Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
myTOrYevLI.exe

Overview

General Information

Sample name:myTOrYevLI.exe
renamed because original name is a hash value
Original sample name:efb0bd87d4ee615b6892fcc83b234dff.exe
Analysis ID:1581613
MD5:efb0bd87d4ee615b6892fcc83b234dff
SHA1:894a45c84d5a50db8d79653981d04cb4df7cc29c
SHA256:1753c4e6332371b1a699ee865fa5496ca47b706cb41193d199a01eaadb955e4d
Tags:exeuser-abuse_ch
Infos:

Detection

Phorpiex
Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus detection for dropped file
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Yara detected Phorpiex
Found evasive API chain (may stop execution after checking mutex)
Found potential dummy code loops (likely to delay analysis)
Machine Learning detection for dropped file
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to read the PEB
Contains long sleeps (>= 3 min)
Dropped file seen in connection with other malware
Drops PE files
Drops PE files to the application program directory (C:\ProgramData)
Entry point lies outside standard sections
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Installs a raw input device (often for capturing keystrokes)
May sleep (evasive loops) to hinder dynamic analysis
PE file contains sections with non-standard names
Program does not show much activity (idle)
Sample execution stops while process was sleeping (likely an evasion)
Uses 32bit PE files
Uses code obfuscation techniques (call, push, ret)

Classification

  • System is w10x64
  • myTOrYevLI.exe (PID: 6228 cmdline: "C:\Users\user\Desktop\myTOrYevLI.exe" MD5: EFB0BD87D4EE615B6892FCC83B234DFF)
  • cleanup
No configs have been found
SourceRuleDescriptionAuthorStrings
myTOrYevLI.exeJoeSecurity_Phorpiex_5Yara detected PhorpiexJoe Security
    SourceRuleDescriptionAuthorStrings
    0.2.myTOrYevLI.exe.4d0000.0.unpackJoeSecurity_Phorpiex_5Yara detected PhorpiexJoe Security
      0.0.myTOrYevLI.exe.4d0000.0.unpackJoeSecurity_Phorpiex_5Yara detected PhorpiexJoe Security
        No Sigma rule has matched
        No Suricata rule has matched

        Click to jump to signature section

        Show All Signature Results

        AV Detection

        barindex
        Source: C:\ProgramData\Microsoft\ClickToRun\{9AC08E99-230B-47e8-9721-4577B7F124EA}\integrator.exeAvira: detection malicious, Label: W32/Infector.Gen
        Source: C:\ProgramData\Package Cache\{8bdfe669-9705-4184-9368-db9ce581e0e7}\VC_redist.x64.exeAvira: detection malicious, Label: W32/Infector.Gen
        Source: C:\Users\user\AppData\Local\Temp\chrome.exeAvira: detection malicious, Label: W32/Infector.Gen
        Source: C:\Users\user\AppData\Local\Temp\chrome.exeReversingLabs: Detection: 68%
        Source: myTOrYevLI.exeReversingLabs: Detection: 44%
        Source: C:\ProgramData\Package Cache\{8bdfe669-9705-4184-9368-db9ce581e0e7}\VC_redist.x64.exeJoe Sandbox ML: detected
        Source: C:\Users\user\AppData\Local\Temp\chrome.exeJoe Sandbox ML: detected

        Phishing

        barindex
        Source: Yara matchFile source: myTOrYevLI.exe, type: SAMPLE
        Source: Yara matchFile source: 0.2.myTOrYevLI.exe.4d0000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.0.myTOrYevLI.exe.4d0000.0.unpack, type: UNPACKEDPE
        Source: myTOrYevLI.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
        Source: C:\Users\user\Desktop\myTOrYevLI.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.9625_none_508ef7e4bcbbe589\MSVCR90.dllJump to behavior
        Source: myTOrYevLI.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
        Source: Binary string: ntkrnlmp.pdbx, source: myTOrYevLI.exe, 00000000.00000002.4443173657.000000000B2D5000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4401590868.000000000A37B000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4489330299.000000000C287000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4268799703.0000000007456000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4337387142.0000000008AFE000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4467238506.000000000BAEB000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4313211542.0000000008279000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4247381323.0000000006CA8000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4521833127.000000000CA95000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4359899792.00000000092E6000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4422571898.000000000AB47000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4381723638.0000000009BBC000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: C:\agent\_work\8\s\build\ship\x86\burn.pdb source: VC_redist.x64.exe.0.dr
        Source: Binary string: WINLOA~1.PDBwinload_prod.pdb source: myTOrYevLI.exe, 00000000.00000002.4443173657.000000000B2DF000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4443173657.000000000B2D5000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4401590868.000000000A37B000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4489330299.000000000C287000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4268799703.0000000007456000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4337387142.0000000008AFE000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4381723638.0000000009BC6000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4467238506.000000000BAEB000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4313211542.0000000008279000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4467238506.000000000BAF3000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4247381323.0000000006CA8000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4521833127.000000000CA95000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4523221510.000000000CAB6000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4337387142.0000000008B07000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4359899792.00000000092E6000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4422571898.000000000AB47000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4489330299.000000000C281000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4381723638.0000000009BBC000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: ntkrnlmp.pdb source: myTOrYevLI.exe, 00000000.00000002.4443173657.000000000B2DF000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4401590868.000000000A37B000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4489330299.000000000C287000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4467238506.000000000BAF3000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4523221510.000000000CAB6000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4359899792.00000000092E6000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4381723638.0000000009BBF000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4337387142.0000000008B04000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4422571898.000000000AB47000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: d:\dbs\el\omr\target\x86\ship\click2run\x-none\Integrator.pdb source: integrator.exe.0.dr
        Source: Binary string: R:\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: chrome.exe.0.dr
        Source: Binary string: d:\dbs\el\omr\target\x86\ship\click2run\x-none\Integrator.pdb0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000S source: integrator.exe.0.dr
        Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2, source: myTOrYevLI.exe, 00000000.00000002.4122786977.0000000002B15000.00000004.00000020.00020000.00000000.sdmp
        Source: C:\Users\user\Desktop\myTOrYevLI.exeCode function: 0_2_004D2980 memset,memset,PathCombineW,FindFirstFileW,lstrcmpW,lstrcmpW,PathCombineW,CharLowerW,PathMatchSpecW,PathCombineW,FindNextFileW,CloseHandle,0_2_004D2980
        Source: integrator.exe.0.drString found in binary or memory: http://127.0.0.1:13556/InsiderSlabBehaviorReportedBuildInsiderSlabBehaviorInsiderSlabBehaviorReporte
        Source: VC_redist.x64.exe.0.drString found in binary or memory: http://appsyndication.org/2006/appsynapplicationapuputil.cppupgradeexclusivetrueenclosuredigestalgor
        Source: integrator.exe.0.drString found in binary or memory: https://nexus.officeapps.live.comhttps://nexusrules.officeapps.live.com
        Source: integrator.exe.0.drString found in binary or memory: https://otelrules.azureedge.net/rules/.bundlesdxhelper.exeFailed
        Source: integrator.exe.0.drBinary or memory string: RegisterRawInputDevicesmemstr_8a2edf16-6

