->33 58 a20d1e-a20d2f 57->58 58->33 61 a20d31-a20d40 58->61 61->25 61->26 62->43 67 a20e35-a20e3d 62->67 64->65 69 a20e40-a20e47 67->69 70 a20e49-a20e50 69->70 71 a20e8f-a20e98 69->71 70->71 73 a20e52-a20e5e 70->73 71->56 72 a20e9e-a20eae 71->72 72->56 74 a20eb4-a20ec2 72->74 73->56 75 a20e64-a20e6e 73->75 74->56 76 a20ec8-a20ed5 74->76 75->56 77 a20e74-a20e83 75->77 76->56 78 a20edb-a20eeb 76->78 79 a20e85-a20e8b 77->79 80 a20e8c 77->80 78->69 81 a20ef1-a20ef9 78->81 79->80 80->71 82 a20efc-a20f08 81->82 83 a20f0e-a20f17 82->83 84 a20ffd-a21004 82->84 86 a20f20-a20f2f 83->86 87 a20f19-a20f1f 83->87 84->82 85 a2100a-a21011 84->85 86->56 88 a20f35-a20f41 86->88 87->86 89 a20f43-a20f49 88->89 90 a20f4a-a20f65 88->90 89->90 90->56 92 a20f6b-a20f79 90->92 92->56 93 a20f7f-a20f8c 92->93 93->56 94 a20f92-a20fa2 93->94 94->56 95 a20fa4-a20fbc 94->95 96 a20fc6-a20fd1 95->96 97 a20fbe-a20fc5 95->97 96->56 98 a20fd3-a20fe0 96->98 97->96 98->56 99 a20fe2-a20ff7 98->99 99->83 99->84
        Memory Dump Source
        • Source File: 00000000.00000002.1256864478.0000000000A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A20000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_a20000_setup.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: a818b48fbc3d01a00334b41fe0a2badd19ce856897a5f9d302cf07555d055622
        • Instruction ID: a2bc05ea12fb12211f4ef7cace913a721b902a17218a6677a12da6793ee53779
        • Opcode Fuzzy Hash: a818b48fbc3d01a00334b41fe0a2badd19ce856897a5f9d302cf07555d055622
        • Instruction Fuzzy Hash: 96028D319042958FCB05CFADC480AEDFFF2AF59310B59C5A5D499EB262C734E981CBA4

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 100 a204c7-a204cc 101 a204ce-a204d8 100->101 102 a2052c-a210b6 VirtualProtect 100->102 106 a204da-a204f8 101->106 107 a20529 101->107 108 a210b8-a210be 102->108 109 a210bf-a210e0 102->109 106->107 107->102 108->109
        APIs
        • VirtualProtect.KERNELBASE(03653584,?,?,?), ref: 00A210A9
        Memory Dump Source
        • Source File: 00000000.00000002.1256864478.0000000000A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A20000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_a20000_setup.jbxd
        Similarity
        • API ID: ProtectVirtual
        • String ID:
        • API String ID: 544645111-0
        • Opcode ID: c8ea1f2335f5f9c5f1b1e1aa67f6a520d55e0785f5e4126c135cfec160483914
        • Instruction ID: 89fc2602c12669c17c35f55fafeddef18bb1829adcec95e2d54a1022ea7e8d53
        • Opcode Fuzzy Hash: c8ea1f2335f5f9c5f1b1e1aa67f6a520d55e0785f5e4126c135cfec160483914
        • Instruction Fuzzy Hash: 7E318772C052999FCB10DFA9D884BCEFFB4FF19310F14816AE448A7212D3B49904CBA1

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 111 a20538-a21152 114 a21162-a2119e CreateThread 111->114 115 a21154-a21160 111->115 116 a211a0-a211a6 114->116 117 a211a7-a211bb 114->117 115->114 116->117
        APIs
        • CreateThread.KERNELBASE(00000000,00000000,?,00000000,?,?), ref: 00A21191
        Memory Dump Source
        • Source File: 00000000.00000002.1256864478.0000000000A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A20000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_a20000_setup.jbxd
        Similarity
        • API ID: CreateThread
        • String ID:
        • API String ID: 2422867632-0
        • Opcode ID: 3f0e4ebcd35f5d43d5fbb81f0f7d0112afd94e8c3da8a154f386d909de8addc6
        • Instruction ID: 6de0a87ed39af59a22cc323a004b491ee25ce6a021a786c90356cd6000a0536e
        • Opcode Fuzzy Hash: 3f0e4ebcd35f5d43d5fbb81f0f7d0112afd94e8c3da8a154f386d909de8addc6
        • Instruction Fuzzy Hash: BE21D0B59012499FCB10CF9AD984ADEBBF5FB48310F20852AE918A7340D775A954CBA4

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 119 a210f0-a21152 121 a21162-a2119e CreateThread 119->121 122 a21154-a21160 119->122 123 a211a0-a211a6 121->123 124 a211a7-a211bb 121->124 122->121 123->124
        APIs
        • CreateThread.KERNELBASE(00000000,00000000,?,00000000,?,?), ref: 00A21191
        Memory Dump Source
        • Source File: 00000000.00000002.1256864478.0000000000A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A20000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_a20000_setup.jbxd
        Similarity
        • API ID: CreateThread
        • String ID:
        • API String ID: 2422867632-0
        • Opcode ID: 0a6cc5b982f9889e56c3abec84721094890328cc44c97cf19e148dc23c306535
        • Instruction ID: 0114e2f5b8803d04b5e6ee586b8c9a1e76c3a871ee04a88e0f146f50a08b5028
        • Opcode Fuzzy Hash: 0a6cc5b982f9889e56c3abec84721094890328cc44c97cf19e148dc23c306535
        • Instruction Fuzzy Hash: F021F3B5D012499FCB10CFA9D984ADEBBF1FB48310F10852EE919A7350D375A914CFA0

