Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
l3v0.exe

Overview

General Information

Sample name:l3v0.exe
Analysis ID:1583741
MD5:bce921da7e4ed6138b0d5cb30952a855
SHA1:b27ea9e52e550ea081da249925af52f0c92f420e
SHA256:6def8cb28331b9b23f7c2601fc55efe8008a4d88c04286b48db42b673c0ab8e8
Tags:exemalwaretrojanuser-Joker
Infos:

Detection

Score:56
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
AI detected suspicious sample
Machine Learning detection for sample
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Detected TCP or UDP traffic on non-standard ports
Detected non-DNS traffic on DNS port
May sleep (evasive loops) to hinder dynamic analysis
Tries to resolve domain names, but no domain seems valid (expired dropper behavior)

Classification

  • System is w10x64
  • l3v0.exe (PID: 824 cmdline: "C:\Users\user\Desktop\l3v0.exe" MD5: BCE921DA7E4ED6138B0D5CB30952A855)
    • conhost.exe (PID: 1740 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Suricata rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: l3v0.exeVirustotal: Detection: 27%Perma Link
Source: l3v0.exeReversingLabs: Detection: 13%
Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
Source: l3v0.exeJoe Sandbox ML: detected
Source: l3v0.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: Binary string: C:\Users\admin\Desktop\Hak.babi\Payload\C++\l3v0\x64\Release\l3v0.pdb source: l3v0.exe
Source: global trafficTCP traffic: 192.168.2.4:49730 -> 3.107.255.174:4953
Source: global trafficTCP traffic: 192.168.2.4:53573 -> 162.159.36.2:53
Source: unknownDNS traffic detected: query: 198.187.3.20.in-addr.arpa replaycode: Name error (3)
Source: unknownTCP traffic detected without corresponding DNS query: 3.107.255.174
Source: unknownTCP traffic detected without corresponding DNS query: 3.107.255.174
Source: unknownTCP traffic detected without corresponding DNS query: 3.107.255.174
Source: unknownTCP traffic detected without corresponding DNS query: 3.107.255.174
Source: unknownTCP traffic detected without corresponding DNS query: 3.107.255.174
Source: unknownTCP traffic detected without corresponding DNS query: 3.107.255.174
Source: unknownTCP traffic detected without corresponding DNS query: 3.107.255.174
Source: unknownTCP traffic detected without corresponding DNS query: 3.107.255.174
Source: unknownTCP traffic detected without corresponding DNS query: 3.107.255.174
Source: unknownTCP traffic detected without corresponding DNS query: 3.107.255.174
Source: unknownTCP traffic detected without corresponding DNS query: 3.107.255.174
Source: unknownTCP traffic detected without corresponding DNS query: 3.107.255.174
Source: unknownTCP traffic detected without corresponding DNS query: 3.107.255.174
Source: unknownTCP traffic detected without corresponding DNS query: 3.107.255.174
Source: unknownTCP traffic detected without corresponding DNS query: 3.107.255.174
Source: unknownTCP traffic detected without corresponding DNS query: 3.107.255.174
Source: unknownTCP traffic detected without corresponding DNS query: 3.107.255.174
Source: unknownTCP traffic detected without corresponding DNS query: 3.107.255.174
Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
Source: unknownTCP traffic detected without corresponding DNS query: 162.159.36.2
Source: unknownTCP traffic detected without corresponding DNS query: 3.107.255.174
Source: unknownTCP traffic detected without corresponding DNS query: 3.107.255.174
Source: unknownTCP traffic detected without corresponding DNS query: 3.107.255.174
Source: unknownTCP traffic detected without corresponding DNS query: 3.107.255.174
Source: unknownTCP traffic detected without corresponding DNS query: 3.107.255.174
Source: unknownTCP traffic detected without corresponding DNS query: 3.107.255.174
Source: unknownTCP traffic detected without corresponding DNS query: 3.107.255.174
Source: unknownTCP traffic detected without corresponding DNS query: 3.107.255.174
Source: unknownTCP traffic detected without corresponding DNS query: 3.107.255.174
Source: unknownTCP traffic detected without corresponding DNS query: 3.107.255.174
Source: unknownTCP traffic detected without corresponding DNS query: 3.107.255.174
Source: unknownTCP traffic detected without corresponding DNS query: 3.107.255.174
Source: unknownTCP traffic detected without corresponding DNS query: 3.107.255.174
Source: unknownTCP traffic detected without corresponding DNS query: 3.107.255.174
Source: unknownTCP traffic detected without corresponding DNS query: 3.107.255.174
Source: unknownTCP traffic detected without corresponding DNS query: 3.107.255.174
Source: unknownTCP traffic detected without corresponding DNS query: 3.107.255.174
Source: unknownTCP traffic detected without corresponding DNS query: 3.107.255.174