        Spam, unwanted Advertisements and Ransom Demands

        barindex
        Source: Yara matchFile source: myTOrYevLI.exe, type: SAMPLE
        Source: Yara matchFile source: 0.2.myTOrYevLI.exe.4d0000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.0.myTOrYevLI.exe.4d0000.0.unpack, type: UNPACKEDPE
        Source: Joe Sandbox ViewDropped File: C:\ProgramData\Microsoft\ClickToRun\{9AC08E99-230B-47e8-9721-4577B7F124EA}\integrator.exe 9D9E11B8D4849891A49FA11EBD197D970BF647640B770E6A196C13C9E006FCF4
        Source: Joe Sandbox ViewDropped File: C:\ProgramData\Package Cache\{8bdfe669-9705-4184-9368-db9ce581e0e7}\VC_redist.x64.exe 2787FB2327241FC636EDD9D712C7D880006EED5916DCF9C507684F1EC4E0A4F0
        Source: myTOrYevLI.exeStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE
        Source: classification engineClassification label: mal84.troj.evad.winEXE@1/3@0/0
        Source: C:\Users\user\Desktop\myTOrYevLI.exeFile created: C:\Users\user\AppData\Roaming\windrx.txtJump to behavior
        Source: C:\Users\user\Desktop\myTOrYevLI.exeMutant created: \Sessions\1\BaseNamedObjects\6436646754
        Source: C:\Users\user\Desktop\myTOrYevLI.exeCommand line argument: 64366467540_2_004D1090
        Source: myTOrYevLI.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
        Source: C:\Users\user\Desktop\myTOrYevLI.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
        Source: integrator.exe.0.drBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
        Source: integrator.exe.0.drBinary or memory string: UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
        Source: integrator.exe.0.drBinary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
        Source: integrator.exe.0.drBinary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q COLLATE nocase AND (type='table' OR type='index' OR type='trigger');
        Source: myTOrYevLI.exeReversingLabs: Detection: 44%
        Source: C:\Users\user\Desktop\myTOrYevLI.exeSection loaded: apphelp.dllJump to behavior
        Source: C:\Users\user\Desktop\myTOrYevLI.exeFile opened: C:\Windows\WinSxS\x86_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.9625_none_508ef7e4bcbbe589\MSVCR90.dllJump to behavior
        Source: myTOrYevLI.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
        Source: Binary string: ntkrnlmp.pdbx, source: myTOrYevLI.exe, 00000000.00000002.4443173657.000000000B2D5000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4401590868.000000000A37B000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4489330299.000000000C287000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4268799703.0000000007456000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4337387142.0000000008AFE000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4467238506.000000000BAEB000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4313211542.0000000008279000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4247381323.0000000006CA8000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4521833127.000000000CA95000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4359899792.00000000092E6000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4422571898.000000000AB47000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4381723638.0000000009BBC000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: C:\agent\_work\8\s\build\ship\x86\burn.pdb source: VC_redist.x64.exe.0.dr
        Source: Binary string: WINLOA~1.PDBwinload_prod.pdb source: myTOrYevLI.exe, 00000000.00000002.4443173657.000000000B2DF000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4443173657.000000000B2D5000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4401590868.000000000A37B000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4489330299.000000000C287000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4268799703.0000000007456000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4337387142.0000000008AFE000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4381723638.0000000009BC6000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4467238506.000000000BAEB000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4313211542.0000000008279000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4467238506.000000000BAF3000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4247381323.0000000006CA8000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4521833127.000000000CA95000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4523221510.000000000CAB6000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4337387142.0000000008B07000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4359899792.00000000092E6000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4422571898.000000000AB47000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4489330299.000000000C281000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4381723638.0000000009BBC000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: ntkrnlmp.pdb source: myTOrYevLI.exe, 00000000.00000002.4443173657.000000000B2DF000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4401590868.000000000A37B000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4489330299.000000000C287000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4467238506.000000000BAF3000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4523221510.000000000CAB6000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4359899792.00000000092E6000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4381723638.0000000009BBF000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4337387142.0000000008B04000.00000004.00000020.00020000.00000000.sdmp, myTOrYevLI.exe, 00000000.00000002.4422571898.000000000AB47000.00000004.00000020.00020000.00000000.sdmp
        Source: Binary string: d:\dbs\el\omr\target\x86\ship\click2run\x-none\Integrator.pdb source: integrator.exe.0.dr
        Source: Binary string: R:\JoeSecurity\trunk\src\windows\usermode\tools\FakeChrome\Release\Chrome.pdb source: chrome.exe.0.dr
        Source: Binary string: d:\dbs\el\omr\target\x86\ship\click2run\x-none\Integrator.pdb0000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000S source: integrator.exe.0.dr
        Source: Binary string: C:\Users\user\Local Settings\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Application Data\Temp\Symbols\winload_prod.pdb\01AB9056EA9380F71644C4339E3FA1AC2, source: myTOrYevLI.exe, 00000000.00000002.4122786977.0000000002B15000.00000004.00000020.00020000.00000000.sdmp
        Source: myTOrYevLI.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
        Source: myTOrYevLI.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
        Source: myTOrYevLI.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
        Source: myTOrYevLI.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
        Source: myTOrYevLI.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
        Source: initial sampleStatic PE information: section where entry point is pointing to: .zero
        Source: integrator.exe.0.drStatic PE information: section name: .zero
        Source: VC_redist.x64.exe.0.drStatic PE information: section name: .wixburn
        Source: VC_redist.x64.exe.0.drStatic PE information: section name: .zero
        Source: chrome.exe.0.drStatic PE information: section name: .zero
        Source: C:\Users\user\Desktop\myTOrYevLI.exeCode function: 0_2_004D32E1 push ecx; ret 0_2_004D32F4
        Source: C:\Users\user\Desktop\myTOrYevLI.exeFile created: C:\ProgramData\Microsoft\ClickToRun\{9AC08E99-230B-47e8-9721-4577B7F124EA}\integrator.exeJump to dropped file
        Source: C:\Users\user\Desktop\myTOrYevLI.exeFile created: C:\Users\user\AppData\Local\Temp\chrome.exeJump to dropped file
        Source: C:\Users\user\Desktop\myTOrYevLI.exeFile created: C:\ProgramData\Package Cache\{8bdfe669-9705-4184-9368-db9ce581e0e7}\VC_redist.x64.exeJump to dropped file
        Source: C:\Users\user\Desktop\myTOrYevLI.exeFile created: C:\ProgramData\Microsoft\ClickToRun\{9AC08E99-230B-47e8-9721-4577B7F124EA}\integrator.exeJump to dropped file
        Source: C:\Users\user\Desktop\myTOrYevLI.exeFile created: C:\ProgramData\Package Cache\{8bdfe669-9705-4184-9368-db9ce581e0e7}\VC_redist.x64.exeJump to dropped file
        Source: C:\Users\user\Desktop\myTOrYevLI.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

        Malware Analysis System Evasion

        barindex
        Source: C:\Users\user\Desktop\myTOrYevLI.exeEvasive API call chain: CreateMutex,DecisionNodes,Sleepgraph_0-558
        Source: C:\Users\user\Desktop\myTOrYevLI.exeEvasive API call chain: CreateMutex,DecisionNodes,ExitProcessgraph_0-558
        Source: C:\Users\user\Desktop\myTOrYevLI.exeThread delayed: delay time: 216000000Jump to behavior
        Source: C:\Users\user\Desktop\myTOrYevLI.exeThread delayed: delay time: 216000000Jump to behavior
        Source: C:\Users\user\Desktop\myTOrYevLI.exeWindow / User API: threadDelayed 1445Jump to behavior
        Source: C:\Users\user\Desktop\myTOrYevLI.exeWindow / User API: threadDelayed 8134Jump to behavior
        Source: C:\Users\user\Desktop\myTOrYevLI.exeDropped PE file which has not been started: C:\ProgramData\Microsoft\ClickToRun\{9AC08E99-230B-47e8-9721-4577B7F124EA}\integrator.exeJump to dropped file
        Source: C:\Users\user\Desktop\myTOrYevLI.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\chrome.exeJump to dropped file
        Source: C:\Users\user\Desktop\myTOrYevLI.exeDropped PE file which has not been started: C:\ProgramData\Package Cache\{8bdfe669-9705-4184-9368-db9ce581e0e7}\VC_redist.x64.exeJump to dropped file
        Source: C:\Users\user\Desktop\myTOrYevLI.exe TID: 6248Thread sleep count: 1445 > 30Jump to behavior
        Source: C:\Users\user\Desktop\myTOrYevLI.exe TID: 6248Thread sleep time: -312120000000s >= -30000sJump to behavior
        Source: C:\Users\user\Desktop\myTOrYevLI.exe TID: 6248Thread sleep count: 8134 > 30Jump to behavior
        Source: C:\Users\user\Desktop\myTOrYevLI.exe TID: 6248Thread sleep time: -1756944000000s >= -30000sJump to behavior
        Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
        Source: C:\Users\user\Desktop\myTOrYevLI.exeLast function: Thread delayed
        Source: C:\Users\user\Desktop\myTOrYevLI.exeLast function: Thread delayed
        Source: C:\Users\user\Desktop\myTOrYevLI.exeCode function: 0_2_004D2980 memset,memset,PathCombineW,FindFirstFileW,lstrcmpW,lstrcmpW,PathCombineW,CharLowerW,PathMatchSpecW,PathCombineW,FindNextFileW,CloseHandle,0_2_004D2980
        Source: C:\Users\user\Desktop\myTOrYevLI.exeThread delayed: delay time: 216000000Jump to behavior
        Source: C:\Users\user\Desktop\myTOrYevLI.exeThread delayed: delay time: 216000000Jump to behavior

