Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
SecuriteInfo.com.Trojan.GenericKD.74343103.31007.21862.exe

Overview

General Information

Sample name:SecuriteInfo.com.Trojan.GenericKD.74343103.31007.21862.exe
Analysis ID:1543316
MD5:d9ca1551c8b85b251d570bc6b9161d23
SHA1:b2300be703a2cb95aceac0ef571a67b6956d8929
SHA256:9ae76169ae9738a3d47661633a8cd768cd2a6fc07f2dc8a6f6b4925a754c301c
Tags:exe
Infos:

Detection

Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Allocates memory with a write watch (potentially for evading sandboxes)
Binary contains a suspicious time stamp
Detected potential crypto function
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: SecuriteInfo.com.Trojan.GenericKD.74343103.31007.21862.exeReversingLabs: Detection: 18%
Source: SecuriteInfo.com.Trojan.GenericKD.74343103.31007.21862.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: Binary string: E:\source\repos\TestQPP\obj\Debug\TestQPP.pdb source: SecuriteInfo.com.Trojan.GenericKD.74343103.31007.21862.exe
Source: unknownDNS traffic detected: query: 15.164.165.52.in-addr.arpa replaycode: Name error (3)
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: global trafficDNS traffic detected: DNS query: 15.164.165.52.in-addr.arpa
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74343103.31007.21862.exeCode function: 0_2_00CEDC540_2_00CEDC54
Source: SecuriteInfo.com.Trojan.GenericKD.74343103.31007.21862.exe, 00000000.00000002.2829795626.0000000000A9E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: OriginalFilenameclr.dllT vs SecuriteInfo.com.Trojan.GenericKD.74343103.31007.21862.exe
Source: SecuriteInfo.com.Trojan.GenericKD.74343103.31007.21862.exe, 00000000.00000002.2829386277.00000000005F7000.00000004.00000010.00020000.00000000.sdmpBinary or memory string: OriginalFilenameUNKNOWN_FILET vs SecuriteInfo.com.Trojan.GenericKD.74343103.31007.21862.exe
Source: SecuriteInfo.com.Trojan.GenericKD.74343103.31007.21862.exe, 00000000.00000000.1552654495.0000000000462000.00000002.00000001.01000000.00000003.sdmpBinary or memory string: OriginalFilenameTestQPP.exe0 vs SecuriteInfo.com.Trojan.GenericKD.74343103.31007.21862.exe
Source: SecuriteInfo.com.Trojan.GenericKD.74343103.31007.21862.exeBinary or memory string: OriginalFilenameTestQPP.exe0 vs SecuriteInfo.com.Trojan.GenericKD.74343103.31007.21862.exe
Source: classification engineClassification label: mal48.winEXE@1/0@1/0
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74343103.31007.21862.exeMutant created: NULL
Source: SecuriteInfo.com.Trojan.GenericKD.74343103.31007.21862.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: SecuriteInfo.com.Trojan.GenericKD.74343103.31007.21862.exeStatic file information: TRID: Win32 Executable (generic) Net Framework (10011505/4) 49.83%
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74343103.31007.21862.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: SecuriteInfo.com.Trojan.GenericKD.74343103.31007.21862.exeReversingLabs: Detection: 18%
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74343103.31007.21862.exeSection loaded: mscoree.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74343103.31007.21862.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74343103.31007.21862.exeSection loaded: kernel.appcore.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74343103.31007.21862.exeSection loaded: version.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74343103.31007.21862.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74343103.31007.21862.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74343103.31007.21862.exeSection loaded: uxtheme.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74343103.31007.21862.exeSection loaded: windows.storage.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74343103.31007.21862.exeSection loaded: wldp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74343103.31007.21862.exeSection loaded: profapi.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74343103.31007.21862.exeSection loaded: cryptsp.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74343103.31007.21862.exeSection loaded: rsaenh.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74343103.31007.21862.exeSection loaded: cryptbase.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74343103.31007.21862.exeSection loaded: dwrite.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74343103.31007.21862.exeSection loaded: textshaping.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74343103.31007.21862.exeSection loaded: textinputframework.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74343103.31007.21862.exeSection loaded: coreuicomponents.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74343103.31007.21862.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74343103.31007.21862.exeSection loaded: ntmarta.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74343103.31007.21862.exeSection loaded: coremessaging.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74343103.31007.21862.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74343103.31007.21862.exeSection loaded: wintypes.dllJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74343103.31007.21862.exeSection loaded: wintypes.dllJump to behavior
Source: Window RecorderWindow detected: More than 3 window changes detected
Source: SecuriteInfo.com.Trojan.GenericKD.74343103.31007.21862.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR
Source: SecuriteInfo.com.Trojan.GenericKD.74343103.31007.21862.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
Source: SecuriteInfo.com.Trojan.GenericKD.74343103.31007.21862.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: E:\source\repos\TestQPP\obj\Debug\TestQPP.pdb source: SecuriteInfo.com.Trojan.GenericKD.74343103.31007.21862.exe
Source: SecuriteInfo.com.Trojan.GenericKD.74343103.31007.21862.exeStatic PE information: 0xC4CF46E2 [Sun Aug 19 15:33:54 2074 UTC]
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74343103.31007.21862.exeCode function: 0_2_00CEEF70 push eax; iretd 0_2_00CEEF71
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74343103.31007.21862.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74343103.31007.21862.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74343103.31007.21862.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74343103.31007.21862.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74343103.31007.21862.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74343103.31007.21862.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74343103.31007.21862.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74343103.31007.21862.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74343103.31007.21862.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74343103.31007.21862.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74343103.31007.21862.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74343103.31007.21862.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74343103.31007.21862.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74343103.31007.21862.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74343103.31007.21862.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74343103.31007.21862.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74343103.31007.21862.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74343103.31007.21862.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74343103.31007.21862.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74343103.31007.21862.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74343103.31007.21862.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74343103.31007.21862.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74343103.31007.21862.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74343103.31007.21862.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74343103.31007.21862.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74343103.31007.21862.