Source: unknownTCP traffic detected without corresponding DNS query: 3.107.255.174
Source: unknownTCP traffic detected without corresponding DNS query: 3.107.255.174
Source: unknownTCP traffic detected without corresponding DNS query: 3.107.255.174
Source: unknownTCP traffic detected without corresponding DNS query: 3.107.255.174
Source: unknownTCP traffic detected without corresponding DNS query: 3.107.255.174
Source: unknownTCP traffic detected without corresponding DNS query: 3.107.255.174
Source: unknownTCP traffic detected without corresponding DNS query: 3.107.255.174
Source: unknownTCP traffic detected without corresponding DNS query: 3.107.255.174
Source: unknownTCP traffic detected without corresponding DNS query: 3.107.255.174
Source: unknownTCP traffic detected without corresponding DNS query: 3.107.255.174
Source: global trafficDNS traffic detected: DNS query: 198.187.3.20.in-addr.arpa
Source: classification engineClassification label: mal56.winEXE@2/0@1/1
Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:1740:120:WilError_03
Source: l3v0.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Users\user\Desktop\l3v0.exeKey opened: HKEY_LOCAL_MACHINE\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: l3v0.exeVirustotal: Detection: 27%
Source: l3v0.exeReversingLabs: Detection: 13%
Source: unknownProcess created: C:\Users\user\Desktop\l3v0.exe "C:\Users\user\Desktop\l3v0.exe"
Source: C:\Users\user\Desktop\l3v0.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
Source: C:\Users\user\Desktop\l3v0.exeSection loaded: apphelp.dllJump to behavior
Source: C:\Users\user\Desktop\l3v0.exeSection loaded: vcruntime140.dllJump to behavior
Source: C:\Users\user\Desktop\l3v0.exeSection loaded: mswsock.dllJump to behavior
Source: l3v0.exeStatic PE information: Image base 0x140000000 > 0x60000000
Source: l3v0.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
Source: l3v0.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
Source: l3v0.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
Source: l3v0.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: l3v0.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
Source: l3v0.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
Source: l3v0.exeStatic PE information: HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
Source: l3v0.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: Binary string: C:\Users\admin\Desktop\Hak.babi\Payload\C++\l3v0\x64\Release\l3v0.pdb source: l3v0.exe
Source: l3v0.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
Source: l3v0.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
Source: l3v0.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
Source: l3v0.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
Source: l3v0.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
Source: C:\Users\user\Desktop\l3v0.exe TID: 4208Thread sleep time: -85000s >= -30000sJump to behavior
Source: l3v0.exe, 00000000.00000002.2916800100.00000236F5AAC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ,{M%SystemRoot%\system32\pnrpnsp.dllHyper-V RAW
Source: l3v0.exe, 00000000.00000002.2916800100.00000236F5AAC000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Users\user\Desktop\l3v0.exeCode function: 0_2_00007FF681C31A68 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF681C31A68
Source: C:\Users\user\Desktop\l3v0.exeCode function: 0_2_00007FF681C31C0C SetUnhandledExceptionFilter,0_2_00007FF681C31C0C
Source: C:\Users\user\Desktop\l3v0.exeCode function: 0_2_00007FF681C31584 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,0_2_00007FF681C31584
Source: C:\Users\user\Desktop\l3v0.exeCode function: 0_2_00007FF681C31A68 IsProcessorFeaturePresent,memset,RtlCaptureContext,RtlLookupFunctionEntry,RtlVirtualUnwind,memset,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00007FF681C31A68
Source: C:\Users\user\Desktop\l3v0.exeCode function: 0_2_00007FF681C31940 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,0_2_00007FF681C31940
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire InfrastructureValid AccountsWindows Management Instrumentation1
DLL Side-Loading
1
Process Injection
1
Virtualization/Sandbox Evasion
OS Credential Dumping1
System Time Discovery
Remote ServicesData from Local System1
Non-Standard Port
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/JobBoot or Logon Initialization Scripts1
DLL Side-Loading
1
Process Injection
LSASS Memory11
Security Software Discovery
Remote Desktop ProtocolData from Removable Media1
Non-Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAtLogon Script (Windows)Logon Script (Windows)1
DLL Side-Loading
Security Account Manager1
Virtualization/Sandbox Evasion
SMB/Windows Admin SharesData from Network Shared Drive1
Application Layer Protocol