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 126 a2052c-a210b6 VirtualProtect 129 a210b8-a210be 126->129 130 a210bf-a210e0 126->130 129->130
        APIs
        • VirtualProtect.KERNELBASE(03653584,?,?,?), ref: 00A210A9
        Memory Dump Source
        • Source File: 00000000.00000002.1256864478.0000000000A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A20000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_a20000_setup.jbxd
        Similarity
        • API ID: ProtectVirtual
        • String ID:
        • API String ID: 544645111-0
        • Opcode ID: 6473414bb45ea810bfba7b8a2557aeb4f869eed28c2d25a2377190819d7e804f
        • Instruction ID: 108a6f38777282f743274065f150ae9ec579a0e19064faecc1794e4f5a7540da
        • Opcode Fuzzy Hash: 6473414bb45ea810bfba7b8a2557aeb4f869eed28c2d25a2377190819d7e804f
        • Instruction Fuzzy Hash: E2211571D01259AFCB10DF9AD884BDEFBB5FB48310F10812AE918A3240D374A954CBA5

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 132 a20514-a20ab9 GetConsoleWindow 135 a20ac2-a20adf 132->135 136 a20abb-a20ac1 132->136 136->135
        APIs
        • GetConsoleWindow.KERNELBASE ref: 00A20AAC
        Memory Dump Source
        • Source File: 00000000.00000002.1256864478.0000000000A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A20000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_a20000_setup.jbxd
        Similarity
        • API ID: ConsoleWindow
        • String ID:
        • API String ID: 2863861424-0
        • Opcode ID: dfd470fd9e6b03cf83442a1af3baee326d47fb891941eba88124ba38af3b7354
        • Instruction ID: 8196b473b006dca94cb7719ec485c99b7b166a0ccc62ebc2a3f0b9b4aee58f2e
        • Opcode Fuzzy Hash: dfd470fd9e6b03cf83442a1af3baee326d47fb891941eba88124ba38af3b7354
        • Instruction Fuzzy Hash: 291122B5D003498FCB20DF9AD445B9EBBF4EB48320F208429D959A7341D774A944CFA0

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 139 a20a49-a20a87 140 a20a8f-a20ab9 GetConsoleWindow 139->140 141 a20ac2-a20adf 140->141 142 a20abb-a20ac1 140->142 142->141
        APIs
        • GetConsoleWindow.KERNELBASE ref: 00A20AAC
        Memory Dump Source
        • Source File: 00000000.00000002.1256864478.0000000000A20000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A20000, based on PE: false
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_0_2_a20000_setup.jbxd
        Similarity
        • API ID: ConsoleWindow
        • String ID:
        • API String ID: 2863861424-0
        • Opcode ID: 1021b7bba4e8d9afb02800ed6d92986c55bc837307333d51872573fe19ff0f40
        • Instruction ID: 74d7498d592db5025eddd3868f9893307cfc85c48b859aa1bb3c79e34be39224
        • Opcode Fuzzy Hash: 1021b7bba4e8d9afb02800ed6d92986c55bc837307333d51872573fe19ff0f40
        • Instruction Fuzzy Hash: 5C1132748043498FDB20DFA9C444BDEBBF0AB48310F24845AC459A7251C374A845CFA0