        Anti Debugging

        barindex
        Source: C:\Users\user\Desktop\myTOrYevLI.exeProcess Stats: CPU usage > 42% for more than 60s
        Source: C:\Users\user\Desktop\myTOrYevLI.exeCode function: 0_2_004D3418 IsDebuggerPresent,_crt_debugger_hook,SetUnhandledExceptionFilter,UnhandledExceptionFilter,_crt_debugger_hook,GetCurrentProcess,TerminateProcess,0_2_004D3418
        Source: C:\Users\user\Desktop\myTOrYevLI.exeCode function: 0_2_004D1DC0 mov eax, dword ptr fs:[00000030h]0_2_004D1DC0
        Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
        Source: C:\Users\user\Desktop\myTOrYevLI.exeCode function: 0_2_004D301D SetUnhandledExceptionFilter,0_2_004D301D
        Source: C:\Users\user\Desktop\myTOrYevLI.exeCode function: 0_2_004D3418 IsDebuggerPresent,_crt_debugger_hook,SetUnhandledExceptionFilter,UnhandledExceptionFilter,_crt_debugger_hook,GetCurrentProcess,TerminateProcess,0_2_004D3418
        Source: C:\Users\user\Desktop\myTOrYevLI.exeCode function: 0_2_004D3348 GetSystemTimeAsFileTime,GetCurrentProcessId,GetCurrentThreadId,GetTickCount,QueryPerformanceCounter,0_2_004D3348

        Remote Access Functionality

        barindex
        Source: Yara matchFile source: myTOrYevLI.exe, type: SAMPLE
        Source: Yara matchFile source: 0.2.myTOrYevLI.exe.4d0000.0.unpack, type: UNPACKEDPE
        Source: Yara matchFile source: 0.0.myTOrYevLI.exe.4d0000.0.unpack, type: UNPACKEDPE
        ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
        Gather Victim Identity InformationAcquire InfrastructureValid Accounts2
        Command and Scripting Interpreter
        1
        DLL Side-Loading
        1
        DLL Side-Loading
        1
        Masquerading
        11
        Input Capture
        1
        System Time Discovery
        Remote Services11
        Input Capture
        Data ObfuscationExfiltration Over Other Network MediumAbuse Accessibility Features
        CredentialsDomainsDefault Accounts1
        Native API
        Boot or Logon Initialization ScriptsBoot or Logon Initialization Scripts122
        Virtualization/Sandbox Evasion
        LSASS Memory21
        Security Software Discovery
        Remote Desktop ProtocolData from Removable MediaJunk DataExfiltration Over BluetoothNetwork Denial of Service
        Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
        DLL Side-Loading
        Security Account Manager122
        Virtualization/Sandbox Evasion
        SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
        Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin Hook1
        Obfuscated Files or Information
        NTDS1
        Application Window Discovery
        Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
        Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets1
        File and Directory Discovery
        SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
        Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials2
        System Information Discovery
        VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
        Hide Legend

        Legend:

        • Process
        • Signature
        • Created File
        • DNS/IP Info
        • Is Dropped
        • Is Windows Process
        • Number of created Registry Values
        • Number of created Files
        • Visual Basic
        • Delphi
        • Java
        • .Net C# or VB.NET
        • C, C++ or other language
        • Is malicious
        • Internet

        This section contains all screenshots as thumbnails, including those not shown in the slideshow.