Automated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin HookLogin HookBinary PaddingNTDS2
System Information Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
l3v0.exe28%VirustotalBrowse
l3v0.exe13%ReversingLabsWin64.Trojan.Bodegun
l3v0.exe100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
NameIPActiveMaliciousAntivirus DetectionReputation
198.187.3.20.in-addr.arpa
unknown
unknownfalse
    high
    • No. of IPs < 25%
    • 25% < No. of IPs < 50%
    • 50% < No. of IPs < 75%
    • 75% < No. of IPs
    IPDomainCountryFlagASNASN NameMalicious
    3.107.255.174
    unknownUnited States
    16509AMAZON-02USfalse
    Joe Sandbox version:41.0.0 Charoite
    Analysis ID:1583741
    Start date and time:2025-01-03 13:52:05 +01:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 3m 45s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01
    Number of analysed new started processes analysed:6
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:l3v0.exe
    Detection:MAL
    Classification:mal56.winEXE@2/0@1/1
    EGA Information:
    • Successful, ratio: 100%
    HCA Information:
    • Successful, ratio: 100%
    • Number of executed functions: 2
    • Number of non-executed functions: 3
    Cookbook Comments:
    • Found application associated with file extension: .exe
    • Exclude process from analysis (whitelisted): MpCmdRun.exe, WMIADAP.exe, SIHClient.exe, conhost.exe
    • Excluded IPs from analysis (whitelisted): 52.149.20.212, 20.3.187.198, 13.107.246.45
    • Excluded domains from analysis (whitelisted): ocsp.digicert.com, slscr.update.microsoft.com, otelrules.azureedge.net, ctldl.windowsupdate.com, fe3cr.delivery.mp.microsoft.com
    • Not all processes where analyzed, report is missing behavior information
    • Report size getting too big, too many NtOpenKeyEx calls found.
    • Report size getting too big, too many NtQueryValueKey calls found.
    No simulations
    No context
    No context
    MatchAssociated Sample Name / URLSHA 256DetectionThreat NameLinkContext
    AMAZON-02US1111.htaGet hashmaliciousUnknownBrowse
    • 185.166.143.50
    https://d25mwe2145ri5.cloudfront.net/installer/33365003/2056290341532614624Get hashmaliciousUnknownBrowse
    • 18.239.15.218
    Payment Receipt.exeGet hashmaliciousFormBookBrowse
    • 13.228.81.39
    boatnet.mpsl.elfGet hashmaliciousMiraiBrowse
    • 54.171.230.55
    sparc.elfGet hashmaliciousGafgyt, MiraiBrowse
    • 34.249.145.219
    powerpc.elfGet hashmaliciousMiraiBrowse
    • 34.249.145.219
    x86.elfGet hashmaliciousUnknownBrowse
    • 34.249.145.219
    x86_64.elfGet hashmaliciousMiraiBrowse
    • 54.171.230.55
    MIPS.elfGet hashmaliciousUnknownBrowse
    • 54.171.230.55
    MIPSEL.elfGet hashmaliciousUnknownBrowse
    • 54.171.230.55
    No context
    No context
    No created / dropped files found
    File type:PE32+ executable (console) x86-64, for MS Windows
    Entropy (8bit):4.940690500527577
    TrID:
    • Win64 Executable Console (202006/5) 92.65%
    • Win64 Executable (generic) (12005/4) 5.51%
    • Generic Win/DOS Executable (2004/3) 0.92%
    • DOS Executable Generic (2002/1) 0.92%
    • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
    File name:l3v0.exe
    File size:12'288 bytes
    MD5:bce921da7e4ed6138b0d5cb30952a855
    SHA1:b27ea9e52e550ea081da249925af52f0c92f420e
    SHA256:6def8cb28331b9b23f7c2601fc55efe8008a4d88c04286b48db42b673c0ab8e8
    SHA512:60cbc04edf86d0c5668e0e92e21e1c420c1307f919e3ddf84e96a0be7455386bee3d47fed20dfd1b569428e0bad1acfeccb792d60d8bddbf67eb57faa08ec975
    SSDEEP:192:GidoRJHb9Ee/je1v2kN5Bc9r8RsQ5tfZc3:pSPHb9EsjOH5Bi8Rs
    TLSH:36421947BF938DE8DA248170C4331E1AF2BBB7309762538F877455221E66390BCA76C9
    File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$..........g...4...4...4..K4...4.O.5...4.O.5...4.O.5...4.O.5...4...5...4...4...4.O.5...4.O'4...4.O.5...4Rich...4........PE..d.....wg...
    Icon Hash:90cececece8e8eb0
    Entrypoint:0x140001570
    Entrypoint Section:.text
    Digitally signed:false
    Imagebase:0x140000000
    Subsystem:windows cui
    Image File Characteristics:EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE
    DLL Characteristics:HIGH_ENTROPY_VA, DYNAMIC_BASE, NX_COMPAT, TERMINAL_SERVER_AWARE
    Time Stamp:0x6777A519 [Fri Jan 3 08:51:37 2025 UTC]
    TLS Callbacks:
    CLR (.Net) Version:
    OS Version Major:6
    OS Version Minor:0
    File Version Major:6
    File Version Minor:0
    Subsystem Version Major:6
    Subsystem Version Minor:0
    Import Hash:b88f4cd742ae7c77b018b6db1bbdb1ee
    Instruction
    dec eax
    sub esp, 28h
    call 00007FD47483400Ch
    dec eax
    add esp, 28h
    jmp 00007FD474833AB7h
    int3
    int3
    inc eax
    push ebx
    dec eax
    sub esp, 20h
    dec eax
    mov ebx, ecx
    xor ecx, ecx
    call dword ptr [00001AEBh]
    dec eax