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74343103.31007.21862.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74343103.31007.21862.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74343103.31007.21862.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74343103.31007.21862.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74343103.31007.21862.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74343103.31007.21862.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74343103.31007.21862.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74343103.31007.21862.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74343103.31007.21862.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74343103.31007.21862.exeMemory allocated: CC0000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74343103.31007.21862.exeMemory allocated: 28A0000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74343103.31007.21862.exeMemory allocated: 48A0000 memory reserve | memory write watchJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74343103.31007.21862.exeMemory allocated: page read and write | page guardJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74343103.31007.21862.exeQueries volume information: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74343103.31007.21862.exe VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74343103.31007.21862.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74343103.31007.21862.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Drawing\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.Drawing.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74343103.31007.21862.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Accessibility\v4.0_4.0.0.0__b03f5f7f11d50a3a\Accessibility.dll VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74343103.31007.21862.exeQueries volume information: C:\Windows\Fonts\micross.ttf VolumeInformationJump to behavior
Source: C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74343103.31007.21862.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
DLL Side-Loading
1
Virtualization/Sandbox Evasion
OS Credential Dumping1
Virtualization/Sandbox Evasion
Remote Services1
Archive Collected Data
1
Encrypted Channel
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
Disable or Modify Tools
LSASS Memory12
System Information Discovery
Remote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
Timestomp
Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared Drive1
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
DLL Side-Loading
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
Obfuscated Files or Information
LSA SecretsInternet Connection DiscoverySSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
SecuriteInfo.com.Trojan.GenericKD.74343103.31007.21862.exe18%ReversingLabsWin32.Trojan.Generic
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
15.164.165.52.in-addr.arpa
unknown
unknownfalse
    unknown
    No contacted IP infos
    Joe Sandbox version:41.0.0 Charoite
    Analysis ID:1543316
    Start date and time:2024-10-27 16:56:20 +01:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 4m 34s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:7
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:SecuriteInfo.com.Trojan.GenericKD.74343103.31007.21862.exe
    Detection:MAL
    Classification:mal48.winEXE@1/0@1/0
    EGA Information:
    • Successful, ratio: 100%
    HCA Information:
    • Successful, ratio: 100%
    • Number of executed functions: 19
    • Number of non-executed functions: 1
    Cookbook Comments:
    • Found application associated with file extension: .exe
    • Exclude process from analysis (whitelisted): MpCmdRun.exe, dllhost.exe, WMIADAP.exe, SIHClient.exe, conhost.exe, svchost.exe
    • Excluded domains from analysis (whitelisted): fs.microsoft.com, ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
    • Not all processes where analyzed, report is missing behavior information
    • VT rate limit hit for: SecuriteInfo.com.Trojan.GenericKD.74343103.31007.21862.exe
    No simulations
    No context
    No context
    No context
    No context
    No context
    No created / dropped files found
    File type:PE32 executable (GUI) Intel 80386 Mono/.Net assembly, for MS Windows
    Entropy (8bit):5.5632936002667535
    TrID:
    • Win32 Executable (generic) Net Framework (10011505/4) 49.83%
    • Win32 Executable (generic) a (10002005/4) 49.78%
    • Generic CIL Executable (.NET, Mono, etc.) (73296/58) 0.36%
    • Generic Win/DOS Executable (2004/3) 0.01%
    • DOS Executable Generic (2002/1) 0.01%
    File name:SecuriteInfo.com.Trojan.GenericKD.74343103.31007.21862.exe
    File size:11'776 bytes
    MD5:d9ca1551c8b85b251d570bc6b9161d23
    SHA1:b2300be703a2cb95aceac0ef571a67b6956d8929
    SHA256:9ae76169ae9738a3d47661633a8cd768cd2a6fc07f2dc8a6f6b4925a754c301c
    SHA512:2096a3604ec58e099cf81badd074b279060c5a315e1b1d2108725b9330981ff30765153c200a6a26e7aeb2d28fa3c00a22e512dc648251092091d18ab9216596
    SSDEEP:192:7Z3asD853sWj3V5kIfmQd16vkYcV6oMU2lAFEs2F:Zr83sWTV55fn1YkYcV6oMUqAFn+
    TLSH:F3320A2182D58176C631AA3378666B057BB7C2BF3E5B966E348C151FBFB3110C2237A5
    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......PE..L....F............"...0..............3... ...@....@.. ....................................`................................
    Icon Hash:00928e8e8686b000
    Entrypoint:0x4033da
    Entrypoint Section:.text
    Digitally signed:false
    Imagebase:0x400000
    Subsystem:windows gui
    Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
    DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
    Time Stamp:0xC4CF46E2 [Sun Aug 19 15:33:54 2074 UTC]
    TLS Callbacks:
    CLR (.Net) Version:
    OS Version Major:4
    OS Version Minor:0
    File Version Major:4
    File Version Minor:0
    Subsystem Version Major:4
    Subsystem Version Minor:0
    Import Hash:f34d5f2d4577ed6d9ceec516c1f5a744
    Instruction
    jmp dword ptr [00402000h]
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    add byte ptr [eax], al
    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IMPORT0x33860x4f.text
    IMAGE_DIRECTORY_ENTRY_RESOURCE0x40000x15d0.rsrc
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
    IMAGE_DIRECTORY_ENTRY_BASERELOC0x60000xc.reloc
    IMAGE_DIRECTORY_ENTRY_DEBUG0x33080x38.text
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IAT0x20000x8.text
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x20080x48.text
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
    .text0x20000x13e00x1400be302228ef9272725fbe5f6f6d6781e4False0.5220703125data5.466978504145806IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    .rsrc0x40000x15d00x160073d3a90fe9e3f5457f3afe64e96117caFalse0.3984375data5.483723703180803IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .reloc0x60000xc0x20005710589d3104bd546b4c2b9a69279fbFalse0.044921875data0.08153941234324169IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
    NameRVASizeTypeLanguageCountryZLIB Complexity
    RT_VERSION0x40900x30cdata0.4230769230769231
    RT_MANIFEST0x43ac0x121dXML 1.0 document, Unicode text, UTF-8 (with BOM) text, with CRLF line terminators0.4019840414060815
    DLLImport
    mscoree.dll_CorExeMain
    TimestampSource PortDest PortSource IPDest IP
    Oct 27, 2024 16:58:06.728677988 CET5354164162.159.36.2192.168.2.8
    Oct 27, 2024 16:58:07.348208904 CET5763653192.168.2.81.1.1.1
    Oct 27, 2024 16:58:07.356566906 CET53576361.1.1.1192.168.2.8
    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
    Oct 27, 2024 16:58:07.348208904 CET192.168.2.81.1.1.10x34b4Standard query (0)15.164.165.52.in-addr.arpaPTR (Pointer record)IN (0x0001)false
    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
    Oct 27, 2024 16:58:07.356566906 CET1.1.1.1192.168.2.80x34b4Name error (3)15.164.165.52.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false