        Execution Graph

        Execution Coverage:0.5%
        Dynamic/Decrypted Code Coverage:0%
        Signature Coverage:5.5%
        Total number of Nodes:109
        Total number of Limit Nodes:10
        execution_graph 23550 41e220 23551 41e5d8 23550->23551 23559 41e24a __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z 23550->23559 23552 41e2b8 recv 23552->23559 23553 41e5c3 Sleep 23553->23551 23553->23559 23554 41e521 recv 23556 41e5bb Sleep 23554->23556 23555 41e2f8 23582 4680a0 23555->23582 23556->23553 23558 41e339 recv 23560 41e35a recv 23558->23560 23573 41e37b std::_Throw_Cpp_error 23558->23573 23559->23551 23559->23552 23559->23553 23559->23554 23559->23555 23559->23556 23560->23573 23562 4680a0 GetLastError 23562->23573 23563 41e412 recv 23563->23573 23564 41e5ea 23566 41e737 23564->23566 23567 41e628 23564->23567 23594 4db764 GetLastError std::_Throw_Cpp_error Concurrency::cancel_current_task 23566->23594 23568 41e638 23567->23568 23569 41e73e 23567->23569 23592 469e70 GetLastError std::_Throw_Cpp_error 23568->23592 23595 4db764 GetLastError std::_Throw_Cpp_error Concurrency::cancel_current_task 23569->23595 23572 41e74f 23596 4655d0 GetLastError std::_Throw_Cpp_error 23572->23596 23573->23556 23573->23562 23573->23563 23573->23564 23590 4655d0 GetLastError std::_Throw_Cpp_error 23573->23590 23591 41dc70 14 API calls std::_Throw_Cpp_error 23573->23591 23576 41e7d2 23577 41e798 23577->23576 23580 41e7c5 Sleep 23577->23580 23578 41e670 23593 4655d0 GetLastError std::_Throw_Cpp_error 23578->23593 23580->23576 23580->23580 23581 41e6fc 23583 4680f1 23582->23583 23587 4680c2 std::_Throw_Cpp_error 23582->23587 23584 4681f6 23583->23584 23585 468100 23583->23585 23608 402400 GetLastError std::_Throw_Cpp_error 23584->23608 23597 402f50 23585->23597 23587->23558 23589 468146 std::_Throw_Cpp_error 23589->23558 23590->23573 23591->23573 23592->23578 23593->23581 23594->23569 23595->23572 23596->23577 23598 402f62 23597->23598 23599 402f86 23597->23599 23601 402f69 23598->23601 23602 402f9f 23598->23602 23600 402f98 23599->23600 23603 4dc8a2 std::_Throw_Cpp_error GetLastError 23599->23603 23600->23589 23609 4dc8a2 23601->23609 23614 4022f0 GetLastError Concurrency::cancel_current_task ___std_exception_copy 23602->23614 23606 402f90 23603->23606 23606->23589 23607 402f6f 23607->23589 23608->23589 23611 4022f0 Concurrency::cancel_current_task std::_Throw_Cpp_error 23609->23611 23610 4dc8c1 23610->23607 23610->23610 23611->23610 23615 4ddd45 GetLastError ___std_exception_destroy 23611->23615 23613 40234c 23613->23607 23614->23607 23615->23613 23616 4f282c 23617 4f2838 23616->23617 23618 4f2879 23617->23618 23620 4f28bf 23617->23620 23621 4f2840 23617->23621 23646 4e1e13 GetLastError GetLastError 23618->23646 23620->23621 23623 4f293d 23620->23623 23624 4f2965 23623->23624 23645 4f2988 23623->23645 23625 4f2969 23624->23625 23627 4f29c4 23624->23627 23650 4e1e13 GetLastError GetLastError 23625->23650 23628 4f29e2 23627->23628 23647 4eb86d 23627->23647 23651 4f2482 GetLastError GetLastError 23628->23651 23631 4f29f4 23632 4f29fa 23631->23632 23633 4f2a41 23631->23633 23636 4f2a29 23632->23636 23637 4f2a02 23632->23637 23634 4f2aaa 23633->23634 23635 4f2a55 23633->23635 23643 4f2acc GetLastError 23634->23643 23634->23645 23638 4f2a5d 23635->23638 23639 4f2a96 23635->23639 23653 4f2053 GetLastError __floor_pentium4 23636->23653 23637->23645 23652 4f241a GetLastError CloseHandle GetLastError 23637->23652 23638->23645 23654 4f25da GetLastError __floor_pentium4 23638->23654 23655 4f24ff GetLastError __floor_pentium4 23639->23655 23643->23645 23645->23621 23646->23621 23656 4eb74c 23647->23656 23649 4eb886 23649->23628 23650->23645 23651->23631 23652->23645 23653->23645 23654->23645 23655->23645 23661 4f7b7f 23656->23661 23658 4eb75e 23659 4eb792 GetLastError 23658->23659 23660 4eb766 23658->23660 23659->23660 23660->23649 23662 4f7b8c 23661->23662 23663 4f7ba1 23661->23663 23670 4ea91c GetLastError GetLastError 23662->23670 23666 4f7bc6 23663->23666 23671 4ea91c GetLastError GetLastError 23663->23671 23666->23658 23667 4f7bd1 23672 4e1e90 GetLastError GetLastError 23667->23672 23668 4f7b91 23668->23658 23670->23668 23671->23667 23672->23668 23673 4e62d8 23674 4e62eb 23673->23674 23677 4e61b3 23674->23677 23676 4e62f7 23678 4e61bf 23677->23678 23680 4e61e4 23678->23680 23681 4e1e13 GetLastError GetLastError 23678->23681 23680->23676 23681->23680 23682 4e2a50 23685 4e298e 23682->23685 23684 4e2a62 23686 4e299a 23685->23686 23688 4e29b1 23686->23688 23689 4e1e90 GetLastError GetLastError 23686->23689 23688->23684 23689->23688

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 129 4680a0-4680c0 130 4680c2-4680cd 129->130 131 4680f1-4680fa 129->131 132 4680d1-4680ee call 4debe0 130->132 133 4680cf 130->133 134 4681f6 call 402400 131->134 135 468100-46810c 131->135 133->132 140 4681fb-468200 call 4e1ea0 134->140 138 468115-468126 135->138 139 46810e-468113 135->139 143 46812f-468136 138->143 144 468128-46812d 138->144 142 468139-468141 call 402f50 139->142 147 468146-46816e 142->147 143->142 144->142 149 468170-46819b call 4de4a0 call 4debe0 147->149 150 4681c9-4681f3 call 4de4a0 call 4debe0 147->150 159 4681af-4681c6 call 4dcb23 149->159 160 46819d-4681ab 149->160 160->140 161 4681ad 160->161 161->159
        Memory Dump Source
        • Source File: 00000003.00000002.3720005461.0000000000401000.00000020.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.3719894491.0000000000400000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.3720560055.0000000000515000.00000002.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.3720665924.0000000000540000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.3720743891.0000000000545000.00000020.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.3721025884.00000000005F6000.00000040.00000400.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 8d81178ab646820a6eb893515159c8322c390487e491d838ec1b7ab484b2027c
        • Instruction ID: ecfb405bbff1ea3e4979a418a500bc296bc6e7c43d59ad8d68ecad1a3c3bf1c0
        • Opcode Fuzzy Hash: 8d81178ab646820a6eb893515159c8322c390487e491d838ec1b7ab484b2027c
        • Instruction Fuzzy Hash: F741F631A00108AFC715DF69DC905AEBBA5FF45364F10822FF855DB341DB34AA51CB95