    mov ecx, ebx
    call dword ptr [00001ADAh]
    call dword ptr [00001AE4h]
    dec eax
    mov ecx, eax
    mov edx, C0000409h
    dec eax
    add esp, 20h
    pop ebx
    dec eax
    jmp dword ptr [00001AD8h]
    dec eax
    mov dword ptr [esp+08h], ecx
    dec eax
    sub esp, 38h
    mov ecx, 00000017h
    call dword ptr [00001A9Ch]
    test eax, eax
    je 00007FD474833C49h
    mov ecx, 00000002h
    int 29h
    dec eax
    lea ecx, dword ptr [00003B42h]
    call 00007FD474833CEEh
    dec eax
    mov eax, dword ptr [esp+38h]
    dec eax
    mov dword ptr [00003C29h], eax
    dec eax
    lea eax, dword ptr [esp+38h]
    dec eax
    add eax, 08h
    dec eax
    mov dword ptr [00003BB9h], eax
    dec eax
    mov eax, dword ptr [00003C12h]
    dec eax
    mov dword ptr [00003A83h], eax
    dec eax
    mov eax, dword ptr [esp+40h]
    dec eax
    mov dword ptr [00003B87h], eax
    mov dword ptr [00003A5Dh], C0000409h
    mov dword ptr [00003A57h], 00000001h
    mov dword ptr [00003A61h], 00000001h
    Programming Language:
    • [IMP] VS2008 SP1 build 30729
    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IMPORT0x399c0xc8.rdata
    IMAGE_DIRECTORY_ENTRY_RESOURCE0x70000x1e0.rsrc
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x60000x18c.pdata
    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
    IMAGE_DIRECTORY_ENTRY_BASERELOC0x80000x30.reloc
    IMAGE_DIRECTORY_ENTRY_DEBUG0x34300x70.rdata
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0x00x0
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x32f00x140.rdata
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IAT0x30000x210.rdata
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
    .text0x10000x116c0x12008796910620abae1cffc661b1f7751b10False0.6319444444444444zlib compressed data5.995569507650531IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    .rdata0x30000x11560x1200249a3856dfc8d01c4210ff2deb375253False0.3756510416666667data4.086782622111068IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .data0x50000x6800x20085c2aebd011c5c1b37c1009def59c2b6False0.09375data0.5324895658143383IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .pdata0x60000x18c0x2002aeb3a18d6719554eeeabb81e3ce9d8dFalse0.46875data3.0681451707792435IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .rsrc0x70000x1e00x2000b35de07beeb30d1d6013cbca2846303False0.525390625data4.701503258251789IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
    .reloc0x80000x300x2004c504a645248480104d353b6053f5847False0.12109375data0.7101928893219522IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
    NameRVASizeTypeLanguageCountryZLIB Complexity
    RT_MANIFEST0x70600x17dXML 1.0 document, ASCII text, with CRLF line terminatorsEnglishUnited States0.5931758530183727
    DLLImport
    KERNEL32.dllWaitForSingleObject, Sleep, CloseHandle, FreeConsole, CreateProcessW, RtlLookupFunctionEntry, GetModuleHandleW, IsDebuggerPresent, InitializeSListHead, GetSystemTimeAsFileTime, GetCurrentThreadId, GetCurrentProcessId, QueryPerformanceCounter, IsProcessorFeaturePresent, RtlVirtualUnwind, UnhandledExceptionFilter, SetUnhandledExceptionFilter, GetCurrentProcess, TerminateProcess, RtlCaptureContext
    WS2_32.dllWSASocketW, closesocket, WSACleanup, htons, WSAConnect, inet_pton, WSAStartup, recv
    VCRUNTIME140.dll__C_specific_handler, __current_exception, __current_exception_context, memset, memcpy
    api-ms-win-crt-runtime-l1-1-0.dll_register_onexit_function, _register_thread_local_exe_atexit_callback, _get_initial_narrow_environment, _crt_atexit, _c_exit, _configure_narrow_argv, _initialize_onexit_table, _set_app_type, _seh_filter_exe, _initialize_narrow_environment, exit, __p___argv, __p___argc, _exit, _initterm_e, _initterm, terminate, _cexit
    api-ms-win-crt-convert-l1-1-0.dllatoi
    api-ms-win-crt-math-l1-1-0.dll__setusermatherr
    api-ms-win-crt-stdio-l1-1-0.dll_set_fmode, __p__commode
    api-ms-win-crt-locale-l1-1-0.dll_configthreadlocale
    api-ms-win-crt-heap-l1-1-0.dll_set_new_mode
    Language of compilation systemCountry where language is spokenMap
    EnglishUnited States
    TimestampSource PortDest PortSource IPDest IP
    Jan 3, 2025 13:53:03.744533062 CET497304953192.168.2.43.107.255.174
    Jan 3, 2025 13:53:03.749396086 CET4953497303.107.255.174192.168.2.4
    Jan 3, 2025 13:53:03.749474049 CET497304953192.168.2.43.107.255.174
    Jan 3, 2025 13:53:05.761142969 CET4953497303.107.255.174192.168.2.4
    Jan 3, 2025 13:53:05.761272907 CET497304953192.168.2.43.107.255.174
    Jan 3, 2025 13:53:05.761504889 CET497304953192.168.2.43.107.255.174
    Jan 3, 2025 13:53:05.766225100 CET4953497303.107.255.174192.168.2.4
    Jan 3, 2025 13:53:10.772028923 CET497314953192.168.2.43.107.255.174
    Jan 3, 2025 13:53:10.777878046 CET4953497313.107.255.174192.168.2.4