    Click to jump to process

    Click to jump to process

    Click to dive into process behavior distribution

    Target ID:0
    Start time:11:57:35
    Start date:27/10/2024
    Path:C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74343103.31007.21862.exe
    Wow64 process (32bit):true
    Commandline:"C:\Users\user\Desktop\SecuriteInfo.com.Trojan.GenericKD.74343103.31007.21862.exe"
    Imagebase:0x460000
    File size:11'776 bytes
    MD5 hash:D9CA1551C8B85B251D570BC6B9161D23
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:low
    Has exited:false

    Reset < >

      Execution Graph

      Execution Coverage:9.3%
      Dynamic/Decrypted Code Coverage:100%
      Signature Coverage:0%
      Total number of Nodes:167
      Total number of Limit Nodes:14
      execution_graph 27573 ced098 27574 ced0de GetCurrentProcess 27573->27574 27576 ced130 GetCurrentThread 27574->27576 27578 ced129 27574->27578 27577 ced16d GetCurrentProcess 27576->27577 27580 ced166 27576->27580 27579 ced1a3 27577->27579 27578->27576 27581 ced1cb GetCurrentThreadId 27579->27581 27580->27577 27582 ced1fc 27581->27582 27583 ce4668 27584 ce467a 27583->27584 27585 ce4686 27584->27585 27589 ce4778 27584->27589 27594 ce3e10 27585->27594 27587 ce46a5 27590 ce479d 27589->27590 27598 ce4888 27590->27598 27602 ce4878 27590->27602 27595 ce3e1b 27594->27595 27610 ce5c1c 27595->27610 27597 ce6fc8 27597->27587 27599 ce48af 27598->27599 27601 ce498c 27599->27601 27606 ce4248 27599->27606 27603 ce48af 27602->27603 27604 ce4248 CreateActCtxA 27603->27604 27605 ce498c 27603->27605 27604->27605 27607 ce5918 CreateActCtxA 27606->27607 27609 ce59db 27607->27609 27611 ce5c27 27610->27611 27614 ce5c3c 27611->27614 27613 ce706d 27613->27597 27615 ce5c47 27614->27615 27618 ce5c6c 27615->27618 27617 ce7142 27617->27613 27619 ce5c77 27618->27619 27622 ce5c9c 27619->27622 27621 ce7245 27621->27617 27623 ce5ca7 27622->27623 27625 ce8633 27623->27625 27628 ceace0 27623->27628 27624 ce8671 27624->27621 27625->27624 27632 cecdc0 27625->27632 27637 cead08 27628->27637 27642 cead18 27628->27642 27629 ceacf6 27629->27625 27634 cecdf1 27632->27634 27633 cece15 27633->27624 27634->27633 27656 cecf6f 27634->27656 27660 cecf80 27634->27660 27638 cead18 27637->27638 27646 ceae00 27638->27646 27651 ceae10 27638->27651 27639 cead27 27639->27629 27644 ceae00 GetModuleHandleW 27642->27644 27645 ceae10 GetModuleHandleW 27642->27645 27643 cead27 27643->27629 27644->27643 27645->27643 27647 ceae44 27646->27647 27648 ceae21 27646->27648 27647->27639 27648->27647 27649 ceb048 GetModuleHandleW 27648->27649 27650 ceb075 27649->27650 27650->27639 27652 ceae44 27651->27652 27653 ceae21 27651->27653 27652->27639 27653->27652 27654 ceb048 GetModuleHandleW 27653->27654 27655 ceb075 27654->27655 27655->27639 27657 cecf80 27656->27657 27658 cecfc7 27657->27658 27664 cec8b8 27657->27664 27658->27633 27662 cecf8d 27660->27662 27661 cecfc7 27661->27633 27662->27661 27663 cec8b8 4 API calls 27662->27663 27663->27661 27665 cec8c3 27664->27665 27667 ced8d8 27665->27667 27668 