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 0 41e220-41e244 1 41e5d8-41e5e9 0->1 2 41e24a 0->2 3 41e250-41e258 2->3 4 41e293-41e2dc call 5a7883 recv call 5d244e 3->4 5 41e25a-41e280 call 41d430 3->5 4->1 13 41e2e2-41e2e5 4->13 9 41e285-41e28d 5->9 9->4 11 41e5c3-41e5d2 Sleep 9->11 11->1 11->3 14 41e536-41e55f call 4dc299 call 5018a0 13->14 15 41e2eb-41e2f2 13->15 19 41e5bb-41e5bd Sleep 14->19 28 41e561 14->28 16 41e521-41e531 recv 15->16 17 41e2f8-41e354 call 4680a0 recv 15->17 16->19 24 41e35a-41e375 recv 17->24 25 41e4cf-41e4dc 17->25 19->11 24->25 27 41e37b-41e3b6 24->27 29 41e50a-41e51c 25->29 30 41e4de-41e4ea 25->30 33 41e429-41e489 call 4655d0 call 41d260 call 41dc70 27->33 34 41e3b8-41e3bd 27->34 35 41e563-41e569 28->35 36 41e56b-41e5a3 call 41d840 28->36 29->19 31 41e500-41e507 call 4dcb23 30->31 32 41e4ec-41e4fa 30->32 31->29 32->31 37 41e5ea-41e622 call 4e1ea0 call 4dbdc9 32->37 60 41e4b7-41e4cb 33->60 61 41e48b-41e497 33->61 40 41e3d3-41e3dd call 4680a0 34->40 41 41e3bf-41e3d1 34->41 35->19 35->36 48 41e5a8-41e5b6 36->48 58 41e737-41e739 call 4db764 37->58 59 41e628-41e632 37->59 46 41e3e2-41e427 call 5cdddb recv 40->46 41->46 46->33 48->19 63 41e73e-41e7b4 call 4db764 call 407d90 call 4655d0 call 41d840 58->63 62 41e638-41e649 59->62 59->63 60->25 65 41e499-41e4a7 61->65 66 41e4ad-41e4b4 call 4dcb23 61->66 67 41e650-41e65b 62->67 88 41e7d2-41e7e1 63->88 89 41e7b6-41e7bd 63->89 65->37 65->66 66->60 67->67 71 41e65d-41e683 call 469e70 67->71 78 41e6c3-41e6ca call 473140 71->78 79 41e685-41e6c1 71->79 82 41e6cf-41e736 call 402af0 call 4dbdda call 4655d0 call 41d840 call 402af0 78->82 79->82 89->88 91 41e7bf 89->91 93 41e7c5-41e7d0 Sleep 91->93 93->88 93->93
        APIs
        • recv.WS2_32(?,00000004,00000002), ref: 0041E2CD
        • recv.WS2_32(00000000,0000000C,00000002,00000000), ref: 0041E34F
        • recv.WS2_32(00000000,0000000C,00000008), ref: 0041E370
        • recv.WS2_32(00000000,?,00000008), ref: 0041E427
        • recv.WS2_32(?,00000004,00000008), ref: 0041E52F
        • __ehfuncinfo$??2@YAPAXIABUnothrow_t@std@@@Z.LIBCMT ref: 0041E544
        • Sleep.KERNELBASE(00000001,00000000,?,00002710,00000000,?,?,00000344,0000FFFF,00001006,?,00000008), ref: 0041E5BD
        • Sleep.KERNELBASE(00000064,?,00002710,00000000,?,?,00000344,0000FFFF,00001006,?,00000008), ref: 0041E5C5
        • std::_Throw_Cpp_error.LIBCPMT ref: 0041E739
        • std::_Throw_Cpp_error.LIBCPMT ref: 0041E74A
        • Sleep.KERNEL32(00000065), ref: 0041E7C7
        Strings
        Memory Dump Source
        • Source File: 00000003.00000002.3720005461.0000000000401000.00000020.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.3719894491.0000000000400000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.3720560055.0000000000515000.00000002.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.3720665924.0000000000540000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.3720743891.0000000000545000.00000020.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.3721025884.00000000005F6000.00000040.00000400.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
        Similarity
        • API ID: recv$Sleep$Cpp_errorThrow_std::_$Unothrow_t@std@@@__ehfuncinfo$??2@
        • String ID: m$CT
        • API String ID: 4033404942-2121359313
        • Opcode ID: 4aec3fae07ce63c4b3971c8331474f49506cbd7e9bf7179fe5ad1251c5c1f826
        • Instruction ID: 541cfadfa3b6dac143fff9bdd5be9d1be2ec44792db14051d089f580e14847da
        • Opcode Fuzzy Hash: 4aec3fae07ce63c4b3971c8331474f49506cbd7e9bf7179fe5ad1251c5c1f826
        • Instruction Fuzzy Hash: 19F1E074D00248EBDB10DFA5CC49BEEBBB5FF51708F20425AE4106B2D2D7B85A89DB85