    Jan 3, 2025 13:53:10.777956963 CET497314953192.168.2.43.107.255.174
    Jan 3, 2025 13:53:12.795948029 CET4953497313.107.255.174192.168.2.4
    Jan 3, 2025 13:53:12.796037912 CET497314953192.168.2.43.107.255.174
    Jan 3, 2025 13:53:12.796092033 CET497314953192.168.2.43.107.255.174
    Jan 3, 2025 13:53:12.800843954 CET4953497313.107.255.174192.168.2.4
    Jan 3, 2025 13:53:17.803611994 CET497344953192.168.2.43.107.255.174
    Jan 3, 2025 13:53:17.808459997 CET4953497343.107.255.174192.168.2.4
    Jan 3, 2025 13:53:17.808537960 CET497344953192.168.2.43.107.255.174
    Jan 3, 2025 13:53:19.806934118 CET4953497343.107.255.174192.168.2.4
    Jan 3, 2025 13:53:19.807028055 CET497344953192.168.2.43.107.255.174
    Jan 3, 2025 13:53:19.807077885 CET497344953192.168.2.43.107.255.174
    Jan 3, 2025 13:53:19.811916113 CET4953497343.107.255.174192.168.2.4
    Jan 3, 2025 13:53:24.819094896 CET497394953192.168.2.43.107.255.174
    Jan 3, 2025 13:53:24.824058056 CET4953497393.107.255.174192.168.2.4
    Jan 3, 2025 13:53:24.824172974 CET497394953192.168.2.43.107.255.174
    Jan 3, 2025 13:53:26.824258089 CET4953497393.107.255.174192.168.2.4
    Jan 3, 2025 13:53:26.824362993 CET497394953192.168.2.43.107.255.174
    Jan 3, 2025 13:53:26.824470043 CET497394953192.168.2.43.107.255.174
    Jan 3, 2025 13:53:26.829298973 CET4953497393.107.255.174192.168.2.4
    Jan 3, 2025 13:53:31.834914923 CET497404953192.168.2.43.107.255.174
    Jan 3, 2025 13:53:31.839870930 CET4953497403.107.255.174192.168.2.4
    Jan 3, 2025 13:53:31.839951038 CET497404953192.168.2.43.107.255.174
    Jan 3, 2025 13:53:31.946157932 CET5357353192.168.2.4162.159.36.2
    Jan 3, 2025 13:53:31.950931072 CET5353573162.159.36.2192.168.2.4
    Jan 3, 2025 13:53:31.950990915 CET5357353192.168.2.4162.159.36.2
    Jan 3, 2025 13:53:31.955751896 CET5353573162.159.36.2192.168.2.4
    Jan 3, 2025 13:53:32.432889938 CET5357353192.168.2.4162.159.36.2
    Jan 3, 2025 13:53:32.438148022 CET5353573162.159.36.2192.168.2.4
    Jan 3, 2025 13:53:32.438194990 CET5357353192.168.2.4162.159.36.2
    Jan 3, 2025 13:53:33.821783066 CET4953497403.107.255.174192.168.2.4
    Jan 3, 2025 13:53:33.821886063 CET497404953192.168.2.43.107.255.174
    Jan 3, 2025 13:53:33.821922064 CET497404953192.168.2.43.107.255.174
    Jan 3, 2025 13:53:33.826719999 CET4953497403.107.255.174192.168.2.4
    Jan 3, 2025 13:53:38.834136009 CET535784953192.168.2.43.107.255.174
    Jan 3, 2025 13:53:38.839006901 CET4953535783.107.255.174192.168.2.4
    Jan 3, 2025 13:53:38.839081049 CET535784953192.168.2.43.107.255.174
    Jan 3, 2025 13:53:40.843492985 CET4953535783.107.255.174192.168.2.4
    Jan 3, 2025 13:53:40.843693018 CET535784953192.168.2.43.107.255.174
    Jan 3, 2025 13:53:40.843751907 CET535784953192.168.2.43.107.255.174
    Jan 3, 2025 13:53:40.848485947 CET4953535783.107.255.174192.168.2.4
    Jan 3, 2025 13:53:45.849772930 CET535794953192.168.2.43.107.255.174
    Jan 3, 2025 13:53:45.859137058 CET4953535793.107.255.174192.168.2.4
    Jan 3, 2025 13:53:45.859230995 CET535794953192.168.2.43.107.255.174
    Jan 3, 2025 13:53:47.853161097 CET4953535793.107.255.174192.168.2.4
    Jan 3, 2025 13:53:47.853256941 CET535794953192.168.2.43.107.255.174
    Jan 3, 2025 13:53:47.853404999 CET535794953192.168.2.43.107.255.174
    Jan 3, 2025 13:53:47.858134031 CET4953535793.107.255.174192.168.2.4
    Jan 3, 2025 13:53:52.865583897 CET535804953192.168.2.43.107.255.174
    Jan 3, 2025 13:53:52.870547056 CET4953535803.107.255.174192.168.2.4
    Jan 3, 2025 13:53:52.870619059 CET535804953192.168.2.43.107.255.174
    Jan 3, 2025 13:53:54.870506048 CET4953535803.107.255.174192.168.2.4
    Jan 3, 2025 13:53:54.870585918 CET535804953192.168.2.43.107.255.174
    Jan 3, 2025 13:53:54.870632887 CET535804953192.168.2.43.107.255.174
    Jan 3, 2025 13:53:54.875437975 CET4953535803.107.255.174192.168.2.4
    Jan 3, 2025 13:53:59.889004946 CET535874953192.168.2.43.107.255.174
    Jan 3, 2025 13:53:59.893923044 CET4953535873.107.255.174192.168.2.4
    Jan 3, 2025 13:53:59.893999100 CET535874953192.168.2.43.107.255.174
    Jan 3, 2025 13:54:01.885876894 CET4953535873.107.255.174192.168.2.4
    Jan 3, 2025 13:54:01.885927916 CET535874953192.168.2.43.107.255.174
    Jan 3, 2025 13:54:01.885977030 CET535874953192.168.2.43.107.255.174
    Jan 3, 2025 13:54:01.890749931 CET4953535873.107.255.174192.168.2.4
    Jan 3, 2025 13:54:06.896508932 CET536314953192.168.2.43.107.255.174
    Jan 3, 2025 13:54:06.901320934 CET4953536313.107.255.174192.168.2.4
    Jan 3, 2025 13:54:06.901396990 CET536314953192.168.2.43.107.255.174
    Jan 3, 2025 13:54:08.884836912 CET4953536313.107.255.174192.168.2.4
    Jan 3, 2025 13:54:08.884999037 CET536314953192.168.2.43.107.255.174
    Jan 3, 2025 13:54:08.884999037 CET536314953192.168.2.43.107.255.174