cec9e4 27665->27668 27667->27667 27669 cec9ef 27668->27669 27670 ce5c9c 4 API calls 27669->27670 27671 ced947 27670->27671 27672 ced956 27671->27672 27675 ceddc8 27671->27675 27679 ceddba 27671->27679 27672->27667 27676 ceddf6 27675->27676 27677 cedec2 KiUserCallbackDispatcher 27676->27677 27678 cedec7 27676->27678 27677->27678 27680 ceddc8 27679->27680 27681 cedec2 KiUserCallbackDispatcher 27680->27681 27682 cedec7 27680->27682 27681->27682 27683 4e6ce00 27684 4e6ce43 27683->27684 27685 4e6ce61 MonitorFromPoint 27684->27685 27686 4e6ce92 27684->27686 27685->27686 27489 4e64728 27493 4e64760 27489->27493 27497 4e64751 27489->27497 27490 4e64747 27494 4e64769 27493->27494 27501 4e64798 27494->27501 27495 4e6478e 27495->27490 27498 4e64769 27497->27498 27500 4e64798 DrawTextExW 27498->27500 27499 4e6478e 27499->27490 27500->27499 27502 4e647e3 27501->27502 27503 4e647d2 27501->27503 27504 4e64871 27502->27504 27507 4e64ec0 27502->27507 27512 4e64ed0 27502->27512 27503->27495 27504->27495 27509 4e64ec4 27507->27509 27508 4e64ffe 27508->27503 27509->27508 27517 4e655e0 27509->27517 27522 4e655f0 27509->27522 27513 4e64ef8 27512->27513 27514 4e64ffe 27513->27514 27515 4e655e0 DrawTextExW 27513->27515 27516 4e655f0 DrawTextExW 27513->27516 27514->27503 27515->27514 27516->27514 27518 4e65606 27517->27518 27527 4e65a48 27518->27527 27532 4e65a58 27518->27532 27519 4e6567c 27519->27508 27523 4e65606 27522->27523 27525 4e65a48 DrawTextExW 27523->27525 27526 4e65a58 DrawTextExW 27523->27526 27524 4e6567c 27524->27508 27525->27524 27526->27524 27528 4e65a54 27527->27528 27536 4e65a88 27528->27536 27541 4e65a98 27528->27541 27529 4e65a76 27529->27519 27534 4e65a88 DrawTextExW 27532->27534 27535 4e65a98 DrawTextExW 27532->27535 27533 4e65a76 27533->27519 27534->27533 27535->27533 27537 4e65a94 27536->27537 27538 4e65af6 27537->27538 27546 4e65b18 27537->27546 27551 4e65b09 27537->27551 27538->27529 27542 4e65ac9 27541->27542 27543 4e65af6 27542->27543 27544 4e65b18 DrawTextExW 27542->27544 27545 4e65b09 DrawTextExW 27542->27545 27543->27529 27544->27543 27545->27543 27548 4e65b39 27546->27548 27547 4e65b4e 27547->27538 27548->27547 27556 4e64e54 27548->27556 27550 4e65bb9 27553 4e65b10 27551->27553 27552 4e65b4e 27552->27538 27553->27552 27554 4e64e54 DrawTextExW 27553->27554 27555 4e65bb9 27554->27555 27558 4e64e5f 27556->27558 27557 4e67b89 27557->27550 27558->27557 27562 4e686f0 27558->27562 27566 4e68700 27558->27566 27559 4e67c9c 27559->27550 27563 4e686f4 27562->27563 27569 4e670f4 27563->27569 27567 4e670f4 DrawTextExW 27566->27567 27568 4e6871d 27567->27568 27568->27559 27571 4e68738 DrawTextExW 27569->27571 27572 4e6871d 27571->27572 27572->27559 27687 4e688c8 27688 4e65a58 DrawTextExW 27687->27688 27690 4e68907 27688->27690 27689 4e65b18 DrawTextExW 27692 4e68a15 27689->27692 27690->27689 27691 4e6890b 27690->27691 27693 ced2e0 DuplicateHandle 27694 ced376 27693->27694 27695 4e6a488 27696 4e6a49b 27695->27696 27697 4e6a49f 27696->27697 27698 4e6a4f2 KiUserCallbackDispatcher 27696->27698 27698->27697