        windows-stand
        SourceDetectionScannerLabelLink
        myTOrYevLI.exe45%ReversingLabsWin32.Ransomware.GandCrab
        SourceDetectionScannerLabelLink
        C:\ProgramData\Microsoft\ClickToRun\{9AC08E99-230B-47e8-9721-4577B7F124EA}\integrator.exe100%AviraW32/Infector.Gen
        C:\ProgramData\Package Cache\{8bdfe669-9705-4184-9368-db9ce581e0e7}\VC_redist.x64.exe100%AviraW32/Infector.Gen
        C:\Users\user\AppData\Local\Temp\chrome.exe100%AviraW32/Infector.Gen
        C:\ProgramData\Package Cache\{8bdfe669-9705-4184-9368-db9ce581e0e7}\VC_redist.x64.exe100%Joe Sandbox ML
        C:\Users\user\AppData\Local\Temp\chrome.exe100%Joe Sandbox ML
        C:\Users\user\AppData\Local\Temp\chrome.exe68%ReversingLabsWin32.Ransomware.GandCrab
        No Antivirus matches
        No Antivirus matches
        No Antivirus matches
        No contacted domains info
        NameSourceMaliciousAntivirus DetectionReputation
        http://127.0.0.1:13556/InsiderSlabBehaviorReportedBuildInsiderSlabBehaviorInsiderSlabBehaviorReporteintegrator.exe.0.drfalse
          high
          http://appsyndication.org/2006/appsynapplicationapuputil.cppupgradeexclusivetrueenclosuredigestalgorVC_redist.x64.exe.0.drfalse
            high
            No contacted IP infos
            Joe Sandbox version:41.0.0 Charoite
            Analysis ID:1581613
            Start date and time:2024-12-28 09:53:07 +01:00
            Joe Sandbox product:CloudBasic
            Overall analysis duration:0h 7m 44s
            Hypervisor based Inspection enabled:false
            Report type:full
            Cookbook file name:default.jbs
            Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
            Number of analysed new started processes analysed:5
            Number of new started drivers analysed:0
            Number of existing processes analysed:0
            Number of existing drivers analysed:0
            Number of injected processes analysed:0
            Technologies:
            • HCA enabled
            • EGA enabled
            • AMSI enabled
            Analysis Mode:default
            Sample name:myTOrYevLI.exe
            renamed because original name is a hash value
            Original Sample Name:efb0bd87d4ee615b6892fcc83b234dff.exe
            Detection:MAL
            Classification:mal84.troj.evad.winEXE@1/3@0/0
            EGA Information:
            • Successful, ratio: 100%
            HCA Information:
            • Successful, ratio: 100%
            • Number of executed functions: 8
            • Number of non-executed functions: 3
            Cookbook Comments:
            • Found application associated with file extension: .exe
            • Override analysis time to 240000 for current running targets taking high CPU consumption
            • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
            • Excluded IPs from analysis (whitelisted): 52.149.20.212, 13.107.246.63
            • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
            • Not all processes where analyzed, report is missing behavior information
            • Report size getting too big, too many NtOpenFile calls found.
            • VT rate limit hit for: myTOrYevLI.exe
            TimeTypeDescription
            03:54:04API Interceptor9762779x Sleep call for process: myTOrYevLI.exe modified
            No context
            No context
            No context
            No context
            MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
            C:\ProgramData\Package Cache\{8bdfe669-9705-4184-9368-db9ce581e0e7}\VC_redist.x64.exe626wniisYq.exeGet hashmaliciousPhorpiexBrowse
              td7aCkwbmN.exeGet hashmaliciousPhorpiexBrowse
                C:\ProgramData\Microsoft\ClickToRun\{9AC08E99-230B-47e8-9721-4577B7F124EA}\integrator.exe626wniisYq.exeGet hashmaliciousPhorpiexBrowse
                  td7aCkwbmN.exeGet hashmaliciousPhorpiexBrowse
                    Process:C:\Users\user\Desktop\myTOrYevLI.exe
                    File Type:PE32 executable (console) Intel 80386, for MS Windows
                    Category:dropped
                    Size (bytes):4436200
                    Entropy (8bit):6.567497127479377
                    Encrypted:false
                    SSDEEP:98304:3lkkCqyDEY7+o3OBvfGVY+40yajyS+9s/pL:VkkCqaE68eV+0y8E6L
                    MD5:6912BC3CB531D369558F9B55A145773B
                    SHA1:4E2397CFA959CFDF9F7FF944BC1210DAF369D42A
                    SHA-256:9D9E11B8D4849891A49FA11EBD197D970BF647640B770E6A196C13C9E006FCF4
                    SHA-512:07CDCE5B6E204FEED048D4B38550AF78C22F12ACB335FD04C4349FE9456ECC627A5CFD61813931D0C43FAEE8A397B627B9992C16ED205F8688636CD5EF1E96E1
                    Malicious:true
                    Antivirus:
                    • Antivirus: Avira, Detection: 100%
                    Joe Sandbox View:
                    • Filename: 626wniisYq.exe, Detection: malicious, Browse
                    • Filename: td7aCkwbmN.exe, Detection: malicious, Browse
                    Reputation:low
                    Preview:MZ......................@...................................(...........!..L.!This program cannot be run in DOS mode....$........:V@.[8..[8..[8.{);..[8.{)=..[8..!<..[8..!;..[8..!=..[8.\.U..[8.\.E..[8.{)<..[8.{)>..[8.{)9..[8..[9..X8..!=..[8..!1.0^8..!...[8..[...[8..!:..[8.Rich.[8.................PE..L.................".... ..*..Z........C......`+...@...........................C..............................................=......p?..............RC..N....?.....<.=.8...................P.:..... .+.@.............+......j=......................text.....*.......*................. ..`.rdata........+.......*.............@..@.data.........=.......=.............@....rsrc........p?......F?.............@..@.reloc........?......R?.............@..B.zero.........C......RC................`........................................................................................................................................................................................................................
                    Process:C:\Users\user\Desktop\myTOrYevLI.exe
                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                    Category:dropped
                    Size (bytes):654688
                    Entropy (8bit):7.191321691914505
                    Encrypted:false
                    SSDEEP:12288:enMwHskY7gjcjhVIEhqgM7bWvcsi6aVUfIyaU40vy3W/ceKSHMsiFyY6XN:4MysZgjS1hqgSC/izkfJjymk4HM5yJ
                    MD5:2E4F3FFE6E1B1ADAD701D7205CE379F1
                    SHA1:03C0310CD0F7091AC4F9CF723B27C70B32C58135
                    SHA-256:2787FB2327241FC636EDD9D712C7D880006EED5916DCF9C507684F1EC4E0A4F0
                    SHA-512:7863E30C151B55164EFC584DD9E1F82087503B414FC68462237DAE03AD330FF2F7293D655DAA65BBBF3ABBD6606928D2D2E3B93710A2305EBA19F31E48CA9070
                    Malicious:true
                    Antivirus:
                    • Antivirus: Avira, Detection: 100%
                    • Antivirus: Joe Sandbox ML, Detection: 100%
                    Joe Sandbox View:
                    • Filename: 626wniisYq.exe, Detection: malicious, Browse
                    • Filename: td7aCkwbmN.exe, Detection: malicious, Browse
                    Reputation:low
                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......c...'.u.'.u.'.u.......u.....[.u.....?.u...v.4.u...q.4.u...p...u.....".u....6.u.'.t.v.u...p.l.u....&.u.'..%.u...w.&.u.Rich'.u.........................PE..L............................v.......p............@..........................}...........................................................;..........(...8(...0...=.. t..T...................tt......@n..@...................$........................text.............................. ..`.rdata..............................@..@.data...@...........................@....wixburn8...........................@..@.tls................................@....gfids..............................@..@.rsrc....;.......<..................@..@.reloc...=...0...>..................@..B.zero........p.........................`................................................................................................................
                    Process:C:\Users\user\Desktop\myTOrYevLI.exe
                    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
                    Category:dropped
                    Size (bytes):144896
                    Entropy (8bit):6.793947225132544
                    Encrypted:false
                    SSDEEP:3072:PZLWfp2KkvL5kdnQrWLuzeHpl18fCtnRPF9EVnb43jaI5gr/uHrC:hgkSdQ6mCtnRPF9cCGr/uH
                    MD5:6CE46EB4C85D086F06BA00DD19B56A5C
                    SHA1:DA45E3798D2581335C770A1EB3DF5EA2B6930D39
                    SHA-256:0BA09F85F26EB3E7B08C6DAAB34D160BDCC3E0898BD67C5D57635DE8B4EC23C4
                    SHA-512:109C5E563837B9A72C0455FCC7EC7B24CFFADF1EF4DAACD4C6B8B253FF2A16D0F458105AA46AE773B3A098DAE05129DA51B18F91224837BA84D0CD28505BCE5D
                    Malicious:true
                    Antivirus:
                    • Antivirus: Avira, Detection: 100%
                    • Antivirus: Joe Sandbox ML, Detection: 100%
                    • Antivirus: ReversingLabs, Detection: 68%
                    Reputation:low