    Jan 3, 2025 13:54:08.889796972 CET4953536313.107.255.174192.168.2.4
    Jan 3, 2025 13:54:13.896399975 CET536764953192.168.2.43.107.255.174
    Jan 3, 2025 13:54:13.901182890 CET4953536763.107.255.174192.168.2.4
    Jan 3, 2025 13:54:13.901256084 CET536764953192.168.2.43.107.255.174
    Jan 3, 2025 13:54:15.885672092 CET4953536763.107.255.174192.168.2.4
    Jan 3, 2025 13:54:15.885776043 CET536764953192.168.2.43.107.255.174
    Jan 3, 2025 13:54:15.885811090 CET536764953192.168.2.43.107.255.174
    Jan 3, 2025 13:54:15.890588045 CET4953536763.107.255.174192.168.2.4
    Jan 3, 2025 13:54:20.903271914 CET537224953192.168.2.43.107.255.174
    Jan 3, 2025 13:54:20.908108950 CET4953537223.107.255.174192.168.2.4
    Jan 3, 2025 13:54:20.908195972 CET537224953192.168.2.43.107.255.174
    Jan 3, 2025 13:54:22.922518969 CET4953537223.107.255.174192.168.2.4
    Jan 3, 2025 13:54:22.922566891 CET537224953192.168.2.43.107.255.174
    Jan 3, 2025 13:54:22.922601938 CET537224953192.168.2.43.107.255.174
    Jan 3, 2025 13:54:22.927396059 CET4953537223.107.255.174192.168.2.4
    Jan 3, 2025 13:54:27.928776026 CET537694953192.168.2.43.107.255.174
    Jan 3, 2025 13:54:27.933657885 CET4953537693.107.255.174192.168.2.4
    Jan 3, 2025 13:54:27.933736086 CET537694953192.168.2.43.107.255.174
    Jan 3, 2025 13:54:29.935127020 CET4953537693.107.255.174192.168.2.4
    Jan 3, 2025 13:54:29.935189962 CET537694953192.168.2.43.107.255.174
    Jan 3, 2025 13:54:29.935264111 CET537694953192.168.2.43.107.255.174
    Jan 3, 2025 13:54:29.940085888 CET4953537693.107.255.174192.168.2.4
    Jan 3, 2025 13:54:34.944470882 CET538164953192.168.2.43.107.255.174
    Jan 3, 2025 13:54:34.949249029 CET4953538163.107.255.174192.168.2.4
    Jan 3, 2025 13:54:34.949321985 CET538164953192.168.2.43.107.255.174
    Jan 3, 2025 13:54:36.950282097 CET4953538163.107.255.174192.168.2.4
    Jan 3, 2025 13:54:36.950336933 CET538164953192.168.2.43.107.255.174
    Jan 3, 2025 13:54:36.950376987 CET538164953192.168.2.43.107.255.174
    Jan 3, 2025 13:54:36.955099106 CET4953538163.107.255.174192.168.2.4
    Jan 3, 2025 13:54:41.959950924 CET538524953192.168.2.43.107.255.174
    Jan 3, 2025 13:54:41.964843035 CET4953538523.107.255.174192.168.2.4
    Jan 3, 2025 13:54:41.965048075 CET538524953192.168.2.43.107.255.174
    Jan 3, 2025 13:54:43.963937998 CET4953538523.107.255.174192.168.2.4
    Jan 3, 2025 13:54:43.964068890 CET538524953192.168.2.43.107.255.174
    Jan 3, 2025 13:54:43.964276075 CET538524953192.168.2.43.107.255.174
    Jan 3, 2025 13:54:43.969021082 CET4953538523.107.255.174192.168.2.4
    Jan 3, 2025 13:54:48.975545883 CET538534953192.168.2.43.107.255.174
    Jan 3, 2025 13:54:48.980622053 CET4953538533.107.255.174192.168.2.4
    Jan 3, 2025 13:54:48.980714083 CET538534953192.168.2.43.107.255.174
    Jan 3, 2025 13:54:50.979974985 CET4953538533.107.255.174192.168.2.4
    Jan 3, 2025 13:54:50.980046988 CET538534953192.168.2.43.107.255.174
    Jan 3, 2025 13:54:50.982479095 CET538534953192.168.2.43.107.255.174
    Jan 3, 2025 13:54:50.987293959 CET4953538533.107.255.174192.168.2.4
    Jan 3, 2025 13:54:55.991599083 CET538544953192.168.2.43.107.255.174
    Jan 3, 2025 13:54:55.996496916 CET4953538543.107.255.174192.168.2.4
    Jan 3, 2025 13:54:55.996577024 CET538544953192.168.2.43.107.255.174
    Jan 3, 2025 13:54:57.996923923 CET4953538543.107.255.174192.168.2.4
    Jan 3, 2025 13:54:57.996984959 CET538544953192.168.2.43.107.255.174
    Jan 3, 2025 13:54:57.997025013 CET538544953192.168.2.43.107.255.174
    Jan 3, 2025 13:54:58.002331972 CET4953538543.107.255.174192.168.2.4
    Jan 3, 2025 13:55:03.006655931 CET538554953192.168.2.43.107.255.174
    Jan 3, 2025 13:55:03.011559010 CET4953538553.107.255.174192.168.2.4
    Jan 3, 2025 13:55:03.011698961 CET538554953192.168.2.43.107.255.174
    Jan 3, 2025 13:55:05.012833118 CET4953538553.107.255.174192.168.2.4
    Jan 3, 2025 13:55:05.012937069 CET538554953192.168.2.43.107.255.174
    Jan 3, 2025 13:55:05.012937069 CET538554953192.168.2.43.107.255.174
    Jan 3, 2025 13:55:05.017833948 CET4953538553.107.255.174192.168.2.4
    TimestampSource PortDest PortSource IPDest IP
    Jan 3, 2025 13:53:31.945761919 CET5355353162.159.36.2192.168.2.4
    Jan 3, 2025 13:53:32.538228035 CET5307853192.168.2.41.1.1.1
    Jan 3, 2025 13:53:32.545404911 CET53530781.1.1.1192.168.2.4
    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
    Jan 3, 2025 13:53:32.538228035 CET192.168.2.41.1.1.10xaa2eStandard query (0)198.187.3.20.in-addr.arpaPTR (Pointer record)IN (0x0001)false
    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
    Jan 3, 2025 13:53:32.545404911 CET1.1.1.1192.168.2.40xaa2eName error (3)198.187.3.20.in-addr.arpanonenonePTR (Pointer record)IN (0x0001)false