      Control-flow Graph

      APIs
      • GetCurrentProcess.KERNEL32 ref: 00CED116
      • GetCurrentThread.KERNEL32 ref: 00CED153
      • GetCurrentProcess.KERNEL32 ref: 00CED190
      • GetCurrentThreadId.KERNEL32 ref: 00CED1E9
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2830156620.0000000000CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CE0000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_ce0000_SecuriteInfo.jbxd
      Similarity
      • API ID: Current$ProcessThread
      • String ID: 0/0
      • API String ID: 2063062207-1915817121
      • Opcode ID: 0ce8bd8c83036361bd5296696e9de7e9b4a77485b0aa4ce729d596689b62eeb7
      • Instruction ID: da0288fff721d3cc9c5e28100dcea6f1bddfd9e814cfafb26eb586a3559ce763
      • Opcode Fuzzy Hash: 0ce8bd8c83036361bd5296696e9de7e9b4a77485b0aa4ce729d596689b62eeb7
      • Instruction Fuzzy Hash: 7F5178B09003898FDB14DFAAD948BDEBBF1BF88314F208059E419A73A0DB745945CF26

      Control-flow Graph

      APIs
      • GetCurrentProcess.KERNEL32 ref: 00CED116
      • GetCurrentThread.KERNEL32 ref: 00CED153
      • GetCurrentProcess.KERNEL32 ref: 00CED190
      • GetCurrentThreadId.KERNEL32 ref: 00CED1E9
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2830156620.0000000000CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CE0000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_ce0000_SecuriteInfo.jbxd
      Similarity
      • API ID: Current$ProcessThread
      • String ID: 0/0
      • API String ID: 2063062207-1915817121
      • Opcode ID: b413a22b1b5dbf609ddc6c1caaf1f47256d1741ec99082b89c6c612e953064d1
      • Instruction ID: 2613c1258eac082a9a2c1ff60730398c632045e47a3e9d3f9da0785b8c7df7fa
      • Opcode Fuzzy Hash: b413a22b1b5dbf609ddc6c1caaf1f47256d1741ec99082b89c6c612e953064d1
      • Instruction Fuzzy Hash: 845158B09003498FDB14DFAAD948B9EBBF1BF88314F208459E419A73A0DB745945CF66

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 44 ceae10-ceae1f 45 ceae4b-ceae4f 44->45 46 ceae21-ceae2e call ce9818 44->46 48 ceae63-ceaea4 45->48 49 ceae51-ceae5b 45->49 52 ceae44 46->52 53 ceae30 46->53 55 ceaea6-ceaeae 48->55 56 ceaeb1-ceaebf 48->56 49->48 52->45 99 ceae36 call ceb0a8 53->99 100 ceae36 call ceb099 53->100 55->56 57 ceaee3-ceaee5 56->57 58 ceaec1-ceaec6 56->58 63 ceaee8-ceaeef 57->63 60 ceaec8-ceaecf call cea7f4 58->60 61 ceaed1 58->61 59 ceae3c-ceae3e 59->52 62 ceaf80-ceb040 59->62 67 ceaed3-ceaee1 60->67 61->67 94 ceb048-ceb073 GetModuleHandleW 62->94 95 ceb042-ceb045 62->95 65 ceaefc-ceaf03 63->65 66 ceaef1-ceaef9 63->66 70 ceaf05-ceaf0d 65->70 71 ceaf10-ceaf19 call cea804 65->71 66->65 67->63 70->71 75 ceaf1b-ceaf23 71->75 76 ceaf26-ceaf2b 71->76 75->76 77 ceaf2d-ceaf34 76->77 78 ceaf49-ceaf56 76->78 77->78 80 ceaf36-ceaf46 call cea814 call cea824 77->80 85 ceaf58-ceaf76 78->85 86 ceaf79-ceaf7f 78->86 80->78 85->86 96 ceb07c-ceb090 94->96 97 ceb075-ceb07b 94->97 95->94 97->96 99->59 100->59
      APIs
      • GetModuleHandleW.KERNELBASE(00000000), ref: 00CEB066
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2830156620.0000000000CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CE0000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_ce0000_SecuriteInfo.jbxd
      Similarity
      • API ID: HandleModule
      • String ID: 0/0
      • API String ID: 4139908857-1915817121
      • Opcode ID: f6214a97d8cb8af3208420f6cb015d543328358d28db002e686bd46754df0272
      • Instruction ID: dccc7d5d5c9fb7b807622b93d04d27b9198b30938373bfad349cf5b45a813532
      • Opcode Fuzzy Hash: f6214a97d8cb8af3208420f6cb015d543328358d28db002e686bd46754df0272
      • Instruction Fuzzy Hash: EC7133B0A00B858FDB24DF6AD44175ABBF1BF88300F00892DE49AD7A50DB75E959CB91

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 101 ce4248-ce59d9 CreateActCtxA 104 ce59db-ce59e1 101->104 105 ce59e2-ce5a3c 101->105 104->105 112 ce5a3e-ce5a41 105->112 113 ce5a4b-ce5a4f 105->113 112->113 114 ce5a60 113->114 115 ce5a51-ce5a5d 113->115 117 ce5a61 114->117 115->114 117->117
      APIs
      • CreateActCtxA.KERNEL32(?), ref: 00CE59C9
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2830156620.0000000000CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CE0000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_ce0000_SecuriteInfo.jbxd
      Similarity
      • API ID: Create
      • String ID: 0/0
      • API String ID: 2289755597-1915817121
      • Opcode ID: d100c37eaeb3db43c3fbf9071faa4245dc38ad760259802a778ad2beaafd07af
      • Instruction ID: 853751d924e066f865cf7f6a10ea3bb7168549cb2224cd232fbe9e29e4720257
      • Opcode Fuzzy Hash: d100c37eaeb3db43c3fbf9071faa4245dc38ad760259802a778ad2beaafd07af
      • Instruction Fuzzy Hash: A141E2B1C0075DCFDB24DFAAC884B9EBBB1BF88704F20816AD408AB251DB755945CF91