                    Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$.......r.T6...6...6...}...<...}.......}..."...............'......."...}...1...6...T.......7.....:.7...6.R.7.......7...Rich6...........PE..L......................#.....d.......`............@..........................m...............................................;..P....p.. ....................P......./..p............................/..@...............P............................text...3........................... ..`.rdata...c.......d..................@..@.data........P.......2..............@....rsrc... ....p.......<..............@..@.reloc.......P......................@..B.zero........`.......&.................`................................................................................................................................................................................................................................................................
                    File type:PE32 executable (GUI) Intel 80386, for MS Windows
                    Entropy (8bit):5.878403133290268
                    TrID:
                    • Win32 Executable (generic) a (10002005/4) 99.96%
                    • Generic Win/DOS Executable (2004/3) 0.02%
                    • DOS Executable Generic (2002/1) 0.02%
                    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
                    File name:myTOrYevLI.exe
                    File size:20'992 bytes
                    MD5:efb0bd87d4ee615b6892fcc83b234dff
                    SHA1:894a45c84d5a50db8d79653981d04cb4df7cc29c
                    SHA256:1753c4e6332371b1a699ee865fa5496ca47b706cb41193d199a01eaadb955e4d
                    SHA512:d8af2a2f3f7506941de013864942dfb473c3a93659ccb95a06bbd13be803af91ad0661d7e87592422bdf854424cfb6afad11609088a987a27247d881b931ac67
                    SSDEEP:384:I+0WLc01PhLACdSUk3/ibYTJ4JVB00tySVRe:n5PhUCIUPYAvtg
                    TLSH:4A921907A956939BE8B2287053B32E25647A7E32231D84CFEF8009791674DD4BB3735A
                    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........2H..S&..S&..S&..+...S&..+...S&..+...S&...]..S&..S'..S&..+...S&..+...S&.Rich.S&.................PE..L.....og.................&.
                    Icon Hash:90cececece8e8eb0
                    Entrypoint:0x402fd1
                    Entrypoint Section:.text
                    Digitally signed:false
                    Imagebase:0x400000
                    Subsystem:windows gui
                    Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE
                    DLL Characteristics:DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
                    Time Stamp:0x676F03F8 [Fri Dec 27 19:46:00 2024 UTC]
                    TLS Callbacks:
                    CLR (.Net) Version:
                    OS Version Major:5
                    OS Version Minor:0
                    File Version Major:5
                    File Version Minor:0
                    Subsystem Version Major:5
                    Subsystem Version Minor:0
                    Import Hash:26d721f1fff47d0e5f11f2aba744001c
                    Instruction
                    call 00007F61107D4C27h
                    jmp 00007F61107D45EBh
                    mov edi, edi
                    push ebp
                    mov ebp, esp
                    mov eax, dword ptr [ebp+08h]
                    mov eax, dword ptr [eax]
                    cmp dword ptr [eax], E06D7363h
                    jne 00007F61107D48DCh
                    cmp dword ptr [eax+10h], 03h
                    jne 00007F61107D48D6h
                    mov eax, dword ptr [eax+14h]
                    cmp eax, 19930520h
                    je 00007F61107D48C7h
                    cmp eax, 19930521h
                    je 00007F61107D48C0h
                    cmp eax, 19930522h
                    je 00007F61107D48B9h
                    cmp eax, 01994000h
                    jne 00007F61107D48B7h
                    call 00007F61107D4C7Ch
                    xor eax, eax
                    pop ebp
                    retn 0004h
                    push 00402FDBh
                    call dword ptr [00404034h]
                    xor eax, eax
                    ret
                    int3
                    jmp dword ptr [0040410Ch]
                    push 00000014h
                    push 00405500h
                    call 00007F61107D4B13h
                    push dword ptr [00406384h]
                    mov esi, dword ptr [004040B4h]
                    call esi
                    pop ecx
                    mov dword ptr [ebp-1Ch], eax
                    cmp eax, FFFFFFFFh
                    jne 00007F61107D48BEh
                    push dword ptr [ebp+08h]
                    call dword ptr [004040B8h]
                    pop ecx
                    jmp 00007F61107D4919h
                    push 00000008h
                    call 00007F61107D4C3Dh
                    pop ecx
                    and dword ptr [ebp-04h], 00000000h
                    push dword ptr [00406384h]
                    call esi
                    mov dword ptr [ebp-1Ch], eax
                    push dword ptr [00406380h]
                    call esi
                    pop ecx
                    pop ecx
                    mov dword ptr [ebp-20h], eax
                    lea eax, dword ptr [ebp-20h]
                    push eax
                    lea eax, dword ptr [ebp-1Ch]
                    push eax
                    push dword ptr [ebp+08h]
                    mov esi, dword ptr [004040D0h]
                    call esi
                    Programming Language:
                    • [IMP] VS2008 SP1 build 30729
                    • [ASM] VS2008 SP1 build 30729
                    • [ C ] VS2008 SP1 build 30729
                    • [IMP] VS2005 build 50727
                    • [C++] VS2008 SP1 build 30729
                    • [LNK] VS2008 SP1 build 30729
                    NameVirtual AddressVirtual Size Is in Section
                    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IMPORT0x553c0x78.rdata
                    IMAGE_DIRECTORY_ENTRY_RESOURCE0x70000x2b0.rsrc
                    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
                    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
                    IMAGE_DIRECTORY_ENTRY_BASERELOC0x80000x204.reloc
                    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
                    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
                    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
                    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
                    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x54780x40.rdata
                    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_IAT0x40000x140.rdata
                    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
                    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
                    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
                    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
                    .text0x10000x25240x2600868d9060769699de804fdd0fb9af69cdFalse0.5326891447368421data6.131895732766902IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                    .rdata0x40000x1c140x1e00575ce771da16de5c302d6458c607c5ebFalse0.43580729166666665data5.298022051582786IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    .data0x60000x38c0x200202a0f14ba4a024e6a35d5895669b769False0.060546875data0.35275948821577235IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
                    .rsrc0x70000x2b00x40058a3970c5ba6bee8bcaf23ee7343f378False0.3623046875data5.190213072505898IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
                    .reloc0x80000x2880x400695b2e74cc6b6d6233b7005b7ca7b3f4False0.5data3.9846074464309296IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
                    NameRVASizeTypeLanguageCountryZLIB Complexity
                    RT_MANIFEST0x70580x256ASCII text, with CRLF line terminatorsEnglishUnited States0.5100334448160535
                    DLLImport
                    SHLWAPI.dllPathFileExistsW, StrCmpNW, PathCombineW, PathMatchSpecW
                    MSVCR90.dll_crt_debugger_hook, _controlfp_s, _invoke_watson, _except_handler4_common, _decode_pointer, _onexit, _lock, __dllonexit, _unlock, ?terminate@@YAXXZ, __set_app_type, _encode_pointer, __p__fmode, __p__commode, _adjust_fdiv, __setusermatherr, _configthreadlocale, _initterm_e, _initterm, _acmdln, exit, _ismbblead, _XcptFilter, _exit, _cexit, __getmainargs, _amsg_exit, wcsstr, memset, memcpy, wcscat
                    KERNEL32.dllIsDebuggerPresent, UnhandledExceptionFilter, GetCurrentProcess, TerminateProcess, GetSystemTimeAsFileTime, GetCurrentProcessId, GetCurrentThreadId, GetTickCount, QueryPerformanceCounter, SetUnhandledExceptionFilter, GetStartupInfoA, InterlockedCompareExchange, InterlockedExchange, ExitThread, FindFirstFileW, lstrcmpW, FindNextFileW, GetLogicalDrives, GetDriveTypeW, QueryDosDeviceW, lstrcpyW, GetFileSize, CreateFileMappingA, MapViewOfFile, FlushViewOfFile, UnmapViewOfFile, SetFilePointer, SetEndOfFile, Sleep, CreateMutexA, GetLastError, ExitProcess, CloseHandle, CreateFileW, ExpandEnvironmentStringsW, CreateThread
                    USER32.dllCharLowerW
                    ADVAPI32.dllRegOpenKeyExW, RegQueryValueExW, RegCloseKey
                    Language of compilation systemCountry where language is spokenMap
                    EnglishUnited States
                    No network behavior found