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 99 402f50-402f60 100 402f62-402f67 99->100 101 402f86-402f88 99->101 104 402f69-402f6a call 4dc8a2 100->104 105 402f9f call 4022f0 100->105 102 402f98-402f9e 101->102 103 402f8a-402f97 call 4dc8a2 101->103 111 402f6f-402f76 104->111 110 402fa4-402fa9 call 4e1ea0 105->110 111->110 113 402f78-402f85 111->113
        APIs
        • Concurrency::cancel_current_task.LIBCPMT ref: 00402F9F
        Memory Dump Source
        • Source File: 00000003.00000002.3720005461.0000000000401000.00000020.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.3719894491.0000000000400000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.3720560055.0000000000515000.00000002.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.3720665924.0000000000540000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.3720743891.0000000000545000.00000020.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.3721025884.00000000005F6000.00000040.00000400.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
        Similarity
        • API ID: Concurrency::cancel_current_task
        • String ID:
        • API String ID: 118556049-0
        • Opcode ID: 41d4b623479a6b4a9dc53cb52b2ab75701e8e7a8ddb80481ea63bf669c97ac75
        • Instruction ID: 922f6ea32f6fac839a196189dfb9ef5f71be3718e8211864cdecdc298bb8bebd
        • Opcode Fuzzy Hash: 41d4b623479a6b4a9dc53cb52b2ab75701e8e7a8ddb80481ea63bf669c97ac75
        • Instruction Fuzzy Hash: 6AF0F0725401028BCB286F65D9098EAB3B8EE143A6310047FF88CD36D2E77ED840A784

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 115 4eb74c-4eb764 call 4f7b7f 118 4eb77a-4eb789 call 55e780 115->118 119 4eb766-4eb76d 115->119 123 4eb78e-4eb790 118->123 120 4eb774-4eb778 119->120 122 4eb7cb-4eb7ce 120->122 124 4eb7a5-4eb7af 123->124 125 4eb792-4eb7a3 GetLastError call 4ea8f8 123->125 124->120 126 4eb7b1-4eb7c6 124->126 125->120 126->122
        APIs
        • GetLastError.KERNEL32(00000000,00000000,00000000,00000000,00000000,00000000,00000002,00000000,00000000,00000000,00000000,?,004EB886,00000000,00000000,00000000), ref: 004EB795
        Memory Dump Source
        • Source File: 00000003.00000002.3720005461.0000000000401000.00000020.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.3719894491.0000000000400000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.3720560055.0000000000515000.00000002.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.3720665924.0000000000540000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.3720743891.0000000000545000.00000020.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.3721025884.00000000005F6000.00000040.00000400.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
        Similarity
        • API ID: ErrorLast
        • String ID:
        • API String ID: 1452528299-0
        • Opcode ID: 08b95fc51899ad17043f6fa96d22d5f18ad8bd770bb164b188ee89b447ad829d
        • Instruction ID: 69105f86bb4839127914ce14ce2a333d9bcd1989a38b53b75fdce134867bb829
        • Opcode Fuzzy Hash: 08b95fc51899ad17043f6fa96d22d5f18ad8bd770bb164b188ee89b447ad829d
        • Instruction Fuzzy Hash: F7010836210199AFDB058F5ACC45CAF3F29DFC5365B240249FC109B2A0E775EE529BD4
        Strings
        Memory Dump Source
        • Source File: 00000003.00000002.3720005461.0000000000401000.00000020.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.3719894491.0000000000400000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.3720560055.0000000000515000.00000002.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.3720665924.0000000000540000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.3720743891.0000000000545000.00000020.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.3721025884.00000000005F6000.00000040.00000400.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID: %s|%s$,$,$.$.$4$:$@ET$@ET$@O][nQ\A[BEQ\I$@O][nV\YT_YK$IABQX\$IABQX\$IABQX\$IABQX\$OG$RL[3$type must be boolean, but is
        • API String ID: 0-2687570968
        • Opcode ID: f1ae5ec45e40cc298493f042e2cce951e96c843fe875671c280f88f5515eb7e6
        • Instruction ID: e961a701f2afd2fa6f97a72362c52f48d25eeb15afec5ac09e132253787c98b0
        • Opcode Fuzzy Hash: f1ae5ec45e40cc298493f042e2cce951e96c843fe875671c280f88f5515eb7e6
        • Instruction Fuzzy Hash: 3413FF709042589FDB25DF68C958BEEBBB0AF05304F0441CEE44967292DB799EC8CF96
        Memory Dump Source
        • Source File: 00000003.00000002.3720005461.0000000000401000.00000020.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.3719894491.0000000000400000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.3720560055.0000000000515000.00000002.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.3720665924.0000000000540000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.3720743891.0000000000545000.00000020.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.3721025884.00000000005F6000.00000040.00000400.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: b4e5e4c00776260d396e56defb91423826d9e9f14dbe5c55272fc73b9196d8af
        • Instruction ID: 187a562dbae0ae02de644202ed7863f73715a9724e0290cfc75b4ac2a7ffd0ef
        • Opcode Fuzzy Hash: b4e5e4c00776260d396e56defb91423826d9e9f14dbe5c55272fc73b9196d8af
        • Instruction Fuzzy Hash: CF51A0B1D002199FDB04DFA8C954BEEBBB4FF88314F14415EE421B7381D7799A448BA4
        Memory Dump Source
        • Source File: 00000003.00000002.3720743891.0000000000545000.00000020.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.3719894491.0000000000400000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.3720005461.0000000000401000.00000020.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.3720560055.0000000000515000.00000002.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.3720665924.0000000000540000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.3721025884.00000000005F6000.00000040.00000400.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
        Similarity
        • API ID:
        • String ID:
        • API String ID:
        • Opcode ID: 2c97f548ddff9f834a5e7bc3f8e99fbd9d79d8b7eb7ce75d2db0702809c9d550
        • Instruction ID: 4e0af5a29117eb99791c8da406945d756c14a3ac0ced37ccbbda3a6ad7c748b8
        • Opcode Fuzzy Hash: 2c97f548ddff9f834a5e7bc3f8e99fbd9d79d8b7eb7ce75d2db0702809c9d550
        • Instruction Fuzzy Hash: 2341BB301187428FC329EB29D9469AB7BE1FFC5328F50CA6DD0D683542D730A412CB96