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 118 ce590c-ce590f 119 ce591c-ce59d9 CreateActCtxA 118->119 121 ce59db-ce59e1 119->121 122 ce59e2-ce5a3c 119->122 121->122 129 ce5a3e-ce5a41 122->129 130 ce5a4b-ce5a4f 122->130 129->130 131 ce5a60 130->131 132 ce5a51-ce5a5d 130->132 134 ce5a61 131->134 132->131 134->134
      APIs
      • CreateActCtxA.KERNEL32(?), ref: 00CE59C9
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2830156620.0000000000CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CE0000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_ce0000_SecuriteInfo.jbxd
      Similarity
      • API ID: Create
      • String ID: 0/0
      • API String ID: 2289755597-1915817121
      • Opcode ID: cb9d314c4f2da53165a82d04fb1a88644404e9612a46b3f4d20e4e6b3e85a353
      • Instruction ID: b1184c8c132445c5e01e4a081700d7e7161b5b339a34876e32cca01dfe0376f1
      • Opcode Fuzzy Hash: cb9d314c4f2da53165a82d04fb1a88644404e9612a46b3f4d20e4e6b3e85a353
      • Instruction Fuzzy Hash: DC4101B1D0075DCFDB24DFAAC88479DBBB1BF88704F20816AD018AB291DB755946CF51

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 135 4e68730-4e68784 136 4e68786-4e6878c 135->136 137 4e6878f-4e6879e 135->137 136->137 138 4e687a3-4e687dc DrawTextExW 137->138 139 4e687a0 137->139 140 4e687e5-4e68802 138->140 141 4e687de-4e687e4 138->141 139->138 141->140
      APIs
      • DrawTextExW.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,04E6871D,?,?), ref: 04E687CF
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2830800072.0000000004E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E60000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_4e60000_SecuriteInfo.jbxd
      Similarity
      • API ID: DrawText
      • String ID: 0/0
      • API String ID: 2175133113-1915817121
      • Opcode ID: 90bbe0847ce067601ad5976e53054ed9ac634c5b43da8b12a674d8446b1fe79e
      • Instruction ID: 07c30a261797cab76a5a55e37e45f089caf1b8e11ad3392282522747bc9cbfb1
      • Opcode Fuzzy Hash: 90bbe0847ce067601ad5976e53054ed9ac634c5b43da8b12a674d8446b1fe79e
      • Instruction Fuzzy Hash: F331FDB5D012099FDB10DF9AD884ADEBBF5FF48324F24842AE819A7210D775A901CFA1

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 144 4e670f4-4e68784 146 4e68786-4e6878c 144->146 147 4e6878f-4e6879e 144->147 146->147 148 4e687a3-4e687dc DrawTextExW 147->148 149 4e687a0 147->149 150 4e687e5-4e68802 148->150 151 4e687de-4e687e4 148->151 149->148 151->150
      APIs
      • DrawTextExW.USER32(?,?,?,?,?,?,?,?,?,?,?,?,?,04E6871D,?,?), ref: 04E687CF
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2830800072.0000000004E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E60000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_4e60000_SecuriteInfo.jbxd
      Similarity
      • API ID: DrawText
      • String ID: 0/0
      • API String ID: 2175133113-1915817121
      • Opcode ID: 3261621b934eb1bfcda8c2a19a33ab1e0661aa505a2741e7bb080f3f3c32f052
      • Instruction ID: e2146b7a4278b0fe7b968edb23f81370a8f3355ff4840ea7bbebc1ca9b08adc9
      • Opcode Fuzzy Hash: 3261621b934eb1bfcda8c2a19a33ab1e0661aa505a2741e7bb080f3f3c32f052
      • Instruction Fuzzy Hash: A931E0B59013099FDB10DF9AD884AAEFBF5FF58364F14842EE919A7210D774A940CFA0

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 154 4e6ce00-4e6ce4c 156 4e6ceb2-4e6cecd 154->156 157 4e6ce4e-4e6ce90 MonitorFromPoint 154->157 165 4e6cecf-4e6cedc 156->165 160 4e6ce92-4e6ce98 157->160 161 4e6ce99-4e6cea4 157->161 160->161 164 4e6cead-4e6ceb0 161->164 164->165
      APIs
      • MonitorFromPoint.USER32(?,?,00000002), ref: 04E6CE7F
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2830800072.0000000004E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E60000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_4e60000_SecuriteInfo.jbxd
      Similarity
      • API ID: FromMonitorPoint
      • String ID: 0/0
      • API String ID: 1566494148-1915817121
      • Opcode ID: f5e6c1ac129ed5662ecdcfad2811fcb0e6b146198a8ee708d885112a868fb237
      • Instruction ID: 7118a480bd5e646d0fe3fcde086d4b4e12d677fc53c98d5548bf5f5362ebcbe1
      • Opcode Fuzzy Hash: f5e6c1ac129ed5662ecdcfad2811fcb0e6b146198a8ee708d885112a868fb237
      • Instruction Fuzzy Hash: F4216A75A043489FDB10DF9AD505BEEFBF5EB48714F10801AE956AB380CB78A905CFA1