                    Click to jump to process

                    Click to jump to process

                    Click to dive into process behavior distribution

                    Target ID:0
                    Start time:03:53:57
                    Start date:28/12/2024
                    Path:C:\Users\user\Desktop\myTOrYevLI.exe
                    Wow64 process (32bit):true
                    Commandline:"C:\Users\user\Desktop\myTOrYevLI.exe"
                    Imagebase:0x4d0000
                    File size:20'992 bytes
                    MD5 hash:EFB0BD87D4EE615B6892FCC83B234DFF
                    Has elevated privileges:true
                    Has administrator privileges:true
                    Programmed in:C, C++ or other language
                    Reputation:low
                    Has exited:false

                    Reset < >

                      Execution Graph

                      Execution Coverage:21.1%
                      Dynamic/Decrypted Code Coverage:0%
                      Signature Coverage:21.3%
                      Total number of Nodes:136
                      Total number of Limit Nodes:3
                      execution_graph 657 4d301d SetUnhandledExceptionFilter 658 4d2e9f 659 4d2eba 658->659 660 4d2eb3 _exit 658->660 661 4d2ec3 _cexit 659->661 662 4d2ec9 __onexit 659->662 660->659 661->662 663 4d3418 IsDebuggerPresent _crt_debugger_hook SetUnhandledExceptionFilter UnhandledExceptionFilter 664 4d350a GetCurrentProcess TerminateProcess 663->664 665 4d3502 _crt_debugger_hook 663->665 665->664 639 4d2ccb 644 4d30d7 639->644 642 4d2d08 _amsg_exit 643 4d2d10 642->643 647 4d3032 644->647 646 4d2cd0 __getmainargs 646->642 646->643 654 4d329c 647->654 649 4d303e _decode_pointer 650 4d3055 _onexit 649->650 651 4d3061 7 API calls 649->651 652 4d30c5 __onexit 650->652 655 4d30ce _unlock 651->655 652->646 654->649 655->652 656 4d2e8b _XcptFilter 666 4d2fdb 667 4d3017 666->667 669 4d2fed 666->669 668 4d3012 ?terminate@ 668->667 669->667 669->668 670 4d32f5 _except_handler4_common 536 4d2d11 557 4d329c 536->557 538 4d2d1d GetStartupInfoA 539 4d2d4b InterlockedCompareExchange 538->539 540 4d2d59 539->540 541 4d2d5d 539->541 540->541 542 4d2d64 Sleep 540->542 543 4d2d7d _amsg_exit 541->543 544 4d2d87 541->544 542->539 545 4d2db0 543->545 544->545 546 4d2d90 _initterm_e 544->546 548 4d2dbf _initterm 545->548 549 4d2dda 545->549 546->545 547 4d2dab __onexit 546->547 548->549 550 4d2dde InterlockedExchange 549->550 551 4d2de6 __IsNonwritableInCurrentImage 549->551 550->551 552 4d2e75 _ismbblead 551->552 553 4d2eba 551->553 556 4d2e5f exit 551->556 558 4d1090 Sleep CreateMutexA GetLastError 551->558 552->551 553->547 554 4d2ec3 _cexit 553->554 554->547 556->551 557->538 559 4d10be ExitProcess 558->559 560 4d10c6 558->560 566 4d1000 ExpandEnvironmentStringsW wcscat PathFileExistsW 560->566 563 4d10dd CreateThread 565 4d10f2 Sleep 563->565 570 4d2c40 563->570 564 4d10d2 Sleep 564->563 565->565 567 4d104b CreateFileW 566->567 568 4d1045 566->568 567->568 569 4d1076 CloseHandle 567->569 568->563 568->564 569->568 576 4d28c0 GetLogicalDrives 570->576 572 4d2c9f ExitThread 574 4d2c4b 574->572 582 4d27e0 574->582 588 4d2980 memset memset PathCombineW FindFirstFileW 574->588 580 4d28ed 576->580 577 4d28fc RegOpenKeyExW 579 4d291e RegQueryValueExW 577->579 577->580 578 4d2966 578->574 579->580 581 4d295a RegCloseKey 579->581 580->577 580->578 580->581 581->580 583 4d27fc 582->583 584 4d2839 582->584 602 4d2840 GetDriveTypeW 583->602 584->574 587 4d282b lstrcpyW 587->584 589 4d2c01 CloseHandle 588->589 598 4d2a4d 588->598 589->574 590 4d2a58 lstrcmpW 592 4d2a6e lstrcmpW 590->592 590->598 591 4d2ab0 CharLowerW 591->598 593 4d2a84 PathCombineW 592->593 592->598 595 4d2980 18 API calls 593->595 594 4d2be5 FindNextFileW 594->589 594->598 595->598 596 4d2c20 wcsstr 596->598 597 4d2b2c PathMatchSpecW 597->594 599 4d2b46 PathCombineW 597->599 598->590 598->591 598->594 598->596 598->597 608 4d24e0 CreateFileW 598->608 607 4d2c20 wcsstr 599->607 603 4d2868 602->603 604 4d281f 602->604 603->604 605 4d287c QueryDosDeviceW 603->605 604->584 604->587 605->604 606 4d2896 StrCmpNW 605->606 606->604 607->598 609 4d250b 608->609 610 4d2512 GetFileSize 608->610 609->598 610->609 611 4d252e CreateFileMappingA 610->611 613 4d2599 MapViewOfFile 611->613 614 4d2588 CloseHandle 611->614 615 4d25b7 CloseHandle CloseHandle 613->615 617 4d25d2 613->617 614->609 615->609 618 4d2639 617->618 620 4d2656 617->620 624 4d25e5 6 API calls 617->624 625 4d2120 618->625 620->624 631 4d2280 620->631 623 4d2711 memcpy 623->624 624->609 626 4d214e 625->626 630 4d2213 625->630 626->630 635 4d1ec0 626->635 629 4d21ec memcpy 629->630 630->624 632 4d229a 631->632 633 4d22a1 631->633 632->623 632->624 633->632 634 4d2457 memcpy 633->634 634->632 636 4d1eda 635->636 637 4d1ee1 635->637 636->629 636->630 637->636 638 4d2097 memcpy 637->638 638->636 671 4d2fd1 674 4d3348 671->674 673 4d2fd6 673->673 675 4d336d 674->675 676 4d337a GetSystemTimeAsFileTime GetCurrentProcessId GetCurrentThreadId GetTickCount QueryPerformanceCounter 674->676 675->676 677 4d3371 675->677 676->677 677->673 678 4d2ef0 680 4d2efe __set_app_type _encode_pointer __p__fmode __p__commode 678->680 681 4d2f9d _pre_c_init __RTC_Initialize 680->681 682 4d2fab __setusermatherr 681->682 683 4d2fb7 681->683 682->683 688 4d331a _controlfp_s 683->688 686 4d2fce 687 4d2fc5 _configthreadlocale 687->686 689 4d3336 _invoke_watson 688->689 690 4d2fbc 688->690 689->690 690->686 690->687 691 4d1110 696 4d1119 691->696 693 4d112d 700 4d1dc0 GetPEB 693->700 695 4d187b 696->693 697 4d1dd0 696->697 701 4d1dc0 GetPEB 697->701 699 4d1de2 699->696 700->695 701->699

                      Callgraph

                      • Executed
                      • Not Executed
                      • Opacity -> Relevance
                      • Disassembly available
                      callgraph 0 Function_004D30CE 1 Function_004D3348 2 Function_004D2CCB 13 Function_004D30D7 2->13 3 Function_004D3345 4 Function_004D2840 5 Function_004D2C40 7 Function_004D28C0 5->7 22 Function_004D27E0 5->22 33 Function_004D2980 5->33 6 Function_004D3140 8 Function_004D1EC0 49 Function_004D18A0 8->49 9 Function_004D1DC0 10 Function_004D325B 11 Function_004D2FDB 12 Function_004D2EDB 20 Function_004D32E1 12->20 54 Function_004D3032 13->54 14 Function_004D2ED7 15 Function_004D2FD1 15->1 16 Function_004D1DD0 16->9 45 Function_004D1990 16->45 17 Function_004D31D0 17->6 35 Function_004D3180 17->35 18 Function_004D326F 19 Function_004D30EE 21 Function_004D24E0 34 Function_004D2280 21->34 48 Function_004D2120 21->48 22->4 23 Function_004D18E0 24 Function_004D1AE0 25 Function_004D10FF 26 Function_004D32F5 27 Function_004D33F6 28 Function_004D1A70 29 Function_004D2EF0 29->3 29->19 40 Function_004D331A 29->40 30 Function_004D2E8B 31 Function_004D1000 32 Function_004D1B80 32->23 32->32 50 Function_004D1A30 32->50 51 Function_004D1B30 32->51 52 Function_004D1AB0 32->52 33->21 33->33 47 Function_004D2C20 33->47 34->49 36 Function_004D301D 37 Function_004D329C 38 Function_004D2E9F 38->20 39 Function_004D3418 41 Function_004D3114 42 Function_004D2D11 42->17 42->20 42->37 44 Function_004D1090 42->44 43 Function_004D1110 43->9 43->16 43->24 43->28 43->32 43->49 44->5 44->31 46 Function_004D2CA7 48->8 52->28 52->50 53 Function_004D1EB0 54->0 54->20 54->37

                      Control-flow Graph

                      APIs
                      • memset.MSVCR90 ref: 004D29F2
                      • memset.MSVCR90 ref: 004D2A08
                      • PathCombineW.SHLWAPI(?,perflogs,004D5418), ref: 004D2A20
                      • FindFirstFileW.KERNELBASE(?,?), ref: 004D2A34
                      • lstrcmpW.KERNEL32(?,004D541C), ref: 004D2A64
                      • lstrcmpW.KERNEL32(?,004D5420), ref: 004D2A7A
                      • PathCombineW.SHLWAPI(?,perflogs,?), ref: 004D2A96
                      • CharLowerW.USER32(?), ref: 004D2ACA
                      • PathMatchSpecW.SHLWAPI(?,*.exe), ref: 004D2B38
                      • PathCombineW.SHLWAPI(?,perflogs,?), ref: 004D2B58
                      • FindNextFileW.KERNELBASE(000000FF,?), ref: 004D2BF3
                      • CloseHandle.KERNELBASE(000000FF), ref: 004D2C08
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4120844265.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                      • Associated: 00000000.00000002.4120826165.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4120859061.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4120873284.00000000004D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4d0000_myTOrYevLI.jbxd
                      Similarity
                      • API ID: Path$Combine$FileFindlstrcmpmemset$CharCloseFirstHandleLowerMatchNextSpec
                      • String ID: $SM$$recycle.bin$*.exe$0SM$@SM$DriveSec$VolDri$XSM$application data$config$default$intel$msocache$perflogs$sys$tSM$win$windows$wup$SM
                      • API String ID: 1416314416-2567783100
                      • Opcode ID: 1b061ce344f6e3f84d205381b40f98f40b43233a7d1bdad20e8d7d0d6b48aca1
                      • Instruction ID: 64318bedc5e96fcadd59958db5973c7556cfb33bf7312be333c144bab61f6860
                      • Opcode Fuzzy Hash: 1b061ce344f6e3f84d205381b40f98f40b43233a7d1bdad20e8d7d0d6b48aca1
                      • Instruction Fuzzy Hash: 706187B19002189BCF20DF60DD99BDE7774AF65705F00459BE609A6340EBF89A88CF5D