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 1316 4f4d9f-4f4db0 1317 4f4db4-4f4dbf 1316->1317 1318 4f4db2 1316->1318 1319 4f4de3-4f4df6 1317->1319 1320 4f4dc1-4f4dde call 4e1e13 1317->1320 1318->1317 1322 4f4e4b-4f4e4e 1319->1322 1323 4f4df8-4f4e18 call 4f50cc 1319->1323 1333 4f50c8-4f50cb 1320->1333 1325 4f4e5a-4f4e8b 1322->1325 1326 4f4e50 1322->1326 1335 4f4e1a-4f4e1d 1323->1335 1336 4f4e22-4f4e2e call 501ae0 1323->1336 1331 4f4e8d-4f4e9b 1325->1331 1332 4f4eab 1325->1332 1329 4f4e56-4f4e59 1326->1329 1330 4f4e52-4f4e54 1326->1330 1329->1325 1330->1325 1330->1329 1337 4f4e9d-4f4ea0 1331->1337 1338 4f4ea2-4f4ea9 1331->1338 1334 4f4eae-4f4eb3 1332->1334 1339 4f4eb9-4f4ec0 1334->1339 1340 4f4eb5-4f4eb7 1334->1340 1341 4f50c7 1335->1341 1348 4f50c5 1336->1348 1349 4f4e34-4f4e46 1336->1349 1337->1334 1338->1334 1344 4f4ecf-4f4eda 1339->1344 1345 4f4ec2-4f4ecc call 4e7400 1339->1345 1343 4f4edc-4f4ee9 1340->1343 1341->1333 1350 4f4eeb-4f4eee 1343->1350 1351 4f4ef4-4f4f04 1343->1351 1344->1343 1345->1344 1348->1341 1349->1348 1350->1351 1353 4f4fb3-4f4fb5 1350->1353 1354 4f4f07-4f4f17 1351->1354 1357 4f4fc7-4f4fcd 1353->1357 1358 4f4fb7-4f4fc5 call 4debe0 1353->1358 1355 4f4f69-4f4f7e call 4f55df 1354->1355 1356 4f4f19-4f4f3d call 501970 1354->1356 1355->1357 1368 4f4f80-4f4f86 1355->1368 1370 4f4f3f 1356->1370 1371 4f4f42-4f4f65 1356->1371 1360 4f4fcf 1357->1360 1361 4f4fd1-4f4ffc call 501970 1357->1361 1358->1357 1360->1361 1374 4f4ffe 1361->1374 1375 4f5008-4f5011 1361->1375 1373 4f4f89-4f4f8e 1368->1373 1370->1371 1371->1354 1372 4f4f67 1371->1372 1372->1353 1376 4f4f95-4f4f98 1373->1376 1377 4f4f90-4f4f93 1373->1377 1378 4f5004-4f5006 1374->1378 1379 4f5000-4f5002 1374->1379 1380 4f5012-4f501e 1375->1380 1376->1373 1377->1376 1381 4f4f9a-4f4fa0 1377->1381 1378->1380 1379->1375 1379->1378 1382 4f50ba-4f50c1 1380->1382 1383 4f5024-4f5029 1380->1383 1384 4f4fa2-4f4fa5 1381->1384 1385 4f4fb0 1381->1385 1382->1348 1386 4f502f-4f505b call 5018a0 call 501990 1383->1386 1387 4f502b-4f502d 1383->1387 1388 4f4faa-4f4fae 1384->1388 1389 4f4fa7 1384->1389 1385->1353 1390 4f505d-4f505f 1386->1390 1395 4f5068-4f508d call 5018a0 call 501990 1386->1395 1387->1386 1387->1390 1388->1353 1389->1388 1390->1382 1392 4f5061 1390->1392 1392->1395 1396 4f5063-4f5066 1392->1396 1398 4f508f-4f5091 1395->1398 1403 4f509a-4f50b8 call 5018a0 call 501990 1395->1403 1396->1395 1396->1398 1398->1382 1401 4f5093 1398->1401 1401->1403 1404 4f5095-4f5098 1401->1404 1403->1382 1404->1382 1404->1403
        APIs
        Memory Dump Source
        • Source File: 00000003.00000002.3720005461.0000000000401000.00000020.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.3719894491.0000000000400000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.3720560055.0000000000515000.00000002.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.3720665924.0000000000540000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.3720743891.0000000000545000.00000020.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.3721025884.00000000005F6000.00000040.00000400.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
        Similarity
        • API ID: _strrchr
        • String ID:
        • API String ID: 3213747228-0
        • Opcode ID: 93b5c7d55acd086f0d350931ad843cc01176c7766146c8ee9253385d32184bc1
        • Instruction ID: 589becb99ee3adf27699cb767a9d83f27a62820bf1ca4c3ec6002ba9eb813f73
        • Opcode Fuzzy Hash: 93b5c7d55acd086f0d350931ad843cc01176c7766146c8ee9253385d32184bc1
        • Instruction Fuzzy Hash: B1B13932A0075A9FDB118F24CC81BBF7FA5EF95350F144157E704AB382DA789901C7A9