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 166 ced2d8-ced374 DuplicateHandle 167 ced37d-ced39a 166->167 168 ced376-ced37c 166->168 168->167
      APIs
      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00CED367
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2830156620.0000000000CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CE0000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_ce0000_SecuriteInfo.jbxd
      Similarity
      • API ID: DuplicateHandle
      • String ID: 0/0
      • API String ID: 3793708945-1915817121
      • Opcode ID: 23a5873f3451c0dbb3027130f839750ba2ed037de8a504cad8121488799efbfa
      • Instruction ID: a17e1b5b8c83987726a9078b87e8c03b0f6c5c8ee9a777b8d496970684b1cc24
      • Opcode Fuzzy Hash: 23a5873f3451c0dbb3027130f839750ba2ed037de8a504cad8121488799efbfa
      • Instruction Fuzzy Hash: F821E2B5900249DFDB10CFAAD484ADEBBF5FB48320F14801AE958A3250C778A955CFA5

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 171 ced2e0-ced374 DuplicateHandle 172 ced37d-ced39a 171->172 173 ced376-ced37c 171->173 173->172
      APIs
      • DuplicateHandle.KERNELBASE(?,?,?,?,?,?,?), ref: 00CED367
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2830156620.0000000000CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CE0000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_ce0000_SecuriteInfo.jbxd
      Similarity
      • API ID: DuplicateHandle
      • String ID: 0/0
      • API String ID: 3793708945-1915817121
      • Opcode ID: d3cab41dfae82ea37dded72ade2e4b2f35775b96d68573f8ab904fc735c57cce
      • Instruction ID: 73b2f18c27e1cc306a5801d92f486f63dac3f16c9b5ae96b0ba0f3051cf2f65f
      • Opcode Fuzzy Hash: d3cab41dfae82ea37dded72ade2e4b2f35775b96d68573f8ab904fc735c57cce
      • Instruction Fuzzy Hash: 9421C4B59003499FDB10CFAAD884ADEBBF9FB48720F14841AE914A3350D379A954CFA5

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 176 4e6cdff-4e6ce4c 178 4e6ceb2-4e6cecd 176->178 179 4e6ce4e-4e6ce90 MonitorFromPoint 176->179 187 4e6cecf-4e6cedc 178->187 182 4e6ce92-4e6ce98 179->182 183 4e6ce99-4e6cea4 179->183 182->183 186 4e6cead-4e6ceb0 183->186 186->187
      APIs
      • MonitorFromPoint.USER32(?,?,00000002), ref: 04E6CE7F
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2830800072.0000000004E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E60000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_4e60000_SecuriteInfo.jbxd
      Similarity
      • API ID: FromMonitorPoint
      • String ID: 0/0
      • API String ID: 1566494148-1915817121
      • Opcode ID: ce189acfdf5fd4571e9e97f1289d04275b5d87de9452f3e3d8470b399961ebd8
      • Instruction ID: afe037b124051a2a75a1098f228dd73730dd0bd16d4c53ba5852547d26b32d75
      • Opcode Fuzzy Hash: ce189acfdf5fd4571e9e97f1289d04275b5d87de9452f3e3d8470b399961ebd8
      • Instruction Fuzzy Hash: 842158B59043489FDB10DF9AD445BEEBBF4EB48714F10801AE959AB340C778A945CFA1