                      Control-flow Graph

                      APIs
                      • Sleep.KERNELBASE(000007D0), ref: 004D1099
                      • CreateMutexA.KERNELBASE(00000000,00000000,6436646754), ref: 004D10A8
                      • GetLastError.KERNEL32 ref: 004D10B1
                      • ExitProcess.KERNEL32 ref: 004D10C0
                      • Sleep.KERNELBASE(00001388), ref: 004D10D7
                      • CreateThread.KERNELBASE(00000000,00000000,Function_00002C40,00000000,00000000,00000000), ref: 004D10EC
                      • Sleep.KERNELBASE(0CDFE600), ref: 004D10F7
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4120844265.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                      • Associated: 00000000.00000002.4120826165.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4120859061.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4120873284.00000000004D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4d0000_myTOrYevLI.jbxd
                      Similarity
                      • API ID: Sleep$Create$ErrorExitLastMutexProcessThread
                      • String ID: 6436646754
                      • API String ID: 302559243-3290978236
                      • Opcode ID: 7b7655622f3c25b15f8af73fd0c9f1b6979f9691a34ee141dee26639332a21b0
                      • Instruction ID: bef623855fba5a96d7c2166c83f6f31601e954b717c3fde872fb35192e63da44
                      • Opcode Fuzzy Hash: 7b7655622f3c25b15f8af73fd0c9f1b6979f9691a34ee141dee26639332a21b0
                      • Instruction Fuzzy Hash: C3F01230685300F7E7223BE1AE1FF193B68AB40B12F204423F705E96E0DAF464404A2D

                      Control-flow Graph

                      APIs
                      • CreateFileW.KERNELBASE(+M,C0000000,00000003,00000000,00000003,00000080,00000000), ref: 004D24FC
                      • GetFileSize.KERNEL32(000000FF,00000000), ref: 004D2518
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4120844265.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                      • Associated: 00000000.00000002.4120826165.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4120859061.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4120873284.00000000004D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4d0000_myTOrYevLI.jbxd
                      Similarity
                      • API ID: File$CreateSize
                      • String ID: .zero$+M$+M
                      • API String ID: 2791376181-4133060555
                      • Opcode ID: f2198f0e8ba2204c55b0eaa2421a1c7ec5fd172bb800718f06ee6aa08fa11e70
                      • Instruction ID: c53d1b4a317cfb4a6aff5898e225b5c517f7b026436343d54e98df232e369d6c
                      • Opcode Fuzzy Hash: f2198f0e8ba2204c55b0eaa2421a1c7ec5fd172bb800718f06ee6aa08fa11e70
                      • Instruction Fuzzy Hash: EFA11E74E00209EFCB14CFA4D9A5BEEB7B1BF58700F20815AE6117B390D778A941DB68

                      Control-flow Graph

                      APIs
                      • ExpandEnvironmentStringsW.KERNEL32(%appdata%,?,00000208), ref: 004D101A
                      • wcscat.MSVCR90 ref: 004D102C
                      • PathFileExistsW.KERNELBASE(?), ref: 004D103B
                      • CreateFileW.KERNELBASE(?,40000000,00000000,00000000,00000001,00000002,00000000), ref: 004D1061
                      • CloseHandle.KERNELBASE(000000FF), ref: 004D107D
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4120844265.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                      • Associated: 00000000.00000002.4120826165.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4120859061.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4120873284.00000000004D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4d0000_myTOrYevLI.jbxd
                      Similarity
                      • API ID: File$CloseCreateEnvironmentExistsExpandHandlePathStringswcscat
                      • String ID: %appdata%$\windrx.txt
                      • API String ID: 3951416151-532699497
                      • Opcode ID: f01110a7353d72c234ff6efa96e71dfc763d4213a79207adc99e28a717817259
                      • Instruction ID: 33f118a6802b15cdd156b0a56e3322bdd6e5bc0f6124118cfaa641e5a3d5ae66
                      • Opcode Fuzzy Hash: f01110a7353d72c234ff6efa96e71dfc763d4213a79207adc99e28a717817259
                      • Instruction Fuzzy Hash: DB01F97490031477DB30AB609C0EFDA33385745700F1003A7B768A52D2DA7859C58F94

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 91 4d28c0-4d28eb GetLogicalDrives 92 4d28f6-4d28fa 91->92 93 4d28fc-4d291c RegOpenKeyExW 92->93 94 4d2966-4d2971 92->94 95 4d291e-4d2949 RegQueryValueExW 93->95 96 4d2964 93->96 98 4d294b-4d294f 95->98 99 4d295a-4d295e RegCloseKey 95->99 96->92 98->99 100 4d2951-4d2957 98->100 99->96 100->99
                      APIs
                      • GetLogicalDrives.KERNELBASE ref: 004D28C6
                      • RegOpenKeyExW.KERNELBASE(80000002,Software\Microsoft\Windows\CurrentVersion\Policies\Explorer,00000000,00020019,?), ref: 004D2914
                      • RegQueryValueExW.KERNELBASE(?,NoDrives,00000000,00000000,00000000,00000004), ref: 004D2941
                      • RegCloseKey.KERNELBASE(?), ref: 004D295E
                      Strings
                      • NoDrives, xrefs: 004D2938
                      • Software\Microsoft\Windows\CurrentVersion\Policies\Explorer, xrefs: 004D2907
                      Memory Dump Source
                      • Source File: 00000000.00000002.4120844265.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                      • Associated: 00000000.00000002.4120826165.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4120859061.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4120873284.00000000004D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4d0000_myTOrYevLI.jbxd
                      Similarity
                      • API ID: CloseDrivesLogicalOpenQueryValue
                      • String ID: NoDrives$Software\Microsoft\Windows\CurrentVersion\Policies\Explorer
                      • API String ID: 2666887985-3471754645
                      • Opcode ID: 2a10fbd0a95f285012950181298e26e60aff3e213762dbe0389558cfa82754e1
                      • Instruction ID: 60e4dde68b6ee56ab6ec137a09b87d0cdafad3892942dbb688d3dd0a6725fa1c
                      • Opcode Fuzzy Hash: 2a10fbd0a95f285012950181298e26e60aff3e213762dbe0389558cfa82754e1
                      • Instruction Fuzzy Hash: 031129B0E0020A9BDB10CFD0C959BEEBBB4FB44305F10815AE611B7280D7B86A45CF99

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 101 4d2840-4d2866 GetDriveTypeW 102 4d2868-4d286f 101->102 103 4d28b5-4d28bb 101->103 104 4d287c-4d2894 QueryDosDeviceW 102->104 105 4d2871-4d2878 102->105 104->103 107 4d2896-4d28ac StrCmpNW 104->107 105->104 106 4d287a 105->106 106->103 107->103 108 4d28ae 107->108 108->103
                      APIs
                      • GetDriveTypeW.KERNELBASE(004D281F), ref: 004D284D
                      • QueryDosDeviceW.KERNELBASE(004D281F,?,00000208), ref: 004D288C
                      • StrCmpNW.KERNELBASE(?,\??\,00000004), ref: 004D28A4
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4120844265.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                      • Associated: 00000000.00000002.4120826165.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4120859061.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4120873284.00000000004D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4d0000_myTOrYevLI.jbxd
                      Similarity
                      • API ID: DeviceDriveQueryType
                      • String ID: \??\
                      • API String ID: 1681518211-3047946824
                      • Opcode ID: b5ff9a50623452d478e5a4fab8e335d1d138704bd496b0dd19bfaa50c5a0ee00
                      • Instruction ID: 3780458d6e363b462b14d9c8637beff96a244e7daee75a0ca9ebcde69ad9e693
                      • Opcode Fuzzy Hash: b5ff9a50623452d478e5a4fab8e335d1d138704bd496b0dd19bfaa50c5a0ee00
                      • Instruction Fuzzy Hash: FB01FFB094020CEBDB20DF65CD59AD977B4AB58705F0082ABEA04A7340D6789AC9DF9C