        Control-flow Graph

        • Executed
        • Not Executed
        control_flow_graph 1410 408130-4081f2 call 404a90 * 2 call 469f00 call 469dd0 call 46d910 1421 408220-40823c 1410->1421 1422 4081f4-408200 1410->1422 1423 40826d-4083e9 call 402af0 * 2 call 407ec0 call 468210 call 46d910 call 468210 call 469fa0 1421->1423 1424 40823e-40824d 1421->1424 1425 408202-408210 1422->1425 1426 408216-40821d call 4dcb23 1422->1426 1456 408417-40844e call 402af0 1423->1456 1457 4083eb-4083f7 1423->1457 1429 408263-40826a call 4dcb23 1424->1429 1430 40824f-40825d 1424->1430 1425->1426 1427 40855c call 4e1ea0 1425->1427 1426->1421 1436 408561-4085d8 call 4e1ea0 call 4ddda8 * 2 1427->1436 1429->1423 1430->1427 1430->1429 1463 408450-40845c 1456->1463 1464 40847c-4084a7 call 402af0 1456->1464 1458 4083f9-408407 1457->1458 1459 40840d-408414 call 4dcb23 1457->1459 1458->1436 1458->1459 1459->1456 1466 408472-408479 call 4dcb23 1463->1466 1467 40845e-40846c 1463->1467 1472 4084d5-40855b call 402af0 call 407e20 call 402af0 1464->1472 1473 4084a9-4084b5 1464->1473 1466->1464 1467->1436 1467->1466 1474 4084b7-4084c5 1473->1474 1475 4084cb-4084d2 call 4dcb23 1473->1475 1474->1436 1474->1475 1475->1472
        APIs
        • ___std_exception_destroy.LIBVCRUNTIME ref: 004085AC
        • ___std_exception_destroy.LIBVCRUNTIME ref: 004085C2
        Strings
        Memory Dump Source
        • Source File: 00000003.00000002.3720005461.0000000000401000.00000020.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.3719894491.0000000000400000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.3720560055.0000000000515000.00000002.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.3720665924.0000000000540000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.3720743891.0000000000545000.00000020.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.3721025884.00000000005F6000.00000040.00000400.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
        Similarity
        • API ID: ___std_exception_destroy
        • String ID: at line $, column $parse error$ror
        • API String ID: 4194217158-697689061
        • Opcode ID: c544b48d3a7bd091e2756c201fa4c299fc85d2734b5896138f844569b93f0d83
        • Instruction ID: 5eed20493bf9008b1666e4e77f551704a34727cf03c9faf4099439c52a9f14e3
        • Opcode Fuzzy Hash: c544b48d3a7bd091e2756c201fa4c299fc85d2734b5896138f844569b93f0d83
        • Instruction Fuzzy Hash: FCD1CC71C00248DFEB14DFA8C9557EEBBB1AF51304F20829EE0557B2D2D7B85A84DBA1
        APIs
        • std::_Throw_Cpp_error.LIBCPMT ref: 0040B714
        • std::_Throw_Cpp_error.LIBCPMT ref: 0040B725
        Strings
        Memory Dump Source
        • Source File: 00000003.00000002.3720005461.0000000000401000.00000020.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.3719894491.0000000000400000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.3720560055.0000000000515000.00000002.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.3720665924.0000000000540000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.3720743891.0000000000545000.00000020.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.3721025884.00000000005F6000.00000040.00000400.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
        Similarity
        • API ID: Cpp_errorThrow_std::_
        • String ID: \*.*$DT
        • API String ID: 2134207285-2523999094
        • Opcode ID: f5372e11be44082f25a3e12a1f91f11978beff7d64d4e8c50d5de106e862fc9f
        • Instruction ID: 3a5e357e0eaef43d548668da3bf32abc8c0e5fbc24ddd430c02188c82ba943da
        • Opcode Fuzzy Hash: f5372e11be44082f25a3e12a1f91f11978beff7d64d4e8c50d5de106e862fc9f
        • Instruction Fuzzy Hash: 81B1DE70C00249DEDB10DFA8C9487EEBBB1FF55318F24425AE054BB2D2D7B85A84CBA5
        APIs
        • GetProcAddress.KERNEL32(00000000,5C4B5A43), ref: 00409713
        Strings
        Memory Dump Source
        • Source File: 00000003.00000002.3720005461.0000000000401000.00000020.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.3719894491.0000000000400000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.3720560055.0000000000515000.00000002.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.3720665924.0000000000540000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.3720743891.0000000000545000.00000020.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.3721025884.00000000005F6000.00000040.00000400.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
        Similarity
        • API ID: AddressProc