      Control-flow Graph

      • Executed
      • Not Executed
      control_flow_graph 188 ceb000-ceb040 189 ceb048-ceb073 GetModuleHandleW 188->189 190 ceb042-ceb045 188->190 191 ceb07c-ceb090 189->191 192 ceb075-ceb07b 189->192 190->189 192->191
      APIs
      • GetModuleHandleW.KERNELBASE(00000000), ref: 00CEB066
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2830156620.0000000000CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CE0000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_ce0000_SecuriteInfo.jbxd
      Similarity
      • API ID: HandleModule
      • String ID: 0/0
      • API String ID: 4139908857-1915817121
      • Opcode ID: 76778a3accc1e2ac77cc2905ffb74b621e106300223d42487da388abcf236e75
      • Instruction ID: a7028aea3cb1c0d3d3a47e4cfcb86398c69c5bb561044855fbe6ede8f005dc3a
      • Opcode Fuzzy Hash: 76778a3accc1e2ac77cc2905ffb74b621e106300223d42487da388abcf236e75
      • Instruction Fuzzy Hash: FF11DFB6C003498FDB20DF9AC444A9FFBF4AB88724F10841AD529A7610C379A945CFA5
      APIs
      • KiUserCallbackDispatcher.NTDLL(00000003,00000000,00000000,?,?,?,00000000), ref: 04E6A506
      Memory Dump Source
      • Source File: 00000000.00000002.2830800072.0000000004E60000.00000040.00000800.00020000.00000000.sdmp, Offset: 04E60000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_4e60000_SecuriteInfo.jbxd
      Similarity
      • API ID: CallbackDispatcherUser
      • String ID:
      • API String ID: 2492992576-0
      • Opcode ID: 2c622540610fb1b1107af3bf299d05d94f12da72afbc117f0228b63b5d67ee7b
      • Instruction ID: 6f15a23eb630b1b340e963704a59da5baa510b4b079f330172e98cb11558d271
      • Opcode Fuzzy Hash: 2c622540610fb1b1107af3bf299d05d94f12da72afbc117f0228b63b5d67ee7b
      • Instruction Fuzzy Hash: D521D732F405109FEB14EB59DC01BA9B766EFC5329F0481B8E50A97755C770E811DB90
      Memory Dump Source
      • Source File: 00000000.00000002.2829638275.0000000000A6D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A6D000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_a6d000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 554fa2c8070074bae9bf0a767cab6536d0ad73d506069537973ba1b05ca71c54
      • Instruction ID: 1352bd317b9c7fae05d2e2e684e88c44e8e81254314cece24392144ebd6a5757
      • Opcode Fuzzy Hash: 554fa2c8070074bae9bf0a767cab6536d0ad73d506069537973ba1b05ca71c54
      • Instruction Fuzzy Hash: 8A21F171A04340DFDB05DF14D9C4B26BF75FB88768F24C569E80A0A656C336D856CAA2
      Memory Dump Source
      • Source File: 00000000.00000002.2829721277.0000000000A7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A7D000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_a7d000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: bd45386cc28a99f2042a727a51caf688e38bd26227dc9822f64ad03bac704f2c
      • Instruction ID: b7954807a55c2c9a0ec5308ae0221915f67a59f491879d579a109953b7be7bf3
      • Opcode Fuzzy Hash: bd45386cc28a99f2042a727a51caf688e38bd26227dc9822f64ad03bac704f2c
      • Instruction Fuzzy Hash: 3521D0B5604304AFDB05DF10D984B26BBB5FF84314F24C6ADE84D4B292C336D847CAA1
      Memory Dump Source
      • Source File: 00000000.00000002.2829721277.0000000000A7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A7D000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_a7d000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 761d4e692d20bdbe80988fa0a070307c0dceae8c8a33e23edceed784f66e7454
      • Instruction ID: 4abec3046035527370acfc0d11c28bd43f7e37961c2172190bd36a436ea5b598
      • Opcode Fuzzy Hash: 761d4e692d20bdbe80988fa0a070307c0dceae8c8a33e23edceed784f66e7454
      • Instruction Fuzzy Hash: B521CC75604304AFDB14DF24D984B26BBB5FB88324F24C569E84E4B286C33AD847CA62
      Memory Dump Source
      • Source File: 00000000.00000002.2829638275.0000000000A6D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A6D000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_a6d000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: e3062b24f5b0128947100ec6e500ced3c6d63245422b7ec3b5033f72fc324263
      • Instruction ID: 913a2db35cac40e86f8cd6f1284f8673898310edd46b9cfc77babee4abdddda5
      • Opcode Fuzzy Hash: e3062b24f5b0128947100ec6e500ced3c6d63245422b7ec3b5033f72fc324263
      • Instruction Fuzzy Hash: 9D11E676A04280CFCB16CF14D5C4B16BF72FB94324F24C6A9D84A0F656C33AD856CBA1
      Memory Dump Source
      • Source File: 00000000.00000002.2829721277.0000000000A7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A7D000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_a7d000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 8009cd9747851c6a16484d38da83a80e1112e09f0888f91abd329c0e09305381
      • Instruction ID: 9373df9e5524212f89daa19a2160d4423e5a8be32ddfad3a6ea87971f6e4b06a
      • Opcode Fuzzy Hash: 8009cd9747851c6a16484d38da83a80e1112e09f0888f91abd329c0e09305381
      • Instruction Fuzzy Hash: F1118E75504284DFCB15CF14D9C4B15BB72FB44314F24C6A9D84E4B656C33AD85BCB61
      Memory Dump Source
      • Source File: 00000000.00000002.2829721277.0000000000A7D000.00000040.00000800.00020000.00000000.sdmp, Offset: 00A7D000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_a7d000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 8009cd9747851c6a16484d38da83a80e1112e09f0888f91abd329c0e09305381
      • Instruction ID: 24116aef6b25eb926f653d99472c94e3111540228489bffd38de65844d737e04
      • Opcode Fuzzy Hash: 8009cd9747851c6a16484d38da83a80e1112e09f0888f91abd329c0e09305381
      • Instruction Fuzzy Hash: DC11A975604280DFCB01CF10C9C0B15BBB2FB84324F28C6A9D8494B296C33AD80ACBA1
      Memory Dump Source
      • Source File: 00000000.00000002.2830156620.0000000000CE0000.00000040.00000800.00020000.00000000.sdmp, Offset: 00CE0000, based on PE: false
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_ce0000_SecuriteInfo.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: c23ba9ff6c4ef6e5c6c465228c5b38fe0af8f844eabea45087786db800a23d27
      • Instruction ID: f68dc4a05c1f7e637a0f2a762f1f2bc69a95edd4e2d27c422bc05ae1885923cc
      • Opcode Fuzzy Hash: c23ba9ff6c4ef6e5c6c465228c5b38fe0af8f844eabea45087786db800a23d27
      • Instruction Fuzzy Hash: FAA18F32E002598FCF05DFB6C9405DEB7B2FF84300B25857AE916AB265DB71EA16DB40