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 109 4d2c40-4d2c55 call 4d28c0 112 4d2c60-4d2c64 109->112 113 4d2c9f-4d2ca1 ExitThread 112->113 114 4d2c66-4d2c87 call 4d27e0 112->114 117 4d2c9d 114->117 118 4d2c89-4d2c8d 114->118 117->112 119 4d2c8f 118->119 120 4d2c91-4d2c95 call 4d2980 118->120 119->117 123 4d2c9a 120->123 123->117
                      APIs
                        • Part of subcall function 004D28C0: GetLogicalDrives.KERNELBASE ref: 004D28C6
                        • Part of subcall function 004D28C0: RegOpenKeyExW.KERNELBASE(80000002,Software\Microsoft\Windows\CurrentVersion\Policies\Explorer,00000000,00020019,?), ref: 004D2914
                        • Part of subcall function 004D28C0: RegQueryValueExW.KERNELBASE(?,NoDrives,00000000,00000000,00000000,00000004), ref: 004D2941
                        • Part of subcall function 004D28C0: RegCloseKey.KERNELBASE(?), ref: 004D295E
                      • ExitThread.KERNEL32 ref: 004D2CA1
                        • Part of subcall function 004D27E0: lstrcpyW.KERNEL32(?,?,?,?,00000019), ref: 004D2833
                        • Part of subcall function 004D2980: memset.MSVCR90 ref: 004D29F2
                        • Part of subcall function 004D2980: memset.MSVCR90 ref: 004D2A08
                        • Part of subcall function 004D2980: PathCombineW.SHLWAPI(?,perflogs,004D5418), ref: 004D2A20
                        • Part of subcall function 004D2980: FindFirstFileW.KERNELBASE(?,?), ref: 004D2A34
                        • Part of subcall function 004D2980: lstrcmpW.KERNEL32(?,004D541C), ref: 004D2A64
                        • Part of subcall function 004D2980: lstrcmpW.KERNEL32(?,004D5420), ref: 004D2A7A
                        • Part of subcall function 004D2980: PathCombineW.SHLWAPI(?,perflogs,?), ref: 004D2A96
                        • Part of subcall function 004D2980: FindNextFileW.KERNELBASE(000000FF,?), ref: 004D2BF3
                        • Part of subcall function 004D2980: CloseHandle.KERNELBASE(000000FF), ref: 004D2C08
                      Memory Dump Source
                      • Source File: 00000000.00000002.4120844265.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                      • Associated: 00000000.00000002.4120826165.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4120859061.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4120873284.00000000004D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4d0000_myTOrYevLI.jbxd
                      Similarity
                      • API ID: CloseCombineFileFindPathlstrcmpmemset$DrivesExitFirstHandleLogicalNextOpenQueryThreadValuelstrcpy
                      • String ID:
                      • API String ID: 717983626-0
                      • Opcode ID: d3b3a817ec8d8d2453e7838672fc796880fbf116dcb2bb469f6c1ad29e226077
                      • Instruction ID: f8fd05d66f89af91306c70f66b510bd2484ae6625818ba3af766a161286cc17a
                      • Opcode Fuzzy Hash: d3b3a817ec8d8d2453e7838672fc796880fbf116dcb2bb469f6c1ad29e226077
                      • Instruction Fuzzy Hash: 160181B4D14208EBCB00EFD4CA569DEB7B0BF59705F1040ABD50173301E2B99E44DB6A

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 124 4d27e0-4d27fa 125 4d27fc-4d281a call 4d2840 124->125 126 4d2839-4d283f 124->126 128 4d281f-4d2829 125->128 128->126 129 4d282b-4d2833 lstrcpyW 128->129 129->126
                      APIs
                        • Part of subcall function 004D2840: GetDriveTypeW.KERNELBASE(004D281F), ref: 004D284D
                      • lstrcpyW.KERNEL32(?,?,?,?,00000019), ref: 004D2833
                      Memory Dump Source
                      • Source File: 00000000.00000002.4120844265.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                      • Associated: 00000000.00000002.4120826165.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4120859061.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4120873284.00000000004D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4d0000_myTOrYevLI.jbxd
                      Similarity
                      • API ID: DriveTypelstrcpy
                      • String ID:
                      • API String ID: 3664088370-0
                      • Opcode ID: 8b6582825f11003521376742a890b6486abff9de21fd3d2bb92a227ceb78056d
                      • Instruction ID: 6f7921a6e271c9081dc590218c99ce95a51a824af88edc7b52824568a991fb20
                      • Opcode Fuzzy Hash: 8b6582825f11003521376742a890b6486abff9de21fd3d2bb92a227ceb78056d
                      • Instruction Fuzzy Hash: 46F06D71D00248FBDB00EFA4D55579EB7B4EF44304F00C1AAE8159B340E279AB09DB49
                      APIs
                      • SetUnhandledExceptionFilter.KERNEL32(Function_00002FDB), ref: 004D3022
                      Memory Dump Source
                      • Source File: 00000000.00000002.4120844265.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                      • Associated: 00000000.00000002.4120826165.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4120859061.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4120873284.00000000004D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4d0000_myTOrYevLI.jbxd
                      Similarity
                      • API ID: ExceptionFilterUnhandled
                      • String ID:
                      • API String ID: 3192549508-0
                      • Opcode ID: 1395367fa4ebc113d030f80c36929a58cea6698d172fb90aa52cecbb1bdd34e2
                      • Instruction ID: 740aa89d895485acfa4d95e21b737b2a1d9b3c622baab8e29c0755a942b0f143
                      • Opcode Fuzzy Hash: 1395367fa4ebc113d030f80c36929a58cea6698d172fb90aa52cecbb1bdd34e2
                      • Instruction Fuzzy Hash: 4C900270253100474B011B709E1D6052AF05BA87527520867E201E8154DAA441406559
                      Memory Dump Source
                      • Source File: 00000000.00000002.4120844265.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                      • Associated: 00000000.00000002.4120826165.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4120859061.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4120873284.00000000004D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4d0000_myTOrYevLI.jbxd
                      Similarity
                      • API ID:
                      • String ID:
                      • API String ID:
                      • Opcode ID: a4738e9d22b7a670e957569a9947fd17b9771784ab9a70797d5a1e1428e800be
                      • Instruction ID: be7eecee3400b42b3e558a840de4aeb97e4223185f45bdd8b65d759b642826a8
                      • Opcode Fuzzy Hash: a4738e9d22b7a670e957569a9947fd17b9771784ab9a70797d5a1e1428e800be
                      • Instruction Fuzzy Hash: 85A002321A5B8CC7C612A68DA651B51B3ECE348D54F440461A50D43E015659B9108495

                      Control-flow Graph

                      • Executed
                      • Not Executed
                      control_flow_graph 180 4d2120-4d2148 181 4d214e-4d2188 180->181 182 4d2278-4d227e 180->182 183 4d219e-4d21a1 181->183 184 4d218a-4d219c 181->184 185 4d21a4-4d21c2 183->185 184->185 185->182 186 4d21c8-4d21e6 call 4d1ec0 185->186 189 4d21ec-4d2210 memcpy 186->189 190 4d226e-4d2271 186->190 191 4d2213-4d221a 189->191 190->182 192 4d221c-4d222b 191->192 193 4d2256-4d226b 191->193 194 4d222d-4d2237 192->194 195 4d224b-4d2254 192->195 193->190 194->195 196 4d2239-4d2249 194->196 195->191 196->193
                      APIs
                      • memcpy.MSVCR90(?,004D4198,000010D0,00000000,.zero,000010D0,60000000), ref: 004D220B
                      Strings
                      Memory Dump Source
                      • Source File: 00000000.00000002.4120844265.00000000004D1000.00000020.00000001.01000000.00000003.sdmp, Offset: 004D0000, based on PE: true
                      • Associated: 00000000.00000002.4120826165.00000000004D0000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4120859061.00000000004D4000.00000002.00000001.01000000.00000003.sdmpDownload File
                      • Associated: 00000000.00000002.4120873284.00000000004D7000.00000002.00000001.01000000.00000003.sdmpDownload File
                      Joe Sandbox IDA Plugin
                      • Snapshot File: hcaresult_0_2_4d0000_myTOrYevLI.jbxd
                      Similarity
                      • API ID: memcpy
                      • String ID: .zero$F&M$F&M
                      • API String ID: 3510742995-1676765398
                      • Opcode ID: 187ab56c328f634aed32698944b4ea408994909bf5441b0a0dedcc87721ae4c8
                      • Instruction ID: a26b5b105e074d5d66ab26f6e3759c27bb1d3d89424a6d3d515d265b9e3906fb
                      • Opcode Fuzzy Hash: 187ab56c328f634aed32698944b4ea408994909bf5441b0a0dedcc87721ae4c8
                      • Instruction Fuzzy Hash: A551DA74D0010ADFCB04CF98C590AEEBBB1FF98314F24815AE815AB355D775A942CFA5