        • String ID: 5+,*$CZK\$RLR!
        • API String ID: 190572456-1667197386
        • Opcode ID: cf33655838e94d90ad32bcdbaf41b148c00ca284dd3093585e7f53c682d23829
        • Instruction ID: 1b649b20cbcbbe383d2d74940bb5567eda14a8d9e06964788797058add72dc1c
        • Opcode Fuzzy Hash: cf33655838e94d90ad32bcdbaf41b148c00ca284dd3093585e7f53c682d23829
        • Instruction Fuzzy Hash: 90311B71D04348ABDF109FE99C89BAEFBB8FF45714F1001BAE908B7292D6744D458798
        APIs
        • GetLastError.KERNEL32 ref: 00413F93
        • CopyFileA.KERNEL32(?,?,00000000), ref: 004140E2
        • GetLastError.KERNEL32 ref: 004140F0
        • CopyFileA.KERNEL32(?,?,00000000), ref: 00414104
        Memory Dump Source
        • Source File: 00000003.00000002.3720005461.0000000000401000.00000020.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.3719894491.0000000000400000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.3720560055.0000000000515000.00000002.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.3720665924.0000000000540000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.3720743891.0000000000545000.00000020.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.3721025884.00000000005F6000.00000040.00000400.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
        Similarity
        • API ID: CopyErrorFileLast
        • String ID:
        • API String ID: 374144340-0
        • Opcode ID: a3ad2207beff2c88c72dfc4db5a41971c486cf9080c7e1f51e7741a25d86b42c
        • Instruction ID: 4e8a858f8e8f6960467cd2fd7353e7b51b17af89a7da7ed7c510c280620ba509
        • Opcode Fuzzy Hash: a3ad2207beff2c88c72dfc4db5a41971c486cf9080c7e1f51e7741a25d86b42c
        • Instruction Fuzzy Hash: 7251CF72D01209ABDF21DFE5CC41BEEBBB8EF48324F10426AE514B7281D7396A45CB94
        APIs
        • Concurrency::cancel_current_task.LIBCPMT ref: 00475E75
        • Concurrency::cancel_current_task.LIBCPMT ref: 00476093
        Strings
        Memory Dump Source
        • Source File: 00000003.00000002.3720005461.0000000000401000.00000020.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.3719894491.0000000000400000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.3720560055.0000000000515000.00000002.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.3720665924.0000000000540000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.3720743891.0000000000545000.00000020.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.3721025884.00000000005F6000.00000040.00000400.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
        Similarity
        • API ID: Concurrency::cancel_current_task
        • String ID: cannot get value
        • API String ID: 118556049-2333289761
        • Opcode ID: 0999ee98cbe4c0583c2714d920e8f8a2abc0c77b51863e559c45617679fa762a
        • Instruction ID: 55863f5c5c761cbec14b37c2ffbbc5b0a7e38fdbd5ed2974f92d332770d72459
        • Opcode Fuzzy Hash: 0999ee98cbe4c0583c2714d920e8f8a2abc0c77b51863e559c45617679fa762a
        • Instruction Fuzzy Hash: D3B1B075900609DFCB04CF98C594AEEFBB5FF08310F14829AE819AB355D778AE01CB94
        APIs
        • ___std_exception_destroy.LIBVCRUNTIME ref: 0040807C
        • ___std_exception_destroy.LIBVCRUNTIME ref: 00408092
        Strings
        Memory Dump Source
        • Source File: 00000003.00000002.3720005461.0000000000401000.00000020.00000400.00020000.00000000.sdmp, Offset: 00400000, based on PE: true
        • Associated: 00000003.00000002.3719894491.0000000000400000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.3720560055.0000000000515000.00000002.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.3720665924.0000000000540000.00000040.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.3720743891.0000000000545000.00000020.00000400.00020000.00000000.sdmpDownload File
        • Associated: 00000003.00000002.3721025884.00000000005F6000.00000040.00000400.00020000.00000000.sdmpDownload File
        Joe Sandbox IDA Plugin
        • Snapshot File: hcaresult_3_2_400000_RegAsm.jbxd
        Similarity
        • API ID: ___std_exception_destroy
        • String ID: [json.exception.
        • API String ID: 4194217158-791563284
        • Opcode ID: cad485bcd42c8c281bad2817767b03bedc2c5fabb8b440c254c2ce50f9aa2880
        • Instruction ID: 7f99c11b4c43e4572e9624dce323e281514ed808fd84471958b998dba4cb0f5b
        • Opcode Fuzzy Hash: cad485bcd42c8c281bad2817767b03bedc2c5fabb8b440c254c2ce50f9aa2880
        • Instruction Fuzzy Hash: 2151C170D042499BDB10DFA8C94579EBBB4FF51314F14426EE850AB3C2E7B95A44CBA1