    Click to jump to process

    Click to jump to process

    Click to dive into process behavior distribution

    Click to jump to process

    Target ID:0
    Start time:07:52:57
    Start date:03/01/2025
    Path:C:\Users\user\Desktop\l3v0.exe
    Wow64 process (32bit):false
    Commandline:"C:\Users\user\Desktop\l3v0.exe"
    Imagebase:0x7ff681c30000
    File size:12'288 bytes
    MD5 hash:BCE921DA7E4ED6138B0D5CB30952A855
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:low
    Has exited:false

    Target ID:1
    Start time:07:52:57
    Start date:03/01/2025
    Path:C:\Windows\System32\conhost.exe
    Wow64 process (32bit):false
    Commandline:C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
    Imagebase:0x7ff7699e0000
    File size:862'208 bytes
    MD5 hash:0D698AF330FD17BEE3BF90011D49251D
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:C, C++ or other language
    Reputation:high
    Has exited:true

    Reset < >

      Execution Graph

      Execution Coverage:20.6%
      Dynamic/Decrypted Code Coverage:0%
      Signature Coverage:17.7%
      Total number of Nodes:62
      Total number of Limit Nodes:1
      execution_graph 379 7ff681c313d8 383 7ff681c31c0c SetUnhandledExceptionFilter 379->383 384 7ff681c32136 _seh_filter_exe 385 7ff681c31310 386 7ff681c31320 385->386 398 7ff681c31778 386->398 388 7ff681c31a68 9 API calls 389 7ff681c313c5 388->389 390 7ff681c31344 _RTC_Initialize 395 7ff681c313a7 390->395 406 7ff681c31a00 InitializeSListHead 390->406 395->388 397 7ff681c313b5 395->397 399 7ff681c31789 398->399 400 7ff681c317bb 398->400 401 7ff681c317f8 399->401 404 7ff681c3178e __scrt_release_startup_lock 399->404 400->390 402 7ff681c31a68 9 API calls 401->402 403 7ff681c31802 402->403 404->400 405 7ff681c317ab _initialize_onexit_table 404->405 405->400 407 7ff681c31570 410 7ff681c31940 407->410 411 7ff681c31579 410->411 412 7ff681c31963 GetSystemTimeAsFileTime GetCurrentThreadId GetCurrentProcessId QueryPerformanceCounter 410->412 412->411 336 7ff681c313f4 337 7ff681c3140d 336->337 338 7ff681c3154b 337->338 339 7ff681c31415 __scrt_acquire_startup_lock 337->339 368 7ff681c31a68 IsProcessorFeaturePresent 338->368 341 7ff681c31555 339->341 346 7ff681c31433 __scrt_release_startup_lock 339->346 342 7ff681c31a68 9 API calls 341->342 343 7ff681c31560 342->343 345 7ff681c31568 _exit 343->345 344 7ff681c31458 346->344 347 7ff681c314de _get_initial_narrow_environment __p___argv __p___argc 346->347 351 7ff681c314d6 _register_thread_local_exe_atexit_callback 346->351 356 7ff681c31260 FreeConsole 347->356 351->347 353 7ff681c3150b 354 7ff681c31510 _cexit 353->354 355 7ff681c31515 353->355 354->355 355->344 357 7ff681c31289 atoi 356->357 358 7ff681c3129e 356->358 357->358 359 7ff681c315b8 IsProcessorFeaturePresent 358->359 360 7ff681c31304 358->360 361 7ff681c315d0 359->361 366 7ff681c31bb8 GetModuleHandleW 360->366 374 7ff681c3168c RtlCaptureContext 361->374 367 7ff681c31507 366->367 367->343 367->353 369 7ff681c31a8e 368->369 370 7ff681c31a9c memset RtlCaptureContext RtlLookupFunctionEntry 369->370 371 7ff681c31ad6 RtlVirtualUnwind 370->371 372 7ff681c31b12 memset IsDebuggerPresent SetUnhandledExceptionFilter UnhandledExceptionFilter 370->372 371->372 373 7ff681c31b92 372->373 373->341 375 7ff681c316a6 RtlLookupFunctionEntry 374->375 376 7ff681c316bc RtlVirtualUnwind 375->376 377 7ff681c315e3 375->377 376->375 376->377 378 7ff681c31584 SetUnhandledExceptionFilter UnhandledExceptionFilter GetCurrentProcess TerminateProcess 377->378 413 7ff681c31522 414 7ff681c31bb8 GetModuleHandleW 413->414 415 7ff681c31529 414->415 416 7ff681c31568 _exit 415->416 417 7ff681c3152d 415->417

      Callgraph

      • Executed
      • Not Executed
      • Opacity -> Relevance
      • Disassembly available
      callgraph 0 Function_00007FF681C3168C 1 Function_00007FF681C31C0C 2 Function_00007FF681C31310 3 Function_00007FF681C31A10 2->3 6 Function_00007FF681C31A14 2->6 9 Function_00007FF681C31C78 2->9 10 Function_00007FF681C319F8 2->10 11 Function_00007FF681C31778 2->11 17 Function_00007FF681C31A00 2->17 22 Function_00007FF681C31A44 2->22 23 Function_00007FF681C31928 2->23 24 Function_00007FF681C31A28 2->24 25 Function_00007FF681C31A68 2->25 26 Function_00007FF681C319EC 2->26 29 Function_00007FF681C319F0 2->29 4 Function_00007FF681C31A50 5 Function_00007FF681C32094 7 Function_00007FF681C32154 8 Function_00007FF681C31895 14 Function_00007FF681C31FBC 11->14 11->25 12 Function_00007FF681C31BB8 13 Function_00007FF681C32136 15 Function_00007FF681C3173C 15->3 28 Function_00007FF681C31CF0 15->28 16 Function_00007FF681C31700 16->14 18 Function_00007FF681C31940 19 Function_00007FF681C318C0 19->3 20 Function_00007FF681C31584 21 Function_00007FF681C31804 27 Function_00007FF681C318EC 23->27 34 Function_00007FF681C31A18 24->34 40 Function_00007FF681C31A20 24->40 41 Function_00007FF681C31A60 25->41 30 Function_00007FF681C31570 30->18 31 Function_00007FF681C313F4 31->4 31->12 31->15 31->16 31->19 31->21 31->25 36 Function_00007FF681C31A58 31->36 37 Function_00007FF681C3189C 31->37 39 Function_00007FF681C31260 31->39 32 Function_00007FF681C31CB4 33 Function_00007FF681C32074 33->5 35 Function_00007FF681C313D8 35->1 35->26 37->14 38 Function_00007FF681C31C1C 39->0 39->20 42 Function_00007FF681C31522 42->12

      Control-flow Graph

      APIs
      Strings
      Memory Dump Source
      • Source File: 00000000.00000002.2916839417.00007FF681C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF681C30000, based on PE: true
      • Associated: 00000000.00000002.2916828278.00007FF681C30000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2916850596.00007FF681C33000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2916861716.00007FF681C36000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff681c30000_l3v0.jbxd
      Similarity
      • API ID: Cleanupclosesocket$CloseConnectConsoleCreateFeatureFreeHandleObjectPresentProcessProcessorSingleSleepSocketStartupWait__raise_securityfailureatoicapture_previous_contexthtonsinet_ptonrecv
      • String ID: 5.174$exit$h
      • API String ID: 3739796401-2023662516
      • Opcode ID: ad3f019a78115dd4a194f6ded1868b3e933a05ad12c206625ba5f86ac05b06ff
      • Instruction ID: 01459f7ab0d9f36e6bd9714f64f8cd2e201c515173feb97420a8c8bca2ce29b6
      • Opcode Fuzzy Hash: ad3f019a78115dd4a194f6ded1868b3e933a05ad12c206625ba5f86ac05b06ff
      • Instruction Fuzzy Hash: B8310635A08B06CAEB509B14E891269B3B0FF88744FA0513DDA8EC77A5DF3DE556C740

      Control-flow Graph

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2916839417.00007FF681C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF681C30000, based on PE: true
      • Associated: 00000000.00000002.2916828278.00007FF681C30000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2916850596.00007FF681C33000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2916861716.00007FF681C36000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff681c30000_l3v0.jbxd
      Similarity
      • API ID: __p___argc__p___argv__scrt_acquire_startup_lock__scrt_release_startup_lock_cexit_exit_get_initial_narrow_environment_register_thread_local_exe_atexit_callback
      • String ID:
      • API String ID: 1133592946-0
      • Opcode ID: 53104209cc924b18794733fff353984d9b5715d5eb00835392a6dfd8a8c915a1
      • Instruction ID: 9c594493109504e54c88e3284617c248c3dff3b3a5b34d007716cea4ee3105fc
      • Opcode Fuzzy Hash: 53104209cc924b18794733fff353984d9b5715d5eb00835392a6dfd8a8c915a1
      • Instruction Fuzzy Hash: BC311B21A0C247C9FB14AB25D4523B962B2BF45784F64503DEA4EC72E7DE2DA44BC341

      Control-flow Graph

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2916839417.00007FF681C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF681C30000, based on PE: true
      • Associated: 00000000.00000002.2916828278.00007FF681C30000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2916850596.00007FF681C33000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2916861716.00007FF681C36000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff681c30000_l3v0.jbxd
      Similarity
      • API ID: ExceptionFilterPresentUnhandledmemset$CaptureContextDebuggerEntryFeatureFunctionLookupProcessorUnwindVirtual
      • String ID:
      • API String ID: 313767242-0
      • Opcode ID: ddb6a8e0725510ff2cd2a2636693bcc68cf2087b9abd4ed7ee8ccda58108a9c7
      • Instruction ID: b1e6fdf21d47d9059cf8ad7efa528bb6528ef6031e01a4ed863de015e162d154
      • Opcode Fuzzy Hash: ddb6a8e0725510ff2cd2a2636693bcc68cf2087b9abd4ed7ee8ccda58108a9c7
      • Instruction Fuzzy Hash: CB311D72609A81DAEB608F60E8807ED6370FB84755F54403EDA4E87B94EF3CD589C710

      Control-flow Graph

      APIs
      Memory Dump Source
      • Source File: 00000000.00000002.2916839417.00007FF681C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF681C30000, based on PE: true
      • Associated: 00000000.00000002.2916828278.00007FF681C30000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2916850596.00007FF681C33000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2916861716.00007FF681C36000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff681c30000_l3v0.jbxd
      Similarity
      • API ID: CurrentTime$CounterFilePerformanceProcessQuerySystemThread
      • String ID:
      • API String ID: 2933794660-0
      • Opcode ID: 73747b4b6d83fd9882d62d19084e766674f18944de7bf1b652c7ffa93b46e350
      • Instruction ID: 8c8ad67a5bfce5f5d46e41925d8799e112f2b1bcfb025a3b6d2d95e8f2fd7ec3
      • Opcode Fuzzy Hash: 73747b4b6d83fd9882d62d19084e766674f18944de7bf1b652c7ffa93b46e350
      • Instruction Fuzzy Hash: 08111822B18B05CAEB008B60E8552A873B4FB19758F541E39DA6D867A4DF7CD199C380
      Memory Dump Source
      • Source File: 00000000.00000002.2916839417.00007FF681C31000.00000020.00000001.01000000.00000003.sdmp, Offset: 00007FF681C30000, based on PE: true
      • Associated: 00000000.00000002.2916828278.00007FF681C30000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2916850596.00007FF681C33000.00000002.00000001.01000000.00000003.sdmpDownload File
      • Associated: 00000000.00000002.2916861716.00007FF681C36000.00000002.00000001.01000000.00000003.sdmpDownload File
      Joe Sandbox IDA Plugin
      • Snapshot File: hcaresult_0_2_7ff681c30000_l3v0.jbxd
      Similarity
      • API ID:
      • String ID:
      • API String ID:
      • Opcode ID: 31ff099938f35d9671febec450d33b251956a6b3a0b4d9de2ae05f6a474605c0
      • Instruction ID: 51158e8020ebe711fa10ecd468c5035d7bdff02da5407c3149fdb0f4ca5b95f5
      • Opcode Fuzzy Hash: 31ff099938f35d9671febec450d33b251956a6b3a0b4d9de2ae05f6a474605c0
      • Instruction Fuzzy Hash: D0A0023594CD02E4E7048B00FA515306330FF50310B60507DD40DC5060DF3CE883C344